New Bitcoin Analytics Tool

US Department of Homeland Security Science and Technology Directorate (DHS S&T) is funding the development of a new Bitcoin analytics tool.

As Bitcoin becomes an increasingly accepted medium of exchange across the global economy, criminals have turned to the digital currency for their transactions, using it for money laundering and thus making it harder for law enforcement to keep track of users. Law enforcement’s most immediate need is to reduce the time and resources necessary to trace illicit commerce.

According to Sandia, a new research lab preparing the tool, its work for the DHS could ultimately be delivered to other federal law enforcement agencies.

DHS S&T requested Sandia to set up a graphical user interface or a front end on the research environment so agents can test the algorithms Sandia is using in actual investigations.

The new Homeland Security Bitcoin analytics tool is currently being developed according to a specific set of requirements. Sandia conducted a systems analysis of illicit e-commerce focusing on Bitcoin. 

The team set up a research environment to experiment with other algorithms that can de-anonymize illicit Bitcoin users. The research includes a mix of traditional and novel investigative techniques, along with existing financial regulation and innovative policy and process tools.

Once de-anonymization occurs, law enforcement can link the Bitcoin addresses to a specific alias and they will know all of the Bitcoin addresses they need to deal with.

The user interface to make this tool accessible to law enforcement agents still needs to be developed. Analysts have mentioned this new Bitcoin analytics tool should only be used as part of “broader efforts involving multiple angles”.

According to livebitcoinnews.com, if Homeland Security would be able to weed out the illicit elements of Bitcoin commerce, Bitcoin’s perception by the public will change as well. In turn, this can lead to increased global adoption of the Bitcoin system.

I-HLS

 

« Effective Drone Defence & Control
Financial Institutions & Cybercrime »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Opscura

Opscura

Opscura (formerly Enigmedia) brings the reliable and cautious hands of operations together with the analytical minds of cyber experts and cryptography researchers.

Consult Hyperion

Consult Hyperion

Consult Hyperion is an independent strategic and technical consultancy specialising in digital identity and secure electronic transactions.

Exabeam

Exabeam

Exabeam is a global cybersecurity leader that delivers AI-driven security operations.

Echoworx

Echoworx

Echoworx primary and exclusive focus is providing organizations with secure email services.

Vuntie

Vuntie

Vuntie blend European craftsmanship, performance and open-source technology to deliver cybersecurity services including penetration testing, incident response, training and consultancy.

Jumio

Jumio

Jumio’s end-to-end identity verification and authentication solutions fight fraud, maintain compliance and onboard good customers faster.

CyberProof

CyberProof

CyberProof aims to give clarity and confidence to businesses worldwide using a new risk-based approach to cyber security services.

Key Cyber Solutions

Key Cyber Solutions

Key Cyber is an IT consulting firm that specializes in agile software development services, program management and infrastructure services, cyber security and cloud and managed services.

Jisc

Jisc

Jisc is a membership organisation working in partnership with the UK’s research and education communities to develop the digital technologies they need to teach, discover and thrive.

Cybaverse

Cybaverse

Cybaverse (formerly North Star Cyber Security) was founded to create the perfect blend of a Managed Security Service Provider (MSSP) and a Cyber Security Consultancy in one.

Flexxon

Flexxon

Flexxon is the industry leader to develop NAND flash storage devices. Our key focus is to innovate memory devices ensuring data security and reliability.

Securious

Securious

If you need to improve your cyber security or achieve cyber security accreditations, Securious provide an independent service that will identify and address your issues quickly and efficiently.

Data Defenders

Data Defenders

Data Defenders provide information security technology solutions that empower consumers, businesses and governments with safe and secure IT and cybersecurity infrastructures.

Certcube Labs

Certcube Labs

Certcube Labs provide a broad range of services in the areas of Assessments, Development, Risk Advisory, Blockchain, Forensics Investigations, Managed Security Solutions, and IT Security Trainings.

Walacor

Walacor

Walacor’s secure data platform represents the next generation of secure data and blockchain storage with a trust-first approach that revolutionizes enterprise data, and database management systems.

PureID

PureID

Protect your enterprise with PureAUTH #IAMFirewall, Resilient SSO platform, purpose built to provide Passwordless Authentication & Zero Trust Access, by default.