The U.S. Governments Plan For Cryptocurrency Enforcement
Introduction to Cryptocurrency Enforcement
Innovation can drive a society forward. But innovation does not occur in a vacuum.
Public policy can establish background conditions that help the innovative spirit thrive—or create an environment in which that spirit is inhibited, or suppressed.
Even in societies where transformative scientific and technological advancements are achievable, public policy again plays a critical mediating role. In the wrong hands, or without appropriate safeguards and oversight, these advancements can facilitate great human suffering. Just ask the political enemies of authoritarian regimes that deploy surveillance tools Orwell never could have imagined. Or, closer to home, listen to the child victims of unspeakable sexual exploitation whose images and live-streamed abuse are so easily transmitted across the internet.
Technological innovation and human flourishing are complementary concepts, but the former does not guarantee the latter. Good public policy—and the fair and equitable cryptocurrency enforcement of such policy—can help bring the two into alignment. And even as too much regulation undoubtedly stifles innovation (and human flourishing, too), the absence of law’s protections can endanger progress across both dimensions.
It takes careful consideration, and a deep and ongoing immersion in the facts, to understand when, and how, law should intervene. Once law’s empire has established its root in a particular domain, it requires equally careful consideration (and humility on the part of government officials) to ensure that regulation goes no further than is required—that government action, in other words, reflects cryptocurrency enforcement only of “those wise restraints that make us free.”
This Cryptocurrency Enforcement Framework
In 2018, Attorney General Jeff Sessions established a Cyber-Digital Task Force within the U.S. Department of Justice to evaluate the impact that recent advances in technology have had on law enforcement’s ability to keep our citizens safe. Acknowledging the many ways in which technological advances “have enriched our lives and have driven our economy,” the Attorney General also noted that “the malign use of . . . technology harms our government, victimizes consumers and businesses, and endangers public safety and national security.”
The Task Force issued a comprehensive report later that year. That report identified particular threats currently confronting our society, ranging from transnational criminalCriminal A criminal is any person who through a decision or act engages in a crime. This can be complicated, as many people break laws unknowingly, however, in our context, it is a person who makes a decision to engage in unlawful acts or to place themselves with others who do this. A criminal always has the ability to decide not to break the law, or if they initially engage in crime to stop doing it, but instead continues. enterprises’ sophisticated cyber-enabled schemes, to malign foreign influence operations, to efforts to compromise our nation’s critical infrastructure. The report also identified a number of emerging threats whose contours are still developing, and recommended further examination of their
potential impact. Specifically, the report recommended that “the Department should continue evaluating the emerging threats posed by rapidly developing cryptocurrencies that malicious cyber actors often use.” This Cryptocurrency Enforcement Framework represents the fruits of the Task Force’s efforts.
At the outset, it bears emphasizing that distributed ledger technology, upon which all cryptocurrencies build, raises breathtaking possibilities for human flourishing. These possibilities are rightly being explored around the globe, from within academia and industry, and from within governments—including our own.
It should be no surprise, for example, that researchers within the U.S. National Institute of Standards and Technology “have been investigating blockchain technologies at multiple levels: from use cases, applicationsApplications Applications or Apps
An application (software), commonly referred to as an ‘app’ is a program on a computer, tablet, mobile phone or device. Apps are designed for specific tasks, including checking the weather, accessing the internet, looking at photos, playing media, mobile banking, etc.
Many apps can access the internet if needed and can be downloaded (used) either for a price or for free.
Apps are a major point of vulnerability on all devices. Some are designed to be malicious, such as logging keystrokes or activity, and others can even transport malware.
Always be careful about any app you are thinking about installing. and existing services, to protocols, security guarantees, and cryptographic mechanisms.” Or that the U.S. Department of Defense’s recently-issued Digital Modernization Strategy specifically identifies blockchain technology as having “promise to provide
increased effectiveness, efficiency, and security.” Or that the U.S. Food and Drug Administration recently released a detailed vision for how it plans to deploy blockchain for food safety-related purposes. Or that—in the cryptocurrency space specifically—“the Federal Reserve is active in conducting research and experimentation related to distributed ledger technologies and the potential use cases for digital currencies,” including by partnering with the Massachusetts Institute of Technology to “build and test a hypothetical digital currency oriented to central bank uses.” Without doubt, cryptocurrency represents a transformative way to store and exchange value.
But as the following pages make clear [in the report below], despite its relatively brief existence, this technology already plays a role in many of the most
significant criminal and national security threats our nation faces. As the Task Force has found, illicitillicit Illicit means something that is not legally permitted or authorized under the law; unlicensed; unlawful. It can also mean disapproved of or not permitted for moral or ethical reasons. uses of cryptocurrency typically fall into three categories: (1) financial transactions associated with the commission of crimes; (2) money launderingMoney laundering Money laundering is the illegal process of concealing the origins of money obtained illegally by passing it through a complex sequence of banking transfers or commercial transactions. Money laundering can be done through various mediums, leveraging a variety of payment vehicles, people and institutions. and the shielding of legitimate activity from tax, reporting, or other legal requirements; or (3) crimes, such as theft, directly implicating the cryptocurrency marketplace itself. Part I of this Enforcement Framework examines in detail each of those categories.
Our society is not powerless in the face of these threats. As Part II demonstrates, the government has legal and regulatory tools available at its disposal to confront the threats posed by cryptocurrency’s illicit uses. Interagency partnership is critical for effectively leveraging those tools. The Department of Justice has built strong working relationships with its regulatory and enforcement partners in the Securities and Exchange Commission, the Commodity Futures Trading Commission, and the U.S. Department of the Treasury (including FinCEN, OFAC, and the IRSIRS The Internal Revenue Service (IRS) is the revenue & tax service of the United States federal government responsible for collecting taxes and administering the Internal Revenue Code (the main body of federal statutory tax law.) It is part of the Department of the Treasury and led by the Commissioner of Internal Revenue, who is appointed to a five-year term by the President of the United States. The duties of the IRS include providing tax assistance to taxpayers; pursuing and resolving instances of erroneous or fraudulent tax filings; and overseeing various benefits programs. Visit www.IRS.gov to learn more.), among others, to enforce federal law in both its civil and criminal aspects. We have actively participated in international regulatory and criminal enforcement efforts, as well.
Those efforts are paying off. The past year alone has witnessed the indictment and arrest of the alleged operator of the world’s largest online child sexual exploitation market, involving an enforcement action that was coordinated with the disruption of that darknet market, the rescue of over 20 child victims, and the seizure of hundreds of thousands of dollars worth of bitcoin; the largest-ever seizure of cryptocurrency in the terrorism context, stemming from the dismantling of terrorist financing campaigns running into the millions of dollars involving Hamas’s military wing, al-Qaeda, and ISIS; the first-ever imposition of economic sanctions for virtual-asset-related malicious cyber activity; and a novel (and successful) use of the federal securities laws to protect investors
in the cryptocurrency space, resulting in the disgorgement of over $1.2 billion in ill-gotten gains in a single case. We expect these enforcement trends to continue.
This report concludes in Part III with a discussion of the ongoing challenges the government faces in cryptocurrency enforcement—particularly with respect
to business models (employed by certain cryptocurrency exchanges, platforms, kiosks, and casinos), and to activity (like “mixing” and “tumbling,” “chain hopping,” and certain instances of jurisdictional arbitrage) that may facilitate criminal activity.
The Challenges We Face
Those challenges map neatly onto the broader set of challenges that many emerging technologies present to law enforcement.
Blockchain-related technologies are complex and are difficult to learn; for example, the methods for executing crimes like pump-and-dump schemes are changing, and require investigators to familiarize themselves with everything from how initial coin offerings (ICOs) are conducted to how technologically-savvy people communicate on specialized communications applications. Not only are these emerging technologies difficult to learn, but the relevant markets also rapidly evolve. The ICO boom from a few years ago has given way to the exponential growth of Decentralized Finance markets in recent months—with all the associated complexities and difficulties for enforcers seeking to stay ahead of the curve and keep investors safe.
The global nature of the blockchain ecosystem adds a further layer of complexity. Crime has been expanding beyond national borders for years, but blockchain takes this globalization to another level. Parties conduct transactions and transfers between continents in a matter of minutes, and the digital infrastructure
of the blockchain itself almost always transcends territorial boundaries. Adding to the difficulty, some of the largest crypto-asset exchanges operate outside of the United States, and many still require nothing more than an unverified email address before allowing an individual to begin trading.
Finally, decentralized platforms, peer-to-peer exchangers, and anonymity-enhanced cryptocurrencies that use non-public or private blockchains all can further obscure financial transactions from legitimate scrutiny. As this Cryptocurrency Enforcement Framework makes clear, the challenges are significant. But so, too, are the resources that the U.S. Department of Justice, as well as the U.S. government as a whole, are dedicating to the effort, in collaboration with our international
partners.
The Web 3.0
Technologists often talk about the Web 3.0, the next phase of the internet’s evolution. On this vision, humans will reclaim the internet, their data, and their anonymity from large outside forces, whether they be corporate firms or government entities.
Cryptocurrency—a medium of exchange defined, at its core, by a sense of private, individual control, and whose underlying blockchain technology already provides the backbone for applications outside the digital currency context—is central to this decentralized, anonymized, and still-being-defined notion of a future in which “a more semantically intelligent web” leverages data that “will be used by algorithms to improve user experience and make the web more
personalized and familiar,” and in which users will no longer have to “rely on network and cellular providers that surveil the information going through their systems.”
Ultimately, the Web 3.0 is a vision about the nature of data itself, foretelling a world in which information is diffuse and dynamic—present everywhere at once, and therefore beyond any outsider’s grasp.
Only time will tell how, and in what form, the Web 3.0 finally takes shape. To its proponents, this vision marries technological innovation with human flourishing. This Cryptocurrency Enforcement Framework suggests that, however liberating the emerging glimpses of the Web 3.0 might seem to be, that vision also can pose uniquely dangerous threats to public safety. Confronting and addressing those threats is what good public policy should do—and what the crypto ecosystem itself may have to do, if its vision of the future is ever fully to take hold. Meanwhile, federal authorities will continue vigorously enforcing the law as it exists, and pursuing justice on behalf of the American people.
Sujit Raman, Chair,
Attorney General’s Cyber-Digital Task Force
United States Department of Justice
Washington, District of Columbia
What do you think about this?
Please share your thoughts in a comment below!
-/ 30 /-
Do You Need Support?
Get It Now!
SCARS provides the leading Support & Recovery program for relationship scamRelationship Scam A Relationship Scam is a one-to-one criminal act that involves a trust relationship and uses deception & manipulation to get a victim to give to the criminal something of value, such as money! Click here to learn more: What Is A Relationship Scam? victims – completely FREE!
Our managed peer supportPeer support Peer support occurs when people provide knowledge, experience, emotional, social or practical help to each other. It commonly refers to an initiative consisting of trained supporters and can take a number of forms such as peer mentoring, reflective listening (reflecting content and/or feelings), or in a support group. Peer support is also used to refer to initiatives where colleagues, members of self-help organizations and others meet, in person or online, to give each other connection and support on a reciprocal basis. Peer support is distinct from other forms of social support in that the source of support is a peer, a person who is similar in fundamental ways to the recipient of the support; their relationship is one of equality. A peer is in a position to offer support by virtue of relevant experience: he or she has "been there, done that" and can relate to others who are now in a similar situation. Trained peer support workers such as SCARS Volunteers receive special training and may be required to obtain Continuing Education Units, similar to clinical staff. Some other trained peer support workers may also be law-enforcement personnel and firefighters as well as emergency medical responders. groups allow victims to talk to other survivorsSurvivor A Scam Survivor is a victim who has been able to fully accept the reality of their situation. That they were the victim of a crime and are not to blame. They are working on their emotional recovery and reduction of any trauma either on their own, through a qualified support organization, or through counseling or therapy. And has done their duty and reported the crime to their local police, national police, and on Anyscam.com and recover in the most experienced environment possible, for as long as they need. Recovery takes as long as it takes – we put no limits on our support!
SCARS is the most trusted support & education provider in the world. Our team is certified in trauma-informedTrauma-Informed Trauma-informed care shifts the focus from “What’s wrong with you?” to “What happened to you?” A trauma-informed approach to care acknowledges that health care needs to have a complete picture of a patient’s life situation — past and present — in order to provide effective care services with a healing orientation. Adopting trauma-informed practices can potentially improve patient engagement, treatment adherence, and health outcomes. care, grief counselingCounseling Counseling is the professional guidance of the individual by utilizing psychological methods especially in collecting case history data, using various techniques of the personal interview, and testing interests and aptitudes. A mental health counselor (MHC), or counselor, is a person who works with individuals and groups to promote optimum mental and emotional health. Such persons may help individuals deal with issues associated with addiction and substance abuse; family, parenting, and marital problems; stress management; self-esteem; and aging. They may also work with "Social Workers", "Psychiatrists", and "Psychologists". SCARS does not provide mental health counseling., and so much more!
To apply to join our groups visit support.AgainstScams.org
We also offer separate support groupsSupport Groups In a support group, members provide each other with various types of help, usually nonprofessional and nonmaterial, for a particular shared, usually burdensome, characteristic, such as romance scams. Members with the same issues can come together for sharing coping strategies, to feel more empowered and for a sense of community. The help may take the form of providing and evaluating relevant information, relating personal experiences, listening to and accepting others' experiences, providing sympathetic understanding and establishing social networks. A support group may also work to inform the public or engage in advocacy. They can be supervised or not. SCARS support groups are moderated by the SCARS Team and or volunteers. for family & friends too.
Become a
SCARS STAR™ Member
SCARS offers memberships in our STAR program, which includes many benefits for a very low annual membership fee!
SCARS STAR Membership benefits include:
- FREE Counseling or Therapy Benefit from our partner BetterHelp.com
- Exclusive members-only content & publications
- Discounts on SCARS Self-Help Books Save
- And more!
To learn more about the SCARS STAR Membership visit membership.AgainstScams.org
To become a SCARS STAR Member right now visit join.AgainstScams.org
To Learn More Also Look At Our Article Catalogs
SCARS Printed Books For Every Scam SurvivorSurvivor A Scam Survivor is a victim who has been able to fully accept the reality of their situation. That they were the victim of a crime and are not to blame. They are working on their emotional recovery and reduction of any trauma either on their own, through a qualified support organization, or through counseling or therapy. And has done their duty and reported the crime to their local police, national police, and on Anyscam.com From SCARS Publishing
Visit shop.AgainstScams.org
Each is based on our SCARS Team’s 32 plus years of experience.
SCARS Website Visitors get an Extra 10% Discount
Use Discount Code “romanacescamsnow” at Checkout
SCARS GREEN BOOK
Self-Help Self-Paced Recovery Program Guide
LEARN HOW TO RECOVER ON YOUR OWN
This program is designed to help scamScam A Scam is a confidence trick - a crime - is an attempt to defraud a person or group after first gaining their trust through deception. Scams or confidence tricks exploit victims using their credulity, naïveté, compassion, vanity, irresponsibility, or greed and exploiting that. Researchers have defined confidence tricks as "a distinctive species of fraudulent conduct ... intending to further voluntary exchanges that are not mutually beneficial", as they "benefit con operators ('con men' - criminals) at the expense of their victims (the 'marks')". A scam is a crime even if no money was lost. victims struggling to recover on their own and for those who want to understand the overall process. You can be using other resources, such as traumaTrauma Emotional and psychological trauma is the result of extraordinarily stressful events that shatter your sense of security, making you feel helpless in a dangerous world. Psychological trauma can leave you struggling with upsetting emotions, memories, and anxiety that won’t go away. It can also leave you feeling numb, disconnected, and unable to trust other people. Traumatic experiences often involve a threat to life or safety or other emotional shocks, but any situation that leaves you feeling overwhelmed and isolated can result in trauma, even if it doesn’t involve physical harm. It’s not the objective circumstances that determine whether an event is traumatic, but your subjective emotional experience of the event. The more frightened and helpless you feel, the more likely you are to be traumatized. Trauma requires treatment, either through counseling or therapy or through trauma-oriented support programs, such as those offered by SCARS. counseling or therapy, qualified support groups, or completely independent – on your own!
The SCARS Steps program is a complete program and is provided for the purpose of helping scam victims to overcome this experience. Throughout this SCARS Steps Program, we speak about issues and challenges that a victim may have and help guide them through their recovery. But each person is different and it is important to understand your own reasons for being vulnerable to being scammed.
After the trauma of being scammed, you need to take steps to recover and move on. This may be an alternative to counseling in the short term, but we still encourage you to seek out professional help & support. Throughout this SCARS Steps Program, we speak about issues, challenges, defects, or problems that a victim may have in a generalized way.
The SCARS GREEN BOOK will help you recover from your scam offline and it will always be there when you need it!
SCARS SLATE BOOK – Let Us Explain What Happened!
A Guide For Families & Friends Of Scam Victims
HOW TO HELP ROMANCE SCAM VICTIMS FOR FAMILIES & FRIENDS OF SCAM VICTIMS
This SCARS Publishing book represents a complete guide to help the families and friends understand how these scamsScams A Scam is a confidence trick - a crime - is an attempt to defraud a person or group after first gaining their trust through deception. Scams or confidence tricks exploit victims using their credulity, naïveté, compassion, vanity, irresponsibility, or greed and exploiting that. Researchers have defined confidence tricks as "a distinctive species of fraudulent conduct ... intending to further voluntary exchanges that are not mutually beneficial", as they "benefit con operators ('con men' - criminals) at the expense of their victims (the 'marks')". A scam is a crime even if no money was lost. work and how to help the victim.
The SCARS Slate Book should be purchased by family and friends to better understand what happened to the victim and the traumatic impact on them. But it can also be shared by the victim so that they do not have to explain to family and friends about the scam. This publication is to help others to help Scam Victims to make it through this traumatic experience and recover.
Each person is different and it is important to understand how relationship scamsRelationship Scam A Relationship Scam is a one-to-one criminal act that involves a trust relationship and uses deception & manipulation to get a victim to give to the criminal something of value, such as money! Click here to learn more: What Is A Relationship Scam? work and why people are vulnerable; to being scammed, how they were lured in, then groomed and manipulated. This understanding is essential in helping them through the process of ending the scam and then on to recovery. The SCARS Slate Book will provide the information necessary to help support a victim through this process.
SCARS RED BOOK
Your Personal Scam Evidence & Crime Record Organizer
ORGANIZE YOUR INFORMATION TO MAKE THE REPORTING PROCESS SIMPLE!
Helps you get and stay organized. This publication is to help Scam Victims organize their crime information. Complete this information before reporting to the police then bring this book with you
Before or after reporting to the police the RED BOOK gives you a dedicated tool to record all the essential facts of this crime. The Victim, the Scammers, the Money, and your Police interactions. Everything that really matters can be easily recorded for your immediate use and for the future!
As we have seen, money recovery/repayment programs can become available years after the scam ends and you need to keep all the details of this crime in case it is needed. We have also seen scammers being extradited to the U.S. and other countries, this will help in the event you testify or give statements, Additionally, this helps you have your information ready to qualify for victims’ benefits, compensation, or aid.
The Official SCARS RED BOOK is your way of recording all the important facts of this crime so that you do not lose essential information, Complete the RED BOOK then put it away with the confidence that you will have it if or when it is needed.
100% of all profit goes to help SCARS help more scam victims worldwide.
Your generous purchase allows us to maintain our scam avoidance, support, and recovery services. Please help SCARS and stand proud.
PLEASE SHARE OUR ARTICLES WITH YOUR FRIENDS & FAMILY
HELP OTHERS STAY SAFE ONLINE – YOUR KNOWLEDGE CAN MAKE THE DIFFERENCE!
THE NEXT VICTIM MIGHT BE YOUR OWN FAMILY MEMBER OR BEST FRIEND!
Leave A Comment