“In 2020, the criminal share of all cryptocurrency activity [was] just 0.34%, or $10.0 billion in transaction volume.” This finding by crypto intelligence firm Chainalysis may surprise the casual reader accustomed to dire crypto warnings from government apparatchiks and blaring headlines about crypto scams and ransomware. Yet in this supposed age of “disinformation,” it fits that the opposite is true. Far from providing a pathway for clandestine transfers outside of government’s view, the bigger crypto concern is that its inherent transparency may need more privacy protections.
The “bad-things-happen-on-blockchains” meme has lots of boosters. Rep. Brad Sherman (D-CA) stated at recent hearing “Cryptocurrencies, if they succeed, will have appeal to only two groups, narco-terrorists and tax evaders.” The Treasury Department has issued similar complaints.
Ezra Klein, an opinion columnist at the New York Times, is the latest to chime in. In a crypto deep dive following the infrastructure bill’s tax fight—described here by CEI Senior Fellow John Berlau—Klein stated:
[C]rypto currencies [are] a favored medium for money laundering, illegal purchases and ransomware. To be fair, criminals are often early adopters of new technologies, so crypto’s association with crime is likely to abate as the technology matures.
Klein points in the right direction, but his compass is off by a few years. Criminals were early adopters of crypto but crime has abated and now forms a miniscule part of total crypto activity. Criminals shunt what remains into so-called Anonymity-Enhanced Cryptocurrencies (AECs), the best known being Monero.
In 2013, the feds shut down Silk Road, a so-called “darknet market,” seizing 26,000 Bitcoins in the process. AlphaBay took its place but tanked in 2017. Since then, only a massive China-based Ponzi scheme called Plus Token caused an uptick. (Chinese authorities arrested six suspects.). But overall, illegal activity occurring via blockchain has drastically shrunk since Silk Road’s demise.
[place image here]
The reason cyber criminals have abandoned non-AEC currencies is that governments have become adept at tracking crypto across blockchains. For example, the Justice Department recovered most of the Bitcoin ransom paid by Colonial Pipeline in a well-publicized cyberattack earlier this year. As former Assistant Secretary of the Treasury for Terrorist Financing and Financial Crimes Daniel Glaser testified in a House hearing earlier this year, “cryptocurrencies provide enhanced opportunities in certain ways for law enforcement agencies to be able to trace transactions.”
Furthemorer, the government is intent on cracking Monero. The IRS awarded two firms contracts worth $1.25 million to break Monero’s privacy protocols. This is an eventuality Monero itself warns:
There is no such thing as 100% anonymous. Monero may … have bugs. Even if not, ways may exist to infer some information through Monero’s privacy layers, either now or later. Attacks only get better.
None of this means ransomware isn’t a growing problem or that cyber hackers and scammers won’t continue to ply their trade. But in the bigger picture, it is privacy and not illegal activity that should concern Klein and others toting the crypto-is-crime narrative.
Blockchains are transparent by their very nature. Although parties usually conduct transactions through pseudonymous public keys, the trail is permanently recorded. As a speaker at a 2018 privacy conference stated: “Peer-to-peer and blockchain technologies are by design very hostile to privacy. There needs to be a lot of work.” If industry leaders are not careful, crypto could provide the foundation for a global surveillance state. That would not improve the current Web’s data silos, which are vulnerable to hacks and data sales.
As crypto evolves, users should insist on privacy protections coded into transactions. Industry players should cooperate with law enforcement to nab scammers and thieves. And those complaining about crypto’s illegal activity should change focus.