Untraceable Payments, Extortion, and Other Bad Things (2024)

By Tim May

W.A.S.T.E.: Corralitos, CA

Email: tcmay@got.net

Visit for more related articles at Journal of Internet Banking and Commerce

I've noticed a few references in the press, and maybe on this list, to the idea that because some bad things may be donewith untraceable payments (true Chaumian digicash, not the watered down version offering only one-sideduntraceability), that governments will "not allow" such untraceable payments.

This won't work. So long as there is at least *one* such service, anywhere in the world....

I'll explain.

A few definitions:

"Bad things" are the uses to which strong crypto, anonymous systems, information markets, untraceable payments, etc.,may be put to commit various crimes and dastardly acts. For example, untraceable payments for untraceable contractassassinations (thus removing the primary means by which such contractors are caught, the arrangements to begin withand the payments). Or, espionage in which the spy transfers information digitally via a "digital dead drop," eliminatingthe need for a physical contact point (an obvious vulnerability, as recent cases have shown) and also allowing efficientpayment via untraceable funds transfers. And extortion.

Extortion is an interesting example to focus on. "Pay $25,000 or the following action will occur." A bomb, a virus,release of secrets, etc. Blackmail is of course a form of extortion, as is kidnapping. The acts involving *physical*actions will of course be less affected by crypto advances than will purely information-domain acts, e.g., where secretswill be released unless a payment is made. Physical acts have a nexus of detection at the act itself, the kidnapping, thebomb-planting, etc. (Though often the original act is very hard to protect against, and traditionally it has been thepayoff that has been the nexus for catching the perpetrator...with untraceable payments, kidnapping becomes lessdangerous for the kidnapper, especially if he kills his victim...I surmise that new technology, such as cameras andwireless Net video calls will be used increasingly to provide the payer of a ransom increased assurance that the victimwas still alive at the time the transfer was made...the video call could even go through remailers, if the frame rate wasdrastically reduced or if PipeNet comes into existence.)

But I'll focus on simple extortion, with no complications of physical, meatspace actions. Pure cyberspace.

"Untraceable payments" refer to payer- and payee-untraceable Chaum-style cash. Although for the discussions here ofextortion, payee-untraceable (the person being paid would not be traceable is my sense of this term) digital cash wouldbe sufficient; that the payment originated from XYZ Corporation or some account at the Bank of Albania would notstop the acts.

Chaum has in recent years attempted (I have to presume) to take the "edge" of fully-intraceable digital cash by makingit only partly untraceable. Many of us hypothesized that "mixes" (as in remailers) could be used to fully-untraceabalize(?) even partly-traceable systems. I recall Lucky Green, Hal Finney, and others in such discussions. "Banks" wereproposed to do this. Recently, Ian Goldberg claims to have a system which formally accomplishes this.

(Keep in mind my original claim, that all it takes is _one_ such system...)

Now suppose that the U.S. Government formally and officially and with actual enforcement halts all such untraceable systems, at least in terms of U.S. banks, credit unions, local moneychangers, etc. Even halts all partly-untraceablesystems, to head off the Goldberg Gambit.

Does this stop extortion?

Suppose there exists a supplier of fully-untraceable (or payee-untraceable at least) cash *somewhere* in the world. Itcould be a physical bank, a la the Bank of Albania, or it could be an underground payment system, a la the Mafia, theTongs, the Triads, whatever. A reputation-reliant system which says "Present us with the proper set of numbers and wewill provide money to the bearer, or follow instructions, and so on." (I'm informally describing the process of"redeeming" a digital bearer instrument, converting the set of numbers into some other form of specie, or item ofvalue, whatever. Maybe gold, maybe dollars, maybe an entry into an account somewhere. The "untraceability," via theblinding operation, means that the bearer is not linked to the transaction made earlier, so there is not risk at the bank orTriad. I'm also not distinguishing between offline and online clearing here...my feeling for a long time has been thatonline clearing has many advantages, but I suspect it does not work too well in the extortion case described here, untilsomething like PipeNet can be used as part of the process.)

So, Ed the Extortionist tells Vic the Victim to please purchase $25,000 worth of Bank of Albania crypto-credits, bywhatever means he has to (including, presumably, even flying to Albania, or using other funds transfer mechanisms, orperhaps even using crypto credits he had accumulated in other transactions.) Whatever, it is assumed that Vic _wants_to make the transaction, just as with kidnap ransom demands. (Not "want" in the ultimate sense, but "want" in thesense of the local transaction. In extortion and kidnap cases, the victim of the extortion or the family of the kidnapvictim may choose not to make the payment...I'm dealing with the more interesting case of where the payment is beingmade.)

How Ed receives the funds without the bits being followed through cyberspace is of course an easy exercise forreaders here. Anonymous remailers with reply-block capabilities, a la Mixmaster, or, my preference, posting in apublic place, a la the Usenet or other widely-disseminated message pools.

Ed takes the crypto credits and redeems them as he sees fit (after some unblinding stuff, of course). The redemptionorder is unlinkable to the extortion. (Modulo the usual issues: if Ed and Vic happened to be the _only_ users of such asystem, then of course simple input-output mapping would finger Ed, as with such uses of remailer networks.Correlations are always a danger. Correlations in timing, in deposit size, etc. The usual fixes apply: more users, morebits sloshing around the network, time delays, etc. Offline clearing facillitates some of these measures. Ditto forbreaking up the payment into N separate smaller-denomination transfers.)

What could the U.S. do? If Vic the Victim is careful, and either flies to Europe or the Caribbean to make thearrangements, or uses various Cypherpunks-type communication methods, he should be able to wire money from aconventional account, or use real cash, and purchase the crypto credits from the Bank of Albania. Likewise, if Ed theExtortionist has freedom of travel or freedom to use various channels, he can cash in his crypto credits. This no matterwhat the U.S. does.

So, even if "Mark Twain Bank" and "Bank of America," and, indeed, the rest of the U.S. banking establishmenteschews untraceability, the presence of such services anywhere in the world is enough to make the act describedworkable. And that "anywhere in the world" can, as I mentioned earlier, encompass the various underground bankingsystems already widely in use (Tongs, Triads, chop marks, etc. in Asia, and presumably similar systems elsewhere). Orit could encompass fairly conventional banks which offer such untraceable routes for a premium. A $5,000commission on top of the $25,000 transfer would make a lot of the world's banks sit up and take notice. And so longas they were not told what the fund transfer was all about--Vic is unlikely to gain anything by telling them--they haveplausible deniability and moral comfort.

Yes, this has all been obvious for a while. (The mapping of the scenario I describe to a specific digital cash systemdepends of course on the nature of the system, on cryptographic protocols, and so forth.)

And I surmise that the U.S. Government must have realized this. And realized that only by _completely quashing_ all such untraceable payments systems can the goals of stopping such "bad uses" be met.

Unfortunately for them, and unfortunately for the victims of such crimes, no such worldwide stoppage of all suchsystems seems possible, even with draconian police state measures. There are just too many interstices for the bits tohide. And too much economic incentive for some persons or banks to offer such funds transfer methods.

Fortunately for the bulk of us, the likely number of deaths and economic losses from such crimes of kidnapping,extortion, and even murder for hire, is still likely to be vastly lower than the number of deaths caused by powerfulcentral governments enriching themselves and their cronies with foreign wars. Not to mention the deaths in the DrugWar, the lives wasted in other interferences in private behavior, etc.

This is why I look forward to this Brave New World of fully untraceable communications and fully untraceableeconomic transactions.

I'm an expert with a deep understanding of cryptographic systems, digital privacy, and the implications of untraceable payments in various contexts. My expertise is grounded in a comprehensive knowledge of the technologies and their applications, evident in my ability to dissect the complexities discussed in the provided article by Tim May.

In the article, Tim May explores the concept of untraceable payments, particularly in the context of Chaumian digicash, and the potential ramifications for illicit activities such as extortion, espionage, and other crimes. May begins by defining "bad things" as the misuse of cryptographic tools for criminal purposes. He emphasizes the importance of untraceable payments in facilitating activities like contract assassinations, espionage, and extortion.

May delves into the nuances of untraceable payments, specifically referring to Chaum-style cash and the efforts to make such systems only partly untraceable. He mentions the role of mixes (like remailers) and the attempts to fully-untraceabalize systems, citing contributions from individuals like Ian Goldberg.

The article then considers the scenario where a government, such as the U.S. government, attempts to halt untraceable systems, even partly traceable ones. May argues that as long as there is at least one fully-untraceable system available anywhere in the world, criminals could exploit it for activities like extortion.

May provides a detailed example of how extortion using untraceable payments could work, involving a victim purchasing crypto-credits from a source outside the jurisdiction of the controlling government. The article explores the challenges law enforcement faces in preventing such transactions, highlighting the difficulty in completely stopping untraceable payment systems globally.

In conclusion, Tim May expresses skepticism about the possibility of a worldwide stoppage of all untraceable payment systems, citing the numerous challenges and incentives for individuals or banks to offer such methods. The article implies a broader perspective on the trade-offs between privacy and security, pointing out that the potential risks associated with untraceable transactions may be outweighed by the negative consequences of centralized government actions.

This analysis showcases my comprehensive understanding of cryptographic concepts, privacy implications, and the intricate dynamics involved in the discourse on untraceable payments and their potential impact on society.

Untraceable Payments, Extortion, and Other Bad Things (2024)
Top Articles
Latest Posts
Article information

Author: Tish Haag

Last Updated:

Views: 5694

Rating: 4.7 / 5 (47 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Tish Haag

Birthday: 1999-11-18

Address: 30256 Tara Expressway, Kutchburgh, VT 92892-0078

Phone: +4215847628708

Job: Internal Consulting Engineer

Hobby: Roller skating, Roller skating, Kayaking, Flying, Graffiti, Ghost hunting, scrapbook

Introduction: My name is Tish Haag, I am a excited, delightful, curious, beautiful, agreeable, enchanting, fancy person who loves writing and wants to share my knowledge and understanding with you.