MeiKai - Blockchain Forensics Platform
Sheldon Kreger
Problem Area and Application Use Cases
- Regardless of market conditions, criminals use crypto to execute payments, launder money, and obfuscate their identity.
- Criminals also steal crypto through various schemes such as wallet exploits, phishing, and pig butchering.
- Crimes include tax evasion, weapons proliferation, drug trafficking, human smuggling, human trafficking, and funding of terrorist organizations.
- The USA and its allies cannot effectively enforce sanctions if adversaries can transfer money via crypto.
Investigators Need Help
- A handful of companies offer data services and training to investigative agencies.
- May 2022, Chainanalysis valuted at 8.6 billion USD.
- Since launching in 2018, TRM has grown revenue 490% year-over-year and expanded its team from four people to more than 150. (Nov 2022)
But Wait, There's More
Federal investigators are not the only people who rely on blockchain forensics tooling.
- Exchanges like Binance and Coinbase are required to comply with subpoenas.
- Wallets and crypto ATM services can proactively prevent fraudulent or criminal transactions.
- Companies operating the actual blockchains must also comply with regulations, such as freezing wallets.
Why TRON?
TRM's 2023 "Illicit Crypto Ecosystem Report" declares:
- "While Bitcoin was the exclusive currency for terrorist financing in 2016, by 2022 it was all but replaced by assets on the TRON blockchain, with 92%."
- "TRON (TRX) hosted 45% of all illicit volume, up from 41% in 2022, followed by Ethereum at 24% and Bitcoin with 18%."
- "Tether (USDT) was the stablecoin with the largest amount of illicit volume, at USD 19.3 billion. Approximately 1.63% of Tether (USDT) volume was linked by TRM to illicit activity, compared to 0.05% of USDC."
Visualizations and Queries - Discovery of Suspicious Activity (Generate Suspicious Activity Report SAR)
Leverage transaction patterns to reveal previously unknown criminal activity.
Pig Butchering
- Several accounts send various amounts to a single address within a short time range.
- Recipient address sends to blender, exchange, several new wallets, or other smart contract.
Wallet Exploit
- Many wallets send all assets to a single recipient within a short period of time.
- Recipient address sends to blender, exchange, several new wallets, or other smart contract. ## Sale of Illicit Materials
- Many wallets send identical amounts to a single wallet address over a period of time.
- Recipient address sends to blender, exchange, several new wallets, or other smart contract.
Visualizations and Queries - Known Malicious Actor
Darknet Wallet Address / Exchange KYC Blacklist Address
- List wallets that have sent to or received from malicious address.
- Traverse by depth on graph.
- Track balance of malicious wallets, including historical balances. ## Sanctions Enforcement
- Gather wallet login activity by geolocation (ip address). ## Inspiration
Log in or sign up for Devpost to join the conversation.