By Caroline M. Burnell, CFE, Director, Institute of Protective Services, Temple University Harrisburg
September 2024
Today’s cryptocurrency is much different from its original conception in the early 1980s as a digital payment method. Its uses have expanded to include governance, digital certificate of ownership, investment opportunities, and much more. It is also much easier to purchase and sell. Most significantly, there are thousands of individual cryptocurrencies in addition to Bitcoin, the original cryptocurrency released in 2009.
With this increase in popularity and accessibility comes an increase in the number of exploitation reports made to adult protective services (APS) involving cryptocurrency. This article discusses what cryptocurrency is, its value, why people would own it, and how criminals are using it. It also offers information specific to APS’ investigations involving cryptocurrency. The endnotes include links to additional resources. In this article, “criminals” refers to people with ill intent.
Cryptocurrency is a digital asset recorded on a blockchain. Let’s examine the components of this definition. The idea of digital assets is not new. Think about how most of us currently do our banking. On payday, our employer electronically deposits our paycheck into our bank account. We spend that money through various electronic means such as debit cards, automatic bill payments, or a digital app on our smartphone. This describes assets — our wages — existing in a digital environment. Unlike our wages in a traditional bank account that can be converted into cash, there is no tangible component to cryptocurrency — it only exists in the digital realm, hence the term “digital asset.” (However, cryptocurrency can be sold for U.S. dollars, which can then be transferred into a traditional bank account.)
Let’s look next at the definition component “recorded on a blockchain.” Blockchain is a newer way of recording data. It is an electronic ledger with unique properties that secure and preserve the integrity of the data recorded. Instead of recording each transaction individually, blockchains group transactions and record them as a block of transactions. Each transaction within a block is identified by an alphanumeric string referred to as a “hash” or “transaction ID,” which is created through a cryptographic algorithm that converts the transaction data into a unique output of fixed length. Any change in the transaction data generates a new hash.
Most cryptocurrencies derive their monetary value from the market and what people are willing to pay for them. Other cryptocurrencies such as stablecoins derive their value from the currency, commodity, or financial instrument to which they are pegged, or tied.1
Some people purchase cryptocurrency as an investment opportunity while others use it as a means to send assets to people in areas without traditional financial institutions. Still others use it as a payment method to purchase goods or services, or as ransom to retrieve confidential data either encrypted or stolen by criminals. And some people receive cryptocurrency as a reward in games and other promotions.
Criminals — including scammers — use cryptocurrencies to receive the proceeds of their crime. New data from the Federal Trade Commission shows fraud losses at cryptocurrency ATMs 2 are “skyrocketing, increasing nearly tenfold from 2020 to 2023 and topping $65 million in just the first half of 2024.” 3
There are diverse ways in which criminals — including scammers — target cryptocurrency. For instance:
Cryptocurrency is attractive to criminals because it is pseudo anonymous. Blockchains display the addresses that receive the “stolen” cryptocurrency, but the addresses themselves are not identifiable to a particular individual. In most cases, the identity of the address holder only becomes known if the cryptocurrency is sold for fiat currency (e.g., U.S. dollars) that is then deposited into a traditional bank or investment account whose owner is known. This pseudo anonymity makes it almost impossible to recoup lost or stolen cryptocurrency.
When investigating cases involving cryptocurrency, it is important for APS to obtain information specific to the cryptocurrency transactions. This includes, but is not limited to, the following:
When warranted by the investigation, it is important for APS to mitigate risk. The measures below are specific to cryptocurrency and should be considered in addition to any other risk reduction measures dictated by the evidence gathered during the investigation.
Any cryptocurrency remaining in a wallet should immediately be transferred into a new wallet using a new password. If malware may have been installed on the adult’s computer or mobile device, this transfer should be done from a different device. Otherwise, the criminal may obtain the new account details.
In closing, please remember: scammers are ruthless. Offers to recover a victim’s stolen cryptocurrency are likely a scam.10
1 Stablecoins were designed to avoid the significant price fluctuations of traditional cryptocurrency. Stablecoins are cryptocurrencies that peg their value to a real-world asset, such as the US dollar, a community like gold, or other cryptocurrency. For example, a stablecoin pegged to the U.S. dollar should value 1 U.S. dollar, whereas a stablecoin pegged to the value of gold should value the price of gold as trading on the market specified by the stablecoin. The value of the stablecoins can fluctuate though.
2 Cryptocurrency ATMs are automated teller machines where individuals can purchase – and sometimes sell – cryptocurrency. The type of cryptocurrency available varies depending upon the company operating the ATM.
3 Fletcher, Emma, Bitcoin ATMS: A payment portal for scammers, U.S. Federal Trade Commission, September 3, 2024, https://www.ftc.gov/news-events/data-visualizations/data-spotlight/2024/09/bitcoin-atms-payment-portal-scammers, last accessed September 4, 2024.
4 Wallets are the location where the information needed to access cryptocurrency is stored.
5 For more information on investment scams, please see the FBI news release Crypto Scams Involving Tether, USD Coin on the rise, February 2, 2023, https://www.fbi.gov/contact-us/field-offices/denver/news/crypto-scams-involving-tether-usd-coin-on-the-rise, last accessed September 4, 2024.
6 For more information on the phantom attacker scam including how it works, please see, Inside the FBI: The Phantom Hacker Scam, https://www.fbi.gov/video-repository/inside-the-fbi-the-phantom-hacker-scam-022924.mp4/view, last accessed September 4, 2024.
7 For more information on giveaway scams, please see, Slow your scroll: Spot and avoid social media giveaway scams, https://consumer.ftc.gov/consumer-alerts/2023/11/slow-your-scroll-spot-and-avoid-social-media-giveaway-scams, last accessed September 4, 2024.
8 A cryptocurrency exchange is an online platform that is similar to an investment broker, making it easy to purchase and sell cryptocurrency. It is important to use a reputable exchange to protect the cryptocurrency from theft. Criminals have created fraudulent exchanged and hacked into existing exchanges with less than robust security.
9 For more information on reporting to the FBI, please see FBI’s Guidance for Cryptocurrency Scam Victims, Alert number I-082423-PSA, August 24, 2023, https://www.ic3.gov/PSA/2023/psa230824, last accessed September 4, 2024.
10 For more information on false claims to recover cryptocurrency including how it works, please see the FBI’s alert, Fictitious Law Firms Targeting Cryptocurrency Scam Victims Offering to Recover Funds, Alert number: I-062424-PSA, June 24, 2024, https://www.ic3.gov/PSA/2024/PSA240624#:~:text=Using%20social%20media%20or%20other,to%20investigate%20fund%20recovery%20cases., last accessed September 4, 2024.
The APS Blog is updated regularly with posts from contributing authors and new publications from the APS TARC.
How did we do? Take our quick customer satisfaction survey to give us feedback.
Last Modified: 12/27/2024