In many places, uncles don't actually know much about virtual currency when handling cases, so there are special uncles who do research and form popular science documents or internal tutorials. These materials are also very good popular science tutorials for us novices, avoiding falling into certain pig-killing scams due to lack of understanding.

Origin: Virtual currency, also known as cryptocurrency or digital currency, is a digital asset that is protected and verified by encryption technology. It is not controlled by any central bank or government agency, so it has the characteristics of decentralization, anonymity and security.

In 2008, a person or team with the pseudonym Satoshi Nakamoto published a white paper titled Bitcoin: A Peer-to-Peer Electronic Cash System, which described the principles of Bitcoin. This is considered the origin of virtual currency.

In 2009, the Bitcoin network was officially launched, and Satoshi Nakamoto mined the first block (the Genesis block), marking the birth of virtual currency.

In 2010, Bitcoin began to circulate and conducted its first physical transaction. A programmer named Laszlo Hanyecz used 10,000 Bitcoins to buy two pizzas, which is considered the first practical application of Bitcoin.

Because it is not controlled by any central bank or government agency and has the characteristics of decentralization, anonymity and security, cryptocurrency is favored by criminals.

The virtual currency commonly used by criminals is called USDT. USD is the abbreviation of the US dollar, and T stands for Tether, the company that issues USDT.

Because USDT is always 1:1 tied to the U.S. dollar and has a stable exchange rate, it consumes energy (TRX, which can also be understood as transfer fees) when circulated among scammers, and is not affected by price fluctuations.

USDT is often called U, oil, etc., in order to avoid triggering certain keywords and attracting attention from departments such as uncles.

circulation:

Virtual currency is a product derived from blockchain technology and encryption technology. Transfers are also completed on the blockchain. The same virtual currency transfer chain (channel, channel) is also different. Different chains can be understood as different transfer methods. For example, traditional RMB transfers include card-to-card transfers, WeChat transfers, Alipay transfers, etc.

The most commonly used transfer method for USDT is called Tron transfer. Just remember that it is Tron chain transfer or TRC20 transfer.

To transfer virtual currency, you need to know the other party’s wallet address, which can be understood as a bank card account. Generally, the transfer process will be completed within 30 seconds.

Because of its anonymity, you cannot know who the person is through the wallet address, unless the other party's wallet address is an exchange address, such as Binance, Ouyi, Huobi and other large exchanges, which will generally cooperate with my uncle to retrieve relevant registration information.

As long as you know the wallet address of the payer or receiver, you can check all the transfer records on the blockchain browser. It can be understood that it is quite simple to query the transfer records of virtual currency, which can be completed in a few seconds. The difficult part is to query the account details, unless the suspect has been arrested and he confesses that the account is used by him.

The entire transfer process can be compared to a bank card transfer. The wallet address is the bank card number. The main network can be understood as different transfer channels or methods. TRC20 is the most commonly used transfer method. Transfers via USDT can also be queried, which is similar to bank card statements.

The USDT transfer flow is open to everyone. As long as you know the wallet address of any one of the payee or payer, you can check it. However, the wallet address is anonymous. It can be understood that it is very simple to check the flow, but it is difficult to check the account information (actual user information). Only when the user uses mainstream exchanges such as Binance, Ouyi, Huobi, etc. to transfer money can the real-name information be checked (Uncle needs to send a letter for verification).

All decentralized wallets are anonymous, such as IM token wallet, TP wallet, etc., and registration does not require any information. As long as you have the secret key or mnemonic, you will have control over the account.

You can check transfers through a blockchain browser, such as OKEx.

Take the query of Huiwang Group's TDbCWvDhGfgt1pwjHovsugHBXaHXmSRRsj address as an example:

The address currently has a USDT balance of more than 3 million US dollars, worth more than 20 million RMB, all of which are deposits paid by telecommunications fraud gangs.

图片


Analysis of the crimes of Huiwang Group:

The process of this type of crime is generally that the source of the material (the person who provides the victim's money in the fraud gang, that is, the suspect who actually commits the fraud) finds a fleet (a professional money laundering gang) to connect with and entrusts the fleet to collect the victim's money and launder it. The criminal behavior is completed on an airplane on an overseas social software.

Because the material owner and the fleet do not know each other and lack trust in each other, Huiwang Group provides a service called guarantee on the airplane chat software. Before the material owner and the fleet engage in illegal money laundering, both parties pledge a certain amount of virtual currency (all USDT) to the guarantee account designated by Huiwang Group. Generally, the fleet pays the deposit. Huiwang Group monitors and records the entire money laundering process and charges a service fee of 0.2% or 0.3%.

After Huiwang Group deducts its own service fee, the pledged funds can be returned after the money laundering process is completely completed, and the material party generally does not charge RMB. After deducting its own profit, the fleet will pay the material party's profit through USDT.

What is the process of Huiwang guarantee transaction?

During the guarantee transaction process, the material party and the fleet will write down the entire process in writing, similar to a contract and send it to the transaction group, and set the profit ratio for the fleet and agree on what the material is, such as the three black (impersonating public security, procuratorial and judicial) material, the fine chat (pig killing) material, etc.

Because different materials have different effects on bank cards, three kinds of black materials will be frozen quickly and the crackdown is more severe, so the commission ratio of the three-black material team can reach more than half, and the commission ratio of the fine chat material team can also reach 20 to 30 percent. However, as the efforts to cut off the cards increase, the commission ratio is also constantly increasing.

After each successful transfer, the material party will report it in the group, the fleet will confirm it, and then the accounting robot in the group will record it. If the agreement is for precise chat material and it is guaranteed for 24 hours, if the card is frozen within 24 hours, the loss will be borne by the material party, and the loss will be borne by the fleet if the card is frozen for more than 24 hours.

If the fleet inquires after the freeze and finds that the freeze was caused by the money that entered the three black materials, the freezing loss shall be borne by the material party. All proofs shall be based on the query of the electronic fraud platform, and the query fee shall be borne by the party at fault.

The uncles' traditional investigative techniques are not enough to deal with new types of criminal activities involving virtual currencies, and existing policies and regulations lag slightly behind front-line law enforcement.

The shortcomings of traditional investigative techniques are mainly reflected in: lack of understanding of the basic knowledge of the blockchain industry, unclear understanding of the methods of virtual currency criminal activities, lack of grasp of case analysis and crackdown methods, and insufficient specificity of technical tools.

The slight lag in existing policies and regulations is reflected in the lack of standardized judicial interpretation and rich judicial experience in the identification of criminal behavior.

According to the logic of criminal activities, existing cases involving virtual currency can be divided into five major types: online gambling, pornographic live streaming, fraud, theft, pyramid schemes, money laundering, and black and gray industries.

In 2018, Tron was launched, which is the TRC20 transfer method, solving the problems of slow transaction time and high cost on the Ethereum network. The transaction speed of blockchain has entered the second level and the transaction cost has dropped to US dollars.

In 2021, the rapid development of non-fungible tokens (NFTs) opened the door to the commercialization of blockchain and provided a new way to conceal the transfer of funds involved.

Due to the convenience, concealment and increasing difficulty of combating the above crimes, almost all Internet-related crimes adopt this method, which is not only difficult to track but also extremely easy to cash out.

The characteristics of blockchain are anonymity and traceability, so how do we define a wallet address as a person with real identity information?

That would require massive data analysis. It is impossible to obtain a person's identity information by querying a pure wallet address, but an address must have transaction fees. For example, TRX of the TRON chain requires others to transfer TRX tokens to each address when conducting the first transaction.

图片


Theoretically speaking, as long as you create a new address, transfer the scammed digital assets to this address, and never touch it for the rest of your life, no one will know who you are. Take Satoshi Nakamoto for example. He has a huge amount of Bitcoin in his account and no one knows who he is. However, as soon as he makes a transaction or as soon as the Bitcoin flows, his identity will be revealed through big data analysis.

The uncles also solved the case in this way. The TRX you transferred to this person always has a flow. Where did you buy it from? You can find this person by constantly tracing the source. Why did you transfer TRX to others? How did you transfer it? What chat software did you use to communicate? You can find this person by constantly tracing.

Then we confirm his identity. Therefore, blockchain is anonymous, and this feature has been cracked by big data.

Therefore, never get involved in any illegal activity. You may think that no one can find you, but all your information is exposed to the sun. Stay away from illegal activities.

What's more, when you register a wallet, your mobile phone model, network, serial number, and everything else are known. #内容挖矿 #ETH Follow me! Get more currency circle information!