As fraud and corruption continue to spread globally, illicit and illegitimate finance is one of many areas of concern. To help stop the spread of corruption across fields and industries, further study on the best practices and strategies to combat illicit and illegitimate finance is required. Concepts and Cases of Illicit Finance provides understanding and lessons learned regarding all aspects of illicit and illegitimate finance. Covering key topics such as financial crimes, financial intelligence, and hacking fraud, this premier reference work is ideal for business owners, managers, policymakers, industry professionals, researchers, academicians, scholars, practitioners, instructors, and students.
This publication identifies the main areas of weakness and potential areas for action to combat money-laundering, tax evasion, foreign bribery, and to identify, freeze and return stolen assets.
Why are carefully designed, sensible policies too often not adopted or implemented? When they are, why do they often fail to generate development outcomes such as security, growth, and equity? And why do some bad policies endure? World Development Report 2017: Governance and the Law addresses these fundamental questions, which are at the heart of development. Policy making and policy implementation do not occur in a vacuum. Rather, they take place in complex political and social settings, in which individuals and groups with unequal power interact within changing rules as they pursue conflicting interests. The process of these interactions is what this Report calls governance, and the space in which these interactions take place, the policy arena. The capacity of actors to commit and their willingness to cooperate and coordinate to achieve socially desirable goals are what matter for effectiveness. However, who bargains, who is excluded, and what barriers block entry to the policy arena determine the selection and implementation of policies and, consequently, their impact on development outcomes. Exclusion, capture, and clientelism are manifestations of power asymmetries that lead to failures to achieve security, growth, and equity. The distribution of power in society is partly determined by history. Yet, there is room for positive change. This Report reveals that governance can mitigate, even overcome, power asymmetries to bring about more effective policy interventions that achieve sustainable improvements in security, growth, and equity. This happens by shifting the incentives of those with power, reshaping their preferences in favor of good outcomes, and taking into account the interests of previously excluded participants. These changes can come about through bargains among elites and greater citizen engagement, as well as by international actors supporting rules that strengthen coalitions for reform.
Uncover the financial fraud that funds terrorist organizations Trade-Based Money Laundering is an authoritative examination of this burgeoning phenomenon, now coming under scrutiny in the War on Terror. This book walks you through the signs and patterns of trade-based money laundering (TBML) to help you recognize it when it occurs, and shows you how data and analytics can be used to detect it. You'll learn the common value transfer techniques including invoice fraud, over-and-under invoicing, and misrepresentation, and learn why analytic detection systems have yet to be implemented despite the existence of copious data. Case studies from around the world highlight the real-life implications of the concepts and processes presented in the text, giving you a first-hand view of the mechanisms at work inside this expanding illegal market. Trade-based money laundering uses trade to convert large quantities of illicit cash into less conspicuous assets or commodities to evade financial transparency laws and regulations. As an ideal funding mechanism for terrorist groups, the practice is getting more attention even as it increases in scale and spread. This book takes you deep inside TBML to better arm you against its occurrence. Learn the typical value transfer techniques of TBML Examine case studies detailing international examples Discover why institutions have failed to implement detection systems Explore ways in which analytics can identify TBML According to the U.S. State Department, TBML has reached staggering proportions in recent years, and is considered by many to be the next frontier of international money laundering enforcement. Trade-Based Money Laundering gives you a battle plan, with expert insight and real-world guidance.
A growing concern among those interested in economic development is the realization that hundreds of billions of dollars are illicitly flowing out of developing countries to tax havens and other financial centers in the developed world. This volume assesses the dynamics of these flows, much of which is from corruption and tax evasion.
Many changes have occurred in the twenty-five years that have passed since the enactment of the Money Laundering Control Act of 1986. The law has been amended, new underlying crimes have been added, and court decisions have modified its scope. The Act remains an important tool in combating criminal activity. Now in its third edition, Money Laundering: A Guide for Criminal Investigators covers the basics of finding ill-gotten gains, linking them to the criminal, and seizing them. Providing a clear understanding of money laundering practices, it explains the investigative and legislative processes that are essential in detecting and circumventing this illegal and dangerous activity. Highlights of the Third Edition include Important court decisions and changes in federal law since the Second Edition New trends in crime and terrorism financing The rise of money laundering in connecting with major frauds, including the Bernie Madoff case Law and policy shifts related to terrorism and financing since the Obama administration New methods for financial intelligence and the filing of Suspicious Activity Reports How changes in technology have enabled launderers to move funds more easily and anonymously Knowledge of the techniques used to investigate these cases and a full understanding of the laws and regulations that serve as the government’s weapons in this fight are essential for the criminal investigator. This volume arms those tasked with finding and tracing illegal proceeds with this critical knowledge, enabling them to thwart illegal profiteering by finding the paper trail.
Criminal and terrorist organisations are increasingly turning to white collar crime such as fraud, e-crime, bribery, data and identity theft, in addition to more violent activities involving kidnap and ransom, narcotics and arms trafficking, to fund their activities and, in some cases pursue their cause. The choice of victims is global and indiscriminate. The modus operandi is continually mutating and increasing in sophistication; taking advantage of weaknesses in the system whether they be technological, legal or political. Countering these sources of threat finance is a shared challenge for governments, the military, NGOs, financial institutions and other businesses that may be targeted. Shima Keene’s Threat Finance offers new thinking to equip any organisation regardless of sector and geographical location, with the knowledge and tools to deploy effective counter measures to tackle the threat. To that end, she brings together a wide variety of perspectives - cultural, legal, economic and technological - to explain the sources, mechanisms and key intervention methodologies. The current environment continues to favour the criminal and the terrorist. Threat Finance is an essential read for fraud and security practitioners, financial regulators, policy-makers, intelligence officials, judges and barristers, law enforcement officers, and researchers in this field. Dr Keene offers an antidote to the lack of good, applied, research; shortcomings in in-house financial and forensic expertise; misdirected financial compliance schemes; legal and judicial idiosyncrasies; unhelpful organisation structures and poor communication. She argues convincingly for a coherent, aggressive, informed and cross-disciplinary approach to an ever changing and rapidly growing threat.
Illicit Financial Flows (IFFs) have received increased attention in light of international corruption scandals, high-profile leaks about extensive tax abuse schemes, and the continued fight against terrorism financing and organized crime. Reducing IFFs is now a key target of the UN Sustainable Development Goals, renewing debates about both how to operationally define IFF and the methodologies that are used to estimate their extent. This book addresses these key issues, by investigating and schematizing the concept of illicit financial flows and critically evaluating the current models used to estimate them. It book proposes an original flow-network approach through which to produce longitudinal and country-specific estimates of IFFs and the gross value added related to transnational trafficking. It advocates for a reformulation of the current definition of IFFs to one that is more specific and operational, allowing scholars and policy-makers to better clarify the relationship between IFFs, the sources of capital and the channels that are used to move capital abroad. This brief will be an indispensable guide for students of criminology and organized crime, and for the researchers and practitioners working to understand and combat these crimes.
"Attempts to shed light on the total amounts likely to be laundered across the globe, as well as the potential attractiveness of various locations to those who launder money"--Pref.
This book is a first-of-its-kind, practice-based guide of 36 key concepts?legal, operational, and practical--that countries can use to develop non-conviction based (NCB) forfeiture legislation that will be effective in combating the development problem of corruption and recovering stolen assets.