15
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: not found

      Reexamining the anti-money-laundering framework: a legal critique and new approach to combating money laundering

      Journal of Financial Crime
      Emerald

      Read this article at

      ScienceOpenPublisher
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Purpose

          Money laundering poses significant challenges for policymakers and law-enforcement authorities. The money-laundering phenomenon is often acknowledged as a type of “serious and organised crime” yet has traditionally been described as a complicated three-stage process, involving the “placement, layering and integration” of criminal proceeds. This article aims to reexamine the money-laundering concept within the realm of organised crime and critique its legal underpinnings.

          Design/methodology/approach

          This paper explores how criminal actors collude in organised money-laundering schemes to circumvent laws and frustrate the efforts of officials, while advancing the regulatory-spatial paradigms of which organised money launderers operate. In doing so, it reframes the debate towards the “who” and “where” of money laundering.

          Findings

          This paper argues that authorities’ efforts to combat money laundering relies on rigid legal definitions and flawed ideals that fail to address the money-laundering problem.

          Originality/value

          There has been little scholarly debate that questions the fundamental approach to conceptualising money laundering. This paper proposes a new approach to combating money laundering that better incorporates the actors involved in money laundering and the spaces in which it occurs.

          Related collections

          Most cited references55

          • Record: found
          • Abstract: found
          • Article: not found

          Illicit Bitcoin transactions: challenges in getting to the who, what, when and where

          The purpose of this paper is to highlight the intelligence and investigatory challenges experienced by law enforcement agencies in discovering the identity of illicit Bitcoin users and the transactions that they perform. This paper proposes solutions to assist law enforcement agencies in piecing together the disparate and complex technical, behavioural and criminological elements that make up cybercriminal offending. A literature review was conducted to highlight the main law enforcement challenges and discussions and examine current discourse in the areas of anonymity and attribution. The paper also looked at other research and projects that aim to identify illicit transactions involving cryptocurrencies and the darknet. An optimal solution would be one which has a predictive capability and a machine learning architecture which automatically collects and analyses data from the Bitcoin blockchain and other external data sources and applies search criteria matching, indexing and clustering to identify suspicious behaviours. The implementation of a machine learning architecture would help improve results over time and would be less manpower intensive. Cyber investigators would also receive intelligence in a format and language that they understand and it would allow for intelligence-led and predictive policing rather than reactive policing. The optimal solution would be one which allows for intelligence-led, predictive policing and enables and encourages information sharing between multiple stakeholders from the law enforcement, financial intelligence units, cyber security organisations and fintech industry. This would enable the creation of red flags and behaviour models and the provision of up-to-date intelligence on the threat landscape to form a viable intelligence product for law enforcement agencies so that they can more easily get to the who, what, when and where. The development of a functional software architecture that, in theory, could be used to detected suspicious illicit transactions on the Bitcoin network.
            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Understanding the Laundering of Organized Crime Money

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Cryptocurrency and criminality

                Bookmark

                Author and article information

                Journal
                Journal of Financial Crime
                JFC
                Emerald
                1359-0790
                1359-0790
                March 24 2022
                March 24 2022
                Article
                10.1108/JFC-02-2022-0041
                2ce773a1-0c1b-4cde-8d63-30fcd97a57dc
                © 2022

                https://www.emerald.com/insight/site-policies

                History

                Comments

                Comment on this article