Abstract
This note examines the relatively new crime of cyberlaundering, and explains how terrorist organizations are using the Internet and cyberlaundering to fund their activities. In addition, this paper examines the current money laundering laws of the United States, as well as the attempts taken by the United Nations, the G7, the Organization of American States, and the Council of Europe to stem the laundering of money. The basic process of money laundering is described in detail, and it is explained how terrorist organizations in particular may use the Internet to launder their funds. The paper points out loopholes with respect to cyberlaundering in the money laundering laws of the United States and the multinational organizations mentioned above, and methods are proposed to close those gaps. Although implementation of the proposed methods would be expensive and time consuming, such measures would help stem the use of the Internet by terrorists in funding their activities.
Published Version
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.