Nothing Special   »   [go: up one dir, main page]

Skip to main content

People, Process and Technology for Cryptocurrencies Forensics: A Malaysia Case Study

  • Conference paper
  • First Online:
Advances in Cyber Security (ACeS 2020)

Abstract

Crimes related to cryptocurrencies are on the rise. In Malaysia, reported losses is increasing from USD2.67 million in 2017 to USD55.32 million in 2018. This raise a concern whether the current process, tools and trainings are sufficient for Malaysian investigators to conduct cryptocurrencies forensics. A survey questionnaire was conducted to answer four questions; is the current (i)process model (ii)tools, and (iii)trainings sufficient? Lastly (iv)is there a relationship between work experience years and the needs for process model, tools and trainings? The result shows respondents (i) agreed that process model is insufficient; (ii) neutral on the sufficiency of tool, however, they suggested a tool to collect suspected cryptowallets information, cryptowallets triage tool; and automated cryptocurrencies transfer tool; (iii) agreed that training program is insufficient, and lastly (iv) regardless of years of experience, investigators do need a process model, tools and trainings to conduct work. Surprisingly these findings echoed with worldwide view. The study highlights the need for a cryptocurrencies forensics process model, tools and trainings program in place.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Nakamoto, S.N.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008)

    Google Scholar 

  2. Dewey, J. (ed.): Blockchain & Cryptocurrency Regulation, 1st edn. Global Legal Group Ltd, London (2019)

    Google Scholar 

  3. Peters, G.W., Panayi, E., Chapelle, A.: Trends in crypto-currencies and blockchain technologies: a monetary theory and regulation perspective. J. Financ. Perspect. FinTech vol. 3, no. 3 (2015). https://doi.org/10.2139/ssrn.2646618

  4. Westerlund, M., Neovius, M., Pulkkis, G.: Providing tamper-resistant audit trails for cloud forensics with distributed ledger based solutions. Int. J. Adv. Secur. 11(3), 288–300 (2018)

    Google Scholar 

  5. Reddy, E.: Analysing the investigation and prosecution of cryptocurrency crime as provided for by the south african cybercrimes bill. Statut. Law Rev. 41(2), 226–239 (2019). https://doi.org/10.1093/slr/hmz001

  6. He, S., et al.: A social-network-based cryptocurrency wallet-management scheme. IEEE Access 6, 7654–7663 (2018). https://doi.org/10.1109/ACCESS.2018.2799385

    Article  Google Scholar 

  7. Harlev, M.A., Sun Yin, H., Langenheldt, K.C., Mukkamala, R., Vatrapu, R.: Breaking bad: de-anonymising entity types on the bitcoin blockchain using supervised machine learning. In: Proceedings of the 51st Hawaii International Conference on System Sciences, vol. 9, pp. 3497–3506 (2018). https://doi.org/10.24251/hicss.2018.443

  8. Brown, S.D.: Cryptocurrency and criminality. Police J. Theor. Pract. Princ. 89(4), 327–339 (2016). https://doi.org/10.1177/0032258x16658927

  9. Grinberg, R.: Bitcoin: an innovative alternative digital currency. Hast. Sci. Technol. Law J. 4, 1–44 (2011)

    Google Scholar 

  10. Wai, A., Cheung, K., Roca, E., Su, J.J.: Crypto-currency bubbles: an application of the Phillips-Shi-Yu (2013) methodology on Mt. Gox bitcoin prices. J. Appl. Econ. 47(23), 2348–2358 (2015). https://doi.org/10.1080/00036846.2015.1005827

  11. Risks and Threats of Cryptocurrencies. Homeland Security Enterprise, p. 196 (2014)

    Google Scholar 

  12. Iwamura, M., Kitamura, Y., Matsumoto, T.: Is Bitcoin the Only Cryptocurrency in the Town?. Economics of Cryptocurrency And Friedrich A, Hayek (2014)

    Google Scholar 

  13. Jones, C.: Digital currencies and organised crime update. Financial Regulation International (2018)

    Google Scholar 

  14. Sigler, K.: Crypto-jacking: how cyber-criminals are exploiting the crypto-currency boom. Comput. Fraud. Secur. 2018(9), 12–14 (2018). https://doi.org/10.1016/S1361-3723(18)30086-1

    Article  Google Scholar 

  15. Feder, A., Gandal, N., Hamrick, J.T., Moore, T.: The impact of DDoS and other security shocks on Bitcoin currency exchanges: Evidence from Mt. Gox. J. Cybersecurity 3(2), 137–144 (2017). https://doi.org/10.1093/cybsec/tyx012

    Article  Google Scholar 

  16. Kethineni, S., Cao, Y.: The rise in popularity of cryptocurrency and associated criminal activity. Int. Crim. Justice Rev. 30(3), 1–20 (2019). https://doi.org/10.1177/1057567719827051

  17. Bitcoin price index | Real-time Bitcoin price charts | Luno. [Online]. https://www.luno.com/trade/XBTMYR. Accessed 18 Oct 2019

  18. Notice to Members of the Public List of Reporting Institutions Dealing With Digital Currencies Declared to Bank Negara Malaysia (2019)

    Google Scholar 

  19. Capital Markets and Services (Prescription of Securities) (Digital Currency and Digital Token) Order 2019. Securities Commission Malaysia (2019)

    Google Scholar 

  20. Guidelines on Digital Assets. Securities Commission Malaysia (2020)

    Google Scholar 

  21. Anti-Money Laundering and Counter Financing of Terrorism ( AML / CFT ) - Digital Currencies ( Sector 6), no. Sector 6. Central Bank of Malaysia (2018)

    Google Scholar 

  22. Taklimat dan Penyelarasan Ancaman Cryptojacking. Commercial Crime Division, Royal Malaysian Police Force (2019)

    Google Scholar 

  23. Khatri, Y.: Malaysian electricity utility raids premises of 33 bitcoin miners accused of stealing \$760,000 in power. The Block, 2019. [Online]. https://www.theblockcrypto.com/linked/35188/malaysian-electricity-utility-raids-33-bitcoin-mining-premises-as-it-loses-760k. Accessed 18 Oct 2019

  24. Saufi, N.M.: Laporan Tahunan Kumpulan Kerja Forensik Digital 2019 (2020)

    Google Scholar 

  25. Palmer, G.: A road map for digital forensic research. In: Proceedings of the Digital Forensic Research Conference DFRWS 2001 USA, pp. iii–42 (2001)

    Google Scholar 

  26. Taylor, S.K., Talib, M.Z.A.: Standard Operating Procedure of Digital Evidence Collection (2013)

    Google Scholar 

  27. Pallant, J.: SPSS Survival Manual - A Step by Step Guide to Data Analysis using SPSS for Windows, no. Version 10. Buckingham Open University Press, Maidenhead (2001)

    Google Scholar 

  28. Fincham, J.E.: Response rates and responsiveness for surveys, standards, and the Journal. Am. J. Pharm. Educ. 72(2), 43 (2008). https://doi.org/10.5688/aj720243

    Article  Google Scholar 

  29. Van Der Horst, L., Choo, K.K.R., Le-Khac, N.A.: Process memory investigation of the bitcoin clients electrum and bitcoin core. IEEE Access 5, 22385–22398 (2017). https://doi.org/10.1109/ACCESS.2017.2759766

  30. Volety, T., Saini, S., McGhin, T., Liu, C.Z., Choo, K.K.R.: Cracking Bitcoin wallets: i want what you have in the wallets. Futur. Gener. Comput. Syst. 91, 136–143 (2019). https://doi.org/10.1016/j.future.2018.08.029

    Article  Google Scholar 

  31. Zollner, S., Choo, K.-K.R., Le-Khac, N.-A.: An automated live forensic and postmortem analysis tool for bitcoin on windows systems. IEEE Access 7, 158250–158263 (2019). https://doi.org/10.1109/access.2019.2948774

  32. Ali, S.S., ElAshmawy, A., Shosha, A.F.: Memory forensics methodology for investigating cryptocurrency protocols. In: Proceedings of the International Conference on Security and Management (SAM), pp. 153–159 (2018)

    Google Scholar 

  33. Irwin, A.S.M., Turner, A.B.: Illicit Bitcoin transactions: challenges in getting to the who, what, when and where. J. Money Laund. Control 21(3), 297–313 (2018). https://doi.org/10.1108/JMLC-07-2017-0031

    Article  Google Scholar 

  34. Bitcoin and Cryptocurrencies Law Enforcement Investigative Guide (Special Research Report) (2018)

    Google Scholar 

  35. Damshenas, M., Dehghantanha, A., Mahmoud, R.: A survey on digital forensics trends. Int. J. Cyber-Secur. Digit. Forensics 3(4), 209–234 (2014)

    Google Scholar 

  36. Brown, C.S.D.: Investigating and prosecuting cyber crime: forensic dependencies and barriers to justice. Int. J. Cyber Criminol. 9(1), 55–119 (2015). https://doi.org/10.5281/zenodo.22387

    Article  Google Scholar 

  37. Tziakouris, G.: Cryptocurrencies - a forensic challenge or opportunity for law enforcement? An INTERPOL perspective. IEEE Secur. Priv. 16(4), 92–94 (2018). https://doi.org/10.1109/MSP.2018.3111243

    Article  Google Scholar 

  38. Elyas, M., Ahmad, A., Maynard, S.B., Lonie, A.: Digital forensic readiness: expert perspectives on a theoretical framework. Comput. Secur. 52, 70–89 (2015). https://doi.org/10.1016/j.cose.2015.04.003

    Article  Google Scholar 

  39. ACPO Good Practice Guide for Digital Evidence. Association of Chief Police Officers of England, Wales & Northern Ireland, vol. 5 (2012)

    Google Scholar 

  40. ISO/IEC 27037 : 2012 Guidelines for identification, collection, acquisition and preservation of digital evidence. International Organization Standards (2012)

    Google Scholar 

  41. Fröwis, M., Gottschalk, T., Haslhofer, B., Rückert, C., Pesch, P.: Safeguarding the Evidential Value of Forensic Cryptocurrency Investigations, Arxiv, pp. 1–23 (2019)

    Google Scholar 

  42. Andrew, L., Douglas, A.: Bitcoin investigations: evolving methodologies and case studies. J. Forensic Res. 09, 03 (2018). https://doi.org/10.4172/2157-7145.1000420

  43. Kuzuno, H., Tziakouris, G.: Ad-hoc analytical framework of bitcoin investigations for law enforcement. IEICE Trans. Inf. Syst. 101-D(11), 2644–2657 (2018). https://doi.org/10.1587/transinf.2017ICP0007

  44. Perlman, L.: Distributed Ledger Technologies and Financial Inclusion. https://itu.int/en/ITU-T/focusgroups/dfs/Documents/201703/ITU_FGDFS_Report-on-DLT-and-Financial-Inclusion.pdf (2017)

  45. Moubarak, J., Filiol, E., Chamoun, M.: On blockchain security and relevant attacks. In: 2018 IEEE Middle East and North Africa Communications Conference. MENACOMM, vol. 2018, pp. 1–6 (2018). https://doi.org/10.1109/MENACOMM.2018.8371010

  46. Atzei, N., Bartoletti, M., Cimoli, T.: A survey of attacks on ethereum smart contracts. 30(8), 28–30 (1965)

    Google Scholar 

  47. Kethineni, S., Cao, Y.: The rise in popularity of cryptocurrency and associated criminal activity. International Criminal Justice Review, pp. 1–20 (2019). https://doi.org/10.1177/1057567719827051

  48. Kumar, A., Fischer, C., Tople, S., Saxena, P.: A traceability analysis of monero’s blockchain. In: Foley, S.N., Gollmann, D., Snekkenes, E. (eds.) ESORICS 2017. LNCS, vol. 10493, pp. 153–173. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-66399-9_9

    Chapter  Google Scholar 

  49. Ebert, J.F., Huibers, L., Christensen, B., Christensen, M.B.: Paper-or web-based questionnaire invitations as a method for data collection: cross-sectional comparative study of differences in response rate, completeness of data, and financial cost. J. Med. Internet Res. 20(1), e24 (2018). https://doi.org/10.2196/jmir.8353

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sarah K. Taylor .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Taylor, S.K., M. Omar, M.S., Noorashid, N., Ariffin, A., Ariffin, K.A.Z., Abdullah, S.N.H.S. (2021). People, Process and Technology for Cryptocurrencies Forensics: A Malaysia Case Study. In: Anbar, M., Abdullah, N., Manickam, S. (eds) Advances in Cyber Security. ACeS 2020. Communications in Computer and Information Science, vol 1347. Springer, Singapore. https://doi.org/10.1007/978-981-33-6835-4_20

Download citation

  • DOI: https://doi.org/10.1007/978-981-33-6835-4_20

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-33-6834-7

  • Online ISBN: 978-981-33-6835-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics