Skip to main content

Cyberlaundering: Concept & Practice

  • Chapter
  • First Online:
Legal Principles for Combatting Cyberlaundering

Part of the book series: Law, Governance and Technology Series ((LGTS,volume 19))

  • 1072 Accesses

Abstract

This chapter investigates the concept of cyberlaundering and attempts to deconstruct the concept legally (See Leslie (2010, Chap. 3)). Bearing in mind that cyberlaundering borders the fields of money laundering and cyber crime, the chapter starts off by investigating the rationale behind the advent of cyberlaundering. Furthermore, this chapter attempts to understand and categorize cyberlaundering as a legal concept.

This chapter also delves further into some technical aspects of cyberlaundering by assessing the ‘tools’ used for cyberlaundering, in the form of electronic payment systems, which are conducive to the commission of the crime. One needs to understand this at the outset in order to fully grasp the different methods and techniques used by criminals on the internet. This enables one to get an idea of what cyberlaundering might look like in the future. The latter is important for two primary reasons: First, given that the understanding of the cyberlaundering phenomenon is limited, it would be useful to describe the current trend, in order to understand aspects of cyberlaundering better. Secondly, knowing the direction in which the cyberlaundering wind is blowing helps to devise the regulatory legal framework to minimize the dangers it poses.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 119.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Hopton (2009, p. 2). See previous discussions in Chapter 1.

  2. 2.

    Murphy (2009, p. 1).

  3. 3.

    Cf Reyes et al. (2007, p. 33); Koops and Brenner (2006, p. 20) and Wall (2007, p. 12). See previous discussions in Chapter 1.

  4. 4.

    See paragraph 4.4.1 below.

  5. 5.

    Cf Shelly and Vermaat(2010, p. 9) and Molly and Parker (2010, p. 23).

  6. 6.

    Molly and Parker (2010, p. 23). Online gaming refers to gaming activities that occur within the environment of the internet.

  7. 7.

    Cf Shelly and Vermaat(2010, p. 44).

  8. 8.

    Living Internet (an undated internet article) ‘History of the Internet’ available at <http://www.livinginternet.com> [accessed on 10 February 2013]. Cf Ryan (2010, p. 3).

  9. 9.

    Cf Ryan (2010, p. 3) and Living Internet (an undated internet article) ‘History of the Internet’ available at <http://www.livinginternet.com> [accessed on 10 February 2013].

  10. 10.

    A breakdown of the figure shows the following: In Africa, there are about 118, 609, 620 people; in Asia 922, 329, 554; in Europe 476, 213, 935; in the Middle East, 68, 553, 666; in North America, 272, 066, 000; in Latin America, 215, 939, 400, and in Oceania/Australia, 21, 293, 830 people. See Internet World Stats <http://www.internetworldstats.com/stats/htm> [accessed on 15 July 2013].

  11. 11.

    Internet World Stats <http://www.internetworldstats.com/stats/htm> [accessed on 15 July 2013].

  12. 12.

    Internet World Stats <http://www.internetworldstats.com/stats/htm> [accessed on 15 July 2013].

  13. 13.

    World Summit on the Information Society (2003, p. 1). Cf Lucchi (2011, p. 646).

  14. 14.

    British Broadcasting Cooperation <http://news.bbc.co.uk/2/hi/8548190.stm> [accessed on 15 July 2013].

  15. 15.

    For more information on the projects of the ITU see <http://www.itu.int/africainternet2000/Documents/doc7_e.htm> [accessed on 15 July 2013].

  16. 16.

    COM (2007) 697 and COD/2007/0247.

  17. 17.

    Council of Europe: Council Directive 2009/136/EC, on universal service and users’ rights relating to electronic communications networks and services, adopted by the Parliamentary Assembly on 25 November 2009 and came into force on 18 December 2009. Cf Article 1 of the Council of Europe: Council Directive 2002/58/EC, on the processing of personal data and the protection of privacy in the electronic communications sector and Regulation (EC) No 2006/2004 on cooperation between national authorities responsible for the enforcement of consumer protection laws adopted by the Parliamentary Assembly on 12 July 2002 and came into force on 31 July 2002.

  18. 18.

    British Broadcasting Cooperation available at <http://news.bbc.co.uk/2/hi/8548190.stm> [accessed on 15 July 2013].

  19. 19.

    Government interference or regulation of the internet has always been a sensitive issue. As this study shows, regulation of the internet is very expedient in order to prevent problems such as cyberlaundering that plague economies the world over. However, the main issue is not whether or not regulation should occur, but the extent of it. For instance, in the United Kingdom (‘UK’), the controversial Digital Economy Act 2010 (Chapter 24) promises to deliver universal broadband in the United Kingdom (UK) by 2012. This law gives regulators new powers to disconnect or slow down the internet connections of illegal file-sharers and other cyber criminals. Countries such as France and Germany are also considering introducing similar laws. British Broadcasting Cooperation <http://news.bbc.co.uk/2/hi/8548190.stm> [accessed on 15 July 2013].

  20. 20.

    Searching Cloud Computing (an undated website document) ‘Cloud Computing’ available at <http://searchcloudcomputing.techtarget.com/definition/cloud-computing> [accessed on 15 July 2013].

  21. 21.

    Cloud computing differs significantly from a traditional hosting service, as it is sold on demand. The user can determine how much of the service it wants at a given time and the service is fully managed by the relevant provider. See Searching Cloud Computing (an undated website document) ‘Cloud Computing’ available at <http://searchcloudcomputing.techtarget.com/definition/cloud-computing> [accessed on 15 July 2013].

  22. 22.

    See the elaborate discussion in Mandujano (2003, p. 4). Cf Reiter and Rubin (1998, p. 21).

  23. 23.

    Pseudonymity refers to the case where one uses another’s name or takes on another’s persona in order to make an artistic or literary expression. Allonymity is a slight variant of the former, as it refers to a writer’s assumption of an historic literary figure in a literary writing.

  24. 24.

    Cf Joinson (2001, p. 177), Wallace (1999, p. 3) and Abelson (2001, p. 1).

  25. 25.

    Joinson (2001, p. 177) and Abelson (2001, p. 1). Cf Palme and Berglund (2002, p. 3).

  26. 26.

    Palme and Berglund (2002, p. 2).

  27. 27.

    See Kiviat (2010, p. 2), Chawki (2010, p. 32) and Kirtley (2010, p. 1478). Cf for conflicting views: Moore (2009, p. 58) and Palme and Berglund (2002, p. 2).

  28. 28.

    Cf Chapter 5, for detailed discussions.

  29. 29.

    Baran (2011, p. 2).

  30. 30.

    Youtube is owned by Google and is the world’s largest video sharing website, boasting billions of users from around the world.

  31. 31.

    Baran (2011, p. 2).

  32. 32.

    Baran (2010, p. 1). Cf Schroeder (2007) ‘Censored: List of Countries That Banned YouTube’ available at <http://mashable.com/2007/05/30/youtube-bans/> [accessed on 10 July 2013].

  33. 33.

    Human Rights Watch (2011, p. 65).

  34. 34.

    Hughes (2010, p. 1).

  35. 35.

    Informatics is the science of information, the practice of information processing, and the engineering of information systems. Informatics studies the structure, algorithms, behaviour, and interactions of natural and artificial systems that store, process, access and communicate information, i.e. the computer. It also develops its own conceptual and theoretical foundations and utilizes foundations developed in other fields. Fourman (2002, p. 1).

  36. 36.

    Some authors have described cyberlaundering in this light. See Hunt (2011, p. 133) and Filipkowski (2008, p. 4).

  37. 37.

    This is highly debatable. One report shows that in the United Kingdom alone, banks lose up to ₤ 1 million per day in phishing and malware attacks. See Evron (2008, p. 1). Another report shows that, on an annual basis, an average of $ 52 million is lost to organisations in the United States alone as a result of cyber crime attacks. See ArcSight (2010, p. 1). These statistics, however, present sector-based facts. There are not very detailed statistics showing the economic impact of cyberlaundering as yet. However, riding on the notion that over $ 5 trillion is laundered on an annual basis (as far back as 2007), and that a substantial percentage is added through cyberlaundering, the statement would not be far-fetched. See Ehrenfeld and Lappen (2007, p. 1).

  38. 38.

    See paragraph 2.4 below.

  39. 39.

    See Chapter 5 for further discussion.

  40. 40.

    This is so because of the question of legality, hence why cyberlaundering has to be conceptualized legally. See discussion in Chapter 4, paragraph 4.4.1.

  41. 41.

    Von Hayek (1978, p. 12). Cf Demetis (2010, p. 19).

  42. 42.

    Business Dictionary (an undated website document) ‘Electronic Payment System’ available at <http://www.businessdictionary.com/definition/electronic-payment-system.html> [accessed on 25 July 2013].

  43. 43.

    Manzoor (2008, p. 213). Cf IGNOU (an undated website document) ‘Electronic Payment Systems’ available at <http://webserver.ignou.ac.in/virtualcampus/adit/course/cst304/ecom2.htm> [accessed 2 August 2013].

  44. 44.

    Electronic Funds transfer refers to the transfer of funds initiated through an electronic terminal, telephonic instrument, or computer or magnetic tape in order to instruct or authorize a financial institution to debit or credit an account. Manzoor (2008, p. 214) and Lassila (2011, p. 54).

  45. 45.

    Lassila (2011, p. 54) and Manzoor (2008, p. 214). Cf Geva (1992, p. 23).

  46. 46.

    Demetis (2010, p. 19).

  47. 47.

    Newman and Clarke (2003, p. 23). Cf Fukuyama (1995, p. 15).

  48. 48.

    See paragraph 2.2.1 below

  49. 49.

    An instance where illegal funds can be derived from the cyberworld is when one profits from running an unlicensed website on the internet. See elaborate discussion in Chapter 5, paragraph 6.5.2 below.

  50. 50.

    An example of this can be seen in several cyberlaundering techniques, such as virtual worlds, online banking, online gambling and online barter trade to name a few. See discussion in paragraph 3.5 below.

  51. 51.

    Cf an alternative definition by the European Union: “Electronic money means electronically, including magnetically, stored monetary, stored monetary value as represented by a claim on the issuer which is issued on receipt of funds for the purpose of making payment transactions […], and which is accepted by a natural or legal person other than the electronic money issuer.” See Article 2(2), Council of Europe: Council Directive 2009/110/EC on the taking up, pursuit and prudential supervision of the business of electronic money institutions, adopted by the Parliamentary Assembly on 16 September 2009, and which came into force on 30 October 2009.

  52. 52.

    Webopedia (an undated website document) ‘Digital Cash’ available at <http://www.webopedia.com/TERM/D/digital_cash.html> [accessed on 04 August 2013]. Several other definitions of e-money have been proposed as well. For example, the Electronic Money Institutions European Directive defines it as monetary value as represented by a claim on the issuer which is: (i) stored on an electronic device; (ii) issued on receipt of funds of an amount not less in value than the monetary value issued; (iii) accepted as means of payment by undertakings other than the issuer.’ See Directive 2000/46/EC of the European Parliament and of the Council of 18 September 2000 on the taking up, pursuit of and prudential supervision of the business of electronic money institutions (O.J.E.C. L275/39, 27/10/2002). The latter definition is very elaborate. One very important criticism that can be levied against it is that it confines the notion of electronic cash to monetary value, thereby automatically excluding internet cash, such as DigiCash and store reward points.

  53. 53.

    Investopedia (an undated website document) ‘Electronic Money’ available at <http://www.investopedia.com/terms/e/electronic-money.asp> [accessed on 4 August 2013].

  54. 54.

    Javelin Strategy and Research (2010) ‘Online Retail Payments Forecast 2010–2014: Alternative Payments Growth Strong but Credit Card Projected for Comeback’ available at <https://www.javelinstrategy.com/research/Brochure-171> [accessed on 4 August 2013].

  55. 55.

    Javelin Strategy and Research (2010) ‘Online Retail Payments Forecast 2010–2014: Alternative Payments Growth Strong but Credit Card Projected for Comeback’ available at <https://www.javelinstrategy.com/research/Brochure-171> [accessed on 4 August 2013].

  56. 56.

    Companies and Markets (2011) ‘The Future of Online and Mobile Payments’ available at <http://www.companiesandmarkets.com/Market-Report/the-future-of-online-and-mobile-payments-625842.asp> [accessed on 04 August 2013]. Cf Yahoo Finance (an undated website document) ‘Revenue of Online Payment set to hit $ 2700 billion by 2015’ available at <http://uk.finance.yahoo.com/news/Revenues-From-Online-Payment-businesswireuk-9382019.html?x=0> [accessed on 04 August 2013].

  57. 57.

    Fairlie and Chatterji (2011, p. 23). Cf paragraph 2.1.2 supra.

  58. 58.

    In the United States, between 2009 and 2010, e-commerce grew from an estimated $ 157 to $ 176 billion, respectively, and by 2015 this growth is expected to reach $ 279 billion. Forester (an undated website document) ‘United States (US) Online Retail Forecast, 2010 to 2015’ available at <http://www.forrester.com/rb/Research/us_online_retail_forecast,_2010_to_2015/q/id/58596/t/2> [accessed on 12 August 2013]. In Europe, it is estimated that the number of online buyers that currently stands at 157 million in 2011, and will grow to 205 million by 2015. Forester (an undated website document) ‘European Online Retail Forecast, 2010 to 2015’ <http://forrester.com/rb/Research/european_online_retail_forecast%2C_2010_to_2015/q/id/58597/t/2> [accessed on 12 August 2013].

  59. 59.

    Chaudhary et al. (2010, p. 30).

  60. 60.

    Cf Financial Action Task Force (2010c, p. 7).

  61. 61.

    Cf discussion in Chapter 1 on smurfs and smurfing.

  62. 62.

    Cf Financial Action Task Force (2010c, p. 7).

  63. 63.

    FinCEN is the financial intelligence arm of the United States Department of Treasury. It is tasked with the regulation and control of financial crimes. See Financial Crimes Enforcement Network (2009, p. 2).

  64. 64.

    Financial Crimes Enforcement Network (an undated report) ‘Money in Cyberspace’ <http//www.fincen.org/resource-moneyincyberspace/1212> [accessed on 17 June 2013].

  65. 65.

    Jailani et al. (2008, p. 240). Cf Vincent et al. (2010, p. 157). See also discussions in paragraph 3.3.4 below.

  66. 66.

    Kellerman (2004, p. 3).

  67. 67.

    Jamali (2009, p. 14) and Reuter and Truman (2004, p. 124). Countries in the Carribean have often been the dumping ground for funds derived from criminal activities, as they are known to have very weak financial systems. It is only recently that the Financial Action Task Force removed several of those countries from its black list.

  68. 68.

    Reuter and Truman (2004, p. 124). Cf Kellerman (2004, p. 3).

  69. 69.

    Kellerman (2004, p. 3).

  70. 70.

    Cybercash (an undated website document) ‘About us’ available at <http://www.cybercash.com/about/file/> [accessed on 19 June 2013].

  71. 71.

    The Virgin pre-paid cards are especially popular in the USA, South Africa, the United Kingdom (UK) and other parts of Europe. For more information, see Virgin Cards (an undated website document) ‘About us’ available at <http://www.virgin.co.uk/pre-paidcards> and Freedom Eagle Card (an undated website document) ‘About’ available at <http://www.freedomeagle.com> [both accessed on 19 June 2013].

  72. 72.

    Jamali (2009, p. 14).

  73. 73.

    See Mondex Card (an undated website document) ‘About’ <http://www.mondex.com/about/> [accessed on 19 June 2013]. PayPal is another very similar example of a company that utilizes the peer-to-peer system. See PayPal (an undated website document) ‘About us’ available at <http://www.paypal.com> [accessed on 9 June 2010].

  74. 74.

    See paragraph 3.5.4 below.

  75. 75.

    E-gold (an undated website document) ‘About’ available at <http://www.e-gold.com/unsecure/qanda.html> [accessed on 14 August 2013].

  76. 76.

    E-gold (an undated website document) ‘About’ available at <http://www.e-gold.com/unsecure/qanda.html> [accessed on 14 August 2013].

  77. 77.

    E-gold (an undated website document) ‘About’ available at <http://www.e-gold.com/unsecure/qanda.html> [accessed on 14 August 2013].

  78. 78.

    This is discussed extensively more elaborately in Chapter 5.

  79. 79.

    Nakamoto (2009, p. 1). Cf Bitcoin (an undated website document) ‘About’ available at <http://www.bitcoin.org> [accessed on 8 August 2013].

  80. 80.

    Scrofina (2011) ‘If one were to make a competitor for Bitcoin, what would it be?’ available at <http://www.quora.com> [accessed 5 August 2013]. Cf The Daily Attack ‘A comprehensive critique of the weaknesses of Bitcoin’ <http://thedailyattack.com/2011/07/23/a-comprehensive-critique-of-the-weaknesses-of-bitcoin/> [accessed 5 August 2013].

  81. 81.

    Scrofina (2011) ‘If one were to make a competitor for Bitcoin, what would it be?’ available at <http://www.quora.com> [accessed 5 August 2013]. Cf The Daily Attack ‘A comprehensive critique of the weaknesses of Bitcoin’ <http://thedailyattack.com/2011/07/23/a-comprehensive-critique-of-the-weaknesses-of-bitcoin/> [accessed 5 August 2013].

  82. 82.

    See Reuter and Truman (2004, p. 125).

  83. 83.

    See paragraph 3.5 below.

  84. 84.

    Chuah (2000, p. 182). Cf Guadamuz (2003, p. 8).

  85. 85.

    Robertson (1999, p. 253). Cf Guadamuz (2003, p. 8).

  86. 86.

    See Ecash available at <http://www.ecash.com/online/> [accessed on 4 August 2013]. Similar companies are CyberCash available at <http://www.cybercash.com> [accessed on 4 August 2013], and NetCash available at <http://www.netbank.com/~netcash> [accessed on 4 August 2013].

  87. 87.

    In spite of the discussion in the preceding paragraph, e-wallet can also be considered as a prepaid token because it has the feature of a prepaid instrument, even though it is created by a software programme.

  88. 88.

    Financial Action Task Force (2006, p. 4).

  89. 89.

    Financial Action Task Force (2006, p. 4). Payments Council (2010) ‘The Way We Pay 2010, The UK’s Payment Revolution’ available at <http://www.paymentscouncil.org.uk//files/payments_council/the_way_we_pay_2010_final.pdf [accessed on 30 August 2013].

  90. 90.

    Financial Action Task Force (2006, p. 4).

  91. 91.

    Financial Action Task Force (2006, p. 4). Cf Financial Action Task Force (2010d, p. 13).

  92. 92.

    Financial Action Task Force (2006, p. 4).

  93. 93.

    Reuter and Truman (2004, p. 123). Cf United States Government Accounting Office (2009, p. 1). See also Financial Crimes Enforcement Network (an undated report) ‘Money in Cyberspace,’ available at <http//www.fincen.org/resource-moneyincyberspace/1212> [accessed on 17 June 2013].

  94. 94.

    A smart card certainly has numerous advantages, as it does not merely create convenience for individuals personally, but for governments and institutions as well. Recently, the Pakistani government partnered with a bank to distribute smart cards with a value up to about 25,000 Pakistani rupees to its citizens. At the same time the bank and the smart card company set up wireless point of sale terminals where people can buy basic supplies. This initiative comes as result of the fact that most Pakistanis are without bank accounts, making it impossible to make payments directly into any bank account. Financial Action Task Force (2010d, p. 13). Cf Visa Corporate Site (2010) ‘Financial Inclusion—Pakistan eases the burden of displaced citizens by delivering financial support through “Visa,”’ available at <http://www.currencyofprogress.com/_media/pdfs/case_studies/VISA_Inclusion-Pakistan.pdf> [accessed October 2010]. See also MONEYVAL (2012, p. 23).

  95. 95.

    Payment News (2010, p. 23).

  96. 96.

    United States Government Accounting Office (2009, p. 1). Also see Financial Crimes Enforcement Network (an undated report) ‘Money in Cyberspace’ available at <http//www.fincen.org/resource-moneyincyberspace/1212> [accessed on 17 June 2013].

  97. 97.

    This is usually the case with the occurrence of identity theft, where criminals acquire monetary value by stealing another person’s details, like a credit card or account number. This is called identity theft.

  98. 98.

    Mondex Card (an undated website document0 ‘About us’ available at <http://www.mondexcard.com/about/file838/> [accessed on 17 June 2010].

  99. 99.

    This was noted by Stanley Morris (the director of FinCEN) in his 1995 address to the Congress Banking Committee, available at <http://www.fincen.org/resource> [accessed on 17 June 2013].

  100. 100.

    The Know Your Customer principle was first introduced in section 100 of the Bank Secrecy Act (1970), PubL 91-508; 841114. The principle mandates financial institutions and the like to undergo a thorough vetting process for prospective customers before transacting with them. See more detailed discussion in Chapter 1.

  101. 101.

    Freedom Eagle Cash Card available at <http://www.freedom-card.co.uk/> [accessed on 2 September 2010].

  102. 102.

    Cf Encyclopedia (an undated website document) ‘E-Cheques’ available at <http://www.encyclopedia.com/doc/1O12-electroniccheque.html> [accessed on 4 August 2013].

  103. 103.

    Encyclopedia (an undated website document) ‘E-Cheques’ available at <http://www.encyclopedia.com/doc/1O12-electroniccheque.html> [accessed on 4 August 2013].

  104. 104.

    As depicted in Chapter 1, the three stages of money laundering are always described extensively in almost every discussion on money laundering. The following are some examples of works that provide such detailed discussions: Reuter and Truman (2004, p. 43), Madinger and Zalopany (1999, p. 54), Filipkowski (2008, p. 45) and Ping (2004, p. 43).

  105. 105.

    Philippsohn (2001, p. 490). Also see Jamali (2009, p. 14).

  106. 106.

    Philippsohn (2001, p. 489). Cf Ping (2004, p. 55) and Jamali (2009, p. 32).

  107. 107.

    See paragraph 3.5.4. below for a full discussion on this.

  108. 108.

    See the full discussion on E-gold Ltd in paragraph 3.5.4. below.

  109. 109.

    The process could be as simple as an existing customer of an electronic card company calling the company to credit an already exhausted smart card, or to give an order to transfer some value from an electronic card with illegal money to another person’s account.

  110. 110.

    An online shell company serves as a vehicle for business transactions, without itself having any significant asset or operation. It is usually set up to aid the layering of funds, and has several key features, such as being registered in very unscrupulous jurisdictions and having an existing bank account that facilitates the movement of funds. See related discussions in Chapter 1. See also Reuter and Truman (2004, p. 33).

  111. 111.

    Philipsohn (2002, p. 4).

  112. 112.

    Jamali (2009, p. 14).

  113. 113.

    See paragraph 2.4 below.

  114. 114.

    Hinterseer (1997, p. 160). Cf. Reuter and Truman (2004, p. 41) and Hunt (2011, p. 134).

  115. 115.

    Filipkowski (2008, p. 6).

  116. 116.

    Wise Geek (an undated website document) ‘What is online banking?’ available at <http://www.wisegeek.com/what-is-online-banking92338> [accessed on 12 June 2013].

  117. 117.

    The ease of access created through the use of debit cards and the platform of the internet makes online banking a haven for cyberlaunderers. Cf Filipkowski (2008, p. 233), Kellerman (2004, p. 2), Lilley (2007, p. 1) and Ping (2004, p. 50).

  118. 118.

    The FDIC was created by the Banking Act of 1933 (Public Law Number: 73-66). The Act is generally known as the Glass-Steagall Act, after its legislative sponsors, Senator Carter Glass and Senator Henry B. Steagall. The Act introduced major banking reforms in the United States, which include a differentiation in the activities of commercial banks and investment banks. The FDIC currently guarantees the safety of deposits by individual depositors to the tune of $ 250,000. See Federal Deposit Insurance Corporation (2012) ‘Frequently Asked Questions About the FDIC’ available at <http://www.fdic.gov/about/affaq.html> [accessed on 02 August 2013].

  119. 119.

    Act 18 of 1986.

  120. 120.

    Filipkowski (2008, p. 6). Cf Ping (2004, p. 44).

  121. 121.

    Ping (2004, p. 41). Cf Hunt (2011, p. 135).

  122. 122.

    The issue of privacy is a very sensitive one, as it affects the fundamental right of the person as well as the public interest, and the interests of justice. Cf detailed discussion on the right to privacy vis-à-vis cyberlaundering in Chapter 5 paragraph 5.1.2.

  123. 123.

    The fact that the funds can be withdrawn later through the use of an ATM makes things the more easier. In May 2013, an incident described as the twenty-first century international bank heist occurred. This involved perpetrators in several countries who, within hours, and in concert, successfully stole $ 45 million from ATMs all over the world. The current state of online banking facilitated the success of this operation. See Bits (2013) “Daily Report: International ATM Theft Takes $ 45 million” <http://bits.blogs.nytimes.com/2013/05/10/daily-report-international-a-t-m-theft-takes-45-million/?_r=0> (accessed September 05, 2013).

  124. 124.

    Jamali (2009, p. 18). Cf Marshall et al. (2005, p. 115) and Pillai and Juian (2008, p. 14).

  125. 125.

    The question of jurisdiction is one of the many grey aspects of cyberlaundering, which this treatise attempts to answer. This is discussed thoroughly in Chapter 5, paragraph 5.4.

  126. 126.

    Marshall et al. (2005, p. 115).

  127. 127.

    Marshall et al. (2005, p . 115). Cf Jamali (2009, p. 19).

  128. 128.

    Jamali (2009, p. 18). Cf Pillai and Juian (2008, p. 14). Another method by way of which one’s identity can be stolen online is through the use of spoof websites. These websites make certain attractive offers to the visitors on the condition that they provide them with certain personal details. See Atta-Asamoah (2009, p. 109).

  129. 129.

    This is due to the large number of users of auction websites per month. They are now estimated at 16 million, and as a result of the concomitant side effects, 87 % of fraud cases are believed to be related to auction websites. As far back as 1987, when the internet was still in infancy, consumer complaints of online auction websites being used as tools for fraud was estimated at 1280 per annum. This rose to an unsettling estimate of 10660 per annum in 1999. Today, the complaints are innumerable. Newman and Clarke (2003, p. 15). Cf Haney (2001, p. 26) and Messner (2000, p. 4).

  130. 130.

    Filipkowski (2008, p. 9).

  131. 131.

    Jamali (2009, p. 18). Cf Marshall et al. (2005, p. 112).

  132. 132.

    online gaming was estimated as having a world-wide worth of US$ 20 billion as at 2010, with estimations showing an increase to US$ 30 billion by 2012, and with online gambling constituting more than half of the gross. KPMG (2010, p. 4).

  133. 133.

    Mussington et al. (1998, p. 53). Cf Financial Action Task Force (2009b, p. 2).

  134. 134.

    In the period 1999 to 2001, the revenue derived from online gambling spiked from $ 651 million in 1999 to $ 2238 million in 2001 (See NUA (an undated website document) ‘Surveys’ available at <http://www.nua.org> [accessed on 3 August 2013]. In Europe, Italy has the biggest online gambling market, which grew from € 3.4 billion in 2009 to € 4.8 billion in 2010. In Greece, also, online gambling rakes in an estimated € 2 billion annually, and the government is considering taxing the industry and regulating it, considering that its annual revenue can go a long way in helping its crumbling economy. Despite the dwindling economies of these countries, this industry still thrives, and was unaffected by the recent recession that plagued several countries in Europe. See Online Poker News (an undated website document) ‘Italian Online Gambling worth € 4.8 billion’ available at <http://www.onlinepoker.net/poker-news/poker-law-industry-news/italian-online-gambling-worth-48bn-rising-legislation/9394> [accessed on 3 August 2013]. See also Streak Gambling (an undated website document) ‘Online Gambling worth 2bn in Europe’ available at <http://www.streakgaming.com/forum/online-gambling-worth-2-billion-greece-t22194.html> [accessed on 3 August 2013].

  135. 135.

    Times (an undated website document) ‘Online Gambling’ available at <http://www.timesonline.co.uk/tol/news/politics/article620834.ece> [accessed on 21 July 2013]. Cf discussion in Schopper (2002, p. 309).

  136. 136.

    In 2009, the number of online gambling sites was estimated at around 1800. This number was predicted to triple in the coming years. See The United States Government Accounting Office (2009, p. 1). Cf Financial Action Task Force (2009b, p. 2).

  137. 137.

    Bumeter (2001, p. 2). Cf Schopper (2002, p. 310). A third form of online gambling, called live-based gambling, exists. It enables more interaction between players or participants in the gambling activity. However, it is not very significant for the purposes of this study, as compared to the other two forms.

  138. 138.

    With this option, however, a cyberlaunderer need not even play or engage in actual wagering activities, given the possibility that funds could be merely ‘dumped’ into one’s account at a casino, which could be recorded as ‘winnings’ and which, thereafter, could be moved to another account, without the fear that the casino might be monitoring the activities in question. Cf Gottfried (2004, p. 26).

  139. 139.

    Schopper (2002, p. 312). Cf Bumeter (2001, p. 7).

  140. 140.

    This includes most countries in Europe, the Caribbean and North America. See KPMG International (2010, p. 23). In Africa, only South Africa has express provisions legalizing internet gambling, although these are subject to certain regulations under the National Gambling Act 7 of 2004.

  141. 141.

    The Bombay Wager Act IV of 1887 (Part 1).

  142. 142.

    Some states in the United States (US) such as Illinois, Indiana, Louisiana, Montana, Nevada, Oregon, South Dakota, and Washington have strong laws against online gambling. Bluejay (2012, p. 1).

  143. 143.

    The Federal Wire Act 87 of 1961 (popularly called ‘The Wire Act’). In the United States (US), in a recent case of United States of America v. Scheinberg et al 10 Cr. 336 (2011) three online poker companies were indicted for circumventing United States (US) laws that prohibit the operations of unlicensed online gambling websites that accept illegal funds for the purposes of gambling online. The rationale was reemphasized that the electronic transmission of betting and wagering activities is illegal under the laws of the Wire Act.

  144. 144.

    Schopper (2002, p. 304).

  145. 145.

    Financial Action Task Force (2006, p. 44). Cf Financial Action Task Force (2010d, p. 13).

  146. 146.

    The resulting case of United States of America v. E-Gold Ltd, Douglas Jackson, Barry K. Downey, and Reid A. Jackson, 521 F.3d 411, 417 (D.C. Circuit) (2008), is discussed in detail in Chapter 5 below at paragraph 5.5.1.

  147. 147.

    E-gold (an undated website document) ‘About us’ available at <http://www.e-gold.com/unsecure/qanda.html> [accessed on 14 July 2013].

  148. 148.

    E-gold (an undated website document) ‘About us’ available at <http://www.e-gold.com/unsecure/qanda.html> [accessed on 14 July 2013].

  149. 149.

    There are several ways in which e-gold can be converted to traditional cash. One can load a debit card with e-gold and cash it out at an ATM. However, the debit card must be anonymous in order not to leave a trail. Most anonymous debit cards do not require any form of identification and social security numbers, such as Cash Cards Internationals and RoboXchange Cards. Another method of conversion is through the use of some ‘electronic money merchants’ who accept e-gold currency. These types of merchants will accept e-gold for cash at commercial merchants. Also, some merchants trade certain products for e-gold. For example, a smart card company known as ‘gCard’ can be purchased with e-gold, which can be converted to cash through an ATM. In addition, e-gold currency can be converted to traditional cash, using the e-gold cirrus maestro ATM debit card, which is cashable at most ATMs. Cf Grow et al. (2006) ‘Gold Rush: Online payment systems like e-gold Ltd are becoming the currency of choice for cybercrooks’ available at <http://www.businessweek.com/magazine/content/06_02/b3966094.htm> [accessed on 1 January 2013].

  150. 150.

    Grow et al. (2006) ‘Gold Rush: Online payment systems like e-gold Ltd are becoming the currency of choice for cybercrooks’ available at <http://www.businessweek.com/magazine/content/06_02/b3966094.htm> [accessed on 1 January 2013].

  151. 151.

    Grow et al. (2006) ‘Gold Rush: Online payment systems like e-gold Ltd are becoming the currency of choice for cybercrooks’ available at <http://www.businessweek.com/magazine/content/06_02/b3966094.htm> [accessed on 1 January 2013].

  152. 152.

    See paragraph 3.3.2.4 above.

  153. 153.

    Grow et al. (2006) ‘Gold Rush: Online payment systems like e-gold Ltd are becoming the currency of choice for cybercrooks’ available at <http://www.businessweek.com/magazine/content/06_02/b3966094.htm> [accessed on 1 January 2013].

  154. 154.

    Cf discussion in Chapter 4, paragraph 4.4.3.

  155. 155.

    E-gold (an undated website document) ‘Contact’ available at <http://www.e-gold.com/unsecure/qanda.html> [accessed on 14 July 2013]. Cf Phil Osborne’s quoted commentary in Kellerman (2004, p. 4).

  156. 156.

    This is an example of a real-life scenario involving e-gold Ltd. See Grow et al. (2006) ‘Gold Rush: Online payment systems like e-gold Ltd are becoming the currency of choice for cybercrooks’ available at <http://www.businessweek.com/magazine/content/06_02/b3966094.htm> [accessed on 1 January 2013].

  157. 157.

    Cf Klimmt (2011, p. 1) and Bishop (2009, p. 5).

  158. 158.

    An avatar is a digital representation of an individual on the internet. An avatar can be created by the online gamer, who has the liberty of cloning this digital representation into any form or appearance he chooses. Given the highly developed state of graphic arts and designs at present, the idea of an avatar far exceeds merely a cartoon figure, as the semblance with reality is often uncanny.

  159. 159.

    In many cases, for individuals seeking to use the business aspect of participating in virtual worlds, this task is outsourced to certain skilled individuals. Every avatar in a virtual world has to undergo evolution and development of skills, which it can perform within the virtual economy. Given the painstaking nature of the required evolution, at present, this initial process is being outsourced to certain persons in India, China, Pakistan or to most other developing countries with developed cyber expertise, who are, in turn, paid a few dollars as remuneration. Once avatars are brought up to a certain standard, they are then passed over to their original creator, who could then use them to invest considerable sums of money into the online economy. These persons are also known as identity brokers, who invest hours in creating and building up avatars to perform specific tasks in these virtual worlds, after which they are auctioned. Demetis (2010, p. 11).

  160. 160.

    Klimmt (2011, p. 3).

  161. 161.

    Klimmt (2011, p. 3). Cf Cornelius and Hermann (2011, p. v).

  162. 162.

    Klimmt (2011, p. 3).

  163. 163.

    There are several other types such as Twinity, Fregger, PlayStaion Home and There, which are mostly social virtual worlds that exist permanently in three dimensional (3D) display, popularly called metaverses. See Cornelius and Hermann (2011, p. v).

  164. 164.

    Klimmt (2011, p. 3). Cf Laue (2011, p. 21).

  165. 165.

    Klimmt (2011, p. 3). Cf Lodder (2011, p. 79).

  166. 166.

    Lehdonvirta and Ernkvist (2011, p. 12). Cf Cornelius and Hermann (2011, p. 2).

  167. 167.

    Cornelius and Hermann (2011, p. v). Cf Klimmt (2011, p. 3).

  168. 168.

    Cf comparisons made in Drug Enforcement Administration (2007) ‘2007 National Money laundering Strategy’ available at <http://www.treas.gov/press/releases/docs/nmls.pdf> [accessed on 29 July 2010].

  169. 169.

    SL currently has more than 20 million users. See Second Life (an undated website document) ‘Current User Metrics for Second Life’ available at <http://secondlife.com/xmlhttp/secondlife.php> [accessed on 22 July 2013].

  170. 170.

    See Jamali (2009, p. 32).

  171. 171.

    For more information see Second Life (an undated website document) ‘About us’ available at <http://www.secondlife.com/terms_of_service/> [accessed on 22 July 2013]. Cf Jamali (2009, p. 41). Interestingly, in 2010, being the first time ever, a real-world amount of US$ 1.5 million was used to buy a virtual island in Entropia Universe. Demetis (2010, p. 9).

  172. 172.

    Second Life (an undated website document) ‘About us’ available at <http://www.secondlife.com/terms_of_service/> [accessed on 22 July 2013].

  173. 173.

    Demetis (2010, p. 9). Cf Spiegel (2007, p. 3).

  174. 174.

    Demetis (2010, p. 9).

  175. 175.

    Demetis (2010, p. 9). Cf Spiegel (2007, p. 3).

  176. 176.

    This principle originates from the Council of Europe: Council Directive 2002/38/EC on the value added tax arrangements applicable to radio and television broadcasting services and certain electronically supplied services, adopted by the Parliamentary Assembly on 7 May 2002 and which came into force on 1 July 2003. According to the Directive, VAT should be levied on the supply through electronic networks of software and computer services generally, and compliance is mandatory for all member countries of the European Union.

  177. 177.

    This includes purchases from the land store, premium account registration, land use fees (tier), private region fees, LindeX transactions, and land auctions. Second Life (an undated website document) ‘About us’ available at <http://www.secondlife.com/corporate/vat.php> [accessed on 23 July 2013]. Cf Jamali (2009, p. 45).

  178. 178.

    See paragraph 3.5.1 above.

  179. 179.

    Jamali (2009, p. 45) and Klimmt (2011, p. 3).

  180. 180.

    World Bank (2008, p. 20). Cf Financial Action Task Force (2010d, p. 18).

  181. 181.

    This refers to the ability of online users to view general financial information held by their respective banks, but without the ability to conduct financial transactions. The FATF considers this method a low risk. Financial Action Task Force (2010d, p. 18). Cf World Bank (2008, p. 19). For a more detailed discussion on the risks that inhere in this method, see South African Reserve Bank (2008, p. 23).

  182. 182.

    This method is very much akin to internet banking. This is because financial transactions conducted via internet banking can be conducted similarly on a mobile device. The FATF is of the opinion that mobile service and security account services are likely to be regulated and supervised. Therefore, this method bears little risk. Financial Action Task Force (2010d, p. 18). Cf World Bank (2008, p. 21).

  183. 183.

    FATF (2010d, p. 18).

  184. 184.

    For example, in South Africa, a bank contracted a mobile phone service provider to provide a banking service that allows accounts to be opened with a mobile phone, without the need for personal contact between the account opener and the bank. To allay fears of irregularity, the South African Reserve Bank issued a guidance paper that sets the minimum criteria that should be met in the identification and verification process when such accounts are opened. See Finaincial Action Task Force (2010d, p. 52). Cf South African Reserve Bank (2008, p. 12).

  185. 185.

    Financial Action Task Force (2010d, p. 18).

  186. 186.

    World Bank (2008, p. 14).

  187. 187.

    Mobile Enquirer (undated internet article) ‘Mobile Payments to Grow to $ 200 Billion by 2012’ available at <http://www.mobileinquirer.com/2011/mobile-payments-to-grow-to-200-billion-by-2012/> [accessed on 12 August 2013].

  188. 188.

    Little (2009) ‘Global M-Payment Report Update—2009’ available at <http://www.adl.com/uploads/tx_extthoughtleadership/ADL_Global_M_Payment_Report_Update_2009_Executive_Summary.pdf> [accessed on 12 August 2013].

  189. 189.

    See the discussions in paragraph 3.3 above.

  190. 190.

    Financial Action Task Force (2010d, p. 20).

  191. 191.

    Financial Action Task Force (2010d, p. 20).

  192. 192.

    Financial Action Task Force (2010d, p. 20). Cf World Bank (2008, p. 14) and South African Reserve Bank (2008, p. 23).

  193. 193.

    See Article 2 of the United Nations Convention against Transnational Organized Crime, adopted by the General Assembly of the United Nations on the 15th of November 2000, and came into force on 29 September 2003.

  194. 194.

    In a recent report by the FBI, almost 90 % of all reported crimes in the United States in 2010 were money-related crimes. Internet Crime Compliant Centre (2010) ‘2010 Internet Crime Report’ available at <http://www.ic3.gov/media/annualreport/2010_IC3Report.pdf> [accessed on 9 August 2013].

  195. 195.

    Cf discussion in paragraph 3.3 above.

  196. 196.

    Cherrayil (2011) ‘Pirates still making headway in cyber crime’ available at <http://www.gulfnews.com/mobile/business/technology/pirates> [accessed on 4 April 2013].

  197. 197.

    Online music piracy means music acquired illegally from the internet. See Recording Industry Association of America (an undated website document) ‘Who Music Theft Hurts’ available at <http://www.riaa.com/physicalpiracy.php?content_selector=piracy_details_online> [accessed on 9 August 2013].

  198. 198.

    Recording Industry Association of America (an undated website document) ‘Who Music Theft Hurts’ available at <http://www.riaa.com/physicalpiracy.php?content_selector=piracy_details_online> [accessed on 9 August 2013].

  199. 199.

    International Intellectual Property Association (2011) ‘Statement of the International Intellectual Property Alliance (IIPA): The Copyright Industries Celebrate ‘World Intellectual Property Day 2011’ and Call Upon Governments to Redouble Their Efforts to Combat Global Piracy’ available at <http://www.iipa.com/pdf/IIPA2011WorldIPDayStatement042611.pdf> [accessed on 9 August 2013].

  200. 200.

    Groen (2011) ‘American ISPs take action against online piracy’ available at <http://www.futureofcopyright.com/home/blog-post/2011/08/24/american-isps-take-action-against-online-piracy.html> [accessed on 9 August 2013].

  201. 201.

    See Internet Crime Compliant Centre (2010) ‘2010 Internet Crime Report’ available at <http://www.ic3.gov/media/annualreport/2010_IC3Report.pdf> [accessed on 9 August 2013].

  202. 202.

    Techradar (an undated website document) ‘Online fraud worth billions’ available at <http://www.techradar.com/news/internet/online-fraud-trade-worth-billions-says-symantec-488116> [accessed on 9 August 2013].

  203. 203.

    Internet Crime Compliant Centre (2010) ‘2010 Internet Crime Report’ available at <http://www.ic3.gov/media/annualreport/2010_IC3Report.pdf> [accessed on 9 August 2013].

References

International Instruments

  • Agreement on the Swiss Bank Code of Conduct with Regard to the Exercise of Due Diligence. 28 January 1998. <http://www.swissbanking.org/en/home/>. Accessed 11 Jan. 2013.

  • Council of Europe Convention on Cybercrime adopted by the Council of Europe on 8 November 2001 and came into force on 1 July 2004.

    Google Scholar 

  • Council of Europe Convention on Cybercrime: Additional protocol to the Convention adopted by the Council of Europe on 7 November 2002 and came into force on 1 March 2006.

    Google Scholar 

  • Council of Europe Convention on Laundering, Search, Seizure and Confiscation of the Proceeds from Crime, adopted by the Council of Europe on 8 November 1990, and entered into force on 1 September 1993.

    Google Scholar 

  • Council of Europe Convention on Laundering, Search, Seizure and Confiscation of the Proceeds from Crime and on the Financing of Terrorism, adopted by the Council of Europe on 16 May 2005, and came into force on 1 December 2009.

    Google Scholar 

  • Council of Europe: Council Directive 2002/38/EC on the value added tax arrangements applicable to radio and television broadcasting services and certain electronically supplied services, adopted by the Parliamentary Assembly on 07 May 2002 and came into force on 01 July 2003.

    Google Scholar 

  • Council of Europe: Council Directive 2002/58/EC on the processing of personal data and the protection of privacy in the electronic communications sector and Regulation (EC) No 2006/2004 on cooperation between national authorities responsible for the enforcement of consumer protection laws adopted by the Parliamentary Assembly on 12 July 2002 and came into force on 31 July 2002.

    Google Scholar 

  • Council of Europe: Council Directive 2005/60/EC on the prevention and use of financial systems for the purpose of money laundering and terrorist financing adopted by the Parliamentary Assembly on 26 October 2005 and came into force on 25 November 2005.

    Google Scholar 

  • Council of Europe: Council Directive 2009/110/EC on the taking up, pursuit and prudential supervision of the business of electronic money institutions, adopted by the Parliamentary Assembly on 16 September 2009 and came into force on 30 October 2009.

    Google Scholar 

  • Council of Europe: Council Directive 2009/136/EC on universal service and users’ rights relating to electronic communications networks and services, adopted by the Parliamentary Assembly on 25 November 2009 and came into force on 18 December 2009.

    Google Scholar 

  • Council of Europe: Measures Against the Transfer and Safekeeping of Funds of Criminal Origin: Recommendation No R (80) and Explanatory Memorandum, adopted by the Committee of Ministers of the Council of Europe on 27 June 1980.

    Google Scholar 

  • European Council: Council Framework Decision 2005/222/JHA on attacks against information systems adopted by the European Parliament on 24 February 2005.

    Google Scholar 

  • European Union Regulation (EC) No 1889/2005 adopted by the European Parliament on 26 October 2005 and came into force on 15 December 2005.

    Google Scholar 

  • European Union Telecommunications Reform Package COM (2007) 697 and COD/2007/0247.

    Google Scholar 

  • Inter-American Convention against Terrorism, adopted by the General Assembly of the Organisation of American States on 6 March 2002, and entered into force on 7 October 2003.

    Google Scholar 

  • United Nations Commission on International Trade Law Model Law on Electronic Commerce 1996.

    Google Scholar 

  • United Nations Convention against Corruption adopted by the General Assembly of the United Nations on 31 October 2003 and entered into force on 15 December 2005.

    Google Scholar 

  • United Nations Convention against Illicit Traffic in Narcotic Drugs and Psychotropic Substances, which was adopted by the General Assembly of the United Nations on 7 December 1987, and entered into force on 11 November 1988.

    Google Scholar 

  • United Nations Convention against Transnational Organized Crime which was adopted by the General Assembly of the United Nations on 15 November 2000, and entered into force on 29 September 2003.

    Google Scholar 

  • United Nations International Convention for the Suppression of the Financing of Terrorism, adopted by the General Assembly of the United Nations on 9 December 1999, and entered into force on 10 April 2002.

    Google Scholar 

  • United States-Switzerland Mutual Legal Assistance Treaty 27 UST 2019, TIAS 8302, signed on 23 May 1973 and entered into force on 23 January 1977.

    Google Scholar 

Official Reports

Domestic Laws Australia

  • Anti-Money Laundering and Counter-Terrorism Financing Act of 2006.

    Google Scholar 

Belgium

  • Belgian Criminal Code (Wet houdende de voorafgaande title van het Wetboek van Strafvordering) 2012.

    Google Scholar 

Canada

  • Proceeds of Crime (Money Laundering) and Terrorist Financing Act (S.C. 2000, c. 17).

    Google Scholar 

Germany

  • Anti-Money Laundering (AML) Act of 2008 (Gesetz zur Ergänzung der Bekämpfung der Geldwäsche und der Terrorismusfinanzierung—GwBekErgG).

    Google Scholar 

  • Banking Act of 1998 (Kreditwesengesetz in der Fassung der Bekannt mach ung vom 9. September 1998—BGBl. I S. 2776; Gesetz über das Kreditwesen Kreditwesengesetz—KWG).

    Google Scholar 

  • Federal Data Protection Act of 2001 (Bundesdatenschutzgesetz—BDSG).

    Google Scholar 

  • Freedom of Information Act of 2005 (Informationsfreiheitsgesetz).

    Google Scholar 

  • German Criminal Code of 1998 (Strafgesetzbuch—StGB).

    Google Scholar 

  • Suppression of Illegal Drug Trafficking and other Manifestations of Organized Crime Act of 1992.

    Google Scholar 

  • Telecommunications Act of 2004 (Telekommunikationsgesetz—TKG).

    Google Scholar 

Malaysia

Netherlands

Nigeria

Singapore

South Africa

  • Electronic Communications and Transactions Act 22 of 2002.

    Google Scholar 

  • National Gambling Act 7 of 2004.

    Google Scholar 

  • Regulation of the Interception of Communication and the Provision of Related-Information Act 70 of 2002.

    Google Scholar 

Tasmania

United Kingdom

United States of America Federal Laws

  • Anti-Drug Abuse Act of 1988.

    Google Scholar 

  • Annuzio-Wylie Anti-Money Laundering Act of 1992.

    Google Scholar 

  • Banking Act of 1933 (Public Law Number: 73-66).

    Google Scholar 

  • Bank Secrecy Act of 1970, 31 United States Code 1051 (Public law number 99–570).

    Google Scholar 

  • Code of Federal Regulations [C.F.R.].

    Google Scholar 

  • Computer Fraud and Abuse Act 1984, 18 United States Code 1030.

    Google Scholar 

  • Crimes and Criminal Procedure Act of 1948, 18 United States Code 645; 683.

    Google Scholar 

  • Cyber Security Enhancement Act of 2002, 18 United States Code 5710.

    Google Scholar 

  • Digital Millennium Copyright Act 1998, 17 United States Code 2860 (Public Law 105–304).

    Google Scholar 

  • District of Colombia Code [D.C. Code].

    Google Scholar 

  • Electronic Communications Privacy Act 1986, 18 United States Code 2510.

    Google Scholar 

  • Federal Rules of Evidence Act of 1975, Title 28, United States Code.

    Google Scholar 

  • Federal Wire Act 87 of 1961.

    Google Scholar 

  • Foreign Corrupt Practices Act of 1977, Title15 United States Code, Public Law 95–213.

    Google Scholar 

  • Fraud and Related Activity in Connection with Computers Act 1986, 18 United States Code 1030.

    Google Scholar 

  • Intelligence Reform & Terrorism Prevention Act of 2004.

    Google Scholar 

  • National Infrastructure Protection Act 1996, 2 United States Code 3488.

    Google Scholar 

  • NV Senate Bill 82-75th (BDR 14-266), adopted on 1 July 2009 by the House of Senate, Nevada, United States.

    Google Scholar 

  • Money Laundering and Financial Crimes Strategy Act of 1998.

    Google Scholar 

  • Money Laundering Control Act of 1986, 18 United States Code 1956; 1957 (Public law number 99-570).

    Google Scholar 

  • Money Laundering Suppression Act of 1994.

    Google Scholar 

  • Right to Financial Privacy Act of 1982, Title 12, United States Code.

    Google Scholar 

  • Uniting and Strengthening America by Providing By Providing the Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001(Public law number 107-56).

    Google Scholar 

  • United States Code [U.S.C].

    Google Scholar 

  • Uniting and Strengthening America by Providing Appropriate Tools Required To Intercept and Obstruct Terrorism Act 115, Stat. 272 of 2001.

    Google Scholar 

State Laws

Court Cases International Court of Justice

Nigeria

  • The Federal Republic of Nigeria v Joshua Chibi Dariye [2007] EWHC 708 (Ch).

    Google Scholar 

United Kingdom

  • Butera v Director of Public Prosecutions for the State of Victoria, (1987) 164 CLR 180.

    Google Scholar 

  • Julian Paul Assange v. Swedish Prosecution Authority [2013] UKSC 22.

    Google Scholar 

United States of America

  • Aguimatang v. California State Lottery (1991) 234 Cal.App.3d 769 [286 Cal.Rptr. 57].

    Google Scholar 

  • California Bankers Association v. Schultz 39L ed 2d 812 (1974) n5.

    Google Scholar 

  • Haag v. United States, 485 F.3d 1, 3 (1st Circuit) (2007).

    Google Scholar 

  • International Shoe Co. v. Washington 326 US 310 (1945).

    Google Scholar 

  • Perfect 10, INC v. Megaupload, Kim Schmitz 11cv0191—IEG (BLM) (2011).

    Google Scholar 

  • United States of America v. Briscoe, 896 F.2d 1476, 1494 (7th Circuit) (1990).

    Google Scholar 

  • United States of America v. E-Gold Ltd, Douglas Jackson, Barry K. Downey, and Reid A. Jackson, 521 F.3d 411, 417 (D.C. Circuit) (2008).

    Google Scholar 

  • United States of America v. Foster, 986 F.2d 541 (D.C. Circuit) (1993).

    Google Scholar 

  • United States of America v. Fujii, 301 F.3d 535, 539 (7th Circuit) (2002).

    Google Scholar 

  • United States of America v. Hamilton, 413 F.3d 1138, 1142-43 (10th Circuit) (2005).

    Google Scholar 

  • United States of America v. Khorozian, 333 F.3d 498, 506 (3rd Circuit) (2003).

    Google Scholar 

  • United States of America v. Nippon Paper Industries Co. Ltd 109 F. 3d 1, 7 (1st Circuit) (1997).

    Google Scholar 

  • United States of America v. Scheinberg et al 336 (10th Circuit) (2011).

    Google Scholar 

  • United States of America v. Scholle 553 F.2d 1109 (8th Circuit) (1976).

    Google Scholar 

  • United States of America v. Vela, 673 F.2d 86, 90 (5th Circuit) (1982).

    Google Scholar 

  • United States of America v. Washington, 498 F.3d 225, 230-31 (4th Circuit) (2007).

    Google Scholar 

  • United States of America v. $ 124,700 in U.S. Currency, 05-3295 (8th Circuit) (2006).

    Google Scholar 

  • United States of America v. $ 425,562,539 551 F Supp 314 (1982).

    Google Scholar 

Indictment Orders

  • “The United States District Court for The District of Colombia, Holding a Criminal Term, Grand Jury Sworn in on May 11 2006, United States of America v. E-gold, Ltd Gold and Silver Reserve, INC, Douglas L. Jackson, Barry K. Downey, and Reid A. Jackson as Defendants (Criminal No. 07-109): Indictment page 3. <http://www.justice.gov/criminal/ceos/Press%20Releases/DC%20egold%20indictment.pdf>. Accessed 13 Feb. 2013.

  • “In the United States District Court for the Eastern District of Virginia, Alexandria Division, United States of America v. Kim Dotcom, Megaupload Ltd, Vestor Ltd, Fin Batato, Julius Bencko, Sven Echternach, Mathias Ortmann, Andrus Nomm, and Bram van der Kolk as Defendants (Criminal No. 1:12CR3): Indictment, dated 5 Januaray 2012. <http://online.wsj.com/article/SB10001424052970204616504577171180266957116.html>. Accessed 13 Feb. 2013.

Books

  • Aas, K. F. 2007. Globalization and Crime. Cornwall: TJ International Ltd.

    Google Scholar 

  • American Law Institute. 1987. Restatement of the law (Third) foreign relations law of the United States. 2nd vol. Philadelphia: American Law Institute.

    Google Scholar 

  • Alghamdi, A. M. 2011. The law of e-commerce: E-contracts, e-business. Bloomington: AuthorHouse.

    Google Scholar 

  • Bailey, M. 2011. Complete guide to internet privacy, anonymity and security. New York: Nerrel.

    Google Scholar 

  • Beare, M. E. 2005. Critical reflections on transnational organized crime, money laundering and corruption. Toronto: University of Toronto Press.

    Google Scholar 

  • Beckett, B. 1988. Introduction to Cryptography. London: Blackwell Scientific Publications.

    Google Scholar 

  • Bermann, G. 2003. Transnational litigation. Minnesota: Thomson West.

    Google Scholar 

  • Blunden, B. 2001. The money launderers, how they do it, and how to catch them at it. Gloucestershire: Management Books.

    Google Scholar 

  • Boni, W., and G. L. Kovavcich. 2000. Netspionage: The global threat to information. Woburn: Butterworth-Heinemann.

    Google Scholar 

  • Brenner, S. 2007. Law in an era of smart technology. Oxford: Oxford University Press.

    Google Scholar 

  • Buergenthal, T. and S. D. Murphy. 2002. Public international law in a nutshell. Minnesota: West Group.

    Google Scholar 

  • Caloyannides, M. A. 2004. Privacy protection and computer forensics. 2nd ed. Massachusetts: Arctech House.

    Google Scholar 

  • Cassese, A. 2005. International law. 2nd ed. Hampshire: Oxford University Press.

    Google Scholar 

  • Casey, E. 2004. Digital evidence and computer crime: Forensic science, computers and the internet. 2nd ed. London: Academic Press.

    Google Scholar 

  • Casey, E. 2011a. Digital evidence and computer crime: Forensic science, computers and the internet. 2nd ed. London: Academic Press.

    Google Scholar 

  • Cater, B. E., and A. S. Weiner. 2011. International law. 6th ed. New York: Aspen Publishers.

    Google Scholar 

  • Clough, J. 2010. Principles of cybercrime. Cambridge: Cambridge University Press.

    Google Scholar 

  • Cornelius, K., and D. Hermann, eds. 2011. Virtual worlds and criminality. Heidelberg: Springer.

    Google Scholar 

  • Cohen, F. 2009. Digital forensic evidence examination. Livermore: Fred Cohen & Associates.

    Google Scholar 

  • Cryer, R., H. Friman, D. Robinson, and E. Wilmshurst. 2010. An introduction to international criminal law and procedure. 2nd ed. Cambridge: Cambridge University Press.

    Google Scholar 

  • Curtin, M. 2005. Brute force: Cracking the data encryption standard. New York: Springer.

    Google Scholar 

  • Curtis, G. 2010. The law of cybercrimes and their investigations. Washington: CRC Press.

    Google Scholar 

  • Demetis, D. S. 2010. Technology and anti-money laundering: A systems theory and risk-based approach. Cheltenham: Edward Edgar Publishing Ltd.

    Google Scholar 

  • Fafinski, S. 2009. Computer misuse: Response, regulation and the law. Cullompton: Willan.

    Google Scholar 

  • Ferguson, N. 2009. The ascent of money: A financial history of the world. London: Penguin Press.

    Google Scholar 

  • Forget, L., and V. S. Hocevar. 2004. Financial intelligence units: An overview. Washington, DC: International Monetary Fund Publication Services.

    Google Scholar 

  • Fukuyama, F. 1995. Trust: The social virtues. London: Hamish Hamilton.

    Google Scholar 

  • Furnell, S. 2002. Cybercrime: Vandalizing the information society. London: Addison-Wesley.

    Google Scholar 

  • Geva, B. 1992. The law of electronic funds transfers. New York: Matthew Bender & Company.

    Google Scholar 

  • Gilbert, G. 2010. The law of evidence. By a late learned judge. The third edition, corrected; and many new references added. With a complete table to the whole. London: Gale, ECCO.

    Google Scholar 

  • Gilmore, W. 1995. Dirty money: The evolution of money laundering counter-measures. Strasburg: Council of Europe Press.

    Google Scholar 

  • Grabosky, P., and R. Smith. 1998. Crime in the digital age, controlling telecommunications and cyberspace illegalities. Sydney: The Federation Press.

    Google Scholar 

  • Gragido, W., and K. Pirc. 2011. Cybercrime and espionage: An analysis of subversive multi-vector threats. Burlington: Elsevier, Inc.

    Google Scholar 

  • Grama, J. L. 2010. Legal issues in information security. Sudbury: Jones and Berlett Learning, LLC.

    Google Scholar 

  • Greenberg, T. S., L. M. Samuel, W. Grant, and L. Grey. 2009. Stolen assets recovery: A good prasctice guide for non-conviction-based asset forfeiture. Washington, DC: International Bank for Reconstruction and Development/The World Bank.

    Google Scholar 

  • Hallam-Baker, P. 2008. The dotcrime manifesto: How to stop internet crime. Massachusetts: Addison-Wesley.

    Google Scholar 

  • Henkin, L., L. F. Damrosch, S. D. Murphy, and H. Smit. 2009. International law: Case and material. 6th ed. New York: West.

    Google Scholar 

  • Higgins, G. E. 2010. Cybercrime: An introduction to an emerging phenomenon. Columbus: McGraw-Hill.

    Google Scholar 

  • Hinterseer, K. 2002. Criminal finance: The political economy of money laundering in a comparative legal context. The Hague: Kluwer Law International.

    Google Scholar 

  • Hopton, D. 2009. Money laundering: A concise guide for all businesses. 2nd ed. London: Gower Publications.

    Google Scholar 

  • Jolicoeur, P. 1999. Introduction to biometry. London: Springer.

    Google Scholar 

  • Kochan, N. 2005. The washing machine: How money laundering and terrorist financing soil us. London: Centinage.

    Google Scholar 

  • Koh, J. 2006. Suppressing terrorist financing and money laundering. New York: Springer.

    Google Scholar 

  • Koops, B., and S. W. Brenner. 2006. Cybercrime and jurisdiction: A global survey (Information Technology and Law Series). The Hague: T.M.C Asser Press.

    Google Scholar 

  • Kshetri, N. 2010. The global cybercrime industry: Economic, institutional and strategic perspectives. Heidelberg: Springer.

    Google Scholar 

  • Lankhorst, F., and H. Nelen. 2003. Dilemmas facing lega proffessional and notaries in their professional relationship with criminal clients. Amsterdam: Falcone Project, Vrije University Press.

    Google Scholar 

  • Lassila, D., et al. 2011. Electronic funds transfer. New York: Matthew Bender & Company.

    Google Scholar 

  • Lilley, P. 2006. Dirty dealing: The untold truth about global money laundering, international crime and terrorism. 3rd ed. London: Kogan Page.

    Google Scholar 

  • Madinger, J. 2012. Money laundering: A guide for criminal investigators. 3rd ed. Boca Raton: CRC Press.

    Google Scholar 

  • Madinger, J., and S. A. Zalopany. 1999. Money laundering: A guide for criminal investigators. 1st ed. Florida: CRS Press.

    Google Scholar 

  • Marcella, A. J., and R. S. Greenfields. 2002. Cyber forensics: A field manual for collecting examining and preserving evidence of computer crimes. Boca Raton: CRC Press.

    Google Scholar 

  • McKemmish, R. 1999. What is forensic computing? Trends and issues in crime and criminal justice. Vol. 118. Canberra: Australian Institute of Criminology.

    Google Scholar 

  • McQuade, S. C. 2006. Understanding and managing cybercrime. Boston: Person Education.

    Google Scholar 

  • Molander, R. C., D. A. Mussington, and P. A. Wilson. 1998. Cyberpayments and money laundering: Problems and promise. Santa Monica: RAND.

    Google Scholar 

  • Molly, D., and C. S. Parker. 2010. Understanding computers: Today and tomorrow. Boston: Cengage Learning Inc.

    Google Scholar 

  • Moore, R. 2011. Cybercrime, second edition: Investigating high-technology computer crime. Oxford: Elsevier Inc.

    Google Scholar 

  • Murphy, S. D. 2006. Principles of international law. Minnesota: Thomas West.

    Google Scholar 

  • Mussington, D.A., P. A. Wilson, and R. C. Molander. 1998. Exploring money laundering vulnerabilities through emerging cyberspace technologies: A carribean-based exercise. Santa Monica: RAND.

    Google Scholar 

  • Naím, M. 2005. Illicit: How smugglers, traffickers, and copycats are hijacking the global economy. New York: Anchor books.

    Google Scholar 

  • Nelson, B., A. Philips, and C. Stuart. 2010. Guide to computer forensics and investigations. 3rd ed. Boston: Course Technology, Cengage Learning.

    Google Scholar 

  • Newman, G. R., and R. V. Clarke. 2003. Superhighway robbery: Preventing e-commerce crime. Devon: Willan Publishing.

    Google Scholar 

  • Nissenbaum, H. 2009. Privacy in context: Technology, policy and the integrity of social life. Stanford: Stanford University Press.

    Google Scholar 

  • Paar, C., and J. Pelzl. 2010. Understanding cryptography: A textbook for students and practitioners. Heidelberg: Springer.

    Google Scholar 

  • Parker, D. 1976. Crime by computer. New York: Charles Scribner’s Suns.

    Google Scholar 

  • Pieth, M., ed. 2002. Financing of terrorism: Following the money. Amsterdam: Kluwer Academic Publishers.

    Google Scholar 

  • Pieth, M., and G. Aiolfi, eds. 2004. A comparative guide to anti-money laundering, a critical analysis of systems in Singapore, Switzerland, the UK and the USA. Northhampton: Edward Elgar Publishers.

    Google Scholar 

  • Pillai, K., and A. Julian. 2008. Prevention of money laundering legal and financial issues. New Delhi: The Indian Law Institute.

    Google Scholar 

  • Reichel, P., ed. 2005. Handbook of transnational crime and justice. Los Angeles: Sage.

    Google Scholar 

  • Reuter, P., and E. M. Truman. 2004. Chasing dirty money: The fight against money laundering. Washington, DC: Peterson Institute for International Economics.

    Google Scholar 

  • Reyes, A., A. Brittson, K. O’Shea, and J. Steele. 2007. Cyber crime investigations: Bridging the gaps between security professionals, law enforcement, and prosecutors. Massachusetts: Syngress.

    Google Scholar 

  • Richards, J. R. 1999. Transnational criminal organisations, cybercrime, and money laundering: A handbook for law enforcement officers, auditors, and financial investigators. Boca Raton: CRC Press.

    Google Scholar 

  • Rider, B. 1999. The price of laundering dirty money. Cambridge: Jesus College, University of Cambridge.

    Google Scholar 

  • Robinson, J. 1998. The laundry men: Inside the world’s third largest business. London: London Pocket Books.

    Google Scholar 

  • Rohrbach, S. 2011. Virtual chaos: Our vulnerability to cyber-crime and how to prevent It. Wilbraham: AuthorMike Ink.

    Google Scholar 

  • Ryan, J. 2010. A history of the internet and the digital future. London: Reaktion Books Ltd.

    Google Scholar 

  • Savona, E. 2000. Responding to money laundering: International perspectives. Amsterdam: Taylor and Francis.

    Google Scholar 

  • Schell, B. H., and C. Martin. 2004. Cyber crime: A reference handbook. Santa Barbara: Contemporary World Issues Series.

    Google Scholar 

  • Schott, P. A. 2006. Reference guide to anti-money laundering and the combating of the financing of terrorism. Washington, DC: The International Bank for Reconstruction and Development/World Bank/International Money Fund.

    Google Scholar 

  • Shakespeare, W. 1994. Julius Caesar. Auckland: Heinemann.

    Google Scholar 

  • Shaw, M. N. 2003. International law. Cambridge: Cambridge University Press.

    Google Scholar 

  • Shams, H. 2004. Legal globalization: Money laundering law & order cases. Surrey: British Institute of International and Comparative Law.

    Google Scholar 

  • Shelly, G. B., and M. E. Vermaat. 2010. Discovering computers 2011: Living in a digital world, brief. Boston: Cengage Learning Inc.

    Google Scholar 

  • Siegel, D. D., and Borchers, P. J. 2005. Conflicts: In a nutshell. 3rd ed. Minnesota: Thomson West.

    Google Scholar 

  • Slade, R. M. 2004. Software forensics: Collecting evidence from the scene of a digital crime. New York: McGraw Hill.

    Google Scholar 

  • Snyman, C. R. 2002. Criminal law. 4th ed. Durban: Butterworths.

    Google Scholar 

  • Solove, D. J. 2007. The future of reputation, gossip, rumor on the internet. New Hampshire: Vail-Ballou Press.

    Google Scholar 

  • Solove, D. J. 2011. Nothing to hide: The false tradeoff between privacy and security. New Haven: Yale University Press.

    Google Scholar 

  • Stessens, G. 2000. Money laundering: A new international law enforcement model. Cambridge: Cambridge University Press.

    Google Scholar 

  • Taylor, R. W., T. J. Caeti, K. Loper, E. J. Fritsch, and J. Liederbach. 2006. Digital crime and digital terrorism. New Jersey: Prentice Hall.

    Google Scholar 

  • Thanki, B., ed. 2011. The law of privilege. 2nd ed. New York: Oxford University Press.

    Google Scholar 

  • Theleskaf, D., and P. G. Pereira, ed. 2011. Non-state actors in assets recovery. Bern: Peter Lang.

    Google Scholar 

  • Turner, J. E. 2011. Money laundering prevention: Deterring, detecting and resolving financial fraud. New Jersey: Wiley.

    Google Scholar 

  • Von Hayek, F. 1978. Denationalisation of money—The argument refined. London: Institute of Economic Affairs.

    Google Scholar 

  • Walden, I. 2007. Computer crimes and digital investigations. Oxford: Oxford University Press.

    Google Scholar 

  • Wall, D. S. 2007. Cybercrime: The transformation of crime in the information age (PCSS-Polity Crime and Society). Cambridge: Polity Press.

    Google Scholar 

  • Werle, G. 2009. Principles of international criminal law. 2nd ed. The Hague: T.M.C Asser Press.

    Google Scholar 

Chapters from Books

  • Angers, L. 2004. Combatting cyber-crime: National legislation as a pre-requisite to international cooperation. In Crime and technology: New frontiers for regulations, law enforcement and research, ed. E. U. Savona. The Hague: Springer.

    Google Scholar 

  • Arthur, K. K., and H. S. Venter. 2006. An investigation into computer forensic tools. In Cyber forensics: Tools and practice, eds. R. Kumar and B. Jain. Hyderabad: The ICFAI University Press.

    Google Scholar 

  • Bassiouni, M. C. 2004. The history of universal jurisdiction and its pace in international law. In Universal jurisdiction: National courts and the prosecution of serious crimes under international law (Pennysylavia Studies in Human Rights), ed. S. Macedo. Philadelphia: University of Pennsylavia Press.

    Google Scholar 

  • Bassiouni, M. C., and D. S. Gualtieri. 2000. International and national responses to the globalization of money laundering. In Responding to money laundering: International perspectives, ed. E. Savona. Amsterdam: Taylor and Francis.

    Google Scholar 

  • Busia, G. 2004. Privacy and investigative needs: Progressing from incompatible to complementary positions. In Crime and technology: New frontiers for regulation, law enforcement and research, ed. E. U. Savona. Dordrecht: Springer.

    Google Scholar 

  • Casey, E. 2011b. Introduction. In Digital evidence and computer crime: Forensic science, computer and the internet. 3rd ed., ed. E. Casey. London: Academic.

    Google Scholar 

  • Casey, E. 2011c. Digital evidence in the courtroom. In Digital evidence and computer crime: Forensic science, computer and the internet. 3rd ed., ed. E. Casey. London: Academic Press.

    Google Scholar 

  • Casey, E., and G. Palmer. 2004. The investigative process. In Digital evidence and computer crime: Forensic science, computers and the internet. 2nd ed., ed. E. Casey. London: Academic Press.

    Google Scholar 

  • Casey, E., and B. Schatz. 2011. Conducting digital investigations. In Digital evidence and computer crime: Forensic science, computer and the internet. 3rd ed., ed. E. Casey. London: Academic Press.

    Google Scholar 

  • Claus, K. 2010. Nullum poena nulla poena sine lege. In Max Planck encyclopedia for public international law, ed. Rüdiger Wolfrum. Cologne: Oxford University Press.

    Google Scholar 

  • Cornelius, K. 2011. Responsibility under criminal law in virtual worlds. In Virtual worlds and criminality, eds. K. Cornelius and D. Hermann. Heidelberg: Springer.

    Google Scholar 

  • Evans, J. L. 2000. Investigating and prosecuting the proceeds of crime: A common law experience. In Responding to money laundering: International perspectives, ed. E. Savona. Amsterdam: Taylor and Francis.

    Google Scholar 

  • Frost, M. 2007. Anti-Money laundering regulation and trusts. In Anti-Money laundering: International law and practice, eds. W. H. Muller, C. H. Kalin, and J. G. Goldsworth. West Sussex: Wiley.

    Google Scholar 

  • Jones, M. 1995. Improved auditing practice. In The regulation and prevention of economic crime internationally, ed. J. Reuvid. London: Kogan Page.

    Google Scholar 

  • Klimmt, C. 2011. Virtual worlds as a regulatory challenge: A user perspective. In Virtual worlds and criminality, eds. K. Cornelius and D. Hermann. Heidelberg: Springer.

    Google Scholar 

  • Koops, B. J., and T. Robinson. 2011. Cybercrime law: A european perspective. In Digital evidence and computer crime: Forensic science, computer and the internet. 3rd ed., ed. E. Casey. London: Academic, Elsevier Inc.

    Google Scholar 

  • Lamb, S. 2002. Nullum crimen, nulla poena sine lege in international criminal law. In The Rome statute of the international criminal court: A commentary, eds. A. Cassese, P. Gaeta, and J. R. W. D. Jones. London: Oxford University Press.

    Google Scholar 

  • Lodder, A. R. 2011. Conflict resolution in virtual worlds: General characteristics and the 2009 dutch convictions on virtual theft. In Virtual worlds and criminality, eds. K. Cornelius and D. Hermann. Heidelberg: Springer.

    Google Scholar 

  • Laue, C. 2011. Crime potential of metaverses. In Virtual worlds and criminality, eds. K. Cornelius and D. Hermann. Heidelberg: Springer.

    Google Scholar 

  • Mason, S., and B. Schafer. 2010. The characteristics of digital evidence. In Electronic evidence: Disclosure, discovery and admissibility. 2nd ed., ed. S. Mason. London: Lexis Nexis Butterworths.

    Google Scholar 

  • Mason, S., and A. Sheldon. 2010. Proof: Investigations, collection and examination of digital evidence. In Electronic evidence: Disclosure, discovery and admissibility. 2nd ed., ed. S. Mason. London: Lexis Nexis Butterworths.

    Google Scholar 

  • Marshall, C. E., T. H. Robinson, and D. Kwak. 2005. Computer crime in brave new world. In Handbook of transnational crime and justice, ed. P. Reichel. Los Angeles: Sage.

    Google Scholar 

  • Muller, W. H. 2007a. Anti-Money laundering—A short history. In Anti-Money laundering: International law and practice, eds. W. H. Muller, C. H. Kalin, and J. G. Goldsworth. West Sussex: Wiley.

    Google Scholar 

  • Muller, W. H. 2007b. The egmont group. In Anti-Money laundering: International law and practice, eds. W. H. Muller, C. H. Kalin, and J. G. Goldsworth. West Sussex: Wiley.

    Google Scholar 

  • Mulukutlah, H., and M. Ruegg. 2009. The importance of information technology in tracing stolen assets. In Tracing stolen assets: A practitioner’s handbook, ed. Basel Institute of Governance. Basel: Basel Institute of Governance.

    Google Scholar 

  • Oxman, B. H. 1987. Jurisdiction of states. In Encyclopedia of public international law. 1st ed., R. Berhnardt. Amsterdam: North-Holland.

    Google Scholar 

  • Padfield, N. 2004. Country report: Anti-Money laundering rules in the United Kingdom. In A comparative guide to monmey laundering: A critical analysis of the systems in Singapore, Switzerland, the UK and the USA, eds. M. Pieth and G. Aiolfi. Northampton: E. Elgar Publications.

    Google Scholar 

  • Pieth, M. 2007. The Wolfsberg process. In Anti-Money laundering: International law and practice, eds. W. H. Muller, C. H. Kalin, and J. G. Goldsworth. West Sussex: Wiley.

    Google Scholar 

  • Pieth, M. 2008. Recovering stolen assets—A new issue. In Recovering stolen assets, ed. M. Pieth. Bern: Peter Lang.

    Google Scholar 

  • Pocar, F. 2004. New challenges for international rules against cybercrime. In Crime and technology: New frontiers for regulation, law enforcement and research, ed. E. Savona. Dordrecht: Springer.

    Google Scholar 

  • Reuvid, J. 1995a. The focus on money laundering. In The regulation and prevention of economic crime internationally, ed. J. Reuvid. London: Kogan Page.

    Google Scholar 

  • Reuvid, J. 1995b. Teeth for regulators and international standards of practice. In The regulation and prevention of economic crime internationally, ed. J. Reuvid. London: Kogan Page.

    Google Scholar 

  • Robertson, P. 1999. Internet payments. In Law of bank payments, eds. M. Brindle and R. Cox. London: Sweet and Maxwell.

    Google Scholar 

  • Savona, E. U., and M. Migone. 2004. The fox and the hunters: How IC technologies change the crime race. In Crime and technology: New frontiers for regulations, law enforcement and research, ed. E. U. Savona. Dordrecht: Springer.

    Google Scholar 

  • Tanzi, V. 2005. Macroeconomic implications of money laundering. In Responding to money laundering: International perspectives, ed. E. U. Savona. The Netherlands: Harwood Academic Publishers.

    Google Scholar 

  • Unger, B. 2007. The impact of money laundering. In Black finance: The economics of money laundering, eds. D. Masciandaro, E. Takats, and B. Unger. Massachusetts: Edward Elgar Publishing.

    Google Scholar 

  • Walden, I. 2010. Computer forensics and the presentation of evidence in criminal cases. In Handbook of internet crime, eds. Y. Jewkes and M. Yar. Devon: Willan Publishing.

    Google Scholar 

  • Yar, M. 2010. The private pricing of internet crime. In Handbook of internet crime, eds. Y. Jewkes and M. Yar. Devon: Willan Publishing.

    Google Scholar 

Journal Articles

  • Abdullah, M. T., R. Mahmod, A. A. Ab. Gani, M. Z. Abdullah, and A. B. Md. Sultan. 2008. Advances in computer forensics. International Journal of Computing Science and Networking Security 8 (2): 215.

    Google Scholar 

  • Alexander, K. 2001. The international anti-money-laundering regime: The role of the financial action task force. Journal of Money Laundering Control 4 (3): 231.

    Google Scholar 

  • Alford, D. E. 1993. Anti-Money laundering regulations: A burden on financial institutions. North Carolina Journal of International Law & Commercial Regulation 19:143.

    Google Scholar 

  • Amedeo, A., M. Bagella, and F. Busato. 2008. Money laundering in a two sector model: Using theory for measurement. CEIS Tor Vergata Research Paper Series 6 (8): 128.

    Google Scholar 

  • Atta-Asamoah, A. 2009. Understanding the West African cyber crime process. African Security Review: Organised Crime Trends in Africa 18 (4): 107.

    Google Scholar 

  • Beebe, N. L., and J. G. Clarke. 2005. A hierarchical, objectives-based framework for the digital investigations process. Digital Investigation 2 (2): 146.

    Google Scholar 

  • Bell, R. E. 2002. The prosecution of computer crime. Journal of Financial Crime 9 (4): 308.

    Google Scholar 

  • Bishop, J. 2009. Enhancing the understanding of genres of web-based communities: The role of the ecological cognition framework. International Journal of Web-Based Communities 5 (1): 4.

    Google Scholar 

  • Brenner, S. W., and B. Koops. 2004. Approaches to cybercrime jurisdiction. Journal of High Technology Law 4 (1): 1.

    Google Scholar 

  • Brenner, S. 2004. Is there such a thing as virtual crime? California Criminal Law Review 4 (1): 1.

    Google Scholar 

  • Carrier, B. D., and E. H. Spafford. 2003. Getting physical with the digital investigation process. International Journal of Digital Evidence 2 (2): 1.

    Google Scholar 

  • Casey, E., M. Ferraro, and L. Nguyen. 2009. Investigation delayed is justice denied: Proposals for expediting forensic examinations of digital evidence. Journal of Forensic Science 54 (6): 1353.

    Google Scholar 

  • Chawki, M. 2010. Anonymity in cyberspace: Finding the balance between privacy and security. International Journal of Technology Transfer and Commercialisation 9 (3): 183.

    Google Scholar 

  • Chaudary, K., et al. 2010. Experiences in developing a micro-payment system for peer-to-peer networks. International Journal of Information Technology and Web Engineering 5 (1): 1 (IGI Global).

    Google Scholar 

  • Chuah, J. 2000. The New EU directives to regulate electronic money institutions—A critique. Journal of International Banking Law 15 (8): 181.

    Google Scholar 

  • Cuéller, M. 2003. The tenuous relationship between the fight against money laundering and the disruption of criminal finance. The Journal of Criminal Law and Criminology 93 (2/3): 311.

    Google Scholar 

  • Dorward, D. J. 1998. Forum non conveniens doctrine and the judicial protection of multinational corporations from forum shopping plaintiffs. University of Pennsylvania Journal of International Economic Law 19 (1): 141.

    Google Scholar 

  • Fairlie, R. W., and A. Chatterji. 2011. High-Technology entrepreneurship in Silicon Valley. World Paper Series, Institute of the Study of Labour (IZA Discussion Paper NO. 5726), 1.

    Google Scholar 

  • Filipkowski, W. 2008. Cyberlaundering: An analysis of typologies and techniques. International Journal of Criminal Justice Sciences 3 (1): 233.

    Google Scholar 

  • Frieden, J. D., and L. M. Murray. 2011. The admissibility of electronic evidence under the federal rules of evidence. Richmond Journal of Law and Technology 16 (2): 1.

    Google Scholar 

  • Garber, L. 2001. Computer forensics: High-Tech law enforcement. IEEE Computer Society’s Computer Magazine 34 (1): 22.

    Google Scholar 

  • Gill, M., and G. Taylor. 2004. Preventing money laundering or obstructing business? Financial companies’ perspectives on ‘Know Your Customer’ procedures. British Journal of Criminology 44 (4): 584.

    Google Scholar 

  • Gottfried, J. 2004. The federal framework for internet gambling. Richmond Journal for Technology 10 (3): 26.

    Google Scholar 

  • Haney, C. 2001. Auction sites hit hard by electronic crime. InfoWorld 23 (3): 25.

    Google Scholar 

  • Hinsterseer, K. 1997. An economic analysis of money laundering. Journal of Money Laundering Control 1 (2): 154–164.

    Google Scholar 

  • Hughes, S. J. 1991. Policing money laundering through funds transfers: A critique of regulation under the bank secrecy act. Indiana Law Journal 67 (2): 283.

    Google Scholar 

  • Hunt, J. 2011. The new frontier of money laundering: How terrorist organisations use cyberlaundering to fund their activities, and how governments are trying to stop them. Information and Communications Technology Law 20 (2): 133.

    Google Scholar 

  • Jacobson, M., and M. Levitt. 2010. Tracking nacro-terrorist networks: The money trail. Fletcher Forum for World Affairs 34:117.

    Google Scholar 

  • Jailani, N., N. F. M. Yatim, Y. Yahya, A. Patel, and M. Othman. 2008. Secure and auditable agent-based e-marketplace framework for mobile users. Computer Standard and Interfaces 1 (30): 237.

    Google Scholar 

  • Joinson, A. N. 2001. Self-disclosure in computer-mediated communication: The role of self-awareness and visual anonymity. European Journal of Social Psychology 31:177.

    Google Scholar 

  • Kirtley, J. E. 2010. Symposium cyberspace & the law: Privacy, property, and crime in the virtual frontier: Mask, sheild, and sword: Should the journalist’s privilege protect the identity of anonymous posters to news media websites? Minnesota Law Review 94:1478.

    Google Scholar 

  • Koker, L. 2006. Money laundering control and suppression of financing of terrorism: Some thoughts on the impact of customer due diligence measures on financial exclusion. Journal of Financial Crime 13 (1): 26.

    Google Scholar 

  • Larguier, J. 1965. Civil actions for damages in french criminal procedure. Tulane Law Review 1 (39): 687.

    Google Scholar 

  • Lastoska, G., and D. Hunter. 2004. The laws of the virtual worlds. California Law Review 92 (1): 1.

    Google Scholar 

  • Leong, A. V. M. 2007. Chasing dirty money: Domestic and international measures against money laundering. Journal of Money Laundering Control 10 (2): 140.

    Google Scholar 

  • Levi, M. 2002. Money laundering and its regulation. The ANNALS of the American Academy of Political and Social Science 582:181.

    Google Scholar 

  • Levi, M., and P. Reuter. 2006. Money laundering. Crime and Justice: A Review of Research 34 (1): 289.

    Google Scholar 

  • Lucchi, N. 2011. Access to network services and protection of constitutional rights: Recognizing the essential role of internet access for the freedom of expression. Cardozo Journal of International and Comparative Law 19 (3): 647.

    Google Scholar 

  • Manning, R. B. 2010. A computer-generated catalog of types: By product data processing in museums. Curator: The Museum Journal 12 (2): 134.

    Google Scholar 

  • Moore, S. 2009. The challenge of internet anonymity: Protecting John Doe on the internet. The John Marshall Journal of Computer & Information Law 26:469.

    Google Scholar 

  • Mueller, M. 1999. ICAAN and internet governance: Sorting through the debris of self-regulation. Journal of Policy, Regulation and Strategy for Telecommunications 1 (6): 497.

    Google Scholar 

  • Murphy, E. 2009. Manufacturing crime: Process, pretext and criminal justice. Georgetown Law Journal 97:1435.

    Google Scholar 

  • Nichols, P. M. 1997. Outlawing transnational bribery through the world trade organisation. Law and policy in International Business 28 (1): 305.

    Google Scholar 

  • Nkhasi, S. S. 2007. Western unionizing the hawala? The privatization of hawalas and lender liability. North-western Journal of International Law and Business 27:475.

    Google Scholar 

  • Norton, J., and H. Shams. 2002. Money laundering law and terrorist financing: Post-September 11 responses—Let us step back and take a deep breath. International Law Journal 13:103.

    Google Scholar 

  • Ó Ciardhuáin, S. 2004. An extended model of cybercrime investigations. International Journal of Digital Evidence 3 (1): 1.

    Google Scholar 

  • Perkel, W. 2004. Money laundering and terrorism: Informal value transfer systems. American Criminal Law Review 41:183.

    Google Scholar 

  • Philippsohn, S. 2001a. Money laundering on the internet. Computers & Security 20 (6): 485.

    Google Scholar 

  • Philippsohn, S. 2001b. The dangers of new technology—Laundering on the internet. Journal of Money Laundering Control Thomason 1 (5): 89.

    Google Scholar 

  • Pieth, M., and G. Aiolfi. 2003. The private sector become active: The Wolfsberg process. Journal of Financial Crime 10 (4): 1.

    Google Scholar 

  • Ping, H. 2004. New trends in money laundering—From the real world to cyberspace. Journal of Money Laundering Control 5 (1): 50.

    Google Scholar 

  • Presley, J. R. 1979. Marcel Labordere: A neglected french contribution to the trade cycle theory. Kyklos: International Review for Social Sciences 1 (32): 809.

    Google Scholar 

  • Reiter, M. K., and A. D. Rubin. 1998. Crowds: Anonymity for web transactions. Transactions on Information and System Security (TISSEC) 1 (1): 1.

    Google Scholar 

  • Rider, B. A. K. 2002. The weapons of war: The use of anti-money laundering laws against terrorist and criminal enterprises—Part 1. Journal of Banking Regulation 4 (1): 13.

    Google Scholar 

  • Scholte, J. 1997. Global capitalism and the state. International Affairs 73 (3) 427–452.

    Google Scholar 

  • Schopper, M. D. 2002. Internet gambling, electronic cash & (and) money laundering: The unintended consequences of a monetary control scheme. Chapman Law Review 5 (1): 303.

    Google Scholar 

  • Sherman, J. C. 2008. Power and discourse in policy diffusion: Anti-Money laundering in developing states. International Studies Quarterly 52 (3): 635.

    Google Scholar 

  • Stein, A. R. 1985. Forum non conveniens and the redundancy of court-access doctrine. University of Pennsylvania Law Review 133 (4): 429.

    Google Scholar 

  • Strafer, G. R. 1989. Money laundering: The crime of the ‘90’s. American Criminal Law Review 27:149.

    Google Scholar 

  • Straub, J. P. 2002. The prevention of e-money laundering: Tracking the elusive audit trail. Suffolk Transnational Law Review 25 (1): 515.

    Google Scholar 

  • Tomuschat, C. 2006. The legacy of Nuremberg. Journal of International Criminal Justice 4 (1): 830.

    Google Scholar 

  • Twitchell, M. 1988. The myth of general jurisdiction. Harvard Law Review 101 (3): 610.

    Google Scholar 

  • Vincent, O. R., O. Folorunso, O. Akinwale, and A. D. Akinde. 2010. Transaction flow in card payment systems using mobile agents. Interdisciplinary Journal of Information, Knowledge, and Management 5:154.

    Google Scholar 

  • Welling, S. N. 1989. Smurfs, money laundering and the federal criminal law: The crime of structuring transaction. Florida Law Review 41:287.

    Google Scholar 

  • Yar, M. 2005. The novelty of cybercrime: An assessment in light of routine activity theory. European Journal of Criminology 2 (4): 407.

    Google Scholar 

  • Yasinsac, A. E., D. G. Marks, M. M. Pollitt, and P. M. Sommer. 2003. Computer forensics education. Security & Privacy Magazine 1 (4): 1.

    Google Scholar 

  • Zagaris, B. 2004. The merging of anti-money laundering and counter-terrorism financial enforcement regimes after September 11, 2011. Law and Policy in International Business 34:45.

    Google Scholar 

  • Zeldin, M. F., and C. V. Florio. 2007. Strengthening laws and financial institutions to combat emerging trends in money laundering. Journal of Money Laundering Control 2 (4): 412.

    Google Scholar 

Unpublished Works

  • Jamali, M. S. 2009. Cyberlaundering A Master thesis submitted to the School of Computing Information Technology and Engineering, University of East London, in May 2009, in partial fulfillment of the requirement of Masters of Science in Information Security and Computer Forensics. <http://www.scribe.com/resources/cyberlaundering09811>. Accessed 2 June 2010.

  • Leslie, D. A. 2010. Anti-Cyberlaundering regulation and control A Masters thesis submitted to the Faculty of Law, University of the Westen Cape, in October 2010, in partial fulfilment of the requirement of Masters of Laws in Transnational Criminal Justice and Crime Prevention.

    Google Scholar 

  • Manzoor, A. K. S. 2008. E-Commerce technology and management DBA 1727, III Semester Course Material, Masters for Business Administration Degree, Centre for Distance Education, Anna University, Chennai, India. <http://www.scribd.com/doc/40219342/160/Ethics-Social-and-Political-issues>. Accessed 2 Aug. 2013.

  • South African Law Reform Commission. 2012. The Review of The Law of Evidence—Draft discussion paper on the review of the law of evidence. Committee Paper 02/2012 Project 126, 29 September 2012.

    Google Scholar 

Internet Resources Internet Articles

Websites

Singapore

  • Statement of Stanley Morris, Director of FinCEN. 2005. Address to congress banking committee. <http://www.fincen.org/resource>. Accessed 17 June 2013.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Daniel Adeoyé Leslie .

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Leslie, D. (2014). Cyberlaundering: Concept & Practice. In: Legal Principles for Combatting Cyberlaundering. Law, Governance and Technology Series, vol 19. Springer, Cham. https://doi.org/10.1007/978-3-319-06416-1_2

Download citation

Publish with us

Policies and ethics