An analysis of money laundering and terrorism financing typologies

Purpose – The purpose of this paper is to measure the size of the money laundering and terrorism financing problem, identify threats and trends, the techniques employed and the amount of funds involved to determine whether the information obtained about money laundering and terrorism financing in real‐world environments can be transferred to virtual environments such as Second Life and World of Warcraft.Design/methodology/approach – Analysis of 184 Typologies obtained from a number of anti‐money laundering and counter‐terrorism financing (AML/CTF) bodies to: determine whether trends and/or patterns can be identified in the different phases of money laundering or terrorism financing, namely, the placement, layering and integration phases; and to establish whether trends and/or behaviours are ubiquitous to a particular money laundering or terrorism financing Type.Findings – Money launderers and terrorism financers appeared to have slightly different preferences for the placement, layering and integration te...

[1]  John Walker,et al.  Estimates of the costs of crime in Australia , 1992 .

[2]  Peter Grabosky,et al.  Money laundering in the 21st century : risks and countermeasures : seminar held on 7 February 1996, Canberra, Australia , 1995 .

[3]  V. Tanzi Money Laundering and the International Financial System , 1996 .

[4]  John R. Walker How Big is Global Money Laundering , 1999 .

[5]  F. Schneider,et al.  Shadow Economies: Size, Causes, and Consequences , 2000 .

[6]  Mike Robey,et al.  Petri Net Script: a visual language for describing action, behaviour and plot , 2001, Proceedings 24th Australian Computer Science Conference. ACSC 2001.

[7]  Bonnie G. Buchanan,et al.  Money laundering--a global obstacle , 2004 .

[8]  Massimo Nardo,et al.  Building synergies between theory and practice , 2006 .

[9]  Paul Schott Reference Guide to Anti-Money Laundering and Combating the Financing of Terrorism , 2006 .

[10]  D. Masciandaro,et al.  Black Finance: The Economics of Money Laundering , 2007 .

[11]  John C. F. Walker,et al.  Money laundering in and through Australia, 2004 , 2007 .

[12]  Financial crime as a threat to the wealth of nations , 2008 .

[13]  Kim-Kwang Raymond Choo Organised crime groups in cyberspace: a typology , 2008 .

[14]  Willy Picard Modelling Multithreaded Social Protocols with Coloured Petri Nets , 2008, Virtual Enterprises and Collaborative Networks.

[15]  Kim-Kwang Raymond Choo,et al.  Criminal Exploitation of Online Systems by Organised Crime Groups , 2008 .

[16]  Richard Heeks Current Analysis and Future Research Agenda on “Gold Farming”: Real-World Production in Developing Countries for the Virtual Economies of Online Games , 2008 .

[17]  John S. Zdanowicz Trade-Based Money Laundering and Terrorist Financing , 2009 .

[18]  Chih-Ping Chu,et al.  B2 model: A browsing behavior model based on High-Level Petri Nets to generate behavioral patterns for e-learning , 2009, Expert Syst. Appl..

[19]  Patrick Hardouin,et al.  Banks governance and public‐private partnership in preventing and confronting organized crime, corruption and terrorism financing , 2009 .

[20]  Brigitte Unger,et al.  Measuring Global Money Laundering: "The Walker Gravity Model" , 2009 .