Keywords
cryptocurrency
criminal investigations
criminal procedure
criminal investigations
criminal procedure
How to Cite
How Bitcoin work and how it can be seized in criminal procedures. (2018). Academic Journal of Internal Affairs, 66(7-8), 117-146. https://doi.org/10.38146/BSZ.2018.7-8.9
Abstract
The author provides an overview of how cryptocurrencies are used by criminals, and how seizing and storing can be managed in criminal investigations.
Downloads
Download data is not yet available.
Similar Articles
- József Répás, The role of anti-forensics techniques in the expert examination of highly automated vehicles , Academic Journal of Internal Affairs: Vol. 71 No. 9 (2023)
- Péter Nyeste, Pandemic, crime, criminal intelligence , Academic Journal of Internal Affairs: Vol. 70 No. 7 (2022)
- Szilvia Dobrocsi, The right to language assistance and its enforcement in Hungarian criminal procedures , Academic Journal of Internal Affairs: Vol. 72 No. 10 (2024)
- László Kovács, Improving crime scene investigation , Academic Journal of Internal Affairs: Vol. 64 No. 2 (2016)
- Miklós Angyal, Asymmetric bars. Reflections on Gergely Gárdonyi: The Limits of Thought Reconstruction. Belügyi Szemle, 2013/10. , Academic Journal of Internal Affairs: Vol. 62 No. 3 (2014)
- Dávid Petrétei, Theoretical and practical notes on crime scene technology , Academic Journal of Internal Affairs: Vol. 61 No. 10 (2013)
- Csaba Orbán, Public security: A secondary effect for criminal investigation , Academic Journal of Internal Affairs: Vol. 65 No. 5 (2017)
- Balázs Márton, The European Public Prosecutor’s Office as a Hungarian investigating authority? , Academic Journal of Internal Affairs: Vol. 71 No. 2 (2023)
- Gyula Sófi, Krisztina Törő , Gábor Csikós , Difficulties of forensic psychological and psychiatric expertise on sexual coercion against children in prosecution , Academic Journal of Internal Affairs: Vol. 71 No. 7 (2023)
- Csaba Ludányi , Arrest of a criminal organization engaged in money laundering , Academic Journal of Internal Affairs: Vol. 71 No. 9 (2023)
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Viktor Halász, Ransomwares and the No More Ransom project , Academic Journal of Internal Affairs: Vol. 70 No. 9 (2022)