Bankless - Why North Korea Is Winning Crypto Crime and How to Fight Back | Ari Redbord, TRM Labs
Episode Date: May 11, 2026North Korea isn’t just hacking crypto anymore, it’s studying it, infiltrating it, and turning DeFi’s weakest links into a state-run revenue machine. This time around, Ryan and David sit down wit...h Ari Redbord of TRM Labs to unpack the Drift hack, the $6B DPRK crypto crime machine, how stolen funds move through THORChain, Bitcoin, OTC desks, and Chinese laundering networks, and why the fightback may require everything from better DeFi security to real-time Beacon alerts and offensive cyber. --- 📣SPOTIFY PREMIUM RSS FEED | USE CODE: SPOTIFY24 https://bankless.cc/spotify-premium --- BANKLESS SPONSOR TOOLS: 🔮POLYMARKET | #1 PREDICTION MARKET https://bankless.cc/polymarket-podcast 🟦 COINBASE ONE | GET 20% OFF https://bankless.cc/coinbase-one 🧭OKX | TRADE, EARN, PAY to OKX | 120M+ USERS WORLDWIDE https://app.okx.com/join/USBANKLESS 🦊 METAMASK | DOWNLOAD NOW https://go.metamask.io/BL-Pod-Download 🌐BRIX | EMERGING MARKET YIELD https://bankless.cc/brix 💰NEXO | Get your 30-day access to Wealth Club Premier https://bankless.cc/nexo --- TIMESTAMPS 0:00 Intro 2:16 The Drift Hack 5:15 Human Weak Points 11:16 The DPRK Hacker Network 14:56 The $6B Machine 20:32 Fighting Back 28:11 Seizures and Victims 38:58 Inside TRM Labs 47:01 Laundering Rails 52:51 The Beacon Network 58:06 Privacy vs Security 1:10:20 Code and Crime 1:14:49 Iran on Tron 1:22:55 Bitcoin and Power 1:28:49 Hardening DeFi --- RESOURCES Ari Redbord https://x.com/ARedbord TRM Labs https://www.trmlabs.com/ TRM’s DPRK Report https://www.trmlabs.com/resources/blog/north-korea-stole-76-of-all-crypto-hack-value-in-2026-with-just-two-attacks Ari’s Homeland Security Testimony https://www.congress.gov/119/meeting/house/119126/witnesses/HHRG-119-HM11-Wstate-RedbordA-20260421.pdf --- Not financial or tax advice. See our investment disclosures here: https://www.bankless.com/disclosures
Transcript
Discussion (0)
I've kind of rejected this idea that these are North Korea state sponsored, right? I would never
use that term in our writing or the way we talked about these things. These are state actors, hard stop.
When I talk about the enemies of the United States and our allies, I think about China and Russia and Iran.
And I put North Korea in there as well, which is crazy, right? This is a country with absolutely no economy whatsoever.
And yet they're competing on the global stage because they've professionalized cyber crime, essentially.
There is absolutely no economy.
So it's always been how do we steal and then ultimately launder funds.
And crypto is just the latest iteration of that.
Welcome to bankless, where today we explore why North Korea is winning crypto crime and how we fight back.
This is Ryan Sean Adams.
I'm here with David Hoffman, and we're here to help you become more bankless.
Big topic today.
It seems to be every single day there is a hack in defy.
At least there was almost one every single day for the month of a.
April. And this is all North Korea and a Lazarus group, but over in the world of
Operation Economic Fury, we also have the IRGC getting their assets frozen on Tron. And just a few
months ago, there was $15 billion in Bitcoin Cs out of the pig-butchering scam out of Cambodia.
So there's just a lot to talk about when it comes to crypto crime and what all the worst people
in the world and how they're using crypto and what we're doing to fight back against them.
So this is the subject today for Airy Redboard from TRM Labs. Let's go ahead.
and get right into that conversation with Ari.
Bankless station excited to introduce you to Ari Redboard.
He is the global head of policy at TRM Labs.
This is a blockchain analytics firm.
It's used by governments, major exchanges.
Their goal is really to trace illicit crypto.
He's an expert in all of these things.
He's had 11 years prosecuting national security money laundering cases at the DOJ.
He's been a senior advisor at the Treasury.
He's probably the single most authoritative voice
that we found in the world on illicit finance and crypto.
So we are here to learn a few things.
Ari, welcome to bank lists.
Hey, Ryan, thank you so much for having me,
really looking for the conversation
and honor to be on the show.
I almost don't know where to start.
So in April, it was the highest ever purported defy cases of hacks.
Let's actually start with the drift hacked, okay?
So to give some context to listeners,
on April 1st, North Korea drained $285 million from a protocol
This is a Perps protocol called Drift.
They did this in 12 minutes.
Last week, your team published a report saying these two accounts,
there's a Drift Report account,
and then the Kelp Dow one that we saw two weeks ago,
accounted for 76% of all the 2026 hack value so far.
And what was eerie about the drift hack to me as I was reading about this
was it seemed like North Korea,
who we'll talk about more,
their groups, their hacking groups, are hunting and stocking high value targets.
So again, 76% of the value from two targets, they were hunting the drift protocol for months.
Can we talk about the means that they went through in order to pick out the drift protocol?
Like, it seems like North Korea is hunting and assassinating almost individual high value targets
in a very methodical, sophisticated way.
Tell us about this case.
Yeah, it's really extraordinary.
And I think it is a watershed here.
Although I think it's important to go back a little bit.
I mean, North Korea has essentially professionalized
crypto hacking and cybercrime.
You know, when I was a prosecutor for years with DOJ,
we'd look at North Korea cases involving counterfeit $100 bills
and counterfeit cigarettes.
They hacked Sony pictures and tried to steal a billion.
from the Bank of Bangladesh.
So this is something that has been going on for a really long time.
I think what North Korea has realized, say, over the last five, six, seven years is that,
you know, they could hack Sony or some type of business and steal PII, essentially
usernames and passwords.
But in the age of crypto, this is bank robbery at the speed of the internet, right?
So what they've now done over the last five or six years is stolen, essentially averaging about
a billion dollars a year.
So we're talking $6, $7 billion to use for weapons proliferation and destabilizing activity.
So when you talk about the targeting, it's moved from sort of targeting the technology to really social engineering at scale.
And that's what you saw in the drift case, where they're meeting developers at conferences, right, using other people that they sort of bring in to play that role.
They're getting access to private keys to those who have the ability to validate transactions on these exchanges.
So what we've really moved from is sort of just going after the technology to going after the people,
and it's really social engineering at scale.
That's what's so unnerving about this case, actually, is because many of the people listening,
many people in crypto, they go to conferences, they think they know people in the crypto space in real life.
and you wrote this.
This was a line from Coin Desk,
North Korean proxy,
sitting across a table
from protocol employees
over a period of months.
We're talking about the drift tax.
That is, to my knowledge,
unprecedented.
So they met some of the drift team members
at conferences.
Apparently,
like right after this,
I was at Paris Blockchain Week,
right, standing around,
sort of, you know,
chatting with people.
You get paranoid.
But that's apparently really
what was happening here.
They sent proxies to these conferences
to meet individuals
who were,
building these protocols. I think the other sort of scary piece to this is if this happened to
drift, this obviously was happening to many, many more teams of developers out there who are building
in Defi. And I'm very concerned that this is sort of the tip of the iceberg and we really need to
take action. So, okay, so they met, I just can't get over meeting them in person because I always
think of kind of North Korea-Lazerath-Roe group as just their offshore, they're the actual
shadowy super coders out there, they don't manifest in real life. But you're saying they were
hiring proxies, I guess paid actors, individuals who, you know, didn't seem like they were from
North Korea, maybe seemed westernized in some way.
Essentially, yeah, I was going to say, essentially, essentially it had to be right. I mean,
this was something to be honest when I read, and I think it was a report that Drift themselves
put out, that described actually their investigation.
And that was the chilling part for me, too, right?
Because there's this whole idea that, like, you basically have folks sitting in, you know,
in military type offices within North Korea who are dealing with this, maybe some in China,
you know, but that's about it.
And here what you had was clearly proxies, right?
No one's going to engage with someone from North Korea directly.
So there's obviously proxies being used here.
There's a couple examples of this over the years.
We saw an arrest of a U.S. person for,
facilitating the IT workers that were ultimately infiltrating a number of different crypto and tech
projects who were U.S. persons that were kind of supporting this effort. So there are examples of this,
but to me, this was pretty extraordinary and really chilling that North Korea could get
Westerners essentially to do their bidding. Can you talk about how the social engineering actually
led to one of the largest hacks, I think the largest hack on Solana in the drift case? So what were
the further details there in that story?
Ultimately, what they were able to do was gain access to the protocol itself.
And that's where you took that social engineering piece to then have that really sort of
technical attack.
On March 27th, Drift migrated its Chakurdy Council to a new two out of five threshold configuration,
which meant you only needed access to two of the five validators on that platform.
and North Korea was able to get access and breach there.
And what was also so extraordinary is this was programmatic.
On April 1st, there were pre-signed transactions were deployed,
which resulted in 31 withdrawals in 12 minutes,
and then those funds start moving.
What's something you're actually looking forward to next month?
Because Coinbase is doing something interesting.
Coinbase 1 member month starts with 20% off your first year of Coinbase 1,
plus a $50 Bitcoin bonus when you spend $100,000,
when you spend $100 with a new Coinbase 1 card in your first 30 days.
They're also layering in extra rewards and perks throughout the month.
And if you're active in crypto, Coinbase 1 is basically designed for you.
You get zero trading fees on thousands of crypto assets, 3.5% APY on USDC,
and boosted staking and lending rewards,
and up to 4% Bitcoin back with the Coinbase 1 card.
So if you're going to try it,
now is the time to lock in a 20% discount before the weekly rewards kickoff.
Start your month of more with 20% off the first year of your annual plan
at Coinbase.com slash bankless. That's coinbase.com slash bankless. Visit coinbase.com slash bankless
to get 20% off of the first year of your annual plan today. Offers are valid until May 31st.
Terms apply, Coinbase 1 card is offered through Coinbase Inc and Cardless Inc. card issued by
First Electronic Bank. Bitcoin back rates are based on cardholder assets on Coinbase. Quick shout out to
OKX. They are live in the States, building the new money app. And Wall Street is taking notice.
The parent company of the NYSEE just invested at a 25 billion valuation and took a board seat.
That's the New York Stock Exchange coming to crypto, not the other way around.
And why, OKX?
It's the only app combining a full centralized exchange and self-custody wallet in one place.
Sex trading, decks access, on-chain activity, all in a single interface.
No more bouncing between five apps, copying, pacing addresses, or bridging tokens in separate tabs.
They support Bitcoin, Ethereum, Salonet, base, and more.
Millions of tokens, just a few clicks, and an infrastructure that processes trillions in transactions
and keeps assets fully backed.
OKX users are set to get tokenized New York Stock Exchange stocks and derivatives later this year.
Tratfi and Defi finally in the same app.
Head to the link of the show notes, download OKX, and see why it's the NYSE's go-to for going bankless in the United States.
Not investment advice, services not available in New York, Kentucky, and Texas.
You would have never thought two years ago that you could soon be trading tokenized oil on Metamask.
But here we are.
I've been using Metamath since 2017, and we all remember buying NFTs with it in 2021.
And now, in 2026, if you haven't checked in on Metamask,
Metamask recently, let me tell you. You can trade tokenized stocks, funds, and commodities,
along with leverage perpetuals, prediction markets, and even, yes, you can gasslessly swap
between crypto tokens across networks, too. There's advanced security features like MEV and front-run
protection, and even a debit card so you can actually spend your crypto directly at merchants
all around the world. And it's all self-custodial. Everything you want to trade in one place.
This is the open money future. We've all been waiting for. Check out the new MetaMask. It's already
on your phone or in the link below. So this turned into a hack of $285 million.
I believe, and this was a drain that lasted just for 12 minutes and then it was kind of over.
A pretty incredible hack and I suppose a big win maybe for the hackers.
I'm curious to learn a bit more about them.
So oftentimes we hear about, it's just like North Korea, sometimes we hear about a subgroup called Lazarus.
I've also heard about Trader, Trader, Bureau 121, like all of these different subgroups.
And when I've heard people talk about this previously,
it almost seems like there are these like decentralized groups
within the North Korean government
that maybe operate somewhat autonomously,
but sometimes in a coordinated way.
Can you give us a lay of the land
for all of these various groups in North Korea,
how they're incented, how they're structured,
like what do we know about them?
Absolutely.
And it's interesting.
I think my own views of this have evolved,
over time, particularly recently.
You know, going back even a few years,
I've just always thought to myself,
this is North Korea.
And I've kind of rejected this idea
that these are North Korea state sponsored, right?
I would never use that term in our writing
or the way we talked about these things.
These are state actors, hard stop, right?
This is the North Korea government
who's realized that, you know,
stepping back for a moment, right?
Like, when I talk about the enemies
of the United States and our allies,
I think about China and Russia and Iran.
And I put North Korea in this.
there as well, which is crazy, right? This is a country with absolutely no economy whatsoever,
and yet they're competing on the global stage because they've professionalized cyber crime,
essentially. There is absolutely no economy, so it's always been how do we steal and then ultimately
launder funds, and crypto is just the latest iteration of that. So what they've done is they've built
a cyber army, essentially, and it has different names, and you're right that it's becoming more and more
decentralized where these groups are acting on their own. They have certain signatures of the way they
ultimately launder funds, the way they steal funds. But I think that the easiest way to understand
this is this is just North Korea. You know, people ask me all the time, how have they done this?
There's an amazing podcast called Lazarus Heist on the BBC, which walks through two seasons of how
essentially they've built this capacity. But essentially what it is is like they raise kids from a really
young age to be hackers, to be cyber warriors.
You know, think Russian gymnast right in the 1980s.
They take you if you show the abilities in STEM and they, you have access to the internet,
which most North Koreans don't have.
Maybe they'll send you to China to compete for education.
And they are building this essentially an army of cyber warriors that now are attacking
crypto exchanges, right?
You know, a couple years ago, they were involved in other types of activity.
And it's really crazy.
And I think the most troubling part is unlike the hacks that occur from time to time, right,
in sort of more of the private way, you know, the money stealing that we see in crypto,
the scams.
This is to fund weapons proliferation, right?
This is to destabilize the Korean Peninsula.
So this is North Korea.
This is not a situation where you have China or Russia, where there are maybe groups where
the government turns the other way.
this is actually the government, this is the army.
How much of this behavior out of North Korea just comes from the fact that they just
like don't economically, they don't really have any other options.
Like if you ask me what North Korea's biggest exports are, I have no clue.
I have no clue how North Korea makes money except for the fact that they steal hundreds
of millions of dollars all the time from the crypto industry.
And so like maybe this is just like born out of necessity from North Korea.
They just didn't have any other options.
and so they learned that like there's money on the internet that they can go steal.
How much of this just came out of the fact that this is just what they need to do to survive?
That's so much what it all has come out of.
But what's interesting is you just watch the sort of progress of this.
And I mentioned, you know, we've looked back in North Korea.
You know, people ask me all the time, hey, how did you get into crypto, right?
And I wish I had the better origin story where I like, you know, bought in 2011 or whatever.
You know, I would be driving around in my Lambo like everybody else.
but for me it was actually North Korea.
I was a national security prosecutor
at the U.S. Attorney's Office in D.C.
And we started to look at money laundering cases
involving North Korea.
And we started to see Bitcoin in those cases.
And this was way before these sort of really,
you know, attacks at scale, certainly before D.Fi.
And I said to myself, wow, this is really cool technology
where you can move funds cross-border
at the speed of the internet
and tried to start to understand like,
wait, wow, how could we use this for good?
but also at the same time realizing this is really a technology we need to keep out of the hands of bad actors.
So North Korea has really been early here, but you're absolutely right.
It's born out of necessity.
Just going back and just labeling some quick hacks, $1.5 billion in February 2025 from ByBit, the $300 million recently from Kelpedale.
I think that sounded $200 million.
There's the Ronin Bridge.
I think that was also North Korea.
Substantial numbers, multi-billion dollars.
I don't know if you have on the top of it, they had like a total amount of some.
Billion is what you said, right?
Yeah.
Six billion.
We just put out a report, I think last week, that said six billion over the last, you know,
five years, something around that.
What and how do they do with their money?
What happens next with $6 billion in crypto assets held by North Korea?
Like what, how do they turn that into something productive?
So that becomes the challenge.
And for TRM, at least the most interesting piece of the puzzle, what we're focused on, right?
So the attack happens and we can get into maybe.
how we can stop those at some level.
But then the laundering begins.
And North Korea launders differently than certain actors.
They want to move the funds as fast as they can.
They're going to use services, mixers,
and other types of services to obfuscate the transactions,
but they're actually less worried.
Well, they're not worried at all about getting caught.
What they were worried about is getting those funds off-ramped
as fast as they can in order to use them.
You know, and it's hard to say what exactly they're being used for,
but everything in North Korea is being used for weapons research, for missiles, who knows,
for Crown Royal for the regime.
You know, it's, it is, it is being used to prop up a rogue regime, essentially.
But that is really the sort of the interesting laundering piece.
North Korea needs to move the funds as fast as they can to get them to off ramps,
to use them, and they're going to lose some of that.
We see that in the by-bit case.
We see that in the Ronin Bridge case.
But they'll get enough off where this certainly becomes very, very, very,
valuable. Was there like a before after a moment in the just power and capabilities of North Korea
after crypto? So like once they started hacking hundreds of millions of dollars, I would imagine,
as we kind of discussed, this prowess, this capacity for, you know, hacking the internet and
stealing the funds came out of crypto and came out of necessity because they didn't really have any
other economic engine for themselves? Has North Korea become substantially more powerful and
their military, their weapons, whatever,
is this more capable because they have
all of these billions of dollars coming in Florida?
Like, what can we say about like how crypto has impacted the arc of North Korea?
Certainly hard to say,
but I don't know that there's been any economy within North Korea
over the last, you know, a couple of decades
that could have done, you know, a billion dollars a year on average for the regime.
And I think what we're really concerned about right now in this moment,
right, why we're having this conversation is that, you know,
This year, now North Korea is the vast majority of hacks.
And the drift hack feels like a playbook.
And how many of these are in line, essentially, in tow right now in order to try to go after?
So my concern is that there have been a number of really key moments when it comes to North Korea.
You mentioned the Ronan Bridge.
It was a $600 million hack, which at the time was absolute game changer.
And I actually think it got the U.S. government at least very focused on the issue.
We had a number of meetings with U.S., Korean, and Japanese leaders in order to figure out how we can
come together as sort of a trilateral to go after these guys.
That was a huge moment.
You mentioned the by-bit hack in February of 2025.
That was the largest bank robbery in human history.
And it wasn't even close, right?
1.5 billion just walking out the door.
And then I think we're in this moment right now where Defi is the target, where we're seeing
them move slightly differently.
the social engineering piece has always been there,
but now it's more pronounced.
So I think that now we're seeing another one of these moments,
and we've got to stop this.
Yeah, this was so scary about that drift hack.
Keep coming back to that.
It's almost like the idea of you could have sleeper cells out there,
like infiltrated in your company.
I mean, they waited months to pull this off.
It almost had the sophistication of,
like you read about massage,
massage and what they're doing,
what they did with kind of the pager attack, for instance.
It's that level of nation state sophistication.
and impatience. Like, they set up a fake partnership, like a shell company with all of these.
You just like fake. They made an investment in the project. Yeah, just like incredible.
And a significant investment. I want to say, they said it was about a million dollars or something.
Yeah, yeah, yeah. Okay. So a few other things. I wanted another way to ask the question David was asking is,
is like, is $6 billion a lot of money for North Korea? Six billion dollars is a huge amount of money for North Korea.
There are many countries in the world where that might not be true. Right. That is a huge amount of
money for North Korea. Okay, okay. That's what I thought. So this is a major funder of their weapons
program then. So they're not stopping anytime soon. They're not stopping. I think they're very bullish
after this last month. Oh my God, very bullish. Yeah. Yeah. Okay. So what does national security
at the U.S. think about this? So under a less crypto favorable administration, we used to hear
murmurings that, you know, the White House national security wanted to sort of shut defy down,
shut crypto down, partially because of these types of hacks, right? It's just like, look,
if you guys can't secure your programs, your defy and your crypto assets, like this is becoming
a national security threat to the U.S. And like we might have to just come in and shut you down.
Like, I don't think I ever heard that kind of statement exactly, but it almost felt that sentiment or there was rumors possibly.
What about that is true?
I guess what does national security think about the state of crypto right now?
Are they kind of pissed that this is happening?
Look, look, the folks that I've been talking to on this are very much like, well, how do we stop this from happening essentially?
And it's not so much, hey, we're going to shut down these services.
I think the reality is, and I kind of went through this, right?
Like, North Korea has attacked every sector.
You know, they have attacked banks.
They have attacked tech companies.
They've stolen PII.
We're not going to shut down hospitals
because they're victims of ransomware attacks at scale.
Right?
Hospitals are the number one target.
I think it's like 50% of all targets are hospitals for ransomware attacks.
So I think the question really becomes,
and the questions we've had with the White House,
the Treasury Department, the national security community is,
how do we stop it? And I at least advocate for sort of two ways to think about that. The first is
hardening cyber defenses, which we all know needs to happen. I think the Depi community is having a
conversation over the last couple of weeks in a pretty meaningful way about we might not have
standards, but as a community, we need to come together and at least come up with best practices,
you know, for protecting these platforms. So I think that's a really critical piece. Cybersecurity
should be built in to a protocol. But the second is the one I'm more focused on. And it's,
It's like we got to stop blaming the victims here, right?
You know, essentially North Korea is attacking these projects at scale.
We got to attack North Korea.
Yeah.
So, you know, to me, if North Korea steals $285 million from Drift,
we need to go steal it back.
And what does that look like?
It looks like offensive cyber.
And we have the capabilities within the national security community.
I believe we're using some of those,
but we need to be doing it in a much more meaningful way.
I felt this after the buy bit hack, right?
They could steal $1.5 billion from an exchange.
Let's go get it back.
Let's target the bad actors.
And that's mostly what we're kind of hearing out there.
Just like, again, like backing up for one moment.
I think about this all the time.
I think we're in this really interesting moment in human history where the private sector has all of the data.
Right.
Like we have this rich data set of blockchain data, AI, and the government has all of the authorities.
And what we need to do at TRM is we try to.
to ensure that the government has all the data they need.
But we also need some of these authorities.
The private sector moves very, very quickly.
Give us the opportunity.
Give Seal, give some of these other, give Zach XPT.
Give us some of the authorities to actually go after these bad actors ourselves.
And I think we could really make a dent in this issue.
Well, I love how badass that sounds and definitely what I want.
But my reservation is that it feels somewhat asymmetric where the Lazarus group is attacking
our defy protocols, which are complex.
They have attackable surface areas.
There's ways to penetrate them.
And then once North Korea gets their hands on the crypto assets, what do they do?
They just hold it in raw ether or raw Bitcoin.
Like how do we attack that?
And so it seems somewhat asymmetric.
So while I love the notion, I think I will need further convincing that that's even like
a feasible thing to do.
I love that.
I think there's probably a ton of ways around this.
And it's not easy.
And I don't want to make it seem easy.
But let me give you an example, right?
After the colonial pipeline ransomware attack,
which is probably the most famous ransomware attack ever, right?
I don't know about you guys, but I was having trouble getting gas in D.C.
You know, for a couple of days, right?
It was pretty significant.
I think it moved the cyber crime, cyber attack conversation to a very,
very mainstream conversation. But ultimately, what we were able to do is track and trace the ransom
payment. And law enforcement and national security agencies were actually able to use tools
to take them back. Essentially, you know, and I don't have access to those tools, but essentially
crack private keys. Did they beat them out of someone? Did they actually have access to them
through a hack on a computer system? You know, these same bad actors, China and others,
attacking our computer systems for our government agencies, right? The U.S. Treasury Department,
recently a victim there. So I think there are things that we can do that aren't necessarily
like, hey, we're going to breach a defy protocol that North Korea is using in some way.
But I do think we could breach their computer systems that are potentially holding at least
information that can allow us to do some of that. This is a little outside of my area of
expertise, but I really want to empower the private sector and the public sector to work together
on this. I love that idea. Even the idea of empowering the private sector is like, what is that,
you know, commissioned bounty hunters or something? Like we have the skills. So letters of Mark, right?
So this is what I'm advocating for. Right. In, in, at the, in the, during the U.S.
Revolution and, and about a war of 1812, what we would do is we would actually commission
privateers to go after pirates on the high seas. Okay. Why? Because because because we can move faster.
because private individuals with boats can just go get them.
Also with incentives, you know, hey, you could have 5% cut of that.
With incentives.
So think cyber letters of Mark.
You know, pirates today are on blockchains and in cyberspace.
Let us with the tools and the training and the expertise go after those guys where they live.
Hell yeah.
I love that idea, actually.
And in fact, maybe I'm most excited about that versus all of the other defense, you know,
which we need to do.
It's like basketball, right?
Defense wins championships, I get that.
That's how we're going to stop this in the long term.
But we got to also play offense here.
Did we do some of that?
So actually, I wasn't aware that the colonial pipeline ransomware had kind of a happy ending.
Some of the funds were recovered.
But I did see a story.
I think this was back in October of 2015.
David and I talked about it on a bankless show.
This was FBI, DOJ, successfully seized 15 billion,
in Bitcoin from a massive international pig butchering ring.
That was the very famous Chen Zai pig butchering ring, I believe.
And somehow mysteriously, assets were recovered.
127,000 Bitcoin was recovered.
$15 billion.
That's got to be one of the largest asset seizures by the DOJ and FBI in history.
And it's like mysterious as to how they actually.
actually recovered those funds. I saw blockchain forensic analysts being like, huh, this is weird.
It's almost like they somehow got their hands on the private keys. I wonder how they did that.
Do you know anything about this? Yeah, look, I talk about this case a lot. I think it's really a great
example of so many of the things that we're calling for. First and foremost, we need a whole of
government approach, right? This is scams and fraud are now a national security issue. We're seeing
transnational criminal organizations, you mentioned Shenzhi and the Prince Group, which is
out of Cambodia, was running these massive scam compounds that were stealing billions of dollars
from Americans.
Would you say massive?
You're talking about thousands of employees, almost in like call center data center,
thousands of employees, many of whom are human trafficking victims themselves, who are lured
to these places.
This is the, this is like the worst financial crime scourge that we've seen, certainly in
my lifetime, and I've been doing this stuff for a really long time.
And you talk about things we need to use every national security tool, but we really did in the Prince Group case.
And when people ask me what we should do of like, actually we have the playbook, right?
DOJ indicted Shenzhi, who was the ringleader here, who actually operated at the highest levels of the Cambonian government.
We did the largest forfeiture action in human history, $15 billion, right, that you mentioned.
I mean, unbelievable.
But then OFAC also sanctioned Prince Group.
We saw FinCEN actually take down their primary money laundering facilitator.
called We Won, and it was really this whole of government
interaction agency approach to go after these bad actors, and it's a win.
The problem is there's like 10, 15 more Prince groups out there
throughout Southeast Asia and the world.
But in terms of the taking the 15 billion itself, you know,
it's hard to say how exactly we did that.
I will say I highly recommend reading the forfeiture action
and the indictment in the case.
There's a really interesting paragraph in there
that talks about an insider who had access to some of these funds and Shenzi at one point
getting very upset with this person and kind of wondering, you know, how that maybe dovetails
into some of how we were ultimately able to seize and then forfeit these funds.
But I think there's a lot of, a lot of nuance there, a lot going on.
But I think it's a playbook for how we can go after these scam compounds.
I love that.
And that, you know, part of that is something that only another nation state can
actually do is actually just, I don't know, I saw pictures of the guy, what's his name again?
Shenzi. Shenzhi. Shenzhi being arrested. I mean, you got the sense that there was cooperation
with the government, the special forces kind of like came in and just like picked this guy up and brought
him to justice. Well, what's interesting about that case, so just to be just to be clear, so he was not
arrested. So he was, so he was indicted. I'll tell you what you saw. He was indicted by the U.S.
Like a bag over his head. Maybe. And it was. So, you're just like, what's a,
China actually arresting him? Okay. So he was, and we can talk about this a little bit. So he was
indicted by the U.S. and then ultimately China swooped in and brought him to China. And I think
this is kind of the China narrative in my mind. And that is if you read the indictment, you read
the forfeiture order, there's reference throughout to Chinese national security agencies in there
and how they were connected to Cambodian government, how they were connected to the Prince
group.
And I think the reality is that for China's taste,
Shenzhi just flew too close to the sun.
You know, it's one thing to operate this way,
likely sending funds back to China,
but you can't get caught.
And you definitely cannot get,
you definitely cannot get indicted
and brought back to the U.S.
So before we had any chance.
So parts of China were complicit here.
And so.
Very likely, or at a minimum,
certainly looking the other way.
Or too close or just something
that's a bad look for China.
It's a bad look for China.
So they grabbed him so we couldn't.
It was essentially how I, that's my interpretation of what happened.
And since this is bankless, we can, you know, we'll take it a little further than I might normally.
But I think that I think that is essentially what happened there in terms of the arrest.
But I do want to point one thing out that's important.
We are seeing a shift, and I think it's a really good shift.
We, TRM held our public sector summit last week where I got out in front of about 250,
mostly U.S. federal law enforcement and national security agencies.
And we actually talked about this point.
And there's we're finally seeing a shift to the way we go about our business.
It's always been from a law enforcement perspective, you've got to arrest someone, right?
Handcuffs on people, prosecutions, you know, potentially going to jail.
I think we've seen a shift to asset seizure and forfeiture, which to me is really important
because you're not going to get your hands on the drift protocol hackers.
They're in North Korea, they're in China, it's never happening.
You're not going to get your hands on Russian cyber criminal groups
that are doing ransomware attacks in dark net markets.
You're not going to get your hands on, you know,
Cambodians running scam compounds likely
because they're in countries that are just not going to extradite to the United States.
But what you can do is you can take the money.
And that is a huge impact, right?
I mean, ask any drug dealer on the street who had their escalade taken.
They're probably more concerned with that than doing the time in jail.
And I think that's a really powerful tool.
You can take the money. That's right. I do think that's a powerful tool. That's part of the offense that you were talking about. But can we talk about the victims here? Because it's always been unclear to me where that $15 billion goes, right? Does the U.S. government just seize it and take it? And hey, now it's part of the strategic Bitcoin Reserve. Like, you're welcome everybody. The reality is that $15 billion was taken from hundreds of thousands of individuals, U.S. citizens, other citizens,
of the world through these like intricate pig butchering campaigns.
For those not familiar with that,
it's like, I think it's the idea that you sort of,
you fatten up the victim by treating them nicely,
socially engineering them, catfishing them,
pretending to be an interested party,
business relationship, girlfriend, something like this.
And then you sort of milk them for their funds, right?
So, socially engineered.
So people are losing their money.
And it's hard to kind of trace that back
to individual victims.
I'm wondering in these types of
cases with the seized assets, do victims ever get some of that remuneration, some of their money back? Or is it just
too impossible to handle something at that scale? It's the most important question, and I'm so glad
you're asking it. Like when I think about these cases, and I've testified really recently once,
about a week or so ago before the House Homeland Security Committee on just this, on how transnational
criminal networks are stealing billions of dollars from Americans. And then prior to that, actually,
testified before the New York State Senate on how New Yorkers specifically were being attacked.
And I said the same thing essentially is like, we need to build a victim compensation fund.
We need to have a way where we can do this and do it at scale. I think the biggest challenge right now
is how do you associate even with blockchain tracing, how do you associate a specific individual
victim with a specific compound, right? Hey, we took down KK Park so we know that this is part of
your funds or we took down Prince Group. So we,
know these are part of your funds. So what I advocate for, and one of the recommendations I made in
that testimony, I would encourage folks to read it. It's on our site. It's like a very detailed
perspective to include letters of Mark, to include other types of legislation that I think could be
helpful. But I think we need a victim restoration fund. And it's contemplated by the executive order
that came out recently on scams. The Trump administration put out an executive order on cyber-enabled
scams and one of the recommendations or one of the call for a victim restitution fund.
So people ask me, how does this work? Because you're absolutely right, Ryan, like, this is tough.
It's funny enough, when I was a baby lawyer, I was after my first year of law school. So this was
like 30 years ago. I couldn't get a job anywhere in the Justice Department, but I really wanted to
work there. And I finally found this really, really random office called the Office of Vaccine
restoration. And essentially what it was was like there was a public good of not allowing people
to sue vaccine companies in tort. So if you're hurt from a vaccine, we don't want you to be able to
sue the company and put them out of business because we need vaccines, right? So instead,
for every vaccine that's sold, I think 76 cents went to this fund. And ultimately, a victim,
you know, a child with an encephalopathy, some type of other damages, would petition the Department
of justice that ran the fund and ultimately lawyers there would decide whether this claim was valid
and pay out the fund. I see a victim restoration fund like that as the future for this.
It's for everybody. Any victim, U.S. person who's a victim of a scam can submit to this fund
and try to get restitution there. So that I think is the vision. I love that the executive
order talks about it because I think that that makes it very real.
I think we'll get some legislation from Congress on this,
and I think we'll start to move.
But it's so important, and I don't know that, well, it is not happening fast enough now.
Can we take a step back and just paint for the listener and myself,
what it actually looks like to work with law enforcement?
So TRM Labs just to kind of like speed run, correct me, whatever I get wrong,
but just to speed run and like what you guys do,
you guys just take in all of the blockchain data.
You guys have mapped out who are the illicit actors
with some degree of certainty.
You guys do like risk scoring.
So like these addresses are likely North Korea.
These addresses are likely some sanctioned actor.
You give that data out to exchanges so they can know what's up.
But then also you guys work with like law enforcement and the FBI.
Can you just like paint a picture of what working with law enforcement looks like?
Absolutely.
Let me just back you up for one second because there's one part of that.
You nailed it.
But it's so interesting.
How do we do that attributing addresses?
We have a team of threat hunters.
We have someone who focuses full-time on ransomware.
She's a former FBI analyst.
We have someone who focuses full-time on Iran.
I would say he's the foremost expert on Iran
and the use of crypto today.
We have a guy named Nick Carlson,
who is former FBI analyst I worked with
when I was a prosecutor,
who is the foremost expert in my mind in the world
in North Korea and money laundering.
And what they're doing is they're out there
attributing illicit crypto addresses.
So for example, we have someone who focuses
full-time on terror financing.
he is actually communicating
on password protected telegram channels
and rocket chat with Mujahideen,
with ISIS fighters,
trying to get them to send him
crypto addresses so we can attribute them
in our tool terror financing.
We then provide that data
to basically three main buckets
to law enforcement,
and I'll kind of get into your question
in a moment,
who use it in that sort of like,
to me, like the sexy use case,
right, the tracking, the tracing,
the building the investigations,
the going after bad guys.
to regulators who use it to make licensing determinations,
places like the Monetary Authority of Singapore
or New York Department of Financial Services,
we then also provide that information
to compliance teams at large financial institutions
or crypto businesses.
So that's kind of the secret sauce.
In terms of working with law enforcement,
it's a couple of ways.
First, we're providing them the software.
So first and foremost, we're a software company.
So we're selling that data
with a cool UI that allows for the tracking and tracing on top of it.
But we also have a really cool global investigations team
that's sourced from some of the finest crypto investigators of all time.
I think a lot of people know Chris Chanceski.
He and I were in a very cool Netflix documentary together called The Biggest Heist Ever.
He was the protagonist in Andy Greenberg's book Tracers in the Dark.
Chris is our head of global investigations.
And he has a team of former global law enforcement from Met Police and Korean
and national police who are working side by side
with our law enforcement partners
to track and trace illicit proceeds
and help them build investigations.
This question is a little bit squishy,
but how dominant is crypto
and therefore like TRM labs
and maybe also chain analysis,
a company that's very similar to yours,
how dominant is that when it comes to
just international, transnational financial crime?
So like maybe one scenario is like
there is transnational financial crime
and I don't know what it looks like for it to not be in crypto,
but like maybe that is like some amount of the cases.
Or is it like, oh, if there is transnational financial crime,
it's probably some component at the very least is in crypto.
And so you guys are always involved or very frequently involved
in some of the highest level cases.
Like how big is this world?
Yeah, it's a great question.
It's funny.
I usually start with this.
But I think Ryan just got it to drift so fast.
We were just rocking and rolling.
But, you know, we put out a crypto crime report a couple of months.
months ago, it basically said we saw 158 billion in crypto crime in 2025. That is a record setting year.
Okay. And that's always the headline, right? 158 billion record year in crypto crime. That only makes up
about 1.3% of all activity within the crypto ecosystem. So we're still talking about 98, 99% of activity
within crypto is lawful. To give you a sense of that, it's much harder to tell this in Fiat,
but normal numbers are somewhere between 3 and 6%
is kind of what you see out there.
But right, so there's that piece
of just like the pure data piece.
The other piece is, look, when I was a prosecutor,
I wasn't investigating crypto cases.
It just wasn't what was happening at the time.
I was investigating cases involving networks
of shell companies and hollas
and bulk cash smuggling and high value art and real estate, right?
ISIS was stealing antiquities in Syria and elsewhere.
We might call that trad money laundering, huh?
Yes.
I just call it money laundering.
I just call it money laundering.
And I'll tell you there's no TRM to track and trace those things.
And I think that...
There's no trad trit to be.
What we now are able to do here because every transaction is logged and immutable and traceable
and trackable on a public ledger.
I'm sure you've discussed this before over the years.
We can do this much better in my mind.
So when there is a big transnational crime case and it does touch crypto, are, it's like
organizations like the CIA or the FBI, are they like stoked?
It's like, oh, yes, this one has a crypto footprint.
That means we have extra tools to go get these guys that we otherwise wouldn't had
it been trad crime.
I think they absolutely are with this sort of caveat, right?
We don't live in a world yet.
Who knows if we will?
where all activity occurs on chain.
Every case is a mix of on and on,
on and off chain activity.
And what we are really good at,
a TRM is enabling law enforcement and others
to see every transaction that occurs on chain.
Where we lose visibility is where funds move off chain
through networks of OTC brokers in China
through, you know,
Hawala's, you know, crypto-like Hawalas.
When it's trans, when it's, when you can move it
to cash. And I think one thing I've always really tried to explain is that like these tools are not
a silver bullet. They're one tool in a toolbox that a great investigator has, right? So if funds are
moving through an exchange, what law enforcement does is serves a subpoena on that cryptocurrency
exchange to get that underlying user information. And once they have it, then they reach out to
Google for their Gmail. They reach out to, you know, their cell phone provider. Maybe they're able to
actually figure out their location by triangulating cell tower data, right? They're using all the
tools that law enforcement has used for a really long time. I mean, one example of this,
and it hasn't played out, sadly, but I got asked a lot when there was a Bitcoin ransom
demand in the Nancy Guthrie letter about how essentially this would work, right? The most mainstream
case that we've seen probably in a decade in terms of people really wanting to understand how this
worked. And what I would explain was, like, yes, there's a Bitcoin demand. Yes, if funds move,
we can track and trace them. But law enforcement is going to need to use their entire toolbox,
you know, because so far these funds aren't moving. And there's got to be other means in order
to investigate this case. By the way, I'm just curious. Did the Nancy Guthrie case get resolved?
That was kind of in my feed and it was big news. And then I never followed that through to
resolution. Yeah, I think sadly it hasn't.
at all.
Okay.
And my sense is that folks don't know where she is or what's going on with the case.
Wow.
Chilling.
Can we go back to what you were talking about with respect to on-chain money laundering
and how this process, this flow works?
So North Korea has hacked and stolen $6 billion.
We've seen a few cases in April, the lift case, the kelpdow case, some other details we'll get into.
what do they do after they acquire the cryptocurrency?
So just like one thing that we often see is they will move to the highest security,
most decentralized chain possible, it seems like.
So if they're on something like Tron, they might move to Ethereum and then later,
possibly even to Bitcoin.
So that seems to be something that happens, at least that I,
I've seen. They also seem to use some of the on-chain privacy type tools. So tornado cash is often
cited. So if they have ether on Ethereum, then they'll try to move some of that through tornado
cash. Oftentimes it also seems like they then move some funds to Bitcoin and they use something
called Thorchain in order to move across kind of that bridge. Can you just talk? And then I'm not sure
what happens after that? Is it just like tainted Bitcoin somewhere or is it, you know, cleaned
ether if it's on the other side of tornado cash? Like what happens? And how do they get that
into the kind of the real economy in order to purchase weapons and nuclear capabilities and
that sort of thing? Can you take us through that flow? Absolutely. I mean, Ryan, you nailed it on the
laundering piece for sure. And that's exactly what is going on today. Thinking of it like slightly
broadly here, North Korea is trying to move funds as fast as they can and they have a different
playbook. You mentioned the Thor chain is a service that's being used quite frequently right now.
And I think part of this is with Bitcoin being completely decent. Bitcoin comes with benefits
and issues when it comes to laundering funds, right? It's historically volatile and bad actors
want to move their funds into more stable assets, just like the rest of us to use them. But at the same
time, stable coin issuers like Tether, like Circle, have unique capabilities when it comes to
essentially what I refer to as burning and reissuing their native token, what some people call
freezing or blocking. Essentially, you know, Tether is able to essentially freeze burn, which means
take the token out of your wallet and move it into an inaccessible wallet and then ultimately
reissue to the government or to a victim or something like that. Right. It would be insane for North
Korea to keep those funds in.
That's exactly right. But what's interesting is for years, that's the narrative, right? Like, hey, all bad actors are using USDT.
It's certainly still happening because of, I think, for two main reasons, liquidity and the stability issue, right?
Bad guys want to move their funds, but they need to offer those funds to more usable currencies quickly so they're not getting blocked.
And we're seeing Tether really act at scale more and more now on these types of cases.
So we are seeing, you know, look at the by bit hacks, a great example.
I think that changed a lot for us in terms of how we were watching laundering.
Essentially, North Korea stole 1.5 billion in Ethereum.
And within the first 72 hours, converted almost all of that to Bitcoin.
And then started using the services that North Korea typically uses.
One thing that's really important to note is oftentimes North Korea, the pig-butchering networks that David was talking about earlier, cartels, are actually transferring their funds at one point, at some point,
to professional money launderers.
And that is how they're ultimately off-ramping those funds.
They're using networks of, you know, casinos, of OTC brokers.
They're getting them into the Chinese money laundering networks
that have essentially professionalized money laundering prior to crypto.
And now we're getting more and more involved in crypto.
If you look, and this is to me like, this is the most startling thing.
If you look on chain at cartel activity, North Korea hacks, and these pig-butchering networks,
you see wallet addresses that are being used in all three of those laundering typologies or those threat categories
that we associate with Chinese money laundering networks, these professional organizations run by the triads
and other types of like Chinese organized crime.
So oftentimes like North Korea will steal the money, but ultimately turn it over, essentially sell the funds to one of these networks.
Okay. So in the bi-bit hack, as an example, 1.5 billion ether were stolen. Within 72 hours, most of that was on, in Bitcoin, on the Bitcoin blockchain by route of what Thorchains.
I believe Thorchane was right. It was in that case, yes. And we've seen that playbook play out in Kelp as well in this.
recent in this most recent heist. And they prefer Bitcoin just because of what versus raw ether,
because it's got more connections into the kind of the OTC Chinese crime, money laundering
type world. That's one piece of it. That's one piece of it. The other piece, North Korea over
the years has been used to using some of the services that are on Bitcoin to launder fund some,
some of the more centralized mixing services. Obviously, we saw North Korea use tornado cash for years.
we see that less so today on Ethereum.
So we see them do a lot of different types of,
use a lot of different services.
But then ultimately this ends up off-chain.
So they're not keeping the Bitcoin and Bitcoin.
They are moving this off-chain through, you know, various, nefarious actors, Chinese-crimogains.
That's right.
And sometimes it takes days to get some amount off-chain.
Sometimes it takes weeks.
But we've seen it in cases where it takes months or even years,
where North Korea, right, to me,
the one of the ways we can solve the money laundering problem when it comes to North Korea
is doing everything we can to create a really strong perimeter, right? Because the challenge for
North Korea is always, it's not just North Korea, these big butchering networks and cartels and
others is how do you off ramp the funds? And they're looking to the weakest points to do that.
I think Russia-based exchanges that do no KYC, that don't use tools like TRM to monitor transactions
or don't care.
We've seen Treasury actually sanction a whole host of these services.
Think Chattex and Garantex and Bitslato and so many others.
So we see that.
We see Chinese-based OTC brokers where they're trying to off-ramp those funds.
But to me, the real question becomes,
how do we build that perimeter around crypto to stop these bad actors
from being able to off-ramp those funds?
Can I give you like a cool example?
Yes, yeah.
So after Bybit, just exactly to your question, we saw the laundering, we saw North Korea move faster than ever before.
It was clear to us that they had more access to liquidity than ever before.
I think that's a result of these Chinese criminal networks that are laundering the funds.
And we basically said, how can we move as fast as they are?
Because they were moving faster than compliance teams.
That's the reality.
We were seeing them move at unprecedented speed.
We were seeing them do programmatic money laundering.
So we reached out to Coinbase and Binance, to me the most significant exchanges in the world, and said, how are we going to keep funds on chain? How are we going to stop bad actors from using these platforms? And we formed something called the Beacon Network. And the Beacon Network accounts for about 85% of all centralized crypto today. So think Crackin, OKX, HGX, Polonex, Blockchain.com, Crypto.com, Ripple, host of other services. But then we also added fintechs like Stronin.
Stripe and Robin Hood and PayPal,
Defi protocols,
rhinofi one inch.
And what we're doing is,
and we married that group
with about 70 global law enforcement agencies.
And those law enforcement agencies are flaggers.
So when illicit proceeds are moving in real time,
they're flagging that address.
And an alert, think lighthouse, think beacon,
goes out to those exchanges.
And when they get that beacon alert,
they're required as part of their membership
to block and ultimately work with law enforcement
to seize those funds back.
So, you know, we're definitely laying out a lot of the issues
like the problems today,
but I think that like we could do things differently and better.
And you know, you start to combine that
with some of these other ideas, right?
The offensive cyber, protect the perimeter,
you know, use AI in our own workflows
to stop bad actors.
I think you start to have like a tech-driven response
to some of this.
With this perimeter concept that you bring up,
how does Thorchain fit into that perimeter or break open that perimeter?
What do you think about Thor chain?
Yeah, I think it's a challenge that, I mean, part of what works on this network like this
is that you have buy-in, that no matter what your views are on centralization or your role in
the ecosystem, that when it comes to really bad actors, we need to stop funds from moving
off chain.
we need to stop bad actors from using these services.
I think Thorchane has clearly taken a different view of all of that.
That said, I think there's probably things that we could all work on together there.
You're only going to be as strong as your weakest link.
I think those weak links have always been sort of like, for lack of better,
like the non-compliant pieces of all of this.
But I will say one thing when it comes to that,
there is no one who's been sort of a more,
no community of people that have been more supportive
of Beacon than the Defi community.
You know, Defy Education Fund and others,
you know, I've briefed members of Congress
with those guys talking about how we can do better
when it comes to sort of, you know,
compliance and anti-money laundering
than we can in the traditional world, right?
If you're a, if you're a DFI service
that's a member of Beacon, we have a whole bunch today,
they're not working with law enforcement, right?
Like, that's not the nature of how DFI works.
But what they are able to do is block funds
that are going to hit that plan.
platform and the bad actor might go elsewhere. But then what we want to do is we want to follow
the money and then onboard that next service where the bad actors go. So my hope is that like we
could get as many people on board here as possible to really build the most solid perimeter.
But I think the defy community like, look, I think at the end of the day, it's like you want to
solve problems using the technology, not over-regulating the space. In 2024, emerging markets
generated over $115 billion in annual yield for investors.
with yields ranging between 10 to 40%.
These are some of the highest, most persistent yields on Earth.
The problem, Defi can't access them.
Bricks changes this.
Built on Mega-Eath, Bricks takes emerging market, money markets, and sovereign carry,
and turns them into composable primitives you can access straight from your wallet.
While defy investors earned 3 to 6% on stable coins and T-bills,
institutions have been harvesting 10 to 50% yields backed by sovereign monetary policy.
Bricks connects these worlds with institutional gray tokenization, local banking rails,
compliance across jurisdictions and real-time stable coin settlement.
Bricks does the heavy lifting so Defi can finally access real collateral and structured products
on top of real world yield.
Even the best carry trades can be within reach.
Bricks brings Defi's promise to the emerging world and brings the emerging market yield to your
wallet.
Let the yield flow with Bricks.
When the market pulls back, most people just wait.
They hold cash hoping things stabilize.
But there's another move, and that's where Nexo comes in.
Nexo is a platform built to help keep your digital assets productive.
You can earn daily interest on supported crypto assets through their yield product
or get funds through a crypto-back credit line without having to sell any of your assets.
So if you want optionality, NXO gives you both the size of the equation.
You can put your assets to work or borrow against them when you need flexibility.
Nexo has been around since 2018 and has over $8 billion in assets on the platform.
And it's paid out more than $1.3 billion in interest to clients globally.
So if you're a new U.S. user, there's a welcome incentive waiting for you when you sign up.
Check it out at the link in the show notes.
And as always, this is not investment advice.
This is where I sort of don't have it settled in my own mind.
And I'm just curious kind of what you think here, right?
So I don't think anyone listening wants North Korea or bad guys or, you know, theft to happen on chain.
They want to see the bad guys to get prosecuted.
And yet oftentimes, I mean, you mentioned like things like Ethereum and Bitcoin being a double-edged sword.
you know, something, if you take something like privacy,
that also seems to be a double-edged sword
and cut against some of those things that you mentioned,
which is being able to track and identify the bad guys.
You take something like Thorchain
and your response seemed to indicate,
you know, what you wish was that Thorchain
would actually participate in kind of the beacon group
and help stop some of this nefarious activity, right?
And that implies maybe that Thorchain
has some centralization vectors in their protocol
in which humans can intervene or inject code or kind of do that.
And I'm not actually sure if they do or not.
That's kind of take that as another entire podcast that we could talk about.
I do know that there are some protocols where you absolutely do not have that ability.
You know, one of which is tornado cash, for instance,
which is a privacy protocol on Ethereum.
Right now we have a developer who's in a criminal case in the U.S. about this,
Roman Storm.
We've talked about that often.
Then you also have entire networks, like say,
the Zcash network, which they sort of exist to be an encrypted version of Bitcoin.
And there is this move that, like, I, you know, if you are a crypto user, don't you deserve,
don't you want some level of privacy on top of your transactions?
And by the way, this is a safety mechanism for legitimate use cases too.
It keeps out the corporate surveilers.
It keeps out the possibility of, you know, people hacking you or even wrench attacks in real life.
I mean, there's some real civil liberties at stake here when it comes to, you know, moving,
all of your funds being transparent and available for the whole world to see.
Like, that's not a good steady state either.
And so I'm wondering how you feel about some of these, well, leave Thorchane aside,
but some of these much more decentralized solutions to just encrypting all of the stuff that,
you know, is on chain in a way that you can't see it, you can't track.
I mean, is this just in your mind giving a gift to the bad guy?
Do you see some upside here?
Like what would be your take specifically on something like tornado cash or Zcash?
I love the question.
And honestly, I think it's the most important question that we've been grappling with as an industry
over the last, let's say, three or four years.
It's interesting.
I think the sanctions against tornado cash really got this conversation started in a meaningful way years ago.
Those sanctions have since been lifted, but 2021, somewhere in that timeframe.
name. Look, I mean, post-9-11, we had this conversation right on city streets and in airports,
and I think today we're having it across blockchains. I fundamentally believe that in a open
financial system, people are going to need and demand privacy in order to transact. None of this
works without privacy. I'm not sure I'd say I'm a privacy maxi, but there are very few people who
believe more in being able to transact privately than I do or we do at TRM. A couple months ago,
We put out a 70-page white paper on privacy, which I encourage folks to read. It's awesome. And it really goes into, like, how to leverage the technology. So I'll tell you just really quickly sort of how I think about this. First, at TRM, we don't associate individuals with their alphanumeric address. We would never say, hey, that's Ryan's address. That's David's address. We associate addresses with really two categories. Entities. So lawful entities like Coinbase or tornado cash or uniswap and elicit.
activity, terror financing, sanctions, North Korea. In order to get the underlying user information,
that individual would have to transact with some type of centralized service and law enforcement
would be able to serve a subpoena lawful process in order to get that underlying user information.
So that's sort of one way I think about this. I don't think we should ever be in a world
where we're associating individuals with their alphanumeric crypto addresses. I think it becomes
dangerous when people are associating those addresses with themselves.
on social media and other places.
And I think that's when you talk about ranch attacks,
that's someplace I preach about being very, very careful on.
The other pieces I think we need to leverage the technology, right?
I think the challenge for regulators and policymakers and all of us
is how do we stop bad actors from using services like tornado cash,
but allowing lawful users to use them for the privacy they need
for all the things that you mentioned, right?
Dissidents, you know, corporate surveillance, you know,
humanitarian aid, quite frankly, the U.S. government sending funds to informants in war zones,
right? We need that level of privacy. I think the technology is the solution. And I really lean
into Beacon. Beacon is just about tracking illicit proceeds and blocking them and then allowing for
lawful process to play itself out. And when it comes to DeFi, Beacon's a great example of
how you can maintain privacy, right? That transaction is just blocked.
if it's illicit. Don't let it hit our platform. And then they've got to move to the next place
in order to transact. So I think the technology is a big piece of this. I think the Canton network
chains, like it's just, it's just one example now. I know there's all kinds of interesting
conversations around that. That's probably been a show or it will be another show too. But it's not
just Canton. It's like, hey, should we be building privacy chains that we allow, that we build in
tools like TRM. Should we be doing private transactions on permissionless open blockchains,
but that we allow some visibility into for money laundering purpose? So I say all of this to say
we're thinking a lot about zero knowledge proofs, I think could be such an important part of the
puzzle, just give enough information to let a decision be made about whether an actor is good or bad
without giving up all of your PII. So I think there's a lot, like I really lean in hard
the technology and definitely not over, over, over regulating the space.
I do think there are a lot of technical solutions that can get a lot of people what they
want, right? Zero knowledge proofs. There's a riff on something like tornado cash,
you know, people like Amin Soleimani, I think privacy pool, zero X, bow, I believe is what
it's called. And what they're doing is they use a ZK proof to prove that the funds actually
aren't OFAC sanctioned, right? So they don't identify.
an individual user, but they prove any of the funds that go into this pool.
It's a great example.
And that's a good compromise.
But I still want to push you on this a little bit, which is just like, let's say you no
longer have the ability at all to see any data.
No government agents do nothing.
Let's say it's a version of Ethereum and privacy maxis actually win on that.
And everything on Ethereum has the ability to be completely.
encrypted without any what, you know, privacy maxis would say, government surveillance or backdoors,
all right? You lose this ability completely. It's just like Bitcoin or Ethereum, except everything is
encrypted. In fact, Zcash is kind of this model when they move into sort of shielded transactions.
What do you think about that? Is that a net good? Is that a net bad? It's an interesting world.
You know, I think when we first started TRM or start thinking about TRM,
I think one thing we knew fundamentally was that we have more visibility than we're ever going to have.
You know, we used to talk about like how it was sort of one of these old Western towns
where you could see completely from one end of the town to the other, right, with that.
And I think the vision is that we're going to have more cities.
And I think we're starting to see that play out, although it's still early.
And by cities, I mean where there's actually infrastructure being built in a meaningful way on chain, where you can't see around every corner where it's going to be harder to have that full visibility.
Is that a good thing or a bad thing?
I ultimately am a big believer in the technology and sort of this thing playing itself out.
I can't imagine a world where we've built this incredible technology where every transaction is trackable, traceable, and immutable.
And we can't add enough privacy for individual users to feel like they're not pretty.
their credit card statement on chain, and yet at the same time ensuring that governments can
stop North Korea, can stop terror financing. I'll say this. I mean, I think that this has been
such a cool conversation, by the way, and just thinking about the ground we've covered, we started
talking about North Korea and attacking the defy ecosystem. I don't know that any of this works.
I don't know that any user is going to put their funds on a service, you know, staking, investing,
the mortgage on chain,
if we believe that North Korea
can attack this ecosystem at scale
and steal billions of dollars.
Agreed.
So I think that it's got to be a compromise
and the compromise might,
it's not about privacy or security.
I fundamentally believe you could have both.
But the compromise is like we need to be ensuring
that we're using the tools to keep North Korea
off these platforms, both.
And it's not just North Korea.
It's any criminal element.
But North Korea is, I think,
is the biggest threat right now
when it comes to defy.
But so my view is just like from a pure market perspective,
people aren't going to engage with an ecosystem
where they can lose all their money, you know, at the click of a button.
And I think we're going to have to figure out how to sort of balance that.
But I don't, but to be really clear,
I don't think it's a security versus privacy balance.
To me, you could have absolutely both of those things.
You know, we've never had a financial system that is anonymous.
And I don't believe we should.
But we should have a financial system that's sued anonymous.
And I think that's why crypto works so well.
in order to sort of like balance that privacy and security piece.
One last question on this, which is respect to, with maybe a question with respect to, you know,
who's responsible for this or where does the liability lie?
It's been really interesting to observe the tornado cash Roman storm case.
And it seems like the prosecutors, DOJ, Southern District of New York, are making the case that
he actually, you know, was involved with this and partially responsible for money laundering due to North Korea's
actions because he partook in developing this protocol. Then you had last week the acting attorney
general go to Bitcoin a Bitcoin conference and say, Code is not a crime. Non-custodial software developers
shouldn't have to sleep with one eye open. And there's a question of like if North Korea
uses a protocol like Tornado Cash or if they use DFI or if they use DFI or if they use Ethereum,
or if they use Bitcoin. Are the developers who made these tools responsible in any way?
when bad guys use their tools.
Have you thought about this?
I'm not sure.
Does your privacy 70-page paper cover this?
And what do you think the government actually thinks about this?
Because on the one hand, they're saying things like Code is not a crime.
But on the other hand, they're also prosecuting Roman Storm.
And so I think the community is somewhat confused as to what the U.S.
government's perspective on this is.
I think there's a range clearly.
There's really clearly a range.
And I've been actually surprised with Attorney General Blanche's statements.
And not just this one.
When he was Deputy Attorney General, he made a similar statement several, maybe a couple
years ago now.
And I thought that would have a huge impact on the prosecution.
It clearly has not.
And I think they're going to have to sort of work out where they're really, if they're
really landing on, is this a policy position?
And to what extent are U.S. Attorney's Office is going to sort of need to heed it?
My own personal view, I'm pretty aligned with the,
Attorney General with this caveat.
And that is, we need to make sure the developers aren't conspiring with bad actors in order
to launder funds.
Okay.
So if you're building a decentralized service non-custodial for people to use for lawful
reasons, then no, you should not be prosecuted if bad actors are using your platform.
Okay.
which was a Bitcoin mixer that was being advertised by a guy named Larry Harmon on Alpha Bay,
saying, hey, this is the perfect place to launder all these drug proceeds that you have on this darknet market.
No.
Like, no, that is over that.
Like Kim Jong-un can't be your target either.
Yeah, yeah, yeah, yeah, that's exactly right.
You know, people may disagree with this, but Bitcoin fog, similar circumstances.
Okay.
That service was actually conspiring on dark net markets with bad actors.
in order to launder funds.
Tornado cash is different.
And that's what's always been
why this has been the most interesting question
in my mind,
maybe for you guys too,
in my entire time in this space.
Because I think there's a challenge.
How do regulators stop North Korea
from using a service to launder billions of dollars
and yet at the same time
allow lawful users the opportunity to do it?
I don't think we go after builders
who are literally just building tech
or just building or just writing code.
But at the same time, you know,
I think a strong prosecution in this case,
there could potentially be emails saying,
hey, we don't care, we're going to keep doing this.
We see the funds going through.
We want our service to be a place that is known for this.
I haven't seen any of that type of evidence come out,
but to me that's the type of evidence you would need
to really prosecute a case like this in a meaningful way.
Intent, criminal intent.
I mean, that's, you know, that's what our system
demands. So if you have criminal intent, I don't care what you're developing, you should be
potentially prosecuted for money laundering conspiracy. That's different than some of these other
money transmitter laws that I think also have folks concerned. But as just a pure, from a pure
criminal standpoint, I'm most concerned with the money laundering conspiracy piece.
We'd be remiss to not talk about some of the biggest current events that are happening at the
time of the recording, which is have we done?
What?
Even more recent.
There's a lot going on, guys.
There's a lot going on.
I'm sure, I'm sure, you've probably been the most busy that you've ever been with just North Korea, the Lazarus group, always being persistently active.
But with Operation Economic Fury out of the White House, I think there's probably also something to talk about with Iran's use of just crypto in illicit ways.
Just two weeks ago, $344 million of USET on Toronto's frozen.
We mentioned that.
I think we're all kind of confused about why they were using.
Heather on Tron, but maybe that's a different question for a different day.
One of the big things that happened here was OFAC directly named the Iranian Central Bank,
a central bank controlled wallet on the SDN list.
And so just in the same way that like, you know, North Korea's Lazarus group,
these aren't like, you know, proxies.
This is North Korea itself.
We actually like sanctioned an Iranian Central Bank crypto wallet.
So unprecedented.
Can you talk about what it was just like to be in your show?
during a lot of this activity.
I think you guys were on just the front lines here.
You guys have a lot of the data.
What's Operation Economic Fury like from TRM's perspective?
Yeah, absolutely.
You know, it's interesting.
It goes to sort of what Ryan and I were just talking about to some extent
in that this is an only in crypto story.
Right?
You're not seizing 344 billion, 344 million of fiat from Iran.
You may sanction the central bank, which has been sanctioned for years.
Their entire financial sector is sanctioned.
But actually enforcing those.
sanctions and getting back funds, that's an only in crypto type story. And, you know, it's interesting.
You mentioned like that we're particularly busy. You know, over the last bunch of years, you know,
every geopolitical issue, every major geopolitical issue in the world, everyone's want to know,
what is the crypto nexus? So Russia invades Ukraine. It's how is Russia going to use crypto to
evade sanctions. Hamas attacked Israel on October 7th. It was how is Hamas funding its operations
using crypto.
And this is the most recent example.
But I think there's a fair amount to say,
and that is a couple of years ago,
you would see IRGC sort of one-off transactions.
Right, hey, we have some funds.
We want to send them.
We want to try to off-ramp them.
Israel actually seized about 100 addresses
associated with IRGC a year or so ago.
We've seen a shift,
and we wrote a piece on two UK registered exchanges,
ZX and ZX Ion.
which actually ultimately were sanctioned
after we wrote our report
by the U.S. Treasury Department.
And essentially, to me,
that actually showed a bit of a playbook.
And that is, instead of just one-off transactions,
Iran was using crypto infrastructure at scale.
They basically were using these two exchanges
to launder a billion dollars through them.
So it wasn't just like, hey, we're going to send money.
It's we're going to actually essentially use these
as shell companies.
At one point, you know, I want to say almost 80% of all transactions through these exchanges
were IRGC related.
So I think we see that.
And then the central bank of Iran is sort of just the latest example where we see essentially
Iran's central bank, you know, spinning up crypto addresses and trying to move funds
that way in order to circumvent the U.S. financial system.
There's a couple other examples like this recently where we're seeing with this with Iran.
this reporting, which I struggle with a little bit around the Strait of Hermuz,
is Iran going to collect tolls in crypto?
I haven't seen any really significant evidence of that,
and we've been looking everywhere we possibly can on chain.
But the fact that Iran is trying to experiment with that
just shows that they're trying to do anything they possibly can.
There was a report, there was a report today in the Wall Street Journal
about the financial facilitator,
a guy named Larjani,
that we actually name in our ZDex report,
who actually was released from a death sentence,
I think, in prison 10 years ago
or something in Iran,
because he's so good at money laundering.
And he has essentially discovered crypto.
So he was the one behind ZDex,
possibly behind these central bank transactions,
and he's the go-to money laundering,
launderer for IRGC.
So I say all that to say that I think,
like, you know,
We started with North Korea.
We could go just as deep on Russia, to be honest.
And now with Iran, we're seeing nation-state actors really think through how to build
crypto infrastructure, not just like, hey, we're going to send some funds to this wallet
address that we spun up.
The tension that I feel might be there is that crypto offers the good guys, you guys,
the State Department, the FBI, a lot of capabilities and information and power to get some
funds back. You know, as you've been underscoring this entire podcast, like only in crypto do we actually
recover funds so directly from any of these state actors that stole it from, from, you know, innocent people.
And I remember one of the reasons why the whole CZ Binanced versus Department of Justice story was such a big
story was because CZ was looking a blind eye, I think, towards IRC and Iranian money laundering through
Binance. Well, now, now Binance has been brought to heal. You know, now finance is kind of like inside the
fold of the people who are providing data to the good guys to the government.
And so crypto seems to be, like, as you've been saying, establishing a pretty strong
perimeter around these state actors, but nonetheless, the state actors continue to use them.
And so clearly, crypto is benefiting the state actors in some particular way, despite how
strong our capabilities are, the good guy side of things, square this for me.
Like, if crypto is being such a good tool for information for, you know, the FBI and OFAC and all this, how come, you know, Iran and North Korea and China and Russia and all them, how come they're still using them? It seems like it's not actually good territory for them to do their operations in.
Yeah, look, I think it's interesting, right?
You know, the promise of cryptocurrency
is cross-border value transfer
at the speed of the internet.
And the reality is that, like,
for all the reasons it's such a transformative technology
for remittances, for humanitarian aid,
for payments at scale,
bad actors also want to use it
to move funds faster
and larger amounts than ever before.
The difference is that we now can track
and trace those funds.
So the reality is that it's always going to be
this cat and mouse game.
that has always existed between law enforcement, right?
Bad guys can now move funds faster and in larger amounts than ever before,
and law enforcement now is going to need to track them.
I mean, I think bad guys have always been early adopters of transformative technology.
And I think we're in that moment right now with crypto and maybe even more recently AI.
One of my favorite stories is that in 1908, the Model T rolled off the assembly line.
And in that same year, we created the Bureau of Investigation, which is the modern FBI.
Because policing had always been a local issue, right?
But all of a sudden, bad actors can move cross border, cross state lines at unprecedented speed and scale.
Think Al Capone and machine gun Kelly and Bonnie and Clyde.
And we need to create a national police force in order to run them down.
I think we're seeing that now, right?
It's just a new technology that bad guys can now move funds faster than ever before.
and it's a bit of this cat and mouse game,
this whack-a-mow that prosecutors talk about.
But at the same time, I think that bad guys
are going to improve their technology,
and so are the good guys.
One thing I just want to clarify is, you know,
David's framing in terms of bad guys and good guys,
you know, it may not always be the case
that your government is the good guy.
And this is the entire reason we have the Bill of Rights
and the Constitution and civil liberties
and things like,
decentralized technology like Ethereum and Bitcoin is because when the government actually becomes
the bad guys, you need freedom tools to resist their badness. And so far, we've talked in
terms of good guys and bad guys. I just want to make it clear that the entire purpose of this
technology and this movement is to have the freedom to escape centralized authorities when, as they
become bad guys and as they move across that spectrum.
One question I wanted to ask you about the Iran case and the IRGC specifically is why in the
world they were using Tether and Tron because it seemed incredibly obvious in 2026 that they're
just asking to get their assets frozen.
And if their next maneuver is just going to be to do the thing that North Korea does,
which is move their assets to something like Bitcoin.
and then if they move their assets to Bitcoin and they accept the volatility, I mean, less volatile
than their local currency, we might point out much less volatile. What do nation states do as a
reaction to that? So the U.S. government is the most powerful nation state in the world.
I was very interested in this exchange between a Texas Republican who asked the Secretary of
War Pete Hegeseth about Bitcoin framing it as kind of a matter of.
national security, does he think so? And Heges said, yes, I do think so. And then he added
this. A lot of things we are doing, enabling it or defeating it, he's referring to Bitcoin,
are classified efforts that are ongoing inside our department. This is kind of interesting to me,
the idea of defeating something like Bitcoin. And it just struck me last week that this could
be the moment that cryptocurrency networks like a Bitcoin or an Ethereum are tested.
in ways that they haven't been tested.
I mean, part of the purported value of this technology
is that they have sovereignty and decentralization
and nation-state grade-level security.
And I kind of wonder if they will actually pass this test or not
and what Hegseth might mean
when he's talking about defeating something like Bitcoin.
So say the IRGC keeps their next $350 million in assets
in Bitcoin on the Bitcoin net,
network instead, does the Department of War have a way to defeat that, to access that? Is that maybe what we
were talking about earlier in our conversation? Like, what do you think about this? Yeah, that's interesting.
I quite frankly don't know what he would have been talking about necessarily with that statement
in terms of the defeating piece. You know, when someone says something like that to me, and like,
I am not an expert on quantum and I do not play one on TV. So like that might be a really cool conversation
for the show at some point,
but I would say that's where my head goes immediately
to that type of technology
as opposed to the way I think about it
and I think about how do we harness the technology,
how do we use open permissionless blockchains
in order to do, you know, to go after bad actors?
How do we create that perimeter
to keep the funds from going off chain
for the use of weapons proliferation?
How do we go after Chinese money laundering networks, right?
So that's an interesting one to me, that's an interesting one to me in terms of beating the technology.
And I am not sure where I, I'm not sure the origins of that.
So you're not aware of any kind of classified super secret way that the U.S.
government has to defeat Bitcoin in some way.
I don't think I'm, these days I am not privy to any of that type of information.
If you told you, he'd have to kill you.
If I told you, I would have still been in the government.
I think that I'm long done with that life.
But I would say that, like, to me, it's always just like, hey, how do we harness the technology?
And quite frankly, it's more and more AI too.
You know, I think AI plays a huge role in the way we can supercharge a lot of these operations.
But in terms of, like, defeating the tech itself, it's like, no, we need to defeat the adversary.
And that's what I just like, I always come back to that, right?
Like, what are we doing to go after the central bank of Iran?
Right.
I mean, literally, I mentioned North Korea hacked the bank of Bangladesh years ago.
But like, let's hack the central bank of Iran.
Let's take the money.
Right.
So I think that that's really how I'm thinking about it always is going after the bad actors.
And I was actually, I was a little discouraged, even on Twitter, which I should not spend as much time on our ex.
You know, there was a lot of, the conversation was entirely around what drift should have or could have done or kelp could or should have done.
And there's plenty, right?
And I think bringing in cyber from day one is absolutely critical.
but my focus was immediately on,
let's go after North Korea.
Let's go after Iran.
Let's go after Russian cyber criminals.
That would be so cool.
I got to tell you.
That would be so cool.
So if it happens, you know,
or you keep hearing about cyber letters of mark.
Chris Perkins is awesome on this.
Chris Jan Carlo's written on this.
This is not me being a crazy person talking about pirates.
Like, I think there's some real, I know Tevano.
There's a whole handful of other folks that are very supportive of this idea.
And yeah, I'm excited about the prospect of it.
Okay.
So as we wrap this up and bring this to a close, so as I mentioned in the outset, April was DFI's worst month ever, maybe over 600 million in hacks. I don't know about total volume size, but just in the number, there was one hack every 27 hours. Okay. So basically a daily occurrence. And one has to think AI is just speeding up and accelerating the efforts of these incredibly talented North Korean hackers, it seems like. I mean, they are winning right now. So what does DFI do?
Just maybe summarize this.
If you're addressing everybody in the crypto space, who cares about it, we just had a Defi United
campaign.
And it was fantastic.
It was a coming together of all of decentralized finance.
And they were trying to make the Kelp Dow asset whole, R.S.Eath.
And they did that.
They raised, you know, 300 million in commitments.
That was fantastic.
And I just couldn't help but think, like, as great as this is and as fantastic as this is.
If this happens every month, like, we're not going to last.
Okay, like this can't happen again.
Can't happen many more times.
And so in addition to Defi United being about kind of getting R.S.E.
Claimant's whole, we also have to have a Defi United for securing our space.
What recommendations do you have?
Like, how does this get better?
And if there is a happy case here, what do you think it looks like?
Yeah, I know.
It's a great question.
I'm not familiar with Defi United, but I love this concept because I think
that's where we have to go.
And it should be more than kind of paying back lost funds.
You know, I'm not naive enough to think we're going to have standards anytime soon
for sort of defy protocols or developers.
But I do believe that we could come together as a community and agree to best practices.
You know, years ago after Colonial Pipeline, the White House actually brought together
community of businesses, the largest businesses in the world,
and started talking about here, 10 bullets
for what good cyber hygiene,
cyber controls can look like.
I think we need to do that for Defi today,
whether that's through this group
or whether it's through something else.
So it's best practices,
but agree and align to them.
I hope part of that is being involved
in an information sharing, interdiction,
disruption-tight network like Beacon.
So on the defensive side,
I think it's a combo of like building out Beacon
plus really, really getting granular on what DFI protocols can build from the ground up,
from a cyber defense perspective.
I know crypto in some ways has presented challenges towards the State Department and investigators
just because of the way that it is.
But as we've underscored throughout this entire podcast,
it also gives them some tools and some assets into information that they didn't,
that they don't have in the Trad financial world.
Do you think these, the state, you know, FBI, CIA, OFAC, Treasury,
do you think they are actually kind of pro moving on chain in the sense that like,
you know, let's get all the people on chain because it's actually a better substrate
for us to do our job if more of global finance moves on chain.
Do you think they think that?
I do.
I also think there's a certain inevitability around it, right?
Like what's interesting to me, and I think that this is a very, this.
moment state, every major law enforcement agency, many in the world, but certainly every U.S.
federal law enforcement agency think FBI, IRSCI, DEA, Secret Service, Homeland Security Investigations,
they all have a cadre of investigators who are sort of power users of TRM who have all the tools
and the training and the true experts. I think there's, I believe, I think you guys do too,
that there's inevitability about this space, right? Just in the last year with institutional adoption
and so much happening. And we see more activity moving on chain.
That means, like, it can't just be a cadre anymore.
It has to be, like, every investigator has to have the capabilities because every crime is a financial crime.
And that means every crime is going to involve crypto in one way or another.
So my view is that, like, yes, but they don't have the resourcing necessarily today that they need,
if that's the direction we're headed in.
As much as I don't like North Korea, and I appreciate the work that you guys are doing to catch the bad guys,
I got to say, I don't know how encouraged I feel that the CIA and FBI wants us all to
Come on, Shane.
Okay.
So I will voice that at the end of this podcast that trust definitely needs to be earned there.
But, Ari, thank you so much for joining us today and telling us all about what is going on in crypto
and for your work to catch the bad guys.
We appreciate it.
Hey, love joining you.
Thank you for the conversation.
Got to let you know, bankless nation.
Of course, none of this has been financial advice.
Crypto is risky.
You could lose what you put in, but we are headed west.
This is the frontier.
It's not for everyone, but we're glad you're with us on the bankless journey.
Thanks a lot.
