$31,600,000 in Cash and Crypto Seized in International Anti-Drug Trafficking Operation

An international effort from law enforcement targeting darknet narcotic vendors has resulted in more than $31 million worth of cash and crypto being seized from alleged criminals.

According to an announcement from the Department Of Justice (DOJ), Operation Dark HunTor, a joint effort between three continents to disrupt darknet opioid traffickers, saw the arrest of over 150 people.

 

“Operation Dark HunTor resulted in the seizure of over $31.6 million in both cash and virtual currencies; approximately 234 kilograms (kg) of drugs worldwide including 152.1 kg of amphetamine, 21.6 kg of cocaine, 26.9 kg of opioids, 32.5 kg of MDMA, in addition to more than 200,000 ecstasy, fentanyl, oxycodone, hydrocodone, and methamphetamine pills, and counterfeit medicine ; and 45 firearms.”

The investigation, which lasted 10 months with some components still ongoing, saw arrests in the United States, the Netherlands, Bulgaria, France, Germany, the United Kingdom, Italy and Switzerland.

The DOJ’s statement lists the Money Laundering and Asset Recovery Section’s Digital Currency Initiative as one of the partners in the investigation.

Jim Lee, Chief of the Internal Revenue Service Criminal Investigation unit (IRS-CI), said that law enforcement agencies are gaining more expertise in tracking crimes facilitated with digital currencies.

“The Darknet no longer provides a concealing cloak for criminals to operate… The expertise of our agents and law enforcement partners helped uncover significant quantities of narcotics and money – both cash and virtual currency – derived from illicit means.”

Don’t Miss a Beat – Subscribe to get crypto email alerts delivered directly to your inbox

Follow us on Twitter, Facebook and Telegram

Surf The Daily Hodl Mix

 

 

Disclaimer: Opinions expressed at The Daily Hodl are not investment advice. Investors should do their due diligence before making any high-risk investments in Bitcoin, cryptocurrency or digital assets. Please be advised that your transfers and trades are at your own risk, and any loses you may incur are your responsibility. The Daily Hodl does not recommend the buying or selling of any cryptocurrencies or digital assets, nor is The Daily Hodl an investment advisor. Please note that The Daily Hodl participates in affiliate marketing.

Featured Image: Shutterstock/Photo Spirit

Source

Tagged : / / / / /

Eastern European victims sent $815M to Ponzis and scams in the past year

Recent research has revealed that Eastern Europe remains a very high source of cybercrime activity — both from victims to scams, and from users to darknet markets — in the cryptocurrency sector.

Cryptocurrency addresses based in the Eastern European region have the second-highest exposure to illicit activity after Africa, according to a report published on Sept. 1 by blockchain research firm Chainalysis. However Eastern Europe has a much larger overall crypto economy than both Africa and Latin America (which came in third.) The findings echo research carried out last year.

The research analyzed the illicit share of cryptocurrency activity by region between July 2020, and June 2021. It revealed that Eastern Europe-based crypto addresses and wallets sent $815 million to scams and Ponzi schemes over the period.

“As is the case with all regions, scams make up the biggest share of funds sent from Eastern Europe to illicit addresses — we can assume that most of this activity represents victims sending money to scammers.”

Chainalysis observed that more cryptocurrency is sent to darknet markets in Eastern Europe than other regions. There is a thriving Russian language darknet market called Hydra which, it claims, is the world’s largest.

Drilling down into geographic breakdown by country, the research found that Ukraine was by far the top nation in the region with more internet traffic to scam websites than any other country.

One particular scam accounted for more than half of the value sent in the region. Finiko, a Russia-based Ponzi scheme that collapsed in July 2021, promised huge returns and launched its own token, FNK.

According to the report, the Finiko scheme received more than $1.5 billion in BTC in over 800,000 separate deposits between December 2019 and August 2021.

Related: Australians lost over $25 million to bogus crypto investments

Addresses in Eastern Europe have also been associated with ransomware, with $46 million being sent to suspect wallets in the region. The analytics firm attributed a lot of this to Russian hacker groups, stating “many of the most prolific ransomware strains are associated with cybercriminal groups either based in or affiliated with Russia,” using Evil Corp as an example.

A year ago, Cointelegraph reported that Evil Corp demanded a $10 million crypto ransom to restore access to Garmin’s navigation solutions after its network was compromised.

Source

Tagged : / / / / / / /

$6,000,000 in Crypto Seized by Australian Police

Police in the Australian state of Victoria seized more than $8.5 million AUD ($6 million USD) worth of crypto as part of an investigation into online drug trafficking.

The total sum is the largest cryptocurrency seizure ever in Australia, according to a report from the Victoria Police.

ADVERTISEMENT

 

Law enforcement arrested two men and a woman related to the investigation, and also seized two properties, two vehicles and a variety of drugs. The total value of the seized assets is believed to be about $13.1 million AUD ($9.34 million USD).

The arrests and seizures are in connection with a nearly decade-long investigation into drug trafficking on a dark web platform. The investigation is spearheaded by Victoria’s Cyber Crime Squad and Criminal Proceeds Squad.

Commander Mick Frewen of the Victoria Police Crime Command says the investigation demonstrates the importance of adapting to crimes involving modern technology.

“This is a remarkable result and one that highlights the modern nature of serious and organized crime.

This is the 21st-century version of drug trafficking and money laundering, with criminals using technology to enable immense amounts of community harm and misery.

Police actively work on these forums and receive information from a wide range of sources including our Australian and international law enforcement partners.”

Don’t Miss a Beat – Subscribe to get crypto email alerts delivered directly to your inbox

Follow us on Twitter, Facebook and Telegram

Surf The Daily Hodl Mix

ADVERTISEMENT

 

Disclaimer: Opinions expressed at The Daily Hodl are not investment advice. Investors should do their due diligence before making any high-risk investments in Bitcoin, cryptocurrency or digital assets. Please be advised that your transfers and trades are at your own risk, and any loses you may incur are your responsibility. The Daily Hodl does not recommend the buying or selling of any cryptocurrencies or digital assets, nor is The Daily Hodl an investment advisor. Please note that The Daily Hodl participates in affiliate marketing.

Featured Image: Shutterstock/Liu zishan

Source

Tagged : / / / / / / /

Digital intelligence must overcome challenges to solving crypto crimes

While the value of cryptocurrencies has varied wildly in the last year, this has not diminished crypto’s attractiveness to criminals. Many of them are moving their illegal activities underground and outside the view of law enforcement. Because of the public nature of most blockchains, however, this rapid movement shouldn’t be a major concern to law enforcement agencies. With the right tools and training, following the proceeds of crypto-enabled crime is actually not as difficult as it may seem.

However, intelligence agencies must have a cryptocurrency investigation plan that includes the right tools to lawfully collect digital evidence and the properly trained personnel to investigate these types of crimes when they arise.

Digital intelligence (DI) is a two-part definition — the data collected from digital sources and data types (think smartphones, computers and the cloud), and the manner in which agencies access, manage and obtain insights from that data to effectively run investigations. For law enforcement to investigate crypto-related security incidents, it must be equipped with the proper tools and expertise to drive these investigations forward. When investigators know what they’re looking for, and are equipped with the right tools and expertise to analyze and follow those leads, crypto starts to look less like an “invisible” web and more like the DI operations that investigative teams are used to.

Related: Declaring a crackdown? What to make of the DoJ crypto framework release

According to a report on cryptocurrency enforcement by the United States Attorney General’s Cyber-Digital Task Force within the Department of Justice, crypto-based crimes fall into three categories:

1. Using cryptocurrency as proceeds of crimes

Bitcoin (BTC) was pushed into the global media because of a series of high-profile, international criminal cases linked to the darknet in 2013. At that time, Bitcoin was the only form of currency on the dark web. After several successful government seizures, anti-regulatory computer developers created Monero (XMR), Dash, Zcash (ZEC) and other privacy coins designed to obfuscate the public ledger, which makes it difficult for law enforcement to track and seize assets.

Related: Darknet, cryptocurrency and two intersecting health crises

Legitimate businesses typically do not use the darknet to sell goods and services, but that does not mean legitimate goods are not offered on the darknet. Stolen goods, counterfeit products and copied software with stolen activation keys are easily found with steep discounts.

Businesses also face the risk of information theft. Selling bank accounts, employee records, customer records and proprietary information is one of the most lucrative ways criminals make money on the darknet. In 2019, cryptocurrency intelligence firm CipherTrace found that 66% of the products and services offered by darknet vendors throughout the year stemmed from the stolen payment products of compromised financial institutions.

Related: Privacy-preserving computation on blockchains could prevent breaches

The easiest and fastest way to find these criminals is through advanced crypto trackers and analytics programs.

2. Money laundering and hiding financial activity

When criminals make money through unlawful activities like drug sales, fraud, weapons trafficking or human trafficking, they need a way to convert the illicit funds to make them appear legitimate. This process is called “money laundering.”

Because of its ease of use and pseudo-anonymity, crypto-money laundering is quickly becoming a significant method for moving and laundering money. Within a few minutes, cryptocurrency can be transferred transnationally, converted into any other cryptocurrency or traded for real assets.

Related: The United States updates its crypto AML/CFT laws

3. Crypto on crypto crime

Some crypto criminals choose to focus their efforts on cryptocurrency users and exchanges.

In 2018, three North Korean military hackers — who were indicted in February 2021 — successfully stole and extorted more than $1.3 billion of fiat and cryptocurrency from financial institutions and companies. As Assistant Attorney General John Demers said:

“North Korea’s operatives, using keyboards rather than masks and guns, are the world’s leading 21st-century nation-state bank robbers.”

Related: North Korean crypto hacking: Separating fact from fiction

In 2020, around $1.5 billion was lost because of fraud and misappropriation, according to CipherTrace’s “2020 Cryptocurrency Crime and Anti-Money Laundering Report.” DeFi-related crime only continues to rise quarter over quarter.

These types of investigations pose many challenges for both the government and private businesses. The technology behind the cryptocurrency system is complex and rapidly evolving. Not surprisingly, police agencies are struggling just to keep up with the latest security patches and required hardware to successfully solve cases.

Clearly, the use of cryptocurrency is not a passing trend, as interest in crypto has dramatically increased. Law enforcement may be tracking certain crypto wallets or addresses, which can result in pinpointing a suspect behind the transactions. New developments in digital intelligence give the investigative teams the ability to visualize transactions and follow virtual paper trails that can uncover evidence about individuals who commit crimes.

Related: Bitcoin can’t be viewed as an untraceable ‘crime coin’ anymore

Training and education is the key

One of the first obstacles for law enforcement in dealing with crypto is perception. Cryptocurrency is new and evolving, so people perceive it as complicated, which means that training and education are critical. Investigators and agencies must have the necessary skills to optimize practices and techniques, but it may be difficult for police command staff to see the importance of cryptocurrency training because these types of investigations are new to law enforcement.

Related: How do DeFi protocols get hacked?

Agencies faced the same hurdle a decade ago when command staff did not feel cell phone investigations were important. Many teams were not investigating mobile devices because they lacked the tools and training necessary to do proper cell phone data analysis. Today, nearly every crime has some relation to a cell phone. In the near future, almost every financial crime will have some connection to cryptocurrency, as crypto is the inevitable future of money.

New investigative tools

The second tier consists of investigative tools. These are physical tools used to collect data from devices and software used to analyze the collected data. To create the best tools for crypto investigators, teams need solutions built around a comprehensive blockchain search engine tool that gathers massive amounts of data points to track cryptocurrency addresses through dark markets, exchanges and crypto ATMs.

New solutions entering the market give teams the ability to surface cryptocurrency artifacts to serve as “leads” to start a blockchain investigation.

Related: Outwitting crypto criminals: Why exchanges have to go the extra mile

Advancements in cryptocurrency technology have pushed experienced criminals underground where law enforcement involvement is virtually nonexistent, and the chances of being caught are minimal. Law enforcement should prepare now to create a complete end-to-end investigative solution focusing on knowledge, tools and services. Digital intelligence is key in breaking down what went wrong and preparing for the next incident, and it is imperative that all DI strategies have contingencies supported by world-class tools specifically designed for crypto.

With the growth in use and popularity of cryptocurrencies, agencies should also be working toward bringing their DI expertise in-house and recruiting savvy experts. It’s a two-part solution — agencies need both expertise and the right tools to properly respond to crypto-related incidents. These are the building blocks for a strong DI strategy. Crypto has been traced back to different crimes — from financial fraud to drug, wildlife and human trafficking — making it a fundamental part of DI investigations. And while becoming the new form of money, the technology behind cryptocurrency will help ease the investigative processes.

Addressing these new challenges requires the evolution of law enforcement tools, training and strategies built around DI and data analytics. The bottom line is that crypto is here to stay, and law enforcement agencies must take the necessary steps today to be ready for the rise in crypto crimes that is sure to become more widespread with the increasing popularity of cryptocurrencies. But crypto is just a tool for criminals, as money has always been. But it must become a tool for law enforcement agencies as well.

This article does not contain investment advice or recommendations. Every investment and trading move involves risk, and readers should conduct their own research when making a decision.

The views, thoughts and opinions expressed here are the author’s alone and do not necessarily reflect or represent the views and opinions of Cointelegraph.

Leeor Ben-Peretz is the chief strategy officer at Cellebrite, where he leads strategy and corporate business development functions. He brings over 20 years of experience in the forensic, telecom and software security markets, having served in key business development and product management-related positions at industry-leading companies such as Aladdin Knowledge Systems, Pelephone Communications, Comverse and InfoGin. Leeor holds an Executive MBA degree from the Hebrew University of Jerusalem and a B.A. in business and economics from the Academic College of Tel-Aviv.