An Essential Guide to the Tools and Techniques of Cryptocurrency Forensics
Cryptocurrency is exploding in popularity. Once relegated to the Dark Web and used primarily for illicit activities, virtual currencies such as Bitcoin and Ethereum are now being used as investments and in more mainstream transactions. As major banks keep close watch, these currencies are gaining ground, with all signs pointing toward expansion in use and accessibility. There is currently $150 billion in circulating cryptocurrency, with $3 billion changing hands daily yet none of this can be traced by normal means. Investigating Cryptocurrencies provides cyber and financial investigators with the necessary background, techniques, and methodologies to break through the blockchain "lockdown" and investigate crimes involving cryptocurrency transactions.
Globally recognized cybersecurity and forensics expert Nick Furneaux demystifies blockchain technology and gives investigators who are entering this new playing field practical guidance. By linking the familiar investigative workflow with essential tools and techniques that are specific to cryptocurrency forensics, Furneaux has compiled a complete playbook for all major stages of an investigation. Topics discussed in this book include cryptocurrency detection, blockchain visualization, address and transaction extraction, micromessage detection, and much more. Real–world tools and techniques give readers insight into the practices used by criminals. With cryptocurrencies rapidly advancing into the mainstream and bringing outside crime into the cybersecurity realm, this book provides the critical information that forensics professionals will need to remain effective as currency moves online.
With step–by–step instruction bolstered by in–depth explanations and expert perspective, Investigating Cryptocurrencies will help you:
- Develop a deeper understanding of blockchain and transaction technologies
- Set up and run a cryptocurrency account
- Access raw data on blockchain ledgers
- Track transactions and build information on specific addresses
- Identify the real–world users behind a transaction
- Understand "coin" seizure methodology
- Use appropriate technology and techniques during investigations