SPECIAL TECHNICAL KNOWLEDGE IN THE FIELD OF DIGITAL CURRENCY AND MINING NECESSARY FOR LAW ENFORCEMENT OFFICERS

Authors

  • Pavel Galushin Siberian Law Institute of the Ministry of Internal Affairs of Russian Federation

Keywords:

special knowledge, digital currency, cryptocurrency, mining, crime investigation, information technology.

Abstract

Purpose

This paper discusses the question of what special technical knowledge in the field of digital currency and mining is necessary to solve and investigate crimes committed using information and communication technologies. The examples highlight the special role of fundamental training in mastering advanced technologies, as well as the advisability of including relevant topics in the educational process of law enforcement educational institutions.

 

Design/Methods/Approach

For new technologies, the degree of usefulness is almost impossible to assess: since the technology is new, there is no experience in its application. It turns out that the so-called Lindy effect is observed: the longer a technology exists, the more likely it is to continue to exist. The Lindy effect leads to a paradoxical conclusion: in order to be successful in information and communication technologies, one should not chase after "fashionable novelties", but study the fundamental patterns underlying a large class of such novelties at once.

 

Findings

Modern information technologies, including those related to cryptocurrency, are based on fundamental knowledge in the field of mathematics (number theory, graph theory, cryptography) and electrical engineering.

 

Originality/Value

Thus, modern trends in the development of information technologies and their penetration directly into the sphere of legal regulation of public relations at the level of laws require improving the training of lawyers and law enforcement officers.

With regard to technologies related to digital currency and blockchain, it is necessary to focus on a combination of fundamental training and the usefulness of the taught material for students.

References

Antonopoulos, A. M. (2017). Mastering Bitcoin: Programming the open blockchain (2nd ed.). O’Reilly Media.

Ashurov, A. (2024). Jurisdictional Challenges in Cross-Border Cybercrime Investigations. Central Asian Journal of Multidisciplinary Research and Management Studies, 1 (8), 22-30. doi: 10.5281/zenodo.11234768.

Barnes, J. (2003). Porphyry: Introduction. Clarendon Press.

Biggs, N., Lloyd, E. K., & Wilson, R. J. (1986). Graph theory: 1736–1936. Clarendon Press.

Diophantus. (1920). Diophantus of Alexandria: A study in the history of Greek algebra (T.L. Heath, Trans.). Cambridge University Press. (Original work written circa 250 CE).

Dunham, W. (2018). Prime numbers and their historical development. Journal of Humanistic Mathematics, 8(2), 4–25. https://doi.org/10.5642/jhummath.201802.04.

Eurostat. (2023). Electricity price statistics. European Commission. Downloaded April 20, 2025 https://ec.europa.eu/eurostat/statistics-explained/index.php?title=Electricity_price_statistics

Galushin, P.V., Serikova, O. Yu., Terskov, V.A. & Yarkov, K,V. (2020) A performance model of a multiprocessor computer appliance of a real-time control system. IOP Conf. Ser.: Mater. Sci. Eng. 734 012103 DOI 10.1088/1757-899X/734/1/012103.

Giboney, J. S., Anderson, B.B., Wright, G. A, Oh, S., Taylor, Q., Warren, M., Johnson, K. (2023). Barriers to a Cybersecurity Career: Analysis across Career Stage and Gender. Computers & Security, 103316.

Goldfeld, D. (1985). Gauss’s class number problem for imaginary quadratic fields. Bulletin of the American Mathematical Society, 13(1), 23–37. https://doi.org/10.1090/S0273-0979-1985-15352-2.

Goldman, A. (1964). The flip side of the Beatles. The New Republic, 150 (10), 13–15.

Hopkins, B., & Wilson, R. J. (2004). The truth about Königsberg. The College Mathematics Journal, 35(3), 198–207. https://doi.org/10.1080/07468342.2004.11922068.

Koblitz, N., Miller, V. (1985). Use of elliptic curves in cryptography. Advances in Cryptology – CRYPTO '85 Proceedings, 218, 417–426.

Mandelbrot, B. B. (1982). The fractal geometry of nature. W. H. Freeman and Company.

Nakamoto, S. (2008) Bitcoin: A Peer-to-Peer Electronic Cash System, Downloaded April 20, 2025 https://www.ussc.gov/sites/default/files/pdf/training/annual-national-training-seminar/2018/Emerging_Tech_Bitcoin_Crypto.pdf.

Rogaway, P., & Shrimpton, T. (2004). Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. Lecture Notes in Computer Science, 3108, 371–388. https://doi.org/10.1007/978-3-540-24660-2_29

Silverman, J. H. (2009). The arithmetic of elliptic curves (2nd ed.). Springer.

Stallings, W. (2017). Cryptography and network security: Principles and practice (7th ed.). Pearson.

Taleb, N. N. (2012). Antifragile: Things That Gain from Disorder. Random House.

Weierstrass, K. (1990). On the theory of elliptic functions (J. Smith, Trans.). In Selected Works of Karl Weierstrass (pp. 45–80). Dover Publications. (Original work published 1863).

Downloads

Published

2026-03-26

Issue

Section

Natural and Applied Sciences in Forensics, Cybercrime and Security