Change search
ReferencesLink to record
Permanent link

Direct link
Identifying and analyzing digital payment flows regarding illegal purposes on the Internet: I samarbete med CGI och Finanskoalitionen
Linköping University, Department of Management and Engineering, Production Economics.
Linköping University, Department of Management and Engineering, Production Economics.
2016 (English)Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
Abstract [en]

The aim of this study was to illustrate an unexplored illegal exploitation of legal businesses, with the purpose of limiting this market and especially the related transactions. The issue of transactions regarding illegal material executed with credit cards was solved through involving the companies who issues the credit cards, making the market more transparent and thus preventing this kind of transactions. The thesis will illustrate how cryptocurrencies, such as Bitcoin, are being exploited regarding illegal transactions and more specifically, transactions regarding selling and purchasing Child Abusive Material within file hosting services (cyberlockers). The analyzed data was gathered using a webcrawler and different methods for analyzing correlation were implemented on the data to find relationships between different data points. The data points were then clustered, using an algorithm to create a relationship network. The developed model analyzed the data to identify trends and patterns regarding the illegal transactions and the results can be used to find the most prominent users who are potential perpetrators that actively distributes illegal material. A deeper analysis is then performed on the, according to the model, most interesting users in an attempt to identify their underlying identity.

When cryptocurrencies are used by perpetrators to pay and get paid for illegal material, the transaction flows cannot immediately be connected to specific identities and therefore it is required to first identify potential perpetrators and track their transactions, to later compare them with the transactions that has already been identified as payments for illegal material. Apart from this model, a framework has been created to identify certain patterns and trends regarding the cyberlockers’ transaction flows. This was performed through analysis of the transaction flows connected to cyberlockers that were suspected to contain Child Abusive Material or other illegal material.

With the results from the first and second model, the most interesting cyberlockers for future investigations were discovered, according to the trends and patterns in their surrounding transaction flows. When that analysis was performed and the first model was implemented, potential perpetrators was identified through collaborations between the investigating unit, the Police, the cyberlockers in question and the relevant exchange services. Through this collaboration the identities of the perpetrators are revealed and the transaction flows can then be analyzed to limit further distribution of Child Abusive Material within cyberlockers and consequently limit the illegal transactions with cryptocurrencies.

Keywords: Bitcoin, Child Abusive Material, Cyberlockers, Illegal payments, Cryptocurrency, Webcrawler, Correlation, Relationship network.

Place, publisher, year, edition, pages
2016. , 89 p.
Keyword [en]
Cyberlocker, Bitcoin, CAM
National Category
Other Engineering and Technologies not elsewhere specified
URN: urn:nbn:se:liu:diva-131437ISRN: LIU-IEI-TEK-A--16/02648—SEOAI: diva2:972409
External cooperation
CGI; Finanskoalitionen
Subject / course
Industrial Management
2016-06-10, Linköping, 16:19 (Swedish)
Available from: 2016-09-27 Created: 2016-09-20 Last updated: 2016-09-27Bibliographically approved

Open Access in DiVA

fulltext(4228 kB)29 downloads
File information
File name FULLTEXT01.pdfFile size 4228 kBChecksum SHA-512
Type fulltextMimetype application/pdf

Search in DiVA

By author/editor
Berggren, CarolineAsplund, Jesper
By organisation
Production Economics
Other Engineering and Technologies not elsewhere specified

Search outside of DiVA

GoogleGoogle Scholar
Total: 29 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Total: 117 hits
ReferencesLink to record
Permanent link

Direct link