Cryptocurrencies and future financial crime

Springer Science and Business Media LLC - Tập 11 - Trang 1-35 - 2022
Arianna Trozze1,2,3, Josh Kamps1,2, Eray Arda Akartuna1,2, Florian J. Hetzel2, Bennett Kleinberg1,2,4, Toby Davies2, Shane D. Johnson1,2
1Dawes Centre for Future Crime, University College London, London, UK
2Department of Security and Crime Science, University College London, London, UK
3Department of Computer Science, University College London, London, UK
4Department of Methodology & Statistics, Tilburg University, Tilburg, The Netherlands

Tóm tắt

Cryptocurrency fraud has become a growing global concern, with various governments reporting an increase in the frequency of and losses from cryptocurrency scams. Despite increasing fraudulent activity involving cryptocurrencies, research on the potential of cryptocurrencies for fraud has not been examined in a systematic study. This review examines the current state of knowledge about what kinds of cryptocurrency fraud currently exist, or are expected to exist in the future, and provides comprehensive definitions of the frauds identified. The study involved a scoping review of academic research and grey literature on cryptocurrency fraud and a 1.5-day expert consensus exercise. The review followed the PRISMA-ScR protocol, with eligibility criteria based on language, publication type, relevance to cryptocurrency fraud, and evidence provided. Researchers screened 391 academic records, 106 of which went on to the eligibility phase, and 63 of which were ultimately analysed. We screened 394 grey literature sources, 128 of which passed on to the eligibility phase, and 53 of which were included in our review. The expert consensus exercise was attended by high-profile participants from the private sector, government, and academia. It involved problem planning and analysis activities and discussion about the future of cryptocurrency crime. The academic literature identified 29 different types of cryptocurrency fraud; the grey literature discussed 32 types, 14 of which were not identified in the academic literature (i.e., 47 unique types in total). Ponzi schemes and (synonymous) high yield investment programmes were most discussed across all literature. Participants in the expert consensus exercise ranked pump-and-dump schemes and ransomware as the most profitable and feasible threats, though pump-and-dumps were, notably, perceived as the least harmful type of fraud. The findings of this scoping review suggest cryptocurrency fraud research is rapidly developing in volume and breadth, though we remain at an early stage of thinking about future problems and scenarios involving cryptocurrencies. The findings of this work emphasise the need for better collaboration across sectors and consensus on definitions surrounding cryptocurrency fraud to address the problems identified.

Tài liệu tham khảo

Advertising Standards Authority & Committees of Advertising Practice. (2019). Using Technology for Good [Annual Report]. https://www.asa.org.uk/uploads/assets/68dd32b5-ae6a-4993-820a3ff8f1163b8e/c02c8290-0ceb-4946-a98e383d5ee79796/ASA-CAP-2019-Annaul-Report-Full-Version-Singles.pdf Akin Gump Strauss Hauer & Feld LLP. (2018). Federal judge adopts CFTC position that cryptocurrencies are commodities. Akin Gump Strauss Hauer & Feld LLP. https://www.akingump.com/a/web/65522/aoiZE/litigation-alert-federal-judge-adopts-cftc-position-that-crypt.pdf Anderson, R., Barton, C., Rainer, B., Clayton, R., Ga, C., Grasso, T., Levi, M., Moore, T., & Vasek, M. (2019). Measuring the Changing Cost of Cybercrime Our Framework for Analysing the Costs of Cybercrime. Workshop on the Economics of Information Security (WEIS), 1–32. Arksey, H., & O’Malley, L. (2005). Scoping studies: Towards a methodological framework. International Journal of Social Research Methodology: Theory and Practice, 8(1), 19–32. https://doi.org/10.1080/1364557032000119616 Australian Competition & Consumer Commission. (2018). Targeting scams. http://www.keepmeposted.org.au/wp-content/uploads/2018/05/f1240_targeting-scams-report.pdf Australian Competition and Consumer Commission. (2019). Targeting scams. Report of the ACCC on scams activity 2018 (Issue May). Australian Competition & Consumer Commission. (2020). Targeting scams 2019. https://www.accc.gov.au/system/files/1657RPT_Targeting%20scams%202019_FA.pdf Badawi, E., & Jourdan, G.-V. (2020). Cryptocurrencies emerging threats and defensive mechanisms: A systematic literature review. IEEE Access. https://doi.org/10.1109/ACCESS.2020.3034816 Badawi, E., Jourdan, G.-V., Bochmann, G., & Onut, I.-V. (2020). An automatic detection and analysis of the bitcoin generator scam. IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2020, 407–416. Barnes, P. (2018). Crypto Currency and its Susceptibility to Speculative Bubbles, Manipulation, Scams and Fraud. Journal of Advanced Studies in Finance, 9(2), 60. https://doi.org/10.14505//jasf.v9.2(18).03 Bartoletti, M., Carta, S., Cimoli, T., & Saia, R. (2017). Dissecting Ponzi schemes on Ethereum: Identification, analysis, and impact. Bartoletti, M., Pes, B., & Serusi, S. (2018). Data mining for detecting bitcoin ponzi schemes. In Proceedings—2018 Crypto Valley Conference on Blockchain Technology, CVCBT 2018, pp. 75–84. https://doi.org/10.1109/CVCBT.2018.00014 Bartoletti, M., Carta, S., Cimoli, T., & Saia, R. (2020). Dissecting Ponzi schemes on Ethereum: Identification, analysis, and impact. Future Generation Computer Systems, 102, 259–277. https://doi.org/10.1016/j.future.2019.08.014 Baum, S. (2018). Cryptocurrency fraud: A look into the frontier of fraud. Bolster. (2019). State of Phishing & Online Counterfeiting [Annual Report]. https://bolster.ai/assets/files/reports/2019.pdf Boshmaf, Y., Al Jawaheri, H., & Al Sabah, M. (2019). BlockTag: Design and applications of a tagging system for blockchain analysis. In IFIP International Conference on ICT Systems Security and Privacy Protection, pp. 299–313. Boshmaf, Y., Elvitigala, C., Al Jawaheri, H., Wijesekera, P., & Al Sabah, M. (2020). Investigating MMM Ponzi scheme on Bitcoin. In Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, pp. 519–530. Burrus, J. (2018). Fighting financial crime in the age of cryptocurrencies (p. 3). Refinitiv. https://www.refinitiv.com/content/dam/marketing/en_us/documents/expert-talks/world-check-expert-talk-fighting-financial-crime.pdf Capobianco, A. (2019). Digital Disruption in Financial Markets—Note by the United States (p. 10). Organisation for Economic Co-operation and Development. https://www.justice.gov/atr/page/file/1313821/download Chainalysis. (2019). Crypto Crime Report. Chainalysis. https://uploads-ssl.webflow.com/5a9360f88433cb00018022c2/5c4f67ee7deb5948e2941fda_Chainalysis%20January%202019%20Crypto%20Crime%20Report.pdf Chainalysis. (2020). The 2020 Geography of Cryptocurrency Report. https://go.chainalysis.com/rs/503-FAP-074/images/2020-Geography-of-Crypto.pdf Chainalysis. (2021, January 19). Crypto Crime Summarized: Scams and Darknet Markets Dominated 2020 by Revenue, But Ransomware Is the Bigger Story. Chainalysis Insights. https://blog.chainalysis.com/reports/2021-crypto-crime-report-intro-ransomware-scams-darknet-markets Chen, W., Guo, X., Chen, Z., Zheng, Z., & Lu, Y. (2020). Phishing Scam Detection on Ethereum: Towards Financial Security for Blockchain Ecosystem. Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence Special Track on AI in FinTech., 4506–4512. Chen, W., Guo, X., Chen, Z., Zheng, Z., Lu, Y., & Li, Y. (2020b). Honeypot contract risk warning on ethereum smart contracts. IEEE International Conference on Joint Cloud Computing, 2020, 1–8. Chen, W., Wu, J., Zheng, Z., Chen, C., & Zhou, Y. (2019a). Market Manipulation of Bitcoin: Evidence from Mining the Mt. Gox Transaction Network. In Proceedings—IEEE INFOCOM, 2019-April (November 2013), pp. 964–972. https://doi.org/10.1109/INFOCOM.2019.8737364 Chen, W., Xu, Y., Zheng, Z., Zhou, Y., Yang, J. E., & Bian, J. (2019b). Detecting ‘Pump & dump schemes’ on cryptocurrency market using an improved apriori algorithm. In Proceedings—13th IEEE International Conference on Service-Oriented System Engineering, SOSE 2019, 10th International Workshop on Joint Cloud Computing, JCC 2019 and 2019 IEEE International Workshop on Cloud Computing in Robotic Systems, CCRS 2019, pp. 293–298. https://doi.org/10.1109/SOSE.2019.00050 Chen, W., Xu, Y., Zheng, Z., Zhou, Y., Yang, J. E., & Bian, J. (2019c). Detecting" Pump & Dump Schemes" on cryptocurrency market using an improved Apriori Algorithm. IEEE International Conference on Service-Oriented System Engineering (SOSE), 2019, 293–2935. Chen, W., Zheng, Z., Cui, J., Ngai, E., Zheng, P., & Zhou, Y. (2018). Detecting Ponzi Schemes on Ethereum. pp. 1409–1418. https://doi.org/10.1145/3178876.3186046 Chen, W., Zheng, Z., Ngai, E. C. H., Zheng, P., & Zhou, Y. (2019d). Exploiting blockchain data to detect smart ponzi schemes on ethereum. IEEE Access, 7, 37575–37586. https://doi.org/10.1109/ACCESS.2019.2905769 Chen, Z., Khoa, L., Teoh, E., Nazir, A., Karuppiah, E., & Lam, K. (2018b). Machine learning techniques for anti-money laundering (AML) solutions in suspicious transaction detection: A review. Knowledge and Information Systems, 57(2), 245–285. https://doi.org/10.1007/s10115-017-1144-z Chernin, A., Moran, N., & Mola, S. (2020). Trends in CFTC Virtual Currency Enforcement Actions: 2015-Q2 2020 (p. 14). Cornerstone Research. https://www.cornerstone.com/Publications/Reports/Trends-in-CFTC-Virtual-Currency-Enforcement-Actions-2015-Q2-2020/Trends-in-CFTC-Virtual-Currency-Enforcement-Actions-2015-Q2-2020.pdf CipherTrace. (2018). Cryptocurrency Anti-Money Laundering Report (p. 22). https://ciphertrace.com/crypto-aml-report-2018q3.pdf CipherTrace. (2020). ALERT: Malicious Crypto Browser Extension—Masked MetaMask. https://ciphertrace.com/alert-malicious-crypto-browser-extension-masked-metamask/ Cohen, D. O., & Crance, R. (2018). Taking a trip around the regulatory block: U.S. regulation of blockchain and digital assets (Financial Services Litigation Alert, p. 4). Schnader Harrison Segal & Lewis LLP. https://www.schnader.com/wp-content/uploads/2019/02/ALERT-Financial-Services-Blockchain-and-Cryptocurrency-Regulation-7-31-18.pdf CoinMarketCap. (2021). Today’s cryptocurrency prices by market cap. CoinMarketCap. https://coinmarketcap.com/ Conley, B., Echert, J., Fuller, A., Lewis, H., & Lunday, C. (2015). Cryptocurrencies: An introduction for policy makers. Technology Law and Public Policy Clinic. Conti, M., Gangwal, A., & Ruj, S. (2018). On the economic significance of ransomware campaigns: A Bitcoin transactions perspective. Computers & Security, 79, 162–189. https://doi.org/10.1016/j.cose.2018.08.008 Conway, L. (2021). Bitcoin Halving. Investopedia. https://www.investopedia.com/bitcoin-halving-4843769 Corporate and Criminal Fraud Accountability Act of 2002, 18 United States Code § 1348 (2009). https://www.law.cornell.edu/uscode/text/18/1348 Coulter, B. B. (2018). CFTC Can Regulate Cryptocurrencies as Commodities (Burr Alert, p. 2). Burr Forman LLP. https://www.burr.com/wp-content/uploads/2018/03/ALERT_CFTC-Can-Regulate-Cryptocurrencies-as-Commodities_Coulter.pdf Global Blockchain Business Council. (2020). Chain Reaction: Blockchain Enters the Mainstream [Annual Report]. Accenture. https://www.lw.com/thoughtLeadership/gbbc-report-blockchain-enters-mainstream Crowell & Moring. (2018). Cryptocurrency in Small Bytes: The CFTC Chalks Up a Preliminary Win [Client Alert]. https://www.crowell.com/NewsEvents/AlertsNewsletters/all/Cryptocurrency-in-Small-Bytes-The-CFTC-Chalks-Up-a-Preliminary-Win/pdf Crowley, B. J. (2018). The Legal and Regulatory Issues Surrounding Cryptocurrency. Counterfeit Access Device and Computer Fraud and Abuse Act of 1984, 18 United States Code § 1029 (2015). https://www.law.cornell.edu/uscode/text/18/1029 Desai, V., Coderre, R., Kizzee, C., & Kalra, H. (2019). Retail and Hospitality Threat Trend report (No. 190147; p. 46). Accenture. Devonshires. (2018). Litigation Know How: Staying Ahead of the Game. Devonshires. https://www.devonshires.com/wp-content/uploads/2017/07/Com-Lit-Brief-October-18.pdf Dubois, S. M. (2019). A Baseline Assessment of Law Enforcement Cryptocurrency Investigations. University of Central Lancashire. Duff, K. B., & Hays, G. (2018). Recent developments in the war on cryptocurrency fraud. The Receiver, 7, 1–7. Eastham, E. B. (2020). Morrison and cryptocurrencies: Is it time to revisit the extraterritorial application of rule 10B–5. Ga. J. Int’l & Comp. l., 48, 563. Elder, R., & Rotunda, J. (2018). Widespread Fraud Found in Cryptocurrency Offerings (Investor Alert: Cryptocurrencies). Texas State Securities Board. https://www.ssb.texas.gov/sites/default/files/CRYPTO%20SWEEP%20report%2002112019%20UPDATE.pdf Elwell, C. K., Murphy, M. M., & Seitzinger, M. V. (2014). Bitcoin: Questions, Answers, and Analysis of Legal Issues (p. 20). Congressional Research Service. Eversheds Sutherland Ltd. (2018). Navigating the issues Securities Enforcement Global Update. https://us.eversheds-sutherland.com/mobile/portalresource/lookup/poid/Z1tOl9NPluKPtDNIqLMRV56Pab6TfzcRXncKbDtRr9tObDdEpW3CmS3!/fileUpload.name=/Securities-Enforcement-Global-Update_Fall-2018.pdf Federal Trade Commission Act, 15 United States Code § 45 (2012). https://www.law.cornell.edu/uscode/text/15/45 Financial Integrity Network. (2018). Virtual Currencies: Momentum Building For Regulation and Enforcement [Policy Alert]. Financial Conduct Authority. (2019). Cryptoasset investment scams. https://www.fca.org.uk/scamsmart/cryptoasset-investment-scams Financial Conduct Authority. (2020). Forex trading scams. https://www.fca.org.uk/scamsmart/forex-trading-scams Financial Conduct Authority. (2021). FCA Handbook. https://www.handbook.fca.org.uk/handbook/MAR/1/6.html?date=2016-03-07 Frankel, T. (2012). The ponzi scheme puzzle: A history and analysis of con artists and victims. Oxford University Press. https://doi.org/10.1093/acprof:osobl/9780199926619.001.0001 FSMA. (2020). Cryptocurrency fraud: The FSMA updates its list of suspicious sites (p. 1) [Warnings]. https://web3.cmvm.pt/SDI/IFs/app/docs/fsd852235.pdf Gandal, N., Hamrick, J. T., Moore, T., & Oberman, T. (2018). Price manipulation in the Bitcoin ecosystem. Journal of Monetary Economics, 95, 86–96. https://doi.org/10.1016/j.jmoneco.2017.12.004 Gao, B., Wang, H., Xia, P., Wu, S., Zhou, Y., Luo, X., & Tyson, G. (2020). Tracking Counterfeit Cryptocurrency End-to-end. ArXiv Preprint ArXiv:2011.02673. Garg, S. C., Sawhney, A. P., Tyagi, A., & Kanungo, B. P. (2019). Report of the Committee to propose specific actions to be taken in relation to Virtual Currencies (Committee on Virtual Currencies). Department of Economic Affairs, Ministry of Finance. https://dea.gov.in/sites/default/files/Approved%20and%20Signed%20Report%20and%20Bill%20of%20IMC%20on%20VCs%2028%20Feb%202019.pdf Goodlett, B. (2020). Texas cracks down on cryptocurrency fraud: 2020 developments (Accelerate, p. 2). DLA Piper. Gusenbauer, M. (2019). Google Scholar to overshadow them all? Comparing the sizes of 12 academic search engines and bibliographic databases. In Scientometrics (Vol. 118, Issue 1). Springer International Publishing. https://doi.org/10.1007/s11192-018-2958-5 Halverson, G. (2020). Global Payments 2020–30 A quantum shift in the next decade [Submission to RBA Payments Boards]. McLean Roche Consulting Group. https://www.rba.gov.au/payments-and-infrastructure/submissions/review-of-retail-payments-regulation/mclean-roche-consulting.pdf Hays, G. (2018). Receiver keeping up with the cryptos. The Receiver, 6, 1–7. Hedrich, W., Chalmers, B., Viet, P. H., & Koh, J. (2018). 14 Shades of risk in Asia-Pacific. Marsh & McLennan Companies. Henning, P. J. (2019). A Taxonomy of Cryptocurrency Enforcement Actions (SSRN Scholarly Paper ID 3483198). Social Science Research Network. https://papers.ssrn.com/abstract=3483198 Higgins, S. (2017). A Digital Currency Scam is Misusing the Rothschild Family Name. CoinDesk. https://www.coindesk.com/rothschild-advisory-warns-fraudulent-digital-currency HM Treasury, Financial Conduct Authority, & Bank of England. (2018). Cryptoassets Taskforce: Final report (p. 58). https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/752070/cryptoassets_taskforce_final_report_final_web.pdf Identity Theft and Assumption Deterrence Act of 1998, Pub. L. No. 3007, 18 United States Code (2006). https://www.law.cornell.edu/uscode/text/18/1028 Insikt Group. (2018). Shifting Patterns in Internet Use Reveal Adaptable and Innovative North Korean Ruling Elite. https://www.recordedfuture.com/north-korea-internet-usage/ Internet Engineering Task Force. (n.d.). Internet standards. IETF. Retrieved 16 March 2021, from https://www.ietf.org/standards/ Jiaying, J. (2020). Regulating Blockchain? A Retrospective Assessment of China’s Blockchain Policies and Regulations. Tsinghua China L. Rev., 12. Jung, E., Le Tilly, M., Gehani, A., & Ge, Y. (2019). Data mining-based ethereum fraud detection. IEEE International Conference on Blockchain (Blockchain), 2019, 266–273. Kamps, J., & Kleinberg, B. (2018). To the moon: Defining and detecting cryptocurrency pump-and-dumps. Crime Science. https://doi.org/10.1186/s40163-018-0093-5 Keller, P., Florian, M., & Böhme, R. (2021). Collaborative Deanonymization. ArXiv:2005.03535 [Cs]. http://arxiv.org/abs/2005.03535 Kethineni, S., & Cao, Y. (2019). The rise in popularity of cryptocurrency and associated criminal activity. International Criminal Justice Review. https://doi.org/10.1177/1057567719827051 Krone, M. J., Lukes, E. M., & McKibbin, C. (2018). Tales from the Crypt: Cryptocurrency is Here—How will crime insurers respond? The Fidelity Law Journal, XXIV, 86. Lašas, K., Kasputytė, G., Užupytė, R., & Krilavičius, T. (2020). Fraudulent behaviour identification in ethereum blockchain. CEUR Workshop Proceedings [Electronic Resource]: IVUS 2020, Information Society and University Studies, Kaunas, Lithuania, 23 April, 2020: Proceedings. Aachen: CEUR-WS, 2020, Vol. 2698. Law, J., & Martin, E. A. (2009). Fraud. In J. Law & E. A. Martin (Eds.), Oxford dictionary of law (7th ed.). Oxford. Leuz, C. (2018). Regulatory approaches to combat retail investor fraud. SEC Investor Advisory Committee. https://www.sec.gov/spotlight/investor-advisory-committee-2012/iac030818-leuz-remarks.pdf Levac, D., Colquhoun, H., & O’Brien, K. K. (2010). Scoping studies: Advancing the methodology. Implementation Science, 5(1), 69. https://doi.org/10.1186/1748-5908-5-69 LIFARS. (2018). Bitcoin & cryptocurrency investment prospects & hacking incidents. https://lifars.com/wp-content/uploads/2018/04/V2-Bitcoin-and-Cryptocurrency-Investment-Prospects-Hacking-Incidents.pdf Lim, B., Murphy, G. E., Heda, K., Hannotin, C., Krauß, O., Popp, F., Maximenko, A., Klutchareva, E., & Low, C. (2019). Blockchain 2018 year-in-review. Debevoise & Plimptom. Liu, X. F., Jiang, X.-J., Liu, S.-H., & Tse, C. K. (2020). Knowledge discovery in cryptocurrency transactions: A survey. ArXiv Preprint ArXiv:2010.01031. Lockhart, J., & Nuesser, A. (2018). Taking Caution: Financial Consumersand the Cryptoasset Sector (Investor Office. Innovative Research Group Inc. Lucking, D., & Aravind, V. (2019). Cryptocurrency as a Commodity: The CFTC’s Regulatory Framework. Global Legal Insights. Mabille, C. (2020). Is cryptocurrency a store of value for the current crisis? Finatic. https://www.finatic.be/bitcoin.pdf Malta Financial Services Authority. (2019). MSFA Warning—Bitcoin Future. https://web3.cmvm.pt/SDI/IFs/app/docs/fsd816904.pdf Malyshev, P., Achilles, J., Ottenberg, J., & Stumacher, J. (2018). CFTC enforcement trends in 2017 and considerations for 2018. Journal of Investment Compliance, 19(3), 17–21. https://doi.org/10.1108/JOIC-04-2018-0021 Manojlovic, D. (2019). Report to the Vancouver Police Board (No. 1902P03). https://vancouver.ca/police/policeboard/agenda/2019/0221/1902P04-Proposed-CAPG-Resolutions.pdf?TB_iframe=true&width=370.8&height=658.8 Martín-Martín, A., Orduna-Malea, E., Thelwall, M., & Delgado López-Cózar, E. (2018). Google Scholar, Web of Science, and Scopus: A systematic comparison of citations in 252 subject categories. Journal of Informetrics, 12(4), 1160–1177. https://doi.org/10.1016/j.joi.2018.09.002 McAvoy, D., Queenin, C., & Becker, B. (2018). Court confirms CFTC jurisdiction over cryptocurrency fraud and that virtual currencies are commodities (Now + Next, p. 2). Nixon Peabody LLP. https://www.nixonpeabody.com/-/media/Files/Alerts/2018-March/Court-confirms-CFTC-jurisdiction-over-cryptocurrency-fraud.ashx?la=en McGuire, M., & Dowling, S. (2013). Cyber crime: A review of the evidence. Research Report 75. Chapter 1: Cyber-dependent crimes. In Home Office Research Report 75. McGuire, M. (2019). Social Media Platforms and the Cybercrime Economy (Into the Web of Profit). Bromium. https://www.bromium.com/wp-content/uploads/2019/02/Bromium-Web-of-Profit-Social-Platforms-Report.pdf Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G. M., & Savage, S. (2016). A fistful of Bitcoins: Characterizing payments among men with no names. Communications of the ACM, 59(4), 86–93. https://doi.org/10.1145/2896384 Moher, D., Liberati, A., Tetzlaff, J., & Altman, D. G. (2009). Preferred reporting items for systematic reviews and meta-analyses: The PRISMA Statement. PLoS Medicine, 6(7), 1–6. https://doi.org/10.1371/journal.pmed.1000097 Moore V. United States, (U.S. Supreme Court 1895). Möser, M., Bohme, R., & Breuker, D. (2013). An inquiry into money laundering tools in the Bitcoin ecosystem. APWG ECrime Researchers Summit. https://doi.org/10.1109/eCRS.2013.6805780 Munn, Z., Peters, M. D. J., Stern, C., Tufanaru, C., McArthur, A., & Aromataris, E. (2018). Systematic review or scoping review? Guidance for authors when choosing between a systematic or scoping review approach. BMC Medical Research Methodology, 18(1), 1–7. https://doi.org/10.1186/s12874-018-0611-x Murko, A., & Vrhovec, S. L. (2019). Bitcoin adoption: Scams and anonymity may not matter but trust into Bitcoin security does. In Proceedings of the Third Central European Cybersecurity Conference, pp. 1–6. Murphy, E. V., Murphy, M. M., & Seitzinger, M. V. (2015). Bitcoin: Questions, answers, and analysis of legal issues. Musiala, R. A. Jr., Goody, T. M., Reynolds, V., Tenery, L., McGrath, M., Rowland, C., & Sekhri, S. (2020). Cryptocurrencies: Forensic techniques to meet the challenge of new fraud and corruption risks | FVS Eye on Fraud. AICPA. https://future.aicpa.org/resources/download/cryptocurrencies-forensic-techniques-to-face-new-fraud-and-corruption-risks Najmy, W. G. (2019). Enhanced Tax Compliance for Cryptoasset Transactions. Available at SSRN 3499659. Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. 9. Narayanan, A., Bonneau, J., Felten, E., Miller, A., & Goldfeder, S. (2016). Bitcoin and Cryptocurrency Technologies. Navarro, R. R. (2019). Preventative fraud measures for cryptocurrency exchanges: Mitigating the risk of cryptocurrency scams [M.S., Utica College]. http://search.proquest.com/docview/2312801484/abstract/7B22A14839754F47PQ/1 Nelson, R. M. (2019). Examining regulatory frameworks for digital currencies and blockchain (Testimony No. 7–5700; p. 15). Congressional Research Service. https://www.banking.senate.gov/imo/media/doc/Nelson%20Testimony%207-30-19.pdf Ngai, K. (2014). Regulating cryptocurrency to prevent fraud and money laundering. NHS National Services Scotland. (2020). NHS counter fraud services rolling COVID-19 intelligence alert no. 14. https://www.wihb.scot.nhs.uk/wp-content/uploads/2020/08/2020-08-03-CFS-Rolling-COVID-19-Intel-Alert-No14-Final.pdf Nilsen, A. I. (2019). Limelight: Real-time detection of pump-and-dump events on cryptocurrency exchanges using deep learning. UiT Norges arktiske universitet. Paré, G., Trudel, M. C., Jaana, M., & Kitsiou, S. (2015). Synthesizing information systems knowledge: A typology of literature reviews. Information and Management, 52(2), 183–199. https://doi.org/10.1016/j.im.2014.08.008 Parisi, D., Goldman, G., Baris, J. G., Nallengara, L., Sahni, R. A., Greene, N., Szaja, P. J., Reynolds, B., Anderson, S. W., & Oosterbaan, J. (2018). Regulators and courts clarify virtual currency regulation, but overall framework remains murky. Shearman & Sterling. http://www.legalexecutiveinstitute.com/wp-content/uploads/2018/05/345PM-Regulators.pdf Peters, M. D. J., Godfrey, C. M., Khalil, H., McInerney, P., Parker, D., & Soares, C. B. (2015). Guidance for conducting systematic scoping reviews. International Journal of Evidence-Based Healthcare, 13(3), 141–146. https://doi.org/10.1097/XEB.0000000000000050 Peterson, J., Pearce, P. F., Ferguson, L. A., & Langford, C. A. (2017). Understanding scoping reviews: Definition, purpose, and process. Journal of the American Association of Nurse Practitioners, 29(1), 12–16. https://doi.org/10.1002/2327-6924.12380 Pham, M. T., Rajić, A., Greig, J. D., Sargeant, J. M., Papadopoulos, A., & Mcewen, S. A. (2014). A scoping review of scoping reviews: Advancing the approach and enhancing the consistency. Research Synthesis Methods, 5(4), 371–385. https://doi.org/10.1002/jrsm.1123 Phan, L., Li, S., & Mentzer, K. (2019). Blockchain technology and the current discussion on fraud. Computer Information Systems Journal. Phillips, R., & Wilder, H. (2020). Tracing cryptocurrency scams: Clustering replicated advance-fee and Phishing Websites. ArXiv Preprint ArXiv:2005.14440. Podgor, E. S. (2019). Cryptocurrencies and securities fraud: In need of legal guidance. Available at SSRN 3413384. Pryzmont, P. (2016). An empirical study of how Bitcoin related incidents impact its price volatility. August, 62. PYMNTS.com & Trulioo. (2019). Keeping crime out of crypto (AML/KYC Tracker). https://www.pymnts.com/wp-content/uploads/2019/07/AML-KYC-Tracker-July-2019.pdf Reddy, E., & Minaar, A. (2018). Cryptocurrency: A tool and target for cybercrime. Acta Criminologica: Southern African Journal of Criminology, 31(3), 71–92. Reik, T. (2019). Bitcoin Revisited. Sprott Asset Management USA, Inc. https://www.sprottusa.com/media/2497/sprott-gold-report-bitcoin-revisited.pdf Rochemont, S. (2020). A Cashless Society in 2019. Rognone, L., Hyde, S., & Zhang, S. S. (2020). News sentiment in the cryptocurrency market: An empirical comparison with Forex. International Review of Financial Analysis, 69, 101462. Ropes & Gray. (2019). CFTC amends regulations applicable to asset managers including excluded and exempt CPOs and CTAs; action may be required. http://www.ropesgray.com/en/newsroom/alerts/2019/12/CFTC-Amends-Regulations-Applicable-to-Asset-Managers-Including-Excluded-and-Exempt-CPOs-and-CTAs Samsudeen, Z., Perera, D., & Fernando, M. (2019). Behavioral analysis of bitcoin users on illegal transactions. Advances in Science, Technology and Engineering Systems Journal, 4(2), 402–412. https://doi.org/10.25046/aj040250 Schär, F. (2021). Decentralized finance: On blockchain- and smart contract-based financial markets. Federal Reserve Bank of St. Louis. https://research.stlouisfed.org/publications/review/2021/02/05/decentralized-finance-on-blockchain-and-smart-contract-based-financial-markets Scheau, M. C., Link to external site, this link will open in a new window, Crăciunescu, S. L., Brici, I., & Achim, M. V. (2020). A cryptocurrency spectrum short analysis. Journal of Risk and Financial Management; Basel, 13(8), 184. https://doi.org/10.3390/jrfm13080184 Scott, A. P. (2020). Fintech: Overview of Financial Regulators and Recent Policy Approaches (No. R46333; p. 38). Congressional Research Service. https://crsreports.congress.gov/product/pdf/R/R46333 Securities and Exchange Commission. (2013). Ponzi schemes using virtual currencies. SEC Pub. No. 153 (7/13). Securities and Exchange Comimssion Philippines. (2020). SEC Advisory. https://www.sec.gov.ph/wp-content/uploads/2020/10/2020Advisory_BITCOIN-DIGITAL.pdf Semenihin, A., & Kondrashin, A. (2018). Leading role of state as a regulator of crypto currency. 217(ICSEAL), 329–334. https://doi.org/10.2991/icseal-18.2018.47 Štefanko, L. (2018). Cryptocurrency scams on Android (ESET Research Whitepapers, p. 15). ESET. https://www.welivesecurity.com/wp-content/uploads/2018/02/Cryptocurrency_Scams_on_Android.pdf Shearman & Sterling. (2018). Financial Regulatory Developments Focus. 39. https://www.shearman.com/-/media/Files/Perspectives/2018/10/Financial-Regulatory-Developments-Focus--Issue-39-October-5-2018-FIAFR-10052018.pdf?la=en&hash=9FFA4488F1F5BECB70A01332BA0C2FEA9310BCDA Sureshbhai, P. N., Bhattacharya, P., & Tanwar, S. (2020). KaRuNa: A blockchain-based sentiment analysis framework for fraud cryptocurrency schemes. IEEE International Conference on Communications Workshops (ICC Workshops). https://doi.org/10.1109/ICCWorkshops49005.2020.9145151 Torres, C. F., Steichen, M., & State, R. (2019). The art of the scam: demystifying honeypots in ethereum smart contracts. Toyoda, K., Ohtsuki, T., & Mathiopoulos, P. T. (2017). Identification of high yielding investment programs in bitcoin via transactions pattern analysis. 2018-Janua, pp. 1–6. https://doi.org/10.1109/GLOCOM.2017.8254420 Toyoda, K., Ohtsuki, T., & Mathiopoulos, P. T. (2018). Multi-class bitcoin-enabled service identification based on transaction history summarization. September, pp. 1129–1136. https://doi.org/10.1109/Cybermatics Toyoda, K., Ohtsuki, T., & Mathiopoulos, P. T. (2019). Time series analysis for bitcoin transactions: The case of Pirate@40’s HYIP scheme. IEEE International Conference on Data Mining Workshops, ICDMW, 2018-Novem, pp. 151–155. https://doi.org/10.1109/ICDMW.2018.00028 Toyoda, K., Mathiopoulos, P. T., & Ohtsuki, T. (2019a). A novel methodology for HYIP operators’ bitcoin addresses identification. IEEE Access, 7, 74835–74848. U.S. Securities and Exchange Commission. (n.d.). Insider Trading. Investor.Gov. Retrieved 4 March 2021, from https://www.investor.gov/introduction-investing/investing-basics/glossary/insider-trading urRehman, M. H., Salah, K., Damiani, E., & Svetinovic, D. (2020). Trust in blockchain cryptocurrency ecosystem. IEEE Transactions on Engineering Management. https://doi.org/10.1109/TEM.2019.2948861 Vasek, M., Bonneau, J., Castellucci, R., Keith, C., & Moore, T. (2017). The Bitcoin Brain Drain: Examining the Use and Abuse of Bitcoin Brain Wallets. In J. Grossklags & B. Preneel (Eds.), Financial cryptography and data security (Vol. 9603, pp. 609–618). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-662-54970-4_36 Vasek, M. (2017). Measuring Bitcoin-based cybercrime. University of Tulsa. Vasek, M., & Moore, T. (2018). Analyzing the Bitcoin Ponzi scheme ecosystem. https://doi.org/10.1007/978-3-662-58820-8_8 Vasek, M., & Moore, T. (2015). There’s no free lunch, even using Bitcoin: Tracking the popularity and profits of virtual currency scams. In R. Böhme & T. Okamoto (Eds.), Financial cryptography and data security (pp. 44–61). Springer. Vrazel, N. (2019). Betting it all on the flip of a coin: Regulating cryptocurrency initial coin offerings and protecting investors. S. Tex. l. Rev., 60, 527. Waxenbaum, S. (2019). The SEC and ICOs: Connections between digital assets and citrus groves. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.3385064 Weber, K., Schütz, A. E., Fertig, T., & Müller, N. H. (2020). Exploiting the Human Factor: Social Engineering Attacks on Cryptocurrency Users. In P. Zaphiris & A. Ioannou (Eds.), Learning and Collaboration Technologies. Human and Technology Ecosystems (pp. 650–668). Springer International Publishing. https://doi.org/10.1007/978-3-030-50506-6_45 Webroot. (2018). Webroot Threat Research Review [White Paper]. https://www-cdn.webroot.com/2415/4662/3914/Threat-Roundup-Review-Whitepaper.pdf Wright, J. (2018). Don’t @ Me: Hunting Twitter Bots at Scale (p. 43). Duo Security. Wu, J., Yuan, Q., Lin, D., You, W., Chen, W., Chen, C., & Zheng, Z. (2020). Who are the phishers? Phishing scam detection on ethereum via network embedding. IEEE Transactions on Systems, Man, and Cybernetics: Systems. Xia, P., Wang, H., Luo, X., Wu, L., Zhou, Y., Bai, G., Xu, G., Huang, G., & Liu, X. (2020). Don’t fish in troubled waters! characterizing coronavirus-themed cryptocurrency scams. ArXiv Preprint ArXiv:2007.13639. Xia, P., Wang, H., Zhang, B., Ji, R., Gao, B., Wu, L., Luo, X., & Xu, G. (2020b). Characterizing cryptocurrency exchange scams. Computers & Security, 98, 101993. https://doi.org/10.1016/j.cose.2020.101993 Xie, R. (2019). Why China had to “Ban” Cryptocurrency but the U.S. did not: A Comparative Analysis of Regulations on Crypto-Markets Between the U.S. and China. Yli-Huumo, J., Ko, D., Choi, S., Park, S., & Smolander, K. (2016). Where is current research on Blockchain technology?—A systematic review. PLoS ONE, 11(10), 1–27. https://doi.org/10.1371/journal.pone.0163477 Yuan, Q., Huang, B., Zhang, J., Wu, J., Zhang, H., & Zhang, X. (2020). Detecting Phishing scams on Ethereum based on transaction records. IEEE International Symposium on Circuits and Systems (ISCAS), 2020, 1–5. Zetzsche, D., Buckley, R., & Amer, D. (2017). The ICO Gold Rush: It’s a scam, it’s a bubble, it’s a super challenge for regulators. In EBI Working Paper Series (Issue 18).