Internet Explorer 11 is not supported

For optimal browsing, we recommend Chrome, Firefox or Safari browsers.

Cryptocurrency Trackers Could Give Cops Jump on Cybercrime

New investigative tools may help average law enforcement agencies more effectively track criminal activity made profitable through cryptocurrency. This includes ransomware schemes and other popular hacks.

Digital intelligence vendor Cellebrite recently launched its new crypto tracer solution, a tool to help state and local police more effectively investigate cybercrime.

The company says its product will give law enforcement agencies the ability to better track illicit cryptocurrency transactions, the kind that are ubiquitous amongst ransomware hackers and other cybercriminals.   

The tool is powered by crypto intelligence vendor CipherTrace Inspector and is designed to give investigators visibility into the "lifespan of cryptocurrency transactions," essentially mapping where the money went and how it changed hands through curation of large amounts of data points from both open and private sources. 

"The solution empowers teams to lawfully obtain evidence and trace criminals who use bitcoin and other cryptocurrencies for illicit activities, including money laundering, terrorism, drug and human trafficking, weapon sales and ransomware schemes," the company explained in a statement. 

A source with some 20 years experience as a federal law enforcement official focused on digital investigations said that criminal activity involving cryptocurrency has escalated immensely during a very short period of time.

"Crypto has been around since about 2009 but it didn't really come into play as a major part of financial crimes until around 2011," the agent said. "Since that time, it has almost become a currency fiat to the criminal element. We see it in money laundering schemes, mortgage fraud, human trafficking and ransomware."

Seeing as ransomware attacks against public agencies reached new heights last year, the dark side of cryptocurrency is well known to government leaders. 

Successful prosecution of ransomware hackers remains a rare occurrence. Computer Crime units within state police agencies will typically collaborate with the FBI and other federal authorities to investigate how ransomware attacks occurred, though even in the most high-profile incidents from recent years — say, Baltimore, for example — no arrests have typically been made.

While blockchain is open source, it is also pseudonymous, meaning the identities of its participants are hidden. Even when attribution is possible, and it usually isn't, locating a cybercriminal can also be extremely difficult and involve jurisdictional challenges given that a hacker may be located in another country.

Still, Cellebrite's solution seems to have made some promising advances in this area, too. In certain cases, the tool is able to identify the geographic address of a crypto-criminal's Virtual Asset Service Provider (VASP), the forum through which cryptocurrency can be translated into actual cash. 

“The most valuable information that we can get on the hacker is the transaction ID and name of VASP where the hacker is trying to convert their ill-gotten cryptocurrency into fiat. Sometimes we get their IP address,” said John Jefferies, chief financial analyst at CipherTrace. 

Government Technology is a sister site to Governing. Both are divisions of e.Republic.

Government Technology is Governing's sister e.Republic publication, offering in-depth coverage of IT case studies, emerging technologies and the implications of digital technology on the policies and management of public sector organizations.
Special Projects
Sponsored Stories
In this episode, Marianne Steger explains why health care for Pre-Medicare retirees and active employees just got easier.
Government organizations around the world are experiencing the consequences of plagiarism firsthand. A simple mistake can lead to loss of reputation, loss of trust and even lawsuits. It’s important to avoid plagiarism at all costs, and government organizations are held to a particularly high standard. Fortunately, technological solutions such as iThenticate allow government organizations to avoid instances of text plagiarism in an efficient manner.
Creating meaningful citizen experiences in a post-COVID world requires embracing digital initiatives like secure and ethical data sharing, artificial intelligence and more.
GHD identified four themes critical for municipalities to address to reach net-zero by 2050. Will you be ready?
As more state and local jurisdictions have placed a priority on creating sustainable and resilient communities, many have set strong targets to reduce the energy use and greenhouse gases (GHGs) associated with commercial and residential buildings.
As more people get vaccinated and states begin to roll back some of the restrictions put in place due to the COVID-19 pandemic — schools, agencies and workplaces are working on a plan on how to safely return to normal.
The solutions will be a permanent part of government even after the pandemic is over.
See simple ways agencies can improve the citizen engagement experience and make online work environments safer without busting the budget.
Whether your agency is already a well-oiled DevOps machine, or whether you’re just in the beginning stages of adopting a new software development methodology, one thing is certain: The security of your product is a top-of-mind concern.