STUDY ON CRYPTOCURRENCY AND CYBER LAW: A LEGAL PERSPECTIVE BY: ANUSHA M J
STUDY ON
CRYPTOCURRENCY AND CYBER LAW: A LEGAL PERSPECTIVE
AUTHORED BY: ANUSHA M J
Designation: Assistant
Professor
Institution: Patel Law
College, Bengaluru
ABSTRACT
Cryptocurrencies are digital currencies that make use of blockchain
technology and encryption to make transactions secure and anonymous. Bitcoin
and other well-known cryptocurrencies have lot of attention in recent years.
This crypto currency also known as digital coin or virtual currency is obtained
and sold over the blockchain technology. Since the launch of Bitcoin in 2009,
the crypto currency has exploded in popularity, taking the market by storm.
Bitcoin, the first and most popular cryptocurrency, in paving the way as a
disruptive technology to long-standing and unchanging financial payment
systems. While cryptocurrencies are unlikely to replace traditional fiat
currency, they have the potential to alter how Internet-connected global
markets interact with one another, removing the restrictions that exist around
traditional national currencies and exchange rates. This paper is divided into
two parts. Firstly, it outlines the term Cryptocurrency and Blockchain, which
includes meaning, types, Features etc.., and also types of Cryptocurrency
available in India. Secondly; this paper outlines cyber crimes, Types of Cyber
attack where they take advantage of crypto currencies.
Key words: - Cryptocurrency, Bitcoin, Blockchain, Cyber attack, Digital Coin, Virtual
currency
1.1 INTRODUCTION
The terms blockchain and
cryptocurrency are frequently used interchangeably. There is, however, a
significant distinction between the two. Cryptocurrencies are digital
currencies that use the blockchain as a ledger to keep track of transactions.
Beyond cryptocurrencies, lockchains can be used to store and access medical
data, supply chain and logistics data, and financial records, among other
things.
The term "cryptocurrency"
refers to an internet-based virtual currency in which cryptography is used to
verify ownership of a specific unit of value. It’s worth varies according on
market conditions. Bitcoins,
for illustration, have no physical presence and are controlled by entries in a
large database known as the "blockchain," which is kept on a
peer-to-peer network. In 2009, Bitcoin became the first decentralised
cryptocurrency[1]. Since then, a number of other
cryptocurrencies have realised their potential. 'Altcoins' or 'bitcoin
alternatives' are terms used to describe them. The use of the blockchain-based
transaction database of bitcoin as a DLT (Distributed Ledger Technology) is
related to the decentralised control.
Cyber law is a relatively new area of
law. Since its inception in the sphere of law, it has been constantly evolving.
However, as new technologies and technological paradigms emerge, Cyber law is
attempting to adapt to the new technologies and difficulties that are arising
in its field of law, with blockchain being one of them that is continually
evolving and developing throughout the world[2]. Blockchain is just a growing list
of records that are linked using cryptography in today's reality. Every block
contains the previous block's hash cryptography, transaction data, and a
timestamp. The term "blockchain" refers to a data structure that
stores transactional records while also ensuring security, transparency, and
decentralisation.
1.2 HISTORICAL DEVELOPMENT OF
CRYPTOCURRENCY
In 1980, the idea of cryptocurrency
Encryption was first discussed in
1989, and American cryptographer David Chaum devised digital cash a few years
later in 1980, relying on cryptography to protect and verify transactions.
However, cryptographic protocols and technology that would allow for the
establishment of a genuinely decentralised digital currency did not begin to be
developed until the early 1990s.
A document titled Bitcoin: A
Peer-to-Peer Electronic Cash Technique, written by Satoshi Nakamoto[3] (a pseudonym), proposed a system for
producing a virtual currency that did not require trust in a third party in
October 2008. The cryptocurrency revolution was effectively started by
Nakamoto's paper.
In 2009, the launch of Bitcoins
Bitcoin is a digital money that may
be used to make payments anywhere around the world. The Bitcoin protocol was
designed by Satoshi Nakamoto in 2009, the same year it was released as
open-source software. People who need to transmit money across borders without
being hampered by banks or governments are increasingly turning to Bitcoin.
Despite this, some people are unsure what to do with their Bitcoins due to
their sudden growth in value.
On the 12th of January, 2009,
Nakamoto and Hal Finney made the first Bitcoin transaction. Someone didn't
grasp how important this new technology may be until February of the following
year, when one customer paid 10,000 Bitcoins for two pizzas delivered by Papa
John's. That business deal is now worth millions of dollars.
1.3 CONCEPTUALIZING CONCEPTS
1.3.1 Cryptocurrency
Cryptocurrency is a digitised asset
that is dispersed across several computers in a shared network. Because of its decentralised
character, this network is immune to government regulatory oversight. The word
"cryptocurrency" comes from the encryption techniques that are
employed to keep the network safe.
A cryptocurrency is a digital
currency that is represented by an encrypted data string. A peer-to-peer
network known as a blockchain monitors and organises it, as well as serving as
a secure database of transactions such as buying, selling, and transferring.
Cryptocurrencies, unlike actual money, are decentralised, meaning they are not
issued by governments or other financial organisations.
Types of Cryptocurrency
Bitcoin was the first sort of crypto
currency, and it remains the most widely used, precious, and popular to this
day. Other cryptocurrencies, in addition to Bitcoin, have been developed with
differing degrees of functionality and requirements. Some are forked versions
of bitcoin, while others were built from the ground up.
Bitcoin was created in 2009 by a
person or group known only as "Satoshi Nakamoto." There were about
18.6 million bitcoins in circulation as of March 2021, with a total market
valuation of around $927 billion. Altcoins are the alternative cryptocurrencies
that emerged as a result of Bitcoin's success. The following are some
well-known altcoins:
·
Litecoin
·
Peercoin
·
Namecoin
·
Ethereum
·
Cardana
The entire value of all
cryptocurrencies in existence is currently over $1.5 trillion, with Bitcoin
accounting for more than 60% of that total.
Advantages of Cryptocurrency
·
Funds
will be easily transferred between two parties without the use of a third party
such as credit/debit cards or banks.
·
Payments
are safe and secure, and it provides an unprecedented level of privacy when
compared to other online transactions.
·
Modern
cryptocurrency systems include a user "wallet" or account address
that can only be accessed via a public key and a pirate key. Only the wallet's
owner has access to the private key.
·
The
transfer of funds is completed with a minimum of processing fees.
Disadvantages of Cryptocurrency
·
Because
of their almost impenetrable nature, cryptocurrency transactions are ripe for
criminal operations such as money laundering, tax evasion, and maybe even
terror financing.
·
Payments
aren't refundable.
·
Cryptocurrencies
are not widely recognised and have limited value in other countries.
·
Some
people worry that cryptocurrencies like Bitcoin aren't based on anything
tangible. According to certain study, the cost of generating a Bitcoin, which
needs a growing quantity of energy, is closely tied to its market price[4].
Features of Cryptocurrency
The following are the features:-
·
Available in the Digital Environment
Cryptocurrencies can only be used in a digital setting. The money can be
viewed on any computer or mobile device that has internet access.
This currency does not have a tangible form like other currencies. The
cryptocurrency does not have the same tactile sensation as cash. This currency
must be kept in digital wallets, which are software programmes that allow you
to transfer and receive bitcoins and other cryptocurrencies.
·
Operate using a Decentralized Network
Cryptocurrency servers do not exist. This currency would be available on
a wide range of computers and devices. There is no authority in charge of
cryptocurrency transactions, such as a government, a person, a bank, or any
other body.
·
Part of Peer-to-peer Network
The peer-to-peer network would be the foundation for the coin. This
network will ensure that transactions are carried out in a secure manner. Fraud
and third-party influence will be avoided because to the decentralised network.
It speeds up and secures transactions. This network enables users to send
bitcoins or other cryptocurrencies straight to another user. Others in the
network having the bitcoin address can see the transactions of two people. When
a transaction is successfully performed, it is logged in the ledger. This
ledger, which is also known as a blockchain, is visible to all users on the
network.
·
Use Encryption
Encrypted data is stored in the form of code and is protected. Only those
with the private key are able to access it. Cryptography is the process of
converting any piece of data into a secret code. It is a frequently used way in
the cryptography exchange to ensure that transactions are highly safe,
anonymous, and not subject to any authority's oversight.
·
Permanent Transactions
The ledger would be used to keep track of your transactions. The data on
the records cannot be changed. It is irreversible.
·
Keep the Transactions Anonymous
Only the address of the cryptocurrency would be published, not the
identities of the people involved in the transaction. Their identity would be
hidden behind the encryption[5].
1.4 CONCEPT OF CYBER CRIME IN
RELATION WITH CRYPTOCURRENCY
Crypto transactions are not closely
monitored since cryptocurrencies are decentralised, that is, they are not
regulated by a government authority such as the Bank of Canada. As a result,
alternative currencies open up plenty of new opportunities for cybercriminals.
Hackers can gain access to
cryptocurrency exchanges and trading platforms in order to make anonymous
transactions or steal money. Cryptocurrencies are often used by criminal
organisations to launder money. In 2018, criminals in Europe used
cryptocurrencies to launder $5.5 billion in filthy money. Because crypto
transactions do not require real names, thieves can keep it secret while
stealing money or committing other crimes. They can also shift these ill-gotten
funds across borders because international anti-crime agencies are unlikely to
monitor them. Cybercriminals
also use anonymity to profit from false transactions on peer-to-peer/sharing
economy platforms.
Cryptocurrencies (particularly
Bitcoin) are also contributing to the growth in ransomware assaults. Several
similar attacks affected various organisations in the United States, the United
Kingdom, Australia, and others in 2021. The attackers frequently wanted
cryptocurrency ransom payments. Many of the organisations who were affected
paid the ransoms in order to regain access to their locked systems and data.
Colonial Pipeline, an American oil pipeline operator, is the most recent
example, having paid hackers approximately $5 million in ransom – in
difficult-to-trace Bitcoins[6].
Criminals demand ransom in
cryptocurrency because they know they won't be traced - let alone arrested.
Hackers can remain anonymous in cyberspace while attacking and collecting
ransoms since their victim is thousands of kilometres away.
Other cybercrimes that can be carried
out (or completed) anonymously utilising bitcoins include:
·
Crypto-jacking
is when criminals stealthily mine additional cryptocurrency units using a
user's browser.
·
Users'
information from trading platforms is stolen and sold on the Dark Web for
profit through hacked registration forms.
·
Malware
attacks: Malware steals cryptocurrency mining resources or cryptocurrencies
from online wallets.
Crypto phishing assaults are getting
more widespread as well. Victims are sent sophisticated emails that guide them
to a spoof version of a legitimate cryptocurrency site. They then steal their
credentials as well as their money. In July 2020, hackers gained access to 130+
Twitter accounts (including Elon Musk and Bill Gates) and used them to promote
a Bitcoin giveaway fraud. Because of the increasingly severe role of
cryptocurrencies in cybercrime, various government agencies have called for global
crypto regulation and usage restrictions[7].
1.5 CYBER ATTACK WHERE THEY TAKE
ADVANTAGE OF CRYPTO CURRENCIES
There are various sorts of
cyberattacks in which criminals use cryptocurrencies to facilitate the process.
The following are some of them[8]:
·
Ransomware
The most advanced trend in history is
ransomware. Its purpose is to extract money from users by encrypting their
data. As previously said, ransomware sends a message or email including a link.
This message is a threat, requesting that the user deposit money in order to
recover access or control. The perpetrator can't be tracked or linked to
real-world data, therefore he demands a large sum of money in bitcoin or
another altcoin. WannaCry and NotPetya, two ransomware attacks in 2017, brought
the market to a halt and damaged countless businesses and organisations.
·
Extortion
by DDoS
DDoS extortion is also referred to as
RDoS, which stands for ransom-driven DDoS. It is the simplest and oldest method
of profiting. These types of viruses are well-equipped to accept cryptocurrency
payments. And it's extremely tough for investigators to monitor the money flow.
As a result, funds are simply transferred from victims to crooks. The thieves
use a DDoS attack to take control of the operating site, then demand that the
organisations pay them a large bitcoin sum to recover control. In 2014, the
extortion technique DD4BC was discovered, which was used to assault a number of
websites. Europol apprehended the group later that year. Even after that,
attackers launched a series of modest DDoS operations to instil panic in the
public about their power and skills.
·
Cryptojacking
Cryptojacking is a sort of attack in
which hackers produce cryptocurrency using the computational power of a
compromised device. This is done without the knowledge of the owner.
Cryptojacking can damage cellphones, servers, laptops, and Internet of Things
(IoT) devices. Device slowing, increased energy usage, overheating batteries,
decreased productivity, and device malfunction are all consequences of
cryptojacking. Cryptojacking exploded the cryptocurrency market in 2017 and
2018. The reason for this is the rise in cryptocurrency values and the broader
resurgence of the crypto market.
·
Cryptomining
Illegal cryptocurrency mining is also
a result of cryptomining. Active Crypto Mining and passive Crypto Mining are
the two types of Crypto Mining. Both strategies are used to take use of a
victim's processing power without the owners' permission. Criminals used to
target Bitcoin, but in 2019 they moved their focus to Monero.
·
Hacking
of Cryptocurrencies
Criminals have hacked cryptocurrency
numerous times throughout history. Hackers have always found it to be an
interesting target. Hackers are targeting cryptocurrency assets, exchanges, and
other services. Many cryptocurrencies were hacked in 2018, with over $1 billion
worth of cryptocurrency stolen from exchanges and networks.
Protection of Cryptocurrency from
cybercrime
There are steps that can be taken to
safeguard cryptocurrencies against cybercrime and other criminal activities[9].
1. Never open unknown or suspicious
email attachments or links.
2. Make regular offline backups and
check for programme updates on a regular basis.
3. Installing free programmes from
unauthorised sources is not a good idea.
4. Create strong passwords for PCs,
mobile devices, and Internet of Things (IoT) devices.
5. Make use of antivirus software that
has been well tested.
6. Keep an eye on the computer or gadget
to see if it lags or stops working.
7. Think about getting a DDoS protection
system to protect yourself from both massive and little attacks.
1.6 CONCLUSION
Cryptocurrencies have suddenly
emerged as a reality, gaining tremendous popularity in a short amount of time
and evolving at a rapid pace. The rapid development of new currencies and
technologies continues to present ongoing issues for both responsible
technology users and regulators. Due to their anonymity, crypto currencies have
been linked to a variety of crimes, including facilitating marketplaces for
assassins, business attacks, child exploitation (including pornography),
corporate espionage, counterfeit currencies, drugs, fake IDs and passports,
high yield investment schemes, sexual exploitation, stolen credit cards and
credit card numbers, and weapons. The rapid development of new currencies and
technologies continues to present ongoing challenges for both responsible users
of technology and regulators. While technology advancements offer tremendous
opportunity to improve humanity's health, living conditions, and overall
well-being, they also pose significant obstacles to nation states.
In India, cryptocurrency is still in
its adolescence. Its existence is estimated to be less than a decade.
Nonetheless, it is vulnerable to a variety of dangers. Even history shows how
many times cryptocurrencies have been targeted by cybercriminals. As a result,
the level of protection and security in this industry should be improved.
[1] Future of Cryptocurrency and Legal aspects related to it, https://blog.ipleaders.in/cryptocurrency-legal-aspects/
(Last accessed on 18th April, 2022 @ 8:39 P M)
[2] Blockchain and Cyber Law, https://www.legalserviceindia.com/legal/article-2789-blockchain-and-cyber-law.html
(Last accessed on 18th April, 2022 @ 9:00 P M)
[3] The idea and a brief history of Cryptocurrencies, https://guardian.ng/technology/tech/the-idea-and-a-brief-history-of-cryptocurrencies/
(Last accessed on 18th April, 2022 @ 10:30 P M)
[4] Cryptocurrency, https://byjus.com/current-affairs/cryptocurrency/
(Last accessed on 18th April, 2022 @ 10:58 P M)
[5] What are the key features of Cryptocurrency and its working, https://e-cryptonews.com/what-are-the-key-features-cryptocurrency-and-its-working/ (Last accessed on 18th
April, 2022@ 11:15 P M)
[6] How cryptocurrencies can enable cybercrime, https://www.packetlabs.net/posts/cryptocurrencies-enable-cybercrime/
(Last accessed 18th April, 2022 @ 11:21 P M)
[7] Ibid.
[8] How is the Cryptocurrecy being used in cybercrime, https://www.analyticssteps.com/blogs/how-cryptocurrency-being-used-cybercrime
(Last accessed on 19th April, 2022 @ 11:15 A M)
[9] Ibid.