Professional Documents
Culture Documents
Article 2
Article 2
Article 2
https://www.emerald.com/insight/1368-5201.htm
JMLC
25,2 “Cyber-laundering”: the change of
money laundering in the
digital age
330 Christoph Wronka
Deloitte GmbH Wirtschaftsprüfungsgesellschaft, Hamburg, Germany
Abstract
Purpose – This study aims to illustrate and determine how illegally obtained funds are laundered through
online platforms and companies in different economic sectors in the digital age.
Design/methodology/approach – A qualitative analysis approach using purpose sampling methods,
including 21 semi-structured interviews with prevention experts, compliance officers and convicted
cybercriminals, resulted in the determination of concrete money-laundering methods involving the
employment of online platforms provided by companies and institutions in different economic sectors.
Findings – The current study focuses on various companies in different economic segments that mitigate
cyber laundering and the anti-money laundering measures that can be adopted. Therefore, this paper
provides a detailed discussion and analysis on how money launderers avoid being detected. Both preventive
and criminal perspectives are taken into consideration.
Originality/value – By identifying the gaps in the current anti-money-laundering mechanisms, it will
provide compliance officers, legislators and law enforcement agencies with an in-depth insight into how cyber
laundering operates in various economic sectors.
Keywords Digital age, Cybercrime, Money-laundering, Financial crime prevention measures
Paper type Research paper
1. Introduction
Money laundering refers to the illegal process of making large amounts of money that have
been gained from actively participating in criminal activities, such as drug trafficking, and
which seem to be generated from a legitimate source (Li et al., 2020). The criminal justice
system views the money from the criminal system as dirty, and the entire illegal business
“launders” it to make it look clean. Legalizing incomes is of great importance as it allows
criminals to use the proceeds obtained through unlawful means without revealing its source.
The term “money laundering” was first used at the beginning of the twentieth century to
label the operations that in some way intended to legalize the income generated from illicit
activity, thereby facilitating their entry into the economy’s monetary flow (Naheem, 2016).
Organized criminal gangs were making a lot of money from extortion, prostitution,
gambling and bootlegging. Therefore, laundering became the perfect means of showing that
their sources of cash were legitimate. With the new age of technological advancements, it
was only a matter of time before criminals started using the internet for laundering purposes
(Leslie, 2014). The criminal practice of money laundering in cyberspace through online
transactions has been termed cyber-laundering. Individuals practicing money laundering
Journal of Money Laundering
Control
are continuously looking for new ways to avoid being detected by law enforcement, and the
Vol. 25 No. 2, 2022
pp. 330-344
internet has opened a plethora of opportunities for them. As of January 2021, there were 4.66
© Emerald Publishing Limited billion active internet users globally, making up 59.5% of the global population. Of this
1368-5201
DOI 10.1108/JMLC-04-2021-0035 number, approximately 92.6% (4.32 billion) are currently using mobile devices to access the
internet. Moreover, cybersecurity ventures expect international cybercrime costs to grow by Change of
15% annually over the next five years, reaching $10.5tn, up from $3tn in 2015 (Morgan, money
2021). This research is essential as it will enable a better comprehension of the change of
money laundering in the digital age and offer its comparisons and contrasts to traditional
laundering
methods of the vice.
3. Research methodology
3.1 Introduction
This section discusses the methodology applied in the current research in adherence to the
strict Covid-19 protocols currently enforced by the government. The procedures discussed
consist of the purpose of the method, the data collection tools, the research problem and the
process of interpreting and analyzing data. The ethical process is also included in the section
and how the study’s outcomes will be disseminated. The current investigation aims at
providing the field of research with exploratory and narrative perspectives on the change of
money laundering in the digital age. Therefore, the study applied the use of a qualitative
JMLC research design. Unlike quantitative approaches that use scientific data, qualitative
25,2 techniques are associated with the help of words. It is appropriate to collect and analyze
essential research data because the course emphasizes reality’s social construct (Maxwell,
2012). It also aims to explain how and why a specific phenomenon happened in a certain
way, enabling the researcher to access first-hand insights into the investigated
phenomenon’s social construct. As the research is exploratory, the qualitative research
338 design will allow the collected data to speak for itself.
3.2 Validity
In research, validity refers to how accurate the data collection tools were when gathering the
necessary data to fulfill the study’s requirements. Therefore, to ensure that validity is
observed, the investigation developed semi-structured interview questions based on the
study’s objectives. Construct validity was also applied, which helped establish the
inferences on the theoretical foundations of the paper (Notelaers and Van der Heijden, 2019).
This was ensured by providing an in-depth review and synthesis of the literature on the
change of money laundering in the digital age.
3.3 Reliability
In exploratory studies, reliability refers to the investigation’s soundness regarding the
appropriateness of the techniques used during the research and the integrity of the paper’s
final, conclusive remarks. The report accounted for and acknowledged the bias in the
applied sampling methods and provided countermeasures incorporated to reduce and
mitigate the bias to guarantee reliability in the study. Furthermore, the research also
ensured that the interpretation and analysis of the collected data were transparent and was
consistent with the findings by comparing them to those of other researchers in the field to
seek out the similarities and differences in their accounts regarding cyber laundering
processes (Noble and Smith, 2015).
3.7 Sampling
Based on the Covid-19 protocols, the researchers selected a sample size based on both
criminals’ and prevention experts’ proximity and availability on the matter under study. As
such, as the current research was qualitative, the paper used non-probability sampling
techniques. Moreover, to obtain an optimum sample size, the investigation uses purposive
sampling, which required selecting a sample size based on the researcher’s judgment while
subsequently putting considerations on the quality and purpose of the study (Etikan et al.,
2016). The sampling process also included respondents with more than five years of
experience in cyber laundering activities. It was based on their ability to provide the
investigation data (Alvi, 2016). However, purposive sampling also generated problems for
the research in several ways. First, the researcher is prone to bias as it depends on his/her
judgment. If the discretion on selecting the participants is lacking, the fundamental research
will be grounded as a failure and will not contribute to the field of the study. A qualitative
content analysis of 21 semi-structured online interviews with both criminals and prevention
experts and compliance officers in the UK led to the determination of concrete money
laundering methods involving the employment of online financial institutions and
companies in different economic sectors.
4. Data analysis
In this investigation, the semi-structured interview questions developed were centered on
answering the three research questions:
RQ1. How do criminals use the digital platforms in the different economic sectors to
launder illegally made funds?
RQ2. Are there any existing laws at the national and international level that have any
bearing on cyber laundering schemes?
RQ3. What legal measures can ensure the regulation of cyber laundering?
When conducting an investigation, a researcher must decide whether to use open or closed
interview questions and what it will examine in the research (Baggetta and Alexander,
2016). Different methods were used to develop the questions to inform the entire paper
better. The research aspects used to form the basis for the qualitative study included; cyber
laundering, how cyber laundering occurs and how the financial regulators can mitigate it.
The semi-structured interviews began with a list of preliminary questions to ensure that the
JMLC respondents felt comfortable participating in the entire data collection process. Afterward,
25,2 the study followed up with direct probing queries regarding money laundering in the digital
age. The study selected 30 individuals across the UK to participate in the research. Out of
this number, 21 participants completed the entire interview session, and therefore, their
knowledge and expertise were used. The majority of the individuals who responded to the
interview stated that they conducted their businesses mainly on the internet (90.5%). The
340 next question that was asked in the discussion was on the most popular laundering methods
in cybercrime. In total, 11 participants (52.3%) responded by stating that the most popular
process was through offshore accounts, followed by 4 (19%) who believed that the most
common techniques were through anonymous shell accounts. The rest were evenly divided
into money mules and unregulated financial services, as shown in the figure below
(Figure 1).
Finally, the participants were then asked about the best preventive mechanisms that
could be used by financial organizations to monitor their security systems effectively and
watch account activities for suspected individuals and organized crime syndicates. Six
participants (28.6%) responded by claiming that device identification was the most
appropriate incentive to be applied. In total, 7 (33.3%) responded by claiming biometrics
would drastically reduce the vice, while 4 (19%) suggested the alternate use of geographical
dispersion software. The other remaining recommended applying customer behavior
monitoring software (19%) (Figure 2).
5. Findings
With the rapid development in mobile technologies, the internet can now be accessed from
anywhere in the world, provided there are facilities necessary to achieve connectivity. Many
online channels of laundering illegal funds have ensured a shift in how cyber laundering is
managed. It is nearly impossible for a financial regulator to be omnipresent and detect every
transaction made by cybercriminals (Joveda et al., 2019). From the above interviews
conducted, it is evident that cyber laundering is linked to organized criminal syndicates.
These cybercriminals are popularly known to be scam artists who use the internet to
conduct their money laundering schemes. Moreover, there is a significant amount of money
circulating over the internet, and the proceeds of these crimes rarely leave the realm of the
internet. Cyber laundering can, therefore, be perceived as a viable means to an evil end.
However, it is important to note that even though cybercriminals undermine the state’s
authority and its financial institutions, it would be counterproductive for the state to
investigate the very foundations on which cyber laundering is built in a bid to mitigate the
12
10
4
Figure 1.
The most popular
2
money laundering
methods in 0
cybercrime
Offshore accounts Anonymous shell accounts Money mules Unregulated financial services
8
Change of
7 money
6 laundering
5
3 341
2
Figure 2.
1
Monitoring
0 suspicious financial
activities
device identification biometrics transaction velocity monitors geographical dispersion
practice. According to the analysis, the most common method for money laundering is
through the use of shell companies, which is usually designed to facilitate the layering of
illegal proceeds. These accounts are based offshore, complete with bank account details to
aid in the layering of funds. As such, a shell company acts as a component to facilitate
illegal; business transactions without having any major assets or operations. Currently,
some trends involve the creation and design of shell organizations on the internet. This is
advantageous to the criminals as the internet has boundless borders, and along with its
anonymity traits, it has opened a gateway for shell companies to launder illegal funds
(Sabella, 2019). Another clear difference that has emerged through this study regarding
money laundering in the digital age has to do with the evolution of the internet of things that
has revolutionized connectivity. Unlike in the traditional methods of money laundering
schemes where cybercriminals focused their efforts on private computers, cybercriminals
currently have mastered the art of infiltrating mobile systems to launder money through
unsuspecting mules. An average mobile phone user spends about 5 h using their devices,
with approximately 70% of the mobile devices lacking an anti-virus program installed
(Hamilton, 2019). Due to this technological ignorance, cybercriminals have opted to take the
path of least resistance. The paper further suggests that the digital currency’s mere
existence is a threat to the fight against cyber laundering schemes. Unlike the traditional
method where horse racing could be used to launder money, cryptocurrencies have
revolutionized how illegal money is transferred as it is more complex than the conventional
methods. Cybercriminals can access better privacy to obscure the money’s origin so that it
cannot be traced back to them by the authorities. The process is accomplished by placing
the dirty money into the cryptocurrency system that converts fiat money with
cryptocurrency through a bank account. Cybercriminals create several layers to achieve
maximum anonymity by exchanging major currencies with altcoins. As can be observed,
this is far much more complex than the traditional methods of laundering proceeds. As
described by one of the interviewees in the study, the advent of video games also reveals
how the methods of money laundering have changed. As a former employee of Sony Online
Entertainment, the participant recalls the company going through a case where it detected
one of its users is moving large amounts of funds from an account in the USA to the one in
Russia through online games with the mode of purchasing multiple virtual items that are
rare and difficult to obtain by users. Additionally, equity crowdfunding platforms are easy
targets as they can act as tools to facilitate money laundering activities. For example, the
distributor of an illegal product such as unregistered firearms and narcotics can develop a
JMLC fake company and market that organizations’ securities on an equity platform. To date,
25,2 money laundering activities have devastating impacts on the state and businesses’
economy. For example, according to the International monetary fund, dirty money
legalization affects major changes in the demand for money, volatility of international
capital flows and increases distrust of banks. To sum up, digital technology has opened up
opportunities for cybercriminals and other organized criminal syndicates to conduct
342 financial crimes. However, this technology can also gain leverage against them and mitigate
the money laundering schemes. Artificial intelligence is the best method of dealing with
financial crimes in the digital era, including cyber laundering. The AML solution that uses
artificial intelligence will greatly help financial analysts automate the search process, map
and link an individual’s or company’s suspicious activities in the long run.
References
Alsaibai, H., Waheed, S., Alaali, F. and Wadi, R.A. (2020), “Online fraud and money laundry in E-
Commerce”, ECCWS 2020 20th European Conference on Cyber Warfare and Security,
Academic Conferences and publishing limited, p. 13.
Alvi, M. (2016), “A manual for selecting sampling techniques in research”, retrived from Munich
Personal RePEc Archive: https://mpra.ub.uni-muenchen.de/id/eprint/70218
Andreani, S., Kalchschmidt, M., Pinto, R. and Sayegh, A. (2019), “Reframing technologically enhanced
urban scenarios: a design research model towards human-centered smart cities”, Technological
Forecasting and Social Change, Vol. 142, pp. 15-25.
Aravazhi, M.S. (2020), “Understanding cyber crime and cyber laundering: threat and solution”, EPRA
International Journal of Research and Development (IJRD), Vol. 5 No. 1, pp. 34-38.
Axelrod, R.M. (2017), “Criminality and suspicious activity reports”, Journal of Financial Crime, Vol. 24 No. 3.
Baggetta, P. and Alexander, P.A. (2016), “Conceptualization and operationalization of executive
function”, Mind Brain and Education, Vol. 10 No. 1, pp. 10-33.
Banks, J. (2016), Online Gambling and Crime: Causes, Controls and Controversies, Routledge.
Boere, N. (2020), “Online gambling as a money laundering method”, available at: www.amlc.eu/online-
gambling-as-a-money-laundering-method/ (accessed 3 April 2021).
Chattopadhyay, K. (2018), “Transaction laundering; a growing threat in the payments industry”, available Change of
at: www.infosys.com/industries/financial-services/documents/transaction-laundering.pdf
money
Elliptic (2019), “Bitcoin money laundering: how criminals use crypto”, available at: www.elliptic.co/
blog/bitcoin-money-laundering (accessed 2 April 2021).
laundering
Etikan, I., Musa, S.A. and Alkassim, R.S. (2016), “Comparison of convenience sampling and purposive
sampling”, American Journal of Theoretical and Applied Statistics, Vol. 5 No. 1, pp. 1-4.
Financial Action Task Force (2019), “Financial action task force”, fatf-gafi. 343
Frechtling, D. (2017), “Recognising and thwarting transaction and payment laundering”, Journal of
Payments Strategy and Systems, Vol. 11 No. 2, pp. 110-120.
Hamilton, P. (2019), “Money laundering in a digital age – the perfect storm”, available at: https://aml-
knowledge-centre.org/money-laundering-in-a-digital-age/ (accessed 4 April 2021).
Hughes, M. (2020), “How money laundering has changed in the digital age”, available at: https://tbtech.
co/how-money-laundering-has-changed-in-the-digital-age/ (accessed 4 April 2021).
Joveda, N., Khan, M.T., Pathak, A. and Chattogram, B. (2019), “Cyber laundering: a threat to banking
industries in bangladesh: in quest of effective legal framework and cyber security of financial
information”, International Journal of Economics and Finance, Vol. 11 No. 10, pp. 54-65.
Karapatakis, A. (2019), “Virtual worlds and money laundering under E.U. Law: the inadequacy of the
existing legal framework and the challenges of regulation”, New Journal of European Criminal
Law, Vol. 10 No. 2, pp. 128-150.
Leslie, D.A. (2014), “Introduction, money laundering and cyber crime”, Legal Principles for Combatting
Cyberlaundering, pp. 1-54, doi: 10.1007/978-3-319-06416-1_1.
Li, X., Liu, S., Li, Z., Han, X., Shi, C., Hooi, B., Huang, H. and Cheng, X. (2020), “Flowscope: spotting
money laundering based on graphs”, Proceedings of the AAAI Conference on Artificial
Intelligence, Vol. 34 No. 4, pp. 4731-4738.
Liu, L. (2016), “Using generic inductive approach in qualitative educational research: a case study
analysis”, Journal of Education and Learning, Vol. 5 No. 2, pp. 129-135.
Loh, X. (2020), “Suspicious activity reports (SARs) regime: reforming institutional culture”, Journal of
Money Laundering Control, ahead-of-print.
Mabunda, S. (2018), “Cyberlaundering and the future of corruption in america”, JACL, Vol. 2, p. 214.
Maxwell, J.A. (2012), Qualitative Research Design: An Interactive Approach (Vol. 41), Sage Publications,
Thousand Oaks, CA.
Metev, D. (2021), “How much time do people spend on social media in 2020?”, available at: https://review42.com/
resources/how-much-time-do-people-spend-on-social-media/#::text=Internet%20users%20spend%20
an%20average,to%20be%20on%20social%20media (accessed 3 April 2021).
Morgan, S. (2021), “Cybercrime to cost the world $10.5 trillion annually by 2025”, available at: https://
cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/ (accessed 1 April 2021).
Naheem, M.A. (2016), “Money laundering: a primer for banking staff”, International Journal of
Disclosure and Governance, Vol. 13 No. 2, pp. 135-156.
Naheem, M.A. (2018), “TBML suspicious activity reports–a financial intelligence unit perspective”,
Journal of Financial Crime, Vol. 25 No. 3, pp. 721-733.
Nobanee, H. and Ellili, N. (2018), “Anti-money laundering disclosures and banks’ performance”, Journal
of Financial Crime, Vol. 25 No. 1, pp. 95-108.
Noble, H. and Smith, J. (2015), “Issues of validity and reliability in qualitative research”, Evidence Based
Nursing, Vol. 18 No. 2, pp. 34-35.
Notelaers, G. and Van der Heijden, B.I. (2019), Construct Validity in Workplace Bullying and
Harassment Research, in D Cruz, P., Noronha, E. and Notelaers, G. (Eds), Concepts, Approaches
and Methods. Handbooks of Workplace Bullying, Emotional Abuse and Harassment, Vol. 1.
JMLC Nouman, M., Anderson, A. and Abdullah, F. (2018), “Conceptualizing and rationalizing opportunities: Inductive
reasoning and the creation of a new enterprise”, Abasyn University Journal of Social Sciences.
25,2
Orcutt, M. (2020), “Criminals laundered $2.8 billion in 2019 using CRYPTO exchanges, finds a new
analysis”, available at: www.technologyreview.com/2020/01/16/130843/cryptocurrency-money-
laundering-exchanges/ (accessed 2 April 2021).
Orsolini, L., Papanti, D., Corkery, J. and Schifano, F. (2017), “An insight into the deep web; why it
matters for addiction psychiatry?”, Human Psychopharmacology: Clinical and Experimental,
344 Vol. 32 No. 3, p. e2573.
Pine, B.G. (2019), “Dynamic regulation readiness–implementing the 5th anti-money laundering
directive”, The PayTech Book: The Payment Technology Handbook for Investors,
Entrepreneurs and FinTech Visionaries, pp. 97-99.
Rahman, M.S. (2017), “The advantages and disadvantages of using qualitative and quantitative
approaches and methods in language and testing and assessment and research: a literature
review”, Journal of Education and Learning, Vol. 6 No. 1, pp. 102-112.
Sabella, P.M. (2019), “The use of criptocurrencies in money laundering and terrorist financing.
Description of the phenomenon and of E.U. regulation strategies development”, Gpadj b
cjdpeveyyaz ýrjyjvbra: yjdse dspjds b gepcgernbds, pp. 355-370.
Sarda, T., Natale, S., Sotirakopoulos, N. and Monaghan, M. (2019), “Understanding online anonymity”,
Media, Culture and Society, Vol. 41 No. 4, pp. 557-564.
Sikora, A. (2020), “Social media influencers introduce new AML risks to banks”, available at: https://
kaufmanrossin.com/blog/social-media-influencers-introduce-new-aml-risks-to-banks (accessed 3
April 2021).
Sutton, J. and Austin, Z. (2015), “Qualitative research: data collection, analysis, and management”, The
Canadian Journal of Hospital Pharmacy, Vol. 68 No. 3, p. 226.
Tai, C.H. and Kan, T.J. (2019), “Identifying money laundering accounts”, 2019 International Conference
on System Science and Engineering (ICSSE), IEEE, pp. 379-382.
Teichmann, F. and Falker, M.C. (2020), “Money laundering through cryptocurrencies”, 13th
International Scientific and Practical Conference-Artificial Intelligence Anthropogenic nature Vs
Social Origin, Springer, Cham, pp. 500-511.
Varshney, A. (2020), “More than half of all crypto exchanges have weak or no I.D. verification”,
available at: https://cointelegraph.com/news/more-than-half-of-all-crypto-exchanges-have-weak-
or-no-id-verification (accessed 2 April 2021).
Yantis, B., Attia, M. and Lethouris, G. (2018), “Money laundering”, American Criminal Law Review,
Vol. 55, p. 1469.
Zerafa, A., Banks, J. and Waters, J. (2021), “The challenges of countering fraud in malta’s remote
gaming industry”, Journal of Financial Crime, ahead-of-print.
Further reading
Etikan, I. and Bala, K. (2017), “Sampling and sampling methods”, Biometrics and Biostatistics
International Journal, Vol. 5 No. 6, p. 00149.
Corresponding author
Christoph Wronka can be contacted at: cwronka@deloitte.de
For instructions on how to order reprints of this article, please visit our website:
www.emeraldgrouppublishing.com/licensing/reprints.htm
Or contact us for further details: permissions@emeraldinsight.com