Академический Документы
Профессиональный Документы
Культура Документы
by Kilian Strauss
The internet increasingly becomes a key tool for money launderers.
What is money laundering?
According to UN estimates1, criminals across the world launder each year funds totalling between
USD 800m and 2 trillion derived from various criminal activities, such as drugs trafficking, arms
smuggling, trafficking in human beings, corruption, fraud and others.
This represents some 2-5% of global GDP and would constitute one of the most important
economic activities across the world, if so qualified. What it does however constitute is a
significant loss to economies, treasuries and people everywhere, as these sums bypass state
budgets and thus do not contribute to social spending. All they do is illicitly enrich criminal
individuals and groups.
Although money laundering and most related predicate crimes are outlawed across much of the
world, there are significant differences between different legislations, as some countries for
example do not consider tax evasion a crime or (alas!) the paying of bribes.
International efforts to combat money laundering
The laundering of illegal proceeds is not a new phenomenon: the international community has
been actively seeking to combat it for more than two decades, driven by the initiatives of a
number of developed countries, as well as a range of international institutions, above all the key
standard setting institution in the field, the Financial Action Task Force (or FATF)2. Its main
instrument are the Forty Recommendations on Combating Money Laundering and Terrorist
Financing, first adopted in 1990 and regularly amended since3. The Recommendations are
complemented by a number of key international conventions, above all the UN Convention on
the Suppression of Terrorist Financing of 19994, the 1988 United Nations Convention Against
Illicit Traffic in Narcotic Drugs and Psychotropic Substances5, as well as the UN Convention
against Transnational Organised Crime of 20006 and the UN Convention against Corruption of
20037, as well as the corresponding regional instruments, such as the EU Directives on
Combating Money Laundering8 and Terrorist Financing and the relevant Council of Europe
Conventions9.
As a result, national anti-money laundering regimes and international co-operation mechanisms
across the world have been considerably strengthened over the past decade, making it
increasingly difficult for criminals to exploit loopholes in national legal frameworks. Most
developed countries banking systems have by now adopted measures that make it significantly
harder to launder funds through established financial channels.
www.unodc.org/unodc/en/money-laundering/globalization.html
www.fatf-gafi.org
3
http://www.fatfgafi.org/topics/fatfrecommendations/documents/internationalstandardsoncombatingmoneylaunderingandthefinanci
ngofterrorismproliferation-thefatfrecommendations.html
4
www.un.org/law/cod/finterr.htm
5
www.unodc.org/pdf/convention_1988_en.pdf
6
www.uncjin.org/Documents/Conventions/dcatoc/final_documents_2/convention_eng.pdf
7
www.unodc.org/unodc/en/treaties/CAC
8
http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex%3A32015L0849
9
http://www.coe.int/t/dg1/legalcooperation/economiccrime/MoneyLaundering/default_en.asp
2
quick,
discrete,
secure,
and global.
A near perfect tool meeting all these conditions is the internet: an extremely swift, relatively
secure, almost anonymous and truly global instrument. Due to its decentralised structure, the
internet has increasingly become the mechanism of choice of many criminals to channel funds
from one location to another, sometimes in mere minutes and, if handled professionally, without
leaving too many traces, in particular when resorting to the deep web. Although most of the
amounts thus shifted are currently thought to be relatively small compared to the overall volume
of funds laundered, the practice of using the internet as a tool to hide the origins of illicit funds
is growing fast. And as criminals and terrorists across the world get increasingly cyber-savvy,
they make more and more use of the above mentioned advantages of the internet, always staying
several steps ahead of law enforcement officers, who are only gradually getting to grips with the
virtually unlimited possibilities of the World Wide Web.
In order to successfully prevent and combat money laundering and terrorist financing over the
internet, we have to understand how illicit funds can be transferred by way of mouse clicks.
Typical examples of cyber-laundering
Let us therefore look at some typical examples of cyber-laundering, used both by criminals and
terrorists, as explained, by Minwoo Yun of Hansei University10: money can be laundered over
the internet through fake online auctions, online sales, online gambling websites as well as online
games, virtual worlds etc. One recent example of cyber laundering that went around the world is
Liberty Reserve, which allowed criminals to launder illicit funds in huge proportions (said to
total over USD 6bn). Other new means of payments that have the potential to be used by
criminals are the virtual currency Bitcoin or Second Lifes virtual currency, the Linden dollar.
Criminals also increasingly resort to the use of prepaid storage/payment cards, different forms of
e-money (e.g. ekash), paypal accounts or payments over mobile phones (mobile payments, e.g.
M-PESA).
The laundering of funds over the internet and through mobile phones is made particularly easy
by the growing use of peer-to-peer transactions, i.e. funds are directly transferred from one
individual to another, without the interaction of a third party, such as a financial institution, thus
avoiding financial oversight and potential detection. Besides, even if the funds transit through
the financial system, they may not always trigger alerts of detection software, especially if they
remain below certain thresholds. Illegal means can therefore often easily be moved around the
world, criminal proceeds laundered or terrorist organisations funded in ways that escape
detection by compliance systems or law enforcement.
10
www.itu.int/ITU-D/asp/CMS/Events/2011/CyberCrime/S3_Minwoo_Yun.pdf