Accessed 30 March 2013. The Adverse Implications for Developing Countries B. Financial Action Task Force. Lilley, P. 2007. A critical look at the regulation of cybercrime: A comparative analysis with suggestions for legal policy. 2010e. Northampton: E. Elgar Publications. Von Hayek, F. 1978. Accessed 5 Feb. 2013. Accessed 4 Aug. 2013. At the time, the computer was more a target of crime than it was a tool for criminal activities.Footnote 130 The predominant crimes against computers were hacking of government computers, phone phreakingFootnote 131 and spreading viruses.Footnote 132 This changed in the 1990s with the development of the World Wide Web, when people began having a more personal presence on the internet, and when there were more opportunities for interpersonal crimes.Footnote 133 In the 2000s, with the outburst of social networks on the internet, cyber crimes reached a record high Transactions through hawalas are difficult to detect given the lack of documentation, their size, and the nature of the transactions involved. . An international criminal court or tribunal for cyberspace (ICTC). Anonymity in cyberspace: Finding the balance between privacy and security. The pivotal points in the history of money laundering will be discussed under the following sub-headings: the regulatory and preventive phase; the criminalisation and internalisation phase; the supranisation phase and the terrorism-influenced phase of money laundering law. . Curtin, M. 2005. Cf Kochan (2005, p123). Financial Action Task Force. American Criminal Law Review 27:149. Pillai and Julian (2008, p.219). Accessed 6 June 2013. 2005. Basic facts about money laundering. Casey (2004, p.14) and Taylor et al. The lethargic bureaucracies involved in enacting legislation are no match against the speed with which technology changes. . Baran, D. 2010. [In terms of cover payments] two separate SWIFT messages [the MT103 and the MT 202] are sent The MT 202 sent to the intermediary bank did not retain originator and beneficiary information [as the MT 103].Footnote 106. Hence, cyberlaundering as it relates only to money laundering and cyber crime Cornwall: TJ International Ltd. Alghamdi, A. M. 2011. Examples are where a a criminal who has a fully functioning oil company in an OFC uses the same company as a camouflage to facilitate his illicit activities by siphoning funds through such a company. This is further buttressed by the fact that the act or conduct requirement of this crime could take place in more than one national jurisdiction across the world, thereby establishing jurisdiction in several states simultaneously. The laundry men: Inside the worlds third largest business. 2010. 2010. have played a role in moving terrorist funds. Money laundering not only enables criminals to escape detection, but may also be 121011-PDF-ENG non-degree granting course Hence, the frightening impact of money laundering is precisely what makes the threat of cyberlaundering so imminent. 2010d. September 03, 2020. D. Masciandaro, E. Takats, and B. Unger. The broader field of money laundering an undated website document. The manual consists of the following sections: The core and expanded overview sections provide narrative guidance and background information on each topic; each overview is followed by examination procedures. The Council has six voting members: the Board of Governors of the Federal Reserve System, the Federal Deposit Insurance Corporation, the National Credit Union Administration, the Office of the Comptroller of the Currency, the Consumer Financial Protection Bureau, and the State Liaison Committee. Responding to money laundering: International perspectives. has succeeded in supranationalising money laundering law. Casey, E., M. Ferraro, and L. Nguyen. 2010c. Koops, B., and S. W. Brenner. United Kingdom: Anti-Money laundering/the combating the financing of terrorism technical note. Complete guide to internet privacy, anonymity and security. The ANNALS of the American Academy of Political and Social Science 582:181. The private pricing of internet crime. Bank Secrecy Act of 1970, 31 United States Code 1051 (Public law number 99-570). It is important to understand that the numerous techniques which a criminal adopts to hide his/her illegal funds, because this reflects on the very essence of the crime of money laundering as a process crime. Wolfsberg statementAnti-money laundering guidance for mutual funds and other pooled investment vehicles. Footnote 67 issued by the Basel Committee on Banking Supervision It is therefore important to understand the significance of this research, which serves as a rationale that constitutes the basis for the ACL legal framework that will be proposed in this study. Money laundering can be defined as a process in which illegally obtained money (e.g. The first landmark in this embryonic stage of money laundering law, as recorded by authorities,Footnote 57 is the first legal usage of the term money laundering by the United States Supreme Court in United States (US) v $425562539. . an undated website document. Financial Action Task Force. The restaurant reports daily cash sales much higher than what it actually takes . . Introduction The recent wave of international terrorism and the increased concerns about drug activities have led to an increased focus on money laundering and its regulation. Cf Reyes et al. Trust: The social virtues. In what looks to be a following of the trend set by the Vienna Convention, academics have built on this traditional definition of money laundering. Council of Europe Convention on Cybercrime adopted by the Council of Europe on 8 November 2001 and came into force on 1 July 2004. . Manning, R. B. The term smurfing is derived from the little blue cartoon characters in the popular 1980s television show called The Smurfs. Kellerman, T. 2004. 2002. It is primarily because of this state of affairs that this study will attempt to come up with a legal framework to combat cyberlaundering. Reuter and Truman (2004, p.31). . Revenue of online payment set to hit $2700billion by 2015. W. H. Muller, C. H. Kalin, and J. G. Goldsworth. Chasing dirty money: Domestic and international measures against money laundering. 2003. When the USA PATRIOT Act was passed, banks under the supervision of a federal banking agency were already required by law to establish and maintain a BSA compliance program that, among other things, requires the bank to identify and report suspicious activity promptly. Global money laundering regulations place responsibilities, accountabilities and procedures on individual countries to prevent and detect money laundering activity. IEEE Computer Societys Computer Magazine 34 (1): 22. Hopton, D. 2009. Law and policy in International Business 28 (1): 305. New Jersey: Wiley. Beebe, N. L., and J. G. Clarke. It lays the necessary foundation and maps the terrain on which the purpose of this paper can be achieved, which is forging a legal framework to combat cyberlaundering. 1431 USC 5322(a). Sydney: The Federation Press. The manual contains an overview of BSA/AML compliance program requirements, BSA/AML risks and risk management expectations, industry sound practices, and examination procedures. 2002. Financial Action Task Force. Internet Watch Foundation. PDF Understanding Money Laundering: A Crime Script Approach Jacobson and Levitt (2010, p.34). NV Senate Bill 82-75th (BDR 14-266), adopted on 1 July 2009 by the House of Senate, Nevada, United States. German Criminal Code of 1998 (StrafgesetzbuchStGB). Pursuant to
Computer crimes and digital investigations. 2003. European Union Regulation (EC) No 1889/2005 adopted by the European Parliament on 26 October 2005 and came into force on 15 December 2005. The merging of Anti-Money laundering and counter-terrorism financial enforcement regimes after September 11, 2011. Interdisciplinary Journal of Information, Knowledge, and Management 5:154. Accessed 15 July 2013. Rule 401, test for relevant evidence. Henkin, L., L. F. Damrosch, S. D. Murphy, and H. Smit. Penalties for money laundering and terrorist financing can be severe. . With a complete table to the whole. The challenge of internet anonymity: Protecting John Doe on the Internet. Prevention of money laundering legal and financial issues. Uniting and Strengthening America by Providing Appropriate Tools Required To Intercept and Obstruct Terrorism Act 115, Stat. Jennifer Isern Download Free PDF View PDF EXAMINING THE LEGAL REGIMES AGAINST MONEY LAUNDERING, POLITICALLY EXPOSED PERSONS AND TERRORISM: WHAT ROLE FOR THE JUDICIARY AND THE LAW ENFORCEMENT AGENCIES Akin Oluwadayisi The threat of money laundering and terrorism in some developing countries in Africa, particularly, Nigeria, is no longer new. Shaw, M. N. 2003. International law. 2006. Funding for terrorist attacks does not always require large sums of money, and the associated transactions may not be complex. 697 and COD/2007/0247. . Egmont Group. . The latter is a sore point, as it forms one of the principal challenges faced by the current AML regime. Keh (1996, p.38) and Unger (2007, p.153). Cf Reuter and Truman (2004, p.34) and Kochan (2005, p.112). . 2007. Computer crime in brave new world. Telecommunications Act of 2004 (TelekommunikationsgesetzTKG). (PDF) Understanding and Preventing Money Laundering - ResearchGate Boston: Cengage Learning Inc. Siegel, D. D., and P. J. Borchers. Financial Action Task Force. The global economy is but one sphere in which the impact of cyberlaundering is most felt.Footnote 13 Currently, on a global scale, the amount of money being laundered annually is unfathomable. E. Savona. Recent estimates show that in the Netherlands and the United States, tax evasion is the largest part of the estimated criminal income, constituting between 4 to 6% and 6 to 15% of the Gross Domestic Products (GDPs) of these countries, respectively.Footnote 116, In addition, a governments efforts to promote privatisation are thwarted if public enterprises such as transportation, electricity and water supply fall into the hands of criminals who obtain such enterprises for the purpose of laundering money.Footnote 117 In the end this cuts short a societys hopes for growth and development. Accessed 12 Aug. 2013. Banking organizations must develop, implement, and maintain effective AML programs that address the ever-changing strategies of money launderers and terrorists who attempt to gain access to the U.S. financial system. Gragido and Pirc (2011, p.22). Laue, C. 2011. . In the case of horse racing, a money laundering operation is as simple as a criminal buying a winning ticket at a low premium, which he can then claim back. 1998. . Understanding cybercrime: A guide for developing countries. 07-109): Indictment, p.3. 2010. C ("BSA/AML References") for guidance. Cambridge: Cambridge University Press. Other legitimate sources have also been found to provide terrorist organizations with funding; these legitimate funding sources are a key difference between terrorist financiers and traditional criminal organizations. This was done purposely, as some of the countries were of the view that it would be in their own economic interests not to abide by those sanctions, even though money laundering activities that came as a consequence of trade relations with Iraq were continuously fostered on the side.Footnote 120. Schopper, M. D. 2002. 1.1 Definitions of money laundering The term "money laundering" started to draw attention in the early nineties and it has been defined in different ways. More importantly, the chapter identifies money laundering and cyber crime as the fundamental two phenomenons that have birthed cyberlaundering. The advent of the internet has yielded this new breed of crime. For different approaches, see Zagaris (2004, p.47) and Koker (2006, p.41). Another legal ramification created by computer forensics relates to the collection of evidence. Telephone Tribute. Journal of Banking Regulation 4 (1): 13. K. Cornelius and D. Hermann. European Union Telecommunications Reform Package COM. To comply with the systems and control function, firms are generally required to appoint a responsible individual to take ownership of the process, who is normally referred to as a . Accessed 9 Aug. 2013. Cf discussion in Chapter3, paragraph3.2.1. Parker, D. 1976. London: Penguin Press. 2007. Mollenkamp, C., B. Bishop, J. The Basel Committee was established in 1974, and it consists of central bank governors of countries consisting of the United States, the United Kingdom, Switzerland, Sweden, Spain, the Netherlands, Luxemburg, Japan, Italy, Germany, France, Canada and Belgium. Santa Barbara: Contemporary World Issues Series. For additional information and guidance on hawalas and FinCEN's report to Congress in accordance with section 359 of the USA PATRIOT Act, refer to www.fincen.gov.
To flout constitutional and procedural safeguards would serve only to undermine the integrity of the law even more, thus rendering the state even more vulnerable to the machinations of money launderers. These businesses have . .Footnote 29, The fourth objective is to complement the regulations with an enforcement pillar Gragido, W., and K. Pirc. Accessed 25 July 2013. Cf Rider (1999, p.40). Given the clandestine nature of terrorist activities, which is a mould within which cyberlaundering is embroiled, its instrumentality and significance to terrorist operations cannot be over-emphasized Restatement of the law (Third) foreign relations law of the United States. 2009. Unger (2007, p.170). Act 18 of 1986. PDF 2007 National Money Laundering Strategy - U.S. Department of the Treasury . Financial Action Task Force. 1The FFIEC was established in March 1979 to prescribe uniform principles, standards, and report forms and to promote uniformity in the supervision of financial institutions. Symposium cyberspace & the law: Privacy, property, and crime in the virtual frontier: Mask, sheild, and sword: Should the journalists privilege protect the identity of anonymous posters to news media websites? Shams (2004, p.4). Cambridge: Polity Press. Article 3(c)(i) of the Convention further adds: The acquisition, possession or use of property, knowing at the time of receipt that such property was derived from an offense or offenses [] or from an act of participation in such offense or offenses. Accessed 4 Aug. 2013. The BSA is intended to safeguard the U.S. financial system and the financial institutions The treaty was signed on 23 May 1973 and came into force on 23 January 1977. 2006. 2011. International law. and to remove the illegal funds as far away as possible from the scene of the crime. Computer forensics education. Butera v Director of Public Prosecutions for the State of Victoria. Basel Committee on Banking Supervision. Angers, L. 2004. National Drug Intelligence Program. . . 1998. Accessed 14 Feb. 2013. Yahoo Finance. 2008. Accessed 22 April 2013. These are discussed further below. Accessed 4 April 2013. Federal Deposit Insurance Corporation. 2012.
2. . Principles of international criminal law. The National Drug Intelligence Program (2010, p.14). Culler, M. 2003. Ehrenfeld, R., and A. 2012. impact on those specialised in providing criminals with money laundering services. Moreover, there are criminal penalties for willful violations of the BSA and its implementing regulations under
Basel Committee on Banking Supervision. In terms of the KYC principle, financial institutions are required to keep a record of the identity of every customer who conducts a transaction with the bank, and record such transactions in line with the basic principles set out in the Act.Footnote 48 A violation of the record keeping requirements would constitute a felony under the BSA, and is punishable by imprisonment of a period not exceeding five years or a fine not exceeding $10,000, or both.Footnote 49, The BSA also provides for very stringent reporting requirements. Annual report 20102011: FIUs in action. Accessed 25 July 2013. On 23 November 2003, it was open for signature in Budapest, and on 1 July 2004, it came into force. See section231, Title II of the Act, and Shams at 19. Refer to the core overview and examination procedures,
At its Eighth Annual Review of Non-Cooperative Countries and Territories 20062007 dated 12 October 2007, the FATF listed no countries as non-cooperative or non-compliant. This impacts negatively on efforts to combat cyberlaundering and other sub-genres of cyber crime, as criminals continue to have a field day International Journal of Digital Evidence 2 (2): 1. Money laundering and terrorist financing: Definitions and explanation. 31 CFR 1020.210 states that a bank regulated by a federal banking agency is deemed to have satisfied the AML program requirements of the USA PATRIOT Act if the bank develops and maintains a BSA compliance program that complies with the regulation of its federal functional regulator
Illegal funds can be laundered through insurance policies, using several methods. The prosecution of computer crime. The MLAT came as a result of the growing concerns of the United States government that Swiss banks had started to house illegal funds of criminals. The virtual horizon: Meeting the law enforcement challenges. Klimmt, C. 2011. 2001. Crime potential of metaverses. Accessed 7 Feb. 2013. The money laundering process usually goes something like the following: 1. Section101, Title I of the Bank Secrecy Act. Terrorism is intended to intimidate a population or to compel a government or an international organization to do or abstain from doing any specific act through the threat of violence. Fairlie, R. W, and A. Chatterji. Digital evidence in the courtroom. Money Laundering: Methods and Markets 25 Money laundering is usually described as having three sequential elements placement, layering, and integrationas dened in a report by the Board of Governors of the Federal Reserve System (2002, 7): The rst stage in the process is placement. Anti-Money Laundering. This can be done by either mixing the dirty money with the clean money.Footnote 78 As an example, illegal proceeds can be integrated with the legal proceeds of legitimate businesses such as a pizzeria or by under-invoicing the imports of an international business trade in the form of a commodity trading company,Footnote 79 or by defacing the medium through which the money is paid. The advent of the internet has . Burlington: Elsevier, Inc. Grama, J. L. 2010. an undated website document. 2011. . Accessed 14 Aug. 2013. Basel Institute of Governance. Financial Action Task Force. American Criminal Law Review 41:183. International Journal of Information Technology and Web Engineering 5 (1): 23. The subject of cyberlaundering has constantly been evaded.Footnote 1 This is mainly because it is a hybrid subject which merges aspects of information technology Some argue that there is an invisible line between the two, even though the latter is often illegal and the former is not. Money laundering in cyberspace. In Responding to money laundering: International perspectives, ed. The World Bank recently estimated that, globally, about $4trillion is laundered annually, but the amount is what is called a mere guestimate or questionate.Footnote 14 Nevertheless this amount equals the combined value of the economies of most underdeveloped countries. West Suss: Wiley. E. Savona. 2012. Law and Policy in International Business 34:45. PDF INTRODUCTION - CUSTOMERS - Federal Financial Institutions Examination In the United States, the Money Laundering Control Act 18 of 1986 was enacted. Jurisdiction. 2004b. Financial Action Task Force. For deliberation on these issues, see Straub (2002, p.35) and Ping (2004, p.29). Civil actions for damages in French criminal procedure. Western unionizing the Hawala? Research paper for the Asian Development Bank Regional Technical Assistance Project No. This definition is more plausible for the following reasons: The notion of benefits is not only confined to money (the so-called object of the crime) but other things of value derived from criminal activities, and as such, it casts a much wider net; Following on the above, the definition is particularly relevant to the concept of cyberlaundering, given the very complex trails criminals create on the internet in laundering illegal proceeds. Wolfsberg Group. Accessed 30 Aug. 2013. International Journal of Web-Based Communities 5 (1): 4. . z. Casinos, horse racing and lotteries are very good examples. Outlawing transnational bribery through the world trade organisation. There is currently a brewing argument about the difference between the hawala system as an informal money transfer system and the more formal establishments such as Western Union. Cf discussion in paragraphs1.3.1 and 1.3.2 below. In this capacity, FinCEN issues regulations and interpretive guidance, provides outreach to regulated industries, supports the examination functions performed by federal banking agencies, and pursues civil enforcement actions when warranted. Financial Crimes Enforcement Network. 2002. (supra) argues that the standard set for electronic evidence is too high, and should be lowered in order to help the work of cyber crime investigators. Searching Cloud Computing. Financial Action Task Force. In its 2002 report, the FATF Unger (2007, p.156). London: Addison-Wesley. Kellerman (2004, p.12). 1st ed. Reuter and Truman (2004, p.31). As a fundamental basis, the profits derived from a crime often return to the criminal in the form of cash, which then needs to be reintroduced into the mainstream commercial sector in order to feign legitimacy. for additional information. Oxford: Elsevier Inc. Murphy, S. D. 2006. Lilley (2006, p.154), Gill and Taylor (2004, p.543). Pollitzer, B. London: Blackwell Scientific Publications. SWIFT does not hold funds nor does it manage accounts on behalf of customers, nor does it store financial information on an on-going basis. . California Bankers Association v. Schultz 39L ed 2d 812 (1974) n5. Accessed 8 Aug. 2013. Recovering and examining computer forensic evidence, forensic science communications. an undated internet article. CircleID Internet Infrastructures. Accessed 12 April 2013. They send out scam emails and notices to lure people into dealing with them. What is money laundering? Leslie, D. A. 2010. Central Bank of Iraq. The term high-technology crime is often used interchangeably with the term cyber crime, which is not correct. In Electronic evidence: Disclosure, discovery and admissibility. Digital evidence and computer crime: Forensic science, computers and the internet. Richmond Journal of Law and Technology 16 (2): 1. and pay only $8.50 each, Buy 50 - 499 . History of the internet. . Provided by the Springer Nature SharedIt content-sharing initiative, Introduction, Money Laundering and Cyber crime, Legal Principles for Combatting Cyberlaundering, https://doi.org/10.1007/978-3-319-06416-1_1, http://www.parliament.uk/business/committees/committee-archives/, http://www.fatf-gafi.org/pages/0,3417,en_32250379_32235720_1_1_1_1_1,00.html, http://www.worldbank.org/finance/assets/images/, http://www.fatf-gafi.org/publications/fatf_40_Recommendations, http://www.fatf-gafi.org/dataoecd/18/28/42242615.pdf, http://www.swift.com/about_swift/company_information/index.page?lang=en, http://www.wsws.org/articles/2011/19january/, http://www.aph.gov.au/house/committee/jsct/1march2011/report/chapter, http://www.telephonetribute.com/phonephreaking.html, http://www.gulfnews.com/mobile/business/technology/pirates, http://www.oecd.org/dataoecd/28/47/37900503.pdf, http://www.7safe.com/electronic_evidence/ACPO_guidelines_computer_evidence_v4_web.pdf, http://www.joelschwarz.com/SpeechTestDocs/VirtualHorizonAustralia.pdf, http://www.coe.int/t/dghl/monitoring/moneyval/web_ressources/Guid_basel2009.pdf, http://www.federalreserve.gov/boarddocs/srletters/2009/sr0909a1.pdf, http://www.justice.gov/ndic/pubs38/38661/3866ip.pdf, http://www.egmontgroup.org/bestpractices.pdf, http://www.egmontgroup.org/library/download/8, http://www.egmontgroup.org/princ_info_exchange.pdf, http://www.egmontgroup.org/procedure_for_being_recognised.pdf, http://www.egmontgroup.org/statement_of_purpose.pdf, http://www.egmontgroup.org/library/annual-reports, http://www.fatf-gafi.org/dataoecd/31/29/34043795.pdf, http://www.fatf-gafi.org/dataoecd/8/17/34849466.pdf, http://www.fatf-gafi.org/reports/money_laundering_typologies/, http://www.fatf-gafi.org/dataoecd/43/53/34949558.pdf, http://www.oecd.org/dataoecd/m28/18/2494366.pdf, http://www.antiguagaming.gov.ag/Money%20Laundering/FATF%2040%20Review.pdf, http://www.fatf-gafi.org/document/98/786123/, http://www.fatf-gafi.org/datoecd/revised_notes/, http://www.fatf-gafi.org/dataoecd/30/47/37627240.pdf, http://www.fatf-gafi.org/dataoecd/14/11/39552632.pdf, http://www.fatf-gafi.org/dataoecd/4/591.pdf, http://www.fatf-gafi.org/dataoecd/5/61/41584370.pdf, http://www.fatf-gafi.org/media/fatf/documents/reports/Vulnerabilities%20of%20Casinos%20and%20Gaming%20Sector.pdf, http://www.fatf-gafi.org/dataoecd/4/5002883.pdf, http://www.fatf-gafi.org/pages/0,2987,en_32250379_32235720_1_1_1_1_1,00.html, http://www.fatf-gafi.org/resource_file678/, http://www.fatf-gafi.org/dataoecd/4/56/46705859.pdf, http://www.fatf-gafi.org/media/fatf/documents/reports/mer/MER%20Germany%20full.pdf, http://www.fatf-gafi.org/media/fatf/documents/recommendationspdfs/FATF%20Recommendations%20, http://www.fatf-gafi.org/media/fatf/documents/FINAL%20FATF%20MANDATE%202012-2020.pdf, http://www.fincen.gov/news_room/rp/files/LLCAssessment_FINAL.pdf, http://www.fincen.gov/news_room/rp/files/YEreport/FY2009/annualreport.html, http://www.fsisac.com/files/public/db/p335.pdf, http://www.baselgovernance.org/fileadmin/docs/publications/books/asset-tracing_web-version.pdf, http://www.iipa.com/pdf/IIPA2011WorldIPDayStatement042611.pdf, http://www.imf.org/external/pubs/ft/scr/2010/cr1078.pdf, http://www.imf.org/external/pubs/ft/scr/2011/cr11231.pdf, http://www.itu.int/ITU-D/cyb/cybersecurity/docs/itu-understanding-cybercrime-guide.pdf, http://www.kpmg.com/GI/en/IssuesAndInsights/ArticlesPublications/Documents/Online-Gaming-A-Gamble-or-a-Sure-Bet.pdf, http://www.law.cornell.edu/rules/fre/rule_401, http://www.mindark.com/press/press-releases/documents/Virtual_World_Developer_MindArk_Granted_Real_World_Banking_License.pdf, http://www.coe.int/t/dghl/monitoring/moneyval/Typologies/MONEYVAL%282013%296_Reptyp_flows_en.pdf, http://www.paymentsnews.com/2010/07/mastercard-releases-prepaid-market-sizing-report.html, http://www.paymentscouncil.org.uk//files/payments_council/the_way_we_pay_2010_final.pdf, http://zunia.org/uploads/media/knowledge/Reference_Guide_AMLCFT_2ndSupplement1.pdf, http://www.reservebank.co.za/internet/Publication.nsf/LADV/18B4D18670F4E8EC422574520032B728/$File/G6+of+2008.pdf, http://siteresources.worldbank.org/NEWS/Resources/Star-rep-full.pdf, http://www.wolfsberg-principles.com/pdf/Wolfsberg_Notification_Correspondent_Bank_Customers, http://www.wolfsberg-principles.com/pdf/Wolfsberg_AML_Guidelines_for_PB_, http://www.wolfsberg-principles.com/pdf/Wolfsberg_Monitoring_Screening_Searching_Paper_, http://www.wolfsberg-rinciples.com/pdf/Wolfsberg_RBA_Guidance_, http://www.wolfsberg-principles.com/pdf/Wolfsberg_PV_Guidance_, http://www.wolfsberg-principles.com/pdf/Wolfsberg_NYCH_Statement_on_Payment_Message_Standards_, http://www.wolfsberg-principles.com/pdf/Wolfsberg_Guidance_on_Prepaid_and_Stored_Value_Cards_Oct_14,_2011.pdf, http://www.siteresources.worldbank.org/INTAML/Resources/WP146_Web.pdf, http://www.itu.int/wsis/docs/Geneva/official/dop.html, http://online.wsj.com/article/SB10001424052970204616504577171180266957116.html, http://www.justice.gov/criminal/ceos/Press%20Releases/DC%20egold%20indictment.pdf, http://www.scribe.com/resources/cyberlaundering09811, http://www.scribd.com/doc/40219342/160/Ethics-Social-and-Political-issues, http://www.nytimes.com/2001/04/29/technology/29HARA.html?searchpv=site14, http://www.prosecurityzone.com/News/It_security/Anti-virus_and_anti-malware_software/Report_details_economic_impact_of_cyber_crime_14551.asp#axzz1SXb9xLFJ, http://www.arcsight.com/collateral/whitepapers/2011_Cost_of_Cyber_Crime_Study_August.pdf, http://www.webguild.org/20100115/google-embarrases-chinese-because-it-could-not-win-here, http://www.webguild.org/20110103/will-google-quit-italy-like-china, http://www.adb.org/documents/other/ogc-toolkits/, http://www.assetrecovery.org/kc/node/82bce589-7805-11dd-9c9d-d9fcb408dfee.3, http://bits.blogs.nytimes.com/2013/05/10/daily-report-international-a-t-m-theft-takes-45-million/?_r=0, http://www.businessweek.com/magazine/content/06_02/b3966094.htm, http://www.infoworld.com/articles/tc/xml/01/04/09/010409tccounter.html, http://osaka.law.miami.edu/~froomkin/seminar/papers/bortner.htm, http://www.softduit.com/mavenmappersinformation/2001/06/07/1cyberlaundering-low-tech-high-tech/, http://www.businessdictionary.com/definition/electronic-payment-systemn.html, http://www.crime-research.org/articles/Critical/2, http://www.companiesandmarkets.com/Market-Report/the-future-of-online-and-mobilepayments-625842.asp, http://www.dbms2.com/2010/04/08/machine-generated-data-example/, http://www.treas.gov/press/releases/docs/nmls.pdf, http://www.e-gold.com/unsecure/qanda.html, http://www.ehow.com/about_6695350_internet-content-provider_.html, http://archive.frontpagemag.com/readArticle.aspx?ARTID=28124, http://www.encyclopedia.com/doc/1O12-electroniccheque.html, http://security.cbronline.com/news/uk-launches-regional-cybercrime-hubs-100212, http://www.circleid.com/posts/89610_cyber_crime_an_economic_problem/, http://www.fbi.gov/newyork/press-releases/2012/manhattan-u.s.-attorney-and-fbi-assistant-director-in-charge-announce-extradition-of-russian-citizen-to-face-charges-for-international-cyber-crimes, https://www.federalregister.gov/articles/2011/10/06/2011-25607/proposed-collection-comment-request-renewal-with-changes-to-a-currently-approved-collection-the, http://forrester.com/rb/Research/European_online_retail_forecast%2C_2010_to_2015/q/id/58597/t/2, http://www.forrester.com/rb/Research/us_online_retail_forecast,_2010_to_2015/q/id/58596/t/2, http://www.inf.ed.ac.uk/publications/online/0139.pdf, http://www.onlinewsj.com/public/article/SB117519670114653518-FR_svDHxRtxtvNmGwwpouq_hl2q_20080329, http://www.futureofcopyright.com/home/blog-post/2011/08/24/american-isps-take-action-against-online-piracy.html, http://www.era.lib.ed.ac.uk/bitstream/1842/2255/1/electronic, http://www.praxmatrix.com.au/digital-diplomacy/internet-borders-where-the-information-stops/, http://www.dfrws.org/2006/proceedings/4-Ieong.pdf, http://webserver.ignou.ac.in/virtualcampus/adit/course/cst304/ecom2.htm, http://www.interpol.int/Crime-areas/Financial-crime/Payment-cards, http://www.investopedia.com/terms/e/electronic-money.asp, http://www.freedomfromfearmagazine.org/index.php?option=com_content&view=article&id=98:criminal-assets&catid=37:issue-1&Itemid=159, https://www.javelinstrategy.com/research/Brochure-171, http://www.unodc.org/pdf/technical_series_1996-01-01_2.pdf, http://www.japanfocus.org/-Peter-King/2679, http://curiouscapitalist.blogs.time.com/2010/01/30/drivers-licenses-for-the-internet/, http://www.uni-koeln.de/jur-fak/kress/NullumCrimen24082010.pdf, http://www.nytimes.com/2012/03/11/business/corporate-bribery-war-has-hits-and-a-few-misses.html?pagewanted=all, http://proximalreview.squarespace.com/e-money-cyber-launderring/, http://www.adl.com/uploads/tx_extthoughtleadership/ADL_Global_M_Report_Update_2009_Executive_Summary.pdf, http://citeseerx.ist.psu.edu/viewdoc/similar?doi=10.1.1.61.488&type=cc, http://www.assetrecovery.org/kc/resources/org.apache.wicket.Application/repo?nid=62ba6a53-c5fb-11dd-b3f1-fd61180437d9, http://www.merriam-webster.com/dictionary/jurisdiction, http://www.mobileinquirer.com/2011/mobile-payments-to-grow-to-200-billion-by-2012/, http://www.reuters.com/article/2012/01/25/us-hsbc-probe-idUSTRE80O1FH20120125, http://www.nytimes.com/2010/07/13/movies/13polanski.html?src=mv, http://www.fbi.gov/hq/lab/fsc/backissu/oct2000/computer.htm, http://www.onlinepoker.net/poker-news/poker-law-industry-news/italian-online-gambling-worth-48bn-rising-legislation/9394, http://oxforddictionaries.com/definition/activity, http://www.dfrws.org/2001/dfrws-rm-final.pdf, http://people.dsv.su.se/~jpalme/society/anonymity.html, http://www.computer-tutorials.org/ebooks/computerforensics.pdf, http://bcbqatar.com/English/Articles/LAUNDRY.pdf, http://www.riaa.com/physicalpiracy.php?content_selector=piracy_details_online, http://www.computerforensics.net/forensics.htm, http://m.rthk.hk/news/20120121/813246.htm, http://www.theage.com.au/national/did-he-or-didnt-he-the-murky-politics-of-sex-and-consent-20101211-18tie.html, http://www.cybercrimelaw.net/documents/International_Criminal_Court_or_Tribunal_for_Cyberspace_%28ICTC%29.pdf, http://www.schneier.com/paper-key-escrow.html, http://www.schneier.com/blog/archives/2010/02/anonymity_and_t_3.html, http://mashable.com/2007/05/30/youtube-bans/, http://searchcloudcomputing.techtarget.com/definition/cloud-computing, http://www.secondlife.com/corporate/vat.php, http://secondlife.com/xmlhttp/secondlife.php, http://www.u4.no/pdf/?file=/themes/uncac/documents/U4Brief2_2007_asset-recovery.pdf, http://www.aic.gov.au/about_aic/research_programs/staff/~/media/conferences/other/smith_russell/2003-09-cybercrime.ashx, http://www.speigel.de/international/01518,463073.00html, http://www.streakgaming.com/forum/online-gambling-worth-2-billion-greece-t22194.html, http://www.techradar.com/news/internet/online-fraud-trade-worth-billions-says-symantec-488116, http://thedailyattack.com/2011/07/23/a-comprehensive-critique-of-the-weaknesses-of-bitcoin/, http://www.royalmint.com/aboutus/policies-and-guidelines/legal-tender-guidelines, http://www.timesonline.co.uk/tol/news/politics/article620834.ece, http://www.cybercrime.gov/ssmanual/05ssma.html, http://civilprocedure.uslegal.com/jurisdiction/, http://www.currencyofprogress.com/_media/pdfs/case_studies/VISA_Inclusion-Pakistan.pdf, http://members.ozemail.com.au/born1820/m/method.htm, http://www.cato.org/pubs/briefs/bp-054es.html, http://www.webdevelopersnotes.com/basics/what_is_web_server.php, http://www.webopedia.com/TERM/D/digital_cash.html, http://www.wisegeek.com/what-is-data-storage.htm, http://www.wisegeek.com/what-is-online-banking92338, http://www.worldbank.org/finance/assets/Images/, http://uk.finance.yahoo.com/news/Revenues-From-Online-Payment-businesswireuk9382019.html?x=0, http://www.eetimes.com/story/OEG20011219S0016, http://www.justice.gov/dea/programs/money.html, http://www.imf.org/about/projects/worldbank, http://www.e-gold.com/unsecure/pgpkey.htm, http://www.itu.int/africainternet2000/Documents/doc7_e.htm, http://www.internetworldstats.com/stats/htm, http://www.wolfsberg-principles.com/index.html.
Franklin County, Wa Jail Roster Pdf,
Reference Check For A Bad Employee,
Strake Jesuit Teacher Salary,
Caesar Guerini Pro Staff,
Land For Sale In Sutton County, Texas,
Articles I