{"id":1202,"date":"2022-01-10T17:20:13","date_gmt":"2022-01-10T22:20:13","guid":{"rendered":"https:\/\/www.law.georgetown.edu\/american-criminal-law-review\/aclr-online\/volume-59\/decentralized-finance-identity-protection-and-economic-opportunity-for-both-good-and-bad-actors\/"},"modified":"2025-05-12T11:09:26","modified_gmt":"2025-05-12T15:09:26","slug":"decentralized-finance-identity-protection-and-economic-opportunity-for-both-good-and-bad-actors","status":"publish","type":"page","link":"https:\/\/www.law.georgetown.edu\/american-criminal-law-review\/aclr-online\/volume-59\/decentralized-finance-identity-protection-and-economic-opportunity-for-both-good-and-bad-actors\/","title":{"rendered":"Decentralized Finance: Identity Protection and Economic Opportunity for Both Good and Bad Actors"},"content":{"rendered":"<p>Imagine a world in which a person could take out and then pay\u00a0off millions of dollars of loans without providing their personal\u00a0identification. This world exists for anyone who has an internet\u00a0connection. Anyone with internet access can reach the decentralized\u00a0finance (DeFi) ecosystem, an online network of financial products and\u00a0services that allows people to lend, borrow, buy, and sell directly with\u00a0others. The network of transactions on a DeFi platform are visible in\u00a0real time, but each user transacts under a pseudonym. As such, two key\u00a0features of the DeFi ecosystem are that 1) it promises user\u00a0pseudonymity and 2) there are no central authorities or institutions that\u00a0can deny exchanges or user access to a transaction. DeFi removes the\u00a0middlemen from transactions, allowing any individual to exchange with\u00a0any other individual anywhere in the world.\u00a0DeFi countervails widespread trends toward a data-centric\u00a0economy. In traditional finance where banks are the intermediaries,\u00a0customers must provide personal data before opening an account or\u00a0applying for a loan. Even beyond the banks, personal information is\u00a0widely available. That information may dictate other aspects of a\u00a0person\u2019s economic reality, such as their performance on an employment\u00a0screening test, how much they pay for a seat on an airplane, and the\u00a0types of products advertised to them on their social media platform of\u00a0choice. While our data drives an increasingly large amount of our\u00a0personal and collective economic activity\u2014contributing to\u00a0discrimination11 and information silos\u2014pseudonymous DeFi\u00a0transactions make it harder to discriminate against certain users on DeFi\u00a0platforms. But this comes at a potentially high cost. When anyone in the\u00a0world can invest and exchange on DeFi platforms, the networks become\u00a0vulnerable to malicious actors ranging from attackers who short\u00a0currency to terrorist groups that use DeFi for crowdfunding and idea\u00a0proliferation. This demands tighter regulation of DeFi and strategies\u00a0for patrol and prosecution of national security threats enabled through\u00a0these networks.\u00a0This Essay argues that while there are many advantages to the\u00a0extensive adoption of the DeFi ecosystem, it is necessary to consider\u00a0national security threats that arise as people around the world\u00a0increasingly transact on this market. The existence of DeFi threatens\u00a0national security because bad actors can illicitly finance weapon sales\u00a0and use the identity-free globalized network to expand their influence.\u00a0While certain elements of DeFi improve law enforcement\u2019s ability to\u00a0track, predict and prepare for attacks, other elements of the digitized\u00a0financial system help bad actors evade detection by law enforcement\u00a0domestically and internationally. Part I of this essay will provide a brief\u00a0introduction to decentralized finance. Part II will demonstrate the\u00a0relationship between DeFi and U.S. national security interests. Part III\u00a0will discuss the strategies to mitigate national security risks that\u00a0accompany DeFi, with an emphasis on how access to, and\u00a0accountability over, personally identifiable information shapes threats\u00a0of criminal activity.<\/p>\n<p><a href=\"https:\/\/www.law.georgetown.edu\/american-criminal-law-review\/wp-content\/uploads\/sites\/15\/2023\/02\/59-0-Domino-Decentralized-finance.pdf\">Read More<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Imagine a world in which a person could take out and then pay\u00a0off millions of dollars of loans without providing their personal\u00a0identification. This world exists for anyone who has an [&hellip;]<\/p>\n","protected":false},"author":4766,"featured_media":0,"parent":1191,"menu_order":6,"comment_status":"closed","ping_status":"closed","template":"abstract.php","meta":{"_acf_changed":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"footnotes":"","_tec_slr_enabled":"","_tec_slr_layout":""},"class_list":["post-1202","page","type-page","status-publish","hentry"],"acf":[],"ticketed":false,"_links":{"self":[{"href":"https:\/\/www.law.georgetown.edu\/american-criminal-law-review\/wp-json\/wp\/v2\/pages\/1202","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.law.georgetown.edu\/american-criminal-law-review\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.law.georgetown.edu\/american-criminal-law-review\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.law.georgetown.edu\/american-criminal-law-review\/wp-json\/wp\/v2\/users\/4766"}],"replies":[{"embeddable":true,"href":"https:\/\/www.law.georgetown.edu\/american-criminal-law-review\/wp-json\/wp\/v2\/comments?post=1202"}],"version-history":[{"count":4,"href":"https:\/\/www.law.georgetown.edu\/american-criminal-law-review\/wp-json\/wp\/v2\/pages\/1202\/revisions"}],"predecessor-version":[{"id":1737,"href":"https:\/\/www.law.georgetown.edu\/american-criminal-law-review\/wp-json\/wp\/v2\/pages\/1202\/revisions\/1737"}],"up":[{"embeddable":true,"href":"https:\/\/www.law.georgetown.edu\/american-criminal-law-review\/wp-json\/wp\/v2\/pages\/1191"}],"wp:attachment":[{"href":"https:\/\/www.law.georgetown.edu\/american-criminal-law-review\/wp-json\/wp\/v2\/media?parent=1202"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}