New Bitcoin Analytics Tool

US Department of Homeland Security Science and Technology Directorate (DHS S&T) is funding the development of a new Bitcoin analytics tool.

As Bitcoin becomes an increasingly accepted medium of exchange across the global economy, criminals have turned to the digital currency for their transactions, using it for money laundering and thus making it harder for law enforcement to keep track of users. Law enforcement’s most immediate need is to reduce the time and resources necessary to trace illicit commerce.

According to Sandia, a new research lab preparing the tool, its work for the DHS could ultimately be delivered to other federal law enforcement agencies.

DHS S&T requested Sandia to set up a graphical user interface or a front end on the research environment so agents can test the algorithms Sandia is using in actual investigations.

The new Homeland Security Bitcoin analytics tool is currently being developed according to a specific set of requirements. Sandia conducted a systems analysis of illicit e-commerce focusing on Bitcoin. 

The team set up a research environment to experiment with other algorithms that can de-anonymize illicit Bitcoin users. The research includes a mix of traditional and novel investigative techniques, along with existing financial regulation and innovative policy and process tools.

Once de-anonymization occurs, law enforcement can link the Bitcoin addresses to a specific alias and they will know all of the Bitcoin addresses they need to deal with.

The user interface to make this tool accessible to law enforcement agents still needs to be developed. Analysts have mentioned this new Bitcoin analytics tool should only be used as part of “broader efforts involving multiple angles”.

According to livebitcoinnews.com, if Homeland Security would be able to weed out the illicit elements of Bitcoin commerce, Bitcoin’s perception by the public will change as well. In turn, this can lead to increased global adoption of the Bitcoin system.

I-HLS

 

« Effective Drone Defence & Control
Financial Institutions & Cybercrime »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Charlton Networks

Charlton Networks

Charlton Networks provide a complete range of IT infrastructure, network and security solutions aimed at SME companies.

Prewen

Prewen

Prewen provide solutions to protect sensitive data across the organisation.

InfoWatch

InfoWatch

InfoWatch solutions allow you to protect data and information assets that are critically important to your business.

Ensighten

Ensighten

Ensighten is a leader in Website Security & Privacy Compliance. Protect your website from malicious attacks, monitor & detect vulnerabilities, protect consumer data.

Network Intelligence

Network Intelligence

Network Intelligence delivers a comprehensive suite of AI-powered cybersecurity solutions built on the ADVISE framework.

Cyber Gate Defense (CyberGate)

Cyber Gate Defense (CyberGate)

CyberGate is an Emirati establishment founded with an objective to provide cyber security services that would improve the overarching cyber security posture of the UAE.

Phy-Cy.X Security Group

Phy-Cy.X Security Group

Phy-Cy.X specialize in the “Physics” of Information Security through both physical and cyber domains. We are not an IT company, we ARE an Information Security company.

UnderDefense

UnderDefense

UnderDefense provides cyber resiliency consulting and technology-enabled services to anticipate, manage and defend against cyber threats.

CliftonLarsonAllen (CLA)

CliftonLarsonAllen (CLA)

CLA exists to create opportunities for our clients through industry-focused advisory, outsourcing, audit, tax, and consulting services.

SharkStriker

SharkStriker

SharkStriker is a US based managed security services provider with SOCs and offices across the globe.

Purism

Purism

Purism works with hardware component manufactures and the free software community to build high quality hardware that respects your digital life.

SoftwareONE

SoftwareONE

SoftwareONE is a leading global provider of end-to-end software and cloud technology solutions.

Merkle Science

Merkle Science

Merkle Science provides next generation risk mitigation, compliance and forensics for crypto-native businesses, DeFi participants, financial institutions & government agencies.

Aikido Security

Aikido Security

Aikido is the no-nonsense security platform for developers. Secure your code, cloud, and runtime in one central system. Find and fix vulnerabilities automatically.

Soteria Cybersecurity

Soteria Cybersecurity

Soteria is your trusted Cybersecurity Partner in IT and OT.

Cyscomply

Cyscomply

Cyscomply is an AI-powered self-assessment platform to identify gaps, benchmark against global standards and take the right action. You can assess against NIST CSF, DORA, ISO 27001, NIST 800-171.