Seizure of Bitfinex funds is a reminder that crypto is no good for money launderers

Published at: Feb. 26, 2022

As public understanding of how digital assets work becomes more nuanced along with the mainstreaming of crypto, the language of Bitcoin’s (BTC) “anonymity” gradually becomes a thing of the past. High-profile law enforcement operations such as the one that recently led to the U.S. government seizing some $3.6 billion worth of crypto are particularly instrumental in driving home the idea that assets whose transaction history is recorded on an open, distributed ledger are better described as “pseudonymous,” and that such a design is not particularly favorable for those wishing to get away with stolen funds.

No matter how hard criminals try to obscure the movement of ill-gotten digital money, at some point in the transaction chain they are likely to invoke addresses to which personal details have been tied. Here is how it went down in the Bitfinex case, according to the documents made public by the U.S. government.

Too comfortable too early

A fascinating statement by a special agent assigned to the Internal Revenue Service, Criminal Investigation (IRS-CI) details a process whereby the U.S. federal government’s operatives got a whiff of the couple suspected of laundering the money stolen in the 2016 Bitfinex hack.

The document describes a large-scale operation to conceal the traces of stolen Bitcoin that involved thousands of transactions passing through multiple transit hubs such as darknet marketplaces, self-hosted wallets and centralized cryptocurrency exchanges.

In the first step, the suspects ran the crypto earmarked as being looted in the Bitfinex heist through darknet market AlphaBay. From there, a portion of funds traveled to six accounts on various crypto exchanges that were, as investigators later found, all registered using email accounts hosted by the same provider in India. The emails shared similar naming styles, while the accounts exhibited similar patterns of trading behavior.

Related: Making sense of the Bitfinex Bitcoin billions

The chain wore on, and the BTC that law enforcement followed was further funneled to a slew of self-hosted wallets and other exchange accounts, a few of them registered in the real name of one of the suspects. Following along the investigators’ narrative, a reader eventually gets an impression that, at one point, Ilya Lichtenstein and Heather Morgan felt that they had done enough to cover up their tracks and that they could spend some of the money on themselves.

That was it: Gold bars and a Walmart gift card, purchased using the funds traceable back to the Bitfinex hack and delivered to Lichtenstein and Morgan’s home address. Everything was right there on the ledger. The resulting report reads as a compelling description of a crime that has been reverse-engineered using an immutable record of transactions.

Following the money

The scale of the investigation was perhaps even more formidable than that of the laundering operation. Despite the suspects’ years-long efforts to obscure the movement of the funds, government agents were able to gradually unravel the paths by which the majority of stolen BTC traveled, and ultimately seize it. This goes to show that the U.S. government’s capacity to follow the money on the blockchain is at least on par with the tactics that the people behind some of the major crypto heists are using to escape the law.

Speaking of the investigation, Marina Khaustova, chief executive officer at Crystal Blockchain Analytics, noted that the Bitfinex case is an especially hard one to crack due to the sheer amount of stolen funds and the perpetrators’ extensive efforts to conceal their operations. She commented to Cointelegraph:

“Any case of this size, which has been running for years, it will no doubt take a long time for financial investigators to examine and understand the data they have before using it as evidence.”

The U.S. government agents were well-resourced and had access to state-of-the-art blockchain analytics software as they tackled the case. It is no secret that some of the leading players of the blockchain intelligence industry supply law enforcement in multiple countries, the United States included, with software solutions for digital asset tracing.

One possible explanation of why Lichtenstein and Morgan ultimately got busted is the seeming nonchalance with which they abandoned caution and began spending the allegedly laundered funds in their own name. Were they simply not smart enough, or is it because law enforcement has gone unprecedentedly deep into the transaction chain, deeper than the suspects could reasonably expect?

Khaustova thinks that there was “a bit of carelessness to the methods employed” as the suspects let investigators obtain one of the key documents – which allowed them to link email addresses to exchanges, KYC records and personal accounts – from cloud storage.

Yet, it is also true that there is a point where any crypto launderer has to step out of the shadows and turn the stolen funds into goods and services they can use, at which point, they become vulnerable to deanonymization. The Bitfinex investigation showed that, if law enforcement is bent on tracing the suspects to that point of “cashing out,” there is little that criminals can do to avoid getting caught.

A case to be made

The big-picture takeaway here is that governments — the U.S. government in particular, but many others are not too far behind when it comes to bolstering their blockchain-tracing capacities — are already up to speed with the tactics and techniques that crypto launderers are using. The blockchain’s perfect traceability could have been a theoretical argument some years ago, but now it is an empirically proven reality, as evidenced by enforcement practice.

There are two big reasons why this notion is good for the crypto industry. One is that there could be some degree of recourse for the victims of major crypto heists. Granted, not every instance of crypto theft will attract the scarce attention of federal investigators, but the most high-profile and egregious ones certainly will.

Another powerful consequence of law enforcement’s newfound prowess with blockchain tracing is that it renders some regulators’ tired argument of “crypto as a perfect tool for money laundering” obsolete. As real-life cases demonstrate, digital assets are, in fact, opposite to that. Hammering this point into policymakers’ minds will eventually moot one of the fundamental anti-crypto narratives.

Tags
Law
Irs
Usa
Related Posts
PoS validator turns down IRS tax refund offer, pushes for clear policy on staking taxation
A United States couple suing the federal tax agency over Tezos (XTZ) staking rewards taxation chose to forego a tactical victory and engage in a court battle that could eventually result in policy change. Joshua and Jessica Jarrett, who run a node on the Tezos network (thus “baking” new blocks, in the ecosystem’s lingo), have sued the Internal Revenue Service (IRS) over the taxes paid on the XTZ tokens created in 2019. The Jarretts filed a refund claim on upwards of $3,000 paid on the tokens, which the IRS ignored. The fundamental point of contention underlying the lawsuit is the …
Regulation / Feb. 3, 2022
Making sense of the Bitfinex Bitcoin billions
It’s the Netflix script that wrote itself. A story so outlandish, it’s stunned the crypto community; an industry accustomed to apparent suicides in Spanish jail cells and nonfungible token auctions for dead rappers. The plot involves the United States Department of Justice (DoJ), a crypto exchange with a checkered history, a rapper-cum-Forbes magazine writer, a voucher to buy a new PlayStation, an occasional magician and $4 billion worth of Bitcoin (BTC). The alleged Bitfinex hack money launderers have kept the internet enraptured since the larger-than-life story emerged last week. It’s no wonder that Netflix has actually announced that they will …
Adoption / Feb. 16, 2022
CTFC looks at expanded authority to regulate crypto, for less than a 10% budget increase
The U.S. Commodity Futures Trading Commission, or CFTC, has released its Fiscal Year 2023 (FY2023) budget request, seeking $365 million. This marks a 9.9% increase over the previous year and 20% over FY2021. The commission regulates the country’s derivatives market and has been increasingly active in recent years in policing financial products that incorporate cryptocurrencies. According to the agency’s request document, the CTFC focuses on digital asset custodian risk, ensuring secure storage, as well as on accounting. The agency has its own staff of certified public due to the lack of guidance on digital asset accounting from sectoral oversight bodies. …
Blockchain / March 29, 2022
Agent Smith says Secret Service seized $102M in crypto in 254 cases since 2015
A top official from the United States Secret Service (USSS) says the agency can track the flow of Bitcoin (BTC) and other cryptocurrencies in a similar manner to email addresses, and it has seized more than $102 million in crypto across 254 cases since 2015. USSS assistant director of investigations David Smith told CNBC that the transparent and immutable aspect of blockchain ledgers means investigators can trace transactions easier than fiat in some cases. “One of the guiding principles of the blockchain is that it is a public ledger that’s shared and everyone with a little bit of computing power …
Blockchain / April 20, 2022
Get ready for a swarm of incompetence at the IRS in 2023
The Internal Revenue Service is hiring 87,000 new agents, but taxpayers will not feel the pain for another two to three years. That’s how long it will take the agency to hire and train agents. Few have discussed the extent of this pain. Still, it’s something to think about when you consider the majority of coming audits will be conducted by new agents, many of whom will have been hastily hired and operating with minimal supervision. Playing the audit lottery will not be smart in future tax years. Taxpayers should protect themselves now, especially when profiting from statutory gray areas …
Business / Sept. 22, 2022