TRANSCRIPTEnglish

‘BOSËT E KRIPTOVE’ - Ekskluzive, qarku i parave të pista Dubai-Holandë-Shqipëri - Inside Story

40m 51s6,344 words644 segmentsEnglish

FULL TRANSCRIPT

0:19

<b>18 people were arrested </b> <b>by the police,</b>

0:22

<b>and two others </b> <b>have been declared wanted, </b>

0:25

<b>as they are accused </b> <b>of the unlawful exchange of money </b>

0:29

<b>into cryptocurrencies </b> <b>and vice versa. </b>

0:33

<b>SPAK has carried out one of the most</b> <b>special investigations so far, </b>

0:38

<b>seizing assets worth </b> <b>10 million dollars in cryptocurrencies, </b>

0:43

<b>but also a lot of cash. </b>

0:59

<b>Cryptocurrencies are finding more use</b> <b>by criminal organizations.</b>

1:12

<b>Once, organized crime </b> <b>laundered money using direct methods: </b>

1:17

<b>suitcases full of euros </b> <b>crossing borders, </b>

1:20

<b>luxury apartments </b> <b>where millions were stored, </b>

1:22

<b>numerous construction projects </b> <b>to make the money appear legitimate.</b>

1:26

<b>A living, physical economy, </b> <b>where every step leaves traces, </b>

1:29

<b>but also carries its own risks. </b>

1:32

<b>Today, everything has changed.</b> <b>The old methods have become too slow </b>

1:37

<b>for a world where technology </b> <b>leads everything. </b>

1:40

<b>Money no longer passes through customs,</b> <b>nor is it seized on the streets. </b>

1:44

<b>All it takes is a laptop, </b> <b>an internet connection, and a click. </b>

1:48

<b>Money disappears into virtual networks,</b> <b>crosses borders without leaving traces,</b>

1:51

<b>and is transformed </b> <b>into cryptocurrencies.</b>

1:54

<b>Criminal groups </b> <b>have developed themselves, </b>

1:57

<b>they have moved through </b> <b>different methods of money laundering, </b>

2:01

<b>from traditional methods </b> <b>to new methods. </b>

2:03

<b>And state organizations must be</b> <b>on the same wave of development,</b>

2:08

<b>in order to be able to see</b> <b> which are the new windows </b>

2:14

<b>that crime follows </b> <b>to hide dirty money.</b>

2:19

<b>Referring to the fact that the laundering</b> <b>of the proceeds of criminal offenses</b>

2:23

<b>by criminal groups </b> <b>certainly always brings innovation, </b>

2:26

<b>it will inevitably also be oriented</b> <b>toward innovations in technology. </b>

2:30

<b>Referring to the way digital money</b> <b>has developed in recent years, </b>

2:36

<b>this is a challenge in itself</b> <b>for law enforcement bodies,</b>

2:40

<b>which must take control of the laundering</b> <b>of the proceeds of criminal offenses.</b>

2:45

<b>A "wallet" in Tirana can control</b> <b>millions of euros that appear clean,</b>

2:49

<b>but their origin remains criminal.</b>

2:52

<b>This is the evolution </b> <b>of money laundering: </b>

2:55

<b>from streets and buildings </b> <b>to digital laboratories </b>

2:58

<b>where crime intertwines technology, </b> <b>financial fraud, and luxury.</b>

3:02

<b>Tracing cryptocurrencies </b> <b>is extremely difficult, </b>

3:05

<b>but thanks to the close cooperation</b> <b>we have with Europol, Eurojust,</b>

3:09

<b>with countries such as the Netherlands, </b> <b>Belgium, Spain, Germany, France, </b>

3:14

<b>we have created a joint team, </b> <b>not investigative, </b>

3:19

<b>but one that works as a group, </b> <b>and we exchange information with them</b>

3:23

<b>on the new developments </b> <b>produced by the crypto world.</b>

3:27

<b>A system where every click </b> <b>can hide a dark story, </b>

3:31

<b>and where traces are not left in safes,</b> <b>but on the blockchain. </b>

3:35

<b>A digital world that</b> <b>few people understand, </b>

3:37

<b>but which has become</b> <b>the perfect refuge for organized crime.</b>

3:41

<b>The lack of training,</b>

3:44

<b>the lack of sufficient human resources staff</b> <b>to trace these types of transactions,</b>

3:51

<b>certainly creates difficulties</b> <b>for state bodies</b>

3:54

<b>in identifying who the author</b> <b>behind a transaction has been.</b>

3:58

<b>Carrying out criminal activity </b> <b>through cryptocurrencies </b>

4:01

<b>forces investigative bodies </b> <b>to move at the pace of technology, </b>

4:06

<b>which implies </b> <b>that the investigation </b>

4:10

<b>of these methods of laundering </b> <b>the proceeds of criminal offenses</b>

4:14

<b>must begin with the accurate </b> <b>identification of the data </b>

4:17

<b>that a cryptocurrency contains.</b>

4:20

<b>While institutions try to follow these</b> <b>virtual flows, crime is one step ahead: </b>

4:25

<b>it has created an invisible economy, </b> <b>where dirty money turns into power, </b>

4:30

<b>business, and luxury, appearing clean,</b> <b>but carrying its dark history.</b>

4:36

<b>Albania, a country where crime has learned</b> <b>to move faster than the law. </b>

4:41

<b>In fact, today Albania </b> <b>is incapable of managing </b>

4:44

<b>millions of euros seized </b> <b>in the form of virtual money.</b>

4:48

<b>We have encountered a major problem</b> <b>when it comes not to the seizure, </b>

4:55

<b>but to the storage </b> <b>of cryptocurrencies.</b>

4:59

<b>Today, dirty money </b> <b>travels beyond borders,</b>

5:02

<b>without stopping at customs,</b> <b>without questions, without a name.</b>

5:05

<b>It is transformed into bitcoin,</b> <b>distributed into dozens of virtual "wallets,"</b>

5:09

<b>and then returns </b> <b>as clean money, </b>

5:11

<b>ready to be invested in businesses,</b> <b>property, luxury, and power. </b>

5:16

<b>This is the most modern </b> <b>form of money laundering.</b>

5:19

<b>There are companies</b> <b>such as Chainalysis and Arkand </b>

5:22

<b>that carry out the tracing </b> <b>of these portfolios; </b>

5:25

<b>so far they have had very good results</b> <b>in tracing wallets that are involved</b>

5:32

<b>in money laundering </b> <b>or illegal activities, </b>

5:35

<b>managing to identify the way </b> <b>these funds have moved, </b>

5:40

<b>the way they have been transferred</b> <b>to other wallets </b>

5:45

<b>in order to make</b> <b>their tracing more difficult.</b>

5:48

<b>A banking transaction </b> <b>is many times safer </b>

5:51

<b>and more controllable than a wallet</b> <b>transaction carried out by individuals,</b>

5:57

<b>because</b> <b>in a banking transaction </b>

6:00

<b>the person is identified through the bank</b> <b>that acts as an intermediary </b>

6:04

<b>and the other receiving person </b> <b>to whom the money is transferred. </b>

6:10

<b>Whereas in a bitcoin transaction, </b> <b>it is impossible to identify them, </b>

6:16

<b>since they are identified through</b> <b>a numerical, alphanumeric code</b>

6:23

<b>and there is no data regarding the sender</b> <b>and the receiver of this exchange.</b>

6:31

<b>A system built on the illusion</b> <b>of financial freedom, </b>

6:35

<b>which in fact today is seen </b> <b>as the safest refuge for organized crime.</b>

6:39

<b>And behind this system, there are not only</b> <b>people from the dark world of crime. </b>

6:43

<b>Behind this scheme, not only blood money</b> <b>and trafficking proceeds are laundered, </b>

6:47

<b>but also money obtained </b> <b>from call center scams.</b>

6:52

<b>Behind this scheme stand people</b> <b>who have never seen the stock exchange, </b>

6:56

<b>but know how to manipulate the most</b> <b>advanced financial technology systems.</b>

7:00

<b>The new methods have the "misfortune"</b> <b>of not having a long history</b>

7:08

<b>and, undoubtedly, the aspect of lack </b> <b>of knowledge and training, </b>

7:13

<b>of being on the front line,</b> <b>is missing.</b>

7:17

<b>But as long</b> <b>as we are discussing it,</b>

7:20

<b>this means that attention</b> <b>must also be directed to this sector; </b>

7:24

<b>undoubtedly the main element </b> <b>is international cooperation. </b>

7:28

<b>Other states </b> <b>have more history than Albania.</b>

7:31

<b>This is something </b> <b>that makes many promises, </b>

7:34

<b>promises that are not real;</b> <b>so just from the way they are presented, </b>

7:39

<b>the way they make contact, </b> <b>the way they present themselves </b>

7:43

<b>to obtain a service</b> <b>or to sell a product</b>

7:48

<b>these are methods that are not used</b> <b>by large official websites</b>

7:52

<b>that are legal, registered,</b> <b>and licensed.</b>

7:56

<b>They hide behind offices with</b> <b>darkened glass in the center of Tirana,</b>

8:00

<b>where someone every day </b> <b>puts on a headset and, </b>

8:02

<b>in a calm voice, </b> <b>tells an investor somewhere in Italy:</b>

8:05

<b>"Yes, sir. </b> <b>You have made the right choice. </b>

8:08

<b>You will earn a lot…"</b> <b>That is where everything begins: </b>

8:11

<b>a global scam that turns people's savings</b> <b>into cryptocurrencies, </b>

8:14

<b>and then into the assets </b> <b>of a criminal network </b>

8:17

<b>that knows only </b> <b>how to erase traces.</b>

8:20

<b>It is a sector that has major difficulties;</b> <b>it is new as a sector. </b>

8:27

<b>And certainly its development </b> <b>must be parallel </b>

8:32

<b>also from the aspect </b> <b>of human resources </b>

8:36

<b>within the state administration </b> <b>and state institutions. </b>

8:40

<b>In this documentary, we will follow</b> <b>the traces that cannot be seen. </b>

8:43

<b>We will uncover</b> <b>the silent network of laundering </b>

8:46

<b>through Bitcoin, Tether, virtual wallets,</b> <b>and unidentified exchanges.</b>

8:51

<b>We will reveal, for the first time,</b> <b>how the mafia operates in the digital age.</b>

8:55

<b>Because now, </b> <b>crime no longer has a face. </b>

8:58

<b>It has only a code.</b>

9:00

<b>Certainly, cryptocurrencies </b> <b>and digital wallets, </b>

9:04

<b>through the ways in which </b> <b>they circulate virtual money, </b>

9:10

<b>create difficulties </b> <b>for law enforcement bodies </b>

9:13

<b>to identify as accurately </b> <b>as possible, </b>

9:15

<b>because it is a process </b> <b>that passes through three phases: </b>

9:18

<b>cryptocurrency, wallet, </b> <b>author, or wallet owner. </b>

9:22

<b>A bitcoin transaction </b> <b>makes it difficult to reach and prove</b>

9:28

<b>the holder of that wallet</b> <b>suspected of having been used </b>

9:33

<b>for laundering the proceeds </b> <b>of a criminal offense.</b>

9:36

<b>Only in cases when the subject's phone</b> <b>is seized and the data are found, </b>

9:43

<b>the access key, meaning the passport,</b> <b>or let us say the certificate of ownership</b>

9:48

<b>of the cryptocurrencies </b> <b>found at that address. </b>

9:52

<b>Despite these issues,</b>

9:55

<b>the Special Prosecution</b> <b>has undertaken concrete actions</b>

9:58

<b>by seizing around 11 million euros </b> <b>in assets in cryptocurrencies, </b>

10:02

<b>suspected of originating </b> <b>from criminal activity.</b>

10:05

<b>From the preliminary data available, </b> <b>it appears that in SPAK's hands </b>

10:08

<b>are concentrated pieces of evidence</b> <b>related to at least three separate cases </b>

10:12

<b>of money laundering </b> <b>with cryptocurrencies, </b>

10:15

<b>investigations that extend beyond borders</b> <b>and affect transnational networks.</b>

10:20

<b>We are in the process of freezing, </b> <b>with the aim of seizure, </b>

10:23

<b>an amount greater </b> <b>than 11 million euros. </b>

10:26

<b>They are frozen</b> <b>and we are seeking their seizure, </b>

10:29

<b>but again we face </b> <b>the same problem, </b>

10:31

<b>and this is a moment in which</b> <b>I want to make this concern public </b>

10:36

<b>in order to see </b> <b>the possibility of legal changes.</b>

10:39

<b>Inside Story has learned </b> <b>that the investigations </b>

10:42

<b>for one of these cases </b> <b>have extended as far as distant Syria, </b>

10:45

<b>a country gripped </b> <b>by civil war for over a decade.</b>

10:49

<b>According to the information obtained,</b> <b>SPAK has requested information </b>

10:53

<b>on an account belonging to a Syrian citizen,</b> <b>regarding several suspicious </b>

10:57

<b>transactions attributed to accounts </b> <b>involved in the investigation. </b>

11:04

<b>SPAK has seized</b> <b>a full 10 million euros </b>

11:06

<b>that belonged to the leaders </b> <b>of the Çopja group. </b>

11:09

<b>This large amount </b> <b>is suspected to be the product</b>

11:11

<b>of criminal activity </b> <b>by one of the most sophisticated</b>

11:14

<b>drug trafficking and money laundering</b> <b>networks in the country. </b>

11:18

<b>A group involved in the fierce war</b> <b>between the gangs of Elbasan.</b>

11:22

<b>We have a dominant majority</b> <b>of money laundering </b>

11:27

<b>carried out through </b> <b>traditional methods, </b>

11:29

<b>while there is a new trend, </b> <b>not very large in percentage </b>

11:34

<b>but nevertheless one that requires</b> <b>increased attention in this sector </b>

11:37

<b>where money laundering </b> <b>can potentially be carried out. </b>

11:40

<b>Look, crime is changing, </b> <b>and as long as crime is changing, </b>

11:44

<b>the state or state bodies </b> <b>must also be on the same line with it.</b>

11:48

<b>The identification of the cryptocurrency,</b> <b>the identification of the digital wallet, </b>

11:54

<b>and then bringing these actions </b> <b>before the court </b>

11:58

<b>is explained as a challenge in itself,</b> <b>because the Code of Criminal Procedure </b>

12:02

<b>is not specific</b> <b>in these directions.</b>

12:04

<b>Therefore, there remains,</b> <b>so to speak, a legal gap</b>

12:08

<b>which offenders can often exploit </b> <b>in committing criminal offenses.</b>

12:15

<b>The crypto case linked </b> <b>to the "Çopja" family </b>

12:17

<b>is built on encrypted communications</b> <b>on the SkyECC and EncroChat applications. </b>

12:22

<b>It reveals how </b> <b>organized criminal structures </b>

12:26

<b>have moved from cash </b> <b>to digital code. </b>

12:29

<b>They have used modern systems </b> <b>to erase the origin of funds </b>

12:33

<b>and return them to the market </b> <b>as legitimate investments.</b>

12:36

<b>At this point begins the analysis</b>

12:38

<b>of one of the most complex </b> <b>investigations of recent years. </b>

12:41

<b>Here there is</b> <b>a very major problem,</b>

12:44

<b>because interventions will need to be made</b> <b>in the Code of Criminal Procedure, </b>

12:50

<b>since the authority that currently</b> <b>exists for seized assets</b>

12:56

<b>the Agency for the Supervision </b> <b>of Seized and Confiscated Assets</b>

13:02

<b>does not have legal provisions</b> <b>regarding the method </b>

13:06

<b>of taking over and administering</b> <b>these digital assets </b>

13:10

<b>that are blocked</b> <b>by the prosecution authorities. </b>

13:14

<b>The question arises: </b> <b>who manages these assets? </b>

13:17

<b>Which law regulates them?</b>

13:19

<b>To thoroughly examine how </b> <b>the prosecuting authority acted, </b>

13:23

<b>from the moment it obtained </b> <b>the digital wallet </b>

13:26

<b>and transferred the money</b> <b>from the criminals' digital wallet, </b>

13:30

<b>so to speak, to the digital wallet</b> <b>of the Special Prosecution, </b>

13:33

<b>there remain legal gaps </b> <b>that make this element unclear.</b>

13:38

<b>Inside Story has, </b> <b>for the first time, </b>

13:41

<b>obtained materials from </b> <b>the Çopja crypto case file </b>

13:43

<b>that reveal the new levels </b> <b>of operation of Albanian gangs.</b>

13:46

<b>Everything began after information </b> <b>from the Spanish authorities. </b>

13:51

<b>A handful of five-euro banknotes</b>

13:53

<b>ignited an investigation extending</b> <b>across Europe to Albania, </b>

13:57

<b>uncovering an entire </b> <b>laundering network.</b>

14:00

<b>According to official </b> <b>Europol data, in 2021, </b>

14:03

<b>during a house search linked</b> <b>to a cocaine trafficking investigation, </b>

14:07

<b>cash was seized, including several five-euro </b> <b>banknotes with handwritten notes. </b>

14:12

<b>They provided information </b> <b>about the individuals</b>

14:15

<b>who coordinated and facilitated </b> <b>the financial aspect of the trafficking.</b>

14:18

<b>The Spanish Guardia Civil </b>

14:21

<b>realized that what it had in hand</b> <b>was a "handwritten invoice"</b>

14:24

<b>of a global network </b> <b>that moved millions of euros </b>

14:26

<b>from drug trafficking through </b> <b>a parallel financial system, </b>

14:29

<b>invisible to banks but readable </b> <b>to those who knew how </b>

14:33

<b>to interpret the digital code </b> <b>of the criminal world.</b>

14:36

<b>International cooperation and keeping</b> <b>digital money under close attention</b>

14:42

<b>is a necessary step</b> <b>so that this sector is not covered </b>

14:47

<b>by the veil of money laundering </b> <b>and seen as a dark sector. </b>

14:53

<b>Cryptocurrency is not necessarily </b> <b>a dark sector.</b>

14:57

<b>SPAK has carried out </b> <b>several similar operations </b>

15:02

<b>in which it has imposed </b> <b>seizures on digital assets </b>

15:09

<b>that were in bitcoin </b> <b>or other cryptocurrencies, </b>

15:14

<b>but always only at the moment </b> <b>when an exchange has taken place. </b>

15:19

<b>So we have that third party, </b> <b>which is the exchange.</b>

15:22

<b>After the seizure </b> <b>of those banknotes, </b>

15:25

<b>the Spanish authorities </b> <b>notified Europol. </b>

15:27

<b>What was discovered afterward </b> <b>was much larger: </b>

15:31

<b>the network had branches in Dubai, </b> <b>the Netherlands, and Albania.</b>

15:34

<b>At this stage, </b> <b>SPAK entered the picture. </b>

15:37

<b>Cooperating with Europol, </b>

15:39

<b>Albanian investigators </b> <b>began tracing digital transactions</b>

15:43

<b>that passed through </b> <b>encrypted "wallets."</b>

15:46

<b>Each virtual coin carried the history</b> <b>of a dark financial route</b>

15:50

<b>from cocaine trafficking </b> <b>to investments in villas </b>

15:54

<b>and seemingly legitimate businesses</b> <b>in our country. </b>

16:01

<b>Thanks to this operation, </b> <b>a hidden network was uncovered, </b>

16:04

<b>where every click </b> <b>on the blockchain </b>

16:06

<b>served to launder blood</b> <b>and criminal money.</b>

16:09

<b>From Spain to Tirana, </b> <b>SPAK and Europol </b>

16:11

<b>seized over 35 million euros</b> <b>25 million in Spain and, subsequently, </b>

16:16

<b>10 million euros seized by order</b> <b>of the Special Prosecution in Albania</b>

16:20

<b>striking at the core of the</b> <b>"underground banks" of organized crime.</b>

16:26

<b>For the first time, </b>

16:28

<b>Albanian authorities were facing</b> <b>a new investigative reality, </b>

16:31

<b>one in which the evidence was no longer</b> <b>a physical file or a bank account. </b>

16:35

<b>It was a code on the blockchain, </b> <b>a chain of transactions </b>

16:38

<b>that could be traced only by experts</b> <b>in cyber forensics and criminal finance. </b>

16:45

<b>In such a case, </b> <b>it should be essential</b>

16:49

<b>that the subject whose</b> <b>assets have been seized </b>

16:52

<b>and who is being investigated </b> <b>by the prosecution authority </b>

16:55

<b>for laundering the proceeds </b> <b>of a criminal offense</b>

16:57

<b>must confirm that</b> <b>he is the user of that wallet, </b>

17:01

<b>provide his personal details, </b>

17:04

<b>show the transactions </b> <b>that he has actually carried out </b>

17:08

<b>and from which he has earned income</b> <b>from this wallet that he manages,</b>

17:12

<b>and the main thing is </b> <b>to identify the primary source</b>

17:17

<b>meaning the initial moment </b>

17:19

<b>when he invested in purchasing </b> <b>these cryptocurrencies.</b>

17:22

<b>So far there has been </b> <b>a very good result in tracing wallets</b>

17:25

<b>that have carried out </b> <b>hidden transactions, </b>

17:28

<b>with the aim of hiding money </b> <b>or hiding their investments </b>

17:32

<b>that they have</b> <b>in cryptocurrencies. </b>

17:34

<b>But it is always about how, </b> <b>at some point, at a given moment,</b>

17:40

<b>the digital wallet which is unidentified</b> <b>must be linked to the person.</b>

17:59

<b>In the "Bitcoin" case file </b> <b>obtained by Inside Story, </b>

18:01

<b>it is stated that </b> <b>the Çopja criminal organization </b>

18:04

<b>used every possible means </b> <b>to strengthen its power </b>

18:07

<b>and to launder money </b> <b>obtained from crime. </b>

18:10

<b>One of the most important tools</b> <b>was the use of cryptocurrencies.</b>

18:14

<b>Criminal groups, </b> <b>we have seen historically, </b>

18:18

<b>have laundered money </b> <b>in other sectors, </b>

18:21

<b>but the cryptocurrency sector</b> <b>has created a kind of veil </b>

18:26

<b>that makes it seem </b> <b>that money can be laundered easily. </b>

18:29

<b>It is not that simple to carry out money</b> <b>laundering through cryptocurrencies.</b>

18:33

<b>Certainly it is not impossible,</b> <b>but when it comes to licensed platforms</b>

18:37

<b>here we are talking</b> <b>about outside Albania</b>

18:40

<b>money laundering through these platforms</b> <b>is to some extent difficult </b>

18:45

<b>because, undoubtedly, </b> <b>they have client identification.</b>

18:48

<b>International cooperation related </b> <b>to the main digital wallet exchanges</b>

18:54

<b>and those that primarily </b> <b>circulate cryptocurrencies, </b>

18:57

<b>such as Binance</b> <b>or another company </b>

19:01

<b>or exchange established </b> <b>in 2011 in the USA, named Kraken. </b>

19:08

<b>These two are the main exchanges</b> <b>with which Albanian law enforcement bodies </b>

19:13

<b>have acted </b> <b>in international cooperation. </b>

19:16

<b>SPAK, with the help </b> <b>of blockchain experts, </b>

19:19

<b>discovered that the transactions</b> <b>were carried out </b>

19:22

<b>through the TRON/TETHER network,</b> <b>with large values.</b>

19:24

<b>The file mentions four transactions</b> <b>with values of 105 thousand,</b>

19:28

<b>237 thousand, 978 thousand, </b> <b>and around 2 million dollars. </b>

19:33

<b>These amounts are suspected to be money</b> <b>obtained from drug trafficking.</b>

19:38

<b>At the moment when </b> <b>a licensed platform </b>

19:40

<b>knows the person</b> <b>who carries out the transaction,</b>

19:43

<b>undoubtedly the difficulty </b> <b>of laundering money </b>

19:46

<b>on these platforms</b> <b>is increased. </b>

19:48

<b>But unfortunately, we have platforms </b> <b>that do not have client identification. </b>

19:54

<b>And these platforms have greater potential</b> <b>for criminal groups to launder money.</b>

20:00

<b>An IT expert can directly see </b> <b>on the blockchain </b>

20:04

<b>all the transactions where they are</b> <b>coming from, where they are going,</b>

20:08

<b>to which exchanges </b> <b>these funds are directed, </b>

20:11

<b>and then whether these funds are moving </b> <b>from one exchange to another. </b>

20:16

<b>But this requires a lot of experience,</b> <b>a lot of expertise, </b>

20:20

<b>as well as some very </b> <b>advanced software </b>

20:25

<b>for tracking and tracing </b> <b>these exchanges.</b>

20:29

<b>Investigators initially focused</b> <b>on the entry gate, namely the exchanges. </b>

20:33

<b>These centralized platforms, </b>

20:35

<b>where proceeds are converted </b> <b>into crypto with a click, </b>

20:38

<b>are the place where dirty money </b> <b>takes on the mask of legitimacy.</b>

20:41

<b>In many cases worldwide, </b> <b>and also in this case file, </b>

20:44

<b>operators use local exchange </b> <b>points to legalize the flows. </b>

20:48

<b>This is believed to be the reason</b> <b>for the implication of two individuals </b>

20:52

<b>operating in the currency </b> <b>exchange business.</b>

20:55

<b>The investigation revealed </b> <b>a clear structure: </b>

20:57

<b>funds originating </b> <b>from drug sales</b>

21:00

<b>were transferred to bank accounts</b> <b>in other countries; </b>

21:02

<b>from there they were </b> <b>used to purchase </b>

21:05

<b>Tether, Ethereum, and Bitcoin, </b> <b>and were then sent to digital wallets</b>

21:08

<b>belonging</b> <b>to a widespread network of users.</b>

21:11

<b>One part of the network was clear: </b> <b>accounts on Binance, </b>

21:14

<b>other accounts hosted on a platform</b> <b>that turned out to be "ALT 5 Sigma,"</b>

21:19

<b>and between them wallets </b> <b>that held large transactions.</b>

21:23

<b>The prosecution authority </b> <b>has every right</b>

21:25

<b>to impose a seizure</b> <b>if it suspects that this wallet </b>

21:31

<b>has been used for laundering </b> <b>the proceeds of a criminal offense,</b>

21:34

<b>but it must investigate </b> <b>and gather evidence </b>

21:39

<b>in order to proceed </b> <b>to confiscation. </b>

21:43

<b>However, there is also </b> <b>a very important issue here, </b>

21:46

<b>which is the issue of the key.</b> <b>That is, if this key is not found, </b>

21:51

<b>can the prosecution authority </b> <b>use and seize them?</b>

21:56

<b>As the investigation progressed, </b> <b>one clear element emerged:</b>

21:59

<b>SOLUTION SRL, a company </b> <b>registered in the city of Milan, Italy. </b>

22:04

<b>That company was nothing more </b> <b>than a shell that covered the flows.</b>

22:08

<b>From October 23, 2024, </b> <b>to July 9, 2025, </b>

22:13

<b>transaction data showed </b> <b>cryptocurrency purchases </b>

22:16

<b>worth around 40 million dollars</b>

22:19

<b>far more than the value </b> <b>declared so far of 10 million.</b>

22:22

<b>As the documentation revealed, </b>

22:25

<b>the money entered from bank accounts</b> <b>in the United Kingdom and Spain </b>

22:28

<b>into a jungle </b> <b>of digital transactions. </b>

22:31

<b>From there, it passed </b> <b>through several wallets </b>

22:34

<b>and finally ended up </b> <b>at addresses that investigators </b>

22:37

<b>linked to members </b> <b>of the organization from Elbasan.</b>

22:40

<b>It appears that in the period </b> <b>from 23.10.2024 until 09.07.2025, </b>

22:46

<b>the Italian economic </b> <b>operator SOLUTION SRL </b>

22:49

<b>carried out purchases </b> <b>of cryptocurrencies USDT (Tether), </b>

22:52

<b>ETH (Ethereum), and BTC (Bitcoin), </b> <b>paying in USD and euros,</b>

22:57

<b>with monetary values </b> <b>paid from identified bank accounts</b>

23:01

<b>one bank account in the United Kingdom</b> <b>and one bank account in Spain</b>

23:05

<b>for a total equivalent value </b> <b>of 40 million USD. </b>

23:10

<b>After the exchange and purchase </b> <b>of various cryptocurrencies, </b>

23:13

<b>it appears that different </b> <b>quantities of cryptocurrencies </b>

23:15

<b>were sent to a series </b> <b>of cryptocurrency wallets.</b>

23:18

<b>These wallets are traced </b> <b>over a certain period, </b>

23:21

<b>which can even last several years, </b> <b>until they reach the point </b>

23:24

<b>where tracing or matching </b> <b>the person to the wallet is achieved. </b>

23:28

<b>That is the key point </b> <b>where the connection </b>

23:31

<b>between these wallets </b> <b>is created and it is concluded </b>

23:35

<b>that this person is the one </b> <b>who controls these wallets. </b>

23:38

<b>Once a digital wallet is identified</b> <b>through a cryptocurrency, </b>

23:42

<b>law enforcement bodies </b> <b>are certainly obliged </b>

23:46

<b>to precisely determine </b> <b>the owner of the digital wallet.</b>

23:51

<b>SPAK requested the accounts </b>

23:54

<b>of the entity "ALT 5 Sigma,"</b> <b>the IPs and the history,</b>

23:57

<b>which the company handed </b> <b>over on July 16, 2025. </b>

24:01

<b>The court approved the preventive seizure,</b> <b>and in cooperation with Europol </b>

24:05

<b>and the police of Belgium </b> <b>and the Netherlands, </b>

24:07

<b>the wallets were blocked. </b>

24:09

<b>Likewise, user data </b> <b>were collected at KODEX GLOBAL.</b>

24:12

<b>The investigations revealed</b> <b>the international money-laundering network </b>

24:16

<b>and the legal gaps in Albania. </b>

24:19

<b>The country lacks a protocol </b>

24:21

<b>for the safekeeping and management</b> <b>of seized cryptocurrencies, </b>

24:24

<b>while criminal groups hide billions</b> <b>with software and technological networks. </b>

24:30

<b>Today, I do not know how </b> <b>the prosecution authority </b>

24:34

<b>administers a seized wallet</b>

24:38

<b>whether by itself </b> <b>or through another institution. </b>

24:41

<b>We do not know whether </b> <b>there is a framework, </b>

24:43

<b>a regulation, an instruction, </b> <b>a legal basis </b>

24:46

<b>that the prosecution authority </b> <b>addresses regarding </b>

24:49

<b>both the security and </b> <b>the administration of these funds; </b>

24:54

<b>to my knowledge today there </b> <b>is a legal vacuum at this moment, </b>

25:02

<b>and intervention is necessary. </b>

25:05

<b>There are several difficulties </b> <b>in identifying criminal groups </b>

25:09

<b>when they attempt to carry out </b> <b>money laundering </b>

25:13

<b>or activities</b> <b>in online transactions, </b>

25:16

<b>at least in blockchain technology through</b> <b>different cryptocurrencies not only bitcoin, </b>

25:23

<b>but generally several types </b> <b>of cryptocurrencies; </b>

25:26

<b>bitcoin is no longer used, </b>

25:28

<b>but other coins are used </b> <b>that create even higher anonymity. </b>

25:32

<b>The case file shows the use</b> <b>of mixers/tumblers, chain-hopping, </b>

25:37

<b>and offshore exchanges</b> <b>to conceal Bitcoin flows. </b>

25:41

<b>Thanks to international cooperation, </b> <b>SPAK blocked the accounts </b>

25:44

<b>and transferred the assets to wallets</b> <b>controlled by the Prosecution.</b>

25:50

<b>From the acts and evidence </b> <b>presented by the prosecutor, </b>

25:53

<b>cited above, there arises </b> <b>a reasonable suspicion </b>

25:56

<b>that the monetary </b> <b>values/cryptocurrencies </b>

25:58

<b>cited in the request </b> <b>under judicial review </b>

26:01

<b>are suspected to be </b> <b>the product of criminal offenses </b>

26:04

<b>provided for under Articles 287,</b> <b>28/1, 333, and 334 of the Criminal Code.</b>

26:12

<b>For the safeguarding </b> <b>of seized cryptocurrencies, </b>

26:16

<b>Albania has reached out </b> <b>to European partners. </b>

26:19

<b>However,</b> <b>this cannot last indefinitely.</b>

26:21

<b>What is required is the establishment</b> <b>of a legal framework</b>

26:24

<b>and systems for the storage</b> <b>of these dirty funds.</b>

26:27

<b>We encountered many difficulties</b> <b>of course we solved the problem, </b>

26:31

<b>but we solved it through </b> <b>close cooperation </b>

26:33

<b>with foreign authorities </b> <b>of an EU member state, </b>

26:38

<b>which offered itself to us. </b>

26:40

<b>The transfer of assets into SPAK's wallets</b> <b>was a delicate process, </b>

26:44

<b>since the exchange</b> <b>holds the private key </b>

26:46

<b>and can move the funds </b> <b>according to legal instructions. </b>

26:49

<b>To avoid manipulation, an institutional</b> <b>wallet with high security was created: </b>

26:54

<b>offline cold storage, </b> <b>multi-signature, </b>

26:57

<b>and separation of private keys, </b> <b>preventing internal theft.</b>

27:01

<b>This structure prevents </b> <b>internal theft and ensures</b>

27:04

<b>that the funds </b> <b>do not disappear after seizure. </b>

27:07

<b>Criminal procedure </b> <b>is almost completely outdated </b>

27:12

<b>with regard to these </b> <b>technological developments </b>

27:15

<b>and this evolution </b> <b>of virtual money. </b>

27:17

<b>In criminal procedure,</b> <b>it is almost undefined </b>

27:20

<b>how one can examine </b> <b>a cryptocurrency. </b>

27:25

<b>But this is not a final solution.</b> <b>It is an extraordinary effort, </b>

27:28

<b>which brings to light the major legal </b> <b>shortcomings of the system.</b>

27:32

<b>Crime does not wait; and until</b> <b>the law adapts to digital reality, </b>

27:36

<b>it advances ahead of justice. </b>

27:38

<b>A shadow market that flourishes</b> <b>among social networks</b>

27:42

<b>and unlicensed exchanges.</b>

27:45

<b>Albania approved a law in 2020 </b> <b>on distributed ledger technology, </b>

27:49

<b>which at the time </b> <b>was a major step forward, </b>

27:52

<b>but that law has remained as such</b> <b>without any secondary legislation </b>

27:55

<b>and without </b> <b>any subsequent development. </b>

27:58

<b>This was certainly </b> <b>a significant step ahead, </b>

28:02

<b>but on the other hand </b> <b>it did not prove to be very fruitful. </b>

28:05

<b>The law was created, but it established</b> <b>only some basic principles, </b>

28:09

<b>and the secondary acts </b> <b>and guidelines that could have been </b>

28:12

<b>issued for its implementation </b> <b>were never adopted; </b>

28:14

<b>for this reason, </b> <b>as we speak today, </b>

28:17

<b>this activity cannot be controlled</b> <b>through licensing.</b>

28:22

<b>Based on the shortcomings </b> <b>identified after research </b>

28:25

<b>into investigative case files </b> <b>and legal gaps, </b>

28:28

<b>Inside Story addressed </b> <b>the Financial Supervisory Authority </b>

28:31

<b>with a request for information.</b> <b>This institution clarifies </b>

28:35

<b>that since the entry </b> <b>into force of Law No. 66/2020, </b>

28:39

<b>no requests for licensing or authorization</b> <b>have been submitted to the AMF.</b>

28:44

<b>Therefore, in Albania </b>

28:46

<b>there is not a single licensed platform</b> <b>for cryptocurrency trading.</b>

28:49

<b>Nevertheless, dozens of pages </b> <b>on Instagram, TikTok, and Telegram </b>

28:53

<b>offer every day crypto buying and selling, </b> <b>cash payments in Tirana.</b>

28:57

<b>A market that operates </b> <b>in the shadows, </b>

28:59

<b>while the state simply</b> <b>has no one to control it.</b>

29:03

<b>This is a problem that arises</b>

29:06

<b>due to the legal gaps </b> <b>in the Code of Criminal Procedure, </b>

29:10

<b>specifically Articles 274 and 276,</b> <b>which deal with the seizure of assets,</b>

29:18

<b>but these articles refer </b> <b>only to the seizure of bank assets, </b>

29:21

<b>immovable property, and other items</b> <b>deriving from criminal activity; </b>

29:26

<b>they do not specifically provide </b> <b>for such cases of digital assets.</b>

29:33

<b>On social networks </b> <b>such as Instagram and Facebook, </b>

29:36

<b>many traces are left. </b>

29:38

<b>This starts from the very first point</b> <b>of contact with another person, </b>

29:42

<b>where you are identified </b> <b>at that moment </b>

29:45

<b>through the device you use to access</b> <b>and log into social networks, </b>

29:49

<b>through the messages </b> <b>you exchange with one another, </b>

29:52

<b>where it is impossible </b> <b>for those messages to be erased, </b>

29:56

<b>and through screenshots that can be taken</b> <b>showing that you are discussing </b>

30:00

<b>a possible exchange </b> <b>of virtual currencies for cash.</b>

30:07

<b>AMF says that a total </b> <b>of 12 regulations </b>

30:10

<b>and government decisions </b> <b>have been approved, ranging</b>

30:13

<b>from the "Licensing of DLT exchanges"</b> <b>to "Digital wallet custodians"…</b>

30:16

<b>But the law has remained </b> <b>a framework without substance: </b>

30:18

<b>a house without residents, </b>

30:20

<b>where no one has ever entered </b> <b>to apply for a license. </b>

30:23

<b>Paradoxically, while the rules exist, </b> <b>no one has implemented them. </b>

30:27

<b>The preference has been </b> <b>for the underground market, </b>

30:30

<b>where dirty money circulates </b> <b>and institutional alerts are avoided.</b>

30:34

<b>AMF says it has not been informed </b> <b>of financial fraud, </b>

30:37

<b>but at the same time acknowledges </b> <b>that the informal market exists. </b>

30:41

<b>In fact, it has grown so large</b> <b>that in November 2024, </b>

30:44

<b>following a referral made</b> <b>by AMF itself, </b>

30:47

<b>a police operation codenamed</b> <b>"USDT 1" was carried out,</b>

30:50

<b>in which 32 entities</b> <b>were investigated </b>

30:53

<b>and 18 were criminally prosecuted </b> <b>for illegal activities </b>

30:56

<b>involving cryptocurrencies. </b>

31:15

<b>In November 2024, after the alert from </b> <b>the Financial Supervisory Authority, </b>

31:21

<b>the Tirana Prosecutor's Office </b> <b>took action, </b>

31:23

<b>uncovering</b> <b>a sophisticated network </b>

31:26

<b>that circulated large amounts of suspicious</b> <b>money through cryptocurrencies.</b>

31:29

<b>Companies such</b> <b>as Cryptoexchange.al, Mr.Crypto.al, </b>

31:33

<b>Tmt.al, USDTirana, and Usdt_albania</b> <b>carried out cryptocurrency transactions </b>

31:40

<b>in exchange for currencies, </b> <b>mainly in cash.</b>

31:43

<b>They operated by advertising </b> <b>through social networks </b>

31:46

<b>such as Instagram, Facebook, </b> <b>TikTok, and Telegram. </b>

31:48

<b>These entities were </b> <b>not merely online profiles, </b>

31:52

<b>but a digital shadow economy, </b> <b>where every transaction</b>

31:55

<b>was hidden and outside </b> <b>any legal control. </b>

31:58

<b>The profiles used different </b> <b>channels to reach clients, </b>

32:00

<b>creating an image of trustworthiness,</b> <b>but one that was entirely illegal.</b>

32:04

<b>All of this leaves online traces, </b> <b>is searchable, </b>

32:09

<b>and if institutions obtain </b> <b>the authority through a court decision, </b>

32:14

<b>they can obtain data </b> <b>from these companies. </b>

32:16

<b>They can say: provide us</b> <b>with data on this person</b>

32:19

<b>in these conversations </b> <b>that have taken place; </b>

32:22

<b>with a court order, </b> <b>they are ready to cooperate. </b>

32:25

<b>There are several operators </b> <b>that carry out this activity in Albania;</b>

32:29

<b>under Law 66 of 2020 </b> <b>on financial markets, </b>

32:33

<b>they have the legal obligation </b> <b>to keep under supervision </b>

32:38

<b>the entities that carry out </b> <b>these types of transactions. </b>

32:42

<b>That is, to conduct a kind </b> <b>of investigation and risk assessment </b>

32:44

<b>regarding the transactions carried out</b> <b>through these digital wallets.</b>

32:52

<b>To document</b> <b>the illegal financial activity, </b>

32:55

<b>an agent was infiltrated </b> <b>as an ordinary client. </b>

32:58

<b>According to the investigative file, </b>

33:00

<b>the undercover agent</b> <b>held the first meeting </b>

33:03

<b>with a person </b> <b>who managed Cryptoexchange.al. </b>

33:06

<b>The undercover agent </b> <b>sends him a message on WhatsApp, </b>

33:10

<b>entering</b> <b>into concrete discussions </b>

33:11

<b>about the interest </b> <b>and the handover of the money.</b>

33:14

<b>Agent: </b> <b>How much USDT can I get today?</b>

33:17

<b>Subject: As much as you'd like,</b> <b>but my fee is 3%.</b>

33:20

<b>Agent: Ok, I'll take 5.000 USDT. </b> <b>Where do we meet?"</b>

33:23

<b>Subject: At the shop</b> <b>by the apartment blocks, </b>

33:25

<b>bring the money</b> <b>and take the coins.</b>

33:28

<b>This was only the beginning. </b>

33:30

<b>In every meeting, every movement</b> <b>was recorded, every cent was counted. </b>

33:35

<b>The use of cash and digital wallets</b> <b>created a complicated financial labyrinth </b>

33:40

<b>that only meticulous investigation</b> <b>could untangle.</b>

33:43

<b>In the case of the citizen </b> <b>with the initials L.L., </b>

33:46

<b>who handled the money </b> <b>at the family's restaurant, </b>

33:49

<b>the conversations ended up revealing</b> <b>how different subjects cooperated. </b>

33:53

<b>From the conversations </b> <b>it is understood </b>

33:56

<b>that they tried to stay away</b> <b>from the public eye, </b>

33:58

<b>especially</b> <b>when exchanging cash.</b>

34:02

<b>Agent: "Should I bring the money</b> <b>to the restaurant, as usual?"</b>

34:05

<b>L.L.: "Yes, at the register. </b> <b>No need for a lot of fuss."</b>

34:08

<b>Agent: "Have you received USDT </b> <b>each time for your clients?"</b>

34:11

<b>L.L.: "Yes… </b> <b>I just do what they tell me."</b>

34:13

<b>Another case, a citizen</b> <b>with the initials V.L., showed showing</b>

34:17

<b>the boldness of a cryptocurrency trader </b> <b>who spared no detail:</b>

34:21

<b>V.L.: "Today we will take 10.000 USDT. </b> <b>The money will be given in cash."</b>

34:26

<b>Agent: </b> <b>"Where will the meeting take place?"</b>

34:28

<b>V.L.: "In the center's parking lot,</b> <b>secretly, no one should know."</b>

34:31

<b>Every conversation was living proof</b> <b>of how the network functioned, </b>

34:35

<b>a mosaic where money,</b> <b>digital communication, </b>

34:38

<b>and the fear of being discovered </b> <b>were intertwined with every word. </b>

34:42

<b>In every fee, every wallet, </b> <b>every transaction, </b>

34:45

<b>the investigation documented </b> <b>the path of the money </b>

34:48

<b>from ordinary clients</b> <b>to individuals operating without a license.</b>

34:51

<b>When virtual coins pass</b> <b>from the person who is selling them</b>

34:56

<b>to the person</b> <b>who is receiving the cash. </b>

34:59

<b>And this is what happens most often,</b> <b>that the money is converted into cash,</b>

35:03

<b>and cash leaves traces </b> <b>and can be tracked. </b>

35:08

<b>This investigative strategy,</b> <b>using simulated actions and surveillance, </b>

35:13

<b>made it possible to accurately</b> <b>document every transaction.</b>

35:16

<b>According to the investigative file, </b> <b>from September 26 to 30, 2024, </b>

35:21

<b>the agent also connected </b> <b>with two other citizens </b>

35:24

<b>who carried out</b> <b>similar transactions. </b>

35:27

<b>Every action, every conversation, </b> <b>was carefully recorded, </b>

35:30

<b>creating a clear portrait </b> <b>of the criminal financial network.</b>

35:34

<b>The infiltrated agent documented </b> <b>several episodes of this scheme.</b>

35:39

<b>After months of wiretaps, </b> <b>meetings, and verifications, </b>

35:42

<b>the prosecution managed </b> <b>to document the entire network, </b>

35:45

<b>creating a clear picture </b>

35:48

<b>of how unlicensed cryptocurrency</b> <b>markets operate in Albania. </b>

35:52

<b>The blockchain</b> <b>should be considered </b>

35:55

<b>as an open accounting ledger </b> <b>where every transaction leaves traces. </b>

35:59

<b>No transaction can be forgotten, </b> <b>cannot be erased,</b>

36:03

<b>and cannot be manipulated, </b>

36:05

<b>but the only duality that this type</b> <b>of technology creates is the fact</b>

36:11

<b>you cannot find the name of the person</b> <b>who carried out the transaction.</b>

36:16

<b>Once the perpetrators and the owners</b> <b>of the digital wallets are identified, </b>

36:22

<b>at that point the law enforcement body</b> <b>has it very easy to identify </b>

36:26

<b>which person may have deposited </b> <b>or withdrawn money from this digital wallet. </b>

36:32

<b>Once this process is completed, </b> <b>it certainly leads </b>

36:37

<b>to a more accurate depiction </b> <b>of the picture </b>

36:40

<b>of laundering the proceeds </b> <b>of criminal offenses.</b>

36:43

<b>Another SPAK case file shows </b>

36:45

<b>how an international fraud network, </b> <b>based in Tirana, </b>

36:48

<b>made millions of euros disappear</b> <b>from foreign citizens through Bitcoin. </b>

36:52

<b>In the offices of "Don Bosko," which</b> <b>appeared to be marketing companies, </b>

36:55

<b>a call center was operating</b> <b>that defrauded victims from Europe,</b>

36:59

<b>convincing them to invest </b> <b>in fake platforms.</b>

37:02

<b>One of them was the Italian </b> <b>pensioner Alfredo Boenco, </b>

37:05

<b>who lost 700 thousand euros </b> <b>after his money </b>

37:08

<b>was converted into Bitcoin </b> <b>and disappeared into anonymous wallets. </b>

37:11

<b>Italian investigations </b> <b>uncovered links </b>

37:14

<b>to a structured network in Albania </b> <b>that used fictitious exchanges, </b>

37:17

<b>mixers, and peer-to-peer platforms </b> <b>to erase every trace.</b>

37:21

<b>All licensed exchanges, </b>

37:25

<b>from the very first stage </b> <b>of opening or accessing an account,</b>

37:28

<b>require an identity card and verification</b> <b>of where the funds come from </b>

37:32

<b>and who you are</b> <b>as a person. </b>

37:34

<b>They do this because </b> <b>it is required under </b>

37:37

<b>the rules of the state </b> <b>where you are entering; </b>

37:39

<b>it is required as a method of verification</b> <b>that you are a real person</b>

37:44

<b>and that you are entering </b> <b>a system to invest. </b>

37:47

<b>This is the worst way to use</b> <b>such platforms for money laundering.</b>

37:51

<b>Organized crime has, </b> <b>for several years now, </b>

37:54

<b>found this to be </b> <b>a very effective way </b>

37:59

<b>to launder money derived </b> <b>from criminal activity </b>

38:03

<b>and to legitimize it, </b>

38:06

<b>because these are platforms </b> <b>that are very difficult to trace. </b>

38:10

<b>They have also exploited </b> <b>the moment of legal vacuum </b>

38:15

<b>that Albania has regarding </b> <b>the use and recognition </b>

38:19

<b>of the way these transactions </b> <b>are carried out. </b>

38:26

<b>SPAK documented a group </b> <b>with clear roles: </b>

38:29

<b>leaders, operators, </b> <b>IT specialists, and financial managers</b>

38:32

<b>who laundered millions of euros </b> <b>through cryptocurrencies. </b>

38:35

<b>A scam that began </b> <b>with an online advertisement, </b>

38:38

<b>but exposed </b> <b>a sophisticated system</b>

38:40

<b>where technology </b> <b>became a refuge for crime.</b>

38:43

<b>In the end, </b> <b>the irony is bitter: </b>

38:45

<b>Albanian crime controls digital wallets</b> <b>that move millions in seconds, </b>

38:49

<b>while the state still does not </b> <b>even have one of its own </b>

38:52

<b>to store</b> <b>the seized cryptocurrencies.</b>

38:55

<b>On paper, Albania has laws </b> <b>and regulations on cryptocurrencies; </b>

38:59

<b>in practice, not a single platform</b> <b>has been licensed. </b>

39:03

<b>Law 66/2020 remains empty, </b> <b>while the real market </b>

39:08

<b>develops on social networks </b> <b>and foreign platforms, </b>

39:10

<b>often as digital pyramid schemes. </b>

39:15

<b>The AMF admits that it has not received</b> <b>any licensing requests, </b>

39:19

<b>while the Bank of Albania </b> <b>warns citizens </b>

39:21

<b>about the risks </b> <b>of uncontrolled investments.</b>

39:25

<b>The most important thing </b> <b>is the creation </b>

39:27

<b>of a clear body within </b> <b>the Code of Criminal Procedure </b>

39:30

<b>for the manner of examining, </b> <b>identifying, seizing, </b>

39:35

<b>and confiscating virtual money, </b>

39:38

<b>while preserving the right balance</b> <b>of privacy protection, </b>

39:43

<b>because not everyone </b> <b>who invests in cryptocurrencies </b>

39:46

<b>is a criminal </b> <b>and carries out that activity </b>

39:49

<b>for laundering the proceeds </b> <b>of criminal offenses. </b>

39:52

<b>We do not have </b> <b>any licensed entity </b>

39:54

<b>with regard </b> <b>to cryptocurrency trading, </b>

39:57

<b>which in fact makes one suspect </b> <b>that we had legislation, </b>

40:02

<b>but on the other hand we did not have</b> <b>any entity interested in registering. </b>

40:06

<b>It should be examined in fact how</b> <b>this legislation should be applied, </b>

40:10

<b>how to act with entities </b>

40:13

<b>that seek to register in Albania </b> <b>in order to trade cryptocurrencies.</b>

40:18

<b>The state knows that cryptocurrencies</b> <b>are used for money laundering, </b>

40:22

<b>but it has neither the tools </b> <b>nor the structures to monitor them. </b>

40:26

<b>MONEYVAL lists Albania </b> <b>as high risk for money laundering </b>

40:31

<b>due to the lack of control.</b>

40:34

<b>At a time when other countries </b> <b>are building digital systems </b>

40:37

<b>for the safekeeping </b> <b>and auditing of assets,</b>

40:39

<b>Albania still does not know </b> <b>how to open a wallet. </b>

40:42

<b>The question remains: how can a state</b> <b>control money laundering </b>

40:46

<b>when it cannot even manage </b> <b>what it seizes?</b>

UNLOCK MORE

Sign up free to access premium features

INTERACTIVE VIEWER

Watch the video with synced subtitles, adjustable overlay, and full playback control.

SIGN UP FREE TO UNLOCK

AI SUMMARY

Get an instant AI-generated summary of the video content, key points, and takeaways.

SIGN UP FREE TO UNLOCK

TRANSLATE

Translate the transcript to 100+ languages with one click. Download in any format.

SIGN UP FREE TO UNLOCK

MIND MAP

Visualize the transcript as an interactive mind map. Understand structure at a glance.

SIGN UP FREE TO UNLOCK

CHAT WITH TRANSCRIPT

Ask questions about the video content. Get answers powered by AI directly from the transcript.

SIGN UP FREE TO UNLOCK

GET MORE FROM YOUR TRANSCRIPTS

Sign up for free and unlock interactive viewer, AI summaries, translations, mind maps, and more. No credit card required.