Investigation and Seizure of Crypto Assets

Part 5 of 7 85 min read Forensics, Search, International Cooperation

Cryptocurrency Crime Investigation - Overview

Investigating cryptocurrency crimes requires a unique blend of traditional law enforcement techniques and specialized technical capabilities. The pseudonymous nature of blockchain transactions, cross-border operations, and technical complexity create both challenges and opportunities for investigators.

Indian law enforcement agencies have developed increasing capability in cryptocurrency investigations. The Enforcement Directorate, various state cyber cells, and specialized units have handled cases ranging from the GainBitcoin fraud to exchange-related investigations like WazirX. This chapter provides a comprehensive overview of investigation procedures applicable to cryptocurrency crimes.

Key Investigation Components

  • Blockchain Forensics: Tracing cryptocurrency flows across addresses and blockchains
  • Exchange Cooperation: Obtaining KYC and transaction data from platforms
  • Device Forensics: Extracting wallet data from seized devices
  • Financial Investigation: Connecting cryptocurrency to fiat currency flows
  • International Cooperation: Working with foreign agencies for cross-border aspects
Investigation Authorities
  • State Police Cyber Cells - General cryptocurrency offenses
  • Enforcement Directorate - PMLA investigations
  • Central Bureau of Investigation - Multi-state/complex cases
  • Cyber Crime Coordination Centre (I4C) - National coordination
  • Financial Intelligence Unit - STR analysis and coordination

Blockchain Forensics and Analysis

Blockchain forensics is the cornerstone of cryptocurrency crime investigation. Despite common misconceptions about cryptocurrency anonymity, the blockchain provides a permanent, immutable record of all transactions that skilled investigators can analyze to trace criminal activity.

Understanding Blockchain as Evidence

Every cryptocurrency transaction creates a permanent record on the blockchain containing:

  • Transaction Hash: Unique identifier for each transaction
  • Input Addresses: Source of funds (sender)
  • Output Addresses: Destination of funds (recipient)
  • Amount: Quantity of cryptocurrency transferred
  • Timestamp: When the transaction was confirmed
  • Block Number: Which block contains the transaction

Transaction Tracing Techniques

1. Address Clustering

Identifying multiple addresses controlled by the same entity:

  • Common input ownership heuristic - addresses used as inputs in same transaction likely share ownership
  • Change address detection - identifying return addresses in UTXO models
  • Behavioral patterns - timing, amounts, transaction structure

2. Flow Analysis

Tracing how funds move through the blockchain:

  • Forward tracing - following funds from known criminal address
  • Backward tracing - identifying source of funds to known address
  • Multi-hop analysis - tracking through multiple intermediate addresses

3. Exchange Identification

Identifying when funds touch exchanges:

  • Known exchange deposit addresses (often tagged by analytics firms)
  • Pattern recognition for exchange behavior
  • Once exchange identified, KYC data can identify users

4. Cross-Chain Tracing

Tracking funds across different blockchains:

  • Bridge transactions between chains
  • Exchange-mediated conversions
  • Wrapped token tracking
BF

Blockchain Forensics in Practice

Scenario: Victim reports Rs. 50 lakh Bitcoin transferred to fraudster's address in crypto investment scam.

Investigation Process:

  • Document victim's wallet address and transaction hash
  • Trace forward from fraudster's receiving address
  • Identify clustering with other addresses (may reveal additional victims)
  • Track to exchange deposit addresses
  • Issue notice to exchange for KYC details of depositor
  • Connect blockchain identity to real-world person

Blockchain Forensic Tools

Tool Category Purpose Examples
Block Explorers Basic transaction lookup and verification Blockchain.com, Etherscan, BlockCypher
Analytics Platforms Advanced tracing and clustering Chainalysis, Elliptic, CipherTrace
Visualization Tools Graphical representation of fund flows Maltego (with crypto plugins), Gephi
Open Source Tools Basic analysis capabilities BlockSci, GraphSense
Investigation Best Practice

Commercial blockchain analytics platforms (Chainalysis, Elliptic) are increasingly used by Indian law enforcement. These platforms maintain databases of tagged addresses (exchanges, known criminal wallets, sanctioned entities) that dramatically accelerate investigations. Defense counsel should request disclosure of the specific tools and databases used, as their reliability and methodology may be subject to challenge.

Search and Seizure of Cryptocurrency

The search and seizure of cryptocurrency requires adaptation of traditional procedures to the unique characteristics of digital assets. This section covers the legal framework and practical procedures for cryptocurrency seizure.

Legal Framework - CrPC and BNSS

Search Provisions

Search and seizure in cryptocurrency cases is governed by:

  • Section 93 CrPC / Section 98 BNSS: Search warrant by court
  • Section 94 CrPC / Section 99 BNSS: Search for suspected stolen property
  • Section 165 CrPC / Section 187 BNSS: Search by investigation officer
  • IT Act provisions: For computer systems and electronic evidence

Cryptocurrency as "Property"

For seizure purposes, cryptocurrency qualifies as property because:

  • It has economic value and can be transferred
  • It represents the proceeds of crime in fraud cases
  • Courts have recognized cryptocurrency as property for attachment purposes

Types of Cryptocurrency Seizure

1. Exchange-Held Cryptocurrency

When cryptocurrency is held on exchanges:

  • Notice to exchange to freeze specified accounts
  • Exchange acts as custodian during freeze
  • May require transfer to government-controlled wallet for long-term seizure

2. Self-Custody Wallet Seizure

When accused holds private keys directly:

  • Physical seizure of devices containing wallet software
  • Obtaining private keys or seed phrases
  • Transferring cryptocurrency to government wallet

3. Hardware Wallet Seizure

Physical devices like Ledger, Trezor:

  • Seize the physical device
  • Attempt to obtain PIN/passphrase
  • If unsuccessful, device holds cryptocurrency but may be inaccessible

Wallet Seizure Procedures

Identification

Identify all cryptocurrency holdings - exchange accounts, software wallets, hardware wallets, paper wallets. Review devices, documents, and communications for wallet information.

Documentation

Document current balances with timestamps. Screenshot wallet interfaces and blockchain records. Record wallet addresses for all relevant cryptocurrencies.

Freezing

Issue freeze notices to exchanges immediately. For self-custody wallets, secure devices to prevent transfers. Time is critical as cryptocurrency can be moved instantly.

Key Acquisition

Obtain private keys, seed phrases, or passwords. This may require cooperation from accused or forensic extraction from devices.

Transfer to Secure Custody

Transfer seized cryptocurrency to government-controlled wallet addresses. Ensure multi-signature or institutional-grade custody for security.

Documentation

Document transfer transactions on blockchain. Maintain custody records with hash values. Prepare seizure memo with all relevant details.

Critical Seizure Considerations

Cryptocurrency seizure requires speed and technical expertise. Unlike bank accounts that can be frozen remotely, self-custody cryptocurrency can be moved in seconds with just the private key. If the accused has the seed phrase memorized, they could potentially move funds even after device seizure. Investigators should prioritize freezing exchange accounts and securing devices immediately upon commencement of search operations.

Cryptocurrency Exchange Cooperation

Cryptocurrency exchanges are critical partners in cryptocurrency crime investigations. They hold KYC information that can link blockchain addresses to real-world identities, making exchange cooperation essential for successful prosecution.

Information Obtainable from Exchanges

  • KYC Documents: Identity proof, address proof, photographs submitted during registration
  • Contact Information: Email addresses, phone numbers, registered addresses
  • Transaction History: All deposits, withdrawals, and trades on the platform
  • Wallet Addresses: Deposit addresses assigned to users, withdrawal destination addresses
  • IP Addresses: Login history with IP addresses
  • Bank Accounts: Linked bank accounts for fiat deposits/withdrawals
  • Device Information: Device fingerprints, session data

Legal Process for Exchange Data

Indian Exchanges

For exchanges operating in India:

  • Notice under Section 91 CrPC / Section 97 BNSS for document production
  • IT Act provisions for electronic evidence
  • Direct communication from investigation officer in urgent cases
  • Exchanges as reporting entities have cooperation obligations

Foreign Exchanges

For foreign-based exchanges:

  • MLAT request through Ministry of External Affairs
  • Interpol channels for urgent matters
  • Direct request (some exchanges voluntarily cooperate)
  • Longer timeline - months rather than days

Exchange Freeze Orders

To prevent dissipation of assets:

  • Immediate freeze notice to exchange specifying user accounts
  • Exchange must prevent withdrawals pending further orders
  • Follow up with formal legal process
  • Monitor for compliance and attempted circumvention
Exchange Cooperation Best Practice

Establish relationships with exchange compliance teams before urgent situations arise. Major Indian exchanges have dedicated law enforcement liaison processes. Provide clear, specific requests with all relevant details (user ID, email, wallet addresses, date ranges). Vague or overbroad requests delay response. Always include a legal basis for the request and relevant FIR/case details.

International Cooperation in Cryptocurrency Investigations

Cryptocurrency's borderless nature means that cryptocurrency crimes almost always have international dimensions. Effective investigation requires cooperation with foreign law enforcement agencies and compliance with international legal frameworks.

Mutual Legal Assistance Treaty (MLAT) Process

India has MLATs with numerous countries. The MLAT process for cryptocurrency evidence typically involves:

MLAT Request Process

  • Preparation: Investigation agency prepares detailed request specifying evidence needed, legal basis, and relevance to investigation
  • Central Authority: Request submitted to Ministry of External Affairs (India's Central Authority for MLATs)
  • Transmission: MEA transmits to foreign Central Authority
  • Execution: Foreign authorities execute request under their procedures
  • Return: Evidence transmitted back through diplomatic channels

Timeline Considerations

MLAT requests typically take 6-18 months. This creates challenges for cryptocurrency cases where:

  • Assets may be moved during pendency
  • Accused may flee jurisdiction
  • Evidence may be destroyed

Alternative Cooperation Mechanisms

Interpol Channels

For urgent matters, Interpol can facilitate faster cooperation:

  • Red notices for fugitives
  • Diffusions for less urgent matters
  • I-24/7 secure communication network

Police-to-Police Cooperation

Informal cooperation between law enforcement agencies:

  • Information sharing (not for court evidence)
  • Intelligence coordination
  • Joint investigation teams

FIU Cooperation

Financial Intelligence Units share information through Egmont Group:

  • Suspicious transaction information
  • Financial intelligence
  • Faster than MLAT for some purposes

Cryptocurrency-Specific Challenges

  • Jurisdiction Uncertainty: Where is a blockchain transaction "located"?
  • Exchange Jurisdiction: Many exchanges operate from crypto-friendly jurisdictions with limited cooperation
  • Decentralized Protocols: No entity to serve with requests for DeFi protocols
  • Privacy Coins: Monero, Zcash transactions may be untraceable even with full cooperation
IC

International Cooperation Example

Scenario: GainBitcoin investigation required tracing funds to foreign exchanges and identifying foreign-based accomplices.

Actions Taken:

  • Interpol red notice for absconding accused
  • MLAT requests to multiple countries for exchange records
  • Arrest of Amit Bhardwaj in Thailand through Interpol cooperation
  • Coordination with foreign agencies for asset tracing

Challenges: Extended timelines for formal cooperation, accused had moved significant assets before freeze

Digital Evidence Preservation

Proper preservation of digital evidence is critical for successful prosecution. Cryptocurrency evidence requires careful handling to ensure admissibility and reliability.

Evidence Collection Principles

1. Documentation

  • Photograph screens showing wallet balances with timestamps
  • Record hash values of all seized digital files
  • Maintain detailed chain of custody documentation
  • Document blockchain state at time of seizure

2. Forensic Imaging

  • Create forensic images of all seized devices
  • Use write-blockers to prevent modification
  • Verify images with hash comparison
  • Maintain original devices in secure custody

3. Blockchain Evidence

  • Document wallet addresses with multiple independent verifications
  • Preserve transaction history from blockchain explorers
  • Consider running own blockchain node for critical evidence
  • Obtain expert reports on blockchain analysis

Section 65B Certification

All electronic evidence requires Section 65B certification (now Section 63 BSA):

  • Certificate identifying the electronic record
  • Description of manner of production
  • Statement on safeguards and reliability
  • Signed by person responsible for computer/management

Cryptocurrency-Specific Evidence Issues

Evidence Type Preservation Method Certification Approach
Blockchain Transactions Multiple explorer screenshots, full node records Expert certificate on extraction methodology
Wallet Software Forensic image of device Certificate from forensic examiner
Exchange Records Certified copies from exchange Certificate from exchange compliance officer
Analytics Reports Exports from analytics platforms Expert affidavit on methodology and findings
Evidence Preservation Checklist

For cryptocurrency crime evidence: (1) Time-stamp everything with server time verification; (2) Use multiple independent sources for blockchain data; (3) Preserve both raw data and analyzed results; (4) Obtain Section 65B certificates contemporaneously; (5) Maintain continuous chain of custody; (6) Document methodology in detail for court explanation; (7) Preserve exculpatory evidence equally carefully.

Investigation Challenges and Solutions

Technical Challenges

1. Privacy-Enhancing Technologies

Challenge: Mixers, tumblers, and privacy coins obscure transaction trails.

Solutions:

  • Analyze transactions before mixing
  • Identify exchange deposits despite mixing (exchanges often identify mixed funds)
  • Use advanced analytics tools with demixing capabilities
  • Focus on fiat on-ramps and off-ramps

2. Decentralized Exchanges (DEXs)

Challenge: No KYC, no central authority to serve notices.

Solutions:

  • Trace to centralized exchange eventually
  • Analyze smart contract interactions
  • Identify front-end interfaces that may have data

3. Cross-Chain Movements

Challenge: Funds moving across blockchains harder to trace.

Solutions:

  • Multi-chain analytics tools
  • Monitor bridge protocols
  • Track across chains methodically

Legal Challenges

1. Jurisdictional Issues

Challenge: Cryptocurrency crimes span multiple jurisdictions.

Solutions:

  • Establish Indian nexus through victim location, exchange use, or accused residence
  • Coordinate with foreign agencies through proper channels
  • Focus on evidence obtainable within India

2. Accused Non-Cooperation

Challenge: Accused refuses to provide private keys or passwords.

Solutions:

  • Forensic extraction from devices
  • Adverse inference in proceedings
  • Focus on exchange-held assets that don't require keys
  • Consider statutory compulsion where legally permissible

3. Valuation Volatility

Challenge: Cryptocurrency values fluctuate dramatically.

Solutions:

  • Document value at multiple points (theft, seizure, trial)
  • Consider converting to stable assets for long-term custody
  • Address valuation methodology in charge sheet
Investigation Limitation

Despite sophisticated tools, some cryptocurrency transactions may be untraceable. Privacy coins (Monero, Zcash with shielded transactions), properly executed mixing, and truly decentralized protocols may defeat investigation efforts. Investigators should recognize these limitations and focus resources on achievable objectives rather than pursuing technically impossible traces.