• About
  • Contact
Şengün Law
  • Deutsch
  • Français
  • Türkçe
  • Español
  • Italiano
  • Investment Advisory In Türkiye
    • Company Formation
    • Foreign Shareholder
    • Concessions – Incentives
    • Tax Liabilities
    • Insurance
    • Real Estate Purchases
    • Risk, Compliance and Regulation
    • International Logistics
    • ESG
    • Competition
    • Trade Union Consulting
    • Region Selection
    • Digital Transformation
    • Information Technology Consultancy
  • Articles
    • From Nedim Korhan Şengün
    • Entrepreneurship Center
    • Global Green Center
    • Center Of Risk Management And Regulatory Compliance
    • Center of Arbitration, Conciliation, and Mediation
    • Capital Markets and Financial Transactions Center
    • Insurance Center
    • Intellectual Asset Management Center
    • Personal Data Center
    • Competition Law and Practice Center
    • Investment Advisory Center
  • Turkish Citizenship and Immigration
    • Acquisition of Turkish Citizenship
    • Work Permit
    • Residence Permit
    • Family Law for Foreigners
    • Criminal Law for Foreigners
    • Intellectual Property for Foreigners
    • Administrative Practices for Foreigners
  • International Disputes
    • Local and International Dispute Resolution
    • Arbitration/ Recognition /Adjudication
  • Announcements
No Result
View All Result
  • Investment Advisory In Türkiye
    • Company Formation
    • Foreign Shareholder
    • Concessions – Incentives
    • Tax Liabilities
    • Insurance
    • Real Estate Purchases
    • Risk, Compliance and Regulation
    • International Logistics
    • ESG
    • Competition
    • Trade Union Consulting
    • Region Selection
    • Digital Transformation
    • Information Technology Consultancy
  • Articles
    • From Nedim Korhan Şengün
    • Entrepreneurship Center
    • Global Green Center
    • Center Of Risk Management And Regulatory Compliance
    • Center of Arbitration, Conciliation, and Mediation
    • Capital Markets and Financial Transactions Center
    • Insurance Center
    • Intellectual Asset Management Center
    • Personal Data Center
    • Competition Law and Practice Center
    • Investment Advisory Center
  • Turkish Citizenship and Immigration
    • Acquisition of Turkish Citizenship
    • Work Permit
    • Residence Permit
    • Family Law for Foreigners
    • Criminal Law for Foreigners
    • Intellectual Property for Foreigners
    • Administrative Practices for Foreigners
  • International Disputes
    • Local and International Dispute Resolution
    • Arbitration/ Recognition /Adjudication
  • Announcements
No Result
View All Result
Şengün Law
No Result
View All Result
Home Articles

Crypto Asset Fraud Crime and Legal Evaluation

7 March 2025
in Articles
Reading Time: 5 mins read
A A
Kripto Varlık Dolandırıcılığı Suçu ve Hukuki Değerlendirmesi
Share on FacebookShare on TwitterShare on Linkedin

Crypto assets, which have gained a place in daily life with the developing technology, have been frequently invested recently. Developments also bring different crimes with them. It is encountered that the existing fraud crime is committed through crypto assets. In this sense, since the subject of the fraud crime that can be carried out through information systems is crypto assets, it is necessary to evaluate it separately as “crypto asset fraud”. First of all, it is necessary to obtain information about the crime of fraud and crypto assets.

Fraud Crime

The crime of fraud is regulated under Articles 157 and 158 of the Turkish Penal Code (“TPC”). The basic form of the offense is that a person deceives another person and causes damage and benefits himself/herself or another person. The crime of fraud requires three elements: fraudulent behavior, intent to deceive and intent to benefit.

For the crime of fraud to occur, the purpose of providing benefit is in question for assets that have financial value. (1) Therefore, as a result of the increasing use of crypto assets due to reasons such as easy transaction interfaces, inflation, interest in technology, the crime of fraud is also committed through crypto assets.

Crypto Assets

Cryptocurrencies, which are a sub-section of virtual currencies, are assets represented as a token with blockchain technology in the digital environment corresponding to a value in real life. Blockchain technology enables the secure transmission, transfer and trading of tokens.

Unlike currencies, they are decentralized. Being decentralized means that they are referred to as “assets” as opposed to “money” issued by a center.

The element of the crime of fraud, aiming to benefit for another person or for oneself, is also committed through crypto-assets since they correspond to financial assets. In order for the crime of fraud to be committed by targeting crypto assets, it is possible only if it is carried out in a completely digital environment. Therefore, the realization of the crime of fraud through crypto assets will be discussed separately below.

Crypto Asset Fraud

The value of crypto assets can be measured in money. Therefore, crypto assets are considered as assets. If the elements of the crime of fraud are completed, the element of providing benefit must target crypto assets. In other words, crypto assets must be defrauded. However, if the elements of the crime of fraud are completed, a crime will be mentioned.

Encryption techniques are used in the circulation and transactions of crypto assets, which ensure that only certain persons can decipher these transactions. The crime of cryptocurrency fraud is committed by using information systems. The crime of fraud is committed over the Internet or through cryptocurrency exchanges, and the use of information systems is required to carry out the fraudulent act.

In the commission of the crime through information systems, the crime of fraud has moved from the basic form of the crime of fraud and gained a qualified state included among the qualified elements within the scope of Article 158 / f of the TPC.

Crypto asset fraud can be carried out with different methods from information systems. In this sense, it is necessary to include the methods of cryptoasset fraud separately for a more detailed and concrete examination. The methods given below do not cover all methods in cryptoasset fraud, and the methods given are not specific to cryptoasset fraud.

Crypto Asset Fraud Methods

(i) Phishing-Smishing-Vishing

This method, which hijacks users’ data by redirecting to fake sites, is a frequently encountered method in practice. Users who are redirected to the fake site are harmed by capturing their name and password.

Users enter their usernames and passwords to the site that they are unaware that it is fake. However, the fraudster enters this information on the real site and accesses crypto assets from the system. This method is encountered by the fraudster in single-degree verification systems or crypto exchange platforms that only log in with a password.

(ii) Ponzi Scheme (Ponzi Scheme)

This method, which first came to the agenda in the 1920s with the name “Ponzi Scheme”, is a fraud method that is completed when the system founders collect investors through an unproductive system and leave the system after providing access to high profit margins in one go.

Founders who develop communication strategies aim to ensure trust in the system and advertisements are an important tool in these systems.

(iii) Deceptive Coin Sale Method

Deceptive coins, which are designed to defraud, are realized through financial manipulation by selling coins that have rapidly increased in value in the market at high prices. Unlike other fraud methods, financial manipulation of the market is carried out on crypto asset exchanges. According to the Capital Markets Law No. 6362 (“CMB”), such manipulation is regulated as a crime under the first and second paragraphs of Article 107 as manipulation of capital market instruments.

Deceptive coin sales and subsequent manipulation on crypto asset exchanges are considered within the scope of qualified fraud since they are carried out through information systems.

(iv) Hidden Crypto Asset Mining (Cryptojacking)

It is unauthorized crypto asset mining without revealing itself on devices by logging into the website such as computers. It is done by installing the crypto mining code on the device as a result of clicking on the e-mail received on the person’s device. However, for this, it is necessary to enter the system with malicious software, then it operates to create crypto assets secretly.

Legal Evaluation of Crypto Asset Fraud Methods

By defrauding crypto assets, people are subjected to material and moral damage. On the one hand, crypto fraud, which provides unfair benefit for the fraudster, creates criminal liability. The crime of defrauding crypto assets can be carried out by the methods described above. In order to commit this crime, it constitutes the crime of entering the information system regulated in the TPC (TPC 243/1) and the crime of preventing access to data in the system, disrupting, deleting and destroying data (TPC 244/2). (2)

The crime of crypto asset fraud must be committed with information systems due to its nature. Crypto asset fraud, which is evaluated within the scope of the crime of fraud regulated in Article 157 of the TPC, is in question by deceiving a person with fraudulent behavior and causing damage and providing benefit to himself or someone else. (3)

Article 158 of the TPC regulates the qualified forms of the crime of fraud. Since crypto asset fraud can be easily realized through information systems, it constitutes the qualified form of the crime of fraud according to Article 158/1 (f) of the TPC. Because committing the qualified fraud crime through information systems facilitates the crime of fraud.

In addition to these, in deceptive crypto asset sales and Ponzi scheme methods, the crime of qualified fraud will occur within the scope of Article 158/1 (g) of the TPC, as it is included in the exploitation of the convenience provided by the press and media organs.

The crime of crypto fraud should be evaluated separately in each concrete case, and the qualified form of the crime of fraud should be determined accordingly.

Legal Intern Meryem Torkay

 

Bibliography

  1. Criminal General Assembly of the Court of Cassation, decision numbered 2017/15-1061 E., 2019/426 K. and dated 14.05.2019.
  2. Sarıkaya, Samet. Samet Sarıkaya, Anadolu University Publications, July 2023, pp.573-592.
  3. Sağır, Albayrak. Misuse of Data Mining in Cyber Crimes. December 2024.

 

 

 

ShareTweetShare
Previous Post

Arbitration and Court Intervention

Next Post

Investor Risks in Blockchain and Digital Payments

Related Posts

Konkordato

The Concordat Process in Terms of the Debtor and Creditor

Article 4 “Postponement of Bankruptcy” of the Statutory Decree No. 669 published in the Official Gazette dated 31.07.2016 numbered 29787,...

Elektrikli Araç Şarj İstasyonları Kurulmasının Hukuki Boyutu

Legal Aspects of the Installation of Electric Vehicle Charging Stations

Introduction Environmental sustainability and energy efficiency have turned into priorities for emerging technologies in the face of the escalating climate...

Jeopolitik Risklerin Uluslararası Ticaret Sözleşmelerine Etkisi

The Impact of Geopolitical Risks on International Trade Contracts

International trade continues to be shaped by global geopolitical developments in 2025. It is an indisputable fact that geopolitical risks...

How To Prepare For An Initial Public Offering

The first step is the adoption of a board resolution and then the formation of a team of mid-level managers,...

Yürürlüğe Giren “İklim Kanunu” Çerçevesinde Hukuki Değerlendirme

A Legal Analysis on the Recently Enacted “Climate Law”

1. Introduction Climate change and the ensuing climate crisis have evolved into a global issue that necessitates future action plans...

An Intellectual Asset, What is a Brand?

I. BRAND AS A COMPONENT OF INTELLECTUAL CAPITAL A company's intellectual capital comprises its human capital, organizational structure, and the...

Next Post
Blockchain ve Dijital Ödemelerde Yatırımcı Riskleri

Investor Risks in Blockchain and Digital Payments

Latest Posts

Uluslararası Taşımacılıkta CMR Hükümleri

CMR Convention on International Carriage of Goods

Dijital Dönüşümün Ticari Ekosistemi Etkilemesinin Rekabet Hukuku Alanında İncelenmesi

An Analysis Of Digital Transformation’s Impact On Business Ecosystems Within The Framework Of Competition Law

İnşaat Sözleşmelerinde İş Sahibi’nin Haksız Feshi

Owner’s Wrongful Termination of Construction Contracts

Elektrikli Araç Şarj İstasyonları Kurulmasının Hukuki Boyutu

Legal Aspects of the Installation of Electric Vehicle Charging Stations

Transfer Fiyatlandırması Yoluyla Örtülü Kazanç Aktarımı

Disguised Profit Distribution Through Transfer Pricing

Siber Sigorta Poliçelerinde Algoritmik Risk Skorlaması

Algorithmic Risk Scoring in Cyber Insurance Policies

  • About
  • Contact

© 2024 Şengün Partners

No Result
View All Result
  • Investment Advisory In Türkiye
    • Company Formation
    • Foreign Shareholder
    • Concessions – Incentives
    • Tax Liabilities
    • Insurance
    • Real Estate Purchases
    • Risk, Compliance and Regulation
    • International Logistics
    • ESG
    • Competition
    • Trade Union Consulting
    • Region Selection
    • Digital Transformation
    • Information Technology Consultancy
  • Articles
  • Turkish Citizenship and Immigration
    • Acquisition of Turkish Citizenship
    • Work Permit
    • Residence Permit
    • Family Law for Foreigners
    • Criminal Law for Foreigners
    • Intellectual Property for Foreigners
    • Administrative Practices for Foreigners
  • International Disputes
    • Local and International Dispute Resolution
    • Arbitration/ Recognition /Adjudication
  • Announcements
  • About
  • Contact
  • English
    • Deutsch
    • Français
    • Türkçe
    • Español
    • Italiano

© 2024 Şengün Partners