Home > Business and Economics > Finance and accounting > Accounting > Management accounting, bookkeeping and auditing > Auditing / Audits > There's No Such Thing as Crypto Crime: An Investigative Handbook
37%
There's No Such Thing as Crypto Crime: An Investigative Handbook

There's No Such Thing as Crypto Crime: An Investigative Handbook

          
5
4
3
2
1

International Edition


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Quantity:
Add to Wishlist

About the Book

Hands-on guidance for professionals investigating crimes that include cryptocurrency In There’s No Such Thing as Crypto Crime: An Investigators Guide, accomplished cybersecurity and forensics consultant Nick Furneaux delivers an expert discussion of the key methods used by cryptocurrency investigators, including investigations on Bitcoin and Ethereum type blockchains. The book explores the criminal opportunities available to malicious actors in the crypto universe, as well as the investigative principles common to this realm. The author explains in detail a variety of essential topics, including how cryptocurrency is used in crime, exploiting wallets, and investigative methodologies for the primary chains, as well as digging into important areas such as tracing through contracts, coin-swaps, layer 2 chains and bridges. He also provides engaging and informative presentations of: Strategies used by investigators around the world to seize the fruits of crypto-related crime How non-fungible tokens, new alt-currency tokens, and decentralized finance factor into cryptocurrency crime The application of common investigative principles—like discovery—to the world of cryptocurrency An essential and effective playbook for combating crypto-related financial crime, There’s No Such Thing as Crypto Crime will earn a place in the libraries of financial investigators, fraud and forensics professionals, and cybercrime specialists.

Table of Contents:
Foreword xiii Introduction xvii 1 A History of Cryptocurrencies and Crime 1 Where Did It All Start? 3 The Rise of the Smart Contract 7 The Next Targets? 14 The Future? More Crime! 16 2 Understanding the Criminal Opportunities: Money Laundering 19 There Is No Such Thing as Crypto Crime 36 Money Laundering 40 What Is an Investigator Looking For? 42 Centralized Exchanges 43 NFTs and NFT Gaming 45 Mixers 48 Decentralized Exchanges 53 Casinos. 56 Chain Hopping 57 Privacy Coins 59 Crypto ATMs 62 Peer-to-Peer Platforms 64 3 Understanding the Criminal Opportunities: Theft 67 Crypto Thefts 67 Social Engineering 67 Phishing 68 Hacks 71 Fraud 73 Rug Pull 74 Pig-Butchering/Romance Scams 76 Investment Scams 79 Support Scams 83 Simple Theft 84 Contract Manipulation 86 Fake Contracts 86 Exploiting the Contract 87 Phishing 89 Flash Loans 90 Playing by the Rules 92 Other Criminal Opportunities 96 Yield Farming 96 Funding of Groups 97 Sanctions Avoidance 99 Summary 108 4 Who Should Be a Cryptocurrency Investigator? 109 Individual Skills 111 Knowledge of Technological Systems 111 Knowledge of Digital Currencies 112 Understanding of the Cryptocurrency Market 112 Extensive Knowledge of Computer Networks 113 Cryptography 114 Financial Crime 114 Fraud Investigators 114 Open Source Investigations 115 Cybercrime Investigations 116 Setting Up a Cryptocurrency Investigation Department 117 Other Roles. 123 5 The Role of Commercial Investigation Tools 125 Do You Need a Commercial Tool? 129 Two Is One and One Is None 133 The Future of Investigation Tools 135 6 Mining: The Key to Cryptocurrencies 139 What Really Is Mining? 141 Validating Transactions 141 Minting New Coins 142 Proof of Work (PoW) Mining 142 How PoW Mining Works 142 Energy Consumption and Environmental Concerns 145 Proof of Stake (PoS) Mining 146 How PoS Mining Works 146 Advantages of PoS Mining 146 Does an Investigator Need to Understand Mining Technologies? 146 Cryptocurrency Mining Frauds and Scams 147 Cloud Mining Scams 147 Ponzi and Pyramid Schemes 148 Malware and Cryptojacking 149 Asset Discovery 149 Will Cryptocurrencies Always Be Mined? 150 7 Cryptocurrency Wallets 153 When a Wallet Is Not Really a Wallet 155 Types of Cryptocurrency Wallets 156 Hot Wallets 157 Desktop Wallets. 157 Mobile Wallets 158 Web/Online Wallets 158 Cold Wallets 160 Hardware Wallets 160 Paper Wallets 161 Software Wallets: Functionality and Security 162 Functionality 163 Security 163 Hardware Wallets: Functionality and Security 164 Functionality 164 Security 164 Choosing the Right Wallet 165 Wallet Vulnerabilities 166 Weak or Reused Passwords 166 Phishing Attacks 166 Malware 167 On-Path Attacks 167 Vulnerable Wallet Software 168 Lack of Two-Factor Authentication (2FA) 168 Social Engineering 169 SIM-Swapping Attacks 169 Supply Chain Attacks 170 8 The Importance of Discovery 173 Premises Searching: Legal Framework and Search Powers 176 Search Strategies 177 Handling and Securing Evidence 177 Evidence Bags 178 Body Cameras 179 Photography 179 Chain of Custody 180 Physical Clues. 181 Hardware Wallets 181 Paper Wallets 183 QR Codes 186 Documentation 186 Questioning 188 General Understanding 188 Involvement and Knowledge of Cryptocurrencies 188 Specific Details of the Alleged Crime 189 Technical Details 189 Searching Digital Assets 190 Legal Framework and Warrants 192 Digital Forensics 194 Hardware Examination 198 Storage Devices 198 RAM Analysis 200 What are you looking for? 202 Handling and Securing Digital Evidence 204 The Role of Exchanges 204 Senior Officers/Management 206 Summary 206 9 The Workings of Bitcoin and Derivatives 209 Bitcoin Is a Blockchain-Based UTXO Cryptocurrency 210 UTXO 211 What Does an Transaction Look Like? 215 How Does a UTXO Blockchain Help an Investigator? 220 Blockchain Explorers 222 What Else Can You Learn in a Transaction? 226 Times and Dates 227 Values 229 Omni Layer 231 Taproot 232 The Lightning Network 235 Summary 237 10 Bitcoin: Investigation Methodology 239 Building an Investigation in Bitcoin 251 Address Clustering 253 How Are Clusters Defined? 255 Co-spend Heuristic 255 Change Analysis 256 Nominal Spend 257 Address Type Analysis 259 Multisig Analysis 260 Round Number Payments 261 Some Other Things to Note 262 Change of Ownership 263 Change of Wallet 263 Look at the Amounts 263 Address Triage 265 Attribution 271 Investigating Bitcoin 271 11 The Workings of Ethereum and Derivatives 273 History of the Ethereum Cryptocurrency 274 Ethereum Fundamentals 276 Types of Tokens 279 Ethereum Transaction Types 282 One Address for All Tokens 286 A User’s Address Can Be the Same on Other Blockchains 288 Reading Basic Transactions 290 Transaction Methods 291 Transaction and Address Types 293 What Are These Contracts We Keep Mentioning? 294 Identifying Contract Transactions 295 Conclusion 296 12 Ethereum: Investigation Methodology 297 Following ETH-to-ETH Transactions 297 Smart Contracts Deep Dive 304 Methods, Functions, and Events 307 Code 309 Read Contract 310 Write Contract. 310 Logs 314 ETH-to-Contract Transactions 316 Token-to-Token Transactions 324 NFTs 329 Decentralized Exchanges 335 Reading Decentralized Finance Contracts 342 The Approve Transaction 351 Summary 353 13 Investigating Binance Smart Chain 355 What is Binance Smart Chain? 355 Investigating Funds on Binance Smart Chain 357 What Have You Learned? 364 14 Applying What You Have Learned to New Cryptocurrencies 367 Stable Coins Such as USDT, USDC, and Paxos 368 Tron 372 Tron Fee Structure 372 What Transactions Look Like 372 Layer 2 Chains 377 Bridges 383 Mixers 388 Bitcoin Mixing 389 Ethereum Mixing 393 Privacy Coins 395 Monero (XMR): The Vanguard of Privacy Coins 396 Zcash (ZEC): Selective Transparency 396 Dash (DASH): Privacy as an Option 397 Horizen (ZEN): Extended Privacy with Sidechains 397 Grin and Beam: Mimblewimble Protocol 398 What Have You Learned? 398 15 Open Source Intelligence and the Blockchain 401 Mindset 402 Just “Search Engine” It 404 Attribution of Individuals 412 NFT Metadata 421 OSINT and the Dark Web 423 Summary 425 16 Using Wallets for Investigations 427 Understanding Cryptocurrency Wallets 427 Seed Words and Wallet Recovery 428 Step-by-Step Guide to HD Wallet Re-creation 428 What Can Be Seen? 429 The Benefits of Wallet Re-creation in Investigations 434 Understanding Derivation Paths in Cryptocurrency Wallets 435 The Importance of Understanding Derivation Paths for Investigators 435 Avoiding Oversight and Ensuring Legal Admissibility 436 The Concept of a Derivation Path 436 Bitcoin vs Ethereum Derivation Paths 437 Changing Derivation Paths in Software Wallets 438 To Sum Up 444 17 Crypto Seizure 445 What Do You Need to Carry Out a Crypto Seizure? 463 Recording Seed Words 466 Seizing to Your Own Wallet 467 Considerations for a Software Wallet 467 Considerations for a Hardware Wallet 468 Establishing an Organizational Process 469 Document Your Processes 469 Methods of Recording 470 Paperwork 470 Video 470 Preparation and Administration 471 Documentation in Law Enforcement Systems 471 Questions to Ask before Carrying Out a Crypto Seizure 471 Preparing for a Time-Sensitive Seizure 472 On-Site Seizure Considerations 472 Managing Access and Potential Threats 472 On-Site Toolkit and Practice 473 Where to Store Seized Assets? 473 Seizing to an Exchange 473 Specialist Custodians 474 Seizing to a Law Enforcement–Controlled Wallet 475 Final Thoughts 477 Acknowledgments 483 About the Author 485 About the Contributors 487 About the Technical Editor 493 Index 495


Best Sellers


Product Details
  • ISBN-13: 9781394164820
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: John Wiley & Sons Inc
  • Height: 218 mm
  • No of Pages: 528
  • Spine Width: 36 mm
  • Weight: 754 gr
  • ISBN-10: 1394164823
  • Publisher Date: 04 Nov 2024
  • Binding: Paperback
  • Language: English
  • Returnable: N
  • Sub Title: An Investigative Handbook
  • Width: 147 mm


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
There's No Such Thing as Crypto Crime: An Investigative Handbook
John Wiley & Sons Inc -
There's No Such Thing as Crypto Crime: An Investigative Handbook
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

There's No Such Thing as Crypto Crime: An Investigative Handbook

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA