Search results

1 – 10 of 343
Article
Publication date: 5 January 2023

Mohd Irwan Abdul Rani, Sharifah Nazatul Faiza Syed Mustapha Nazri and Salwa Zolkaflil

This paper aims to provide a systematic literature review (SLR) on contemporary cardinal money mule issues.

Abstract

Purpose

This paper aims to provide a systematic literature review (SLR) on contemporary cardinal money mule issues.

Design/methodology/approach

This paper reviews the most common money mule themes in perpetrating financial crime activities, especially its roles, recruitment and awareness. A systematic review protocol called preferred reporting items for systematic review and meta-analysis protocols is adopted for this study.

Findings

Money mules are used by organized criminal groups (OCG) or fraudster to launder illicit funds from outrageous criminal activities. They allow their accounts to be used for money laundering by OCG. The attacker, OCG or fraudsters would layer the stolen funds using money mule accounts. These money mules are recruited using various approaches, oftentimes deceived by opulent lifestyles to captivate the interest of potential money mules.

Originality/value

This paper presents money mule awareness needed by accountant, bank employees and the society. It is an unprecedented SLR on money mule. This paper will be beneficial for future money mule researchers, enforcement agencies and practitioners in banking industry.

Details

Journal of Financial Crime, vol. 31 no. 2
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 27 June 2020

Ehi Eric Esoimeme

This paper aims to help build awareness with financial institutions about the money laundering risks posed by individuals who have been unknowingly recruited as Money Mules and…

Abstract

Purpose

This paper aims to help build awareness with financial institutions about the money laundering risks posed by individuals who have been unknowingly recruited as Money Mules and the measures that financial institutions can adopt to detect illicit funds which are being received into the bank accounts of low risk or medium risk customers who are unknowingly recruited as “Money Mules”.

Design/methodology/approach

The research took the form of a desk study, which analysed various documents and reports such as a 2019 report on Money Mules by the European Union Agency for Law Enforcement Cooperation (EUROPOL); a 2019 and 2020 report on Money Mules by the Federal Bureau of Investigation (FBI) and the Better Business Bureau (BBB); the Financial Action Task Force Guidance on the Risk Based Approach to Combating Money Laundering and Terrorist Financing (High Level Principles and Procedures) 2007; the Financial Action Task Force Recommendations 2012; the United Kingdom’s Money Laundering, Terrorist Financing and Transfer of Funds (Information on the Payer) Regulations 2017; the United States Federal Financial Institutions Examination Council Bank Secrecy Act/Anti-Money Laundering Examination Manual 2014; Transparency International Corruption Perceptions Index 2018; The UK Proceeds of Crime Act 2002 (as amended); the Joint Money Laundering Steering Group JMLSG, Prevention of money laundering/combating terrorist financing: Guidance for the UK financial sector Part I June 2017 (Amended December 2017); the United States Codified Bank Secrecy Act Regulations (31 CFR); the Nigerian Money Laundering Prohibition Act 2011 (as amended); and the Joint Money Laundering Steering Group JMLSG, Prevention of money laundering/combating terrorist financing: Guidance for the UK financial sector Part II: Sectoral Guidance June 2017 (Amended December 2017).

Findings

This paper determined that financial institutions may be able to prevent proceeds of crime from being laundered by individuals who have been unknowingly recruited as Money Mules if they focus monitoring resources on the emotionally vulnerable customers like newcomers to the country, unemployed people who may have lost their jobs because of a pandemic like COVID-19, students and those in economic hardship; pay very close attention to the country of origin where the funds emanate from; pay very close attention to the country where the funds are being transferred to; and pay close attention to frequent large cash deposits followed by wire transfers.

Originality/value

While most articles focus on the money laundering risk(s) associated with Money Mules and the measures that individuals can use to ensure that their bank accounts are not used by criminals to launder illicit funds, this paper focuses on the different mechanisms that banks can use to detect illicit funds which are being received into the bank accounts of low risk or medium risk customers who are unknowingly recruited as “Money Mules”. This paper recommends a proportional approach that balances anti-money laundering measures, financial inclusion and human rights. The mechanisms/measures which have been extensively discussed in this paper will help banks to identify, assess and understand their money laundering and terrorist financing risks as it relates to Money Mules and take commensurate measures to mitigate them.

Details

Journal of Money Laundering Control, vol. 24 no. 1
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 10 June 2020

Muhammad Subtain Raza, Qi Zhan and Sana Rubab

This paper aims to explain the role of money mules in money laundering and financial crimes through the discussion of case studies. The authors also explain the red flags of money

1380

Abstract

Purpose

This paper aims to explain the role of money mules in money laundering and financial crimes through the discussion of case studies. The authors also explain the red flags of money mules and provide advice.

Design/methodology/approach

The authors use a case analysis approach. The paper mainly discusses ten cases about the use of money mules in financial crimes.

Findings

It has been found that money mules help criminal syndicates to remain anonymous while moving funds around the world. The unemployment, internet usage involvement of teenagers and youth in money laundering-related crime around the world are on a rising trend, and criminals are constantly looking for their victims by exploiting their mental and financial condition.

Originality/value

This paper provides case studies to understand the role of money mules in money laundering and financial crime.

Details

Journal of Financial Crime, vol. 27 no. 3
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 4 November 2020

Yi-Chun Chang, Kuan-Ting Lai, Seng-Cho T. Chou, Wei-Chuan Chiang and Yuan-Chen Lin

Telecommunication (telecom) fraud is one of the most common crimes and causes the greatest financial losses. To effectively eradicate fraud groups, the key fraudsters must be…

Abstract

Purpose

Telecommunication (telecom) fraud is one of the most common crimes and causes the greatest financial losses. To effectively eradicate fraud groups, the key fraudsters must be identified and captured. One strategy is to analyze the fraud interaction network using social network analysis. However, the underlying structures of fraud networks are different from those of common social networks, which makes traditional indicators such as centrality not directly applicable. Recently, a new line of research called deep random walk has emerged. These methods utilize random walks to explore local information and then apply deep learning algorithms to learn the representative feature vectors. Although effective for many types of networks, random walk is used for discovering local structural equivalence and does not consider the global properties of nodes.

Design/methodology/approach

The authors proposed a new method to combine the merits of deep random walk and social network analysis, which is called centrality-guided deep random walk. By using the centrality of nodes as edge weights, the authors’ biased random walks implicitly consider the global importance of nodes and can thus find key fraudster roles more accurately. To evaluate the authors’ algorithm, a real telecom fraud data set with around 562 fraudsters was built, which is the largest telecom fraud network to date.

Findings

The authors’ proposed method achieved better results than traditional centrality indices and various deep random walk algorithms and successfully identified key roles in a fraud network.

Research limitations/implications

The study used co-offending and flight record to construct a criminal network, more interpersonal relationships of fraudsters, such as friendships and relatives, can be included in the future.

Originality/value

This paper proposed a novel algorithm, centrality-guided deep random walk, and applied it to a new telecom fraud data set. Experimental results show that the authors’ method can successfully identify the key roles in a fraud group and outperform other baseline methods. To the best of the authors’ knowledge, it is the largest analysis of telecom fraud network to date.

Details

Data Technologies and Applications, vol. 55 no. 1
Type: Research Article
ISSN: 2514-9288

Keywords

Article
Publication date: 7 May 2021

Yuriy Yu. Nizovtsev, Oleg A. Parfylo, Olha O. Barabash, Sergij G. Kyrenko and Nataliia V. Smetanina

The use of computer technology to commit cyber laundering increases their social danger, creates new ways to commit cyber laundering, causes the masking of traces of cyber…

Abstract

Purpose

The use of computer technology to commit cyber laundering increases their social danger, creates new ways to commit cyber laundering, causes the masking of traces of cyber laundering and expands the geography of cyber laundering, while eliminating traditional state borders. That is why, the researched problems have a high level of relevance. The purpose of this research is to promote the spread of international standards in the field of combating money laundering, as well as an analysis of the mechanisms of money laundering obtained from cybercrime.

Design/methodology/approach

The leading methods that were used in the article for the purpose of conducting research were a number of general scientific methods, such as analysis and synthesis, deduction, induction, forecasting, modeling, analogy and a number of special methods of study and cognition, which include comparative legal, historical legal, formal legal and structural functional methods.

Findings

The main results prospects for further research and the applied value of the material. Large-scale cyber laundering of illegal income has long become a global problem that requires a solution from all states of the world, which means that these problems can only be overcome through active interstate cooperation.

Originality/value

The article analyzes inter alia the international legislation in the field of money laundering mechanisms obtained from cybercrime and examines the activities of international organizations in this area.

Details

Journal of Money Laundering Control, vol. 25 no. 2
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 25 June 2021

Christoph Wronka

This study aims to illustrate and determine how illegally obtained funds are laundered through online platforms and companies in different economic sectors in the digital age.

2789

Abstract

Purpose

This study aims to illustrate and determine how illegally obtained funds are laundered through online platforms and companies in different economic sectors in the digital age.

Design/methodology/approach

A qualitative analysis approach using purpose sampling methods, including 21 semi-structured interviews with prevention experts, compliance officers and convicted cybercriminals, resulted in the determination of concrete money-laundering methods involving the employment of online platforms provided by companies and institutions in different economic sectors.

Findings

The current study focuses on various companies in different economic segments that mitigate cyber laundering and the anti-money laundering measures that can be adopted. Therefore, this paper provides a detailed discussion and analysis on how money launderers avoid being detected. Both preventive and criminal perspectives are taken into consideration.

Originality/value

By identifying the gaps in the current anti-money-laundering mechanisms, it will provide compliance officers, legislators and law enforcement agencies with an in-depth insight into how cyber laundering operates in various economic sectors.

Details

Journal of Money Laundering Control, vol. 25 no. 2
Type: Research Article
ISSN: 1368-5201

Keywords

Abstract

Details

Compliance and Financial Crime Risk in Banks
Type: Book
ISBN: 978-1-83549-042-6

Article
Publication date: 23 January 2024

Shreya Sangal, Gaurav Duggal and Achint Nigam

The purpose of this research paper is to review and synthesize the role of blockchain technology (BCT) in various types of illegal activities, including but not limited to fraud…

Abstract

Purpose

The purpose of this research paper is to review and synthesize the role of blockchain technology (BCT) in various types of illegal activities, including but not limited to fraud, money laundering, ransomware attacks, firearms, drug tracking, cyberattacks, identity theft and scams.

Design/methodology/approach

The authors conducted a review of studies related to illegal activities using blockchain from 2015 to 2023. Next, a thematic review of the literature was performed to see how these illegal activities were conducted using BCT.

Findings

Through this study, the authors identify the relevant themes that highlight the major illegal activities performed using BCT, its possible steps for prevention and the opportunities for future developments. Finally, the authors provide suggestions for future research using the theory, context and method framework.

Originality/value

No other research has synthesized the illegal activities using BCT through a thematic approach to the best of the authors’ knowledge. Hence, this study will act as a starting point for future research for academic and technical practitioners in this area.

Details

Journal of Information, Communication and Ethics in Society, vol. 22 no. 1
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 2 January 2024

Veltrice Tan

This paper aims to determine the types of legal mechanisms that authorities can use to recover stolen assets for and from China.

Abstract

Purpose

This paper aims to determine the types of legal mechanisms that authorities can use to recover stolen assets for and from China.

Design/methodology/approach

Newspaper articles and books are examined as are relevant reports by various regulatory authorities and academic institutions.

Findings

The effectiveness of legal mechanisms in the recovery of stolen assets may be affected by issues such as the difficulties in tracing illicit funds, the ambiguous nature of “value” as well as the rise in technology.

Research limitations/implications

There are limited data available in relation to the prevalence of corrupt officials along the Belt and Road Initiative and the statistical success in the recovery of stolen assets. Any discussions within this paper are based on the impressionistic observations of this author, which may not reflect the true state of affairs of the Belt and Road Initiative.

Practical implications

Those who are interested in examining how authorities could recover stolen assets from and for China will have an interest in this topic.

Originality/value

The value of the paper is to demonstrate the difficulties in recovering stolen assets for and from China.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 21 January 2022

Rishik Elias Menon

Policy mobility scholarship concerning anti-money laundering (AML) has typically favoured the study of power structures and interests to the neglect of the constructivist…

Abstract

Purpose

Policy mobility scholarship concerning anti-money laundering (AML) has typically favoured the study of power structures and interests to the neglect of the constructivist perspective and the local cultural–symbolic driving forces of policy adoption. This study aims to redress this, by analysing the shifting ideational drivers of AML policy in Singapore over the past 31 years through a thematic analysis of Singapore’s parliamentary debates (Hansard).

Design/methodology/approach

Through a thematic analysis of Singapore's Hansard over the past 31 years, this study seeks to present a social constructivist perspective of AML policy adoption in Singapore.

Findings

The thematic analysis reveals how the internal driving forces of AML policy in Singapore have shifted, from the idea of “crime prevention” in the early 1990s, to the symbolic value of “international norm compliance” by the 2010s.

Research limitations/implications

This constructivist perspective of AML policy adoption is particularly useful in complementing the existing materialist theories of AML policy diffusion and allows us to better appreciate the historical nuances of AML policy transfer across the globe.

Practical implications

This research will provide a useful comparative case study for other policy mobility scholars interested in presenting a constructivist account of AML policy adoption in different jurisdictions.

Originality/value

There is no literature in the field of policy mobility, explaining the diffusion/transfer of AML policy from a social constructivist perspective.

Details

Journal of Money Laundering Control, vol. 26 no. 1
Type: Research Article
ISSN: 1368-5201

Keywords

1 – 10 of 343