Advertisement

New Technologies and Money Laundering Vulnerabilities

  • Jun Tang
  • Lishan Ai
Chapter
Part of the International Library of Ethics, Law, and the New Medicine book series (LIME, volume 68)

Abstract

As the Internet becomes more and more a worldwide phenomenon, prepaid card system, internet payment services, and mobile payment services are potentially subject to a wide range of vulnerabilities that can be exploited for money laundering. Numerous third-party payment service providers offer individuals the ability to make online purchases, funding accounts with wire transfers, money orders, and even cash. In most cases, the provider of this service will not have a face-to-face relationship with its customers and may even allow anonymous accounts. As the development of new technologies of information and communication has created opportunities for criminals to misuse such technologies for the purposes of money laundering. On the other hand, new technology can also be applied to increasing anti-money laundering efficiency and quality. This chapter aims to demonstrate money laundering risks associated with new technology-based financial activities, to introduce enterprise-wide AML information solution, to explain basic principles of risk-based approach, and to demonstrate Chinese practice regarding on money laundering vulnerabilities related to new-tech payment system.

Keywords

Money Laundering Payment Service Mobile Payment Payment Instrument Suspicious Activity 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. Asian Banker White Paper. 2009. Identifying anti-money laundering issues in chinese banks.Google Scholar
  2. Australian Institute of Criminology. 2007. Future direction in technology-enabled crime: 2007–2009. Research and Public Policy Series 78: 1–131.Google Scholar
  3. Federal Financial Institutions Examination Council. 2010. Bank secrecy act/anti-money laundering examination manual. vol. 24.Google Scholar
  4. Filipkowski, Wojciech. 2008. Cyber laundering: an analysis of typology and techniques. International Journal of Criminal Justice Sciences 3: 15–27.Google Scholar
  5. Financial Action Task Force on Money Laundering. 2004. Methodology for assessing compliance with the FATF 40 recommendations and the FATF 9 special recommendations.Google Scholar
  6. Financial Action Task Force on Money Laundering. 2008. Money laundering & terrorist financing vulnerabilities of commercial websites and internet payment systems.Google Scholar
  7. Financial Action Task Force on Money Laundering. 2009. Risk-based approach guidance for money service businesses. Google Scholar
  8. Financial Action Task Force on Money Laundering. 2010. Money laundering using new payment methods.Google Scholar
  9. Financial Action Task Force on Money Laundering. 2012. Mutual evaluation 8th follow-up report: Anti-money laundering and combating the financing of terrorism-China.Google Scholar
  10. Gao, Zengan, and Mao Ye. 2007. A framework for data mining-based anti-money laundering research. Journal of Money Laundering Control 10: 170–179.CrossRefGoogle Scholar
  11. Handoll, John. 2006. Capital, payments and money laundering in the European union. London: Oxford University Press.Google Scholar
  12. Killick, Marcus, and David Parody. 2007. Implementing AML/CFT measures that address the risks and not tick boxes. Journal of Financial Regulation and Compliance 15: 210–216.CrossRefGoogle Scholar
  13. Kini, Satish M. 2005. Federal bank regulatory agencies issue long-awaited anti-money laundering examination manual. The Banking Law Journal 122: 940–952.Google Scholar
  14. Levi, Michael. 2009. E-gaming and money laundering risks: A European overview. ERA Forum 10: 533–546.Google Scholar
  15. McCusker, Rob. 2004. China, globalisation and crime: A potential victim of its own prospective success? Journal of Financial Crime 12: 44–52.CrossRefGoogle Scholar
  16. Reuters. 2011. China web users hit 485 million. http://www.reuters.com/article/2011/07/19/us-china-internet-idUSTRE76I12020110719. Accessed July 19.
  17. Ross, Stuart, and Michelle Hannan. 2007. Money laundering regulation and risk-based decision-making. Journal of Money Laundering Control 10: 106–115.CrossRefGoogle Scholar

Other Materials in Chinese

  1. Liu, Zhiming. 2010. Internet website: The gluttonous feast for the chinese private economy. http://tech.sina.com.cn/i/2010-01-06/18263744376.shtml. Accessed January 06.
  2. The People’s Bank of China. 2009. Chinese anti-money laundering strategic development guideline.Google Scholar
  3. The People’s Bank of China. 2010. The administrative measures for the payment services provided by non-financial institutions.Google Scholar
  4. The People’s Bank of China. 2012. The administrative measures for anti-money laundering and combating terrorist financing by payment institutions.Google Scholar
  5. Wei, Geng. 2010. The interaction of AML staff and AML techniques. In Paper presented at the Chinese anti-money laundering annual forum. Shanghai, 26 November 2010.Google Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  1. 1.School of Statistics and MathematicsZhongnan University of Economics and LawWuhan, HubeiChina
  2. 2.School of Political and Social InquiryMonash UniversityMelbourneAustralia

Personalised recommendations