Abstract
Crimes related to cryptocurrencies are on the rise. In Malaysia, reported losses is increasing from USD2.67 million in 2017 to USD55.32 million in 2018. This raise a concern whether the current process, tools and trainings are sufficient for Malaysian investigators to conduct cryptocurrencies forensics. A survey questionnaire was conducted to answer four questions; is the current (i)process model (ii)tools, and (iii)trainings sufficient? Lastly (iv)is there a relationship between work experience years and the needs for process model, tools and trainings? The result shows respondents (i) agreed that process model is insufficient; (ii) neutral on the sufficiency of tool, however, they suggested a tool to collect suspected cryptowallets information, cryptowallets triage tool; and automated cryptocurrencies transfer tool; (iii) agreed that training program is insufficient, and lastly (iv) regardless of years of experience, investigators do need a process model, tools and trainings to conduct work. Surprisingly these findings echoed with worldwide view. The study highlights the need for a cryptocurrencies forensics process model, tools and trainings program in place.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Nakamoto, S.N.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008)
Dewey, J. (ed.): Blockchain & Cryptocurrency Regulation, 1st edn. Global Legal Group Ltd, London (2019)
Peters, G.W., Panayi, E., Chapelle, A.: Trends in crypto-currencies and blockchain technologies: a monetary theory and regulation perspective. J. Financ. Perspect. FinTech vol. 3, no. 3 (2015). https://doi.org/10.2139/ssrn.2646618
Westerlund, M., Neovius, M., Pulkkis, G.: Providing tamper-resistant audit trails for cloud forensics with distributed ledger based solutions. Int. J. Adv. Secur. 11(3), 288–300 (2018)
Reddy, E.: Analysing the investigation and prosecution of cryptocurrency crime as provided for by the south african cybercrimes bill. Statut. Law Rev. 41(2), 226–239 (2019). https://doi.org/10.1093/slr/hmz001
He, S., et al.: A social-network-based cryptocurrency wallet-management scheme. IEEE Access 6, 7654–7663 (2018). https://doi.org/10.1109/ACCESS.2018.2799385
Harlev, M.A., Sun Yin, H., Langenheldt, K.C., Mukkamala, R., Vatrapu, R.: Breaking bad: de-anonymising entity types on the bitcoin blockchain using supervised machine learning. In: Proceedings of the 51st Hawaii International Conference on System Sciences, vol. 9, pp. 3497–3506 (2018). https://doi.org/10.24251/hicss.2018.443
Brown, S.D.: Cryptocurrency and criminality. Police J. Theor. Pract. Princ. 89(4), 327–339 (2016). https://doi.org/10.1177/0032258x16658927
Grinberg, R.: Bitcoin: an innovative alternative digital currency. Hast. Sci. Technol. Law J. 4, 1–44 (2011)
Wai, A., Cheung, K., Roca, E., Su, J.J.: Crypto-currency bubbles: an application of the Phillips-Shi-Yu (2013) methodology on Mt. Gox bitcoin prices. J. Appl. Econ. 47(23), 2348–2358 (2015). https://doi.org/10.1080/00036846.2015.1005827
Risks and Threats of Cryptocurrencies. Homeland Security Enterprise, p. 196 (2014)
Iwamura, M., Kitamura, Y., Matsumoto, T.: Is Bitcoin the Only Cryptocurrency in the Town?. Economics of Cryptocurrency And Friedrich A, Hayek (2014)
Jones, C.: Digital currencies and organised crime update. Financial Regulation International (2018)
Sigler, K.: Crypto-jacking: how cyber-criminals are exploiting the crypto-currency boom. Comput. Fraud. Secur. 2018(9), 12–14 (2018). https://doi.org/10.1016/S1361-3723(18)30086-1
Feder, A., Gandal, N., Hamrick, J.T., Moore, T.: The impact of DDoS and other security shocks on Bitcoin currency exchanges: Evidence from Mt. Gox. J. Cybersecurity 3(2), 137–144 (2017). https://doi.org/10.1093/cybsec/tyx012
Kethineni, S., Cao, Y.: The rise in popularity of cryptocurrency and associated criminal activity. Int. Crim. Justice Rev. 30(3), 1–20 (2019). https://doi.org/10.1177/1057567719827051
Bitcoin price index | Real-time Bitcoin price charts | Luno. [Online]. https://www.luno.com/trade/XBTMYR. Accessed 18 Oct 2019
Notice to Members of the Public List of Reporting Institutions Dealing With Digital Currencies Declared to Bank Negara Malaysia (2019)
Capital Markets and Services (Prescription of Securities) (Digital Currency and Digital Token) Order 2019. Securities Commission Malaysia (2019)
Guidelines on Digital Assets. Securities Commission Malaysia (2020)
Anti-Money Laundering and Counter Financing of Terrorism ( AML / CFT ) - Digital Currencies ( Sector 6), no. Sector 6. Central Bank of Malaysia (2018)
Taklimat dan Penyelarasan Ancaman Cryptojacking. Commercial Crime Division, Royal Malaysian Police Force (2019)
Khatri, Y.: Malaysian electricity utility raids premises of 33 bitcoin miners accused of stealing \$760,000 in power. The Block, 2019. [Online]. https://www.theblockcrypto.com/linked/35188/malaysian-electricity-utility-raids-33-bitcoin-mining-premises-as-it-loses-760k. Accessed 18 Oct 2019
Saufi, N.M.: Laporan Tahunan Kumpulan Kerja Forensik Digital 2019 (2020)
Palmer, G.: A road map for digital forensic research. In: Proceedings of the Digital Forensic Research Conference DFRWS 2001 USA, pp. iii–42 (2001)
Taylor, S.K., Talib, M.Z.A.: Standard Operating Procedure of Digital Evidence Collection (2013)
Pallant, J.: SPSS Survival Manual - A Step by Step Guide to Data Analysis using SPSS for Windows, no. Version 10. Buckingham Open University Press, Maidenhead (2001)
Fincham, J.E.: Response rates and responsiveness for surveys, standards, and the Journal. Am. J. Pharm. Educ. 72(2), 43 (2008). https://doi.org/10.5688/aj720243
Van Der Horst, L., Choo, K.K.R., Le-Khac, N.A.: Process memory investigation of the bitcoin clients electrum and bitcoin core. IEEE Access 5, 22385–22398 (2017). https://doi.org/10.1109/ACCESS.2017.2759766
Volety, T., Saini, S., McGhin, T., Liu, C.Z., Choo, K.K.R.: Cracking Bitcoin wallets: i want what you have in the wallets. Futur. Gener. Comput. Syst. 91, 136–143 (2019). https://doi.org/10.1016/j.future.2018.08.029
Zollner, S., Choo, K.-K.R., Le-Khac, N.-A.: An automated live forensic and postmortem analysis tool for bitcoin on windows systems. IEEE Access 7, 158250–158263 (2019). https://doi.org/10.1109/access.2019.2948774
Ali, S.S., ElAshmawy, A., Shosha, A.F.: Memory forensics methodology for investigating cryptocurrency protocols. In: Proceedings of the International Conference on Security and Management (SAM), pp. 153–159 (2018)
Irwin, A.S.M., Turner, A.B.: Illicit Bitcoin transactions: challenges in getting to the who, what, when and where. J. Money Laund. Control 21(3), 297–313 (2018). https://doi.org/10.1108/JMLC-07-2017-0031
Bitcoin and Cryptocurrencies Law Enforcement Investigative Guide (Special Research Report) (2018)
Damshenas, M., Dehghantanha, A., Mahmoud, R.: A survey on digital forensics trends. Int. J. Cyber-Secur. Digit. Forensics 3(4), 209–234 (2014)
Brown, C.S.D.: Investigating and prosecuting cyber crime: forensic dependencies and barriers to justice. Int. J. Cyber Criminol. 9(1), 55–119 (2015). https://doi.org/10.5281/zenodo.22387
Tziakouris, G.: Cryptocurrencies - a forensic challenge or opportunity for law enforcement? An INTERPOL perspective. IEEE Secur. Priv. 16(4), 92–94 (2018). https://doi.org/10.1109/MSP.2018.3111243
Elyas, M., Ahmad, A., Maynard, S.B., Lonie, A.: Digital forensic readiness: expert perspectives on a theoretical framework. Comput. Secur. 52, 70–89 (2015). https://doi.org/10.1016/j.cose.2015.04.003
ACPO Good Practice Guide for Digital Evidence. Association of Chief Police Officers of England, Wales & Northern Ireland, vol. 5 (2012)
ISO/IEC 27037 : 2012 Guidelines for identification, collection, acquisition and preservation of digital evidence. International Organization Standards (2012)
Fröwis, M., Gottschalk, T., Haslhofer, B., Rückert, C., Pesch, P.: Safeguarding the Evidential Value of Forensic Cryptocurrency Investigations, Arxiv, pp. 1–23 (2019)
Andrew, L., Douglas, A.: Bitcoin investigations: evolving methodologies and case studies. J. Forensic Res. 09, 03 (2018). https://doi.org/10.4172/2157-7145.1000420
Kuzuno, H., Tziakouris, G.: Ad-hoc analytical framework of bitcoin investigations for law enforcement. IEICE Trans. Inf. Syst. 101-D(11), 2644–2657 (2018). https://doi.org/10.1587/transinf.2017ICP0007
Perlman, L.: Distributed Ledger Technologies and Financial Inclusion. https://itu.int/en/ITU-T/focusgroups/dfs/Documents/201703/ITU_FGDFS_Report-on-DLT-and-Financial-Inclusion.pdf (2017)
Moubarak, J., Filiol, E., Chamoun, M.: On blockchain security and relevant attacks. In: 2018 IEEE Middle East and North Africa Communications Conference. MENACOMM, vol. 2018, pp. 1–6 (2018). https://doi.org/10.1109/MENACOMM.2018.8371010
Atzei, N., Bartoletti, M., Cimoli, T.: A survey of attacks on ethereum smart contracts. 30(8), 28–30 (1965)
Kethineni, S., Cao, Y.: The rise in popularity of cryptocurrency and associated criminal activity. International Criminal Justice Review, pp. 1–20 (2019). https://doi.org/10.1177/1057567719827051
Kumar, A., Fischer, C., Tople, S., Saxena, P.: A traceability analysis of monero’s blockchain. In: Foley, S.N., Gollmann, D., Snekkenes, E. (eds.) ESORICS 2017. LNCS, vol. 10493, pp. 153–173. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-66399-9_9
Ebert, J.F., Huibers, L., Christensen, B., Christensen, M.B.: Paper-or web-based questionnaire invitations as a method for data collection: cross-sectional comparative study of differences in response rate, completeness of data, and financial cost. J. Med. Internet Res. 20(1), e24 (2018). https://doi.org/10.2196/jmir.8353
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Taylor, S.K., M. Omar, M.S., Noorashid, N., Ariffin, A., Ariffin, K.A.Z., Abdullah, S.N.H.S. (2021). People, Process and Technology for Cryptocurrencies Forensics: A Malaysia Case Study. In: Anbar, M., Abdullah, N., Manickam, S. (eds) Advances in Cyber Security. ACeS 2020. Communications in Computer and Information Science, vol 1347. Springer, Singapore. https://doi.org/10.1007/978-981-33-6835-4_20
Download citation
DOI: https://doi.org/10.1007/978-981-33-6835-4_20
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-33-6834-7
Online ISBN: 978-981-33-6835-4
eBook Packages: Computer ScienceComputer Science (R0)