Verified Document

Analyzing The Illicit Finance Essay

Illicit Finance Why is the internet important to money laundering?

A large number of nations now have aggressive policies in place against money laundering, rendering it exceedingly difficult for offenders to apply traditional money laundering tactics. But this also leads them to strive at creating new tactics with the Internet being one of the popular new modes they employ (Kassner, 2013).

Globalization and the Internet have made it possible to pay for services online. Several online merchants and customers make use of the numerous web-based payment services available. A number of these individuals aren't eligible to own credit cards or have no bank accounts. Thus, web-based payment services enable them to purchase products/services online and transfer cash directly. Numerous online sellers are very willing to get paid online, since they are cheaper than credit card payments (Delta & Matsuura, 2008).

The web-based payment services may be located anywhere in the world and clients can fund online accounts using credit cards, money order, and wire transfer. The accounts enable them to shop online, gamble, gain access to adult websites, and take part in auctions on the internet. Individuals residing in the United States can even avail themselves of online payment websites located overseas and transfer funds by mail or electronically to their personal accounts (Delta & Matsuura, 2008).

A majority of web-based payment systems come with their own set of terms and conditions. They are under no compulsion to provide consumer protection or follow financial regulations. Thus, an individual who is defrauded might not be able to recover his funds, which is why numerous fraudsters take advantage of such payment systems. These services carry out direct transactions between two parties on an international scale. Hence, they have a major role to play in the practice of money laundering, since a particular nation's jurisdiction is unable to pursue legal action the moment the funds move to a foreign country. While service users make use of payment modes like wire transfer, credit cards, and bank accounts for funding their accounts, a majority of online payment service providers lack suitable recordkeeping and customer identification methods. Thus, when service providers accept cash for funding an account, law enforcers are not able to do anything (Delta & Matsuura, 2008).

Internet-based payment systems offer clients the feature of anonymity, which makes money laundering rather easy to carry out. This makes the Internet a key tool for such offenders (Delta & Matsuura, 2008).

What are some of the anti-money laundering techniques and when can these be most successful?

The global community has prioritized the battle against the illegal practice of money laundering as well as funding of terrorist outfits. Some aims of this endeavor are: protection of the global financial system's stability and integrity; making it harder for criminals to derive any profit out of their criminal actions; and preventing resources from reaching terrorists (IMF, 2016).

Hunting down any deposit's source is an extremely daunting task as roughly 700,000 wire transfers take place per day across the globe. Differentiating clean from dirty money is not easy. Within America, law enforcement and legislation are the two principal means utilized by governmental authorities, for spotting and combating money laundering (Layton, n.d.).

Innumerable legislative acts help the U.S. deal with money laundering, some of which are:

The Money Laundering Control Act of 1986 has identified money laundering as a crime itself, rather than simply a part of some crime. The Money Laundering Suppression Act of 1994 commands banks to institute their respective task forces against money laundering, for weeding out internal suspicious activities, while the U.S. Patriot Act of 2001 establishes compulsory bank patron identity checks and offers resources for tracking alternative/underground banking transactions frequently utilized by terror organizations' money handlers. A more exhaustive list of legislations against money laundering passed by the U.S. government may be obtained in the FDIC: Bank Secrecy Act and Anti-Money Laundering website (Layton, n.d.).

Besides legislation aimed at detecting money-laundering operations, another aspect of the battle is undercover stings. The Atlanta-based sting operation 'Juno' by the Drug Enforcement Administration (DEA), which concluded in the year 1999, is one key example. The operation entailed providing drug traffickers with resources to facilitate money laundering. Undercover agents of the DEA struck bargains with drug traffickers for turning drug dollars into pesos via the Colombian Black Market Peso Exchange. This operation successfully concluded with as many as forty arrests, 3,600 kg of cocaine, and confiscation of drug proceeds amounting to ten million dollars (Layton, n.d.).

What is the connection between terrorism and criminal organizations in terms of illicit finance?

The key area of operation of criminal organizations is profit-making crimes. The organizations are established...

Such organizations glean a cornucopia of wealth; however, their operations are accompanied by innumerable problems as well, include the inability to easily conceal or use the money generated. Sudden utilization of wealth from mysterious sources appears suspicious. Investigators can quickly find a connection between illegal activities, cash generated, and the criminal (Thony, 2002).
Therefore, criminal organizations find it essential to, (1) Wipe out the connection between the cash and associated crime; (2) Obliterate the connection between the cash and the person now owning it, and lastly (3) Safeguard the income against being confiscated. The aforementioned activities represent money-laundering's very nature, which typically develops in the following three stages:

1. Introduction of funds derived out of crime into the financial/banking system: The first stage is now increasingly risky, on account of the intensified focus of suspicious cash movements by authorities in law enforcement organizations, and the current widespread obligation of banks to report any suspicious cash transfer.

2. Money laundering stage or Subjecting the funds to a sequence of financial processes, aimed at misleading investigators and making them appear like 'clean money': This step typically makes use of offshore mechanisms. Several transfers between launderers' banks and financial havens, interspersed by devices like false loans and false invoices, eventually deceive investigators with regard to the cash source.

3. Reintroduction of funds into legal economy, via consuming luxury items: This is crucial to money launderers, as profitable criminal outfits aim at, firstly, being able to use up their black money. This they achieve by investing in usual assets (e.g., real estate, company shares, etc.), investing in cinemas, hotels, casinos, restaurants, and other economic entities themselves capable of turning into money laundering tools, and businesses wherein cash payments are the norm (so dirty money mingles easily) (Thony, 2002).

One may view terrorism funding and money laundering as separate activities. Criminal-fund laundering attempts to legalize dirty money, while terrorist-finance laundering attempts to obscure legal assets (e.g., supposed charities or public funding). The above distinction is of no use, as public policies endeavor to tackle the problem of the funds and their source rather than the problem of dirty money processing. In this respect, terrorist and criminal assets pose similar threats to public institutions and financial systems. Also, clearly, the strategies devised for fighting offenders when they guide funds across financial systems might be equally successful in fighting the issue of terrorist financing (Thony, 2002).

Additionally, mysterious ties usually unite terrorism and organized crime. Some kind of dispassionate alliance develops between terrorist and criminal organizations in several cases, fueled by their converging interests: terror groups profit from the funds criminal gangs generate, whereas the latter successively gain from guerilla and terrorist groups' ability of doing damage. The bizarre similarity between guerilla/terror movements' geography and that of drug lords is self-explanatory. FARC (Revolutionary Armed Forces of Colombia) movements are observed in coca-growing regions, whereas Africa's civil wars have been occurring in places where natural resources (like precious stones) are extracted. Meanwhile, Myanmar's Khun Sa group and Afghanistan's Al-Qaeda carry out their operations in the largest opium-growing areas of the world. Cambodia, Sri Lanka, Chechnya, and the Balkans are also areas of interest to those attempting to study how ideology becomes a cover for criminal organizations organized crime, or how such organizations aid terrorist activities (Thony, 2002).

Are there smoking guns for black market illicit finance? How are they detected and why are they important?

The biggest challenge is terror groups' awareness of state efforts at stymieing their activities; consequently, they adjust their activities accordingly. In Napoleoni's view, terrorist financing undergoes constant mutation, and this serves to ensure they are always one step ahead. Terror groups increasingly depend on counterfeiting, smuggling and other illicit trades for generating cash that cannot be easily tracked via the financial system. They are also now relying more on hard cash, to avoid leaving paper trails. Napoleoni claims that much of Al-Qaeda funding in Iraq enters the nation via cash-laden couriers. The London bombings of July 2005 were also financed wholly by untraceable cash (Kaplan, 2006).

The aforementioned 2005 attacks draw attention to another terrorist funding-related development: domestic source employment in attack planning and financing. Citizens of Britain planned the bombings within their homeland and raised money locally to fund them. As plotters only utilized cash and took care not to cross national boundaries, tracing their financial dealings was difficult. Furthermore, implementation of novel financial laws…

Sources used in this document:
References

Delta, G., & Matsuura, J. (2008). Law of the Internet. Aspen Publishers Online. Retrieved from https://www.techopedia.com/2/29789/internet/world-wide-web/money-laundering-the-internet-way

IMF. (2016). Anti-Money Laundering/Combating the Financing of Terrorism. Retrieved from https://www.imf.org/external/np/leg/amlcft/eng/aml1.htm

Kaplan, E. (2006). Tracking Down Terrorist Financing. Retrieved from http://www.cfr.org/terrorist-financing/tracking-down-terrorist-financing/p10356#p6

Kassner, M. (2013, Dec). Money Laundering, the Internet Way. Retrieved from Techopedia: https://www.techopedia.com/2/29789/internet/world-wide-web/money-laundering-the-internet-way
Layton, J. (n.d.). How Money Laundering Works. Retrieved from http://money.howstuffworks.com/money-laundering6.htm
Thony, J. (2002). Money Laundering and Terrorism Financing: An Overview. Retrieved from IMF: https://www.imf.org/external/np/leg/sem/2002/cdmfl/eng/thony.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

Countering Illicit Finance a Number
Words: 1348 Length: 4 Document Type: Essay

Criminal gangs do exploit global trade networks using confusing documentation associated with legitimate business transactions. Such criminals ideally make use of Trade-Based Money Laundering (TBML). This is a scheme that Colombian drug cartels have capitalized on. Homeland Security Intelligence has in this regard instituted Trade Transparency Unit (TTU) to counter TCOs resolve to launder illicit proceeds through manipulation of international trade and financial systems. The TTU partners with foreign

Explication of Insider Trading
Words: 1448 Length: 4 Document Type: Essay

Wealth, Power and Insider Trading on Wall Street In today's increasingly internationalized worldwide economic system, defined by the expansion of multinational corporate conglomerates into foreign shores, the necessity for effective and efficient financial regulation to prevent criminal conduct covered by the catchall term "insider trading" has never been greater. Whereas autonomous countries once maintained clear authority over businesses which were built on their shores, through levying taxes, enforcing fiscal regulations, and

Offshore Financial Centres and Their
Words: 22477 Length: 60 Document Type: Dissertation

Because the home country is not required to reimburse foreign depositors for losses, there is no corresponding financial penalty for lax supervision; there is, though, a benefit to the country with lenient regulatory policies because of increased revenues generated and the employment opportunities these services provide (Edwards 1999). Furthermore, banks seeking to conduct multinational business are attracted to countries where incorporation laws and the regulatory framework offer less regulatory oversight

How Can We Make Profit Through Investing on Stock Market
Words: 11006 Length: 33 Document Type: Dissertation

profit through investing on Stock Market Generally, all over the world financial markets exemplify a state of intricate and inscrutable situation. These marketplaces are of immense significance in the western nations, where the constituents employ their expertise to invest and generate profit whilst formulating a pool of funds, statistics, derivatives, shares and calculation intricacy. These constituents or elements are those investment maestros who are the whole and sole performers of

Principal-Agent Model in Economics and Political Science
Words: 12148 Length: 45 Document Type: Dissertation

Principal-Agent Model in Economics and Political Science The international political perspectives of free trade A Global Analysis International Trade Impact on Tunisia The Export of agricultural products International trade and development of Tunisia Balance in the Trade Regime Imports and exports of Tunisia Exports Imports Coping With External and Internal Pressures The Common External Tariff (CET) Safeguard Measures Anti-Dumping Duties (ADDs) and Countervailing Duties (CVDs) Rules of origin The New Commercial Policy Instrument Sector Based Aspects GATT/WTO's Main Principles Non-discriminatory trade Multilateral negotiation and free trade The Trading Policies

Future of Eurasian Organized Crime
Words: 7401 Length: 25 Document Type: Term Paper

Ashley, Assistant Director, Criminal Investigative Division of the FBI relates that in 1991: "...the U.S. Attorney's office in Los Angeles charged 13 defendants in a $1 billion false medical billing scheme that was headed by two Russian emigre brothers. On September 20, 1994, the alleged ringleader was sentenced to 21 years in prison for fraud, conspiracy, racketeering, and money laundering. He was also ordered to forfeit $50 million in

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now