Categories: Technology

How governments seize millions in stolen cryptocurrency

[ad_1]

After meeting probable-cause and burden-of-proof requirements, law enforcement can get seizure warrants for any illicit funds that eventually land on compliant exchanges—and many funds eventually do. Law enforcement will then work with the crypto business to move the funds to a government-controlled wallet or freeze them.

“Another method is that the adversary or a member of their conspiracy cooperates and provides private keys to the government as part of a plea negotiation or cooperation to benefit them in some way,” says Gurvais Grigg, who was assistant director of the FBI before becoming an executive at Chainalysis.

The third possibility is to compromise the target’s security—which can happen in numerous ways. 

“When you’re talking about a country like North Korea or Russian cyber criminal organizations, it can take years of building out networks of confidential informants and working with other governments, even those that aren’t always friendly to us,” Redbord says. “One piece is potentially hacking into a server or machine or, frankly more likely, just great police work.”

For hackers outside the United States, the task is trickier. An arrest can be impossible if the suspect is in a country that doesn’t cooperate with Washington, so prosecutors focus elsewhere.

“Good prosecutors understand that a criminal prosecution is only one part of the larger investigation and results in these types of cases,” says Redbord, who was a prosecutor for 11 years. Instead, the focus is the money.

The other aspects are regulation, politics, and diplomacy. There are several notable “rogue areas” around the world that don’t comply with international anti-money-laundering rules, Grigg says, including North Korea and Iran, “but those parts of the world are becoming smaller and smaller islands.” There are two reasons for that. If you’re a business, compliance means you have a chance to access the world’s richest markets; if you’re a nation, it means your own lawful orders can be honored in return.

What comes next?

As governments become better at surveilling and seizing cryptocurrency, hackers and criminal tactics continue to evolve.

[ad_2]
Source link
Admin

Recent Posts

How to Remove Burnt-on Grease from Your Oven

Burnt-on grease isn't just an eyesore. It stinks up the kitchen and makes cooking a…

3 months ago

Air India: A Journey Through Time

Hey there! Ready to embark on a historical journey with Air India? Whether you're a…

3 months ago

The Rise of Smart Altcoins: How 2025 Is Reshaping the Crypto Hierarchy

In 2017, altcoins were seen as experimental side projects to Bitcoin. By 2021, they became…

4 months ago

5 Services That Can Transform Your Shopping Center in Las Vegas into a Must-Visit Destination

Shopping centers in Las Vegas have a unique opportunity to stand out by offering not…

4 months ago

Levitra Dosage: Guidelines for Safe Use

Levitra, a widely recognized medication for treating erectile dysfunction (ED), has proven to be a…

4 months ago

Practical Tips for Carpet Cleaning on a Budget

Have you ever looked down at your carpet and wondered if there’s a budget-friendly way…

5 months ago