Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
Review
. 2022;11(1):1.
doi: 10.1186/s40163-021-00163-8. Epub 2022 Jan 5.

Cryptocurrencies and future financial crime

Affiliations
Review

Cryptocurrencies and future financial crime

Arianna Trozze et al. Crime Sci. 2022.

Abstract

Background: Cryptocurrency fraud has become a growing global concern, with various governments reporting an increase in the frequency of and losses from cryptocurrency scams. Despite increasing fraudulent activity involving cryptocurrencies, research on the potential of cryptocurrencies for fraud has not been examined in a systematic study. This review examines the current state of knowledge about what kinds of cryptocurrency fraud currently exist, or are expected to exist in the future, and provides comprehensive definitions of the frauds identified.

Methods: The study involved a scoping review of academic research and grey literature on cryptocurrency fraud and a 1.5-day expert consensus exercise. The review followed the PRISMA-ScR protocol, with eligibility criteria based on language, publication type, relevance to cryptocurrency fraud, and evidence provided. Researchers screened 391 academic records, 106 of which went on to the eligibility phase, and 63 of which were ultimately analysed. We screened 394 grey literature sources, 128 of which passed on to the eligibility phase, and 53 of which were included in our review. The expert consensus exercise was attended by high-profile participants from the private sector, government, and academia. It involved problem planning and analysis activities and discussion about the future of cryptocurrency crime.

Results: The academic literature identified 29 different types of cryptocurrency fraud; the grey literature discussed 32 types, 14 of which were not identified in the academic literature (i.e., 47 unique types in total). Ponzi schemes and (synonymous) high yield investment programmes were most discussed across all literature. Participants in the expert consensus exercise ranked pump-and-dump schemes and ransomware as the most profitable and feasible threats, though pump-and-dumps were, notably, perceived as the least harmful type of fraud.

Conclusions: The findings of this scoping review suggest cryptocurrency fraud research is rapidly developing in volume and breadth, though we remain at an early stage of thinking about future problems and scenarios involving cryptocurrencies. The findings of this work emphasise the need for better collaboration across sectors and consensus on definitions surrounding cryptocurrency fraud to address the problems identified.

Keywords: Bitcoin; Cryptocurrencies; Fraud; Ponzi Schemes; Virtual Currency.

PubMed Disclaimer

Conflict of interest statement

Competing interestsThe authors declare that they have no competing interests.

Figures

Fig. 1
Fig. 1
PRISMA-ScR flow diagram. *Articles were published on electronic pre-print service SSRN and appeared to be academic in nature from screening their titles and abstract but, upon full-text examination, were excluded. **One article was included in the initial search as a pre-print, but had since been formally published and was, therefore, excluded during the updated search as a duplicate
Fig. 2
Fig. 2
PRISMA-ScR flow diagram for grey literature selection (search conducted November 2020)
Fig. 3
Fig. 3
Number of publications and expert consensus exercise participant votes per fraud type. *CPO/CTA fraud is an abbreviation for Commodity Pool Operator or Commodity Trading Advisor fraud. For more details, see Appendix 3 or https://osf.io/7w9mu/?view_only=c9ad3a1e2ed54dae9b1a0fc2807f144f
Fig. 4
Fig. 4
Problem analysis on the harmfulness, profitability, feasibility, and defeatability dimensions (horizontal axis; judgment certainty on the vertical axis)

References

    1. Advertising Standards Authority & Committees of Advertising Practice. (2019). Using Technology for Good [Annual Report]. https://www.asa.org.uk/uploads/assets/68dd32b5-ae6a-4993-820a3ff8f1163b8...
    1. Akin Gump Strauss Hauer & Feld LLP. (2018). Federal judge adopts CFTC position that cryptocurrencies are commodities. Akin Gump Strauss Hauer & Feld LLP. https://www.akingump.com/a/web/65522/aoiZE/litigation-alert-federal-judg...
    1. Anderson, R., Barton, C., Rainer, B., Clayton, R., Ga, C., Grasso, T., Levi, M., Moore, T., & Vasek, M. (2019). Measuring the Changing Cost of Cybercrime Our Framework for Analysing the Costs of Cybercrime. Workshop on the Economics of Information Security (WEIS), 1–32.
    1. Arksey H, O’Malley L. Scoping studies: Towards a methodological framework. International Journal of Social Research Methodology: Theory and Practice. 2005;8(1):19–32. doi: 10.1080/1364557032000119616. - DOI
    1. Australian Competition & Consumer Commission. (2018). Targeting scams. http://www.keepmeposted.org.au/wp-content/uploads/2018/05/f1240_targetin...

LinkOut - more resources