首页    期刊浏览 2024年09月21日 星期六
登录注册

文章基本信息

  • 标题:Recent technological tendencies of money laundering.
  • 作者:Dumitrache, Ana-Alina ; Boroi, Alexandru ; Pusca, Florentina
  • 期刊名称:Annals of DAAAM & Proceedings
  • 印刷版ISSN:1726-9679
  • 出版年度:2011
  • 期号:January
  • 语种:English
  • 出版社:DAAAM International Vienna
  • 摘要:Key words: money laundering, cyberspace, virtual casinos, on line auctions, virtual games
  • 关键词:Money laundering

Recent technological tendencies of money laundering.


Dumitrache, Ana-Alina ; Boroi, Alexandru ; Pusca, Florentina 等


Abstract: This paper aims to analysing recent tendencies connected to the development of new technologies in the field of money laundering. Cyberspace offers opportunities for financial criminals to improve their illegal activities, money launderers learn rapidly the electronic payment instruments, the use of virtual casinos, online auctions, and virtual games, ensuring a legal facade in order to seize illicit income. Technological advantages such as speed, complexity, anonymity support money launderers in achieving laundering schemes.

Key words: money laundering, cyberspace, virtual casinos, on line auctions, virtual games

1. INTRODUCTION

The virtual world of the Internet and new technology evolution regarding the means of payment represent for organized criminal groups and implicitly for money launderers a favourable ground for modus operandi. Thus, criminals, through data processing, hide or disguise the illicit origin of revenues.

We consider relevant to this research the study of Peng Weibing on money laundering within the electronic payment system. His scientific approach is developed from two perspectives: the first is the analysis of money laundering within the electronic payment systems and the second is a comparison between electronic and traditional schemes of money laundering. The author proposes among the measures to counter the criminal activities of electronic money launderers the establishment by governments of a perfect system of automatic reporting of electronic payment transactions and he considers essential in this regard, strengthening international exchange and cooperation in the fight against transnational crime of money laundering (Peng, 2011).

Referring to the three stages of money laundering, the author Krzysztof Woda revealed the combination of various electronic payment systems for completing the entire laundering schemes, which is: the prepaid cards for the placement stage, mobile payment systems for the layering stage and electronic gold currency for the integration stage (Krzysztof, 2006). Regarding the vulnerability towards money launderers of the new technologies in electronic payment systems, Andrew Zerzan author concludes by stating that these channels have the unique risk to be the target of offenders' abuse, especially the financial crime because of the ambiguity of their legal regime (Zerzan, 2010).

The analysis and synthesis of empirical concerns on the matter, the investigation of the evolving money laundering techniques presented in the specialized literature and reported by case law and the analysis of indirect indicators such as information provided by FATF documents are the used methods in achieving this study. The criminal activity of electronic money launderers, regardless of the point of view that is tackled, legally or technically, is a new area which requires extensive research.

This research is useful to a future study of the methods always "updated" and adapted by money launderers to the technological evolution. The analysis of these tendencies is likely to contribute to the discovery of new methods, tendencies and other areas threatened by money laundering.

We believe that, in order to counter money laundering committed by the new electronic means, it is necessary the involvement of the entire international community. The Financial Intelligence Units must continually improve their performance in software development in order to prevent such criminal activity.

2. MONEY LAUNDERING PROCESS

Most definitions of money laundering presented in International Conventions (Vienna Convention, Strasbourg Convention and Palermo Convention), EU Directives (Mitsilegas & Gilmore, 2007) - Directive 91/308/EC, Directive 2001/97/EC relating to preventing the use of financial system for money laundering purposes, Directive 2005/60/EC on the prevention of financial system for money laundering and financing the acts of terrorism) 40 + 9 Recommendations of the FATF experts, the foreign specialised literature and also the Romanian literature and law (Law no. 656/ 2002), have in common the achievement of actions with the intent to change or transfer goods having the purpose of hiding or concealing their illicit origin, knowing that they are products of crimes. Money laundering is a complex process accomplished, usually in the traditional scheme of the three stages, namely: placement, layering and integration (Bogdan, 2010).

The placement consists of the offender's attempt to bring illegal money in the financial system, involving the physical movement of money, in order to put a distance between them and the illicit source of funds, avoiding their confiscation.

The introduction of illegal profits in the financial system can be done by splitting the cash in smaller amounts (below the minimum reporting threshold). In this stage, online payment systems present a risk in terms of customers' anonymity, rendering difficult monitoring the transactions that form the channel for dirty money, because of the possibility of customers' multiple registration, detecting the source of the money due to used payment instruments (FAFT, 2010).

Layering is the movement of money between different accounts, in order to hide their source. In other words, criminals want to erase any connection between the illicit source and the money. At this stage, money launderers resort to making cash placed in various instruments of payment (checks, promissory exchange) or purchase real estate. Referring to the two phases of money laundering, Aaron Elkins exemplifies the hypothesis of dividing the illicit cash in more checks, then transmitted electronically from the A account of Bank 1 to B account in Bank 2, dividing and recombining so that illegal origins of the cash will be lost somewhere in cyberspace (Elkins, 2010).

The integration of whitening capital in the economic and financial circuit is the final stage of money laundering. It is the objective pursued by criminals, to have a legal facade to the illegally obtained income.

Specific to this stage is the purchase by money launderers through the commercial website, of some valuable items, precious metals, real estate, and for their payment they use electronic systems (FAFT, 2010).

3. CYBERSPACE--NEW OPPORTUNITIES FOR MONEY LAUNDERERS

The claim that the Internet has changed the world is a truism. Important aspects of people's lives have become dependent on a binary language expressed in bits and bytes (Pahlsson, 2002). Thus, with the advent of the Internet and electronic payment options, they have expanded their mode of operation into cyberspace.

In the following we will analyse briefly the key virtual financial instruments used by criminals, such as: online payment systems, virtual casinos and gambling and online auctions.

Electronic Payment Systems--the major electronic payment instruments are: card, electronic money, and electronic wallet.

The best known techniques used by money launderers in the electronic payment systems are the electronic transfers (using a false identity, trading money through offshore companies); investing the electronic money into financial products (bank checks, bonds and shares) or in virtual gold.

The role of electronic payment systems is very well defined in money laundering matters in relation to companies, there are the transfers via SWIFT.

In the Report of New Payments Methods, in October 2010, FAFT does not include in the electronic payment systems category the mobile prepaid cards, having rather the feature of intermediary value reserve (FAFT, 2010). (fig. 1)

Virtual casinos--The illusion of legality of some illegal money and the transfer of such amounts can be achieved through casinos as well. The casino's websites offer visitors the experience of a real casino games (Lilley, 2006).

To access the games on the virtual casino's website, there must be created an account on the website, download the gamming software and use a credit card or electronic funds transfer service to cover the bets and gambling earnings (Dvorak, 2004).

Money launderers speculate the possibility that the virtual casino websites offer, they ask them to send money coming from illicit sources in the accounts that they open on these websites, thus justifying the origin of money from gaming winnings (Bogdan, 2010).

On line auctions--There is a special attraction of financial criminals for online auctions, especially when buyers bid for an asset of some value, and in return they receive a counterfeit good or nothing at all (Newton & Jents, 2007).

Money launderers may use online auctions, by increasing the price of a bid good, so the seller receives a considerable amount from the buyer, whose origin is illicit, which then is integrated by the vendor in the legal commercial activities.

Virtual Games--The emergence of virtual games such as Entropia Universe and Second Life, offer new opportunities for money launderers to transfer or conceal fraudulent income. The players involved in virtual games through the so-called Avatar, selling virtual goods and properties for a real compensation.

These avatars were able to enrich people that sell virtual goods.

[FIGURE 1 OMITTED]

Players can convert virtual money into real money by simply selling them on the auction websites. In the virtual world of games, a person who retains its anonymity, pays no taxes and is not obliged to report can produce significant amounts of financial products (Miller & Jentz, 2007). Money launderers use virtual games because the virtual products can be purchased and transferred anywhere, and once the funds are withdrawn from a virtual account, they are considered legal and their source cannot be identified.

4. CONCLUSIONS

Money Laundering in Cyberspace has new meanings that can be discovered and studied. If so far most of the money laundering offenses were detected in the first stage, the placement, the emergence of electronic money allows criminals to easily overcome this stage. Electronic payment instruments are used by money launderers in certain situations: the payment of the divided cash or card transactions made on behalf of the true owner of the card. We note that the benefits of the Internet are outweighed by the increased potential that these technologies are being used illegally, the money launderers often resorting to new technologies to take advantage of the amounts obtained from committing crimes.

5. REFERENCES

Bogdan, C. (2010). Money laundering. Theoretical and practical approaches. Bucharest: Universul juridic

Dvorak, J. e. (2004). ON-LINE! The Book. New Jersey: Prentice Hall PTR

Elkins, A. (2010). Twenty Blue Devils. New York: E-Rights/E-Reads

FAFT. (2010). Money Laundering Using New Payment Methods. Paris: FAFT/OECD

Krzysztof, W. (2006). Money Laundering Techniques with Electronic Payment Systems. International&Security. An International Journal, 27-47

Lilley, P. (2006). Dearty Dealling: the untold truth about global money laundering, international crime and terrorism. Cornwall: Kogan Page

Miller, M. & Jentz, G. (2007). Business Law Today: The Essentials. Cengage learning

Mitsilegas, V. & Gilmore, B. (2007). The EU Legislative Framework Against Money Laundering and Terrorist Finance: A Critical Analysis in The Light of Evolving Global Standards. International and Comparative Law Quarterly, 119-140

Newton, M & Jents, G. (2007). The Encyclopedia of American Law Enforcement. New York: Infobase Publishing

Pahlsson, R. (2002). The E-com Strain Tax Law Concepts. European Business Organisation Law Review, 195-210

Peng, W. (2011). Research on Money Laundering Crime under Electronic Payment Background. Journal of Computers, 147-154

Zerzan, A. (2010). New Technologies, New Risks? Washington" The World Bank
联系我们|关于我们|网站声明
国家哲学社会科学文献中心版权所有