Skip to main content
Log in

Fighting money laundering in the age of online banking, virtual currencies and internet gambling

  • Article
  • Published:
ERA Forum Aims and scope

Abstract

The development of new concepts for tackling crime on the internet has been one of the priorities at both the national and international levels in recent years. One of the sectors where this problem poses specific challenges is money laundering over the internet. The paper seeks to contribute to the understanding of the complex problem of cyber-laundering by analysing the risks and challenges that tackling online money laundering poses to regulators and law enforcement agencies and indicating the way forward to deter the laundering of illicit profits in the internet more effectively.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Notes

  1. See: Bovet, Martha [3]; Voepel, Leiboldd, Tekie [40]; Peppard, Rylander [28].

  2. Tropina [36]; Gercke, Tropina, Lozanova, Sund [17].

  3. See e.g., UNODC [38].

  4. Council of Europe [7], p. 8.

  5. See: Weaver [41]; Blunden [2], p. 20.

  6. See e.g., Bjelajac [1], p. 7.

  7. Filipkowski [15].

  8. National Drug Intelligence Center [26], p. 4.

  9. Council of Europe [7], p. 42.

  10. See e.g., Weaver [41], p. 499.

  11. See e.g., Haines, Johnstone [18]; Council of Europe [7].

  12. See Filipkowski [15]; Dumitrache, Modiga [9], p. 50.

  13. FATF [12], p. 21.

  14. See: FATF [11].

  15. Council of Europe [7], p. 36.

  16. Council of Europe [7], p. 36.

  17. See, e.g., FATF [12].

  18. Council of Europe [7], p. 36.

  19. See Thomason [35], p. 24.

  20. FATF [12], p. 27.

  21. Council of Europe [7], p. 40–41.

  22. iDefence [19].

  23. Cisco [6], p. 9.

  24. Thomason [35], p. 18.

  25. Weaver [41], p. 456.

  26. Council of Europe [7], p. 42.

  27. Malhotra [23], p. 13.

  28. See e.g., Forbes [16], p. 28.

  29. Filipkowski [15], p. 23.

  30. See LIRNEasia & UP-NCPAG [22].

  31. See, e.g., Villasenor, Bronk, Monk [39], p. 13.

  32. See, e.g., Dumitrache, Modiga [9], p. 54.

  33. See FATF [12].

  34. See FATF [11], p. 2.

  35. FATF [11], p. 39.

  36. See Richet [30]; Piller, Zaccariotto [29], p. 70–71.

  37. Meiklejohn [24].

  38. Tucker [37], p. 601.

  39. FATF [12], p. 43.

  40. See Samani, Paget, Hart [31], p. 6–7.

  41. See Bryans [5].

  42. Samani, Paget, Hart [31], p. 8.

  43. European Central Bank [10].

  44. Samani, Paget, Hart [31], p. 45; Smyth [33].

  45. See Federal Bureau of Investigation [13].

  46. European Central Bank [10], p. 6.

  47. Brito, Castillo [4], p. 34.

  48. European Central Bank [10], p. 13–18.

  49. Brito, Castillo [4], p. 8.

  50. Irwin, Slay [20], p. 43.

  51. Filipkowski [15], p. 22.

  52. See, e.g., Council of Europe [8].

  53. For example, Council of Europe study in 2012 did not reveal any cases of this activity, see: Council of Europe [7], p. 57.

  54. Levi [21], p. 12.

  55. Fiedler [14], Mills [25].

  56. Schopper [32], p. 304.

  57. Villasenor, Bronk, Monk [39], p. 10.

  58. Weaver [41], p. 455; Filipkowski [15], p. 20–21.

  59. Council of Europe [7], p. 8.

  60. Weimer [42], p. 225.

  61. See e.g., Villasenor, Bronk, Monk [39], p. 5.

  62. Samani, Paget, Hart [31], p. 16.

  63. European Central Bank [10], p. 25.

  64. Brito, Castillo [4], p. 22.

  65. Schopper [32], p. 328–329.

  66. See e.g., Brito, Castillo [4], p. 34–35.

  67. Schopper [32], p. 328–329.

  68. Council of Europe [8], p. 9.

  69. Weimer [42], p. 226.

  70. Weimer [42], p. 226.

  71. Available at: http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=COM:2013:0045:FIN:EN:HTML

  72. Fiedler [14].

  73. Council of Europe [8], p. 12.

  74. Fiedler [14], p. 3.

  75. Council of Europe [8], p. 13.

  76. Villasenor, Bronk, Monk [39], p. 60–69.

  77. Tropina [36].

  78. OECD [27], p. 192; Tropina [36].

  79. Sparshott [34].

  80. See, e.g., FATF [12], p. 27.

References

  1. Bjelajac, Z.: Contemporary tendencies in money laundering methods: review of the methods and measures for its suppression. RIEAS research paper, No. 151 (2011). Available at http://www.rieas.gr/

  2. Blunden, B.: The Money Launderers: How They do It, and How to Catch Them at It. Management Books, Chalford (2001)

    Google Scholar 

  3. Bovet, D., Martha, J.: Value Nets: Breaking the Supply Chain to Unlock Hidden Profits. Wiley, New York (2000)

    Google Scholar 

  4. Brito, J., Castillo, A.B.: Bitcoin: A primer for policymakers. Mercatus Center at George Mason University (2013). Available at: mercatus.org/sites/default/files/Brito_BitcoinPrimer_embargoed.pdf

  5. Bryans, D.: Bitcoin and Money Laundering: Mining for an Effective Solution (August 29, 2013). Indiana Law Journal 89(1), 441–472 (2014). Available at SSRN. http://ssrn.com/abstract=2317990

    Google Scholar 

  6. Cisco: Cisco 2010 annual security report. Highlighting global security threats and trends (2011). Available at: http://www.cisco.com/en/US/prod/collateral/vpndevc/security_annual_report_2010.pdf

  7. Council of Europe: Moneywal report: criminal money flows on the internet: methods, trends and multi-stakeholder counteraction (2012). Available at: http://www.coe.int/t/dghl/monitoring/moneyval/typologies/MONEYVAL(2010)9_Reptyp_full_en.pdf

  8. Council of Europe: The use of online gambling for money laundering and the financing of terrorism purposes (2013). Research report. Available at: http://www.coe.int/t/dghl/monitoring/moneyval/Typologies/MONEYVAL(2013)9_Onlinegambling.pdf

  9. Dumitrache, A., Modiga, G.: New Trends and Perspectives in the Money Laundering Process. Challenges of the Knowledge Society. Law 1, 50–57 (2011)

    Google Scholar 

  10. European Central Bank: Virtual currency schemes. Report (2012). Available at: www.ecb.europa.eu/pub/pdf/other/virtualcurrencyschemes201210en.pdf

  11. FATF: Money laundering & terrorist financing vulnerabilities of commercial websites and internet payment systems (2008). Available at: http://www.fatf-gafi.org/

  12. FATF: Money laundering using new payment methods (2010). Available at. http://www.fatf-gafi.org/

  13. Federal Bureau of Investigation: Bitcoin virtual currency: intelligence unique features present distinct challenges for deterring illicit activity. 24 April 2012 (2012). Available at: www.wired.com/images_blogs/threatlevel/2012/05/Bitcoin-FBI.pdf

  14. Fiedler, I.: Online gambling as a game changer to money laundering? 30 April 2013 (2013). Available at SSRN: http://ssrn.com/abstract=2261266

  15. Filipkowski, W.: Cyber laundering: an analysis of typology and techniques. Int. J. Crim. Justice Sci. 3(1), 15–27 (2008)

    Google Scholar 

  16. Forbes, J.: Convergence of telecom and financial services and its effects on AML/CFT wire remittance operations. In: United Nations Asia and Far East Institute for the Prevention of Crime and the Treatment of Offenders (UNAFEI). Resource Material Series, vol. 71, pp. 24–31 (2007)

    Google Scholar 

  17. Gercke, M., Tropina, T., Lozanova, Y., Sund, C.: The role of ICT regulation in addressing offences in cyberspace. In: Trends in telecommunication reform 2010/11: enabling tomorrow’s digital world. International Telecommunications Union (2011)

    Google Scholar 

  18. Haines, J., Johnstone, P.: Global cybercrime: new toys for the money launderers. J. Money Laund. Control 2(4), 317–325 (1999)

    Article  Google Scholar 

  19. iDefence: Money mules: sophisticated global cyber criminal operations. iDefense, A VeriSign Company (2006). Available at: http://complianceandprivacy.com/WhitePapers/iDefense_MoneyMules_20060329.pdf

  20. Irwin, A., Slay, J.: Detecting money laundering and terrorism financing activity second life and world of warcraft. In: Proceedings of the 1st International Cyber Resilience Conference, Edith Cowan University, Perth Western, Australia. Available at: ro.ecu.edu.au/cgi/viewcontent.cgi?article=1004&context=icr

  21. Levi, M.: Money-Laundering Risks and e-Gaming: a European Overview and Assessment: Final Report. European Gaming and Betting Association (EGBA), Brussels (2009)

    Google Scholar 

  22. LIRNEasia & UP-NCPAG: Mobile banking, mobile money and telecommunication regulations (2008). Available at: http://lirneasia.net/wp-content/uploads/2008/05/Mobile-2.0_Final_Hor_EA.pdf

  23. Malhotra, G.K.: A new dimension of socio-economic offences: e-money laundering. 7 July 2010 (2010). Available at SSRN: http://ssrn.com/abstract=1505795

  24. Meiklejohn, S., et al.: A fistful of bitcoins: characterizing payments among men with no names. Login 38(6), 10–14 (2013). Available at: https://www.usenix.org/publications/login/december-2013-volume-38-number-6

    Google Scholar 

  25. Mills, J.: Internet casinos: a sure bet for money laundering. J. Financ. Crime 8(4), 365–383 (2001)

    Article  Google Scholar 

  26. National Drug Intelligence Center: Money laundering in digital currencies. U.S. Department of Justice, National Drug Intelligence Center (2008). Available at: http://www.justice.gov/archive/ndic/pubs28/28675/28675p.pdf

  27. OECD: The Role of Internet Intermediaries in Advancing Public Policy Objectives. OECD Publishing, Paris (2011)

    Google Scholar 

  28. Peppard, J., Rylander, A.: From value chain to value network: insights for mobile operators. Eur. Manag. J. 24(2–3), 128–141 (2006)

    Article  Google Scholar 

  29. Piller, G., Zaccariotto, E.: Cyber-laundering: the union between new electronic payment systems and criminal organizations. Trans. Stud. Rev. 16(1), 62–76 (2009)

    Article  Google Scholar 

  30. Richet, J.: Laundering money online: A Review of Cybercriminals Methods. Tools and resources for Anti-Corruption Knowledge, 1 June (2013). United Nations Office on Drugs and Crime (UNODC), Paris (2013). Available at: arXiv:1310.2368

    Google Scholar 

  31. Samani, R., Paget, F., Hart, M.: Digital laundry: an analysis of online currencies, and their use in cybercrime. White paper, McAfee® Labs. Available at (2013). http://www.mcafee.com/de/resources/white-papers/wp-digital-laundry.pdf

  32. Schopper, M.D.: Internet gambling, electronic cash & money laundering: the unintended consequences of a monetary control scheme. Chapman Law Rev. 5, 303 (2002)

    Google Scholar 

  33. Smyth, S.: Back to the future: in search of an understanding of crime and punishment in second life. Rutgers Comput. Technol. Law J. 36, 18 (2009)

    Google Scholar 

  34. Sparshott, J.: Bitcoin exchange makes apparent move to play by U.S. money-laundering rules. Wall Street J., 28 June (2013), http://online.wsj.com/article/SB10001424127887323873904578574000957464468.html

  35. Thomason, C.: How has the establishment of the internet changed the ways in which offenders launder their dirty money? Internet Journal of Criminology (2009). Available at: http://www.internetjournalofcriminology.com/Thomason_Internet_Money_Laundering_July_09.pdf

  36. Tropina, T.: Self- and co-regulation in fighting cybercrime and safeguarding cybersecurity. In: Jähnke J., et al.(eds.) Current Issues in IT Security, pp. 155–170. Duncker & Humblot, Berlin (2012)

    Google Scholar 

  37. Tucker, P.: The digital currency doppelganger: regulatory challenge or harbinger of the new economy? J. Int. Comp. Law 17(3), 589 (2009)

    Google Scholar 

  38. UNODC: Comprehensive Study on Cybercrime. UNODC, Vienna (2013)

    Google Scholar 

  39. Villasenor, J., Bronk, C., Monk, C.: Shadowy figures: tracking illicit financial transactions in the murky world of digital currencies, peer-to-peer networks, and mobile device payments. Paper, The Brookings Institution and the James A. Baker III Institute for Public Policy (2011). Available at: http://bakerinstitute.org/media/files/Research/d9048418/ITP-pub-FinancialTransactions-082911.pdf

  40. Voepel, S., Leibold, M., Tekie, E.: The wheel of business model to leapfrog competitors. J. Chang. Manag. 4(3), 259–276 (2004)

    Article  Google Scholar 

  41. Weaver, S.: Modern day money laundering: does the solution exist in an expansive system of monitoring and record keeping regulations? Annu. Rev. Bank. Law Financ. Law 24, 443–465 (2005)

    Google Scholar 

  42. Weimer, W.: Cyberlaundering: an international cache for microchip money. DePaul Bus. Law J. 13(1–2), 199 (2000–2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tatiana Tropina.

Additional information

This article is based on a presentation given at the seminar Tackling Cyberlaundering More Effectively, organised by ERA on 11–12 April 2013 in Lisbon.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Tropina, T. Fighting money laundering in the age of online banking, virtual currencies and internet gambling. ERA Forum 15, 69–84 (2014). https://doi.org/10.1007/s12027-014-0335-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12027-014-0335-2

Keywords

Navigation