Anomaly Detection in Ethereum Transactions Using Network Science Analytics

Total Page:16

File Type:pdf, Size:1020Kb

Anomaly Detection in Ethereum Transactions Using Network Science Analytics Anomaly Detection in Ethereum Transactions Using Network Science Analytics A thesis submitted to the Graduate School of the University of Cincinnati in partial fulfillment of the requirements for the degree of Master of Information Technology in the School of Information Technology of the College of Education, Criminal Justice and Human Services. by Yusuf Lanre Lawal B.Sc University of Lagos April 2014 Committee Chair: Bilal Gonen, Ph.D. Abstract Since the introduction of Bitcoin, the rate of adoption of blockchain technology has exponentially increased. Consequently, numerous other types of cryptocurrencies, such as Ethereum, have been introduced. The high rate of adoption of cryptocurrencies has resulted in the generation of enor- mous amounts of data. In this paper, we focus on detecting anomaly or outliner in the daily Ethereum network using network properties. We were able to use the network properties and data mining in getting the required results. Wallets or accounts acting on the blockchain are repre- sented as nodes, while interactions between wallets or accounts are represented as links or edges. Based on the explanation, we were able to discover how the network properties have an impact on transaction behavior within the network. we propose how this analysis would be useful in real-life events. Acknowledgements I would like to thank my Supervisor, Dr. Bilal Gonen, for his support and Dr. Ki Jung Lee for their guidance during this project. I would also like to send a warm thank you to Lauren Kirgis (Graduate Coordinator). I would send a big shout out to Adedapo Alabi who showed me support from day one and to my other friends who support me even though it can be annoying sometimes. Finally, I am indebted to my mum, Mr & Mrs Akinde, and siblings for being supportive. Thank you all for showing me love, for always lifting up my spirit and also for providing financial support throughout my gradate school journey. Contents 1 Introduction 6 1.1 Background of the Study . .6 1.2 Motivation of the Study . .7 1.3 Structure of the Study . .7 2 Literature Review 8 2.1 Introduction . .8 2.2 Related Work and Data Mining Background . .8 2.3 Applicable Data Mining Algorithms . 10 2.4 Overview of the Clustering Algorithms . 10 2.4.1 The Spectral Clustering Algorithm . 10 2.4.2 K-Means Clustering . 11 2.4.3 Ordering Points to Identify the Clustering Structure (OPTICS) Algorithm . 11 2.4.4 The Mean Shift Algorithm . 12 2.4.5 Mini-Batch K-Means . 12 2.5 Overview of Blockchain Technology . 12 2.5.1 The Architecture of Blockchain . 13 2.5.2 Digital Signatures in Blockchain . 13 2.5.3 The Primary Characteristics of Blockchain . 14 2.6 Background of Cryptocurrencies . 14 2.6.1 Overview of Ethereum . 14 2.6.2 Technical Background of Ethereum . 16 2.6.3 The Ethereum Transaction . 17 2.7 Application of Network Science in the Project . 20 2.7.1 Assortativity Coefficient . 21 2.7.2 Size . 21 2.7.3 Order . 21 2.7.4 Average Degree . 21 2.7.5 Degree of Centrality . 21 3 Methodology 22 3.1 Design . 22 3.1.1 Selection of a Suitable Algorithm . 22 3.1.2 Silhouette Analysis . 22 3.1.3 Procedure for Algorithm Selection . 23 3.1.4 Determining the Number of Clusters . 23 3.1.5 Data Dimensionality . 24 2 3.1.6 Ethereum Data Selection and Storage Formats . 25 3.1.7 Choice Programming Language . 25 3.2 Data Collection . 25 3.2.1 Procedure . 25 3.2.2 External Data Collection . 27 3.3 Challenges Encountered During the Mining process . 27 4 Results and Analysis 28 4.1 Discussion of Results . 28 4.1.1 Centrality degree . 30 4.1.2 Degree Assortativity . 32 4.1.3 Average Degree . 33 4.1.4 Size & Order . 33 5 Discussion 34 5.1 Application in Attack Forensics . 34 5.2 Application in Detection of Anomalies on the Network . 34 5.3 Deanonymization of Transactions . 35 5.4 Limitation of the Study . 35 6 Conclusion and Future Works 36 6.1 Conclusion . 36 6.2 Recommendations . 36 Bibliography 40 A Code for Extracting the Data 41 3 List of Figures 2.1 Weighted and Unweighted Edges . 10 2.2 An illustration of the blockchain. 13 2.3 A descriptive picture of how cryptocurrency works. 15 2.4 An Illustration of the Ethereum Transaction . 17 2.5 A visualization of the Ether transactions. 20 3.1 Graph Showing how the Number of Clusters Correlates with Silhouette Score. 24 4.1 The graph shows the ETH-USD Timeline. 28 4.2 The image shows the period of which they were anomalies in the cluster. 29 4.3 DELEGATECALL METHOD . 30 4.4 A FALLBACK METHOD . 30 4.5 An image showing the high activities for Degree Centrality . 31 4 List of Tables 3.1 Table showing the Silhouette Score all the Suitable Clustering Algorithms ...... 23 3.2 Table Showing Silhouette Scores of Various Number of Clusters ........... 24 4.1 The values of the various metrics are as presented in the table ............ 29 5 Chapter 1 Introduction 1.1 Background of the Study Blockchain was revolutionary when it was implemented in 2009 and was not widely accepted from its inception. It was introduced with Bitcoin to solve the double-spending problem. Like any new disruptive technology, they were concerns about the volatility of the cyrptocurrency and ease of use. Bitcoin was an invention of a computer scientist or it can be a group of people called Satoshi Nakamoto. The digital currency was invented to do away with the intermediary parties involved in transactions. Bitcoin used public keys address for sending and receiving bitcoin, the recorded transactions and the personal ID will remain anonymous [1]. Bitcoin transactions utilize cryptographic protocols to provide a secure process while striving to preserve the privacy of both the buyer and seller [2]. The popularity of cryptocurrencies has been exponentially growing since the introduction of Bitcoin. Although there are numerous types of cryptocurrencies, Bitcoin and Ethereum are the most popular cryptocurrencies [3]. The two popular cryptocurrencies are used to complete numer- ous types of transactions, including shopping, banking, forex trading, etc. According to Statista, a significant percentage of cryptocurrency transactions are done using Ethereum[4]. Statista further estimates that, on average, in the first quarter of 2020, there were approximately 753,510 daily Ethereum transactions [4]. Every successful Ethereum transaction is accompanied by valuable data. Since thousands of transactions are carried out daily, a large amount of data is generated. A significant percentage of the data is of no use until it is further processed into useful information. Therefore, it is essential to analyze the large dataset using data mining techniques to unearth use- ful and interesting data structures from the transactions. Data mining on Ethereum transactions is essential for numerous purposes. Using data mining, it is possible to detect anomalies, such as fraud, in the transactions. Although transactions using Ethereum are anonymous, data mining can be used to classify the various types of transactions [5]. 6 In this study, the aim is to use network science and unsupervised machine learning to detect anomaly or outliner in the daily Ethereum transaction. The flow of transaction is represented the daily transaction of Ether on the Ethereum network. In the Ethereum scenario, a transaction can represent some cryptocurrency transfer [6]. For every transaction that occurs in the Ethereum network formed a link within the network. The reason behind the analysis is that complex network provide network properties to show the structure of the network and using data mining algorithm to find patterns within the network [7][6][8]. The sample of the transactions extracted was done at random, from the Ethereum network. The analysis done in this project leads to an observation that an external event can change the structure of the network properties. The sample of the transactions extracted was done at random, from the Ethereum network. The analysis done in this project shows an event can change the structure of the network properties. For example, It was observed that they were periods with high volumes of transactions between hubs and nodes. The hubs have a higher presence of higher degree, likewise some period with lower degree, meaning the transactions between hub and nodes was lower. 1.2 Motivation of the Study The aim of this project is to use network science and unsupervised machine learning to detect anomaly or outlier in the daily Ethereum transactions. The network properties used in the analysis include the degree of centrality, order, size, average degree, and assortativity coefficient. 1.3 Structure of the Study The study is divided into six distinct sections: the introduction, literature review and related work, methodology, results and analysis, discussion, conclusion, and future work. The introduction section presents a brief overview of the research background and motivations. The Literature review and related work section presents the technical background essential in effectively understanding and interpreting the study results. The results and analysis section presents the outcomes obtained from the data mining process. The discussion section critically discusses the analyzed results in relation to existing peer-reviewed literature. Lastly, the conclusion summarizes the findings of the study and presents the significant inferences identified it. 7 Chapter 2 Literature Review 2.1 Introduction In this section, the essential information required in the implementation of the project is presented. The section is mainly divided into three sections: background information on blockchain and cryp- tocurrencies, background information on data mining and clustering algorithms, and the project’s potential implementation matrices. 2.2 Related Work and Data Mining Background Since the Blockchain was established, it has become the focal point of different research topics.
Recommended publications
  • Het Juridisch Statuut Van Virtuele Munteenheden
    KU LEUVEN FACULTEIT RECHTSGELEERDHEID Academiejaar 2014 - 2015 Het juridisch statuut van virtuele munteenheden Bitcoin’s pragmatic legal vacuum Promotor : Prof. Dr. M.E. Storme Masterscriptie, ingediend door Begeleider: Drs. F. Helsen Cedric Hauben bij het eindexamen voor de graad van MASTER IN DE RECHTEN “There are few things more fascinating in our jurisprudence than the organization of what comes, almost immediately, to be perceived as a new field of law” - Grant GILMORE, 1974 Sterling professor of Law, Yale Univesity 2 Inhoudstafel Inhoudstafel ...................................................................................................................................... 3 Samenvatting .................................................................................................................................... 7 Dankwoord ........................................................................................................................................ 8 Inleiding ............................................................................................................................................. 9 Hoofdstuk 1: Situering ............................................................................................................... 11 §1.1. Wat is geld? ...................................................................................................................... 11 1.1.1. Definitie ........................................................................................................................................
    [Show full text]
  • Printpdf/Libra-3
    LIBRA drishtiias.com/printpdf/libra-3 Why in News? Facebook has announced the launch of a cryptocurrency called Libra by 2020. While this signals facebook’s plans to expand into the global digital currency market, it has also raised privacy concerns. Digi Currency: Facebook’s cryptocurrency Libra will allow smartphone users to buy services digitally from their phone. Digital Wallet: Libra will be stored in a digital wallet called Calibra. Calibra is a standalone app on a user's smartphone or housed within Facebook-owned services such as WhatsApp and Messenger. How can users buy Libra? Users will need to sign up for an account using a government-issued ID to use Calibra wallet. Users will then be able to convert their money into Libra and add it to their digital wallet. Once in place, the currency can be used to pay for everyday transactions. 1/5 Libra Association: The cryptocurrency will be run by the Libra Association, a Geneva-based entity that has founding partners, including Facebook, Mastercard, Visa, Uber, and the Vodafone group. Libra Reserve: Libra will be backed by a reserve of assets in the form of securities (bank deposits and short-term government securities) and fiat currencies (like dollar, pound) to give it an intrinsic value and ensure stability. Anyone with Libra will have an assurance that they can convert their digital currency into local fiat currency based on an exchange rate. Libra Blockchain: Every Libra payment is permanently written into the Libra blockchain which is a cryptographically authenticated database and acts as a public online ledger designed to handle 1,000 transactions per second.
    [Show full text]
  • AB 129 Page 1
    AB 129 Page 1 Date of Hearing: January 21, 2014 ASSEMBLY COMMITTEE ON BANKING AND FINANCE Roger Dickinson, Chair AB 129 (Dickinson) – As Amended: January 7, 2014 SUBJECT: Lawful money: Alternative currency. SUMMARY: Specifies that current law which bans the issuance or circulation of anything but lawful money of the United States does not prohibit the issuance and use of alternative currency. EXISTING STATE LAW provides under Corporations Code section 107 that no corporation, flexible purpose corporation, association, or individual shall not issue or put in circulation, as money, anything but the lawful money of the United States. EXISTING FEDERAL LAW provides that manufacturing counterfeit United States currency or altering genuine currency to increase its value is a violation of Title 18, Section 471 of the United States Code (U.S.C.) and is punishable by a fine of up to $5,000, or 15 years imprisonment, or both. Possession of counterfeit United States obligations with fraudulent intent is a violation of Title 18, Section 472 of the U.S.C. and is punishable by a fine of up to $15,000, or 15 years imprisonment, or both. Anyone who manufactures a counterfeit U.S. coin in any denomination above five cents is subject to the same penalties as all other counterfeiters. Anyone who alters a genuine coin to increase its numismatic value is in violation of Title 18, Section 331 of the U.S.C., which is punishable by a fine of up to $2,000, or imprisonment for up to 5 years, or both. Forging, altering, or trafficking United States Government checks, bonds, or other obligations is a violation of Title 18, Section 510 of the U.S.C.
    [Show full text]
  • The Prophets of Cryptocurrency Survey the Boom and Bust
    The Prophets of Cryptocurrency Survey the Boom and Bust | The New Yorker 11/2/18, 304 PM The Prophets of Cryptocurrency Survey the Boom and Bust Inside the ongoing argument over whether Bitcoin, Ethereum, and the blockchain are transforming the world. Nick Paumgarten Not long ago, I was in Montreal for a cryptocurrency conference. My hotel, on the top floor of a big building downtown, had a roof garden with a koi pond. One morning, as I had coffee and a bagel in this garden, I watched a pair of ducks feeding on a mound of pellets that someone had left for them at the pond’s edge. Every few seconds, they dipped their beaks to drink, and, in the process, spilled undigested pellets into the water. A few koi idled there, poking at the surface for the scraps. The longer I watched, the more I wondered if the ducks were deliberately feeding the fish. Was such a thing possible? I asked the breakfast attendant, a ruddy Quebecer. He smiled and said, “No, but it is what I tell the children.” My mind had been marinating overnight—and for more than a year, really— in the abstrusities of cryptocurrencies and the blockchain technology on which they are built. Bitcoin and, subsequently, a proliferation of other cryptocurrencies had become an object of global fascination, amid prophecies of societal upheaval and reform, but mainly on the promise of instant wealth. A peer-to-peer money system that cut out banks and governments had made it possible, and fashionable, to get rich by sticking it to the Man.
    [Show full text]
  • The-Academy-Vol.-4-No.2.Pdf
    The Academy, December, 2019 TheCentre for DepositAcademy Insurance System Training & Education The bi-annual publication of the NDIC Academy Vol. 4 No. 2 December, 2019 Cryptocurrencies and The DNA of Human Notes from the The Skills That Disruptive Financial Capital: Trends Companies Need Chief Learning Technologies Report 2019 Most in 2020 Officer –Pg 2 –Pg 5 –Pg 8 –Pg 10 L-R: Prof. Paul Omaji, Dr. Olurotimi Olokodara, Dr. Lucy Newman and Dr. VISION Azubike Okoro (D/CLO) having a discussion during the Leadership Training at the NDIC Academy on Monday, December 9, 2019 To become a model deposit insurance training institute Innovative Instructional Approaches: in Africa and Asia regions by 2020 Key to Impactful Learning and MISSION Enhanced Workplace Performance he processes associated learners. It is technology-centric To promote and with the liberalization of in all ramifications. Conceptually, the world economy and it is a new process to learning foster individual and T the great achievements recorded experience, design and delivery for organizational effectiveness in information technology have improving the competence of the by developing and offering indeed, brought dynamic changes workforce. Instructional approaches an array of innovative in many organizations today. are rapidly changing from simple and diverse training The dominant concern of most classroom to web-based learning programs in support of the organizations currently is the using simulation and computerized Corporation’s commitment adoption of innovative training and tutoring. to employee development, work practices which are targeted 1.0 Instructional Design partnerships and towards overall performance. More Learning and development organizational enrichment. than ever, learning and development involves the acquisition of skills, practices have recorded tremendous changing attitude and obtaining EDITORIAL BOARD improvement in the mainstream knowledge that is targeted at of corporate functioning and are improving performance.
    [Show full text]
  • Virtual Currencies & Federal
    Alabama Law Scholarly Commons Working Papers Faculty Scholarship 1-24-2015 Virtual Currencies & Federal Law Julie Andersen Hill University of Alabama - School of Law, [email protected] Follow this and additional works at: https://scholarship.law.ua.edu/fac_working_papers Recommended Citation Julie A. Hill, Virtual Currencies & Federal Law, (2015). Available at: https://scholarship.law.ua.edu/fac_working_papers/512 This Working Paper is brought to you for free and open access by the Faculty Scholarship at Alabama Law Scholarly Commons. It has been accepted for inclusion in Working Papers by an authorized administrator of Alabama Law Scholarly Commons. Virtual Currencies & Federal Law Julie Andersen Hill JOURNAL OF CONSUMER & COMMERCIAL LAW Vol. 18, p. 65, 2014 This paper can be downloaded without charge from the Social Science Research Network Electronic Paper Collection: http://ssrn.com/abstract=2554550 Virtual currencies are growing in popularity and expanding in number. Virtual Currencies Federal & Law Journal of Consumer & Commercial Law 65 Julie Andersen Hill* irtual currencies are growing in popularity and ex- coins for this service. This is often called “mining”.8 panding in number.1 People can use them to buy In sum, Bitcoin is a system that allows users to transfer money everything from a sandwich at Subway to a trip to directly to other users. While traditional payment systems rely space with Virgin Galactic. Some attorneys even on banks or other financial intermediaries to process transactions accept virtual currencies as payment for legal ser- and prevent double spending, Bitcoin instead depends on au- vices. thentication by a network of unaffiliated “miners.” V The rise of virtual currencies, like many in- People sometimes describe Bitcoin as an anonymous pay- novations, poses legal questions.
    [Show full text]
  • Introduction to Cryptocurrency
    The World of Cryptocurrency How many people here understand the concept of cryptocurrency? “ How many people here know what the blockchain, alt coins, and ICO’s are? “ Do I have any fellow cryptocurrency investors in the room? “ 1 How did it all start? Satoshi Nakamoto A Bit of Bitcoin History 2007 Satoshi 2009 2011-2012 Nakamoto First Bitcoin Silk Road wants to transaction in opens decentralize block #170 currency $142,904,703,379 Market Cap 16,858,750/21,000,000 In circulation TrumpCoin PandaCoin Coinye DogeCoin Users faith in the system gives it value PutinCoin Boats and Bitches “ Coin Alt Coins ◉ Alternate coins are any coins that are not Bitcoin Wallet ◉ Similar to an email Exchange ◉ Used for trading alternate coins, also known as a Hot Wallet My Referral ID:22561919 2 The Blockchain The backbone of cryptocurrency How it works ◉ A system of checks and balances ◉ Imagine all of your receipts and income checks are verified by strangers How it works ◉ They are then put into a public ledger where anyone can see the transactions ◉ Your encrypted wallet assures you remain anonymous 3 Mining How cryptocurrency is generated “ 4 Smart Contracts My favorite part of the blockchain “ “ 5 ICO’s The birth of new coins ICO ◉ ICO’s allow you to invest in new coins before they list on exchanges ◉ Very much like an IPO, without an investment bank involved ◉ You buy the coins at a discount and hope that they list at a higher price ICO ◉ ICO’s are like startups, you have to analyze everything from the disruption to the team ◉ There are many scam ICO’s since they aren’t regulated 6 Current Events Let’s start with the first set of slides Reasons for bear market ◉ Bans ◉ Weak Hands ◉ Hacks ◉ Futures Contracts ◉ Tax Season ◉ Chinese New Year Thanks! Any questions ? You can find me at ◉ Sophia Noel in LinkedIn ◉ [email protected].
    [Show full text]
  • A Banking Blight Crypto-Currency
    Crypto-Currency; A Banking Blight By Kenneth J. Berke, PayQwick, LLC’s Co-Founder and CEO, and Sahar Ayinehsazian, PayQwick, LLC’s Manager of Regulatory and Governmental Affairs. he marijuana industry is a rap- by solving mathematical equations. Unlike appeals to state licensed marijuana businesses. idly expanding sector that has traditional currency, which has no finite limit Because of marijuana’s current status as a Sched- proven profitable for licensed and can be minted and multiplied as necessary, ule I controlled substance, many banks will marijuana businesses and the fi- once the maximum number of a type of crypto- not serve marijuana businesses. Consequently, Tnancial institutions that serve them. These currency has been mined, no new amount of these businesses rely heavily on cash, which is profits are often manifested by piles of cash that crypto-currency can be created. both cumbersome and extremely dangerous. that are costly and dangerous to handle. To To find a cash alternative, some marijuana busi- solve this problem, some marijuana busi- If this seems complicated, it is. In March 2014, nesses have turned to debit/credit card process- nesses have turned to crypto-currency as the Internal Revenue Service (IRS) released ing (swipe) machines that use crypto-currency. an alternative. However, crypto-currency Notice 2014-21 to explain “how existing 10 only complicates the marijuana industry general tax principles apply to transactions What are the Dangers? by exposing both crypto-currency users using virtual currency.” In Notice 2014-21, While crypto-currency may seem like a viable and the banks that serve them to liabil- the IRS stated that while “in some environ- cash alternative, in reality, it allows marijuana li- ity for money laundering and tax evasion, ments, [crypto-currency] operates like ‘real’ censees to launder money from illegal drug sales thereby putting Washington’s entire legal currency… it does not have legal tender sta- and avoid paying taxes.
    [Show full text]
  • CHAPTER 8 Liquid Alternatives
    Other Alternate Investment Asset Classes CHAPTER 8 Liquid alternatives Investment in Wine Funds Film investment as an attractive opportunity Origins and growth of carbon markets Investment in currency Investments in art funds Concept of cryptocurrency Liquid Alternatives •Due to the global financial crisis of 2008, investors could not sell assets across their portfolios fast enough. The S&P 500 TR index fell about 57%. •Investors found their investments blocked down in private real estate and private equity commitments which made them realize the importance of liquidity. Post crisis, investors began to demand better access to their capital and improved portfolio transparency. •Liquid alternatives consists of mutual funds and exchange-traded funds (ETFs) that aim to provide investors with diversification and better liquidity. Liquid Alternatives vs. Traditional Alternatives Low Daily liquidity High investment transparency minimums Reduced fee Efficient tax structure reporting Liquid Alternative Strategies •Long-Short Equity: Long position is taken on stocks that are expected to appreciate and a short position for stocks that are expected to decline. This helps in minimizing the market exposure. •Managed Futures: Implemented by managing futures strategically, by exploiting the price trends in the global financial market. It provides a non-correlated hedge against downfall in traditional markets. •Merger Arbitrage: Earn returns by exploiting mispricing opportunities created due to merger and acquisition transactions. The stock of the target
    [Show full text]
  • Kanye West Sics Lawyers on Coinye
    EXHIBIT F Kanye's Lawyer Moves to Block Coinye - Digits - WSJ http://blogs.wsj .coin/digits/2014/01/07/kanyes-lawyer-moves-to-blo... News, Quotes, Companies, Videos Log In TECH ONLY $T A WEEK F0R12 WEEKS SUBSCRIBE NOW » Fwalimitedtime CONPANES ggjg|g|g GOOGLE 2014 What Happened at A Full-Featured, $38 i Tech News & Analysis CES, Day i H gMeOs Coming to I I From the WSJ m COMPANIES MOBILE PRIVACY SOCIAL MEDIA APPS GAMES ASIA EUROPE HOT TOPICS: APPLE TWITTER BtTCOIN NSA SURVEILLANCE MICROSOFT CEO SEARCH AMAZON'S DELIVERY DRONE 9:35 am Jan 7,2014 INTERNET SEARCH DIGITS Kanye's Lawyer Moves to Block Coinye J ARTICLE VIDEO ; COMMENTS (6) BITCOIN COINYE COINfEWEST KANYEWEST VIRTUAL CURRENCIES Email Print By DANNY YADRON Lawyers for Kanye West filed cease-and-desist papers against the seven anonymous coders behind Coinye West, a virtual currency that went from chatroom joke to Internet sensation last week. The legal document, dated J an. 6, includes an image of Coinye - a cartoon representation of West on a gold medallion. West's lawyer argues Don't Miss [?] trademark infringement. "Given Mr. West's wide-ranging I entrepreneurial accomplishments, 0? Z. consumers are likely to mistakenly believe I that Mr. West is the source of your Lamborghini Unveils Chipotie Ad Named Opinion: Medical services," wrote Brad Rose, a partner at the Huracen One of 2013's Worst Downsides of Rocky •«**? Pryor Cashman LLP, which has previously Mountain Highs / worked for West. / / Hoping to keep pace with the About Digits self-assured, brash West, the techies Digits delivers breaking news and insights about the aren't backing down.
    [Show full text]
  • Michael Held: US Regulations and Approaches to Cryptocurrencies
    U.S. Regulations and Approaches to Cryptocurrencies December 03, 2019 Posted December 12, 2019 Michael Held, Executive Vice President and General Counsel Remarks at the BIS Central Bank Legal Experts’ Meeting, Basel, Switzerland As prepared for delivery Thank you, Diego, for “volunteering” me to speak about digital currencies—a field in which I count myself as very much a trainee, not an expert. Today I will focus on the U.S. regulatory landscape for digital currencies, in particular on digital currencies issued by private organizations that are intended to be used like money. As always, the views I express are my own, not necessarily those of the Federal Reserve Bank of New York or the Federal Reserve System.1 Policy makers and regulators in the United States, to date, have not developed an overarching framework for regulating private digital currencies. The field has been seen as too new for a comprehensive regulatory response. To be sure, the digital nature of new private currencies will raise challenges to which policy makers must respond. In my view, however, we spend so much time wrestling with the novelty of digital currencies that we forget that private currency is nothing new. The theme of my talk today is accordingly best encapsulated by a quote that is attributed—perhaps wrongly—to Mark Twain: “History may not repeat itself, but it does rhyme.” The Past Is Not Dead. It Isn’t Even Past So, let’s take a little walk through the history of privately-issued currency. We begin in Michigan in 1837, when the state legislature passed the first “free” banking law in the United States.2 Upon commencing business, free banks could issue banknotes—that is, private currencies—that were redeemable in specie—gold or silver.3 These banknotes were transferable debt backed by the general creditworthiness of the bank that issued them, plus assets like bonds and mortgages on real estate, and for a brief time, personal guarantees.4 The statute permitted bank organizers to establish a bank by filing an application with the local county treasurer and county clerk.
    [Show full text]
  • Virtual Currencies Are Growing in Popularity and Expanding in Number
    Virtual currencies are growing in popularity and expanding in number. Virtual Currencies Federal & Law Journal of Consumer & Commercial Law 65 Julie Andersen Hill* irtual currencies are growing in popularity and ex- coins for this service. This is often called “mining”.8 panding in number.1 People can use them to buy In sum, Bitcoin is a system that allows users to transfer money everything from a sandwich at Subway to a trip to directly to other users. While traditional payment systems rely space with Virgin Galactic. Some attorneys even on banks or other financial intermediaries to process transactions accept virtual currencies as payment for legal ser- and prevent double spending, Bitcoin instead depends on au- vices. thentication by a network of unaffiliated “miners.” V The rise of virtual currencies, like many in- People sometimes describe Bitcoin as an anonymous pay- novations, poses legal questions. Most existing laws do not con- ment system, but it is more accurately described as a pseudon- template the existence of virtual currencies. Can existing U.S. ymous payment system. As just explained, all transactions are criminal law, tax law, banking law, securities law, and consumer recorded on the public block chain.9 If a user makes her Bit- protection law nevertheless be applied to virtual currencies? This coin address public or repeatedly uses the same address, it can be article provides an update on federal regulators’ recent attempts to relatively easy to discover a user’s transactions. Newer cryptocur- tackle these questions. Because virtual currencies are new, the law rencies may promise greater anonymity,10 but in a world where is still developing.
    [Show full text]