Download Felkins Criminal Complaint.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

Download Felkins Criminal Complaint.Pdf AO 91 (Rev. 11/11) CriminalCase Complaint 2:20-mj-00140-CKD Document 1 Filed 09/14/20 Page 1 of 22 UNITED STATES DISTRICT COURT for the FILED Sep 14, 2020 Eastern District of California CLERK, U.S. DISTRICT COURT EASTERN DISTRICT OF CALIFORNIA United States of America ) v. ) ) Case No. 2:20-mj-0140 CKD ) Kristy Lynn FELKINS ) ) ) Defendant(s) SEALED CRIMINAL COMPLAINT I, the complainant in this case, state that the following is true to the best of my knowledge and belief. On or about the date(s) of February 2016 through May 2016 in the county of Butte in the Eastern District of California , the defendant(s) violated: Code Section Offense Description 18 U.S.C. § 1958 Use of Interstate Commerce Facilities in the Commission of Murder-for-Hire This criminal complaint is based on these facts: (see attachment) ܈ Continued on the attached sheet. V Complainant’s signature Special Agent Aron Mann Homeland Security Investigations Printed name and title Sworn to before me and signed telephonically. Date: DWDP Judge’sJudge’s signaturesignature City and state: Sacramento, California Carolyn K. Delaney, U.S. Magistrate Judge Printed name and title Case 2:20-mj-00140-CKD Document 1 Filed 09/14/20 Page 2 of 22 AFFIDAVIT IN SUPPORT OF CRIMINAL COMPLAINT I, Aron Mann, being duly sworn, hereby depose and state as follows: I. INTRODUCTION AND AGENT BACKGROUND 1. I am a Special Agent with Homeland Security Investigations (“HSI”) and have been so employed since June 2016. As a requirement for employment as an HSI Special Agent, I successfully completed the Criminal Investigator Training Program (“CITP”) located at the Federal Law Enforcement Training Center (“FLETC”) in Glynco, Georgia. At the conclusion of CITP, I completed an additional Homeland Security Investigations Special Agent Training Academy. As part of the training at FLETC, I received extensive instruction in the areas of immigration law, customs law, illegal narcotics, firearms, surveillance, and interview techniques. 2. As a Special Agent with HSI, part of my duties include investigating violations of federal criminal laws, including those related to the cybercrime and the dark web. As an HSI Special Agent, I am a “Federal Law Enforcement Officer,” authorized to investigate violations of the laws of the United States and to execute search and seizure warrants issued under the authority of the United States. I have prepared, executed, and assisted in numerous search and arrest warrants, including those related to violations of federal criminal laws covering cybercrime and related activities in connection with electronic communication applications such as email. 3. Among other duties, I am currently participating in an investigation related to violations of 18 U.S.C. § 1958 (Use of Interstate Commerce Facilities in the Commission of Murder-for- Hire) (hereafter, “Subject Offense”). I personally have participated in the investigation since September 2019 and am familiar with the relevant facts and circumstances. The facts and information contained in this Affidavit are based on my knowledge and observations, my training and experience, and speaking with other federal law enforcement officers familiar with this investigation. 1 Case 2:20-mj-00140-CKD Document 1 Filed 09/14/20 Page 3 of 22 4. This Affidavit is intended to show only that there is sufficient probable cause for the requested arrest warrant and does not set forth all of my knowledge about this matter. Except where otherwise indicated, communications are reproduced in summary and in part. Where dates, figures, times, and/or calculations are set forth in this Affidavit, they are approximate, unless noted otherwise. 5. Based on my training and experience and the facts set forth in this Affidavit, I submit there is probable cause to believe that a violation of federal criminal law, to wit: the Subject Offense has been committed by Kristy FELKINS, and a warrant for her arrest should be issued. II. STATUTORY FRAMEWORK 6. Murder-for-Hire occurs when (1) whoever travels in or causes another (including the intended victim) to travel in interstate or foreign commerce, or uses or causes another (including the intended victim) to use the mail or any facility of interstate or foreign commerce, (2) with intent that a murder be committed in violation of the laws of any State or the United States (3) as consideration for the receipt of, or as consideration for a promise or agreement to pay anything of pecuniary value, or who conspires to do so [violates this statute]. 18 U.S.C. § 1958. 7. Interstate Communications occur when whoever transmits in interstate or foreign commerce any communication containing any threat to kidnap any person or any threat to injure the person of another. 18 U.S.C. § 875(c). III. TECHNICAL BACKGROUND 8. Based on my training and experience, I am aware of the following concepts: a. The “dark web,” also sometimes called the “darknet,” “dark net” or “deep web,” is a colloquial name for a number of extensive, sophisticated, and widely used criminal marketplaces operating on the Internet, which allow participants to buy and sell illegal items, such as drugs, firearms, and other hazardous materials with greater anonymity than is possible on the traditional Internet (sometimes called the “clear web” or simply “web”). These online black- market websites use a variety of technologies, including the Tor network (defined below) and 2 Case 2:20-mj-00140-CKD Document 1 Filed 09/14/20 Page 4 of 22 other encryption technologies, to ensure that communications and transactions are shielded from interception and monitoring. A famous dark web marketplace, Silk Road, operated similar to legitimate commercial websites such as Amazon and eBay, but offered illicit goods and services. Law enforcement shut down Silk Road in 2013. Currently operating, popular dark web marketplaces are Monopoly, Dark Market, and White House. b. Cellular “smart phones” can connect to the internet, including the dark web, and can be utilized to manage a drug vendor account as well as conduct digital currency transactions. c. “Vendors” are the dark web’s sellers of goods and services, often of an illicit nature, and they do so through the creation and operation of “vendor accounts.” Customers, meanwhile, operate “customer accounts.” It is possible for the same person to operate one or more customer accounts and one or more vendor accounts at the same time. d. “The Onion Router,” “Tor network,” or simply “Tor,” is a special network of computers on the Internet, distributed around the world, that is designed to conceal the true Internet Protocol (“IP”) addresses of the computers accessing the network, and, thereby, the locations and identities of the network’s users. Tor likewise enables websites to operate on the network in a way that conceals the true IP addresses of the computer servers hosting the websites, which are referred to as “hidden services” on the Tor network. Such “hidden services” operating on Tor have complex web addresses, generated by a computer algorithm, ending in “.onion” and can only be accessed through specific web browser software, including a major dark web browser known as the “Tor Browser,” designed to access the Tor network. One of the logos, or “icons,” for the Tor Browser is a simple image of the Earth with purple water and bright green landmasses with bright green concentric circles wrapping around the planet to look like an onion. e. Some software used to access the dark web does not permanently store images of the websites and or other data that are visited on the computer that is running the software. f. Digital currency (also known as crypto-currency or virtual currency)1 is generally defined as an electronic-sourced unit of value that can be used as a substitute for fiat currency (i.e., currency created and regulated by a government). Digital currency exists entirely on the Internet and is not stored in any physical form. Digital currency is not issued by any 1 For purposes of this affidavit, “digital currency,” “crypto-currency,” and “virtual currency” address the same concept. 3 Case 2:20-mj-00140-CKD Document 1 Filed 09/14/20 Page 5 of 22 government, bank, or company and is instead generated and controlled through computer software operating on a decentralized peer-to-peer network. Digital currency is not illegal in the United States and may be used for legitimate financial transactions. However, digital currency is often used for conducting illegal transactions, such as the sale of controlled substances. g. “Bitcoin” (or “BTC2”) is a type of online digital currency that allows users to transfer funds more anonymously than would be possible through traditional banking and credit systems. Bitcoins are a decentralized, peer-to-peer form of electronic currency having no association with banks or governments. Users store their bitcoins in digital “wallets,” which are identified by unique electronic “addresses.” A digital wallet essentially stores the access code that allows an individual to conduct Bitcoin transactions on the public ledger. To access Bitcoins on the public ledger, an individual must use a public address (or “public key”) and a private address (or “private key”). The public address can be analogized to an account number while the private key is like the password to access that account. Even though the public addresses of those engaging in Bitcoin transactions are recorded on the public ledger, the “Blockchain,” the true identities of the individuals or entities behind the public addresses are not recorded. If, however, a real individual or entity is linked to a public address, it would be possible to determine what transactions were conducted by that individual or entity. Bitcoin transactions are, therefore, described as “pseudonymous,” meaning they are partially anonymous. h. Although they are legal and have known legitimate uses, Bitcoins are also known to be used by cybercriminals for money-laundering purposes and are believed to be the most oft- used means of payment for illegal goods and services on “dark web” websites operating on the Tor network.
Recommended publications
  • CRYPTONAIRE WEEKLY CRYPTO Investment Journal
    CRYPTONAIRE WEEKLY CRYPTO investment journal CONTENTS WEEKLY CRYPTOCURRENCY MARKET ANALYSIS...............................................................................................................5 TOP 10 COINS ........................................................................................................................................................................................6 Top 10 Coins by Total Market Capitalisation ...................................................................................................................6 Top 10 Coins by Percentage Gain (Past 7 Days)...........................................................................................................6 Top 10 Coins added to Exchanges with the Highest Market Capitalisation (Past 30 Days) ..........................7 CRYPTO TRADE OPPORTUNITIES ...............................................................................................................................................9 PRESS RELEASE..................................................................................................................................................................................14 ZUMO BRINGS ITS CRYPTOCURRENCY WALLET TO THE PLATINUM CRYPTO ACADEMY..........................14 INTRODUCTION TO TICAN – MULTI-GATEWAY PAYMENT SYSTEM ......................................................................17 ADVERTISE WITH US........................................................................................................................................................................19
    [Show full text]
  • High-Profile Cyberattack Investigations: London's Met Police
    High-Profile Cyberattack Investigations: London’s Met Police Share Takeaways Raymond Black | Metropolitan Police About the Speaker • 1990 to 1996 - Uniformed officer working in various locations across South London • 1996 to 2000 - Detective working in various locations across South London • 2000 to 2006 - Territorial Support Group (Riot police) – (2002 to 2003 - Worked in private sector management in Durban South Africa for transport and construction company) • 2006 to 2014 - Operation Trident (proactive firearms and gangs unit) – (2012 to 2013 - Employed by European Union investigating government corruption in Guatemala) • 2014 to Present – Cyber crime investigator Specialist Cyber Crime Unit • Other deployments working in various roles in Jamaica, The Netherlands, Poland and the United States 2 #ISMGSummits ROCU Map 1. North East (NERSOU) 2. Yorkshire & Humber (ODYSSEY) 3. North West (TITAN) 4. Southern Wales (TARIAN) 5. West Midlands 6. East Midlands (EMSOU) 7. Eastern (ERSOU) 8. South West (ZEPHYR) 9. London 10. South East (SEROCU) NATIONAL COORDINATION 3 #ISMGSummits Remit of MPCCU To deal with the most serious offences of: • Cyber-crime facilitated by the use and control of malicious software (malware). • Cyber-crime facilitated by the use of online phishing techniques. • Computer and network intrusions (dependant upon motives and objectives). • Denial of service attacks and website defacement (dependant upon motives and objectives). • The online trade in financial, personal and other data obtained through cyber-crime. • The intentional and dishonest online provision of services, tools etc. to facilitate cyber-crime. 4 #ISMGSummits Threshold of MPCCU • Where life is put at risk • Targeting or impacting on public safety, emergency services or other public systems and services.
    [Show full text]
  • Motion Record of the Trustee (Returnable
    - 32 - cryptocurrency business. In its investigation and review of text and email communications, the Monitor noted that certain TPPs were instructed by Mr. Cotten to provide limited information to the financial institutions in relation to the intended use of the account and its association with the cryptocurrency industry to limit scrutiny by the financial institutions. 80. The Monitor identified a number of accounts that were frozen or closed subsequent to the financial institution becoming aware of the nature of the underlying transactions. The Monitor’s investigation indicates that frequently, Quadriga’s approach to addressing financial institution queries into the nature of the account usage was often to simply move on to another financial institution to avoid further questioning. 81. The Monitor’s investigation also identified many “cash” transactions where certain Users repeatedly funded their Accounts with large cash deposits. The Monitor has been advised that this involved the User physically handing cash in the form of legal tender to a representative of Quadriga. As an example, the Platform recorded $12.1 million of “In person Payments” received from one User through a series of nineteen (19) cash transactions over a 5-month period. The Monitor has been unable to verify how or if these cash deposits were appropriately deposited into the Quadriga treasury system through TPP accounts or other accounts. The Monitor has also reviewed communications which appear to indicate that Mr. Cotten sometimes credited a User’s account with a deposit with the understanding that the User would deliver cash at some point in the future. The deposits, once credited to the User’s Account, were subsequently used by the User to trade and remove Cryptocurrency off Platform.
    [Show full text]
  • An Evolving Threat the Deep Web
    8 An Evolving Threat The Deep Web Learning Objectives distribute 1. Explain the differences between the deep web and darknets.or 2. Understand how the darknets are accessed. 3. Discuss the hidden wiki and how it is useful to criminals. 4. Understand the anonymity offered by the deep web. 5. Discuss the legal issues associated withpost, use of the deep web and the darknets. The action aimed to stop the sale, distribution and promotion of illegal and harmful items, including weapons and drugs, which were being sold on online ‘dark’ marketplaces. Operation Onymous, coordinated by Europol’s Europeancopy, Cybercrime Centre (EC3), the FBI, the U.S. Immigration and Customs Enforcement (ICE), Homeland Security Investigations (HSI) and Eurojust, resulted in 17 arrests of vendors andnot administrators running these online marketplaces and more than 410 hidden services being taken down. In addition, bitcoins worth approximately USD 1 million, EUR 180,000 Do in cash, drugs, gold and silver were seized. —Europol, 20141 143 Copyright ©2018 by SAGE Publications, Inc. This work may not be reproduced or distributed in any form or by any means without express written permission of the publisher. 144 Cyberspace, Cybersecurity, and Cybercrime THINK ABOUT IT 8.1 Surface Web and Deep Web Google, Facebook, and any website you can What Would You Do? find via traditional search engines (Internet Explorer, Chrome, Firefox, etc.) are all located 1. The deep web offers users an anonym- on the surface web. It is likely that when you ity that the surface web cannot provide. use the Internet for research and/or social What would you do if you knew that purposes you are using the surface web.
    [Show full text]
  • Cryptocurrency: the Economics of Money and Selected Policy Issues
    Cryptocurrency: The Economics of Money and Selected Policy Issues Updated April 9, 2020 Congressional Research Service https://crsreports.congress.gov R45427 SUMMARY R45427 Cryptocurrency: The Economics of Money and April 9, 2020 Selected Policy Issues David W. Perkins Cryptocurrencies are digital money in electronic payment systems that generally do not require Specialist in government backing or the involvement of an intermediary, such as a bank. Instead, users of the Macroeconomic Policy system validate payments using certain protocols. Since the 2008 invention of the first cryptocurrency, Bitcoin, cryptocurrencies have proliferated. In recent years, they experienced a rapid increase and subsequent decrease in value. One estimate found that, as of March 2020, there were more than 5,100 different cryptocurrencies worth about $231 billion. Given this rapid growth and volatility, cryptocurrencies have drawn the attention of the public and policymakers. A particularly notable feature of cryptocurrencies is their potential to act as an alternative form of money. Historically, money has either had intrinsic value or derived value from government decree. Using money electronically generally has involved using the private ledgers and systems of at least one trusted intermediary. Cryptocurrencies, by contrast, generally employ user agreement, a network of users, and cryptographic protocols to achieve valid transfers of value. Cryptocurrency users typically use a pseudonymous address to identify each other and a passcode or private key to make changes to a public ledger in order to transfer value between accounts. Other computers in the network validate these transfers. Through this use of blockchain technology, cryptocurrency systems protect their public ledgers of accounts against manipulation, so that users can only send cryptocurrency to which they have access, thus allowing users to make valid transfers without a centralized, trusted intermediary.
    [Show full text]
  • HOW to RUN a ROGUE GOVERNMENT TWITTER ACCOUNT with an ANONYMOUS EMAIL ADDRESS and a BURNER PHONE Micah Lee February 20 2017, 9:53 A.M
    HOW TO RUN A ROGUE GOVERNMENT TWITTER ACCOUNT WITH AN ANONYMOUS EMAIL ADDRESS AND A BURNER PHONE Micah Lee February 20 2017, 9:53 a.m. Illustration: Doug Chayka for The Intercept LEIA EM PORTUGUÊS ⟶ One of the first things Donald Trump did when he took office was tem- porarily gag several federal agencies, forbidding them from tweeting. In response, self-described government workers created a wave of rogue Twitter accounts that share real facts (not to be confused with “alterna- tive facts,” otherwise known as “lies”) about climate change and sci- ence. As a rule, the people running these accounts chose to remain anonymous, fearing retaliation — but, depending on how they created and use their accounts, they are not necessarily anonymous to Twitter itself, or to anyone Twitter shares data with. Anonymous speech is firmly protected by the First Amendment and the Supreme Court, and its history in the U.S. dates to the Federalist Papers, written in 1787 and 1788 under the pseudonym Publius by three of the founding fathers. But the technical ability for people to remain anonymous on today’s in- ternet, where every scrap of data is meticulously tracked, is an entirely different issue. The FBI, a domestic intelligence agency that claims the power to spy on anyone based on suspicions that don’t come close to probable cause, has a long, dark history of violating the rights of Ameri- cans. And now it reports directly to President Trump, who is a petty, re- venge-obsessed authoritarian with utter disrespect for the courts and the rule of law.
    [Show full text]
  • MEMO. Nº. 52/2017 – SCOM
    00100.096648/2017-00 MEMO. nº. 52/2017 – SCOM Brasília, 21 de junho de 2017 A Sua Excelência a Senhora SENADORA REGINA SOUSA Assunto: Ideia Legislativa nº. 76.334 Senhora Presidente, Nos termos do parágrafo único do art. 6º da Resolução do Senado Federal nº. 19 de 2015, encaminho a Vossa Excelência a Ideia Legislativa nº. 76.334, sob o título de “Criminalização Da Apologia Ao Comunismo”, que alcançou, no período de 09/06/2017 a 20/06/2017, apoiamento superior a 20.000 manifestações individuais, conforme a ficha informativa em anexo. Respeitosamente, Dirceu Vieira Machado Filho Diretor da Secretaria de Comissões Senado Federal – Praça dos Três Poderes – CEP 70.165-900 – Brasília DF ARQUIVO ASSINADO DIGITALMENTE. CÓDIGO DE VERIFICAÇÃO: CE7C06D2001B6231. CONSULTE EM http://www.senado.gov.br/sigadweb/v.aspx. 00100.096648/2017-00 ANEXO AO MEMORANDO Nº. 52/2017 – SCOM - FICHA INFORMATIVA E RELAÇÃO DE APOIADORES - Senado Federal – Praça dos Três Poderes – CEP 70.165-900 – Brasília DF ARQUIVO ASSINADO DIGITALMENTE. CÓDIGO DE VERIFICAÇÃO: CE7C06D2001B6231. CONSULTE EM http://www.senado.gov.br/sigadweb/v.aspx. 00100.096648/2017-00 Ideia Legislativa nº. 76.334 TÍTULO Criminalização Da Apologia Ao Comunismo DESCRIÇÃO Assim como a Lei já prevê o "Crime de Divulgação do Nazismo", a apologia ao COMUNISMO e seus símbolos tem que ser proibidos no Brasil, como já acontece cada vez mais em diversos países, pois essa ideologia genocida causou males muito piores à Humanidade, massacrando mais de 100 milhões de inocentes! (sic) MAIS DETALHES O art. 20 da Lei 7.716/89 estabeleceu o "Crime de Divulgação do Nazismo": "§1º - Fabricar, comercializar, distribuir ou veicular, símbolos, emblemas, ornamentos, distintivos ou propaganda que utilizem a cruz suástica ou gamada, para fins de divulgação do nazismo.
    [Show full text]
  • Notice of Filing of Amendment No. 2 to a Proposed Rule
    SECURITIES AND EXCHANGE COMMISSION (Release No. 34-80729; File No. SR-NYSEArca-2017-06) May 19, 2017 Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing of Amendment No. 2 to a Proposed Rule Change Relating to the Listing and Trading of Shares of the Bitcoin Investment Trust under NYSE Arca Equities Rule 8.201 On January 25, 2017, NYSE Arca, Inc. (“NYSE Arca” or “Exchange”) filed with the Securities and Exchange Commission (“Commission”), pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (“Act”)1 and Rule 19b-4 thereunder,2 a proposed rule change to list and trade shares of the Bitcoin Investment Trust under NYSE Arca Equities Rule 8.201. The proposed rule change was published for comment in the Federal Register on February 9, 2017.3 On March 22, 2017, pursuant to Section 19(b)(2) of the Act,4 the Commission designated a longer period within which to approve the proposed rule change, disapprove the proposed rule change, or institute proceedings to determine whether to approve or disapprove the proposed rule change.5 On April 6, 2017, the Exchange filed with the Commission Amendment No. 1 to the proposed rule change. On April 21, 2017, the Commission published notice of Amendment No. 1 and instituted proceedings to determine whether to approve or disapprove the proposed 1 15 U.S.C. 78s(b)(1). 2 17 CFR 240.19b-4. 3 See Securities Exchange Act Release No. 79955 (Feb. 3, 2017), 82 FR 10086 (Feb. 9, 2017). 4 15 U.S.C. 78s(b)(2).
    [Show full text]
  • A Cryptocurrency Spectrum Short Analysis
    Journal of Risk and Financial Management Review A Cryptocurrency Spectrum Short Analysis 1 2 3 Mircea Constantin S, cheau , Simona Liliana Crăciunescu , Iulia Brici and Monica Violeta Achim 3,* 1 Faculty of Automation, Computers and Electronics, University of Craiova, 200585 Craiova, Romania; [email protected] 2 Simona Liliana Crăciunescu, The Bucharest University of Economic Studies, 010374 Bucharest, Romania; [email protected] 3 Faculty of Economics and Business Administration, Babes, -Bolyai University, 400591 Cluj-Napoca, Romania; [email protected] * Correspondence: [email protected] Received: 30 June 2020; Accepted: 11 August 2020; Published: 17 August 2020 Abstract: Technological development brings about economic changes that affect most citizens, both in developed and undeveloped countries. The implementation of blockchain technologies that bring cryptocurrencies into the economy and everyday life also induce risks. Authorities are continuously concerned about ensuring balance, which is, among other things, a prudent attitude. Achieving this goal sometimes requires the development of standards and regulations applicable at the national or global level. This paper attempts to dive deeper into the worldwide operations, related to cryptocurrencies, as part of a general phenomenon, and also expose some of the intersections with cybercrime. Without impeding creativity, implementing suggested proposals must comply with the rules in effect and provide sufficient flexibility for adapting and integrating them. Different segments need to align or reposition, as alteration is only allowed in a positive way. Adopting cryptocurrency decisions should be unitary, based on standard policies. Keywords: cryptocurrencies; fraud; algorithms; correlations; impact; risks; regulation; blockchain 1. Introduction In the area of influence of computer science, the terms undergo rapid mutations, both in sense and interpretability.
    [Show full text]
  • Whitepaper [2], Nakamoto Explains That
    Introduction Since its inception in 2009, Bitcoin [1] and the concept of a blockchain, was developed in response to an inherent flaw in the way transactions were processed on the Internet. In his whitepaper [2], Nakamoto explains that Commerce on the Internet has come to rely almost exclusively on financial institutions serving as trusted third parties to process electronic payments. While the system works well enough for most transactions, it still suffers from the inherent weaknesses of the trust based model (Nakamoto, 2007) Bitcoin has been rapidly adopted into today’s modern marketplaces. A primary issue with Bitcoin’s rapid adoption is the increase of demand on the original blockchain to handle varying degrees of large transactions. With increased demand comes increased transactional waiting periods, and this has resulted in higher transactional fees in attempts to try and speed-up transaction confirmation times. Official Verge Blackpaper 5.0 2 Table of contents Introduction 2 1.0 Overview 4 1.1 Multi-Algo PoW 4 1.2 Tailored transactional applications 4 1.3 Simple transactions 4 1.4 Stealth transactions 5 1.5 Anon transactions 5 2.0 The Verge Network 6 2.1 TOR Integration 6 2.2 I2P Integration 7 2.3 Electrum 7 2.4 TOR Android 9 3.0 Encrypted Messaging 10 3.1 Message Propagation 11 4.0 Dual-Key Stealth Addressing 12 4.1 Dual-Key Stealth Address Protocol 13 4.2 Key Agreements 14 4.3 The Diffie-Hellman algorithm 14 4.4 Elliptic-Curve Diffie-Hellman (ECDH) 15 4.5 Key Take-aways 17 5.0 Atomic Swaps 18 5.1 What is a Hash Time-Locked Contract (HTLC)? 18 5.2 How do Hash Time-Locked Contracts work? 18 5.3 What are the benefits of HTLC’s? 19 5.4 What are the benefits of Atomic Swaps? 19 5.5 What are the limitations of on-chain Atomic Swaps? 19 5.6 What is the Lightning Network? 19 6.0 Rootstock (RSK) 21 7.0 Ring confidential transactions 24 7.1 Ring Signatures 25 7.2 Pendersen Commitment 25 7.3 Range Proofs 26 Conclusion 26 References 28 Personal Note 30 Official Verge Blackpaper 5.0 3 1.0 Overview The core innovation behind Bitcoin is its decentralized structure.
    [Show full text]
  • Coinbase Explores Crypto ETF (9/6) Coinbase Spoke to Asset Manager Blackrock About Creating a Crypto ETF, Business Insider Reports
    Crypto Week in Review (9/1-9/7) Goldman Sachs CFO Denies Crypto Strategy Shift (9/6) GS CFO Marty Chavez addressed claims from an unsubstantiated report earlier this week that the firm may be delaying previous plans to open a crypto trading desk, calling the report “fake news”. Coinbase Explores Crypto ETF (9/6) Coinbase spoke to asset manager BlackRock about creating a crypto ETF, Business Insider reports. While the current status of the discussions is unclear, BlackRock is said to have “no interest in being a crypto fund issuer,” and SEC approval in the near term remains uncertain. Looking ahead, the Wednesday confirmation of Trump nominee Elad Roisman has the potential to tip the scales towards a more favorable cryptoasset approach. Twitter CEO Comments on Blockchain (9/5) Twitter CEO Jack Dorsey, speaking in a congressional hearing, indicated that blockchain technology could prove useful for “distributed trust and distributed enforcement.” The platform, given its struggles with how best to address fraud, harassment, and other misuse, could be a prime testing ground for decentralized identity solutions. Ripio Facilitates Peer-to-Peer Loans (9/5) Ripio began to facilitate blockchain powered peer-to-peer loans, available to wallet users in Argentina, Mexico, and Brazil. The loans, which utilize the Ripple Credit Network (RCN) token, are funded in RCN and dispensed to users in fiat through a network of local partners. Since all details of the loan and payments are recorded on the Ethereum blockchain, the solution could contribute to wider access to credit for the unbanked. IBM’s Payment Protocol Out of Beta (9/4) Blockchain World Wire, a global blockchain based payments network by IBM, is out of beta, CoinDesk reports.
    [Show full text]
  • A Behavioral Economics Approach to Regulating Initial Coin Offerings
    A Behavioral Economics Approach to Regulating Initial Coin Offerings NATHAN J. SHERMAN* INTRODUCTION Initial coin offerings (ICOs) are an outgrowth of the cryptocurrency space in which companies raise capital by issuing their own cryptocurrency coin to investors. Although ICOs are an innovative method of raising capital, the growth of the ICO market is troubling considering no investor protection regulations govern the ICO process. Investors pour large amounts of money into these offerings, which are issued by companies that typically have no history of producing a product or revenue, and the prices of coins issued in ICOs are only rising because other investors also funnel money into them.1 This pattern is markedly similar to that of a speculative bubble. A speculative bubble occurs when there are “‘unsustainable increases’ in asset prices caused by investors trading on a pattern of price increases rather than information on fundamental values.”2 In a bubble, “smart money”—informed investors—bid up prices in anticipation of “noise traders” entering the market.3 The noise traders then enter the market due to the psychological biases they encounter in making their investment decisions.4 Eventually, the smart money investors sell their holdings and the bubble bursts. 5 Thus, regulators should create a framework that adequately protects investors in ICOs. The behavioral economics theory of bounded rationality provides insights for building this regulatory framework. Bounded rationality implies that humans make suboptimal choices.6 By understanding the psychological biases that influence investors’ choices, regulators will be able to help investors adopt habits that reduce the harmful effects of speculative bubbles.
    [Show full text]