The target of the article is to study the place of the cryptocurrency in the process of money laundering. The subject of the article is to investigate the ways and means of usage cryptocurrency for money laundering, the possibilities, and limits. Problem’s setting. The authors of the paper have emphasized that despite the broad usage of cryptocurrency all over the world for different kinds of purchasing and transactions, there is no unified position regarding the definition of cryptocurrency, as well as its legal status. Moreover, the aforementioned circumstances trigger the difficulties during the criminal investigation of money laundering by using cryptocurrency. Thus, law informant agencies are facing challenges with the identification of criminals’ personality and the fact of crime commitment. In addition, in the article, the authors articulate the main concept of cryptocurrency: anonymity and decentralization, which engender the main aggro while crime investigation. Methodology. The research is based on an analysis of historical stages of cryptocurrency creation: from Friedrich August von Hayek’s idea of “currency independent from banking and governmental” to the establishment of decentralized currency. Moreover, there were analysed the cases of money laundering where criminals who used cryptocurrency have been identified and press charged. In addition, the comparative methods were used to collate different positions regarding cryptocurrency all over the world and inside Ukraine. The position of the main authorities and organizations regarding the legal status of cryptocurrency was investigated as well. The results of the study revealed that a cryptocurrency is a convenient tool for money laundering because it gives relative anonymity for the owner of the currency, as far as it does not require any personal information about the user and his location. Aforementioned feature minimizes the opportunity for law enforcement agencies to track back the criminal activity and to identify the criminal personality. Furthermore, cryptocurrency transactions are out of the government control because for conducting any transactions by using cryptocurrency, there is no need for their verification by third parties like a bank, governmental authority or nongovernmental organizations. In addition, the user can have more than one account and conduct transactions from different places at the same time.
The purpose of the article is to explain the use of cryptocurrency as a terrorist financing tool. This article has emphasized the ways, which terrorists appraise for being a reliable fundraising means and their adoption. Methodology. For the purposes of the study, the methods of scientific abstraction, synthesis, observation, generalization, as well as the method of induction of literature and legal documents were used to determine the features of bitcoin, promoting and preventing its use for terrorism financing. Results. The development of the Internet and electronic devices has radically changed all spheres of human life, including criminal activity. Digitalization has led to the improvement of ordinary crimes and the emergence of new types of crime, which, in principle, cannot exist without special digital electronic devices. Among the first implementers of new technologies were terrorists, who took advantage of digitalization to increase profitability. Thus, terrorists have now significantly increased their attention to cryptocurrency as a digital means of payment, namely Bitcoin. Bitcoin has a number of features that have attracted the attention of criminals as a way to evade responsibility for a crime. In particular, decentralization avoids the need for confirmation by a central authority, and pseudo-anonymity provides a certain level of anonymity. In addition, terrorists are aware that Bitcoin's confidentiality is extremely fragile and needs to be enhanced. The paper analyzes several ways to enhance anonymity, such as software that anonymizes traffic and prevents IP identification, peer-to-peer mixers, centralized mixing services (tumbler), and other approaches. It is worth emphasizing that for the fight against crime, the main issue is the de-anonymization of the Bitcoin owner/user, which allows the identification of the criminal. Currently, law enforcement agencies use direct and indirect de-anonymization, proliferation analysis, quantitative analysis, time analysis, and transactional network analysis, among others, to achieve the above goal, which are discussed in detail in this article. In addition, agencies around the world investigated and uncovered terrorist groups and their financial facilitators. Specifically, on August 13, 2020, the U.S. Department of Justice's Office of Public Affairs announced "the largest cryptocurrency seizure in the context of terrorism in history." To investigate the agenda, the legal documents of those investigations that contain information about the terrorist fund-raising mechanism were examined and analyzed. The legal documents revealed that these investigations used the aforementioned de-anonymization approaches.
The growing potential for the use of unmanned systems, which are designed to perform combat missions in the air, on the ground, on/under water than ever before, leads to an increase in threats to the defense landscape of defense forces. This is the reason for the rapid growth of interest in technologies that neutralize threats of this type. For the party that protects a critical object from an air attack by an unmanned aircraft complex (or group), the issue of guaranteed effectiveness or economic proportionality of methods of protection against low-cost attacks that can be carried out by such complexes is always relevant. The answer to this question begins with the availability of a device for calculating quantitative indicators for evaluating the effectiveness of protecting a critical infrastructure object from an air attack. The process of functioning of a critical infrastructure object, which includes a deployed protection system, a control point and subsystems with critical equipment, through which the general purpose of this object is carried out, is proposed to be described by analogy with the model of the process of functioning of a renewable system with limited element reliability. In order to quantitatively assess the effectiveness of the protection of a critical infrastructure object from air attacks by unmanned aerial systems, it is proposed to take a comprehensive indicator of the reliability of the functioning of the renewable system, which consists of the following components: the readiness factor, the vulnerability factor and the protection from air attacks. Expressions of calculation formulas are given in accordance with the proposed process description model. The obtained indicators for the quantitative assessment of the effectiveness of the protection of a critical infrastructure object from air attacks will be converted into specific proposals for persons who make decisions on the selection of the necessary types of countermeasures against unmanned aircraft systems for the expansion of the defense system, and which are required for the justification of financial and economic costs when overcoming this type of threat. The directions of further research in order to ensure the specified indicators of the protection of a critical infrastructure object will be the method of calculating the reservation of protection means.
Актуальність. Проведені дослідження лише частково охопили питання розвитку різноманітних видів підготовки в багатоборстві, їх раціонального поєднання протягом річного циклу тренування. Практично не дослідженими залишаються проблеми модельних характеристик та методики підготовки у військово-прикладному семиборстві. Мета дослідження полягає в розробці й експериментальній перевірці ефективності методики навчання військово-прикладного семиборства старшокласників у позаурочній діяльності. Методи дослідження – аналіз психолого-педагогічної літератури, систематизація інформації, педагогічне тестування, антропометричні вимірювання, анкетування, педагогічний експеримент, педагогічне спостереження, математична статистика. Визначення рівня рухової активності молоді здійснювали за міжнародним опитувальником «The International Physical Activity Questionnaire» (IPAQ). У дослідженнях узяли участь 526 хлопців віком 16–17 років. Результати. Модельні характеристики учасників спартакіади України з військово-спортивного семиборства для допризовної молоді характеризуються високими результатами в усіх видах змагань. Середні показники підтягування становлять 17,07 раза, подолання смуги перешкод – 2,09 хв, с, бігу 100 м – 13,01 с, бігу на 3000 м – 11,31 хв, с, плавання – 41,01 с, метання гранати – 40,89 м, стрільби – 49,27 очок. Важливість універсальної підготовки за всіма видами військово-прикладного семиборства підтверджено й кореляційними зв’язками між видами підготовленості та загальною кількістю отриманих балів. Так, найтісніше пов’язані між собою результати подолання смуги перешкод і бігу на 100 м (r = 0,54), подолання смуги перешкод й отриманих балів із бігу на 100 м (r = -0,53) подо- лання смуги перешкод та отриманих балів із бігу 3000 м (r = -0,43). Висновки. Результати дослідження дали змогу розробити поетапно-послідовну методику навчання військово-прикладного семиборства учнів старших класів. Визначено спрямованість рухової активності у взаємозв’язку з інтенсивністю занять, тривалістю вправ, трива- лістю й характером відпочинку, кількістю занять протягом тижня, темпами збільшення навантаження протягом тижня, місяця.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.