Keywords
cryptocurrency
criminal investigations
criminal procedure
criminal investigations
criminal procedure
How to Cite
How Bitcoin work and how it can be seized in criminal procedures. (2018). Academic Journal of Internal Affairs, 66(7-8), 117-146. https://doi.org/10.38146/BSZ.2018.7-8.9
Abstract
The author provides an overview of how cryptocurrencies are used by criminals, and how seizing and storing can be managed in criminal investigations.
Downloads
Download data is not yet available.
Similar Articles
- László György Székely, Some conceptual and legal questions of data gathering in criminal cases , Academic Journal of Internal Affairs: Vol. 72 No. 7 (2024)
- Ivett Nagy, Examining certain changes to the current Code of Criminal Procedure in the light of the fight against organized crime , Academic Journal of Internal Affairs: Vol. 71 No. 4 (2023)
- Valér Dános, Csaba Szabó, „Give me the fact and I serve you justice” , Academic Journal of Internal Affairs: Vol. 69 No. 10 (2021)
- Sándor Füredi, Types of human trace evidences and the importance of their forensic genetic analysis in Hungarian criminal and administrative proceedings – Case reports , Academic Journal of Internal Affairs: Vol. 71 No. 12 (2023)
- Gyula Bogdány, Examining injurious chest stabbings from various aspects I. , Academic Journal of Internal Affairs: Vol. 69 No. 5 (2021)
- Gyula Bogdány, Examining injurious chest stabbings from various aspects II. , Academic Journal of Internal Affairs: Vol. 69 No. 6 (2021)
- Balázs László, Detection and examination in a forgotten bill of Criminal Code , Academic Journal of Internal Affairs: Vol. 69 No. 7 (2021)
- Eszter Szijártó, Bluffing in criminal investigation , Academic Journal of Internal Affairs: Vol. 61 No. 5 (2013)
- Mónika Nogel, Guilty or Innocent? Relevance of Forensic Genetic Expert Opinions for the Defense , Academic Journal of Internal Affairs: Vol. 70 No. 3 (2022)
- János Szabó, Rachel Boba Santos: Crime analysis with crime mapping , Academic Journal of Internal Affairs: Vol. 71 No. 8 (2023)
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Viktor Halász, Ransomwares and the No More Ransom project , Academic Journal of Internal Affairs: Vol. 70 No. 9 (2022)