KRİPTO PARALAR İLE TERÖR VE DİĞER İLLEGAL AKTİVİTELERİN FİNANSMANI
Year 2021,
Volume: 3 Issue: 1, 161 - 176, 31.01.2021
Deniz Turan
,
Cem Demircan
Abstract
Blok zinciri teknolojilerinde barındırılan kripto para birimlerinin sağladığı anonimlik ve görünüşte anonimlik, bu platformları suç aktörlerinin kara para aklama ve terörizmin finansmanı gibi yasadışı faaliyetlerde kullanması için giderek daha çekici araçlar haline getirdi. Blok zinciri teknolojisi henüz emekleme aşamalarında olduğundan dolayı tam olarak anlaşılmamış ve düzgün bir yasal düzenlemeye tabi tutulmamıştır. Bu durum son yıllarda suçlarının artarak yararlandığı gri alana yol açmaktadır. Bu makale, blok zinciri teknolojisini ve ardından kripto para birimlerini inceleyerek, kamuya açık ve gizlilik odaklı para birimleri arasındaki ayrıma dikkat çekmeye çalışmaktadır. Blok zinciri teknolojisinin yarattığı fırsatlar ve zorluklar ile kara para aklamanın yanı sıra terörizmin finansmanı üzerindeki rolü, son vaka çalışmaları aracılığıyla incelenmeye çalışılmıştır.
Supporting Institution
Anadolu Üniversitesi
Thanks
Desteği için Anadolu Üniversitesi BAP’a teşekkür ederiz.
References
- Adenyanju, C. (2019, May 17). What Crypto Exchanges Do to Comply With KYC, AML and CFT Regulations. October 02, 2020 tarihinde Cointelegraph: https://cointelegraph.com/news/what-crypto-exchanges-do-to-comply-with-kyc-aml-and-cft-regulations adresinden alındı
- Attaran, M., & Gunasekaran, A. (2019). Applications of Blockchain Technology in Business: Challenges and Opportunities. Springer International Publishing.
- Brantly, A. (2014, October). Financing Terror Bit by Bit. Combatting Terrorism Center at West Point: CTC Sentinel, 7(10), s. 1-20.
- Chainalysis. (2020). The 2020 State of Crypto Crime. Chainalysis. October 03, 2020 tarihinde https://go.chainalysis.com/rs/503-FAP-074/images/2020-Crypto-Crime-Report.pdf adresinden alındı
- Chaum, D. (1983). Blind Signatures for Untraceable Payments. Advances in Cryptology Proceedings (s. 199-203). Springer.
- CoinMarketCap. (2020, September 30). CoinMarketCap: https://coinmarketcap.com/ adresinden alındı
- De Balthasar, T., & Hernandez-Castro, J. (2017). An Analysis of Bitcoin Laundry Services. Nordic Conference in Secure IT Systems (s. 297-312). Tartu: Springer International Publishing.
- Dion-Schwarz, C., Manheim, D., & Johnston, P. B. (2019). Terrorist Use of Cryptocurrencies: Technical and Organizational Barriers and Future Threats. Santa Monica, California: RAND Corporation.
- Engle, E. (2016). Is Bitcoin Rat Poison: Cryptocurrency, Crime, and Counterfeiting (CCC). Journal of High Technology Law, 16(2), 340-393.
- Europol. (2017). Internet Organized Crime Threat Assesment, IOCTA 2017. Den Haag: Europol.
- Financial Action Task Force. (2020). 12-Month Review of the Revised FATF Standards on Virtual Assets and Virtual Asset Service Providers. Paris: Financial Action Task Force.
- Haber, S., & Stornetta, W. S. (1991). How to timestamp a digital document. Journal of Cryptology, 99-111.
- Harper, C. (2020, June 25). ISIS shuns Bitcoin, embraces privacy coin Monero for donations. Decrypt.co: https://decrypt.co/33562/isis-shuns-bitcoin-privacy-coin-monero adresinden alındı
- Houben, R., & Snyers, A. (2018). Cryptocurrencies and Blockchain: Legal Context and Implications for Financial Crime, Money Laundering and Tax Evasion. Strasbourg: European Parliament - Policy Department for Economic, Scientific and Quality of Life Policies. July 16, 2020 tarihinde https://www.europarl.europa.eu/cmsdata/150761/TAX3%20Study%20on%20cryptocurrencies%20and%20blockchain.pdf adresinden alındı
- Koerhuis, W., Kechadi, T., & Le-Khac, N.-A. (2020). Forensic Analysis of Privacy-Oriented Cryptocurrencies. Forensic Science International: Digital Investigation, 33, 1-10.
- Merriam-Webster. (tarih yok). Blockchain. Temmuz 12, 2020 tarihinde Merriam-Webster.com Dictionary: https://www.merriam-webster.com/dictionary/blockchain adresinden alındı
- Möser, M., & Narayanan, A. (2019). Effective Cryptocurrency Regulation Through Blacklisting. Malte Möser: https://maltemoeser.de/paper/blacklisting-regulation.pdf adresinden alındı
- Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. Bitcoin.org: https://bitcoin.org/bitcoin.pdf adresinden alındı
- Poskriakov, F., Chiriaeva, M., & Cavin, C. (2020). Blockchain Laws and Regulations | 11 Cryptocurrency compliance and risks: A European KYC/AML Perspective | GLI. October 02, 2020 tarihinde Global Legal Insights: https://www.globallegalinsights.com/practice-areas/blockchain-laws-and-regulations/11-cryptocurrency-compliance-and-risks-a-european-kyc-aml-perspective#chaptercontent3 adresinden alındı
- Salami, I. (2017). Terrorism Financing with Virtual Currencies: Can Regulatory Technology Solutions Combat This? Studies in Conflict & Terrorism, 41(12), 968-989.
- The Invisible Internet Project. (2018). Intro - I2P. September 30, 2020 tarihinde The Invisible Internet Project - I2P: https://geti2p.net/en/about/intro adresinden alındı
- The United States Department of Justice. (2020, August 13). Global Disruption of Three Terror Finance Cyber-Enabled Campaigns. October 02, 2020 tarihinde Department of Justice: https://www.justice.gov/opa/pr/global-disruption-three-terror-finance-cyber-enabled-campaigns adresinden alındı
The United States Government. (2020, September 30). Pilot IRS Cryptocurrency Tracing Award Notice. October 02, 2020 tarihinde System for Award Management | SAM: https://beta.sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view adresinden alındı
- Tramèr, F., Boneh, D., & Paterson, K. G. (2019). Remote Side-Channel Attacks on Anonymous Transactions. San Fransisco: Stanford University.
- Weimann, G. (2016). Going Dark: Terrorism on the Dark Web. Studies in Conflict & Terrorism, 39(3), 195-206.
- Yaga, D., Mell, P., Roby, N., & Scarfone, K. (2018). Blockchain Technology Overview. Washington D.C.: United States of America Department of Commerce.
- Zheng, Z., Xie, S., Dai, H.-N., Chen, X., & Wang, H. (2018). Blockchain Challenges and Opportunities: A Survey. International Journal of Web and Grid Services, 14(4), 352-375.
FINANCING OF TERROR AND OTHER ILLEGAL ACTIVITIES WITH CRYPTO MONEY
Year 2021,
Volume: 3 Issue: 1, 161 - 176, 31.01.2021
Deniz Turan
,
Cem Demircan
Abstract
The anonymity and pseudo-anonymity provided by cryptocurrencies hosted on blockchain technologies have made these platforms increasingly attractive tools for criminal actors to use for illicit activities such as money laundering and financing of terrorism. Since blockchain technology is in its infancy, it has not been fully understood and properly regulated. This situation leads to the gray area where crimes have increasingly benefited in recent years. This paper examines blockchain technology and subsequently cryptocurrencies and tries to distinguish between public and privacy-oriented cryptocurrencies. Opportunities and challenges created by blockchain technology as well as its role in the financing of terrorism along with money laundering examined through recent case studies.
References
- Adenyanju, C. (2019, May 17). What Crypto Exchanges Do to Comply With KYC, AML and CFT Regulations. October 02, 2020 tarihinde Cointelegraph: https://cointelegraph.com/news/what-crypto-exchanges-do-to-comply-with-kyc-aml-and-cft-regulations adresinden alındı
- Attaran, M., & Gunasekaran, A. (2019). Applications of Blockchain Technology in Business: Challenges and Opportunities. Springer International Publishing.
- Brantly, A. (2014, October). Financing Terror Bit by Bit. Combatting Terrorism Center at West Point: CTC Sentinel, 7(10), s. 1-20.
- Chainalysis. (2020). The 2020 State of Crypto Crime. Chainalysis. October 03, 2020 tarihinde https://go.chainalysis.com/rs/503-FAP-074/images/2020-Crypto-Crime-Report.pdf adresinden alındı
- Chaum, D. (1983). Blind Signatures for Untraceable Payments. Advances in Cryptology Proceedings (s. 199-203). Springer.
- CoinMarketCap. (2020, September 30). CoinMarketCap: https://coinmarketcap.com/ adresinden alındı
- De Balthasar, T., & Hernandez-Castro, J. (2017). An Analysis of Bitcoin Laundry Services. Nordic Conference in Secure IT Systems (s. 297-312). Tartu: Springer International Publishing.
- Dion-Schwarz, C., Manheim, D., & Johnston, P. B. (2019). Terrorist Use of Cryptocurrencies: Technical and Organizational Barriers and Future Threats. Santa Monica, California: RAND Corporation.
- Engle, E. (2016). Is Bitcoin Rat Poison: Cryptocurrency, Crime, and Counterfeiting (CCC). Journal of High Technology Law, 16(2), 340-393.
- Europol. (2017). Internet Organized Crime Threat Assesment, IOCTA 2017. Den Haag: Europol.
- Financial Action Task Force. (2020). 12-Month Review of the Revised FATF Standards on Virtual Assets and Virtual Asset Service Providers. Paris: Financial Action Task Force.
- Haber, S., & Stornetta, W. S. (1991). How to timestamp a digital document. Journal of Cryptology, 99-111.
- Harper, C. (2020, June 25). ISIS shuns Bitcoin, embraces privacy coin Monero for donations. Decrypt.co: https://decrypt.co/33562/isis-shuns-bitcoin-privacy-coin-monero adresinden alındı
- Houben, R., & Snyers, A. (2018). Cryptocurrencies and Blockchain: Legal Context and Implications for Financial Crime, Money Laundering and Tax Evasion. Strasbourg: European Parliament - Policy Department for Economic, Scientific and Quality of Life Policies. July 16, 2020 tarihinde https://www.europarl.europa.eu/cmsdata/150761/TAX3%20Study%20on%20cryptocurrencies%20and%20blockchain.pdf adresinden alındı
- Koerhuis, W., Kechadi, T., & Le-Khac, N.-A. (2020). Forensic Analysis of Privacy-Oriented Cryptocurrencies. Forensic Science International: Digital Investigation, 33, 1-10.
- Merriam-Webster. (tarih yok). Blockchain. Temmuz 12, 2020 tarihinde Merriam-Webster.com Dictionary: https://www.merriam-webster.com/dictionary/blockchain adresinden alındı
- Möser, M., & Narayanan, A. (2019). Effective Cryptocurrency Regulation Through Blacklisting. Malte Möser: https://maltemoeser.de/paper/blacklisting-regulation.pdf adresinden alındı
- Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. Bitcoin.org: https://bitcoin.org/bitcoin.pdf adresinden alındı
- Poskriakov, F., Chiriaeva, M., & Cavin, C. (2020). Blockchain Laws and Regulations | 11 Cryptocurrency compliance and risks: A European KYC/AML Perspective | GLI. October 02, 2020 tarihinde Global Legal Insights: https://www.globallegalinsights.com/practice-areas/blockchain-laws-and-regulations/11-cryptocurrency-compliance-and-risks-a-european-kyc-aml-perspective#chaptercontent3 adresinden alındı
- Salami, I. (2017). Terrorism Financing with Virtual Currencies: Can Regulatory Technology Solutions Combat This? Studies in Conflict & Terrorism, 41(12), 968-989.
- The Invisible Internet Project. (2018). Intro - I2P. September 30, 2020 tarihinde The Invisible Internet Project - I2P: https://geti2p.net/en/about/intro adresinden alındı
- The United States Department of Justice. (2020, August 13). Global Disruption of Three Terror Finance Cyber-Enabled Campaigns. October 02, 2020 tarihinde Department of Justice: https://www.justice.gov/opa/pr/global-disruption-three-terror-finance-cyber-enabled-campaigns adresinden alındı
The United States Government. (2020, September 30). Pilot IRS Cryptocurrency Tracing Award Notice. October 02, 2020 tarihinde System for Award Management | SAM: https://beta.sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view adresinden alındı
- Tramèr, F., Boneh, D., & Paterson, K. G. (2019). Remote Side-Channel Attacks on Anonymous Transactions. San Fransisco: Stanford University.
- Weimann, G. (2016). Going Dark: Terrorism on the Dark Web. Studies in Conflict & Terrorism, 39(3), 195-206.
- Yaga, D., Mell, P., Roby, N., & Scarfone, K. (2018). Blockchain Technology Overview. Washington D.C.: United States of America Department of Commerce.
- Zheng, Z., Xie, S., Dai, H.-N., Chen, X., & Wang, H. (2018). Blockchain Challenges and Opportunities: A Survey. International Journal of Web and Grid Services, 14(4), 352-375.