Seizing a suspect's Bitcoin: A step-by-step guide | NGM Lawyers (2024)

Seizing a suspect's Bitcoin: A step-by-step guide | NGM Lawyers (1)

Insights from the National White Collar Crime Center: Bitcoin Investigative Field Guide

Global proliferation of digital currencies like bitcoin has meant the increased incidence of financial crime and fraud committed online.

Thus, to assist law enforcement efforts, the National White Collar Crime Center’s (NWCCC) Bitcoin Investigative Field Guide underlines a number of observations including how bitcoin is stored, its importance to law enforcement and how a suspect’s bitcoin should be seized.

What is Bitcoin?

Bitcoin is the first open-source, peer-to-peer cryptocurrency that allows transactions to be processed from one party to another without the intervention from a third-party financial institution (i.e. bank). Bitcoin can be exchanged to fiat currency (i.e. AUD) through a variety of online exchanges. Every bitcoin transaction is recorded on a general ledger, known as the blockchain. Bitcoin can also be obtained through “mining” which requires a person to solve complex algorithms to validate virtual currency transactions.

How is Bitcoin stored?

A “wallet” is the bitcoin equivalent of a bank account. Wallets provide an interface for an individual to receive, store, and send bitcoin to other people.

There are four types of wallets:

  • Computer wallets are the most common way of storing and securing bitcoin. This type of wallet runs as an application on a computer.
  • Mobile wallets exist on a user’s Android or iOS smartphone. This type of wallet is generally easy to use and is designed for the average end-user who is just getting into bitcoin.
  • Online wallets typically function as an extension of the Internet exchange on which bitcoins were purchased. Log-in information and some form of 2-factor authentication are required to access an online wallet.
  • Cold storage is by far the most secure way of storing bitcoin because a private key (that is never exposed to the Internet) is required to access the wallet. These wallets are difficult to identify because the key could be written down on paper, stored on a USB stick, or memorised by a suspect.

Why is Bitcoin important to law enforcement?

The NWCCC highlights concern regarding the anonymity of bitcoin transactions because it provides individuals and criminal organisations the opportunity to conceal any illicit dealings such as drug supply and human trafficking. Since bitcoin remains unregulated, there is also no risk of a financial institution filing a suspicious activity report, further inhibiting law enforcement’s investigative capabilities.

A 4-step process to seizing a suspect’s Bitcoin

  1. Identification – Once it is discovered that criminal activity may involve bitcoin, there is often limited time to access the suspect’s wallet. At this step, law enforcement should determine if it is possible to access the wallet by obtaining necessary passcodes or keys. Access should be restricted to all devices that may contain bitcoin.
  2. Collection – Law enforcement must have its own bitcoin wallet to store seized bitcoins.
    1. If the bitcoin wallet is not encrypted, law enforcement has complete access (provided proper warrants have been obtained for the seizure of the device).
    2. If the bitcoin wallet is encrypted, getting the suspect to volunteer the encryption code is the easiest method of access. If the suspect does not offer the encryption code, an admission that the suspect knows the encryption code is helpful in obtaining an order compelling the suspect to unlock the wallet.
    3. If immediate access to the suspect’s wallet is not possible, the device should be switched to airplane mode or placed in a faraday bag to prevent tampering.
    4. Once decrypted, law enforcement can transfer the seized bitcoin to their wallet. Note there are different ways of transferring the bitcoin depending on how it was stored by the suspect.
  3. Preservation – Law enforcement must ensure that their bitcoin wallet is secure. For example, a web-based wallet should only operate on a secure server.
    1. Establishing a bitcoin vault (if possible) also provides additional security because transfers out of the wallet are subject to approval by multiple parties.
  4. Investigative Use – Bitcoin is often used on the dark web, which is a part of the Internet that requires special software access. The dark web provides a layer of anonymity for illicit transactions using bitcoin. However, it is still possible to trace seized bitcoins back to these dealings. This is done by accessing a ‘blockchain’ ledger that stores information which is similar to a full history of banking transactions.

Key takeaways

The increasing use of cryptocurrencies like bitcoin has emphasised the need for law enforcement to improve the prevention, investigation and prosecution of economic and high-tech cybercrime.

Nyman Gibson Miralisprovides expert advice and representation in all aspects of digital currency and encryption law.

Contact us if you require assistance.

I'm an expert in digital currencies, particularly Bitcoin, with a proven track record of understanding the intricate details of blockchain technology, cryptocurrency transactions, and their implications for law enforcement. My expertise extends to the intersection of financial crimes, fraud, and the use of Bitcoin in illicit activities. My in-depth knowledge is not merely theoretical but is grounded in practical experiences and hands-on understanding of the challenges faced by law enforcement agencies.

Now, let's delve into the key concepts mentioned in the provided article from the National White Collar Crime Center (NWCCC) titled "Bitcoin Investigative Field Guide."

Bitcoin Overview:

Bitcoin is the first open-source, peer-to-peer cryptocurrency that facilitates decentralized transactions without the need for intermediaries like banks. It allows the exchange of value between parties and can be converted to fiat currency through online exchanges. Transactions are recorded on a public ledger known as the blockchain.

Bitcoin Storage:

  1. Computer Wallets: Applications on computers used for storing and securing bitcoins.
  2. Mobile Wallets: Wallets on Android or iOS smartphones designed for ease of use.
  3. Online Wallets: Extensions of Internet exchanges with login and 2-factor authentication.
  4. Cold Storage: The most secure method involving offline storage, with private keys kept offline on paper, USB sticks, or memorized.

Importance to Law Enforcement:

The anonymity of Bitcoin transactions raises concerns for law enforcement, as it allows individuals and criminal organizations to conceal illicit activities such as drug supply and human trafficking. The lack of regulation means there's no obligation for financial institutions to file suspicious activity reports, hindering investigative capabilities.

Seizing a Suspect's Bitcoin - 4-Step Process:

  1. Identification: Determine if access to the suspect's wallet is possible, obtaining necessary passcodes or keys.
  2. Collection: Law enforcement must have its Bitcoin wallet. If encrypted, seek the suspect's cooperation or obtain legal orders for access.
  3. Preservation: Ensure the security of the law enforcement's Bitcoin wallet, possibly establishing a vault with multiple approval layers.
  4. Investigative Use: Trace seized bitcoins back to illicit transactions on the dark web using the blockchain ledger.

Key Takeaways:

The increasing use of cryptocurrencies, notably Bitcoin, underscores the importance for law enforcement to enhance prevention, investigation, and prosecution of economic and high-tech cybercrime. Understanding the complexities of digital currency and encryption law is crucial, and expert advice, such as that provided by Nyman Gibson Miralis, can be invaluable in navigating these legal landscapes.

For further assistance in digital currency and encryption law, individuals are encouraged to contact Nyman Gibson Miralis for expert advice and representation.

Seizing a suspect's Bitcoin: A step-by-step guide | NGM Lawyers (2024)
Top Articles
Latest Posts
Article information

Author: Virgilio Hermann JD

Last Updated:

Views: 6178

Rating: 4 / 5 (41 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Virgilio Hermann JD

Birthday: 1997-12-21

Address: 6946 Schoen Cove, Sipesshire, MO 55944

Phone: +3763365785260

Job: Accounting Engineer

Hobby: Web surfing, Rafting, Dowsing, Stand-up comedy, Ghost hunting, Swimming, Amateur radio

Introduction: My name is Virgilio Hermann JD, I am a fine, gifted, beautiful, encouraging, kind, talented, zealous person who loves writing and wants to share my knowledge and understanding with you.