Blockchain Investigation Reference
Blockchain Investigation Reference
Key Concepts Bitcoin Ethereum Public Blockchains Privacy-Focused UTXO Model (BTC) Account Model (ETH)
Block: Collection of transactions confirmed together 1... - P2PKH (Legacy) 0x... - Standard format (42 chars) ₿ Bitcoin (BTC) M Monero (XMR) Inputs: Previous UTXOs being spent From: Sender address
Transaction: Transfer of value between addresses Ξ Ethereum (ETH) Z Zcash (ZEC) Outputs: New UTXOs being created To: Recipient address
3... - P2SH (Segwit) Contracts use same format as EOAs
L Litecoin (LTC) D Dash (DASH)
Address: Public identifier for sending/receiving bc1... - Bech32 (Native Segwit) B BNB Chain (BNB) G Grin (GRIN)
Change: Returned to sender Value: Amount transferred
Private Key: Secret that controls address funds Fee: (Inputs - Outputs) Gas: Fee paid for execution
Hash: Unique fingerprint of data Other Formats Privacy Coins Investigation Difficulty Scale
T... - TRON 4... - Monero (Standard) Easy: Bitcoin, Litecoin - Clear UTXO model Transaction Properties
Verification Mechanisms Moderate: Ethereum - Smart contracts add complexity Property Bitcoin Ethereum
Proof of Work: Resource-intensive puzzle solving ltc1... - Litecoin (Bech32) 8... - Monero (Subaddress) Hard: ZCash (transparent tx only)
Very Difficult: Monero, ZCash (shielded tx) Confirmations ~6 blocks (60 min) ~12 blocks (3 min)
Proof of Stake: Validators stake crypto as collateral bnb... - Binance Chain z... - Zcash (Shielded)
Transparency Features Fee Structure Satoshis/byte Gas × Gas Price
Delegated PoS: Elected validators by token holders Public Ledger: All transactions visible
Example BTC: 1A1zP1eP5QGefi2DMPTfTL5SLmv7DivfNa Finality Probabilistic Probabilistic
Pseudo-anonymity: Addresses not linked to identity
Example ETH: 0xd8dA6BF26964aF9D7eEd9e03E53415D37aA96045 Transaction ID Double SHA-256 hash Keccak-256 hash
Immutable History: Cannot alter past records
Temporal Analysis
Time Patterns Value Patterns Behavioral Indicators
Transaction time clustering Round number transactions Peeling chains (sequential txs)
Regular interval detection Consistent percentage splits Fan-out/fan-in patterns
Time zone analysis Fee anomaly detection Dormancy periods
Books & Publications Courses & Certifications Online Resources What is Chain Hopping? Investigation Challenges
Investigating Cryptocurrencies - Nick Furneaux Certified Cryptocurrency Investigator (CCI) - CipherTrace Cambridge Cryptoasset Study - Cambridge University Chain hopping is the practice of moving assets between different blockchains to obscure the trail of funds and take advantage Cross-chain tracing: Service attribution required
of the different privacy characteristics of each network.
Bitcoin Forensics - James Harris Cryptocurrency Tracing - Chainalysis CryptoCompare Research - Market insights Data silos: Different explorers for each chain
Cryptoasset Inheritance Planning - Pamela Morgan Certified Blockchain Expert - Blockchain Council Crystal Blockchain Blog - Analytics insights Exchange Privacy Layer
Privacy barriers: Some chains obscure information
The Basics of Bitcoins and Blockchains - Antony Lewis Cryptocurrency Investigation - ACAMS Chainalysis Market Intel - Market reports ₿ Ξ ɱ Timing correlation: Matching deposits/withdrawals
CryptoAssets - Chris Burniske & Jack Tatar Financial Crime Academy - Elliptic FATF Guidelines - Regulatory resources Bitcoin Ethereum Monero Exchanges as black boxes: Internal transfers hidden
ACFCS Articles - Case studies Blind Spots: When funds move through privacy chains like Monero or through mixers/tumblers, the trail often goes cold.
Recommended Learning Path
Common Hopping Patterns
Blockchain Basics Transaction Analysis Clustering Techniques Pattern Recognition Case Building Privacy Seeking Fee Optimization Regulatory Evasion
Tools Mastery Path Practice Resources BTC → XMR → ETH → BTC BTC → LTC → Exchange → BTC Regulated → Unregulated Exchange → Privacy Coin
Purpose: Break transaction trail Purpose: Lower transaction fees Purpose: Avoid reporting/restrictions
1. Learn public block explorers (Blockchair, Etherscan) CryptoHack - Cryptography challenges Detection: Timing correlation of exchange deposits/withdrawals Detection: Consistent amount minus predictable fees Detection: Exchange API identification, withdrawal patterns
2. Practice with open-source analysis tools (BlockSci) Follow The Coin - Transaction tracing game
3. Develop visualization skills (Gephi, Maltego) BlockSec CTF - Security competitions Investigation Approaches
4. Build automation skills (Python for blockchain) Princeton Bitcoin Course - Online lectures Service Node Operation: Capturing network data Amount Tracking: Distinct value patterns Best Practice: Focus on exchange chokepoints where funds enter and exit
Exchange Cooperation: Legal process access Known Exchange Patterns: Hot wallet signatures privacy layers. Most users eventually convert back to transparent chains.
5. Adopt professional platforms when needed GitHub repositories - Open-source tools
Deposit/Withdrawal Correlation: Timing analysis Integrated Services: Multi-chain analysis platforms