Bitcoin BTC: Unit V
Bitcoin BTC: Unit V
Bitcoin BTC: Unit V
What Is an Altcoin?
Altcoins are generally defined as all cryptocurrencies other than Bitcoin (BTC). However, some
people consider altcoins to be all cryptocurrencies other than Bitcoin and Ethereum (ETH) because
most cryptocurrencies are forked from one of the two. Some altcoins use different consensus
mechanisms to validate transactions, open new blocks, or attempt to distinguish themselves from
Bitcoin and Ethereum by providing new or additional capabilities or purposes.
Most altcoins are designed and released by developers with different visions or uses for their
tokens or cryptocurrency. Learn more about altcoins and what makes them different from Bitcoin.
Understanding Altcoin
The term 'Altcoin' is a combination of two words: 'alt' and 'coin' where alt means 'alternative' and
coin means 'cryptocurrency'. Together they imply a category of cryptocurrency, which is an
alternative to the digital Bitcoin currency. After Bitcoin's success story, many other peer-to-peer
digital currencies have emerged to try to mimic that success.
Many altcoins are built based on the basic structure provided by Bitcoin. Therefore, most altcoins
are peer-to-peer, require a process of mining by which users solve difficult problems in cracking
blocks and provide secure and inexpensive ways of carrying out web transactions. But Altcoins,
even with many overlapping features, vary widely from one another.
Types of Altcoins
1. Stablecoins
Stablecoins are digital currencies that are intended to maintain the same value as another asset.
Most stablecoins, such as the significant ones, are tied to the value of the US dollar and aim to
replicate its price fluctuations. The issuer of the coin usually takes measures to fix any changes in
value. Stablecoins are primarily used for saving or sending money, and people typically don’t
consider them as cryptocurrency investments. Some stablecoins can also generate interest when
loaned out or used in certain savings protocols.
2. Mining-based
This form of cryptocurrency uses a process called mining to authenticate transactions and
introduce more coins into circulation. Miners utilize equipment to solve mathematical equations,
and the first miner to solve the equation verifies a block of transactions, earning crypto rewards.
Mining was the first method employed to process crypto transactions since Bitcoin is a mining-
based cryptocurrency. Nonetheless, mining has a significant downside, as it requires a significant
amount of energy.
3. Staking-based
These cryptocurrencies use a process called staking to validate transactions and add more coins to
the supply. Users of a staking-based cryptocurrency may stake their coins, indicating that they are
committing their coins to be utilized for transaction processing. The blockchain protocol of the
cryptocurrency selects a participant to verify a block of transactions, and they receive crypto
rewards in exchange. Staking has become more popular due to its energy efficiency, as it was
initially introduced by an early altcoin named Peercoin (CRYPTO: PPC).
4. Governance
Governance tokens are digital currencies that offer voting rights to holders, allowing them to shape
the cryptocurrency project’s future. Typically, these tokens enable you to create and vote on
proposals relating to the cryptocurrency, ensuring that all holders have a say and that decisions
aren’t made by a single central authority. This helps decentralize the project.
5. Meme Coins
Meme coins, as their name implies, are digital currencies that derive their inspiration from
humorous or satirical takes on established cryptocurrencies. They tend to gain widespread
popularity quickly, often due to influential figures or investors promoting them online in an
attempt to profit from short-term gains.
6. Utility Coins
They provide access to a specific service or product within a particular blockchain ecosystem.
Examples include Ethereum (ETH), Binance Coin (BNB), and Chainklink (LINK).
7. Security Token
They represent ownership of an asset or a share in a company and are often subject to regulatory
oversight. Examples include tZERO and Polymath (POLY).
8. Privacy Coins
Privacy coins enhance user privacy and anonymity by obscuring transaction details and user
identities. Examples include Monero (XMR) and Zcash (ZEC).
9. DeFi Tokens
They are associated with decentralized finance applications, aiming to recreate traditional
financial systems without intermediaries. Examples include Compound (COMP) and Maker
(MKR).
They operate on top of existing blockchains to improve scalability and transaction speeds.
Examples include Polygon (MATIC) and Arbitrum
1. Define Purpose: Determine the altcoin’s use case and unique features.
4. Testing: Launch the altcoin on a test network to identify and fix bugs, test functionality,
and ensure stability before the mainnet launch.
5. Launch: Launch the altcoin on the main blockchain network. Distribute the altcoin
through initial coin offerings (ICOs), airdrops, or direct sales.
6. Promotion and Adoption: Promote the altcoin to potential users and investors through
marketing campaigns, social media, and partnerships. Engage with the community to build
support and gather feedback.
7. Maintenance: Continuously update the altcoin with new features, improvements, and bug
fixes.
Pros
Improve upon another cryptocurrency's weaknesses
Higher survivability
Thousands to choose from
Cons
Lower popularity and smaller market cap
Less liquid than Bitcoin
Difficult to determine use cases
Many altcoins are scams or have lost developer and community interest
DETAILS ABOUT FEW ALTCOINS
What is Ripple?
1. The native cryptocurrency of the Ripple network is called XRP, and it can be used to make
cross-border payments between different currencies or as a bridge currency.
2. Its primary aim is to improve the efficiency of cross-border financial transactions by
offering a more scalable alternative to traditional banking systems.
What Is XRP?
XRP is a cryptocurrency and token Ripple Labs uses to facilitate transactions on its network.
XRP primarily enhances global financial transfers and the exchange of several currencies.
The goal behind Ripple was similar to the vision of Bitcoin creator Satoshi Nakamoto, which was
to foster an easier, faster, and more secure way to make transactions globally. The tradeoff with
Ripplepay was that it didn’t rely on the blockchain; instead, it was centralized.
In 2011, McCaleb, David Schwartz, and Arthur Britto started developing the XRP ledger as a
recourse to the inherent limitations of Bitcoin. In 2012, when the XRP ledger was launched, it
incorporated the native token XRP to aid its function. This team of engineers was later joined
shortly after by Larsen, who now sits as Ripple’s executive chairman and co-founder.2
Ripple changed its name several times from 2012 to 2015. First, in 2012, it changed its name
from Newcoin to OpenCoin. Then, in 2013, it was renamed Ripple Labs. Finally, in 2015, it
rebranded and became Ripple as its popularly known today.2
XRP operates on its decentralized, open-source blockchain known as the XRP ledger (XRPL),
and transactions are facilitated by the Ripple transaction protocol (RTXP). Unlike most
cryptocurrencies, XRP is pre-mined, with a maximum token supply of 100 billion. The token’s
total supply was/are distributed in three ways:
First, 80 billion XRP tokens were allocated to Ripple, the parent company. To ensure a
stable supply of XRP, the company locked 55 billion of the token in an escrow account.
Then, Ripple co-founders and the core team received the remaining 20 billion XRP.
The remaining XRP are released at a rate of less than 1 billion per month, with the original
release schedule targeting 55 months.5
The initial idea behind XRP from the onset was straightforward and was described as a peer-to-
peer trust network. Ripple cites XRP as a faster, cheaper, and more energy-efficient digital asset
that can process transactions within seconds and consume less energy than some counterpart
cryptocurrencies.
XRP’s Ripple network uses a consensus protocol to verify transactions. Validators update their
ledgers every three to five seconds as new transactions come in to ensure that they match the
other ledgers. As a result, the network can validate transactions more securely and efficiently
than other cryptocurrencies.
Bitcoin
Bitcoin is a blockchain and cryptocurrency. Transactions are recorded and verified on a public
ledger called a blockchain. To secure the integrity of the blockchain and prevent fraudulent
transactions, Bitcoin employs a consensus mechanism called Proof-of-Work (PoW). In this
system, network participants, known as miners, compete to solve complex cryptographic puzzles
using powerful computers.1 While they solve these puzzles, they are also validating transactions
and information from preceding blocks.
The first miner to solve the puzzle successfully is rewarded with bitcoins. Their block is added
to the blockchain and revalidated by the rest of the network.
XRP is the native cryptocurrency of the XRP Ledger blockchain. Like many other blockchains,
it functions to securely store transactional data with distributed consensus. XRP was designed to
serve as an intermediate currency for transactions covering multiple crypto-assets and networks
between businesses.
The consensus protocol on the XRP Ledger is much different from that of other blockchains.
Different types of servers (nodes) exist on the XRP Ledger network. While all nodes play a part
in reaching consensus, there are three distinct types:
Validator: Validate the order of transactions by comparing their versions of the ledger
Hub: Information relays that broadcast transactions and state changes
Stock: Connectivity nodes for application developers
Validator and Hub nodes work together to build ledgers and deterministically sort transactions in
the order in which they were conducted. All nodes build and maintain lists of trusted validator
nodes, with operators removing and adding them as they see fit. The validator nodes achieve
consensus by, in a sense, comparing notes.
MERGERD MINING
Merged mining refers to the mining of multiple cryptocurrencies simultaneously without compromising
mining performance. With the Auxiliary Proof of Work (AuxPoW) consensus, a miner can use its
computing power to mine on multiple blockchain networks. AuxPoW refers to the valid use of a
transaction on one blockchain network on a different blockchain network. In this case, the blockchain
network where the first transaction was made is called the main blockchain, and the blockchain that
accepts the transaction as valid is called the auxiliary blockchain.
For merged mining, all cryptocurrencies involved must have the same algorithm structure. For instance,
Bitcoin utilizes the SHA-256 algorithm, which means that almost all assets with the SHA-256 algorithm
can be co-mined with Bitcoin. The main blockchain is not affected by this process, as it is technically
unchanged. The auxiliary blockchain needs to be programmed and designed to accept the work of the
main blockchain. In general, a hard fork is required to add or remove merged mining.
Merged mining refers to a process that enables an individual to mine more than one cryptocurrency
simultaneously without compromising on computational performance. This is possible through a
consensus mechanism known as Auxiliary Proof of Work (AuxPoW).
Merged mining was proposed by Satoshi Nakamoto in December 2010. In a discussion about a project
to create a decentralized DNS, Satoshi Nakamoto suggested that CPU power could be shared with
Bitcoin, even though it was a separate network and blockchain. Namecoin, launched in 2011, used
merged mining with Bitcoin.
For merged mining, the AuxPoW protocol is required. AuxPoW allows one blockchain to be considered
valid on another blockchain. The blockchain that provides proof-of-work is considered the master
blockchain. The other blockchain that accepts it as valid is known as the auxiliary blockchain.
Merged mining allows mining across multiple cryptocurrencies. The first step in merged mining is to
create a block for the main and auxiliary blockchain. The main blockchain is usually higher than the
utility blockchain network and both have different challenges. On the main blockchain network,
traditional mining works the same way, so there is no need to change node or client code. On the utility
blockchain, a normally mined block is accepted with its original code.
To successfully implement the merged mining process, both blockchains must use the same hashing
algorithm. For example, the algorithm used by Bitcoin is known as SHA-256, while Ethereum Classic
uses the KECCAK-256 algorithm.
If a miner wishes to mine a coin alongside Bitcoin, they must find another coin that uses the SHA-256
algorithm. The same goes for Ethereum Classic too. To mine a cryptocurrency alongside ETC, the other
currency must use the KECCAK-256 algorithm.
In addition to the hashing algorithm, many smaller technicalities must also be implemented properly.
However, it must be noted that in this process of merged mining, the parent blockchain does not undergo
many technical modifications. It is the auxiliary blockchain that must be effectively programmed to
receive and accept the work done by the parent chain.
In a merged mining system, a miner can simultaneously operate on the main blockchain and
the auxiliary blockchain network. If a block is mined on the main blockchain network, two
rewards are obtained.
Auxiliary blockchain networks are typically smaller blockchain projects. By using the hashing
power of the main blockchain network, the security of the auxiliary blockchain network can be
increased.
Merged mining allows different types of cryptocurrencies to be mined at the same time.
Auxiliary blockchain networks require some work to integrate with merged mining. When
moving from any protocol to merged mining, a hard fork is required.
Merged mining can INVOLVE MORE WORK. IT REQUIRES MORE WORK THAN
MINING A SINGLE BLOCKCHAIN.
Atomic cross-chain swaps, or atomic swaps, allow users to exchange assets across two different
blockchain networks in a secure, direct, and trustless manner, without intermediaries like exchanges.
The term "atomic" means that the swap is all-or-nothing: either the entire transaction completes, or
nothing happens, preventing partial completion.
Example: Exchanging Bitcoin (BTC) for Ethereum (ETH) directly between users, without relying on a
centralized exchange.
Security: Reduces risks associated with centralized exchanges, such as hacks or fraud.
Atomic swaps primarily use a technique called Hashed Time-Locked Contracts (HTLCs). HTLCs
allow both parties to lock assets on their respective blockchains and enforce conditions that ensure the
assets are either fully exchanged or fully refunded, protecting both parties.
Hashlock: Requires a cryptographic hash (or "commitment") that can only be unlocked with a specific
secret.
Timelock: Sets a time limit for the transaction. If the exchange is not completed within this time, the
assets return to their original owners.
Let’s look at a common example involving two participants, Alice and Bob, who want to exchange
assets on different blockchains.
1. Initial Agreement and Hash Generation
Alice and Bob agree to exchange assets. Alice generates a secret value S and creates its cryptographic
hash H(S).
Alice shares the hash H(S) with Bob. However, she keeps the actual secret S private.
Alice locks her asset (e.g., Bitcoin) on Blockchain 1 in an HTLC contract that includes:
The hashlock condition H(S), which means only someone with the secret S can unlock the funds.
A timelock, ensuring that if Bob doesn’t claim the asset within the specified time, Alice can retrieve it.
After verifying Alice’s HTLC, Bob creates a similar HTLC on Blockchain 2 (e.g., Ethereum) to lock
his asset.The contract also uses the hash H(S) and a shorter timelock than Alice's. This ensures that
Alice can claim the asset before her contract’s timelock expires.
Alice now uses the secret S to unlock the funds on Blockchain 2 (Ethereum).
When Alice reveals S to claim the Ethereum, Bob can see it on Blockchain 2.
If either party fails to unlock the assets within the designated time, the timelocks in each HTLC ensure
the assets are refunded to the original owners.
Benefits of Atomic Cross-Chain Swaps
Limitations
Complexity: Implementing HTLCs requires technical understanding, making them harder for
non-technical users.
Limited Blockchain Compatibility: Both blockchains must support HTLCs and similar
transaction logic, which limits some asset exchanges.
Scalability: Cross-chain swaps might become inefficient during high network congestion,
impacting transaction costs and speed.
Lack of Widely Adopted Standards: No single standard exists for cross-chain transactions,
which can limit interoperability.
SMART CONTRACTS
To transfer digital assets between a sidechain and its mainnet, an off-chain process – transactions
occurring outside of the parent blockchain – that transfers data between the two blockchains must
be built.
As mentioned above, because the transfer of digital assets between a parent chain and sidechain
are imaginary, digital assets are locked in and released on either end of the two blockchains once
the transaction has been validated via a smart contract.
Smart contracts are used to ensure that foul play is minimized by enforcing validators on the
mainnet and sidechain to act honestly confirming cross-chain transactions. Once a transaction has
occurred, a smart contract will notify the mainnet that an event has happened.
Then, the off-chain process will relay the transaction information to a smart contract on the
sidechain, verifying the transaction. After the event has been verified, funds can be released on
the sidechain, allowing users to move digital assets across both blockchains.
Note, this process can occur from the mainnet to the sidechain or vice versa.
BITCOIN’S SIDECHAINS
Real-life examples of sidechains are Bitcoin’s Liquid Network and RootStock (RSK). Since both
sidechains are tied to Bitcoin’s mainnet, only activities involving bitcoin are possible.
The Liquid Network is an open-source sidechain created by Blockstream built on top of Bitcoin’s
mainnet. By using the features inherent in sidechains, the Liquid Network’s block discovery time
is just one minute, a lot quicker than Bitcoin’s 10-minute block-time. This means 10 times as many
blocks can be added to the sidechain versus Bitcoin’s blockchain. The network also allows users
to transact digital assets more privately, by masking the amount and asset type being transferred.
Sidechains have great potential to expand the scope, scale and dynamics of blockchain technology,
allowing previously secluded blockchain networks to become integrated into one common
ecosystem.
BITCOIN-BACKED ALTCOINS
Introduction to Altcoins
Definition: Altcoins are alternative cryptocurrencies launched after Bitcoin. They include a variety
of coins with different mechanisms and use cases.
Classification of Altcoins: Utility tokens, security tokens, stablecoins, and wrapped assets.
Bitcoin-Backed Altcoins: Altcoins that derive their value directly from Bitcoin, such as Wrapped
Bitcoin (WBTC).
Bitcoin’s Dominance and the Emergence of Altcoins
Bitcoin’s Market Role: As the original and most dominant cryptocurrency, Bitcoin sets market
standards.
Need for Altcoins: Many altcoins aim to address Bitcoin's limitations by adding unique features,
e.g., Ethereum with smart contracts or Ripple for fast cross-border transactions.
Definition and Purpose: Altcoins pegged to the value of Bitcoin but created on other blockchains.
Mechanism: Bitcoin-backed altcoins lock a specified amount of Bitcoin as collateral, with tokens
representing the locked Bitcoin on other blockchains.
Example: Wrapped Bitcoin (WBTC) on the Ethereum blockchain, where 1 WBTC = 1 BTC.
Wrapped Bitcoin (WBTC): ERC-20 token on Ethereum backed 1:1 by Bitcoin. Highly
used in Ethereum’s DeFi ecosystem.
renBTC: Another Ethereum-based token backed by Bitcoin but maintained in a
decentralized manner via the Ren Protocol.
tBTC: Trustless, decentralized, Bitcoin-backed token on Ethereum.
sBTC: Synthetic Bitcoin on the Synthetix platform, where its value is pegged to Bitcoin
through collateralization.
Advantages:
Increased Utility: Bitcoin holders can participate in DeFi without selling their BTC.
Cross-Chain Solutions: Facilitates interoperability between blockchains, leveraging
Bitcoin’s liquidity.
Enhanced Adoption: Integrates Bitcoin into growing blockchain ecosystems like Ethereum
and Polkadot.
Limitations:
Blockchain allied technologies are a collection of technologies that enhance, complement, and
expand the capabilities of blockchain, making it more versatile, secure, and scalable. Here’s a
deeper look at some of these key technologies:
1. Smart Contracts
Smart contracts are self-executing contracts where the terms and conditions are directly embedded
in code. These contracts automatically enforce and execute actions when predefined conditions
are met, eliminating the need for intermediaries.
Application Areas: Financial services (automated loans and insurance claims), supply chain
(tracking goods), and legal agreements.
DeFi leverages blockchain to create a decentralized ecosystem of financial services, enabling users
to borrow, lend, trade, and earn interest on cryptocurrencies without traditional intermediaries like
banks or brokers.
Core Components:
Decentralized Exchanges (DEXs): Platforms that facilitate peer-to-peer trading of
cryptocurrencies.
Lending Protocols: Services that allow users to lend and borrow crypto assets.
Yield Farming and Liquidity Mining: Techniques that offer returns for providing liquidity to the
market.
DLT is the broader category of technology that encompasses blockchain. It’s a decentralized
database where multiple participants maintain and update records collectively, ensuring
transparency and security.
Types of DLT:
Permissionless (public): Anyone can join and access the data (e.g., Bitcoin, Ethereum).
Permissioned (private): Access is restricted to specific participants (e.g., Hyperledger).
4. Cryptography
Cryptography underpins the security of blockchain by ensuring data integrity, privacy, and
authentication. Common methods include hashing, digital signatures, and encryption.
Types of Cryptography in Blockchain:
Hashing: Converts data into fixed-length values for secure data verification (e.g., SHA-256 in
Bitcoin).
Digital Signatures: Verifies identities and authenticates transactions (e.g., Elliptic Curve Digital
Signature Algorithm).
Zero-Knowledge Proofs: Allow verification of information without revealing the actual data,
useful in enhancing privacy.
5. Interoperability Solutions
Blockchain interoperability allows different blockchain networks to communicate and share data.
This is crucial for enabling transactions and data exchange across various platforms.
Approaches:
Sidechains: Separate blockchains that run parallel to the main chain, enabling data transfer.
Cross-Chain Bridges: Specialized protocols that connect different blockchains for data
exchange.
Interoperability Platforms: Examples include Cosmos and Polkadot, which provide
frameworks for creating interoperable blockchains.
IoT devices, when integrated with blockchain, can securely record data and automate actions
across various devices, enhancing transparency, automation, and security.
Use Cases:
Supply Chain: Tracking goods from production to delivery with IoT sensors.
Smart Cities: Managing energy use, water distribution, and traffic flow.
Healthcare: Recording patient data in real-time for secure and accurate records.
AI and ML can enhance blockchain’s efficiency and provide valuable insights by analyzing the
data stored on the blockchain.
Applications:
Smart Contract Automation: AI can be used to manage and execute complex smart contract
conditions.
Tokenization refers to representing real-world assets (like real estate, art, and intellectual property)
as digital tokens on a blockchain, while NFTs represent unique digital assets.
Applications:
Real Estate: Enabling fractional ownership and easier transfers of property.
Art and Collectibles: Ensuring authenticity and ownership of digital art.
Intellectual Property: Protecting digital rights and enabling royalties.
9. Consensus Mechanisms
Consensus mechanisms are protocols that validate transactions and maintain the security of the
blockchain.
Proof of Work (PoW): Used in Bitcoin, requires solving computational puzzles, making it energy-
intensive.
Proof of Stake (PoS): Reduces energy use by relying on validators who stake coins.
Proof of Authority (PoA): Relies on a few trusted validators, suitable for private blockchains.
Techniques:
Zero-Knowledge Proofs (ZKPs): Allow one party to prove knowledge of a value without
revealing the value itself.
Confidential Transactions: Conceal transaction details, such as amount and parties
involved.
Multi-Party Lotteries
A multi-party lottery is a decentralized lottery system where multiple participants contribute funds,
and a winner is selected at random. Traditional lotteries are often managed by centralized entities,
which raises concerns about fairness and transparency. Bitcoin-based lotteries address these
concerns by using cryptographic methods to ensure security, fairness, and transparency without a
central authority.
To secure the lottery process and ensure fairness, the following cryptographic techniques are
commonly used:
a. Commitment Schemes
Purpose: Used to prevent participants from changing their numbers after submission.
How it Works: Each participant commits to a "number" by submitting a cryptographic hash of the
number along with a secret. This hash is later revealed, proving that they didn’t alter their choice.
Example: A participant may submit a hash H(number || secret), where number is their lottery
number and secret is a private random value.
b. Multi-Signature Transactions
Purpose: Ensures funds are only transferred if multiple conditions are met (e.g., a winning
outcome).
How it Works: Funds are locked in a multi-signature address that requires multiple parties (often
a threshold number of participants) to sign off for any payout.
c. Random Number Generation Using Hash Functions
Purpose: Generates an unpredictable, verifiable random number to determine the winner.
How it Works: Participants’ hashes can be combined with an unpredictable factor (like a recent
Bitcoin block hash) to create a fair, tamper-resistant random value.
Each participant selects a number (or multiple numbers) and commits to it by generating a hash
of their number and a private "secret."
This hash is then shared with the other participants to confirm participation without revealing the
actual number.
The wallet requires a specific number of participants' signatures to release the funds, ensuring
funds are only released to the winner.
After all participants have committed, each participant reveals their original number and secret.
By verifying each hash with the provided number and secret, participants confirm that no numbers
were changed after submission.
A random number is generated using a combination of participants’ revealed numbers, secrets, and
an unpredictable factor from the Bitcoin blockchain (e.g., the hash of a recent block).
The final number is used to select the winning participant in a fair and transparent way.
Step 5: Payout
Once the winner is determined, the participants authorize the multi-signature wallet to release the
prize funds to the winner.
If a threshold is required, a predefined number of participants must sign the transaction to confirm
the payout.
Trustless: No need to trust a central party; transparency is inherent through Bitcoin’s public
ledger.
Privacy Concerns: Publicly committing to numbers may reveal patterns in participant behavior
over time.
Coordination and Communication: Participants must coordinate the commitment, reveal, and
payout phases, which can be complex in a decentralized setting.
Dependency on Blockchain Data: Using a Bitcoin block hash as a random element can add a small
amount of unpredictability if the block is not mined in a timely manner.
Fundraising and Charity: Non-profits can use lotteries as a transparent way to raise funds.
2. Layering: Concealing the origin of the funds through complex transactions and transfers (e.g.,
moving money through various accounts and countries).
3. Integration: Making the "laundered" funds reappear as legitimate by integrating them into the
economy (e.g., investing in legitimate assets like real estate or businesses).
AML regulations target these stages, especially focusing on placement and layering, as these are
often the easiest points to detect suspicious activities.
Key Components of AML Regulations
Financial institutions must verify the identity of their clients and assess the potential risk they pose
for money laundering.
KYC includes collecting personal information (name, address, date of birth) and sometimes
financial background details.
Enhanced Due Diligence (EDD) is applied to higher-risk customers, such as politically exposed
persons (PEPs).
CDD involves assessing the risk level of a customer, based on factors like the type of business,
location, and transaction activity.
Ongoing monitoring of transactions and accounts helps identify any unusual or suspicious
activities.
Suspicious Activity Reports (SARs) are filed if transactions are inconsistent with a customer's
profile.
c. Transaction Monitoring
Financial institutions are required to monitor transactions for unusual patterns, such as large,
frequent, or cross-border transfers that don’t match a customer’s typical behavior.
Advanced software tools and artificial intelligence (AI) are often used to detect anomalies and red
flags.
Institutions must keep records of transactions, customer information, and reports filed for a certain
period (often 5 years).
Reporting obligations include filing SARs or Currency Transaction Reports (CTRs) for
transactions exceeding specific thresholds (e.g., $10,000 in the U.S.).
An intergovernmental organization that sets international standards for AML practices and
counter-terrorist financing (CTF).
FATF issues 40 AML/CTF recommendations, which member countries are encouraged to adopt.
The BSA requires financial institutions to keep records and file reports that can help detect and
prevent money laundering.
Key components include KYC, reporting large cash transactions, and filing SARs.
c. European Union's Anti-Money Laundering Directives (AMLD)
The EU has a series of AML directives that set standards for combating money laundering and
terrorist financing.
The 5th AML Directive (5AMLD) expanded KYC requirements, especially for digital assets, and
enhanced transparency for beneficial ownership registers.
d. The UK’s Money Laundering, Terrorist Financing, and Transfer of Funds Regulations
(MLR)
The MLR requires businesses, especially in finance, real estate, and other high-risk sectors, to
apply KYC and CDD and report suspicious activities.
Enforces economic and trade sanctions based on U.S. foreign policy, identifying individuals and
entities involved in criminal and terrorist activities.
Financial institutions are required to screen customers and transactions against OFAC’s sanctions
list.
AML regulations are enforced by government agencies, which oversee and ensure compliance
among financial institutions. Key enforcement bodies include:
Financial Crimes Enforcement Network (FinCEN) (U.S.): Monitors and enforces BSA
compliance.
Financial Conduct Authority (FCA) (UK): Supervises financial institutions for compliance
with AML regulations.
Failure to comply with AML regulations can result in severe penalties, including fines,
restrictions on operations, or criminal prosecution.
Money launderers continuously develop new ways to circumvent AML controls, such as using
complex digital asset networks or shell companies.
b. Emergence of Cryptocurrency
Cryptocurrencies and decentralized finance (DeFi) present new risks for AML compliance, as they
allow anonymous transactions and operate across borders.
c. Cost of Compliance
Compliance requires sophisticated technology and skilled professionals, making AML compliance
costly, especially for smaller financial institutions.
Collecting personal information for KYC and CDD must comply with data privacy laws, like the
GDPR in Europe, creating a delicate balance between AML and privacy requirements.
Artificial Intelligence (AI) and Machine Learning: Used to detect unusual transaction
patterns and predict risks.
Blockchain and Distributed Ledger Technology (DLT): Enables transparent and tamper-
proof transaction tracking, which can improve the accuracy of AML compliance.
Biometrics: Helps verify customer identities securely, reducing the risk of identity theft in
KYC processes.
Use of Advanced Analytics: Data analytics and AI are expected to play a larger role in
automating compliance and identifying suspicious patterns more effectively.