Security and Crypto-currency: Forecasting the Future of Privacy for Private Investors

20
Security and Crypto-currency: Forecasting the Future of Privacy for Private Investors PWM APAC SUMMIT | Kuala Lumpur Nov. 2-4, 2015 Bill Majcher

Transcript of Security and Crypto-currency: Forecasting the Future of Privacy for Private Investors

Page 1: Security and Crypto-currency: Forecasting the Future of Privacy for Private Investors

Security and Crypto-currency: Forecasting the Future of Privacy for Private Investors PWM APAC SUMMIT | Kuala Lumpur Nov. 2-4, 2015 Bill Majcher

Page 2: Security and Crypto-currency: Forecasting the Future of Privacy for Private Investors

The Power of Prosecution

U.S. v. Rosner 2nd Circuit Court of Appeals, 9-26-73

“In human experience, the pressure of imminent incarceration tends to snap the bonds of loyalty”

Stronger than loyalty.

www.emidr.com

2

Page 3: Security and Crypto-currency: Forecasting the Future of Privacy for Private Investors

WHYFamily Offices are Targets

1 Governments are broke

2 FO’s typically low profile – What are they hiding?

3 Unregulated – Threat of financial instability

4 Source of wealth often opaque

5 Control large pools of capital

6 May lack security resources and sophistication of regulated entities

Follow the Money

www.emidr.com

3

Page 4: Security and Crypto-currency: Forecasting the Future of Privacy for Private Investors

WHOis Targeting Family Offices?

IDEA

Follow the Money

• Governments – Police, Tax, Regulators

• Media – News of the World

• Activists – Political, Environmental, Netizens

• Criminals – Theft, Fraud, Blackmail, Kidnap

• Competitors – Disrupt, learn, steal

• Disgruntled family members or associates, former employees

• Economic Mercenaries – Whistleblowers

www.emidr.com

4

Page 5: Security and Crypto-currency: Forecasting the Future of Privacy for Private Investors

Examplesof Covert Scenarios Global Random Virtue Testing

www.emidr.com

FATCA Scenario:

•US Client with large sums of money held offshore to be invested

Approach:

•Representative of private Family Office looking to preserve multi-generational wealth

•Family is discreet and prefers stable management over yield

•Money has been held offshore for several generations but family is US based and wishes to remain discreet and offshore

Test:

•Offer to disclose assets most susceptible to scrutiny and pay higher management fee to keep rest offshore

•Ask banker prior to mandated FATCA disclosure to help modify portfolio to “park” dividends within an arms length tax free structure

5

Page 6: Security and Crypto-currency: Forecasting the Future of Privacy for Private Investors

FamilyOffices: Challenges Global Random Virtue Testing

1. Humans Commit Crimes

2. Technology and IT systems detect crime

3. Technology designed and monitored by humans

There is a disconnect between regulatory theory and reality

www.emidr.com

6

Page 7: Security and Crypto-currency: Forecasting the Future of Privacy for Private Investors

FamilyOffice Vulnerabilities - typical Most are inadequately prepared.

Best defence is active offense.

And…INADEQUATE SYSTEMS

Improperly Trained Staff

Lost or Stolen PCs (laptops)

Unsecured Network (wifi) Trading Platforms .

Customer Records .

Mobile Devices .

7

Page 8: Security and Crypto-currency: Forecasting the Future of Privacy for Private Investors

ChallengesIn 2015 Whom should you trust?

Blind acceptance of what the computer shows leaves family offices fully exposed to prosecution and litigation

IDEA www.emidr.com

8

Page 9: Security and Crypto-currency: Forecasting the Future of Privacy for Private Investors

HowFamily Offices will be targeted Threats.

Hacking, Malware, Cloning

Cyber Penetration

By trusted employees, partners,

family members

From Within

Social engineering

Covert Techniques

Facebook, Linkedin.

Social Media Deception

www.emidr.com

9

Page 10: Security and Crypto-currency: Forecasting the Future of Privacy for Private Investors

TheCyber Problem Your data is everywhere.

www.emidr.com

10

Page 11: Security and Crypto-currency: Forecasting the Future of Privacy for Private Investors

CyberThreats Your data is under attack.

www.emidr.com

11

Page 12: Security and Crypto-currency: Forecasting the Future of Privacy for Private Investors

CHALLENGESof Cryptocurrencies The new frontier of asset transfer.

• No central authority issues or regulates the currency

• Increasingly easy to exchange for goods or traditional currencies

• Cross-border transactions frictionless and cheap

• Use of proxy or other anonymization tools make transactions difficult or impossible to trace

• Example: Silk Road marketplace

• ‘Smurfing’ very viable ML technique by placing transactions though multiple exchanges

• Possibility of government/regulatory intervention

• Risk of bugs that lead to a loss of confidence

• Risks of competition: Over 100 ‘alt’ currencies in use, of which BTC is by far the most successful

www.emidr.com

12

Page 13: Security and Crypto-currency: Forecasting the Future of Privacy for Private Investors

WHATis Bitcoin? Leading cryptocurrency.

• Bitcoin is proposed as a “peer to peer electronic cash system” by Satoshi Nakamoto (pseudonym), an anonymous software engineer, October 2008.

• A stateless, peer-to-peer payment system. "There's no central bank to regulate it; it's digital and functions completely peer to peer”—Jim Cramer

• Transactions do not go through bank or credit card

• Relies on the blockchain, a cryptographically-protected public ledger, to ensure a given user owns a given BTC and has not spent it already—solves the “double-spend” issue

www.emidr.com

13

Page 14: Security and Crypto-currency: Forecasting the Future of Privacy for Private Investors

WHATis Bitcoin? Continued. Leading cryptocurrency.

• Bitcoins are “mined” by computers “solving” a special mathematical problem

• Mining will cease around 2040 when 21m BTC have been issued.

• Bitcoin / USD exchange rate:

• July 17, 2010 1 Bitcoin = $ 0.0495

• October 16, 2015 1 Bitcoin = $ 271.00

• Highest ever: $1124.76 on November 29, 2013

www.emidr.com

14

Page 15: Security and Crypto-currency: Forecasting the Future of Privacy for Private Investors

AUTHORITIESsee benefits/challenges First regulations promulgated in the U.S.

• FBI issues internal report worrying that the currency could become a payment method for cyber criminals in the near future, and could be used to fund “illicit groups.” Report is leaked to the Internet. April 2012

• U.S. Treasury’s first official guidance on virtual currencies, March 2013. Bitcoin Exchanges—businesses that convert BTC into “real” currencies—operating in the U.S. must obtain “money transmitter licenses” and are regulated as Money Services Businesses

• US regulators, including Fed chairman comment positively on bitcoin at a Senate hearing, November 2013.

Wall Street Journal 11/18/13

www.emidr.com

15

Page 16: Security and Crypto-currency: Forecasting the Future of Privacy for Private Investors

KEYTerms Critical to your understanding.

Peer-to-Peer – payments are person-to-person, not through a bank or intermediary

Blockchain – a public register that tracks all BTC transactions

Satoshi – the unknown creator of the BTC protocol

Exchange – allows the conversion of traditional currencies into/from BTC

Bitcoin Mining – the creation of BTC units, which are awarded in a ‘lottery’ to computers solving a special problem

www.emidr.com

16

Page 17: Security and Crypto-currency: Forecasting the Future of Privacy for Private Investors

AMLRisks of BTC/cryptos Guard against money-laundering

01

03

04

02

But… • size of entire BTC/crypto

market is small…for now.

At placement stage • BTC converted with

ease to traditional currency

At integration stage • Accepted by more and more

merchants

At layering stage • Transactions are peer-to-peer

• do not go through a regulated intermediary • Transactions are completely anonymous

• With small degree of sophistication, transactions untraceable

www.emidr.com

17

Page 18: Security and Crypto-currency: Forecasting the Future of Privacy for Private Investors

HOWto Protect Yourself Your subtitle goes here

to deal with Human Risk

Institute Principles Based Governance

Deploy continuous offensive cyber tactics

against yourself with ability to remediate if

attacked or under attack. Equally important is

to know who attacked you.

A Good Offence is a Better Defence

Don’t use mobile phone, computer or any electronic device

www.emidr.com

18

Page 19: Security and Crypto-currency: Forecasting the Future of Privacy for Private Investors

ContactInfo

Bill Majcher [email protected] www.emidr.com +852 6891 7919