How Did Dread Pirate Roberts Acquire and Protect his Bitcoin Wealth?
نویسندگان
چکیده
The Bitcoin scheme is one of the most popular and talked about alternative payment schemes. One of the most active parts of the Bitcoin ecosystem was the Silk Road marketplace, in which highly illegal substances and services were traded. It was run by a person who called himself Dread Pirate Roberts (DPR), whose bitcoin holdings are estimated to be worth hundreds of millions of dollars at today’s exchange rate. On October 1-st 2013, the FBI arrested a 29 year old person named Ross William Ulbricht, claiming that he is DPR, and seizing a small fraction of his bitcoin wealth. In this paper we use the publicly available record to trace the evolution of his holdings in order to find how he acquired and how he tried to hide them from the authorities. In particular, we trace the amounts he received and the amounts he transferred out of his accounts, and show that all his Silk Road commissions from the months of May, June and September 2013, along with numerous other amounts, were not seized by the FBI. This analysis demonstrates the power of data mining techniques in analyzing large payment systems, and especially publicly available transaction graphs of the type provided by the Bitcoin scheme.
منابع مشابه
Mixing politics and crime - The prevalence and decline of political discourse on the cryptomarket.
BACKGROUND Dread Pirate Roberts, founder of the first cryptomarket for illicit drugs named Silk Road, articulated libertarian political motives for his ventures. Previous research argues that there is a significant political component present or involved in cryptomarket drug dealing which is specifically libertarian. The aim of the paper is to investigate the prevalence of political discourses ...
متن کاملQuantitative Analysis of the Full Bitcoin Transaction Graph
The Bitcoin scheme is a rare example of a large scale global payment system in which all the transactions are publicly accessible (but in an anonymous way). We downloaded the full history of this scheme, and analyzed many statistical properties of its associated transaction graph. In this paper we answer for the first time a variety of interesting questions about the typical behavior of account...
متن کاملThe Other Side of the Coin: User Experiences with Bitcoin Security and Privacy
We present the first large-scale survey to investigate how users experience the Bitcoin ecosystem in terms of security, privacy and anonymity. We surveyed 990 Bitcoin users to determine Bitcoin management strategies and identified how users deploy security measures to protect their keys and bitcoins. We found that about 46% of our participants use web-hosted solutions to manage at least some of...
متن کاملPirate Evolution: How to Make the Most of Your Traitor Keys
We introduce a novel attack concept against trace and revoke schemes called pirate evolution. In this setting, the attacker, called an evolving pirate, is handed a number of traitor keys and produces a number of generations of pirate decoders that are successively disabled by the trace and revoke system. A trace and revoke scheme is susceptible to pirate evolution when the number of decoders th...
متن کاملOf Bitcoins, Independently Wealthy Software, and the Zero-member Llc
An innovative software technology known as Bitcoin has been in the news recently, though mostly for the wrong reasons. The financial press, as it typically does, aims to fuel speculative predictions on future market prices, and Bitcoin has captured the press’s attention largely because of an extremely rapid growth in the price of the scarce units of account that the Bitcoin technology creates. ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013