Cybersecurity News Hub
No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
No Result
View All Result
Cybersecurity News Hub
No Result
View All Result
Home Cyber Crime

CyberCrime & Doing Time: Book Review: The Crypto Launderers: Crime and CryptoCurrencies

Cyberinchief by Cyberinchief
November 19, 2025
Reading Time: 3 mins read
0
CyberCrime & Doing Time: Book Review: The Crypto Launderers: Crime and CryptoCurrencies


RELATED POSTS

Microsoft On Women In Cybersecurity At Black Hat Europe 2025 In London

AI Expert: We Have 2 Years Before Everything Changes! We Need To Start Protesting! — Tristan Harris – Lifeboat News: The Blog

Russian police bust bank-account hacking gang that used NFCGate-based malware

I wish I had a way to review this book without having first read last year’s “Tracers in the Dark.” While Tracers talked about the people involved in investigating various crypto-based crimes and those early researchers who made the tracing process possible, Carlisle tells many of the same stories, but in a less engaging way. The facts are there, and when they talk about the same cases, they align nicely. But Andy Greenberg’s Tracers makes those cases stories about people, while Carlisle portrays facts without character development which I would not have realized was necessary or useful in a book on Money Laundering had I not read Tracers first. 

 As to the facts? I learned a ton, especially by feeding my ADD nature by chasing interesting footnotes — more than 350 references are provided! Thank you!!!
In the early part of the book he covers all of the mandatory cases: Silk Road, Mt. Gox, etc. 

Where this book is great, and it is far superior to Tracers as an educational resource in this regard, is how money-laundering works in Crypto. Mixers and Coinswaps are explained well, with several of the related cases such as Helix and Bitcoin Fog, being explained. The importance of regulation and how regulators have followed behind crypto developments is a major theme of the book. From regulating exchanges, to Bitcoin ATMs, to privacy wallets such as Wasabi Wallet, and the debate on whether privacy wallets can or should be regulated.
The attempts of FinCEN to introduce further regulations and the (in my opinion) Astroturfed outcry against them is especially interesting. 

An example of what I believed to be a very rational and necessary AML policy would be the FinCEN Draft Rule-Making Proposal, introduced 18dev2020 for “requirements for certain transactions involving convertible virtual currencies or digital assets” tried to require transactions greater than $3k to require proof of the identity of the recipient if sent to a private wallet, and would have required a currency transaction report on any movement above $10k. The outlash was severe and the rule-making placed on hold. 

A nice coverage of the history of crypto sanctions by OFAC is also portrayed, from Suex, Chatex, Garantex, Bitzlato, and IRGC-related ransomware. And a history of the evolution of ransomware, which would not be possible without those unidentified and unaccounted for large currency transactions that cryptocurrency has enabled (and that FinCEN has been TRYING to prevent!) 

One example of sanctioning crypto was the OFAC sanctions against Lazarus Group Ethereum addresses, sanctioned along with one of their chosen Mixers, Blender.io. (Sanctioned addresses are listed here.)  I appreciated some of the additional details Carlisle provided on Lazarus Group crypto hacker money launderers Tian Yinyin and Li Jaidong (snowjohn and khaleesi) who moved at least $100M, including purchasing at least $1.4 M in Apple iTunes gift cards! (Though again, no “characters”, just names.) 

The latter part of the book does a nice job explaining the way Ethereum opened up a number of possibilities with Smart Contracts. Carlisle does a great job explaining Ethereum and ERC-20 tokens and how DAOs, DEXs, and DApps are built using the Smart Contracts of Ethereum with more on the DeFi system including how Bridges work. He also explains NFTs and how they also were supercharged by ERC-721 (and abused by thieves, fraudsters, insiders, and money launderers.)  This was the best introduction to that whole ecosystem that I’ve read. Great job! 

The Bitfinex hack, which opens the book, focused on 94,643.29 BTC from 2016 sitting under a microscope, untouched for six years, until it moved in Feb 2022 leading to the arrest of Dutch and Razzlekhan with $3.5 Billion seized, felt like it was set up as the climax of the book as we returned to the story from the opening chapter. The intermediary chapters helped us understand the now-revealed mechanisms, but again, it was facts without characters, which is fine – I just got ruined by the engagement of Tracers. 

Buy JNews
ADVERTISEMENT

The final chapter seems like something the Elliptic marketing department forced on him. (The other major crypto industry players all do the same thing, so not picking on Elliptic. It was the first crypto tracing tool I ever used!) The obligatory industry toeing the line of “oh, but less than 1% of crypto transactions are illicit!” was a frustrating end to an otherwise decent book. No one will ever convince me that the vast majority of crypto transactions involve no “transaction” at all, but are wash trading at an inconceivable scale designed to manipulate the value of cryptocurrencies to encourage investment and enrich the HODLers and corporations whose livelihood crypto is. 

Fantastic content – even possibly as an accompanying text for a crypto crime course at a university (yes, my wheels are turning!) especially with the rich depth of referenced articles, policies, and cases. But for a fun crypto crime STORY I would still go with “Tracers In the Dark.”



Source link

Tags: BookCRIMEcryptoCryptoCurrenciesCybercrimeLaunderersReviewTime
ShareTweetPin
Cyberinchief

Cyberinchief

Related Posts

Microsoft On Women In Cybersecurity At Black Hat Europe 2025 In London
Cyber Crime

Microsoft On Women In Cybersecurity At Black Hat Europe 2025 In London

December 27, 2025
AI Expert: We Have 2 Years Before Everything Changes! We Need To Start Protesting! — Tristan Harris – Lifeboat News: The Blog
Cyber Crime

AI Expert: We Have 2 Years Before Everything Changes! We Need To Start Protesting! — Tristan Harris – Lifeboat News: The Blog

December 9, 2025
Russian police bust bank-account hacking gang that used NFCGate-based malware
Cyber Crime

Russian police bust bank-account hacking gang that used NFCGate-based malware

December 8, 2025
How To Reframe Cybersecurity Budget Requests And Get Them Approved
Cyber Crime

How To Reframe Cybersecurity Budget Requests And Get Them Approved

December 8, 2025
Contractors with hacking records accused of wiping 96 govt databases – Lifeboat News: The Blog
Cyber Crime

Contractors with hacking records accused of wiping 96 govt databases – Lifeboat News: The Blog

December 7, 2025
Maryland man sentenced for N. Korea IT worker scheme involving US government contracts
Cyber Crime

Maryland man sentenced for N. Korea IT worker scheme involving US government contracts

December 7, 2025
Next Post
Country Where CyberCrime is 0% #rajshamani #podcast #podcastclips #cybersecurity #crime #cybercrime

Country Where CyberCrime is 0% #rajshamani #podcast #podcastclips #cybersecurity #crime #cybercrime

साइबर सिक्योरिटी कोर्स सभी शिक्षकों को पूरा करना है।। iGOT portal

साइबर सिक्योरिटी कोर्स सभी शिक्षकों को पूरा करना है।। iGOT portal

Recommended Stories

Breaking News : Mobile को लेकर मोदी सरकार का बड़ा फैसला! | Cyber Security | Sanchar Saathi App

Breaking News : Mobile को लेकर मोदी सरकार का बड़ा फैसला! | Cyber Security | Sanchar Saathi App

December 5, 2025
What’s the mindset of a cyber criminal? #cybercrime #vardiwala0007 #AI #cyberattack

What’s the mindset of a cyber criminal? #cybercrime #vardiwala0007 #AI #cyberattack

October 4, 2025
Analyzing bare metal firmware binaries in Ghidra

Analyzing bare metal firmware binaries in Ghidra

October 25, 2025

Popular Stories

  • Allianz Life – 1,115,061 breached accounts

    Allianz Life – 1,115,061 breached accounts

    0 shares
    Share 0 Tweet 0
  • Prosper – 17,605,276 breached accounts

    0 shares
    Share 0 Tweet 0
  • साइबर अपराध | Illegal Payment Gateway & Rented Bank Accounts | MAMTA CHOPRA

    0 shares
    Share 0 Tweet 0
  • Miljödata – 870,108 breached accounts

    0 shares
    Share 0 Tweet 0
  • Snowflake Data Breach Explained: Lessons and Protection Strategies

    0 shares
    Share 0 Tweet 0

Search

No Result
View All Result

Recent Posts

  • Top 5 Mobile App Security Threats Leaders Must Prepare for in 2026
  • Microsoft On Women In Cybersecurity At Black Hat Europe 2025 In London
  • Polisi kembali ungkap sindikat Cyber Crime kejahatan Internasional – iNews Malam 09/03

Categories

  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos

Newsletter

© 2025 All rights reserved by cyberinchief.com

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us

© 2025 All rights reserved by cyberinchief.com

Newsletter Signup

Subscribe to our weekly newsletter below and never miss the latest News.

Enter your email address

Thanks, I’m not interested