Skip to main content

Advertisement

Log in

The nexus of information technologies and illicit financial flows: phenomenon and legal challenges

  • Article
  • Published:
ERA Forum Aims and scope

Abstract

The emerging concept of illicit financial flows has recently become a very topical issue on the international agenda. Due to the relative newness of this concept, there is still a lack of research on the nexus between these flows and information technologies, in particular, the internet. This paper seeks to contribute to the research on this problem from a broader perspective, linking the previously disconnected issues of traditional organised crime, online crime, and money laundering to the concept of illicit financial flows on the internet, before debating the related legal challenges.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Notes

  1. OECD [25]; Goredema [19].

  2. UNECA [39]; World Bank [44].

  3. For example, according to some of the assessments, nearly US$1 trillion of illicit funds shifts out of emerging markets and developing countries annually, Global Financial Integrity [17]; ONE [26].

  4. World Bank [44].

  5. UNECA [39]; World Bank [44].

  6. Global Financial Integrity [17].

  7. Blankenburg/Kahn [4].

  8. Perez/Olivie [28].

  9. UNECA [39].

  10. Tropina [36].

  11. For example, according to KPMG research, in 2014 the prices for stolen credit cards credentials varied Credit from $0.25–$100 per item, debit cards information costed approx. $9.55, stolen usernames and passwords—$5.60 per item, Fowler [15].

  12. Fallmann/Wondracek/Platzer [11].

  13. Ben-Itzhak [2], Tropina [38].

  14. Europol [10].

  15. Wueest [45].

  16. Wueest [45].

  17. SecureWorks [32].

  18. SecureWorks [31].

  19. SecureWorks [32].

  20. Williams [43], p. 2.

  21. Goodman [18].

  22. Houses of Parliament [22].

  23. Bertrand [3].

  24. Greenberg [21]; Bertrand [3].

  25. Greenberg [20].

  26. Europol [9].

  27. Europol [9].

  28. Tropina [36].

  29. OECD [25].

  30. OECD [25].

  31. Tropina [36].

  32. Ghosh [16], p. 18.

  33. UNECA [39].

  34. Placement—depositing money into the financial system; layering—distancing money from its source through the series of transactions; integration—the commingling of money with funds in legal sectors.

  35. Filipkowski [14].

  36. National Drug Intelligence Centre [24].

  37. Tropina [37].

  38. Council of Europe [6], p. 36.

  39. FATF [12].

  40. Council of Europe [6]; Thomason [34]; Weaver [42].

  41. Villasenor/Bronk/Monk [41]; LIRNEasia/UP-NCPAG [23].

  42. Richet [30]; Piller/Zaccariotto [29]; Tropina [37].

  43. Bryans [5]; Europol [9]; TRACFIN [35].

  44. Filipkowski [14]; Council of Europe [7]; Fiedler [13].

  45. Europol [9].

  46. TRACFIN [35].

  47. TRACFIN [35].

  48. Weaver [42], p. 455; Filipkowski [14], pp. 20–21, Tropina [37].

  49. Shields [33]; De Nardis [8]; Abelson et al. [1].

  50. Abelson et al. [1].

  51. Pena [27], p. 41.

  52. Van der Wagen/Pieters [40].

  53. Thomason [34], p. 24; Tropina [36].

References

  1. Abelson, H., Anderson, R., Bellovin, S.M., Benaloh, J., Blaze, M., Diffie, W., Gilmore, J., Green, M., Landau, S., Neumann, P.G., Rivest, R.L., Schiller, J.I., Schneier, B., Specter, M., Weitzner, D.J.: Keys under doormats: mandating insecurity by requiring government access to all data and communications (2015). Available at: http://www.crypto.com/papers/Keys_Under_Doormats_FINAL.pdf

  2. Ben-Itzhak, Y.: The Cybercrime 2.0 Evolution. ISSA Journal (2008). Available at: http://professor.unisinos.br/llemes/Aula01/CybercrimeEvolution

  3. Bertrand, Silk, N.: Road wasn’t even close to the biggest drug market on the internet (2015). Available at: http://uk.businessinsider.com/silk-road-wasnt-even-close-to-the-biggest-drug-market-on-the-internet-2015-6?r=US&IR=T

  4. Blankenburg, S., Kahn, M.: Governance and illicit flows. In: Reuter, P. (ed.) Draining Development?: Controlling Flows of Illicit Funds from Developing Countries? The World Bank, Washington (2012). Available at: https://openknowledge.worldbank.org/bitstream/handle/10986/2242/668150PUB0EPI0067848B09780821388693.pdf

    Google Scholar 

  5. Bryans, D.B., Laundering, M.: Mining for an effective solution (August 29, 2013). Indiana Law J. 89(1), 441 (2014). Available at SSRN: http://ssrn.com/abstract=2317990

    Google Scholar 

  6. Council of Europe: Moneyval report: criminal money flows on the internet: methods, trends and multi-stakeholder counteraction (2012). Available at: http://www.coe.int/t/dghl/monitoring/moneyval/typologies/MONEYVAL(2010)9_Reptyp_full_en.pdf

  7. Council of Europe: The use of online gambling for money laundering and the financing of terrorism purposes. Research report (2013). Available at: http://www.coe.int/t/dghl/monitoring/moneyval/Typologies/MONEYVAL(2013)9_Onlinegambling.pdf

  8. DeNardis, L.: Internet architecture as proxy for state power. IP Justice Journal. Internet Governance and Online Freedom Publication Series (2015). Available at: http://www.ipjustice.org/digital-rights/internet-architecture-redesign-as-proxy-for-state-power-by-laura-denardis/

  9. Europol: The Internet Organised Crime Threat Assessment (iOCTA) (2014). Available at: https://www.europol.europa.eu/content/internet-organised-crime-threat-assesment-iocta

  10. Europol: Threat assessment (abridged). Internet facilitated organised crime. iOCTA. File No.: 2530-264. The Hague (7 January 2011). Available at: https://www.europol.europa.eu/sites/default/files/publications/iocta.pdf

  11. Fallmann, H., Wondracek, G., Platzer, C.: Covertly probing underground economy marketplaces. Vienna University of Technology Secure Systems Lab (2010). Available at: http://www.iseclab.org/papers/dimva2010_underground.pdf

  12. FATF: Money laundering & terrorist financing vulnerabilities of commercial websites and internet payment systems (2008). Available at. http://www.fatf-gafi.org/

  13. Fiedler, I.: Online gambling as a game changer to money laundering? (30 April 2013). Available at: SSRN: http://ssrn.com/abstract=2261266

  14. Filipkowski, W.: Cyber laundering: an analysis of typology and techniques. Int. J. Crim. Justice Sci. 3(1), 15–27 (2008)

    Google Scholar 

  15. Fowler, K.: Being cyber resilient. KPMG Insurance Issues Conference (1 December 2014). Available at: https://www.kpmg.com/Ca/en/IssuesAndInsights/ArticlesPublications/Evolving-Regulation-Series/Documents/Being-Cyber-Resilient.pdf

  16. Ghosh, A.: How to prevent fraud in the Indian telecom industry. J. Adv. Anal. 3Q, 18 (2012). Available at: https://www.sas.com/news/intelligence_quarterly/q312.pdf

    Google Scholar 

  17. Global financial integrity: illicit financial flows (2014). Available at: http://www.gfintegrity.org/wp-content/uploads/2014/09/GFI-Analytics.pdf

  18. Goodman, M.: International dimensions of cybercrime. In: Ghosh, S., Turrini, E. (eds.) Cybercrimes: A multidisciplinary Analysis. Springer, Berlin/Heidelberg (2010)

    Google Scholar 

  19. Goredema, C.: Combating illicit financial flows and related corruption in Africa: towards a more integrated and effective approach. U4 Issue (12) (October 2011)

  20. Greenberg, A.: Agora, the Dark Web’s biggest drug market, is going offline. Wired (26 August 2015). Available at: http://www.wired.com/2015/08/agora-dark-webs-biggest-drug-market-going-offline/

  21. Greenberg, A.: Drug market ‘Agora’ replaces the Silk Road as king of the dark net. Wired (2014). Available at: http://www.wired.com/2014/09/agora-bigger-than-silk-road/

  22. Houses of Parliament: The darknet and online anonymity. Postnote number 488 (MArch 2015). Available at: www.parliament.uk/briefing-papers/POST-PN-488.pdf

  23. LIRNEasia & UP-NCPAG: Mobile banking, mobile money and telecommunication regulations (2008). Available at: http://lirneasia.net/wp-content/uploads/2008/05/Mobile-2.0_Final_Hor_EA.pdf

  24. National drug intelligence center money laundering in digital currencies. US Department of Justice (2008). Available at: http://www.justice.gov/archive/ndic/pubs28/28675/28675p.pdf

  25. OECD: Addressing the tax challenges of the digital economy, OECD/G20 Base Erosion and Profit Shifting Project. OECD Publishing (2014). Available at: http://www.oecd.org/ctp/tax-challenges-digital-economy-discussion-draft-march-2014.pdf

  26. ONE: Trillion dollar scandal (2014). Available at: https://s3.amazonaws.com/one.org/pdfs/Trillion_Dollar_Scandal_report_EN.pdf

  27. Pena, J.D.: Exporting criminality: money laundering in a domestic and international context (2009). Available at: http://web.stanford.edu/group/journal/cgi-bin/wordpress/wp-content/uploads/2012/09/Pena_SocSci_2009.pdf

  28. Perez, A., Olivie, I.: Europe beyond aid: illicit financial flows policy responses in Europe. Center for Global Development. Consultation Draft (2014). Available at: http://www.cgdev.org/sites/default/files/Europe-Beyond-Aid-Illicit-Financial-Flows_0.pdf

  29. Piller, G., Zaccariotto, E.: Cyber-laundering: the union between new electronic payment systems and criminal organizations. Transit. Stud. Rev. 16(1), 62–76 (2009)

    Article  Google Scholar 

  30. Richet, J.-L.: Laundering money online: a review of cybercriminals methods. Tools and resources for anti-corruption knowledge. United Nations Office on Drugs and Crime (UNODC), (1 June 2013). Available at: arXiv:1310.2368

  31. SecureWorks: The next generation of cybercrime: how it’s evolved, where it’s going. Executive Brief (2010). Available at: secureworks.com

  32. SecureWorks: Underground hacker markets (December 2014). Available at: http://www.secureworks.com/assets/pdf-store/white-papers/wp-underground-hacking-report.pdf

  33. Shields, P.: When the ‘information revolution’ and the US security state collide. Money laundering and the proliferation of surveillance. New Media Soc. 7(4), 483–512 (2005)

    Article  Google Scholar 

  34. Thomason, C.V.: How has the establishment of the internet changed the ways in which offenders launder their dirty money? Int. J. Criminol. (2009). Available at: http://www.internetjournalofcriminology.com/Thomason_Internet_Money_Laundering_July_09.pdf

  35. TRACFIN: Regulating virtual currencies. Recommendations to prevent virtual currencies from being used for fraudulent purposes and money laundering (2014). Available at: http://www.economie.gouv.fr/files/regulatingvirtualcurrencies.pdf

  36. Tropina, T.: Do digital technologies facilitate illicit financial flows? Background paper for the World Development Report 2016, World Bank, Washington, DC (2015)

  37. Tropina, T.: Fighting money laundering in the age of online banking, virtual currencies and internet gambling. ERA Forum 15(1), 69–84 (2014)

    Article  Google Scholar 

  38. Tropina, T.: Organised crime in cyberspace. In: Heinrich-Böll-Stiftung, Schönenberg, R. (eds.) Transnational Organized Crime. Analyses of a Global Challenge to Democracy, pp. 47–60. Transcript Verlag, Bielefeld (2013)

    Google Scholar 

  39. UNECA: Illicit financial flows. Report of the high level panel on illicit financial flows from Africa (2015). Available at: http://www.uneca.org/sites/default/files/PublicationFiles/iff_main_report_26feb_en.pdf

  40. Van der Wagen, W., Pieters, W.: From cybercrime to cyborg crime: botnets as hybrid criminal Ac tor-networks. Br. J. Criminol. 55(3), 578–595 (2015)

    Article  Google Scholar 

  41. Villasenor, J., Bronk, C., Monk, C., Figures, S.: Tracking illicit financial transactions in the murky world of digital currencies, peer-to-peer networks, and mobile device payments. Paper, The Brookings Institution and the James A. Baker III Institute for Public Policy, (2011). Available at: http://bakerinstitute.org/media/files/Research/d9048418/ITP-pub-FinancialTransactions-082911.pdf

  42. Weaver, S.J.: Modern day money laundering: does the solution exist in an expansive system of monitoring and record keeping regulations? Annu. Rev. Bank. Law Financ. Law 24, 443–465 (2005)

    Google Scholar 

  43. Williams, P.: Organized crime and cyber-crime: implications for business (2002). Available at: http://www.cert.org/archive/pdf/cybercrime-business.pdf

  44. World Bank: Illicit financial flows (IFFs) (2015). Available at: http://www.worldbank.org/en/topic/financialmarketintegrity/brief/illicit-financial-flows-iffs

  45. Wueest, C.: Underground black market: thriving trade in stolen data, malware, and attack services. Symantec official blog (2015). Available at: http://www.symantec.com/connect/blogs/underground-black-market-thriving-trade-stolen-data-malware-and-attack-services

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tatiana Tropina.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tropina, T. The nexus of information technologies and illicit financial flows: phenomenon and legal challenges. ERA Forum 17, 369–384 (2016). https://doi.org/10.1007/s12027-016-0435-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12027-016-0435-2

Keywords

Navigation