Bitcoin Forensics - The book

crypto

The table of contents is done!  Or at least the tentative table of contents is done.

You'd figure that a table of contents would be the easiest thing to write for a nonfiction book, but not only is it not the easiest, but it changes as you write.  I've learned that a good plan for a table of contents helps keep the book focused, but I also learned that as you research, you either add or subtract to the original plan.  Some of the book has been started as well, but the table of contents is what I want to get out for a few reasons.  One, build your interest in cryptocurrency investigations and get you excited about the book, (2) get input if you have it on what you would like to see in the book, and (3) check if you have interest in contributing to the book process.

The tentative table of contents
  • Introduction
    • You should maybe get started learning this sooner than later
    • Eventually, every case where money is involved will involve cryptocurrency
  • Chapter 1 - Money
    • Currency
    • Physical money
    • Virtual money
  • Chapter 2 - Money Laundering
    • Traditional methods (simple to complex) with physical money
    • High tech methods (simple to complex) with virtual money
  • Chapter 3 - The Blockchain
    • It is not just for Bitcoin
    • Blockchain is a big deal
  • Chapter 4 - Wallets, Exchanges, and Transactions
    • How to use cryptocurrency
    • How cryptocurrency changes everything in money laundering investigations
  • Chapter 5 - Anonymity and Cryptocurrency
    • You are not anonymous when using cryptocurrency
    • You are anonymous when using cryptocurrency
    • The Dark Web Markets and Cryptocurrency
  • Chapter 6 - Cryptocurrency Investigations
    • Device forensics (artifacts)
    • Forensic tools
    • Tracking transactions on the Blockchain
    • Seizing wallets
    • Identifying the owner of a cryptocurrency wallet
    • Legal issues
  • Chapter 7 - Case Studies
    • Money laundering related crimes
    • Terrorism
  • Chapter 8
    • Putting it all together
    • Tying suspects to wallets and devices
    • Tying suspects to cryptocurrency transactions
  • Summary
  • Appendix
    • Everything we can put together as resources for you!

We have a general idea of how long each section will be, but won't know until we write it.  So one chapter may be way longer than another simply because there is so much to discuss.  Don't worry about being overwhelmed with cryptocurrency information as this book is for you, the practitioner, the investigator, and the trier of cases.

There is one request (or offer, depending on how you look at it):

Contribute to the book.

If you ever thought of writing a book, or contributing to a book, but wanted to dip your toes in first, this is an opportunity.  I have a handful of crypo cases worked and Tim has more than a bit of research into cryptocurrency investigations.  I already have a few offers of case studies and research that I will be taking people up on; however, if you have interest as a contributor, email me (This email address is being protected from spambots. You need JavaScript enabled to view it.).  Whether you'd like one of your cases featured in a case study, share some things you did in a case, or share some research findings, we are open to all.  That what we use is credited directly to you in a peer-reviewed, tech-edited, professionally published digital forensics book.  

On case studies you may want to use, I am way familiar with police cases, privacy, and legal restrictions on public disemination. I am also aware of public records laws and if you have a case to talk about, I can easily formally receive a copy through public records and be able to talk to you about it without worrying of releasing any information that should not be released.

On research, if you have done some work already, we're glad to incorporate part or whole, as you would like seen in the book.

Our goal is not fame or fortune, but to write the best book on a topic that will be red hot sooner than you think.  But if you want to be famous...get ahold of me. I'll put in you in the book :)

Rate this blog entry:
0
Knowing “how-to-do-it” is important, but first you...
Yes, you can place the suspect behind the keyboard...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 17 December 2017
If you'd like to register, please fill in the username, password and name fields.