Abstract
The emerging concept of illicit financial flows has recently become a very topical issue on the international agenda. Due to the relative newness of this concept, there is still a lack of research on the nexus between these flows and information technologies, in particular, the internet. This paper seeks to contribute to the research on this problem from a broader perspective, linking the previously disconnected issues of traditional organised crime, online crime, and money laundering to the concept of illicit financial flows on the internet, before debating the related legal challenges.
Similar content being viewed by others
Notes
World Bank [44].
Global Financial Integrity [17].
Blankenburg/Kahn [4].
Perez/Olivie [28].
UNECA [39].
Tropina [36].
For example, according to KPMG research, in 2014 the prices for stolen credit cards credentials varied Credit from $0.25–$100 per item, debit cards information costed approx. $9.55, stolen usernames and passwords—$5.60 per item, Fowler [15].
Fallmann/Wondracek/Platzer [11].
Europol [10].
Wueest [45].
Wueest [45].
SecureWorks [32].
SecureWorks [31].
SecureWorks [32].
Williams [43], p. 2.
Goodman [18].
Houses of Parliament [22].
Bertrand [3].
Greenberg [20].
Europol [9].
Europol [9].
Tropina [36].
OECD [25].
OECD [25].
Tropina [36].
Ghosh [16], p. 18.
UNECA [39].
Placement—depositing money into the financial system; layering—distancing money from its source through the series of transactions; integration—the commingling of money with funds in legal sectors.
Filipkowski [14].
National Drug Intelligence Centre [24].
Tropina [37].
Council of Europe [6], p. 36.
FATF [12].
Europol [9].
TRACFIN [35].
TRACFIN [35].
Abelson et al. [1].
Pena [27], p. 41.
Van der Wagen/Pieters [40].
References
Abelson, H., Anderson, R., Bellovin, S.M., Benaloh, J., Blaze, M., Diffie, W., Gilmore, J., Green, M., Landau, S., Neumann, P.G., Rivest, R.L., Schiller, J.I., Schneier, B., Specter, M., Weitzner, D.J.: Keys under doormats: mandating insecurity by requiring government access to all data and communications (2015). Available at: http://www.crypto.com/papers/Keys_Under_Doormats_FINAL.pdf
Ben-Itzhak, Y.: The Cybercrime 2.0 Evolution. ISSA Journal (2008). Available at: http://professor.unisinos.br/llemes/Aula01/CybercrimeEvolution
Bertrand, Silk, N.: Road wasn’t even close to the biggest drug market on the internet (2015). Available at: http://uk.businessinsider.com/silk-road-wasnt-even-close-to-the-biggest-drug-market-on-the-internet-2015-6?r=US&IR=T
Blankenburg, S., Kahn, M.: Governance and illicit flows. In: Reuter, P. (ed.) Draining Development?: Controlling Flows of Illicit Funds from Developing Countries? The World Bank, Washington (2012). Available at: https://openknowledge.worldbank.org/bitstream/handle/10986/2242/668150PUB0EPI0067848B09780821388693.pdf
Bryans, D.B., Laundering, M.: Mining for an effective solution (August 29, 2013). Indiana Law J. 89(1), 441 (2014). Available at SSRN: http://ssrn.com/abstract=2317990
Council of Europe: Moneyval report: criminal money flows on the internet: methods, trends and multi-stakeholder counteraction (2012). Available at: http://www.coe.int/t/dghl/monitoring/moneyval/typologies/MONEYVAL(2010)9_Reptyp_full_en.pdf
Council of Europe: The use of online gambling for money laundering and the financing of terrorism purposes. Research report (2013). Available at: http://www.coe.int/t/dghl/monitoring/moneyval/Typologies/MONEYVAL(2013)9_Onlinegambling.pdf
DeNardis, L.: Internet architecture as proxy for state power. IP Justice Journal. Internet Governance and Online Freedom Publication Series (2015). Available at: http://www.ipjustice.org/digital-rights/internet-architecture-redesign-as-proxy-for-state-power-by-laura-denardis/
Europol: The Internet Organised Crime Threat Assessment (iOCTA) (2014). Available at: https://www.europol.europa.eu/content/internet-organised-crime-threat-assesment-iocta
Europol: Threat assessment (abridged). Internet facilitated organised crime. iOCTA. File No.: 2530-264. The Hague (7 January 2011). Available at: https://www.europol.europa.eu/sites/default/files/publications/iocta.pdf
Fallmann, H., Wondracek, G., Platzer, C.: Covertly probing underground economy marketplaces. Vienna University of Technology Secure Systems Lab (2010). Available at: http://www.iseclab.org/papers/dimva2010_underground.pdf
FATF: Money laundering & terrorist financing vulnerabilities of commercial websites and internet payment systems (2008). Available at. http://www.fatf-gafi.org/
Fiedler, I.: Online gambling as a game changer to money laundering? (30 April 2013). Available at: SSRN: http://ssrn.com/abstract=2261266
Filipkowski, W.: Cyber laundering: an analysis of typology and techniques. Int. J. Crim. Justice Sci. 3(1), 15–27 (2008)
Fowler, K.: Being cyber resilient. KPMG Insurance Issues Conference (1 December 2014). Available at: https://www.kpmg.com/Ca/en/IssuesAndInsights/ArticlesPublications/Evolving-Regulation-Series/Documents/Being-Cyber-Resilient.pdf
Ghosh, A.: How to prevent fraud in the Indian telecom industry. J. Adv. Anal. 3Q, 18 (2012). Available at: https://www.sas.com/news/intelligence_quarterly/q312.pdf
Global financial integrity: illicit financial flows (2014). Available at: http://www.gfintegrity.org/wp-content/uploads/2014/09/GFI-Analytics.pdf
Goodman, M.: International dimensions of cybercrime. In: Ghosh, S., Turrini, E. (eds.) Cybercrimes: A multidisciplinary Analysis. Springer, Berlin/Heidelberg (2010)
Goredema, C.: Combating illicit financial flows and related corruption in Africa: towards a more integrated and effective approach. U4 Issue (12) (October 2011)
Greenberg, A.: Agora, the Dark Web’s biggest drug market, is going offline. Wired (26 August 2015). Available at: http://www.wired.com/2015/08/agora-dark-webs-biggest-drug-market-going-offline/
Greenberg, A.: Drug market ‘Agora’ replaces the Silk Road as king of the dark net. Wired (2014). Available at: http://www.wired.com/2014/09/agora-bigger-than-silk-road/
Houses of Parliament: The darknet and online anonymity. Postnote number 488 (MArch 2015). Available at: www.parliament.uk/briefing-papers/POST-PN-488.pdf
LIRNEasia & UP-NCPAG: Mobile banking, mobile money and telecommunication regulations (2008). Available at: http://lirneasia.net/wp-content/uploads/2008/05/Mobile-2.0_Final_Hor_EA.pdf
National drug intelligence center money laundering in digital currencies. US Department of Justice (2008). Available at: http://www.justice.gov/archive/ndic/pubs28/28675/28675p.pdf
OECD: Addressing the tax challenges of the digital economy, OECD/G20 Base Erosion and Profit Shifting Project. OECD Publishing (2014). Available at: http://www.oecd.org/ctp/tax-challenges-digital-economy-discussion-draft-march-2014.pdf
ONE: Trillion dollar scandal (2014). Available at: https://s3.amazonaws.com/one.org/pdfs/Trillion_Dollar_Scandal_report_EN.pdf
Pena, J.D.: Exporting criminality: money laundering in a domestic and international context (2009). Available at: http://web.stanford.edu/group/journal/cgi-bin/wordpress/wp-content/uploads/2012/09/Pena_SocSci_2009.pdf
Perez, A., Olivie, I.: Europe beyond aid: illicit financial flows policy responses in Europe. Center for Global Development. Consultation Draft (2014). Available at: http://www.cgdev.org/sites/default/files/Europe-Beyond-Aid-Illicit-Financial-Flows_0.pdf
Piller, G., Zaccariotto, E.: Cyber-laundering: the union between new electronic payment systems and criminal organizations. Transit. Stud. Rev. 16(1), 62–76 (2009)
Richet, J.-L.: Laundering money online: a review of cybercriminals methods. Tools and resources for anti-corruption knowledge. United Nations Office on Drugs and Crime (UNODC), (1 June 2013). Available at: arXiv:1310.2368
SecureWorks: The next generation of cybercrime: how it’s evolved, where it’s going. Executive Brief (2010). Available at: secureworks.com
SecureWorks: Underground hacker markets (December 2014). Available at: http://www.secureworks.com/assets/pdf-store/white-papers/wp-underground-hacking-report.pdf
Shields, P.: When the ‘information revolution’ and the US security state collide. Money laundering and the proliferation of surveillance. New Media Soc. 7(4), 483–512 (2005)
Thomason, C.V.: How has the establishment of the internet changed the ways in which offenders launder their dirty money? Int. J. Criminol. (2009). Available at: http://www.internetjournalofcriminology.com/Thomason_Internet_Money_Laundering_July_09.pdf
TRACFIN: Regulating virtual currencies. Recommendations to prevent virtual currencies from being used for fraudulent purposes and money laundering (2014). Available at: http://www.economie.gouv.fr/files/regulatingvirtualcurrencies.pdf
Tropina, T.: Do digital technologies facilitate illicit financial flows? Background paper for the World Development Report 2016, World Bank, Washington, DC (2015)
Tropina, T.: Fighting money laundering in the age of online banking, virtual currencies and internet gambling. ERA Forum 15(1), 69–84 (2014)
Tropina, T.: Organised crime in cyberspace. In: Heinrich-Böll-Stiftung, Schönenberg, R. (eds.) Transnational Organized Crime. Analyses of a Global Challenge to Democracy, pp. 47–60. Transcript Verlag, Bielefeld (2013)
UNECA: Illicit financial flows. Report of the high level panel on illicit financial flows from Africa (2015). Available at: http://www.uneca.org/sites/default/files/PublicationFiles/iff_main_report_26feb_en.pdf
Van der Wagen, W., Pieters, W.: From cybercrime to cyborg crime: botnets as hybrid criminal Ac tor-networks. Br. J. Criminol. 55(3), 578–595 (2015)
Villasenor, J., Bronk, C., Monk, C., Figures, S.: Tracking illicit financial transactions in the murky world of digital currencies, peer-to-peer networks, and mobile device payments. Paper, The Brookings Institution and the James A. Baker III Institute for Public Policy, (2011). Available at: http://bakerinstitute.org/media/files/Research/d9048418/ITP-pub-FinancialTransactions-082911.pdf
Weaver, S.J.: Modern day money laundering: does the solution exist in an expansive system of monitoring and record keeping regulations? Annu. Rev. Bank. Law Financ. Law 24, 443–465 (2005)
Williams, P.: Organized crime and cyber-crime: implications for business (2002). Available at: http://www.cert.org/archive/pdf/cybercrime-business.pdf
World Bank: Illicit financial flows (IFFs) (2015). Available at: http://www.worldbank.org/en/topic/financialmarketintegrity/brief/illicit-financial-flows-iffs
Wueest, C.: Underground black market: thriving trade in stolen data, malware, and attack services. Symantec official blog (2015). Available at: http://www.symantec.com/connect/blogs/underground-black-market-thriving-trade-stolen-data-malware-and-attack-services
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Tropina, T. The nexus of information technologies and illicit financial flows: phenomenon and legal challenges. ERA Forum 17, 369–384 (2016). https://doi.org/10.1007/s12027-016-0435-2
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12027-016-0435-2