The Anatomy of a Cryptocurrency Pump-And-Dump Scheme

Total Page:16

File Type:pdf, Size:1020Kb

The Anatomy of a Cryptocurrency Pump-And-Dump Scheme The Anatomy of a Cryptocurrency Pump-and-Dump Scheme Jiahua Xu, École polytechnique fédérale de Lausanne (EPFL); Benjamin Livshits, Imperial College London https://www.usenix.org/conference/usenixsecurity19/presentation/xu-jiahua This paper is included in the Proceedings of the 28th USENIX Security Symposium. August 14–16, 2019 • Santa Clara, CA, USA 978-1-939133-06-9 Open access to the Proceedings of the 28th USENIX Security Symposium is sponsored by USENIX. The Anatomy of a Cryptocurrency Pump-and-Dump Scheme Jiahua Xu Benjamin Livshits École Polytechnique Fédérale de Lausanne (EPFL) Imperial College London Imperial College London UCL Centre for Blockchain Technologies Harvard University Brave Software Abstract Regulation: In February 2018, the CFTC (Commodity Fu- tures Trading Commission) issued warnings to consumers [8] While pump-and-dump schemes have attracted the atten- about the possibility of cryptocurrency pump-and-dump tion of cryptocurrency observers and regulators alike, this schemes. It also offered a substantial reward to whistle- paper represents the first detailed empirical query of pump- blowers around the same time [12]. and-dump activities in cryptocurrency markets. We present In October 2018, the SEC (Securities and Exchange Com- a case study of a recent pump-and-dump event, investigate mission) filed a subpoena enforcement against an investment 412 pump-and-dump activities organized in Telegram chan- company trust and trustee for an alleged pump-and-dump ICO nels from June 17, 2018 to February 26, 2019, and discover scheme [27]. patterns in crypto-markets associated with pump-and-dump Clearly, regulators are aiming to find perpetrators of pump- schemes. We then build a model that predicts the pump likeli- and-dump schemes and to actively prosecute them. hood of all coins listed in a crypto-exchange prior to a pump. The model exhibits high precision as well as robustness, and This paper: In this paper, we trace the message history of can be used to create a simple, yet very effective trading strat- over 300 Telegram channels from June 17, 2018 to Febru- egy, which we empirically demonstrate can generate a return ary 26, 2019, and identify 412 pump events orchestrated as high as 60% on small retail investments within a span of through those channels. We analyze features of pumped two and half months. The study provides a proof of concept coins and market movements of coins before, during, and for strategic crypto-trading and sheds light on the application after pump-and-dump. We develop a predictive random for- of machine learning for crime detection. est model that provides the likelihood of each possible coin being pumped prior to the actual pump event. With an AUC (area under curve) of the ROC (receiver operating character- 1 Introduction istic) curve of over 0.9, the model exhibits high accuracy in predicting pump-and-dump target coins. While pump-and-dump schemes are a well-trodden ruse in Contributions: This paper makes the following contribu- conventional financial markets, the old-fashioned ploy has tions: found a new playground to thrive — cryptocurrency ex- changes. • Longitudinal study: This paper is the first research The relative anonymity of the crypto space has led to it study that examines routinely organized pump-and- becoming a fertile ground for unlawful activities, such as cur- dump events in the cryptocurrency space. We use rency theft (e.g. the DAO hack [1]), Ponzi schemes [26], and a unique dataset of pump-and-dump records from pump-and-dump schemes that have each risen in popularity June 17, 2018 to February 26, 2019 across multiple in cryptocurrency markets over the last few years. Due to crypto-exchanges and analyze crypto-market movements their end-to-end encryption, programmability, and relative associated with those pump-and-dump events. anonymity, new social media tools such as Telegram1 and Discord have become cryptocurrency enthusiasts’ preferred • Analysis: Our analysis shows that pump-and-dump ac- communication vehicles. While pump-and-dump schemes tivities are a lot more prevalent than previously believed. have been discussed in the press [29], we are not aware of a Specifically, around 100 organized Telegram pump-and- comprehensive study of this phenomenon to date. dump channels coordinate on average 2 pumps a day, which generates an aggregate artificial trading volume 1Note that not all Telegram traffic is end-to-end encrypted. of 6 million USD a month. We discover that some ex- USENIX Association 28th USENIX Security Symposium 1609 Figure 1: A successfully organized pump event. On the right hand side of the screenshot is the message history of a Telegram channel. The first message is the final countdown; the second message is the coin announcement; the last message presents the pump result. On the left hand side is the market movement of the corresponding coin around the pump time. changes are also active participants in pump-and-dump 2.1 Pump-and-Dump Actors schemes. Pump organizer: Pump organizers can be individuals, or, • Prediction: We develop machine learning models that, more likely, organized groups, typically who use encrypted given pre-pump market movements, can predict the like- chat applications to coordinate pump-and-dump events. They lihood of each coin being pumped with an AUC (Area have the advantage of having insider information and are the Under Curve) of over 0.9 both in-sample and out-of- ultimate beneficiaries of the pump-and-dump scheme. sample. The models confirm that market movements Pump participants: Pump participants are cryptocurrency contain hidden information that can be utilized for mon- traders who collectively buy a certain coin immediately after etary purposes. receiving the instruction from the pump organizer on which coin to buy, causing the price of the coin to be “pumped". • Trading strategy: We formulate a simple trading strat- Many of them end up buying coins at an already inflated price egy which, when used in combination with a calibrated and are the ultimate victim of the pump-and-dump scheme. prediction model, demonstrates a return of 60% over a Pump target exchange: A pump target exchange is the ex- period of three weeks, even under strict assumptions. change selected by the pump organizer where a pump-and- dump event takes place. Some exchanges are themselves di- rectly associated with pump-and-dump. Yobit, for example, Paper organization: The paper is structured as follows. In has openly organized pumps multiple times (see Figure 2). Section 2 we provide background information on pump-and- The benefits for an exchange to be a pump organizer are dump activities organized by Telegram channels. In Section 3 threefold: we present a pump-and-dump case study. In Section 4 we investigate a range of coin features. In Section 5 we build a 1. With coins acquired before a pump, it can profit by dump- prediction model that estimates the pump likelihood of each ing those coins at a higher, pumped price; coin for each pump, and propose a trading strategy along with the model. In Section 6 we summarize the related literature. 2. It earns high transaction fees due to increased trading In Section 7 we outline our conclusions. Finally, the Appendix volume driven by a pump-and-dump; specifies parameters of the models we have used in this paper. 3. Exchanges are able to utilize their first access to users’ order information for front-running during a frenzied 2 Background pump-and-dump. A pump is a coordinated, intentional, short-term increase in 2.2 A Typical Pump-and-Dump Process the demand of a market instrument — in our study, a cryp- tocurrency — which leads to a price hike. With today’s chat Set-up: The organizer creates a publicly accessible group or applications such as Telegram and Discord offering features channel, and recruits as many group members or channel sub- of encryption and anonymity, various forms of misconduct in scribers as possible by advertising and posting invitation links cryptocurrency trading are thriving on those platforms. on major forums such as Bitcointalk, Steemit, and Reddit. 1610 28th USENIX Security Symposium USENIX Association Telegram channels only allow subscribers to receive mes- sages from the channel admin, but not post discussions in the channel. In a Telegram group, members can by default post messages, but this function is usually disabled by the group admin to prohibit members’ interference. We use the terms channel and group interchangeably in this paper. Pre-pump announcement: The group is ready to pump once it obtains enough members (typically above 1,000). The pump organizer, who is now the group or channel admin, announces @YobitExchange details of the next pump a few days ahead. The admins broad- (a) Tweets from . cast the exact time and date of the announcement of a coin which would then precipitate a pump of that coin. Other in- formation disclosed in advance includes the exchange where the pump will take place and the pairing coin2. The admins advise members to transfer sufficient funds (in the form of (b) Pump timer from the Yobit website. the pairing coin) into the named exchange beforehand. While the named pump time is approaching, the admin Figure 2: The screen-shots demonstrate that the exchange Yobit was actively sends out countdowns, and repeats the pump “rules” such as: involved in pump-and-dump activities. 1) buy fast, 2) “shill”3 the pumped coin on the exchange chat box and social media to attract outsiders, 3) “HODL”4 the coin at least for several minutes to give outsiders time to join in, 4) sell in pieces and not in a single chunk, 5) only sell at a profit and never sell below the current price. The admin also gives members a pep talk, quoting historical pump profits, to boost members’ confidence and encourage their participation.
Recommended publications
  • The Economics of Cryptocurrency Pump and Dump Schemes
    The Economics of Cryptocurrency Pump and Dump Schemes JT Hamrick, Farhang Rouhi, Arghya Mukherjee, Amir Feder, Neil Gandal, Tyler Moore, and Marie Vasek∗ Abstract The surge of interest in cryptocurrencies has been accompanied by a pro- liferation of fraud. This paper examines pump and dump schemes. The recent explosion of nearly 2,000 cryptocurrencies in an unregulated environment has expanded the scope for abuse. We quantify the scope of cryptocurrency pump and dump on Discord and Telegram, two popular group-messaging platforms. We joined all relevant Telegram and Discord groups/channels and identified nearly 5,000 different pumps. Our findings provide the first measure of the scope of pumps and suggest that this phenomenon is widespread and prices often rise significantly. We also examine which factors affect the pump's \suc- cess." 1 Introduction As mainstream finance invests in cryptocurrency assets and as some countries take steps toward legalizing bitcoin as a payment system, it is important to understand how susceptible cryptocurrency markets are to manipulation. This is especially true since cryptocurrency assets are no longer a niche market. The market capitaliza- tion of all cryptocurrencies exceeded $800 Billion at the end of 2017. Even after the huge fall in valuations, the market capitalization of these assets is currently around $140 Billion. This valuation is greater than the fifth largest U.S. commer- cial bank/commercial bank holding company in 2018, Morgan Stanley, which has a market capitalization of approximately $100 Billion.1 In this paper, we examine a particular type of price manipulation: the \pump and dump" scheme. These schemes inflate the price of an asset temporarily so a ∗Hamrick: University of Tulsa, [email protected].
    [Show full text]
  • Steem an Incentivized, Blockchain-Based Social Media Platform
    Steem An incentivized, blockchain-based social media platform. Daniel Larimer, Ned Scott, Valentine Zavgorodnev, Benjamin Johnson, James Calfee, Michael Vandeberg March 2016 Abstract Steem is a blockchain database that supports community building and social interaction with cryptocurrency rewards. Steem combines concepts from social media with lessons learned from building cryptocurrencies and their communities. An important key to inspiring participation in any community, currency or free market economy is a fair accounting system that consistently reflects each person's contribution. Steem is the first cryptocurrency that attempts to accurately and transparently reward an unbounded number of individuals who make subjective contributions to its community. ​ ​ ​ ​ 2 of 44 Table of Contents Abstract Table of Contents Introduction Recognizing Contribution Ways to Contribute Capital Contributions Steem (STEEM) ​ ​ Steem Power (SP) Steem Dollars (SMD) Minimizing Fraudulent Feeds Mitigating Timing Attacks Minimizing Abuse of Conversions Liquidity Sustainable Debt to Ownership Ratios Interest Setting Price Feeds Subjective Contributions Distributing Currency Voting on Distribution of Currency Voting Collusion The Story of the Crab Bucket Rate Limited Voting Delayed Payouts Payout Distribution Rewarding Parent Posts Payouts Consensus Algorithm Consensus in Steem Mining in Steem Mining Rewards require Steem Power ​ Mining Algorithm Botnet Resistant Mining Pool Resistant Eliminating Transaction Fees The Problem With Fees Micropayments Don’t Work Fees are a Barrier to Entry Changing Fees Sybil Attacks Full Reserve vs Fractional Reserve 3 of 44 Iterating Beyond Micropayments Example Implementation Case Study: Bitcoin Impact of Capacity Maximum Number of Unique Users Comparison to Fees Account Creation Justifying Minimum Balances Adjusting the Reserve Ratio Effectiveness Relative to Fees Renting vs.
    [Show full text]
  • Complete Guide for Trading Pump and Dump Stocks
    Complete Guide for Trading Pump and Dump Stocks Pump and dump stocks make me sick and just to be clear I do not trade these setups. When I look at a stock chart I normally see bulls and bears battling to see who will come out on top. However, when I look at a pump and dump stock it just saddens me. For those of you that watched the show Spartacus, it’s like when Gladiators have to fight outside of the arena and in dark alleys. As I see the sharp incline up and subsequent collapse, I think of all the poor souls that have lost IRA accounts, college savings and down payments for their homes. Well in this article, I’m going to cover 2 ways you can profit from these setups and clues a pump and dump scenario is taking place. Before we hit the two strategies, let’s first ground ourselves on the background of pump and dump stocks. What is a Pump and Dump Stock? These are stocks that shoot up like a rocket in a short period of time, only to crash down just as quickly shortly thereafter. The stocks often come out of nowhere and then the buzz on them reaches a feverish pitch. We can break the pump and dump down into three phases. Pump and Dump Phases Phase 1 – The Markup Every phase of the pump and dump scheme are challenging, but phase one is really tricky. The ring of thieves need to come up with an entire plan of attack to drum up excitement for the security but more importantly people pulling out their own cash.
    [Show full text]
  • Exploring Stakeholder Mobilization in the Instance of Corporate Fraud and Ponzi Schemes
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by OPUS: Open Uleth Scholarship - University of Lethbridge Research Repository University of Lethbridge Research Repository OPUS http://opus.uleth.ca Theses Business, Dhillon School of 2011 Get mad, stay mad : exploring stakeholder mobilization in the instance of corporate fraud and Ponzi schemes McCormick, Cameron Anthony Lethbridge, Alta. : University of Lethbridge, Faculty of Management, c2011 http://hdl.handle.net/10133/3248 Downloaded from University of Lethbridge Research Repository, OPUS GET MAD, STAY MAD: EXPLORING STAKEHOLDER MOBILIZATION IN THE INSTANCE OF CORPORATE FRAUD AND PONZI SCHEMES Cameron Anthony McCormick Bachelor of Commerce in Cooperative Education, University of Alberta, 2003 A Thesis Submitted to the School of Graduate Studies of the University of Lethbridge in Partial Fulfillment of the Requirements for the Degree MASTER OF SCIENCE IN MANAGEMENT Faculty of Management University of Lethbridge LETHBRIDGE, ALBERTA, CANADA © Cameron McCormick, 2011 Dedication This thesis is the result of an off the cuff remark she made on our very first date; therefore, I dedicate this to my darling wife: Krista. Without your love, kindness and support, I never would have started this journey, let alone finish it. I love you and thank- you for believing in me when no one else did. iii Abstract Using a multi-case study, three Ponzi schemes were investigated: Road2Gold, Bernie Madoff’s empire, and the Earl Jones affair. This grounded study used an inductive bottom-up methodology to observe and describe stakeholder mobilization in reaction to corporate fraud. This research on stakeholder behaviour in Ponzi schemes articulates new theory for describing stakeholder behaviour and possible determinants for successful mobilization to action.
    [Show full text]
  • Blockchain Based Daily Pixel Art Competition
    The Blockchain Based Daily Pixel Art Competition Bachelor Thesis Kees Fani Manuel Borba da Silva Falcão Ferreira Pavel Hoogland 25/06/2018 TU Coach: Dr. Ir. Rafael Bidarra Client adviser: MSc. Marco van Etten Coordinator: Dr. Ir. Otto Visser 1 Table of Contents Table of Contents 1 PREFACE 8 Summary 9 Introduction 10 Blockchain Developments 10 New possibilities 10 Client and Supervision 11 Structure 12 Problem Definition 13 Decentralized vs Centralized 13 Conflicts in Gaming 13 Creation of a Blockchain Game 14 Problem Analysis 15 Cost of Centralization 15 Persistent Games 15 Other Benefits of Decentralization 16 Challenges of the Problem 16 Blockchain 17 Bitcoin 17 Mining 18 Ethereum and Smart Contracts 18 Flaws and possible solutions 18 Mining pools 18 Bitcoin Scalability 19 Proof of Stake 19 Steem & EOS 20 Steem 20 Delegated Proof of Stake 20 EOS 21 Current Activity 22 2 Game Design Phase 24 Client Requirements 24 Search-Space Reduction 25 No fast-paced games 25 No games relying on asymmetric information 25 No games relying on randomness 25 Game must rely on a token 25 Casual gameplay 25 No Complex games 25 Search-Space Exploration 26 Deposit Based Play 26 Collaborative Content Creation 26 Deathmatch Free For All 26 Turn Based Strategy 26 Category Elimination 27 Deposit Based Play 27 Deathmatch Free For All 27 Turn based strategy 27 Collaborative Content Creation 27 Search-Space Exploitation 28 Collaborative Music Creation 28 Collaborative Sculpting 28 Collaborative Drawing 28 Our Preference 28 Refined Game Concept 29 Drawing Mechanism
    [Show full text]
  • CRYPTO CURRENCY Technical Competence & Rules of Professional Responsibility
    CRYPTO CURRENCY Technical Competence & Rules of Professional Responsibility Marc J. Randazza Rule 1.1 Comment 8 To maintain the requisite knowledge and skill, a lawyer should keep abreast of changes in the law and its practice, including the benefits and risks associated with relevant technology, engage in continuing study and education and comply with all continuing legal education requirements to which the lawyer is subject. Crypto Currency 1. What is Crypto Currency? 2. How does it work? 3. How could you screw this up? Blockchain •Decentralized •Transparent •Immutable Blockchain Blockchain • Time-stamped series of immutable records of data • Managed by a cluster of de-centralized computers • Each block is secured and bound to another, cryptographically • Shared • Immutable • Open for all to see – how you keep it honest Blockchain Blockchain • Transparent but also pseudonymous • If you look on the ledger, you will not see “Darren sent 1 BTC to Trixie” • Instead you will see “1MF1bhsFLkBzzz9vpFYEmvwT2TbyCt7NZJ sent 1 BTC” • But, if you know someone’s wallet ID, you could trace their transactions Crypto Roller Coaster – 5 years Crypto Roller Coaster – 1 day How can you screw this up? Quadriga You can lose it & Bankruptcy Your mind • C$190 million turned to digital dust • Thrown away with no back up • Death of CEO turned death of • $127 million in the trash – gone business • 7,500 BTC – Fluctuates WILDLY Ethical Considerations You might be surprised at what violates Rule 1.8 Which Rules? Rule 1.2 (d) – Criminal or Fraudulent Activity Rule 1.5 (a) – Reasonable Fee Rule 1.6 – Confidentiality Rule 1.8 (a) – Business Dealings With Clients Rule 1.8(f) – Compensation From Other Than Your Client Rule 1.15 (a) – Safekeeping Property Rule 1.15 (c) – Trust Accounts Rule 1.2(d) – Criminal or Fraudulent Activity • Crypto *can* be used for criminal activity • Tends to be difficult, but not A lawyer shall not ..
    [Show full text]
  • Profiles of Madoff Ponzi Scheme Victims Hossein Nouri Brian Kremenich*
    Journal of Forensic and Investigative Accounting Volume 11: Issue 2, Special Edition, 2019 Profiles of Madoff Ponzi Scheme Victims Hossein Nouri Brian Kremenich* Background Far too often, when news of devastation or major crime breaks, media headlines focus on negative outcomes and perpetrators, with the victims only receiving a cursory glance: Hijackers Crash Commercial Airliners into World Trade Center, Pentagon Hurricane Karina Bursts Levees, New Orleans Underwater Bernie Madoff’s Ponzi Scheme Defrauds Investors out of $65 Billion After the initial shock, investigations begin to piece together the details of the events that took place and learn how the disaster happened. The hijackers smuggled knives and threatened to blow up the planes in order to take control of the cockpit. Hurricane Katrina’s winds generated a storm surge that overwhelmed a strained levee system until it could no longer resist the perilous conditions. Bernie Madoff leveraged the trust gained during his financial career to recruit investors who did not see through his facade. Over time, stories of the individuals harmed by the crises rise to public attention. Surviving World Trade Center workers shared recollections of that fateful September morning. Newly homeless New Orleans families recalled the cherished memories made in their lost homes as they comb through their water-soaked belongings. Madoff victims wrote heartbreaking letters to the court detailing the scope of their financial calamity in supporting the maximum prison sentence for Madoff. History will remember Bernard “Bernie” Madoff for operating the largest-ever Ponzi scheme, a ploy in which fund investors receive a return based on the capital contributed by new investors rather than through returns on investment.
    [Show full text]
  • XTRD Whitepaper
    Version 1.5 WHITE PAPER VERSION 1.5 1 3 / 07/3/07/20182018 Version 1.4 Disclaimer PLEASE READ THIS DISCLAIMER SECTION CAREFULLY. IF YOU ARE IN ANY DOUBT AS TO THE ACTION YOU SHOULD TAKE, YOU SHOULD CONSULT YOUR LEGAL, FINANCIAL, TAX, OR OTHER PROFESSIONAL ADVISOR(S). This white paper is for informational purposes only. The information set forth below and elsewhere in this white paper may not be exhaustive and does not imply any elements of a contractual relationship. While we make every effort to ensure that any material in this white paper is accurate and up to date, such material in no way constitutes the provision of professional advice. XTRD Digital Assets Inc. does not guarantee, and accepts no legal liability whatsoever arising from or connected to the accuracy, reliability, currency, or completeness of any material contained in this white paper. Any potential XTRD token holders or investors should seek appropriate independent professional advice prior to relying on, or entering into any commitment or transaction based on, material published in this white paper, which material is purely published for reference purposes alone. XTRD tokens will not be intended to constitute securities in any jurisdiction. This white paper does not constitute a prospectus or offer document of any sort and is not intended to constitute an offer of securities or a solicitation for investment in securities in any jurisdiction. TRD Digital Assets, Inc. does not provide any opinion on any advice to purchase, sell, or otherwise transact with XTRD tokens and the fact of presentation of this white paper shall not form the basis of, or be relied upon in connection with, any contract or investment decision.
    [Show full text]
  • Blockchain Technology: Introduction
    Blockchain Technology: Introduction Ashley Lannquist World Economic Forum 0 Blockchain Technology • A record log with distributed ownership that can host and record transactions between multiple parties in a peer-to-peer, verifiable, and permanent way. 1 Features • Distributed and synchronized • Peer-to-Peer Transmission • Transparency • Traceability • Irreversibility of Records • Automated “smart contract” execution Features • Globally Shared Record Log ➢ Transactions continually synced across participants ➢ Common, shared view of transaction history ➢ Facilitates interparty reconciliation, agreement on transaction activity Transactions = transfer / sending of value, information, records, etc. ~ Main mode of interaction in blockchain networks Features • Distributed/decentralized functionality & data storage ➢ Record logs stored in distributed manner across computer “nodes” ➢ No single party controls data/info ➢ Reduces risk of fraud, corruption, other misbehavior by centralized database owners ➢ Database robustness from redundancy Features • Transaction Transparency ➢ Transactions visible to all network participants ➢ (Network can be public or permissioned) ➢ (Can overlay privacy features for confidentiality) Features • Transaction & Asset Traceability ➢ Movement of funds and goods across transactions visible and traceable ➢ Provenance/origin/supply chain tracking capability Features • Irreversibility of Records (“Immutability”) ➢ Using cryptography, data is tamper- proof ➢ Multiple parties can access and write to the ledger but no one
    [Show full text]
  • Investment Swindles and Con Schemes I. Introduction
    INVESTMENT SWINDLES AND CON SCHEMES TABLE OF CONTENTS I. INTRODUCTION ........................................................................................................................................... 1 II. INVESTMENT SWINDLES AND CON SCHEMES OVERVIEW Who Are the Perpetrators and Victims of These Schemes? .............................................................................. 3 Why Do the Perpetrators Commit These Con Schemes? .................................................................................. 3 Why Do Consumers Become Victims to These Schemes? ................................................................................ 4 What Are the Red Flags That Characterize These Con Schemes? .................................................................... 4 How Are These Con Schemes Executed? ............................................................................................................. 5 Effects on Consumers .............................................................................................................................................. 6 Review Questions ..................................................................................................................................................... 7 III. INVESTMENT SCHEMES Introduction ............................................................................................................................................................... 8 Bonds ......................................................................................................................................................................
    [Show full text]
  • Consensus, Immutable Agreement for the Internet of Value
    Consensus Immutable agreement for the Internet of value kpmg.com Seizing opportunity – blockchain and beyond Contents ack in early 2009, the high-profile journey of the first About the authors Bitcoin overshadowed the ingenuity of its underlying The terms 1 Seizing opportunity – Blockchain and beyond Blockchain, distributed ledgers, Sigrid Seibold technology, the blockchain protocol. These days, however, B and consensus mechanisms are Principal, Advisory Capital 2 The basics behind blockchain blockchain is garnering its own share of headlines. Inspired by sometimes used interchangeably. Markets, KPMG LLP 3 Consensus the original blockchain protocol, a variety of new consensus For purposes of this paper, we use Sigrid looks back at 25 years mechanisms and new types of distributed ledger technologies the following definitions: of working in the banking 10 Key observations are continuing to emerge. As innovation accelerates, proponents and capital markets industry. 14 Is blockchain right for your organization Blockchain: A type of distributed She primarily focuses on are eagerly seeking solutions that may work within the current ledger database that maintains a the major investment banks, leveraging her areas of 15 Maneuvering the road ahead regulatory confines of financial services and other industries. continuously growing list of transaction specialization, such as data management and digital 17 Appendix 1: Key terminology records ordered into blocks with various technologies, including financial and blockchain. As a As a result, more and more financial services companies and venture capital (VC) firms protections against tampering and respected industry thought leader, she has published 19 Appendix 2: Consensus mechanism valuation are looking closely at blockchains and other distributed ledgers, and with good reason.
    [Show full text]
  • Download the Sample Pages
    Vice President, Publisher: Tim Moore Associate Publisher and Director of Marketing: Amy Neidlinger Executive Editor: Jeanne Glasser Editorial Assistant: Myesha Graham Development Editor: Russ Hall Operations Manager: Gina Kanouse Senior Marketing Manager: Julie Phifer Publicity Manager: Laura Czaja Assistant Marketing Manager: Megan Colvin Cover Designer: Chuti Prasertsith Managing Editor: Kristy Hart Project Editors: Jovana San Nicolas-Shirley and Alexandra Maurer Copy Editor: Language Logistics Proofreader: Seth Kerney Indexer: Rebecca Salerno Compositors: Gloria Schurick and Jake McFarland Manufacturing Buyer: Dan Uhrig © 2011 by Pearson Education, Inc. Publishing as FT Press Upper Saddle River, New Jersey 07458 FT Press offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales. For more information, please contact U.S. Corporate and Government Sales, 1-800-382-3419, [email protected]. For sales outside the U.S., please contact International Sales at [email protected]. Company and product names mentioned herein are the trademarks or registered trademarks of their respective owners. All rights reserved. No part of this book may be reproduced, in any form or by any means, without permission in writing from the publisher. Printed in the United States of America First Printing December 2010 ISBN-10: 0-13-138556-9 ISBN-13: 978-0-13-138556-6 Pearson Education LTD. Pearson Education Australia PTY, Limited. Pearson Education Singapore, Pte. Ltd. Pearson Education North Asia, Ltd. Pearson Education Canada, Ltd. Pearson Educación de Mexico, S.A. de C.V. Pearson Education—Japan Pearson Education Malaysia, Pte. Ltd. Library of Congress Cataloging-in-Publication Data Springer, Kenneth S., 1953- Digging for disclosure : tactics for protecting your firm’s assets from swindlers, scammers, and imposters / Kenneth S.
    [Show full text]