Integrating Technology and Legal Strategies to Combat Evolving Money Laundering Tactics

Andhika Rafi Hananto

Abstract


Money laundering has significantly advanced with the aid of technology, enabling perpetrators to exploit technological tools for criminal ease. This trend is compounded by the use of cross-border cash couriers, increasingly favored as a method for laundering illicit funds. International conventions and multilateral agreements acknowledge the vulnerability of cash courier operations to money laundering, yet current frameworks primarily offer detection guidelines rather than precise methods for direct recognition. Given that money laundering involves proceeds of crime, authorities must scrutinize and assess transactions to determine if criminal activity constitutes money laundering, distinct from customs violations.Moreover, the proliferation of innovative financial products and payment systems, including cryptocurrencies like Bitcoin, Litecoin, and other virtual currencies, as well as bearer negotiable instruments, has further facilitated money laundering opportunities. Research indicates that criminal tactics are outpacing legal frameworks, with technology infiltrating the strategies of money launderers and potentially overshadowing regulatory controls. Despite technology's neutral intent, its misuse challenges the traditional role of law enforcement.This qualitative study aims to analyze how legal frameworks can collaborate with technology to combat money laundering effectively. The hypothesis posits that the law can provide crucial guidance amid technological developments, while technology can prompt legal systems to adapt swiftly. By integrating these approaches, the research suggests that combating the evolution of money laundering becomes more formidable when law and technology converge.

Article Metrics

Abstract: 1708 Viewers PDF: 682 Viewers

Keywords


Money laundering; New products and payment systems Blockchain Technology; Crypto-currency;

Full Text:

PDF


References


S.W Eddyono and Y.I Chandra. Parsing the Implementation and Challenges of Anti Money Laundering in Indonesia, Institute for Criminal Justice Reform, Jakarta, 2015, 7 & 27

J.Ully and B.L. Ask. Money Laundering. Laros, Surabaya, 2008, 1 UNODC. Money Laundering and Technology. www.unodc.org

A. Blackham. “Is Money Laundering enabling money laundering?”, Http: //www.telegraph.co.uk/money/criminal-activities/is-technology-enabling-money-laundering/ [5] E.E. Esoimeme. 2016. The Risk-Based Approach to Combating Money Laundering and Terrorist Financing. Eric Press: USA, p. 2

C. Williamson, et al. “Technology In The Fight Against Money Laundering In The New Digital Currency Age”, Thomas Reuters, July 2013, p. 12, retrieved from www.instituteofat.org/whitepapers/GRC00403_0.pdf

D. Bryans. 2014. "Bitcoin and Money Laundering: Mining for an Effective Solutions". Indiana Law Journal Vol 89 Issue 1, p. 1, retrieved from: http://repository.law.indiana.edu/ilj.

D.S. Demetic. Technology and Anti Money Laundering: A System Theory and Risk Based Approach. Edward Elgar Publishing Limited: United Kingdom, 2010, p. 1

J. Clough. 2010. Principles of cybercrime. Cambridge University Press: United Kingdom, pp. 5 -7

G. Lisanawati. 2010. "Electronic Funds Transfer in Money Laundering Crime: Regulation Needed in Response to Meeting of Technology and Crime in Indonesia", International Journal of Cyber ​​Society and Educations, Vol 3 No. 2, December 2010, p. 165

The Wallstreet Journal, 2013, “Web Money Gets Laundering Rule”, retreived from: https: //www.wsj.com/articles/SB10001424127887324373204578374611351125202, on April 2nd, 2017

K. Singh. 2015. “The New Wild West: Preventing Money laundering in the Bitcoin System”, Northwestern Journal of Technology and Intellectual Property, Vol 13No. 1, pp. 40-44

B.A Pamplin. 2014. “Virtual Currencies and the Implication for U.S Anti Money Laundering Regulations”, retrieved from: search.proquest.com/openview/1f7e0456bee46d7c0cf4aec953590cbb/1.pdf?pq., On 5 April 2017

A. Guadamuz & C. Marsden. "Bitcoin, the wrong implementation of right idea at the right time", retrieved from: sro.sussex.ac.uk/54104/1/SSRN-id2526736.pdf

R. Hutt. “All you need to know about Blockchain Explained simply”, retrieved from https://www.weforum.org/agenda/2016/06/blockchain-explained-simply/, on 3 April 2017

K. Philips & J. Page. “Blockchain: A new AML Kid on the block”, retrieved from http://www.antimoneylaundering.lawyer/blockchain-anti-money-laundering/on 27 April 2017


Refbacks

  • There are currently no refbacks.



Barcode

IJIIS: International Journal of Informatics and Information Systems

ISSN:2579-7069 (Online)
Organized by:Departement of Information System, Universitas Amikom Purwokerto, IndonesiaFaculty of Computing and Information Science, Ain Shams University, Cairo, Egypt
Website:www.ijiis.org
Email:husniteja@uinjkt.ac.id (publication issues)
  taqwa@amikompurwokerto.ac.id (managing editor)
  contact@ijiis.org (technical & paper handling issues)

 This work is licensed under a Creative Commons Attribution-ShareAlike 4.0