Crypto Blockchain Lawyer

Crypto Scam Recovery Lawyers

The theft of cryptocurrency resulting from scams is the largest problem the digital asset industry faces.   Crypto scams stifle the adoption of cryptocurrency.  Crypto scams create mistrust.  Crypto scams increase governmental scrutiny.  They exacerbate the harshness of Web3 laws.  Hundreds of thousands of people are victimized by scams, yearly.  
For the majority, there is no means of recovering stolen, scammed crypto.  However, there is a means of recovering scammed crypto for the diligent few. 

What To Do If You Have Been Scammed Out of Crypto

It is no shame to admit one is the victim of a crypto scam.  Victims span the age, experience, education, and sophistication range.  Your delay will only aid the criminal.  Delay will potentially cost you more losses.  

There is much to do to battle the crime.  Here is your starting list:

  1. Identify all wallets linked to the crypto scam or theft.
  2. Identify all applications linked to the scam or theft.
  3. Identify all applications and methods used to communicate with the crypto scammer (email addresses, D/M handles, telephone numbers, websites).
  4. Identify all third party vendors / businesses used.
  5. Contact your Bank if crypto custody has been tied to your bank account.
  6. Contact your Credit Card company if your crypto custody has been tied to a credit card.
  7. Change the passwords for your crypto programs and applications. This is especially important if you use the same password across multiple accounts. 
  8. Save all stored communications with the crypto scammer into a central file for later reference.
  9. Compile a list of the public and private keys to each and every token of crypto stolen. Save that list in a central file for later reference. 
  10. Identify and store the transaction hashes (addresses), the dates and times of the transactions, where your stolen crypto was sent. Preserve the amounts of cryptocurrency sent.  Preserve the type of cryptocurrency sent (BTC, ETH, USD, USDT, etc.)
  11. Save all photos or videos exchanged.
  12. Delete all applications linked to the scam or theft. Malicious code or applications may be in play.  If you intend to use the same applications for crypto in the future, delete the programs you have and later reinstall them from the source (assuming you have confirmed the source is trustworthy).
  13. A chronology of the dates of events. (What happened?  When did it happen?)
  14. Hire a forensic tracing service to track the movement of your stolen crypto and locate where it is presently.
  15. File a report with law enforcement. Contact the FBI’s Crime Complaint Center at ic3.gov  Some reference sources recommend filing an additional report with your State’s Attorney General or a local police department.  Filing reports is generally helpful only in situations where evidence support will be needed for court cases or if you have  insurance and will make a claim. 
  16. Do not respond if you are affirmatively contacted to recover your scammed or stolen crypto. This is especially true if an up front fee is required.  It could be a “recovery scam.”  Rely upon services and organizations you find yourself and not on services that contact you first. 

The Amount of Cryptocurrency Stolen Matters

Extraordinary costs are involved in recovering stolen cryptocurrency.  The efforts require teams of investigators, forensic experts, and lawyers addressing different aspects of the process in different countries.  

The amounts of scammed crypto must be large to pay for the expensive recovery efforts.  No one likes the costs involved in the effort.  However, the costs are a necessity.  Expect to lose nearly half of the amount stolen in the process.  Expect for the minimum amount lost to exceed $200,000.00 USD.  

Time Matters – How Long Has It Been?

The amount of time that has elapsed since your crypto was scammed or stolen is a significant issue but not a threshold issue.  The problems with delays in getting to crypto are several:

  1. The longer the time between the theft / scam and the recovery effort, the more opportunity for the crypto to pass through innocent hands.  
  2. The greater delay between the scam / steal and the recovery effort, the more complex and convoluted the path between you and where the crypto is presently stored.  
  3. Multiple Judges in different countries will need to be convinced to return your stolen / scammed crypto.  The longer the delay, the greater complexity of the fact pattern, the greater the likelihood that one Judge will disagree.  
  4. Witnesses forget, documents get lost, files get corrupted,  memories become foggy, emotions wane.  The longer the time between the scam and the recovery effort, the worse the evidence supporting the recovery.  

Location Matters – Where is the Crypto Now?

A third party forensic crypto expert will need to be hired to trace the path of the scammed crypto from the time it left your custody to the time is arrived in the control of the scammers.  

A crucial issue will be how the scammed crypto is being stored, and where.  This issue influences the team of experts, the team of lawyers, which courts will be making decisions, which Judges from those courts will be chosen, how the paperwork will be drafted, and the costs involved.  

The crypto scammers will have chosen a transaction path and how to store it.  The investigation will follow this path and find its destination.  

Why Do Cyber Criminal Target Cryptocurrency Scams?

Many of the methods of cyber scams and thefts are old.  These criminal techniques have been used to steal money from unsuspecting victims since time immemorial.  What is new is the prevalence, the amount, and the speed at which crypto crimes have flourished.  Several factors  contribute to the crypto scam explosion, they are:

  • Victim inexperience: Victims of crypto scams populate the range from the newest, youngest, and completely inexperienced to sophisticated, professionals.  Yet, most crypto scam victims lack the rare combination of crypto experience, scam experience, and the diligence it brings. 
  • Novelty: One advantage of the crypto industry is its promise of eliminating the need for legacy financial institutions, such as banks, credits unions, brokers, dealers, and clearing houses.  Eliminating intermediaries reduces cost and increases speed.  However, the benefits come at the cost of security. 
  • Irrevocable: Crypto transactions are generally irrevocable.  Blockchain ledgers are chronological and decentralized.  There is no practical “undo” button once a mistake or crime is detected. 
  • Speed: Transaction speed reduces the “getaway” time for cyber criminals.  This speed increases a criminal’s chance of escape. 
  • Obfuscation: Transactions can be mixed, tumbled, pied away, and sent through a maze of interactions to hide the ultimate destination of the stolen crypto. 
  • Law enforcement inexperience: Training takes time.  Thought and experience is needed to counter-act novel-new types of crime.  Law enforcement is not uniformly experienced in fighting cyber-crimes. 
  • Cross-Border movements: Crypto scams nearly always involve criminals acting from multiple remote countries.  Stopping these scams takes international cooperation and synergy that is unavailable in many areas (think Russia, North Korea). 

For these reasons, crypto scams are a fruitful area for criminals. 

What is the Typical Age of a Crypto Scam Victim?

Victims of crypto scams and thefts range from the very young to the very old. 

It may surprise you to learn the victim age prevalence. 

  • Less than Twenty years old, <20: 4.3%
  • Twenty to Twenty-nine years old, 20—29: 14.9%
  • Thirty to Thirty-nine years old, 30—39 21%
  • Forty to Forty-nine years old, 40—49: 20%
  • Fifty to Fifty-nine years old, 50—59: 15.7%
  • Older than Sixty years old, 60+: 24%

FBI, Cyber Division Crime Statistics

What are the Yearly Losses of U.S. Crypto Scam Victims by Age?

The amounts lost in the United States on a yearly basis due to crypto scams are huge.  These losses are also growing by a staggering rate. 

  • Less than Twenty years old, <20: $40,700,000.00
  • Twenty to Twenty-nine years old, 20—29: $360,700,000.00
  • Thirty to Thirty-nine years old, 30—39 $1,200,000,000.00
  • Forty to Forty-nine years old, 40—49: $1,500,000,000.00
  • Fifty to Fifty-nine years old, 50—59: $1,700,000,000.00
  • Older than Sixty years old, 60+: $3,400,000,000.00

FBI, Cyber Division and Internet Crime Complaint Center

Common Apps used by crypto scam criminals

Cyber criminals use many forums to target and contact their victims.  The most common contact methods include:

  • Professional networking sites
  • LinkedIn
  • Facebook
  • Instagram
  • Telegram
  • WhatsApp
  • Dating sites
  • Phone/Text

How to Determine Whether a Person Is a Cyber Criminal

Crypto scammers are professional thieves.  They talk amongst themselves regarding techniques that work and those that fail.  Cyber criminals are rarely “lone wolves,” acting alone.  Rather, the normal situation involves a team of criminals, each with a specialty.  Concerned potential victims should use diligence and involve others in their verification process.  Remember, cyber scammers heavily rely upon the willful blindness of their victims.  Cyber criminals offer benefits victims want to believe are true.  No one wants to believe they are being targeted to be a victim.  Seek the advice of someone competent.  Take their advice. 

There are many methods to investigate whether a person is a crypto scammer.  These methods should explore:

  • Was the initial contact with the person spontaneous (unsolicited)?
  • Is there a sense of urgency in what they are asking?
  • Is the tone of request similar to “can’t miss” opportunities?
  • Did you not know this person beforehand?
  • Are there third parties, friends, acquaintances, colleagues you have in common?
  • Have you met themin person? 
  • Has anyone you know met them in person?
  • Have you had a spontaneous videoconference with them?  (initiated by you)
  • Look deep into their email addresses.  Watch for fakes.  Show suspicion for non-corporate email addresses (yahoo, gmail, hotmail, etc).
  • Verify any advertised license through direct contact with the licensing authority.
  • Verify their physical office location.
  • Verify their physical residence.
  • Verify their identity with an in-person look at their identification.
  • Look for multiple types of identification, including insurance and credit cards.
  • Is this person paying property tax? The payment of real estate taxes and personal property taxes is a public record that can be verified in many jurisdictions. 
  • Verify the ownership of any real estate (or home) they claim to own using its deed. Deeds to real estate are public records and can be verified in most jurisdictions. 
  • Is this person associated with a business? Nearly all businesses must register and file reports with the government.  Many reports are public documents and can be used for verification. 
  • Consult professionals in the relevant field. A lawyer will see problems with faked legal documents.  An investment professional will see issues with a fake investment.  A banker will see suspicious activities in corrupt financial businesses. 
Contact us if you have been scammed out of more than $200,000 in crypto recently. 
Your losses may be recoverable.  

Trial lawyer Matt Hamilton graduated from the University of Missouri in 1995 with Science degrees in Logistics, Marketing, and Business Administration.  Juris Doctor, 1999.