Antonopoulos, A. (2014). Mastering Bitcoin from https://www.oreilly.com/library/view/mastering-bitcoin/9781491902639/ch07.html
Abe: block browser for Bitcoin and similar currencies (n.d.). In GitHub. Retrieved March 24, 2015, from https://github.com/bitcoin- abe/bitcoin-abe.
Baydakova, A. (2018, November 18). Leader in blockchain news. Retrieved from https://www.coindesk.com/
Bitcoin.org (N.D.) Bitcoin Developer Resources. Retrieved from https://bitcoin.org/en/developer-reference#merkle-trees
Bitcoin and Money Laundering: Complete Guide to Worldwide Regulations. (2018, July 02). Retrieved from https://blockonomi.com/bitcoin-money-laundering/
Bitcoin and Money Laundering: Complete Guide to Worldwide Regulations. (2018, July 02). Retrieved from https://blockonomi.com/bitcoin-money-laundering/Ayushman Bharti, https://killerblock.com/dao-blockchain/
Bitcoin Block Explorer (n.d.). In Blockexplorer. Retrieved March 24, 2015, from http://blockexplorer.com.
Blockchain Explorer: BTC: ETH: BCH. (n.d.). Retrieved February 28, 2020, from https://www.blockchain.com/explorer
Canellis, D. (2019, May 6). Bitcoin has nearly 100,000 nodes, but over 50% run … Retrieved March 26, 2020, from https://thenextweb.com/hardfork/2019/05/06/bitcoin-100000-nodes-vulnerable-cryptocurrency/
CoinJoin: Bitcoin privacy for the real world (2013, August 22). In Bitcoin Forum. Retrieved March 30, 2015, from https://bitcointalk.org/?topic=279249.
CoinSwap: Transaction graph disjoint trustless trading (2013, October 30). In Bitcoin Forum. Retrieved March 30, 2015, from https://bitcointalk.org/index.php?topic=321228.
Digital Evidence and Forensics. (n.d.). Retrieved February 21, 2020, from https://nij.ojp.gov/digital-evidence-and-forensics
En.Bitcoin. (2014).Wallet Import Format. Retrieved from https://en.bitcoin.it/wiki/Wallet_import_format
Entropia Dollars can, in fact, be exchanged for fiat currency and is, therefore, a convertible currency (http://account.entropiauniverse.com/account/withdrawals/).
FAQ (n.d.). In Bitcoin information site. Retrieved April 25, 2015, from bitcoin.org/ru/faq#what-is-bitcoin
FATF Report “Virtual Currencies – Key Definitions And Potential AML/CFT Risks” FATF, June 2014. (Source: http://www.fatf- gafi.org/topics/methodsandtrends/documents/virtual-currency-definitions-aml-cft-risk.html)
Forrest, K. (2014, July 09). United States v. Ulbricht. Retrieved March 26, 2020, from https://casetext.com/case/united-states-v-ulbricht-11
Fortney, L. (2018, November 09). Blockchain, Explained. Retrieved from https://www.investopedia.com/terms/b/blockchain.asp
Forum RUnion in the TOR net (n.d.). In Forum RUnion. Retrieved March 30, 2015, from http://r2d2akbw3jpt4zbf.onion/. “Fruit of the Poisonous Tree.” Legal Information Institute, Legal Information Institute, www.law.cornell.edu/wex/fruit_of_the_poisonous_tree.
Furneaux, Nick. Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence (p. 109). Wiley. Kindle Edition.
Global Legal Research Directorate. (2018, June 01). Regulation of Cryptocurrency Around the World. Retrieved March 20, 2020, from https://www.loc.gov/law/help/cryptocurrency/world-survey.php
Global Stats Counter. (2020, February). Desktop vs. Mobile vs. Tablet Market Share Worldwide. Retrieved March 26, 2020, from https://gs.statcounter.com/platform-market-share/desktop-mobile-tablet
Home. Blockchain (n.d.). In Blockchain. Retrieved March 24, 2015, from https://blockchain.info/.
Hong, E. (2018, October 31). How Does Bitcoin Mining Work? Retrieved from https://www.investopedia.com/tech/how-does-bitcoin-mining-work/#ixzz5Q3LjASaq
How to launder stolen bitcoins (2015, January 7). In CCN. Retrieved May 3, 2015, from https://www.cryptocoinsnews.com/launder- stolen-bitcoins/.
Information “About using of “virtual currencies,” in particular, Bitcoin” (2014, January 27). In The Central Bank of the Russian Federation. Retrieved April 24, 2015, from www.cbr.ru/press/pr.aspx?file=27012014_1825 052.htm.
Introduction to Cryptocurrency – Decryptionary. (n.d.). Retrieved from https://decryptionary.com/what-is-cryptocurrency/introduction-to-cryptocurrency/
Jaramillo, A. (2018, April 03). BIP 44: Hierarchical Deterministic Wallets. Retrieved from http://aaronjaramillo.org/bip-44-hierarchical-deterministic-wallets
King, D., & Warrack, P. (2018, December 20). Real Considerations for Law Enforcement in Seizing Virtual Currency. Retrieved February 28, 2020, from https://www.acamstoday.org/real-considerations-for-law-enforcement-in-seizing-virtual-currency/
Lafaille, C., & Chantelle. (2018, September 27). What is Blockchain Technology? An Easy Guide For Beginners (2018). Retrieved from https://www.investinblockchain.com/what-is-blockchain-technology/
Lansky, Jan.(Jan 2018). Possible State Approaches to Cryptocurrencies
Learnmeabitcoin. (n.d.). Retrieved from http://learnmeabitcoin.com/glossary/merkle-root
Lee, J. (2019). Cryptocurrency 101: What cops need to know about crime, cryptocurrencies, and the dark web. Retrieved from
Nathan, A. (2017, January 12). United States v. Murgio. Retrieved March 26, 2020, from https://casetext.com/case/united-states-v-murgio
O’Neill, P. H. (2017, April 18). How to search the darknet like a pro. Retrieved from https://www.dailydot.com/debug/how-to-search-the-deep-web/
Rakoff, J. (2014, August 19). United States v. Faiella. Retrieved March 26, 2020, from https://casetext.com/case/united-states-v-faiella
Randomized Consensus Shared Coin Protocol (n.d.). In PRISM. Retrieved March 30, 2015, from http://www.prismmodelchecker.org/casestudies/ consensus_prism.php.
Sullivan, N., & UTC. (2013, October 24). A (relatively easy to understand) primer on elliptic curve cryptography. Retrieved from https://arstechnica.com/information-technology/2013/10/a-relatively-easy-to-understand-primer-on-elliptic-curve-cryptography/*
Seth, S. (2018, April 03). Crypto Token. Retrieved from https://www.investopedia.com/terms/c/crypto-token.asp#ixzz5PbWAoZjb
Sonenblum, Z. (n.d.). Some Background On Legal Issues Surrounding Bitcoin And Other Cryptocurrencies. Retrieved from https://heitnerlegal.com/2017/07/18/some-background-on-legal-issues-surrounding-bitcoin-and-other-cryptocurrencies/
The first three generations of bitcoin mixing technology (n.d.) In The LTB Network. Retrieved March 30, 2015,
The history of bitcoin and reasons for instability problems of currency (2014, March 13). In Vesti.Finance. Retrieved May 3, 2015, from http://www.vestifinance.ru/articles/40536/.
Top 10 Bitcoin-Tracking Websites – How To Monitor BTC Transactions? (2017, November 07). Retrieved from https://bitcoinexchangeguide.com/top-10-bitcoin-tracking-websites/
Transaction. (n.d.). Retrieved from https://en.bitcoin.it/wiki/Transaction
UNODC (2014). Basic Manual on the Detection And Investigation of the Laundering of Crime Proceeds Using Virtual Currencies, June 2014.
US Dept of Homeland Security. (2018, May). Best Practices for Seizing Electronic Evidence. Retrieved February 28, 2020, from https://www.cwagweb.org/wp-content/uploads/2018/05/BestPracticesforSeizingElectronicEvidence.pdf
Virtual currency requires tough new regulations”, China View, February 2012. Retrieved from http://news.xinhuanet.com/english/2007-02/12/content_5730970.htm
Vlasov, A.V. (2012). Virtual currency and the evolutionary theory of the origin of money. Science and Education: Agriculture and economics; entrepreneurship; law and governance, 12, 17.
Virtual Currency Schemes”, European Central Bank, October 2012. Retrieved from http://www.ecb.europa.eu/pub/pdf/other/virtualcurrencyschemes201210en.pdf
Wallet. (n.d.). Retrieved February 28, 2020, from https://en.bitcoin.it/wiki/Wallet
WebMoney. (2018, October 30). Retrieved from http://en.wikipedia.org/wiki/WebMoney
What is an Altcoin? (2014, September 12) In CCN. Retrieved March 30, 2015, from https://www.cryptocoinsnews.com/altcoin/.
What is Cryptocurrency? – Definition from Techopedia. (n.d.). Retrieved from https://www.techopedia.com/definition/27531/cryptocurrency
Сигов, &. (2013, February 10). Bitcoin. Как это работает. Retrieved from http://habrahabr.ru/post/114642/
Zhang J., Zhang D., Drew A. (2015). Number Theory Applied to RSA Encryption. Retrieved on May 2, 2016