Download as pdf or txt
Download as pdf or txt
You are on page 1of 29

world development report

BACKGROUND PAPER

Digital Dividends

Do Digital Technologies
Facilitate Illicit Financial
Flows?
Tatiana Tropina
Max Planck Institute for Foreign and
International Criminal Law
This background paper was prepared for the World Development Report 2016 Digital Dividends. It is made
available here to communicate the results of the Bank’s work to the development community with the least possible
delay. The manuscript of this paper therefore has not been prepared in accordance with the procedures appropriate
to formally-edited texts. The findings, interpretations, and conclusions expressed in this paper do not necessarily
reflect the views of The World Bank, its Board of Executive Directors, or the governments they represent.
The World Bank does not guarantee the accuracy of the data included in this work. The boundaries, colors,
denominations, and other information shown on any map in this work do not imply any judgment on the part of
The World Bank concerning the legal status of any territory or the endorsement or acceptance of such boundaries.
Do Digital Technologies Facilitate Illicit Financial Flows?
Dr. Tatiana Tropina

Summary
The emerging concept of illicit financial flows has become a crosscutting issue on the international agenda in
recent years. This umbrella term refers to money illegally earned, transferred, or used. With the development
of digital technologies, the use of information and communications networks as a tool for facilitating illicit
financial flows is rising as one of the key challenges in tackling the problem of the movement of illegal funds.
Digital technologies facilitate illicit financial flows at each stage, be it earning money illegally, transferring
illegal funds, or using them. There are several areas where clear links between technology and illicit financial
flows can be established.
Acquisition of money
In addition to the creation of the underground illegal markets of cybercrime and cyber-related crime, digital
technologies facilitate the migration of traditional organized crime online and provide a number of
opportunities for fraud, corruption, tax evasion, and other criminal activities.
Money transfers and use
New digital tools for money transfers, such as online and mobile banking, electronic payments,
cryptocurrencies, e-commerce providers, and online gambling services, especially if they are combined,
provide a countless number of opportunities to distance money from illegal sources of profit or to illegally
transfer money from legal sources. New forms of doing business online, and the digital economy as a whole,
facilitate the transfer of illegal profits and the aggregation of illicit funds in offshore accounts, and their
placement in fake e-commerce companies and offshore online businesses.
Digital technologies could also be considered as a tool to tackle the problem of the illicit financial flows. They
can serve as a source of empowerment and transparency, and could be used in investigations, detection, and
disruption of the illegal money transfers.

Technology as a tool for tackling the problem of illicit financial flows can complement, but will never substitute
for, proper legal frameworks, international cooperation, and public-private collaboration. The problem of
illicit financial flows requires implementation of a complex set of measures, which have to include
technological, legal, and organizational components. Furthermore, the use of digital technologies in the
investigation of illicit financial flows should always be balanced with human rights and safeguards and take
into account privacy issues.

Introduction
The emerging concept of illicit financial flows has become a crosscutting issue on the international
agenda in recent years. Illicit funds from organized crime, corruption, and tax evasion, which are moving
across borders, pose a big challenge to the security and stability of economies around the globe, with an
especially devastating effect on developing countries. There are no reliable estimates of illicit financial
flows. According to some assessments, nearly US$1 trillion of illicit funds shifts out of emerging
markets and developing countries annually (Global Financial Integrity 2014; ONE 2014). There is,
however, no implicit proof of reliability of such estimates.
Corruption, tax evasion, organized crime, the drug trade, and human trafficking, and many other forms
of crime as well illicit financial flows associated with these illegal activities pose significant

1
interconnected threats to poorer states. They considerably reduce already limited domestic resources
available and decrease tax revenue that is needed to fund critical poverty-reducing programs and
infrastructure (World Bank 2015). Indirectly, they also negatively impact investments, fuel excessive
inflation that leads to higher interest rates, facilitate the creation of unstable economies, threaten security,
promote inequality, and undermine the rule of law. These concerns increased the pressure from civil
society and other actors to take action against illicit financial flows and brought this issue to the center
of the development agenda.
The issue of illicit financial flows is not new; however, in the last few decades the increasing dependency
of society on information and communications networks is changing the landscape of this problem. The
growth of digital operations in legitimate markets is one of the critical drivers for economic development.
However, as markets and trade have always attracted criminals seeking benefits from illegal activities,
digital networks have become a key enabler for the new forms of earning and transferring illicit funds
and a facilitator for many traditional ways of illicit financial flows. Criminal activity has been evolving
in parallel with society’s use of information networks, reacting to every technological development with
new approaches to gain profits and hide them. The borderless nature and decentralized architecture of
the internet, combined with a complex dynamic ecosystem of the digital economy, poses new challenges
to governments, industry, and civil society in tackling the problem of illicit financial flows.
Due to the relative newness of the problem, there is still a lack of research on the issue of digital
technologies as an enabler and facilitator of the illicit financial flows. This paper aims to provide insights
into the nexus between information technologies and illicit financial flows and to show how technology
is helping to earn, transfer, or use funds illegally. Since there have been relatively few studies in this
field, by reviewing as many examples of the use of technology for facilitating illicit financial flows as
possible, this analysis seeks to provide a context for further studies in this area.
The paper follows the outline presented in table 1, which summarizes both the structure of the paper and
key results. The matrix refers to the findings of the study concerning the nexus of illicit financial flows
and digital technologies with regard to three stages: earning, transfers, and use. The paper itself is
structured as follows.
Part 1 defines illicit financial flows to establish the scope of the problem and provide the context for
further analysis. Part 2 focuses on the issue of digital technologies in the process of earning money
illegally and transferring illicit funds, and analyzes how technology can help in the process of
acquisition, transfers, and integration of illicit finds. Part 3 discusses the role of technology in fighting
illicit financial flows. Part 4 concludes with suggestions for further areas of research in this field and
ways to tackle the problem more effectively.

2
Table 1 Nexus of Digital Technologies and Illicit Financial Flows: The Structure of the Study
Earning  Transfers  Use
Sources: Stages: Integration:
• Laundering • Placement Integration of the
proceeds of crime • Layering laundered assets into the
• Abuse of power legal financial system
• Market/regulatory
abuse
• Tax abuse

How digital • Digital underground Combination of: • Offshore electronic bank


technologies economy: • Online and mobile and investment accounts
facilitate illicit cybercrime and banking: slicing and • Fake e-commerce
financial flows “crime as a service” automation of companies
• Migration of transactions • Offshore online casinos
traditional organized • Electronic payments via • Terrorist financing
crime online unregulated
• Embezzlement and intermediaries
fraud in the telecom • Digital/cryptocurrencies:
sector ensuring anonymity
• E-commerce:
manipulation of supply
of goods
• Online gambling/online
betting

How digital • Tackling crime • Monitor suspicious • Ex-post identification of


technologies help activities: detection, transfers illicit sources
address the prevention, digital • Trace illegal transfers • Databases of beneficial
problem of illicit investigations • Better information ownership
financial flows • Increase exchange (digital • Leaks of electronic data
transparency and platforms, automatic transfer trails and
public scrutiny to exchange of information) electronic documents to
reduce corruption • Facilitate due diligence the attention of public and
• Speed up competent authorities
introduction of e-
government systems
in areas such as tax
administration or
customs

Any technological means to fight illicit financial flows have to be combined with

- Harmonization of legal frameworks


- Mechanisms for international cooperation and mutual legal assistance
- Public-private collaboration
- Awareness raising

3
Part 1. Illicit Financial Flows: Definition
Illicit financial flows: Components
The term “illicit financial flows” represents a relatively new concept (World Bank 2015). It emerged as
an umbrella term to conflate previously disconnected issues related to tools, methods, and criminal
activities aiming to move funds and assets across national borders in contravention of national or
international laws (Goredema 2011; OECD 2013). There is still no consensus on the question of which
practices actually constitute these tools and criminal activities; however, the common notion, which has
been dominating in recent years, is that illicit financial flows can be defined as money “illegally earned,
transferred or used” (UNECA 2015; World Bank 2015).
Despite the general agreement on the use of this relatively new term, a lack of consensus can be found
in the studies debating the sources of the illicit financial flows. Most researchers agree that the term
should cover money earned from criminal (illegal) activity, or money that was legally earned but became
illegal because of the use, such as terrorist financing or illicit transfer (for example, violation of tax laws;
see figure 1). Most of the literature refers to several sources of earning money from illegal activities:
corruption, crime (including organized crime) and illegal commercial practices such as manipulation of
custom duties, mispricing, and tax evasion (Global Financial Integrity 2014).
There are also other classifications; for example, Jansky (2013) splits illicit financial flows into three
groups: illegal (criminal) flows, individual illicit flows, and corporate illicit (commercial) flows. Some
studies approach the issue from a different angle and define illicit financial flows not through the
activities, but through the negative impact. For example, Blankenburg and Kahn (2012) consider any
financial transaction that is harming the economy to be a part of illicit financial flows, and thus create a
somewhat vague and broad definition, which might cover many activities on the borderline between
legal and illegal (Perez and Olivie 2014).

Figure 1 Illicit Financial Flows: Sources and Components

Illicit financial flows

Sources Illicit Licit

Criminal Abuse of
Corruption and Trade
Components entrusted Tax evasion
activity embezzlement mispricing
authorities

Differences in defining illicit financial flows


There is a lack of agreement on where the line is between illicit and legal financial flows. There is an
ongoing debate, for example, on whether such practices as tax avoidance should be included in the
definition of illicit financial flows. On the one hand, recent studies, such as the “Report of the High
Level Panel on Illicit Financial Flows from Africa” (UNECA 2015), highlight that the term “illicit”
should be considered as a “fair description of activities that, while not strictly illegal in all cases, go

4
against established rules and norms, including avoiding legal obligations to pay tax” (UNECA 2015,
23). On the other hand, there are certain business practices that include legal tools to lower tax liabilities.
There is an ongoing debate concerning the inclusion of reduction of tax liability in the definition of illicit
financial flows. Such inclusion is advocated by civil society organizations and some states; however,
major global financial centers favor a restrictive definition that covers crime and corruption and includes
manipulation of tax payments only if they seriously and deliberately break the laws (World Bank 2015).
Because of the differences in taxation regulation among countries, it is hard to avoid the creation of grey
areas, which will allow reduction of tax liability. Thus, the issue of tax reduction must always be
addressed in the specific country context. These debates, however, are outside the scope of this study.
The analysis in this paper will focus strictly on illegal activities.
Ultimately, due to the differences in national legal frameworks, a concept of what constitutes illicit
financial flows will always depend on the legislation of the particular state. Furthermore, any
international mechanisms implemented to tackle illicit financial flows can be undermined by the
differences in national legislation and the fact that in some countries, laws can exist on the books but
there is no capacity or no willingness to enforce the laws. These legal loopholes can be exploited by
criminals and corrupt officials who seek safe havens—countries with weak laws and enforcement or
states with preferable legal regimes for committing crimes—for tax avoidance or for carrying out
operations for distancing illegal profit from its source. This situation requires not only identification of
the loopholes in the national and international legal frameworks and harmonization of the legislation on
the international level, but also proper implementation of these standards and capacity building for law
enforcement agencies.

Part 2. Digital technologies and illicit financial flows: Earning and transferring
money illegally
The existence of the link between digital technologies and illicit financial flows, despite the lack of
research in this field, has been widely recognized. However, the effect of information technology on the
sources of the illicit profits is uneven. On the one hand, information and communications technologies
(ICTs) have created new and facilitated traditional ways of earning and laundering money illegally. On
the other hand, there is no direct link between ICTs and certain activities, such as bribery and corruption,
which are considered a significant source of the illicit financial flows.
Of course, any illegal activity can be facilitated with the possibility of transferring funds anonymously
or generating large amounts of money via aggregation of small sums. Yet, since there is almost no
research or known—or even anecdotal—cases in this regard, it would be pure speculation to make a
direct connection between digital technologies and some of the sources of the illicit financial flows, such
as corruption or mispricing. This part of the study analyzes only those aspects of the nexus of illicit
financial flows and digital technologies where a direct link can be established and confirmed by case
studies. With reference to the definition of illicit financial flows, the chapter analyzes two aspects of the
problem of information technologies and illicit financial flows: how digital technologies can facilitate
the process of earning illicit profits and how technological developments influence illegal money
transfers.

5
2.1. Money illegally earned: Digital technology as a way to get criminal profits

Summary
There are several ways in which technology facilitates the process of earning illegal profits:
• Evolvement of the new types of crime (for example, cybercrime) and, as a result, the rise of a criminal
underground economy. This underground digital market, where certain offenders specialize only in
committing crimes involving digital technology, has already become an independent source of gaining
illegal money.
• “Relocation” of traditional organized crime online: the use of digital technology for secure encrypted
communications, for trade, information exchange, and for facilitating illegal activities in the offline
world.
• Tax evasion practices facilitated by digital technologies.

2.1.1. Underground economy: Crime as service


Digital technology and cybercrime: The rise of an underground economy
In the early days of cybercrime, the scene was mainly dominated by individuals or loosely connected
groups of hackers committing attacks just for fun or to demonstrate their technical skills (SecureWorks
2010). The development and growth of the digital economy dramatically changed both the criminal
landscape and the motivation of offenders, transforming cyber-related crime into a complex and thriving
criminal industry. As in the case of illicit financial flows in general, there are no reliable estimates on
the criminal profits and the reputational losses and recovery costs that can go far beyond the direct harm.
Most of the assessments come from the cybersecurity companies (see box 1) and, thus, are being
questioned concerning the reliability of crime statistics and losses estimates (see, for example, Jardine
[2015]). The uncertainty about crime profits and losses for businesses, however, does not mean that there
is no general understanding that the aggregated criminal profits and direct and indirect losses for
businesses are very high.
Though the primary targets of the Box 1 Impact of Cybercrime: Security Companies
cybercriminals are more wealthy developed Assessments
countries, which heavily depend on
information technologies, and there is a According to a McAfee assessment study, the underground industry of
common notion that many crimes originate in cybercrime costs global economies as much as US$445 billion. This
estimate includes both direct and indirect costs: profits of
countries in Asia, Africa, and Eastern Europe cybercriminals, and indirect costs such as reputational damage,
(Europol 2015), the underground economy defense, and recovery. McAfee makes a conservative estimate of
itself exists independently of national US$375 billion in losses, and the probable maximum as much as
borders. The development of the cybercrime US$575 billion (McAfee 2014). Even the smaller of these estimates of
possible losses related to cybercrime exceed the GDP of most
industry is driven by the monetary value of countries and the revenues of most private companies in the world.
data and services 1, traded on the specific
internet platforms and via communication
channels, which are used as underground marketplaces (Europol 2014; Fallmann et al. 2010, 1).
This value represents an illicit commodity, intangible and easily transferrable across borders. Specific
criminal activities have been developed and are being constantly improved in order to obtain data or

1
For example, according to KPMG research, in 2014 the prices for stolen credit card credentials ranged from US$0.25 to
US$100 per item. Debit card information cost approximately US$9.55 per item, stolen usernames and passwords US$5.60
per item (Fowler 2014).

6
increase the value of services: phishing, farming, spoofing, sophisticated malware, and tools to obtain
information from commercial databases. Online criminality includes a broad spectrum of fragmented
and highly specialized economic activity, where both the skills and data are offered for sale: various
criminal groups specialize in developing specific tools such as exploits, writing code for malicious
software, or leasing the tools for automated attacks.
The underground economy is structuring its operations by copying business models from legitimate
sectors. Technological developments, research, innovation, and the transformation of value chains into
value networks have driven the globalization of the legal sectors and have affected business structures,
making them more decentralized and collaborative with regard to external partners. In the same way, the
development of digital technologies is fuelling the creation of new models of labor division,
subcontracting, product placement, communications, and networking in the criminal ecosystem of the
digital underground economy.
Schemes for doing illegal business resemble legitimate business-to-business (B2B) models. Highly
sophisticated C2C (criminal-to-criminal) operations aim to make stolen data, crime tools, and
professional skills for committing crimes available through digital networks (Ben-Itzhak 2008; Tropina
2013). The vulnerabilities of software and systems are exploited to create so-called “crimeware,” that is,
“malware specially developed with the intention of making a profit and which can cause harm to the
user’s financial well-being or valuable information” (ESET 2010, 4). Crimeware in the form of viruses,
Trojans, key loggers, toolkits, and exploit kits offers cybercriminals the flexibility to steal and control
data, to create and manage malicious programs, and to run networks of interconnected computers
infected with malware (Kharouni 2012).
Automation: A core enabler of the illegal digital economy
Automation plays a significant role in gaining illicit profits in underground markets. Technology is used
to avoid the operation requirement for physical groupings and force of numbers (Europol 2011, 6). The
core of automation is a system of botnets: networks of compromised computers that can be remotely
controlled by the perpetrators and used as “zombies” for launching large-scale denial-of-service attacks
on private and corporate systems, sending spam, disseminating malware, and scanning for system
vulnerabilities. Without botnets, perpetrators would have to target victims and computer systems
manually and individually, which would make attacks too costly and time-consuming (Europol 2011).
The system of delivering crimeware tools in the form of selling or hiring them drove the deployment of
crime-as-service business models: trading botnets has become a high-revenue activity in the
underground economy. Criminal organizations offer botnets at relatively low cost, profiting from the
turnover based on the number of “customers.” At the beginning of 2015, according to Symantec,
distributed denial-of-service (DDoS) attacks could be ordered from US$10 to US$1,000 per day (Wueest
2015). Moreover, as one of the logical steps in adopting business models from the legal economy,
criminals are employing the policy of price differentiation, moving from static pricing lists to the flexible
pricing schemes with discounts and bonuses (Danchev 2010).
In addition, they can offer different packages of the same products, depending on the service. For
example, in 2012 the basic package of DDoS bot Darkness by SVAS/Noncenz could be bought for
US$450. The same botnet was also offered under “Bronze,” “Silver,” “Gold,” and other options that
included, depending on the price, free updates, password grabbers, unlimited rebuilds, and discounts for
other products (McAfee 2012). These costs are relatively low compared to the criminals’ financial gain:
the estimated revenue of criminal groups using botnets ranges from tens of thousands to tens of millions
of dollars.
Another “crime-as-a-service” model of operations that thrives alone with botnet trade is the pay-per-
install (PPI) scheme, which was developed to meet one of the vital demands of the illegal market—
infection of computer systems via digital networks. This service represents outsourcing of the
dissemination of malware by determining the raw number of victims’ computers that should be

7
compromised within the scope of the “customer’s” budget (Caballero et al. 2011). A single PPI service
can partner with thousands of affiliates, which get paid for the number of malware installs. This job does
not require sophisticated computer skills, so malware distribution is nowadays open to anyone who
wants to earn some money. A typical affiliate can supply more than 10,000 installs per month, which
can generate millions of infected computers for illegal business, including thousands of affiliates
(SecureWorks 2010). This business may be very profitable for affiliates; for example, Trend Micro once
reported on an affiliate that generated US$300,000 from rogue antivirus software installs in only one
month (Trend Micro 2010).
Tools-supplying business models: Another way to earn illegal money
Tools-supplying business models are employed to create flexible “customer” systems for the
commission of cybercrimes, where crime instruments and technics are available on demand. The owners
of such servers with crimeware allow “users” to just log into the server and choose from the range of
tools suitable for fraud, phishing, attacks, and data-stealing and then download them. Less-skilled
criminals can buy tools to identify vulnerabilities, compromise systems, and steal data. More
sophisticated offenders can purchase malware or develop custom tools and scripts on their own. When
user data are stolen, criminals can use crimeware servers to commit organized attacks. Again, the prices
are relatively low compared to the possible illicit profits.
In 2015, to rent a drive-by download web toolkit, which includes updates and 24/7 support, one needs
as little as US$100 to US$700 per week. The online banking malware SpyEye is offered from US$150
to US$1,250 on a six-month lease (Wueest 2015). Even “teaching” skills are being converted into
monetary value; nowadays, criminals can profit not only from committing crimes, but also from teaching
others how to do it. For example, the training tutorials on Exploit Kits, DDoS attacks, Spam attacks, and
phishing and other malicious activities can be purchased from as little as US$1 (SecureWorks 2014).
Furthermore, the next generation of business models has started offering licensed malware and technical
support for illegal software and tools (SecureWorks 2010), and employing such schemes as “try it for
free” or a “100% Satisfaction Guarantee on Stolen Credit Cards or They Will Be Replaced”
(SecureWorks 2014).
2.1.2. Underground economy: “Traditional” organized crime and digital technologies
Digital technologies: A new medium for traditional organized crime
In addition to being a platform for the new type of criminal activity analyzed above, cyberspace and
digital technologies also serve as a new medium for facilitating the criminal business of traditional
mafia-style organized crime groups. This trend is not surprising. Under the general assumption,
traditional organized crime always searches for “safe havens” offered by states with weak governments
and unstable political regimes (Williams 2002, 2). Cyberspace, with its anonymity, absence of borders,
and the opportunity to commit offenses without being physically present at the crime scene, constitutes
a perfect environment, especially when criminals can operate from countries that do not have proper
legal frameworks and technical capabilities for digital investigations (Goodman 2010). This poses a
particular threat and calls for the adoption of proper legal frameworks and capacity building, especially
in developing countries.

8
While traditional organized crime is still operating in a physical world—which is why it should not be
confused with the new type of crime and underground industry of cybercrime—these groups can still
benefit from the use of technology and underground marketplaces. Underground forums provide those
involved in drug and arms trafficking, human trafficking, and trade in illegal goods with a perfect
platform for trade of goods and services and a hub for networking, planning, and coordinating crimes.
At the illegal online marketplaces (see box 2), the trade of crimeware tools for cybercrime coexists with
the trade of illegal goods, fake identification documents, and different services associated with offline
crimes.

Box 2 Illegal Online Marketplaces: Silk Road and Agora

One of the most infamous examples of hidden online marketplaces is Silk Road, which functioned similarly to legal auctions
such as eBay, allowing “customers” to buy illicit drugs and other illegal commodities. It has been estimated that from 2011
to 2013, Silk Road facilitated over US$1.2 billion worth of sales between 4,000 vendors and 150,000 customers (Houses of
Parliament 2015). The marketplace was shut down by the FBI (U.S. Federal Bureau of Investigation) in October 2013, but
reappeared shortly after as Silk Road 2.0 to continue criminal trade, until it was hit again in the operation Onymous, which
represented cooperation between law enforcement in the European Union and the United States, in October 2014.

The closure of Silk Road, however, has not stopped the further evolution of illegal marketplaces. The online marketplace,
Agora, launched in 2013, surpassed Silk Road in illegal drug trade and was named “the largest online narcotics emporium in
the world” (Bertrand 2015) one year after it was established. It has been estimated that Agora, as a platform for trade of
drugs, weapons, and illegal services, became the biggest black market operating online (Bertrand 2015; Greenberg 2014).

Digital technologies: Crime as service for traditional organized crime groups


As reported by Europol (2014), traditional crime groups had already started using digital technologies
as “crime as service,” hiring sophisticated cybercriminals to facilitate illegal operations. For example,
in June 2013, law enforcement agencies in Belgium and the Netherlands took down a Netherlands-based
drug smuggling ring, which employed hackers to penetrate the systems controlling the movement and
location of shipping containers at the Belgian port of Antwerp. This infiltration involved interference
with computer data to allow the criminals to remove shipping containers with drugs before the legitimate
carrier could collect them (Europol 2014). There are still relatively few known cases of such
sophisticated manipulations with digital technologies in facilitating traditional criminal operations.
However, they illustrate very well the potential scale of this problem.
2.1.3. Digital technologies and tax evasion
Digital technologies and challenges of the digital economy
It is unclear to what extent digital technologies can facilitate illegal attempts to evade tax payments.
Though it is hard to assume that the development of global communication networks has no effect on
tax evasion at all, it would be speculative to say there are many known distinct tools to illegally avoid
taxes in the use of digital technologies. Of course, the global digital economy and the borderless internet
create loopholes in the taxation frameworks, blur the line between illegal tax evasion and legal practices
of tax avoidance, and pose particular challenges for tackling illegal activities.
This area of research has emerged recently on the agenda of international organizations, such as the
Organisation for Economic Co-operation and Development (OECD 2014), which are currently
undertaking studies and developing action plans concerning the problems of taxation in the era of digital
technologies. Though the OECD admitted that severe erosion of tax bases could occur in the digital
economy (OECD 2014), there is still no debate about the attribution of this problem to the use of
particular technologies or to specific behavior.

9
There is little doubt that complex tax fraud and tax scam schemes can rely on the use of digital
technologies. However, while technology can play a certain role as enabler of illegal activity, the main
challenges are the globalization of the economy itself, the creation of digital multinational giants, and
the possibility that digital technologies provide for the practice of “tax shopping,” making it easier for
companies to provide services without a physical presence and to look for the best place for establishing
their headquarters and moving their profits.
Interconnection fraud and tax evasion in the telecommunications sector
The only known practice of tax evasion that is statistically proven and distinctly linked to communication
technologies is the so-called “SIM box fraud” or “interconnect fraud”—a type of manipulation that
employs the internet to avoid call termination charges and, thus, revenue taxation. This scheme is a
common practice in developing countries. It uses the voice-over-internet-protocol to channel
international calls away from mobile network operators and deliver them as local calls. In this case, the
international call appears to be local and Box 3 Interconnection Fraud: A Growing Problem for
cannot be subject to significant international African Countries – Estimated Losses
terminating charges.
The same technique can be used to make In March 2015, Uganda’s Financial Intelligence Authority started
investigating suspected money laundering, revenue diversion, and tax
local out-of-network calls appear to be evasion in the telecommunications sector, which could amount to
handled within the network and, again, avoid US$144 million in lost revenue. The Ugandan Financial Intelligence
termination charges (Ghosh 2012, 18). Authority claims that the government loses as much as 45 percent in
Furthermore, when the government levies tax revenue, while the telecommunication operators lose more than
80 per cent of their revenue (The East African 2015).
taxes on the international calls, the operators
themselves can use this scheme for diverting A report from the High Level Panel on Illicit Financial Flows from Africa
international calls, transforming them into states that the massive growth of the mobile industry brought
local calls and making fake declarations of significant losses in potential tax revenues because of the use of
interconnection fraud. The report estimates losses in taxable revenue
incoming international call minutes to reduce in Kenya as US$440,000, and refers also to the estimates of the
the tax payable to the government (UNECA Governments of Ghana (US$5.8 million in stolen taxes) and the
2015). This scheme especially affects Democratic Republic of Congo (US$90 million in tax revenue losses a
developing countries, in particular, on the year) (UNECA 2015).
African continent (see box 3).
2.2. Illegal money transfers and use: Digital technologies and money laundering

Summary
• With speed of communication, automation, and anonymity, digital technologies offer a number of unique
tools to facilitate illicit financial flows at all stages of money transfer and use: placement, layering, and
integration.
• Digital technologies can be used to transfer money coming from any source of illegal income, including
corruption, embezzlement, organized crime, tax evasion, and any other activities. Digital technology does
not care about the source that money came from: electronic money transfers can be used to move and
place any funds.
• Digital technologies, in many cases, allow offenders to avoid a placement stage because money illegally
earned or stolen already exists in the online environment.
• A combination of the following tools allows criminals to distance their profits from illegal sources: online
and mobile banking, electronic payments, digital currencies, online gambling, and betting services and e-
commerce schemes.
• As a final stage of illegal transfers—comingling illegal funds with a legal sector—money can be safely placed
via online banking in offshore jurisdictions. In addition, digital technologies allow using such tools as fake

10
e-commerce companies or faking online gambling services in offshore jurisdictions for the integration
stage.

Digital technologies: A sure enabler of illegal money transfers


Transfers of illegal funds and money laundering have been dramatically influenced by the development
of information and communications networks. Digital technologies offer countless opportunities to
facilitate each traditional stage of illegal money transfer on their way to being distanced from illegal
sources—placement, layering, and integration. 2 Initially, the problem of money laundering with the use
of digital technologies was mostly associated with the underground economy of cybercrime. However,
as the payment systems are becoming more complex, decentralized, and dependent on the information
networks, criminals can enjoy the opportunities digital technologies offer to transfer any type of illicit
funds (see box 4).

Box 4 Digital Technologies and Embezzlement/Corruption Schemes in Developing Countries


One of the biggest concerns with regard to illicit financial flows is the possibility of siphoning money, especially foreign aid funds, in
developing countries, through embezzlement and money laundering. Millions of dollars are diverted from poverty-stricken nations
through “phantom” firms and wire transfers to the bank accounts and companies in industrialized countries. For example, ONE, an
international campaigning and advocacy organization, estimates that “at least $1 trillion is being taken out of developing countries each
year through a web of corrupt activity that involves shady deals for natural resources, the use of anonymous shell companies, money
laundering and illegal tax evasion” (ONE 2014). Though this might be an overestimate, certainly the funds flying out of the developing
countries constitute very large sums.
The question of how digital technology can facilitate this process is complex. In general, digital technology will enable any complicated
money transfers, independently of the source—thus, it can be used to slice down the money and transfer it through a combination of
bank and e-payment transactions to aggregate illegal funds in a safe jurisdiction or integrate the money into the legal sector. However,
the nexus of digital technology and corruption/embezzlement is much more complex than can be narrowed down to electronic money
transfers only. Digital technology is not the only factor that can possibly contribute to the complexity of transactions; it is the whole
combination of such factors as cross-border trade, speed of communications, and the possibility of opening anonymous phantom
companies without presenting identification documents or even without a physical presence. Establishing shell companies in some
jurisdictions requires less information than obtaining a driver’s license or opening a bank account (ONE 2014).
These complex schemes might rely on information and communications technologies, but there is a lack of research and of evidence
concerning the role that digital transactions can play in those intricate corruption and embezzlement models. There is little doubt that
any tools for digital transfers analyzed in this chapter can be employed as a part of these schemes. However, further research and case
studies are needed to investigate the nexus of digital technologies and complex schemes used to syphon money from developing states.

Technology does not care about the source of illegal income


While criminals can use different techniques and ways to gain ill-gotten profits, the tools that digital
networks offer for distancing this capital from illegal activity are the same for any “dirty” money. The
only difference between online and offline criminal activity is that money gained from cybercrime
usually exists in cyberspace and has to be further transferred into cash and distanced from its source, so
the placement stage of money laundering would be missing (Filipkowski 2008). However, this can also
happen with the illegal trade of goods online in digital currencies; money in this case is “prelaundered”
because it is placed in an unregulated financial institution (National Drug Intelligence Center 2008).
Information and communication networks as a game changer for money laundering
Digital technologies have a number of unique features that make them a game changer for money
laundering:
• Automation, speed, and their cross-border nature
The main advantages of global information networks—ease of use, speed of information transfers,
automation, their cross-border nature, and the ability to operate in different jurisdictions without
2
Placement is depositing money into the financial system, layering is distancing money from its source through a series of
transactions, and integration is the commingling of money with funds in legal sectors.

11
being present onsite—enable fast transfers of illegal money and reduce the risk of being detected
(Dumitrache and Modiga 2011, 50; Filipkowski 2008).
• Anonymity
The absence of face-to-face transactions, which makes it difficult to implement know-your-
customer techniques or monitor the behavioral patterns of the customers (FATF 2008, 21), is
another key enabler of money-laundering schemes. Furthermore, many of the payment tools do
not implement this technique at all and allow customers to enjoy full anonymity. Anonymity in
general eroded the old models of traditional financial systems, which were usually based on long-
term relationships with customers; unregulated online payment gateways nowadays provide the
possibility for occasional transitions and transfers of micropayments (Council of Europe 2012,
30).
• Complexity of online transactions
The complexity of the ecosystem of online transactions can be attributed to the rise of the new
payment intermediaries. These intermediaries follow different rules and allow for various
activities; many payment providers permit transfers from one intermediary to another, some online
payment platforms authorize peer-to-peer transfers, and a number of payment systems are
connected to the traditional banking system and allow credit accounts with bank cards.
Implementation of the traditional techniques to monitor suspicious transactions by the payment
providers can be undermined by the lack of the implementation of these tools by other
intermediaries or by the insufficiency of the information about client behavior (Council of Europe
2012, 36).
• Less or no regulation
Most of the intermediaries operating online are either less regulated than traditional financial
institutions or not regulated at all (FATF 2008). Anti-money-laundering measures that were
implemented to fight illicit transfers fail when it comes to most digital payment providers.
Moreover, a payment intermediary can always benefit from the differences in regulation between
various jurisdictions and choose a less regulated environment while being able to operate all over
the world through global information networks.
The aforementioned characteristics of digital technologies and online payment systems combined with
the development of the information and communications networks allow criminals to combine different
means for distancing ill-gotten money from the source of illegal profits (see table 2). There are several
tools that are mostly associated with money laundering in cyberspace: banking products and services,
which to a large degree include regulated intermediaries; electronic payment systems via nonbank
intermediaries; digital currencies, which are mostly unregulated and can also be decentralized; online
services and trading platforms; online gambling; and e-commerce. These new tools can be combined
with traditional methods of money laundering, thus creating a complex online and offline chain of
multiple transactions, which are hard to trace and monitor, especially when they involve several
jurisdictions. The following analysis provides insights into the way digital technology can facilitate
transfers of illicit funds.

12
Table 2 Digital Technologies and Illegal Money Transfers

Source of illegal money:


crime
corruption
embezzlement
tax evasion
any other activity

Digital technologies don’t care


about the source of money!

Placement Layering Integration


- Online and mobile banking - Offshore electronic bank
- In many cases, no need
- Payments via unregulated online and investment accounts
for placement (money
intermediaries - Fake e-commerce
exists online)
- Digital currencies companies
- Use of money mules
- Online gambling/betting services - Offshore online casinos
(scarce resources)
- E-commerce
- Combination of all above

Online banking
Online banking is one of the most well-known nexuses of technology and money transfers, both legal
and illegal. This link also represents the connection between technology and illegal ways to earn money;
banks and their customers are still one of the major targets for profit-driven criminals. Thus, in many
cases, in the beginning of the process of illegal transfers, offenders are still dependent on the online
transfers from or via regulated financial intermediaries, though frequently it can be combined with other
tools (Council of Europe 2012, 40–41).
Since regulated financial intermediaries carry out know-your-customer procedures and enter a business
relationship with customers before online banking can be used, criminals need to employ more complex
schemes than just transferring funds using online banking. This is why, for example, when money is
stolen from bank accounts with the use of digital technologies, cybercriminals face a certain bottleneck;
to distance this illegal profit, they need money mules for online transactions (iDefence 2006), and money
mules are a scarce resource (Cisco 2011, 9). This is why criminals are searching for ways to avoid the
use of mules and try, for example, to split money into small amounts below the reporting threshold
(Thomason 2009, 18) and move them quickly from and to different bank accounts between different
financial institutions (Weaver 2005, 456). This is where the benefits of digital technologies and
automation are fully exploited.
Some studies reveal that money launderers can carry out “hundreds of meaningless transactions across
various bank accounts, followed by a limited number of cash withdrawals” (Council of Europe 2012,
42). The possibility of performing many transactions through different institutions in various
jurisdictions then makes it difficult, if not impossible, to detect illegal financial flows and trace them
back (Malhotra 2010, 13).

13
Mobile banking and mobile payments
Mobile banking is a way of carrying payments via mobile phone with the use of different protocols such
as text or internet. In the process of mobile banking communication, operators act as financial
intermediaries for handling the payment between a client and business or financial institution
(Filipkowski 2008, 23.). Mobile communications operators, though subject to telecom regulation, are
usually not opposed to the obligation to perform anti-money-laundering checks (LIRNEasia and UP‐
NCPAG 2008). The main driver for the evolvement of mobile banking is the growing demand for
micropayments, especially in developing countries (Forbes 2007, 28). The main vulnerability associated
with the risk of the use of mobile banking for money laundering in many jurisdictions is the possibility
of buying a pay-as-you-go SIM-card without registration and identity checks, and, thus, a great degree
of anonymity, from which money launderers can benefit (Villasenor et al. 2011, 13).
However, the potential scope of using mobile banking for illegal transfers is debatable, because most of
the transfers involve very small amounts of money. Although mobile payments are frequently named in
different studies as one of the possible sources of digital money laundering, the latest reports produced
rather controversial results and questioned the role of mobile banking in illicit financial flows. For
example, a recent report from the Overseas Development Institute on capital flight in African countries
concluded that although “in principle mobile banking is likely to facilitate capital flight, especially the
movement of illegal funds abroad…data on mobile money in Africa, however, seem not to confirm this
hypothesis since no clear correlation can be identified between capital flight and mobile banking” (Massa
2014, 11). The report, however, still highlighted the vulnerabilities of online banking concerning illegal
funds transfer and its potential for being used for money laundering.
Electronic payments via nonbank intermediaries
Online nonbank payment services provide a cheap, quick, and anonymous way to make international
money transfers or to pay for goods and services (see, for example, Dumitrache and Modiga 2011, 54).
Unlike regulated financial institutions such as banks, these intermediaries are not subject to anti-money-
laundering obligations and thus do not have to perform checks on their customers or detect suspicious
money transfers. While the biggest online payment service providers, such as PayPal, developed anti-
money-laundering policies and are trying to trace suspicious transactions, there are still many such
intermediaries who allow criminals to enjoy freedom of money transfers with no checks. 3
Furthermore, some of the services allow peer-to-peer money transfers, making monitoring of suspicious
activities even harder and giving yet more possibilities to criminals for money laundering (FATF 2008,
39). In addition to the absence of anti-money-laundering obligations, criminals can benefit from the
possibility of aggregating large sums by transferring very small amounts of money many times without
attracting the application of techniques to monitor suspicious behavior, and then move this money inside
the payment system or between different e-payment providers, or from e-payment systems to bank
accounts and back (Piller and Zaccariotto 2009: 70–71; Richet 2013). Thus, e-payment services allow
for illegal money transfers either in a way similar to online banking or in the form of transferring cash
into online money and further purchase of goods, services, and digital currencies.
Digital currencies
Digital currencies embody a fast-growing area of internet commerce, driven by demand for low-friction
e-commerce (Meiklejohn 2013) and micropayments (Tucker 2009, 601). Digital currencies represent

3
It is difficult to estimate the number of online payment providers, and especially the number that do not conduct due
diligence. For example, FATF (2010) reported that 15 of the jurisdictions responding to the FATF questionnaire indicated
that Internet Payment Service providers were operating in their respective jurisdictions without giving the number of such
providers; the estimated number of providers in different countries ranged from 1 to 23. With the growth of the digital
economy in the last several years, this number could have increased significantly both on the national and international levels.
Reliable statistics concerning the number of electronic payment intermediaries, which could show the whole picture on both
the international and national levels, are not available.

14
value exchange systems that operate electronically and make transactions with the currencies that exist
only online, are not issued by financial institutions, and thus are exempted from regulation. These
currencies can be exchanged between account holders, or changed into traditional money (FATF 2010,
43). They are accessible from any part of the world, and allow making money transfers instantly, at low
cost and with anonymity (Samani et al. 2013, 6–7), sometimes leaving virtually no trace. The anonymity
of digital currencies and no regulation in this field make this type of payment an attractive option to
criminals (Bryans 2014).
The role of digital currencies in illegal money transfers is prominent and constantly evolving. First, the
use of digital currencies for illegal money has been confirmed by several criminal investigations against
currency providers, such as E-gold or Liberty Reserve (Samani et al. 2013, 8; FATF 2014, 10). Second,
it is a well-known fact that digital currencies, like Bitcoin, are used for payments at the online
underground markets (Federal Bureau of Investigation 2012; FATF 2014). What makes the situation
even more difficult is that many of those currencies are decentralized and thus hard to control; for
example, shutting down Bitcoin literally requires shutting down the internet because there is no core
node that can be taken down (Brito and Castillo 2013, 34).
Digital currencies, as a way to transfer money illegally, can be further converted into cash or other means
of traditional payments. Illegal markets offer a number of possibilities for such transfers; there are
websites, both in legal and illegal parts of the web, anonymous and non-anonymous, which offer not
only to exchange Bitcoins for money via PayPal, Automated Clearing House (ACH), or Western Union,
but also to turn Bitcoins into cash sent directly via mail (Ciancaglini et al. 2015, 21–22).
According to Europol’s predictions, with further evolvement of cryptocurrencies, it is likely that we will
witness development of more niche currencies, which would be specifically tailored to carry out illicit
transfers and will provide greater levels of security and true anonymity (Europol 2014). The French anti-
money-laundering body—TRACFIN—already mentioned at least two such anonymous and virtually
untraceable digital currencies: Zerocoin, which represents an extension to Bitcoin’s protocol for greater
anonymity, and Darkcoin, which offers fully encrypted transactions and anonymous block transactions
(TRACFIN 2014). Further developments in this field also include such applications as Dark Wallet,
which makes Bitcoin transactions untraceable and allows for laundering someone’s own Bitcoins,
private cryptocurrencies created solely for the Russian underground market, and others (Europol 2014;
TRACFIN 2014).
Online casinos, e-gaming, and online betting websites
For decades, casinos in the offline world have been considered a sure way to launder ill-gotten money
(Filipkowski 2008, 22). It is natural, then, that online casinos attracted the attention of law enforcement
and regulators as a possible way to use digital technologies for illicit funds transfers (Council of Europe
2013). However, despite this conventional wisdom, there have not been many known cases thus far of
the use of online casinos for money laundering.
A few cases have been detected, however, in the use of e-betting systems. For example, in Australia, an
Albanian organized crime syndicate employed an online betting system combined with internet payment
services to launder illicit funds obtained from the sale of cannabis. The services were used to receive
international transfers and to move money offshore. The online betting service was used in this illegal
scheme to store the funds and make them accessible to other network members through sharing account
passwords. The value of incoming and outgoing money was counted in the millions of Australian dollars
(Australian Government 2012). Therefore, despite the lack of case studies and investigations, such
examples prove that online gambling and betting services can be used for illegal transfers, especially
when they are combined with online payment systems and digital currencies. As is argued by some
researchers, online gambling can allow money to be distanced from the illicit source for the criminal
enterprise of any size, both by gambling or by establishing an online casino in an offshore jurisdiction
(Fiedler 2013).

15
E-commerce
Since the internet offers countless possibilities for trading goods, or exchanging money for goods and
then selling them further, these activities can certainly be employed as a way for laundering illicit profits.
Such schemes as the exchange of illegally obtained money for certain goods and trade of these goods in
order to distance the profit from the source can be a part of the placement or layering stages of illegal
money transfers (Villasenor et al. 2011, 10). Another possibility of using the internet for illicit transfers
is the establishment of an e-commerce company, be it real or fake, and to offer services or trade goods
that are never actually delivered (Filipkowski 2008, 20–21; Weaver 2005, 455).
A complex landscape of illicit financial flows
As can be seen from the analysis above, the landscape of the illicit financial flows on the internet is
complex and can be attributed to various online activities and distinct areas of regulation. The
convergence of different fields, such as online gambling and digital currencies, e-commerce and e-
payments, and telecom services and banking, makes the ecosystem extremely complicated in terms of
oversight and control. The internet itself is already a complex and decentralized cross-border network,
where the possibility of tracing and prosecuting crimes requires effort and international cooperation.
Tackling the problem of illicit financial flows in cyberspace represents a great challenge for regulators
and law enforcement agencies because of the complexity and borderless nature of the online
environment. The analysis below will focus on the question of how technology can help in tackling the
problem of illicit financial flows—both on the internet and in the offline world.

Part 3. Digital technologies in fighting illicit financial flows


One of the critical issues to consider in the discussion about the nexus of digital technologies and illicit
financial flows is the question of whether and how technology can be used to address this problem. This
question, in turn, should be discussed even in the broader context of the debate on the role of technology
in fighting illicit financial flows in the digital era. This debate involves a set of complex issues, which
go far beyond the discussion about the choice of particular technologies for investigation or the ways
regulators and law enforcement agencies can use communication information and networks for
disrupting illegal activity. The following analysis deals with two main aspects of this discussion: the use
of information technologies for empowerment; and the role of digital tools for the prevention, detection,
and investigation of criminal activity.
3.1. Digital technologies as a tool for empowerment

Summary
• Digital technologies can be used as a tool to fight corruption and promote a culture of transparency.
• Different initiatives, from government efforts to establish e-government programs to grassroots
anticorruption movements, can be seen as successful attempts to employ digital technologies in
tackling illicit financial flows.
• To realize their full potential as a transparency and empowerment tool, however, digital technology
tools should be combined with infrastructural, social, and economic changes.

16
There is a broad consensus that technology can help in the fight against corruption and facilitate efforts
to fight illicit financial flows when it comes to good governance, transparency, awareness,
empowerment, and crime reporting. Corruption, as one of the sources of illicit financial flows, has not
been prominently linked to digital technologies for the facilitation of the commission of crimes.
However, in this very area, governments and civil society can employ information and communications
networks for strengthening efforts to tackle the problem. Digital technologies, and those related to e-
government, in particular, are being praised as a cost-effective solution for promoting transparency and
facilitating positive social changes (Bertot et al. 2010). Governments can employ the technologies for
better communication, efficiency, and transparency, while citizens and civil society can use the
technologies to report abuse, raise
awareness, and monitor activities of the Box 5 Digital Technology in the Fight against Corruption:
public sector (U4 2013). Initiatives on the National Level
Many initiatives, such as online reporting, Reporting centers:
online databases, and exit surveys, have The Janaagraha Centre for Citizenship’s corruption reporting website in
also been developed by civil society India is where citizens can report on the nature, number, pattern, types,
location, frequency, and values of actual corrupt acts they have
organizations to collect data about experienced; some of the reports on the website have already resulted in
corruption and make this data more arrests and convictions. This initiative started in India, but was later
accessible to public officials, investigative duplicated in Greece, Kenya, Zimbabwe, and Pakistan with some other
journalists, and nongovernmental countries, which followed this experience and decided to launch such
websites (U4 2013).
organizations, and, ultimately, to citizens, Data aggregation platforms:
who can play a monitoring role (The The K-Monitor database in Hungary collects media reports about
Engine Room 2012). These technologies corruption and structures them in a way so that people can view data by
can exist in the form of digital portals and category, such as institution, location, political party, and other (The Engine
Room 2012).
platforms, websites, and mobile phone Capacity-building initiatives:
applications (see box 5). The Nigerian anticorruption database, Acid, is a reporting platform
combined with capacity-building initiatives. In addition to providing the
Grassroots anticorruption movements and digital tools to track corruption in the public sector, it offers downloadable
civil society initiatives are developing, training and advocacy materials. The website also hosts interactive tools,
along with the efforts of many which allow citizens to text or tweet corruption reports to Google Maps in
governments, to create and promote a order to name corrupt officials and raise awareness (Roberts 2012).
culture of transparency by launching e-government programs. Technology greatly contributes to these
processes of empowerment. However, as some researchers have pointed out, despite the great promise
the information and communications technologies might have in tackling the problem of corruption,
they cannot be a silver bullet, and require a complex set of political, infrastructural, social, and economic
factors to realize their full potential (U4 2013).
3.2. Digital technologies in prevention, disruption, investigation, and detection of illicit financial
flows

Summary
• The use of digital technologies for investigation, prevention, and detection represents a big challenge
because of the intrusiveness of these techniques and the necessity of finding a balance between crime
prevention and crime control and human rights, safeguards, and privacy concerns.
• Digital technology, though one of the main enablers of the new types of crime and illegal money
transfers, cannot be used alone as a response to illicit financial flows. Technological tools for law
enforcement can be manipulated by criminals and can create even more vulnerabilities and risks. Thus,
the use of intrusive technologies should be carefully considered with regard to the risks they might
pose.
• Digital technology can be used to tackle money transfers at any stage of illicit financial flows. At the
level of gaining criminal profits, it can help in crime investigation and disruption. At the transfer stage,

17
technology can be used to trace illegal transactions and information exchange. After the integration
stage, digital technologies, such as the use of beneficiary databases or source leaks, can still help with
identification of illegal money.
• Using digital technologies to fight illicit financial flows can complement, but will never substitute for,
proper legal frameworks, international cooperation, and public-private collaboration. Addressing the
problem of illicit financial flows requires complex multifaceted strategies that employ all the necessary
components, including technological tools.

Digital technologies in tracing and investigating illicit financial flows: Debates and challenges
The second, much more complex and debatable aspect of the issue of the use of information technologies
in tackling illicit financial flows is the use of digital tools in crime prevention and investigation. It has
become conventional wisdom that law enforcement has been suffering because of the technological gap
between sophisticated criminals and law enforcement officials who are much less equipped with
technology. This common notion causes many debates in the field of fighting illegal activities in global
information networks to revolve around the prohibition of certain technologies, or the need to regain
control over technologies or—in general—the use of technology as a primary tool to prevent and
investigate online criminality. As a result of these discussions, some initiatives, such as bulk data
collection or permission to use such intrusive methods of investigation as remote forensic software, or
the prohibition of certain types of encryption or demanding the backdoors for encryption are praised as
the necessary solutions to empower law enforcement with the necessary capacity to trace and prevent
illegal activities (Abelson et al. 2015; De Nardis 2015; Shields 2005).
Several factors are frequently overlooked in the technology-focused debates. First, technology is a
facilitator of illegal activities online, but technology alone is not responsible for the problem. The
problem is that technology, in many cases, overtook the law. Technology facilitates crime because there
are different legal frameworks and borders, which technology can easily bypass, but which will not be
bypassed by the capacity of national law enforcement agencies.
Second, the same technology can be used for both legal and illegal purposes. The new payment methods
play one of the driving roles in the growth of the online economy and legal trade. Mobile banking is
important in developing countries for the micropayments for people who have never had a bank account
or landline phone. Even such services as Tor networks, which are free software for enabling anonymous
communication and which are frequently-associated with cybercrime services, are used not only by
criminals for gaining and moving illicit funds, but also by journalists, dissidents in authoritarian states,
and even law enforcement for private and secure communications. Surveillance and bulk data collection,
controls on certain technologies, or intrusion into communications in the absence of real suspicion will
not necessarily lead to crime reduction and crime control, because when technology facilitates the crime,
there are always people behind the criminal act. Moreover, the creation of backdoors to the secure
communications and the use of intrusive technologies by law enforcement create the risk of exploitation
of the same backdoors and technologies by criminals, thus, producing even more vulnerabilities and
risks.
Third, sophisticated cybercriminals will always search for ways to cheat technology (Abelson et al.
2015). As Pena (2009) rightly points out, by trying to close the technological gap and imposing such
measures as monitoring and surveillance, the states are “fighting fire with fire,” hoping “to find a cure
for a problem in the very technology that seems to breed it.”
Digital technologies as a tool for investigation, detection, and disruption
Do all the challenges discussed above mean that technology cannot help in fighting illicit financial
flows? The simple answer is no. Law enforcement, regulators, and businesses need to be technologically
equipped to tackle the problem of illicit money. Even more, without technology it is impossible to detect,
trace, investigate, and prosecute crime and illegal money transfers. Special equipment is needed for

18
crime investigation, collecting and handling electronic evidence, profiling with the purpose of
prevention, and early disruption of crime online. Furthermore, technology can help in ex-post
identification of illicit sources, when the money has already been integrated into the legal financial
systems. Technology can help obtain data from databases of beneficial ownership or obtain electronic
records about transaction trails.

The possible ways of using technologies are summarized in the table 3. This list is not exclusive, because
anti-money-laundering software vendors and developers of investigation software offer many cutting-
edge technical solutions that both industry and law enforcement agencies can use to trace and investigate
illicit financial flows. There are already many technical tools employed by regulators and law
enforcement for tackling crime in general, and the problems of illicit financial flows specifically. For
example, the French anti-money-laundering body’s secure networks, CEgmont Secure WebE, and
CFIU.NETE, manage requests from abroad and allow fast and secure information exchange for the
purpose of fighting illicit financial flows (TRACFIN 2013).

Table 3 Digital Technologies in Prevention, Investigation, and Detection of Illicit Financial Flows

Illegal Money Acquisition Illegal Money Transfer Illegal Money Integration

Digital tools to investigate crime Maintaining risk-based profiles based Ex-post identification of illicit sources
(interception of content data and on transactional activities
Digital tools for searching for and
traffic data, remote forensic
Real-time payment screenings obtaining beneficial ownership
software, etc.)
information in the databases
Creation of lists: fraud lists, blacklists,
Digital tools to trace and disrupt
frozen lists, etc. Leaks of electronic data transfer trails
crimeware
and electronic documents to the
Better information exchange (digital
Databases for profiling attention of public and competent
platforms, automatic exchange of
authorities
Platforms for cross-border information)
information exchange among law
enforcement

19
Even challenging new technological
developments offers law enforcement
Box 6 Use of Technology for Botnet Disruption: Complexity of
agencies certain opportunities. For the Issue
example, criminals and law enforcement
agencies alike can use the recent To take down a botnet, it is not enough just to use technology to tackle the
infrastructure of zombie networks. The network cannot be taken down by just
development—Big Data—for the shutting down the servers because the bot herder (the individual who controls
application of qualitative analytical and maintains a botnet), if he or she is not arrested, can set up new servers and
techniques for identifying likely targets; reconnect with a network of compromised computers.
but, in the case of law enforcement, this Arresting the bot herder without shutting off the infrastructure will not help
technique of statistical predictions could either, because the network can be taken over by another person and the
be used either for investigations or for criminal activity will continue. To cope with this situation, law enforcement
agencies have to disrupt communication between the bot herder and the
prevention (Eruopol 2014). network and then arrest the bot herder; however, even this is not the last step.
When the bot herder is arrested and servers are taken down, the malware will
There are many examples of the use of
remain in hundreds of compromised computers; only new infractions will be
specific technologies and tools that help prevented.
to tackle the problem; however, there is a
Thus, the users of compromised machines always need to be contacted and
need for a clear understanding that for the helped to clean their computer systems (van der Wagen and Pieters 2015)—and
purpose of detection, investigation, and this neither law enforcement nor other governmental bodies can do on their
prevention of crime and money own; the help of the internet service providers is always needed. This is why in
laundering, technological means are a many countries there are special public-private collaboration programs on
tracing malicious traffic from the IP (Internet Protocol) addresses and contacting
very important component, but they are users and helping them clean their machines.
still just one element among other critical
tools. The complexity of the issue of
using technology for disruption of the technological schemes employed in the illicit market can be briefly
illustrated with the example of botnet—a network of “zombie” computers, which represents one of the
backbones of the underground economy (box 6).
Technology: A core component, but not a silver bullet
In addition to the use of technologies, law enforcement agencies always have to tackle many components
of the criminal value networks simultaneously and with the use of different tools. Even the best digital
tools in crime investigation will not work when there are no harmonized legal frameworks, proper
regulation, collaboration between industry and governments, or user awareness. The complexity of the
problem of using digital technologies for illicit activities comes not only from technology itself, but also
from the borderless and decentralized nature of the internet, uncooperative states, the complexity of
digital ecosystems with a myriad of players in the landscape of the digital economy, and, as a result, a
lack of coordinated efforts, legal uncertainty, and jurisdictional problems (Thomason 2009, 24). This is
why the approach to fighting the process of earning and transferring illicit money should employ relevant
technologies, but never rely solely on technologies.
Technology can equip the criminal justice system with the necessary tools, but will not fix the system
itself and will not bridge all the capacity gaps, let alone the legal gaps. In order to use investigative
technologies properly and to facilitate cross-border investigations and the exchange of electronic
evidence, there is a need for common digital forensics standards and procedures, including standards on
tools, data formats, and direct data transfers. Even when the most crosscutting technologies are employed
by law enforcement, investigation will always rely primarily on legal frameworks; thus, all the
technology-related tools have to be combined with the effective mutual legal assistance and electronic
evidence rules. Since the use of investigative instruments, surveillance, and data collection can have
more drastic privacy implications than those caused by crime, any invasive technological means for
prevention and detection of illicit financial flows have to take into consideration privacy and human
rights concerns and have to be carefully balanced.
Furthermore, the existence of the thousands of stakeholders in the field of digital economy requires
public-private cooperation between industry and governmental bodies. Thus, there is a need for a
20
complex approach—from awareness and education of users to public-private cooperation, and from
proper national legal frameworks to mutual legal assistance instruments that are able to cope with the
speed of information transfers in the digital era.
Fighting illicit financial flows requires coordinated efforts on harmonization of legislation and
approaches to mutual legal assistance on the global level with the involvement of all stakeholders,
including governments, industry, and civil society. One of the key issues in this regard is the difference
in capacity between developed and developing countries, and the special needs poorer countries have in
order to be able to address the problem properly. This issue is twofold.
On the one hand, substantive and procedural legal frameworks should be harmonized in the same way
to allow international cooperation; therefore, differences in the legal frameworks might create loopholes
and grey areas for cybercriminals. Thus, there should be a clear understanding that legal instruments
should be drafted in the same way in both developed and developing countries. On the other hand, though
legal frameworks play a central role in tackling illegal activity in digital networks, the law will not work
without proper technical instruments and the special knowledge of those who are applying it. This is
why it is important to focus on capacity building and awareness raising in developing countries, which
can have special needs depending on the state of technological development, the structure of penetration
of different type of networks and services, and the current capacity of law enforcement agencies.
Even wealthy nations, which have been the target of cyber-related crime for decades and have already
made significant efforts to build capacity to fight technology-related crime and promote a culture of
cybersecurity, are struggling with many problems in this field. The problems include harmonization of
procedural instruments, differences in legislation, slow mutual legal assistance processes, sophisticated
encryption, and constantly evolving cyberthreats. For developing countries, the issue of cyber-related
illegal activity might have a different dimension: many of them, while not being a primary target of
digital crime, are struggling with “bread and butter” problems, like food and water supply, fighting
corruption, and traditional organized crime and reduction of poverty, to name a few, in addition to
technology-enabled illicit financial flows.
However, with the fast development of the new forms of crime, any developing country with
cybersecurity flaws can become if not a target, at least a country of origin of digital crime. Thus, capacity
building and the promotion of a cybersecurity culture should be one of the priorities in developing
countries in order to avoid a potential “cybersecurity divide,” which can undermine efforts to facilitate
economic and social development, and, as a result, open a new schism “between [the] haves and have
nots” (Gercke et al. 2011, 189). It is necessary to adopt proper legal frameworks, and educate law
enforcement agencies in developing countries and equip them with appropriate technological tools for
investigations. Therefore, a special focus should be put on addressing the needs of the poorer states to
tackle the global problem of transborder illegal activities with the use of digital technologies.

Part 4. Conclusion: The way forward


Fighting illicit financial flows in the interconnected society is like chasing a moving target. In the
borderless decentralized communications networks, the problem of illegal money extends beyond
national borders and spans different jurisdictions. The complexity of the digital economy and fast-
evolving technologies, when money can be illegally earned and transferred across borders with a simple
mouse click, requires a shift from the legal and technical paradigm to the principle “follow the money”
in tackling the problem of illicit financial flows. While information technologies are evolving, the very
existence of these technologies and their vulnerable and transborder nature are the primary factors for
the evolvement of illegal activity carried out with the use of digital networks or facilitated by such use.
Since technology is evolving every day, there is no silver bullet—no perfect frameworks or
technologies—that could be implemented to solve the problem from a long-term perspective. Any set of

21
solutions should be considered just as a way to address the current state of technology and as another
step in the continuous process of tackling the problem. The situation requires complex strategies and
forward-looking approaches, where efforts should be directed not only to solving the current problems,
but identifying the new threats and predicting the risks posed by new technologies. These strategies
should focus on a broad range of issues, such as:
• Identification of the gaps in international standards concerning illegal money transfers
• Harmonization of substantive and procedural criminal law (including electronic evidence
frameworks) in the field of cybercrime and digital investigation on the international level
• Proper implementation of the international standards and legal frameworks on the national level
• Capacity building, especially in developing countries, in order to increase the effectiveness of
legal and regulatory frameworks
• Efforts to raise awareness among governments, regulators, and private industry
• Use of modern technology in tackling illicit financial flows, but balancing the use of
technological tools with privacy and human rights and implementing necessary safeguards
• Identification of technology-related risks in order to create a risk-based approach to prevention,
detection, and monitoring of illicit financial flows
• Public-private collaboration in the field of tackling cybercrime
• Private sector engagement in monitoring illegal money transfers
• Technical capacity building among law enforcement and private industry.
Ultimately, any approach to tackling illicit financial flows should be based on a common understanding
that detection, prevention, and tracing of illegal profits earned or transferred in the digital environment
will be a continuous process of addressing new technological challenges. It is also necessary to take into
account the complexity of the ecosystem of the digital economy and to bear in mind that heavy regulation
can have a negative effect on the development of new technologies and services and, in the end,
undermine the benefits that the internet and digital technologies can bring to society.

22
References
Abelson et al. 2015. “Keys Under Doormats: Mandating insecurity by requiring government access to
all data and communications.”
http://www.crypto.com/papers/Keys_Under_Doormats_FINAL.pdf.
Australian Government. 2012. “AUSTRAC typologies and case studies report 2012.”
http://www.austrac.gov.au/sites/default/files/documents/typ_rprt12_full.pdf.
Ben-Itzhak. 2008. “Organized cybercrime.” ISSA Journal (October).
https://dev.issa.org/Library/Journals/2008/October/Ben-Itzhak-Organized%20Cybercrime.pdf.
Bertot et al. 2010. “Using ICTs to create a culture of transparency: E-government and social media as
openness and anti-corruption tools for societies.” Government Information Quarterly 27: 264–
271.
Bertrand. 2015. “Silk Road wasn’t even close to the biggest drug market on the internet.”
http://uk.businessinsider.com/silk-road-wasnt-even-close-to-the-biggest-drug-market-on-the-
internet-2015-6?r=US&IR=T.
Blankenburg and Kahn. 2012. “Governance and Illicit Flows.” In Draining Development?: Controlling
Flows of Illicit Funds from Developing Countries?, edited by Peter Reuter. Washington, DC:
World Bank.
https://openknowledge.worldbank.org/bitstream/handle/10986/2242/668150PUB0EPI0067848
B09780821388693.pdf.
Brito and Castillo. 2013. “Bitcoin: A Primer for Policymakers.” Mercatus Center, George Mason
University, Fairfax, Virginia, United States.
mercatus.org/sites/default/files/Brito_BitcoinPrimer_embargoed.pdf.
Bryans. 2014. “Bitcoin and Money Laundering: Mining for an Effective Solution (August 29, 2013).”
Indiana Law Journal 89 (1). http://ssrn.com/abstract=2317990.
Caballero et al. 2011. “Measuring pay-per-install: the commoditization of malware distribution,”
Proceeds of the USENIX Security Symposium, August. http://www.icir.org/vern/papers/ppi-
usesec11.pdf.
Ciancaglini et al. 2015. “Below the Surface: Exploring the Deep Web.” TrendMicro, Forward-Looking
Threat Research Team. http://www.trendmicro.co.uk/media/wp/exploring-the-deep-web-
whitepaper-en.pdf.
Cisco. 2011. “Cisco 2010 annual security report. Highlighting global security threats and trends.”
http://www.cisco.com/en/US/prod/collateral/vpndevc/security_annual_report_2010.pdf.
Council of Europe. 2012. “Moneywal report: Criminal money flows on the internet: methods, trends and
multi-stakeholder counteraction.”
———. 2013. “The use of online gambling for money laundering and the financing of terrorism
purposes. Research report.”
Danchev. 2010. “Study finds the average price for renting a botnet.”
http://www.zdnet.com/blog/security/study-finds-the-average-price-for-renting-a-botnet/6528.
DeNardis. 2015. “Internet Architecture as Proxy for State Power.” In IP Justice Journal: Internet
Governance and Online Freedom Publication Series. http://www.ipjustice.org/digital-
rights/internet-architecture-redesign-as-proxy-for-state-power-by-laura-denardis/.
Dumitrache and Modiga. 2011. “New Trends and Perspectives in the Money Laundering Process.”
Challenges of the Knowledge Society Law (1): 50–57.

23
ESET. 2010. “Cybercrime Coming of Age.” White paper, January.
http://go.eset.com/us/resources/white-papers/EsetWP-CybercrimeComesOfAge.pdf.
Europol. 2011. “Threat assessment (abridged). Internet facilitated organised crime.” Internet Organised
Crime Threat Assessment (iOCTA). File No.: 2530–264, The Hague, January 7.
https://www.europol.europa.eu/sites/default/files/publications/iocta.pdf.
———. 2014. “The Internet Organised Crime Threat Assessment (iOCTA).” September 29.
https://www.europol.europa.eu/content/internet-organised-crime-threat-assesment-iocta.
———. 2015. “The Internet Organised Crime Threat Assessment (iOCTA).” September 30.
https://www.europol.europa.eu/content/internet-organised-crime-threat-assessment-iocta-2015.
Fallmann et al. 2010. “Covertly probing underground economy marketplaces.” Vienna University of
Technology Secure Systems Lab. http://www.iseclab.org/papers/dimva2010_underground.pdf.
FATF (Financial Action Task Force). 2008. “Money Laundering & Terrorist Financing Vulnerabilities
of Commercial Websites and Internet Payment Systems.” http://www.fatf-gafi.org/.
———. 2010. “Money Laundering Using New Payment Methods.” October. http://www.fatf-gafi.org/.
———. 2014. “FATF Report. Virtual Currencies. Key Definitions and Potential AML/CFT Risks.”
June. http://www.fatf-gafi.org/media/fatf/documents/reports/virtual-currency-key-definitions-
and-potential-aml-cft-risks.pdf.
Federal Bureau of Investigation. 2012. “Bitcoin Virtual Currency: Intelligence Unique Features Present
Distinct Challenges for Deterring Illicit Activity.” April 24.
www.wired.com/images_blogs/threatlevel/2012/05/Bitcoin-FBI.pdf.
Fiedler. 2013. “Online Gambling as a Game Changer to Money Laundering?” April 30.
http://ssrn.com/abstract=2261266.
Filipkowski. 2008. “Cyber Laundering: An Analysis of Typology and Techniques.” International
Journal of Criminal Justice Sciences (IJCJS) 3 (1): 15–27.
Forbes. 2007. “Convergence of Telecom and Financial Services and Its Effects on AML/CFT Wire
Remittance Operations.” United Nations Asia and Far East Institute for the Prevention of Crime
and the Treatment of Offenders (UNAFEI), Resource Material Series No. 71: 24–31.
Fowler. 2014. “Being cyber resilient. KPMG Insurance Issues Conference,” December 1.
https://www.kpmg.com/Ca/en/IssuesAndInsights/ArticlesPublications/Evolving-Regulation-
Series/Documents/Being-Cyber-Resilient.pdf.
Gercke, Tropina, Lozanova, and Sund. 2011. “The role of ICT regulation in addressing offences in
cyberspace.” In Trends in Telecommunication Reform November 2010. Enabling Tomorrow’s
Digital World. Geneva: International Telecommunication Union.
Ghosh. 2012. “How to prevent fraud in the Indian telecom industry.” Journal of Advanced Analytics 3Q
2O12: 18. https://www.sas.com/news/intelligence_quarterly/q312.pdf.
Global Financial Integrity. 2014. “Illicit Financial Flows.” http://www.gfintegrity.org/wp-
content/uploads/2014/09/GFI-Analytics.pdf.
Goodman. 2010. “International dimensions of cybercrime.” In Cybercrimes: A multidisciplinary
analysis, edited by S. Ghosh and E. Turrini. Berlin and Heidelberg: Springer-Verlag.
Goredema. 2011. “Combating illicit financial flows and related corruption in Africa: Towards a more
integrated and effective approach.” http://www.cmi.no/publications/file/4214-combating-illicit-
financial-flows-and-related.pdf.

24
Greenberg. 2014. “Drug Market ‘Agora’ Replaces the Silk Road as King of the Dark Net.” Wired.
http://www.wired.com/2014/09/agora-bigger-than-silk-road/.
Houses of Parliament. 2015. “The darknet and online anonymity.” Postnote Number 488 March.
www.parliament.uk/briefing-papers/POST-PN-488.pdf.
iDefence. 2006. “Money Mules: Sophisticated Global Cyber Criminal Operations.” iDefense, A
VeriSign Company.
http://complianceandprivacy.com/WhitePapers/iDefense_MoneyMules_20060329.pdf.
Jansky. 2013. “Illicit Financial Flows and the 2013 Commitment to Development Index,” CGD Policy
Paper 034, Center for Global Development. http://www.cgdev.org/publication/illicit-financial-
flows-and-2013-commitment-development-index.
Jardine. 2015. “Global Cyberspace Is Safer than You Think: Real Trends in Cybercrime.” Chatham
House, Global Commission on Internet Governance. Paper Series: NO. 16 — July 2015.
https://www.cigionline.org/sites/default/files/no16_web_1.pdf.
Kharouni, Loucif. 2012. “The Crimeware Evolution.” Trend Micro Incorporated Research Paper 2012.
http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-the-
crimeware-evolution.pdf.
LIRNEasia and UP‐NCPAG. 2008. “Mobile banking, mobile money and telecommunication
regulations.” http://lirneasia.net/wp-content/uploads/2008/05/Mobile-2.0_Final_Hor_EA.pdf.
Malhotra. 2010. “A New Dimension of Socio-Economic Offences: E-Money Laundering.” July 7.
http://ssrn.com/abstract=1505795.
Massa, Isabella. 2014. “Capital flight and the financial system.” ODI Working Paper, December 4.
http://www.odi.org/sites/odi.org.uk/files/odi-assets/publications-opinion-files/9392.pdf.
McAfee. 2012. “McAfee Threats Report: First Quarter 2012.”
http://www.mcafee.com/sg/resources/reports/rp-quarterly-threat-q1-2012.pdf.
———. 2014. “Net Losses: Estimating the Global Cost of Cybercrime.”
http://www.mcafee.com/de/resources/reports/rp-economic-impact-cybercrime2.pdf.
Meiklejohn et al. 2013. “A Fistful of Bitcoins: Characterizing Payments Among Men with No Names.”
Login 38 (6): 10–14. https://www.usenix.org/publications/login/december-2013-volume-38-
number-6.
National Drug Intelligence Center. 2008. “Money Laundering in Digital Currencies.” U.S. Department
of Justice, Washington, DC. http://www.justice.gov/archive/ndic/pubs28/28675/28675p.pdf.
OECD (Organisation for Economic Co-operation and Development). 2013. “Measuring OECD
Responses to Illicit Financial Flows from Developing countries.” Organisation for Economic Co-
operation and Development, Paris.
http://www.oecd.org/corruption/Illicit_Financial_Flows_from_Developing_Countries.pdf.
———. 2014. “Addressing the Tax Challenges of the Digital Economy.” OECD/G20 Base Erosion and
Profit Shifting Project, OECD Publishing, Paris. http://www.oecd.org/ctp/tax-challenges-digital-
economy-discussion-draft-march-2014.pdf.
ONE. 2014. “Trillion Dollar Scandal.”
https://s3.amazonaws.com/one.org/pdfs/Trillion_Dollar_Scandal_report_EN.pdf.
Pena. 2009. “Exporting Criminality: Money Laundering in a Domestic and International Context.”
http://web.stanford.edu/group/journal/cgi-bin/wordpress/wp-
content/uploads/2012/09/Pena_SocSci_2009.pdf.

25
Perez and Olivie. 2014. “Europe Beyond Aid: Illicit Financial Flows Policy Responses in Europe.”
Center for Global Development. Consultation Draft.
http://www.cgdev.org/sites/default/files/Europe-Beyond-Aid-Illicit-Financial-Flows_0.pdf.
Piller and Zaccariotto. 2009. “Cyber-Laundering: The Union Between New Electronic Payment Systems
and Criminal Organizations.” Transition Studies Review 16 (1): 62–76.
Richet. 2013. “Laundering Money Online: A Review of Cybercriminals Methods. Tools and Resources
for Anti-Corruption Knowledge.” United Nations Office on Drugs and Crime (UNODC), New
York, June 1. arxiv.org/pdf/1310.2368.
Roberts, Tony. 2012. “Technology is helping the fight against corruption: All over the world citizens are
using new technology to shine a light on fraud and bribery, and to blow the whistle on corrupt
practices.” http://www.computerweekly.com/opinion/Technology-is-helping-the-fight-against-
corruption.
Rush, H., C. Smith, E. Kraemer-Mbula, and P. Tang. 2009. “Crime online. Cybercrime and Illegal
Innovation.” NESTA Research Report, July.
http://www.eprints.brighton.ac.uk/5800/01/Crime_Online.pdf.
Samani et al. 2013. “Digital Laundry. An analysis of online currencies, and their use in cybercrime.”
White Paper, McAfee Labs. http://www.mcafee.com/de/resources/white-papers/wp-digital-
laundry.pdf.
SecureWorks. 2014. “Underground Hacker Markets.” December.
http://www.secureworks.com/assets/pdf-store/white-papers/wp-underground-hacking-
report.pdf.
———. 2010. “The Next Generation of Cybercrime: How it’s evolved, where it’s going.” Executive
Brief, secureworks.com.
Shields. 2005. “When the ‘information revolution’ and the US security state collide. Money laundering
and the proliferation of surveillance.” New Media & Society August 7 (4): 483–512.
The EastAfrican. 2015. “Uganda financial body probes $144m telecoms fraud,” March.
http://www.theeastafrican.co.ke/news/Uganda-financial-body-probes--144m-telecoms-fraud-/-
/2558/2661148/-/k0hyke/-/index.html.
The Engine Room. 2012. “New Technologies Against Petty Corruption. Tactics and Lessons from the
2012 International Anti-corruption Conference.” https://www.theengineroom.org/wp-
content/uploads/New-Technologies-Against-Petty-Corruption.pdf.
Thomason. 2009. “How has the establishment of the internet changed the ways in which offenders
launder their dirty money?” In Internet Journal of Criminology 2009.
http://www.internetjournalofcriminology.com/Thomason_Internet_Money_Laundering_July_0
9.pdf.
TRACFIN (Treatment of intelligence and action against clandestine financial circuits). 2013. “Annual
Analysis and Activity Report 2013.” Unit for intelligence processing and action against illicit
financial networks. http://www.economie.gouv.fr/files/ra_tracfin_anglais_2013.pdf.
———. 2014. “Regulating virtual currencies. Recommendations to prevent virtual currencies from
being used for fraudulent purposes and money laundering.”
http://www.economie.gouv.fr/files/regulatingvirtualcurrencies.pdf.
Trend Micro. 2010. “The business of cybercrime. A complex business model.” Focus Report Series,
January. http://www.trendmicro.com/cloud-content/us/pdfs/security-
intelligence/reports/rpt_business-of-cybercrime.pdf.

26
Tropina, Tatiana. 2013. “Organised Crime in Cyberspace.” In Transnational Organized Crime. Analyses
of a Global Challenge to Democracy. Bielefeld, Transcript Verlag, edited by Heinrich-Böll-
Stiftung and Regine Schönenberg, pp. 47–60.
Tucker. 2009. “The Digital Currency Doppelganger: Regulatory Challenge or Harbinger of the New
Economy?” Cardozo Journal of International and Comparative Law 17 (3): 589.
U4. 2013. “Technological innovations to identify and reduce corruption. U4 Expert Answer.”
http://www.u4.no/publications/technological-innovations-to-identify-and-reduce-corruption/.
UNECA (United Nations Economic Commission for Africa). 2015. “Illicit Financial Flows. Report of
the High Level Panel on Illicit Financial Flows from Africa.”
http://www.uneca.org/sites/default/files/PublicationFiles/iff_main_report_26feb_en.pdf.
van der Wagen and Pieters. 2015. “From Cybercrime to Cyborg Crime: Botnets as Hybrid Criminal
Actor-Networks.” British Journal of Criminology 55 (3): 578–595.
Villasenor, et al. 2011. “Shadowy Figures: Tracking Illicit Financial Transactions in the Murky World
of Digital Currencies, Peer-to-Peer Networks, and Mobile Device Payments.” The Brookings
Institution and the James A. Baker III Institute for Public Policy.
http://bakerinstitute.org/media/files/Research/d9048418/ITP-pub-FinancialTransactions-
082911.pdf.
Weaver. 2005. “Modern Day Money Laundering: Does the Solution Exist in an Expansive System of
Monitoring and Record Keeping Regulations?” Annual Review of Banking & Financial Law 24:
443–465.
Williams. 2002. “Organized crime and cyber-crime: Implications for business.”
http://www.cert.org/archive/pdf/cybercrime-business.pdf.
World Bank. 2015. “Illicit Financial Flows (IFFs).”
http://www.worldbank.org/en/topic/financialmarketintegrity/brief/illicit-financial-flows-iffs.
Wueest. 2015. “Underground black market: Thriving trade in stolen data, malware, and attack services.”
Symantec official blog. http://www.symantec.com/connect/blogs/underground-black-market-
thriving-trade-stolen-data-malware-and-attack-services.

27

You might also like