SlideShare a Scribd company logo
1 of 35
Download to read offline
Blanchiment d’argent : les schémas d’aujourd’hui
      Mercredi 21 février 2007, Genève, Hôtel de la Paix




Money Laundering via The Internet:
       The Used Methods



         dr Wojciech Filipkowski
         School of Law
         University of Bialystok
         Poland
„The online revolution will undoubtedly be of
    major import on money laundering.”
„Many transfers are now instantaneous form
    account to account, and the trick is to
    do it without leaving a trace or conceal
    the transfer under legitimate trading
    labels, all of which is easy to do.”
Victor T Le Vine, a professor of political
    science at Washington University in St Louis,
    Missouri (2000)


                                              2
„Development in electronic payment as an
    everyday means of settlement will
    usher in a whole new epoch of global
    liquidity for ill-gotten gains.” (2000)
„There is an enormous degree of hype being
    generated on this issue of
    cyberlaundering. It makes great copy,
    but it really has not yet achieved the
    level of sophistication that some
    commentators would have us believe”
Rowan Bosworth-Davies former British Fraud
    Squad officer (2001)                3
„The study found there is a legitimate market
    demand served by each of the payment
    methods analysed, yet potential money
    laundering and terrorist financing
    vulnerabilities do exist. Specifically,
    offshore providers of new payment
    methods may pose additional money
    laundering and terrorist financing risks
    compared with service providers
    operating within a jurisdiction.”
Financial Action Task Force, Report on New
    Payment Methods, 13 December 2006, Paris,
                                           4
    p. 18. (2006)
Agenda:
I. Characteristic of Internet – What attracts
     launderers?

II. Financial services available on-line
      through Internet

III. How Internet can be abused?

IV. Preventative measures – acting in
     accordance with FATF
     Recommendations
                                            5
What attracts launderers?
•    Anonymity: fake identities, spoofing IP
     address, modem connection, Wi-Fi
     technology, pre-paid phones, encryption
•    No Face-To-Face transactions
•    Speed – instant transactions
•    Globalization process: free movement
     of goods, services & people and new
     payment technologies
•    Cross border activity: involves several
     jurisdiction, mutual legal assistance
                                           6
     treaties issues
On-line financial services


•   Internet payment services (incl. mobile
    payments, micro-payments or digital
    precious metals)
•   Stored value cards (smart cards, e-
    purse)
•   On-line banking


                                       7
Cyberlaundering:


The process of legalization of ill-gotten gains
    using services available on the Internet
    (in the cyberspace) as a :
•   reason (a legal title) to do transaction
    (transfer of funds) or
•   tool to do transaction (transfer of funds)


                                           8
The Idea #1:

                                         BANK 2
           Service                                Bank Account B




                       Legal Title
                       for Transaction
Internet




                     Internet            BANK 1
                                                  Bank Account A

                                                               9
The Idea #2.a:

           BANK 2
Internet            Bank Account B




Internet   BANK 1
                    Bank Account A

                                10
The Idea #2.b:

Internet



                  Bank Account B
           BANK



                  Bank Account A




Internet



                                   11
How Internet can be abused?

               Stages of ML:
•   Placement – using ATM or ill-gotten
    gains derived from cybercrimes
•   Layering – wide range of services
    available on the Internet
•   Integration – i.a. transfer-pricing, on-
    line gambling („winning ticket”), front
    companies, loan-back

                                           12
The used methods?
Including:
•    e-banking and other on-line services
•    use of credit cards in the Internet
•    pre-paid cards
•    on-line gambling and betting – sport
     wagering
•    on-line auctions
•    mobile payments
•    stock exchange
•    digital precious metal
•    virtual money laundering
                                            13
On-Line Services:
           BANK A                  Transfer of Funds
Deposits
                                         Title

   Internet


   Opening an Account
   Access&Payment


                                                  BANK B

              Internet


                         Service                       Off-shore
                                                       Financial
                                                           14
                                                        Center
Credit cards:
                       BANK A                    Transfer of Funds
Opening an Account&Deposits

                                                       Title
              Issuing
        e-Card/Charge Card      Financial
                              Intermediary


                Access&Payment


                                                                BANK B

                         Internet


                                       Service                       Off-shore
                                                                     Financial
                                                                         15
                                                                      Center
Pre-paid cards:
                                                     Transfer of Funds
                       BANK A       Internet
Opening an Account&Deposits




                             Company
                       issuing pre-paid cards BANK B




                                                   Issuing
           Another                             A pre-paid card
           country




                                                                         16
On-line Gambling:
                                    Transfer of Funds
                       BANK A
Opening an Account&Deposits



              Issuing
        e-Card/Charge Card                  Financial
                                          Intermediary


                Access&Buying Chips


                                                 BANK B   BANK C

                         Internet


                                            Gambling       Off-shore
                                                           Financial
                                                               17
                                                            Center
On-line Auction Sale #1:

                               BANK 2
                                        Bank Account B
          Internet


Selling
             On-Line
            Auctions
            Company
                       Title

Buying


                               BANK 1
          Internet
                                        Bank Account A

                                                    18
On-line Auction Sale #2:

                                        BANK 2
                                                 Bank Account B
          Internet


Selling
                               BANK 3
            On-Line Auctions&
          Financial Intermediary
                Company
                             Bank Account C
Buying               Title

                                        BANK 1
          Internet
                                                 Bank Account A

                                                             19
On-line Auction Sale #3:

                                            BANK 2
                                                     Bank Account B
          Internet
                               Financial
Selling                      Intermediary
                                 BANK 3
             On-Line
            Auctions
            Company
                             Bank Account C
Buying               Title


                                            BANK 1
          Internet
                                                     Bank Account A

                                                                 20
Mobile-payments:
           Phone Bill
           Charging Pre-Paid Phone          BANK 4
                             Mobile Phone
                              Operator
  BANK 1


             Premium
            SMS, WAP
 Mobile     or Internet                          BANK 3
Network
                                            Service B


            Internet
                                                 BANK 2
                                            Service A
                                                        21
Stock exchange:
                     BANK A

Opening an Account                    Brokerage      Transfer of Funds
    &Deposits                         Company           Settlements

                                            BANK B
                     Internet




              Access&Trading Stocks                           BANK C


                                   Stock
                                 Exchange


                                                                   22
Digital Precious Metal:

Transfering ownership
       of DPM
                                   Openning an Account
  DPM
Company
                                     Title
Openning an Account                                          BANK B
                                 BANK C      Selling
                                              DPM




                                       Buying derivatives
                        Buying
                         DPM                         Gold
                 BANK A                             Market

                                                                23
Virtual Money Laundering:
          VR

     Trading              Openning an Account
Virtual Currency

                                 Title
                                                BANK B
                        BANK C




Openning an Account       Buying&Exchanging
                           Virtual Currency



               BANK A

                                                   24
FATF’s cases:

             Type of on-line service   Number of cases
1.   Pre-paid cards (open system)            3
2.   Pre-paid cards (closed system)          2
3.   Electronic purse                        0
4.   Mobile payments                         0
5.   Internet payment systems                0
6.   Digital precious metals                 3


                                                  25
Polish experiences:
•   Opening accounts with Internet access or getting one
    for existing accounts (so called „sleeping account”).
•   Smurfing – many people open accounts (for
    commission) and then hand it over to launderer or
    they receive money (usually from abroad), withdraw
    them and hand it over to launderer – rather small
    amounts of money (up to few thousands PLN).
•   Collecting accounts by launderers.
•   Banks usually inform the correspondent bank about
    the suspicious transactions.
•   Computer crimes or illegal on-line gambling abroad –
    as predicate offences – e.g. phishing attacks, identity
    theft.
•   Asymmetric regulations concerning some of the
    offences – pornography or on-line gambling – how
    prosecute them?                                   26
Preventative measures:
          Handbook on Inter Banking (1999):
•   Unusual requests, timing of transactions or e-mail
    formats.
•   Anomalies in the types, volumes or values of
    transactions.
•   A customer who submits an incomplete on-line
    account application and then refuses to respond to a
    request for more information.
•   An on-line account application with conflicting
    information such as a physical address that does not
    match the location of the given e-mail address.
•   On-line applications for multiple accounts with no
    apparent reason to do so.
•   A customer who uses the bank’s on-line transaction
    services to send repeated inter-bank wire transfers
    between several accounts with no apparent reason to
    do so.                                          27
Preventative measures:
    Monitoring Cybercrimes According to FATF:
•     Require ISPs to maintain reliable subscriber
      registers with appropriate identification
      information.
•     Require ISPs to establish log files with traffic
      data relating Internet-protocol (IP) number to
      subscriber and to telephone number used in
      the connection.
•     Require that this information be maintained for
      a reasonable period (possibly 6 to 12 months)
      – data retention.
•     Ensure that this information may be made
      available internationally in a timely manner
      when conducting criminal investigations. 28
Preventative measures:
           FATF 40 Recommendations:
5# Recommendation:
Financial institutions should not keep anonymous
     accounts or accounts in obviously fictitious
     names.


8# Recommendation:
Financial institutions should pay special attention to
     any ML threats that may arise from
     developing technologies that may favour
     anonymity, and take measures, if needed, to
     prevent their use in ML schemes.
                                                 29
Preventative measures:
          FATF 40 Recommendations:
21# Recommendation:
To close off business relationships and
     transactions with persons, including
     companies and financial institutions, from
     NCCT.

23# Recommendation:
At a minimum, businesses providing a service of
     money or value transfer, or money or currency
     changing should be licensed or registered,
     and subject to effective systems for monitoring
     and ensuring compliance with national
     requirements to combat ML and TF.         30
Preventative measures:
      FATF 9 Special Recommendations:
Special Recommendation VI:
Each country should take measures to ensure that
    persons or legal entities, including agents,
    that provide a service for the transmission of
    money or value, including transmission
    through an informal money or value transfer
    system or network, should be licensed or
    registered and subject to all the FATF
    Recommendations that apply to banks and
    non-bank financial institutions.

                                              31
Preventative measures:
      FATF 9 Special Recommendations:
Special Recommendation VII:
Countries should take measures to require financial
    institutions, including money remitters, to
    include accurate and meaningful originator
    information (name, address and account
    number) on funds transfers and related
    messages that are sent, and the information
    should remain with the transfer or related
    message through the payment chain.


                                              32
Preventative measures:
                   EU 3rd Directive:
It gives the possibility to EU countries to allow e-
      money issuers not to apply customer due
      diligence (CDD) in respect of e-money.
Simplified CDD applies to other products or
      transactions carrying a low risk of money
      laundering or terrorist financing.
Simplified CDD shall not apply in the case where
      there is information available that suggests a
      product is subject to a high risk of being
      misused for money laundering or terrorist
      financing purposes.
                                                33
Thank You for Your attention …


Dr Wojciech Filipkowski
School of Law
University of Bialystok, Poland


 fwojtek@uwb.edu.pl




                                             34
No parts of this paper
           have the aim to abet or help
          somebody to commit a crime.
The presented methods serves only as an examples
        to make a criminological analysis
           of different modus operandi.




                                             35

More Related Content

What's hot

management issues in online banking
management issues in online bankingmanagement issues in online banking
management issues in online bankingRanjeet Patel
 
The end of passwords: Two-factor-authentication and biometrics are coming 2019
The end of passwords: Two-factor-authentication and biometrics are coming 2019The end of passwords: Two-factor-authentication and biometrics are coming 2019
The end of passwords: Two-factor-authentication and biometrics are coming 2019JanSobczak5
 
All сrypto-friendly neobanks: 8 ICO-backed new players
All сrypto-friendly neobanks: 8 ICO-backed new playersAll сrypto-friendly neobanks: 8 ICO-backed new players
All сrypto-friendly neobanks: 8 ICO-backed new playersVladislav Solodkiy
 
Blockchain as a durable medium
Blockchain as a durable mediumBlockchain as a durable medium
Blockchain as a durable mediumBillon Group
 
11:FS whitepaper on Billon
11:FS whitepaper on Billon11:FS whitepaper on Billon
11:FS whitepaper on BillonBillon Group
 
Replace The Current Antiquated Credit Card System
Replace The Current Antiquated Credit Card SystemReplace The Current Antiquated Credit Card System
Replace The Current Antiquated Credit Card SystemWarren Smith
 
Global Identity Fraud Report 2020
Global Identity Fraud Report 2020Global Identity Fraud Report 2020
Global Identity Fraud Report 2020Shufti Pro
 
ICO Survival Guide: Everything you need to know about it
ICO Survival Guide: Everything you need to know about itICO Survival Guide: Everything you need to know about it
ICO Survival Guide: Everything you need to know about itStefan Chun Yin
 
Digits ico-whitepaper-1v8c
Digits ico-whitepaper-1v8cDigits ico-whitepaper-1v8c
Digits ico-whitepaper-1v8cEtheralabs
 
eCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers PresentationeCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers PresentationeCommerce Merchants
 
The 5 Biggest Blockchain And Distributed Ledger Trends Everyone Should Be Wat...
The 5 Biggest Blockchain And Distributed Ledger Trends Everyone Should Be Wat...The 5 Biggest Blockchain And Distributed Ledger Trends Everyone Should Be Wat...
The 5 Biggest Blockchain And Distributed Ledger Trends Everyone Should Be Wat...Bernard Marr
 
BITCOIN: A 21ST CENTURY CURRENCY EXPLAINED BY A WALL STREET VETERAN
BITCOIN: A 21ST CENTURY CURRENCY EXPLAINED BY A WALL STREET VETERANBITCOIN: A 21ST CENTURY CURRENCY EXPLAINED BY A WALL STREET VETERAN
BITCOIN: A 21ST CENTURY CURRENCY EXPLAINED BY A WALL STREET VETERANSteven Rhyner
 
Blockchain tsunami hits the Internet of Luxury (IoL)
Blockchain tsunami hits the Internet of Luxury (IoL)Blockchain tsunami hits the Internet of Luxury (IoL)
Blockchain tsunami hits the Internet of Luxury (IoL)AndrewGrantSuper
 

What's hot (20)

Presentation joys en (1)
Presentation joys en (1)Presentation joys en (1)
Presentation joys en (1)
 
management issues in online banking
management issues in online bankingmanagement issues in online banking
management issues in online banking
 
E payment
E paymentE payment
E payment
 
PCM_MA15_BitcoinFeature
PCM_MA15_BitcoinFeaturePCM_MA15_BitcoinFeature
PCM_MA15_BitcoinFeature
 
The end of passwords: Two-factor-authentication and biometrics are coming 2019
The end of passwords: Two-factor-authentication and biometrics are coming 2019The end of passwords: Two-factor-authentication and biometrics are coming 2019
The end of passwords: Two-factor-authentication and biometrics are coming 2019
 
All сrypto-friendly neobanks: 8 ICO-backed new players
All сrypto-friendly neobanks: 8 ICO-backed new playersAll сrypto-friendly neobanks: 8 ICO-backed new players
All сrypto-friendly neobanks: 8 ICO-backed new players
 
Blockchain as a durable medium
Blockchain as a durable mediumBlockchain as a durable medium
Blockchain as a durable medium
 
Per.fin.7.03 p ptb
Per.fin.7.03 p ptbPer.fin.7.03 p ptb
Per.fin.7.03 p ptb
 
11:FS whitepaper on Billon
11:FS whitepaper on Billon11:FS whitepaper on Billon
11:FS whitepaper on Billon
 
Replace The Current Antiquated Credit Card System
Replace The Current Antiquated Credit Card SystemReplace The Current Antiquated Credit Card System
Replace The Current Antiquated Credit Card System
 
Presentation joys en 2020
Presentation joys en 2020Presentation joys en 2020
Presentation joys en 2020
 
21 ijcse-01230
21 ijcse-0123021 ijcse-01230
21 ijcse-01230
 
Global Identity Fraud Report 2020
Global Identity Fraud Report 2020Global Identity Fraud Report 2020
Global Identity Fraud Report 2020
 
ICO Survival Guide: Everything you need to know about it
ICO Survival Guide: Everything you need to know about itICO Survival Guide: Everything you need to know about it
ICO Survival Guide: Everything you need to know about it
 
Digits ico-whitepaper-1v8c
Digits ico-whitepaper-1v8cDigits ico-whitepaper-1v8c
Digits ico-whitepaper-1v8c
 
eCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers PresentationeCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers Presentation
 
The 5 Biggest Blockchain And Distributed Ledger Trends Everyone Should Be Wat...
The 5 Biggest Blockchain And Distributed Ledger Trends Everyone Should Be Wat...The 5 Biggest Blockchain And Distributed Ledger Trends Everyone Should Be Wat...
The 5 Biggest Blockchain And Distributed Ledger Trends Everyone Should Be Wat...
 
BITCOIN: A 21ST CENTURY CURRENCY EXPLAINED BY A WALL STREET VETERAN
BITCOIN: A 21ST CENTURY CURRENCY EXPLAINED BY A WALL STREET VETERANBITCOIN: A 21ST CENTURY CURRENCY EXPLAINED BY A WALL STREET VETERAN
BITCOIN: A 21ST CENTURY CURRENCY EXPLAINED BY A WALL STREET VETERAN
 
E banking security
E banking securityE banking security
E banking security
 
Blockchain tsunami hits the Internet of Luxury (IoL)
Blockchain tsunami hits the Internet of Luxury (IoL)Blockchain tsunami hits the Internet of Luxury (IoL)
Blockchain tsunami hits the Internet of Luxury (IoL)
 

Viewers also liked

Internal architecture of isp 54
Internal architecture of isp  54Internal architecture of isp  54
Internal architecture of isp 54myrajendra
 
E Payment System Introduction Of Large Value Payment System
E Payment System Introduction Of Large Value Payment SystemE Payment System Introduction Of Large Value Payment System
E Payment System Introduction Of Large Value Payment SystemHai Vu
 
Internet architecture
Internet architectureInternet architecture
Internet architectureNaman Rastogi
 
Electronic Payment System
Electronic Payment SystemElectronic Payment System
Electronic Payment SystemRitesh Goyal
 
Anti money laundering
Anti money launderingAnti money laundering
Anti money launderingUttma Shukla
 
Payment and Settlement Systems(SWIFT,NEFT and Securities Cycle)
Payment and Settlement Systems(SWIFT,NEFT and Securities Cycle)Payment and Settlement Systems(SWIFT,NEFT and Securities Cycle)
Payment and Settlement Systems(SWIFT,NEFT and Securities Cycle)Savita Marwal
 

Viewers also liked (7)

Internal architecture of isp 54
Internal architecture of isp  54Internal architecture of isp  54
Internal architecture of isp 54
 
E Payment System Introduction Of Large Value Payment System
E Payment System Introduction Of Large Value Payment SystemE Payment System Introduction Of Large Value Payment System
E Payment System Introduction Of Large Value Payment System
 
Payment systems
Payment systemsPayment systems
Payment systems
 
Internet architecture
Internet architectureInternet architecture
Internet architecture
 
Electronic Payment System
Electronic Payment SystemElectronic Payment System
Electronic Payment System
 
Anti money laundering
Anti money launderingAnti money laundering
Anti money laundering
 
Payment and Settlement Systems(SWIFT,NEFT and Securities Cycle)
Payment and Settlement Systems(SWIFT,NEFT and Securities Cycle)Payment and Settlement Systems(SWIFT,NEFT and Securities Cycle)
Payment and Settlement Systems(SWIFT,NEFT and Securities Cycle)
 

Similar to Cyberlaundering

E banking by sanjeev kumar chaswal [compatibility mode]
E banking by sanjeev kumar chaswal [compatibility mode]E banking by sanjeev kumar chaswal [compatibility mode]
E banking by sanjeev kumar chaswal [compatibility mode]sanjeev kumar chaswal
 
Electronic and mobile banking
Electronic and mobile bankingElectronic and mobile banking
Electronic and mobile bankingBilal Malick
 
Chapter commercial banks b.v.raghunandan 2
Chapter commercial banks b.v.raghunandan 2Chapter commercial banks b.v.raghunandan 2
Chapter commercial banks b.v.raghunandan 2SVS College
 
Paypal: e-commerce payments
Paypal: e-commerce paymentsPaypal: e-commerce payments
Paypal: e-commerce paymentsScreen Pages
 
Bitcoin in mena market
Bitcoin in mena marketBitcoin in mena market
Bitcoin in mena marketteam-abr
 
Understanding Dynamic Chinese Online Payments Market
Understanding Dynamic Chinese Online Payments MarketUnderstanding Dynamic Chinese Online Payments Market
Understanding Dynamic Chinese Online Payments MarketChristopher Uriarte
 
Internet banking PPT PRESENTATION
Internet banking PPT PRESENTATION   Internet banking PPT PRESENTATION
Internet banking PPT PRESENTATION jaldumanohar manohar
 
PayPal Presentation - Finance4SUB Week
PayPal Presentation - Finance4SUB WeekPayPal Presentation - Finance4SUB Week
PayPal Presentation - Finance4SUB WeekStartUpBritain
 
CURRENT TREND IN INTERNET BANKING (SUBJECT -ENGINEERING ECONOMICS AND MANAG...
CURRENT TREND  IN INTERNET BANKING (SUBJECT -ENGINEERING  ECONOMICS AND MANAG...CURRENT TREND  IN INTERNET BANKING (SUBJECT -ENGINEERING  ECONOMICS AND MANAG...
CURRENT TREND IN INTERNET BANKING (SUBJECT -ENGINEERING ECONOMICS AND MANAG...Vraj Patel
 
Service Management Digital Services
Service Management Digital ServicesService Management Digital Services
Service Management Digital ServicesSOMASUNDARAM T
 
Strong Authentication for Payments
Strong Authentication for PaymentsStrong Authentication for Payments
Strong Authentication for PaymentsSrivatsan Srinivasan
 
Internet banking - College Project
Internet banking - College ProjectInternet banking - College Project
Internet banking - College ProjectSheril Daniel
 
The internet banking journey in india
The internet banking journey in indiaThe internet banking journey in india
The internet banking journey in indiaMohit Negi
 
Μάνος Μακρομάλλης, 7th Digital Banking Forum
Μάνος Μακρομάλλης, 7th Digital Banking ForumΜάνος Μακρομάλλης, 7th Digital Banking Forum
Μάνος Μακρομάλλης, 7th Digital Banking ForumStarttech Ventures
 
121010_Mobile Banking & Payments for Emerging Asia Summit 2012_Acceptance & A...
121010_Mobile Banking & Payments for Emerging Asia Summit 2012_Acceptance & A...121010_Mobile Banking & Payments for Emerging Asia Summit 2012_Acceptance & A...
121010_Mobile Banking & Payments for Emerging Asia Summit 2012_Acceptance & A...spirecorporate
 
Leveraging mobile money to increase access to banking services
Leveraging mobile money to increase access to banking servicesLeveraging mobile money to increase access to banking services
Leveraging mobile money to increase access to banking servicesJohn Owens
 

Similar to Cyberlaundering (20)

E banking by sanjeev kumar chaswal [compatibility mode]
E banking by sanjeev kumar chaswal [compatibility mode]E banking by sanjeev kumar chaswal [compatibility mode]
E banking by sanjeev kumar chaswal [compatibility mode]
 
Electronic and mobile banking
Electronic and mobile bankingElectronic and mobile banking
Electronic and mobile banking
 
Banking
BankingBanking
Banking
 
Chapter commercial banks b.v.raghunandan 2
Chapter commercial banks b.v.raghunandan 2Chapter commercial banks b.v.raghunandan 2
Chapter commercial banks b.v.raghunandan 2
 
Paypal: e-commerce payments
Paypal: e-commerce paymentsPaypal: e-commerce payments
Paypal: e-commerce payments
 
Bitcoin in mena market
Bitcoin in mena marketBitcoin in mena market
Bitcoin in mena market
 
Digital banking
Digital banking Digital banking
Digital banking
 
Online banking||
Online banking||Online banking||
Online banking||
 
Understanding Dynamic Chinese Online Payments Market
Understanding Dynamic Chinese Online Payments MarketUnderstanding Dynamic Chinese Online Payments Market
Understanding Dynamic Chinese Online Payments Market
 
Internet banking PPT PRESENTATION
Internet banking PPT PRESENTATION   Internet banking PPT PRESENTATION
Internet banking PPT PRESENTATION
 
PayPal Presentation - Finance4SUB Week
PayPal Presentation - Finance4SUB WeekPayPal Presentation - Finance4SUB Week
PayPal Presentation - Finance4SUB Week
 
CURRENT TREND IN INTERNET BANKING (SUBJECT -ENGINEERING ECONOMICS AND MANAG...
CURRENT TREND  IN INTERNET BANKING (SUBJECT -ENGINEERING  ECONOMICS AND MANAG...CURRENT TREND  IN INTERNET BANKING (SUBJECT -ENGINEERING  ECONOMICS AND MANAG...
CURRENT TREND IN INTERNET BANKING (SUBJECT -ENGINEERING ECONOMICS AND MANAG...
 
E banking in india
E banking in indiaE banking in india
E banking in india
 
Service Management Digital Services
Service Management Digital ServicesService Management Digital Services
Service Management Digital Services
 
Strong Authentication for Payments
Strong Authentication for PaymentsStrong Authentication for Payments
Strong Authentication for Payments
 
Internet banking - College Project
Internet banking - College ProjectInternet banking - College Project
Internet banking - College Project
 
The internet banking journey in india
The internet banking journey in indiaThe internet banking journey in india
The internet banking journey in india
 
Μάνος Μακρομάλλης, 7th Digital Banking Forum
Μάνος Μακρομάλλης, 7th Digital Banking ForumΜάνος Μακρομάλλης, 7th Digital Banking Forum
Μάνος Μακρομάλλης, 7th Digital Banking Forum
 
121010_Mobile Banking & Payments for Emerging Asia Summit 2012_Acceptance & A...
121010_Mobile Banking & Payments for Emerging Asia Summit 2012_Acceptance & A...121010_Mobile Banking & Payments for Emerging Asia Summit 2012_Acceptance & A...
121010_Mobile Banking & Payments for Emerging Asia Summit 2012_Acceptance & A...
 
Leveraging mobile money to increase access to banking services
Leveraging mobile money to increase access to banking servicesLeveraging mobile money to increase access to banking services
Leveraging mobile money to increase access to banking services
 

More from Wojciech Filipkowski

Kryminalistyczne apskety wykorzystania technologii data mining w walce z cybe...
Kryminalistyczne apskety wykorzystania technologii data mining w walce z cybe...Kryminalistyczne apskety wykorzystania technologii data mining w walce z cybe...
Kryminalistyczne apskety wykorzystania technologii data mining w walce z cybe...Wojciech Filipkowski
 
Wybrane zagadnienia prawne i kryminologiczne związane z rozwojem technologii
Wybrane zagadnienia prawne i kryminologiczne związane z rozwojem technologiiWybrane zagadnienia prawne i kryminologiczne związane z rozwojem technologii
Wybrane zagadnienia prawne i kryminologiczne związane z rozwojem technologiiWojciech Filipkowski
 
Zagrożenia dla Polski i Unii Europejskiej związane ze swobodą obrotu gospodar...
Zagrożenia dla Polski i Unii Europejskiej związane ze swobodą obrotu gospodar...Zagrożenia dla Polski i Unii Europejskiej związane ze swobodą obrotu gospodar...
Zagrożenia dla Polski i Unii Europejskiej związane ze swobodą obrotu gospodar...Wojciech Filipkowski
 
The use of data mining technology for fighting cyber crimes - forensic aspects
The use of data mining technology for fighting cyber crimes - forensic aspectsThe use of data mining technology for fighting cyber crimes - forensic aspects
The use of data mining technology for fighting cyber crimes - forensic aspectsWojciech Filipkowski
 
Zakres kryminalizacji procederu prania pieniędzy w ujęciu prawnoporównawczym
Zakres kryminalizacji procederu prania pieniędzy w ujęciu prawnoporównawczymZakres kryminalizacji procederu prania pieniędzy w ujęciu prawnoporównawczym
Zakres kryminalizacji procederu prania pieniędzy w ujęciu prawnoporównawczymWojciech Filipkowski
 
ZASTOSOWANIE TECHNOLOGII DATA MINING W WALCE Z PRZESTĘPSTWAMI FINANSOWYMI
ZASTOSOWANIE TECHNOLOGII DATA MINING W WALCE Z PRZESTĘPSTWAMI FINANSOWYMIZASTOSOWANIE TECHNOLOGII DATA MINING W WALCE Z PRZESTĘPSTWAMI FINANSOWYMI
ZASTOSOWANIE TECHNOLOGII DATA MINING W WALCE Z PRZESTĘPSTWAMI FINANSOWYMIWojciech Filipkowski
 
Analiza kryminalna danych telekomunikacyjnych
Analiza kryminalna danych telekomunikacyjnychAnaliza kryminalna danych telekomunikacyjnych
Analiza kryminalna danych telekomunikacyjnychWojciech Filipkowski
 
Rozwiązania informatyczne wspierające prowadzenie operacyjnej analizy krymina...
Rozwiązania informatyczne wspierające prowadzenie operacyjnej analizy krymina...Rozwiązania informatyczne wspierające prowadzenie operacyjnej analizy krymina...
Rozwiązania informatyczne wspierające prowadzenie operacyjnej analizy krymina...Wojciech Filipkowski
 
Zastosowanie technologii data mining w walce z przestępstwami finansowymi
Zastosowanie technologii data mining w walce z przestępstwami finansowymiZastosowanie technologii data mining w walce z przestępstwami finansowymi
Zastosowanie technologii data mining w walce z przestępstwami finansowymiWojciech Filipkowski
 
Ocena wiarygodność otwartych źródeł informacji przez internautów
Ocena wiarygodność otwartych źródeł informacji przez internautówOcena wiarygodność otwartych źródeł informacji przez internautów
Ocena wiarygodność otwartych źródeł informacji przez internautówWojciech Filipkowski
 
Propozycje kierunków badań nad bezpieczeństwem
Propozycje kierunków badań nad bezpieczeństwemPropozycje kierunków badań nad bezpieczeństwem
Propozycje kierunków badań nad bezpieczeństwemWojciech Filipkowski
 
STRATEGIA WALKI Z TERRORYZMEM W OPINII PROKURATORÓW I SĘDZIÓW
STRATEGIA WALKI Z TERRORYZMEMW OPINII PROKURATORÓW I SĘDZIÓWSTRATEGIA WALKI Z TERRORYZMEMW OPINII PROKURATORÓW I SĘDZIÓW
STRATEGIA WALKI Z TERRORYZMEM W OPINII PROKURATORÓW I SĘDZIÓWWojciech Filipkowski
 
WYBRANE ASPEKTY TECHNOLOGICZNE WALKI Z PRZESTĘPCZOŚCIĄ ZORGANIZOWANĄ
WYBRANE ASPEKTY TECHNOLOGICZNE WALKI Z PRZESTĘPCZOŚCIĄ ZORGANIZOWANĄWYBRANE ASPEKTY TECHNOLOGICZNE WALKI Z PRZESTĘPCZOŚCIĄ ZORGANIZOWANĄ
WYBRANE ASPEKTY TECHNOLOGICZNE WALKI Z PRZESTĘPCZOŚCIĄ ZORGANIZOWANĄWojciech Filipkowski
 
Przedstawienie zakresu współpracy między sektorami publicznym i prywatnym pr...
Przedstawienie zakresu współpracy między sektorami publicznym i prywatnym pr...Przedstawienie zakresu współpracy między sektorami publicznym i prywatnym pr...
Przedstawienie zakresu współpracy między sektorami publicznym i prywatnym pr...Wojciech Filipkowski
 
Zagrożenia podmiotów innowacyjnych przez proceder prania pieniędzy
Zagrożenia podmiotów innowacyjnych przez proceder prania pieniędzyZagrożenia podmiotów innowacyjnych przez proceder prania pieniędzy
Zagrożenia podmiotów innowacyjnych przez proceder prania pieniędzyWojciech Filipkowski
 
wyniki ankiet nt przestępczości zorganizowanej w opinii sędziów
wyniki ankiet nt przestępczości zorganizowanej w opinii sędziówwyniki ankiet nt przestępczości zorganizowanej w opinii sędziów
wyniki ankiet nt przestępczości zorganizowanej w opinii sędziówWojciech Filipkowski
 
The Phenomenon Of Money Laundering As A Field Of Research In Poland
The Phenomenon Of Money Laundering As A Field Of Research In PolandThe Phenomenon Of Money Laundering As A Field Of Research In Poland
The Phenomenon Of Money Laundering As A Field Of Research In PolandWojciech Filipkowski
 
Przeciwdziałanie i Zwalczanie Zjawiska Prania Pieniędzy w Szwajcarii – Teoria...
Przeciwdziałanie i Zwalczanie Zjawiska Prania Pieniędzy w Szwajcarii – Teoria...Przeciwdziałanie i Zwalczanie Zjawiska Prania Pieniędzy w Szwajcarii – Teoria...
Przeciwdziałanie i Zwalczanie Zjawiska Prania Pieniędzy w Szwajcarii – Teoria...Wojciech Filipkowski
 
Odpowiedzialność Podmiotów Zbiorowych Za Finansowanie Terroryzmu
Odpowiedzialność Podmiotów Zbiorowych Za Finansowanie TerroryzmuOdpowiedzialność Podmiotów Zbiorowych Za Finansowanie Terroryzmu
Odpowiedzialność Podmiotów Zbiorowych Za Finansowanie TerroryzmuWojciech Filipkowski
 

More from Wojciech Filipkowski (20)

Kryminalistyczne apskety wykorzystania technologii data mining w walce z cybe...
Kryminalistyczne apskety wykorzystania technologii data mining w walce z cybe...Kryminalistyczne apskety wykorzystania technologii data mining w walce z cybe...
Kryminalistyczne apskety wykorzystania technologii data mining w walce z cybe...
 
Wybrane zagadnienia prawne i kryminologiczne związane z rozwojem technologii
Wybrane zagadnienia prawne i kryminologiczne związane z rozwojem technologiiWybrane zagadnienia prawne i kryminologiczne związane z rozwojem technologii
Wybrane zagadnienia prawne i kryminologiczne związane z rozwojem technologii
 
Zagrożenia dla Polski i Unii Europejskiej związane ze swobodą obrotu gospodar...
Zagrożenia dla Polski i Unii Europejskiej związane ze swobodą obrotu gospodar...Zagrożenia dla Polski i Unii Europejskiej związane ze swobodą obrotu gospodar...
Zagrożenia dla Polski i Unii Europejskiej związane ze swobodą obrotu gospodar...
 
The use of data mining technology for fighting cyber crimes - forensic aspects
The use of data mining technology for fighting cyber crimes - forensic aspectsThe use of data mining technology for fighting cyber crimes - forensic aspects
The use of data mining technology for fighting cyber crimes - forensic aspects
 
Zakres kryminalizacji procederu prania pieniędzy w ujęciu prawnoporównawczym
Zakres kryminalizacji procederu prania pieniędzy w ujęciu prawnoporównawczymZakres kryminalizacji procederu prania pieniędzy w ujęciu prawnoporównawczym
Zakres kryminalizacji procederu prania pieniędzy w ujęciu prawnoporównawczym
 
ZASTOSOWANIE TECHNOLOGII DATA MINING W WALCE Z PRZESTĘPSTWAMI FINANSOWYMI
ZASTOSOWANIE TECHNOLOGII DATA MINING W WALCE Z PRZESTĘPSTWAMI FINANSOWYMIZASTOSOWANIE TECHNOLOGII DATA MINING W WALCE Z PRZESTĘPSTWAMI FINANSOWYMI
ZASTOSOWANIE TECHNOLOGII DATA MINING W WALCE Z PRZESTĘPSTWAMI FINANSOWYMI
 
Analiza kryminalna danych telekomunikacyjnych
Analiza kryminalna danych telekomunikacyjnychAnaliza kryminalna danych telekomunikacyjnych
Analiza kryminalna danych telekomunikacyjnych
 
Rozwiązania informatyczne wspierające prowadzenie operacyjnej analizy krymina...
Rozwiązania informatyczne wspierające prowadzenie operacyjnej analizy krymina...Rozwiązania informatyczne wspierające prowadzenie operacyjnej analizy krymina...
Rozwiązania informatyczne wspierające prowadzenie operacyjnej analizy krymina...
 
Zastosowanie technologii data mining w walce z przestępstwami finansowymi
Zastosowanie technologii data mining w walce z przestępstwami finansowymiZastosowanie technologii data mining w walce z przestępstwami finansowymi
Zastosowanie technologii data mining w walce z przestępstwami finansowymi
 
Ocena wiarygodność otwartych źródeł informacji przez internautów
Ocena wiarygodność otwartych źródeł informacji przez internautówOcena wiarygodność otwartych źródeł informacji przez internautów
Ocena wiarygodność otwartych źródeł informacji przez internautów
 
Propozycje kierunków badań nad bezpieczeństwem
Propozycje kierunków badań nad bezpieczeństwemPropozycje kierunków badań nad bezpieczeństwem
Propozycje kierunków badań nad bezpieczeństwem
 
STRATEGIA WALKI Z TERRORYZMEM W OPINII PROKURATORÓW I SĘDZIÓW
STRATEGIA WALKI Z TERRORYZMEMW OPINII PROKURATORÓW I SĘDZIÓWSTRATEGIA WALKI Z TERRORYZMEMW OPINII PROKURATORÓW I SĘDZIÓW
STRATEGIA WALKI Z TERRORYZMEM W OPINII PROKURATORÓW I SĘDZIÓW
 
WYBRANE ASPEKTY TECHNOLOGICZNE WALKI Z PRZESTĘPCZOŚCIĄ ZORGANIZOWANĄ
WYBRANE ASPEKTY TECHNOLOGICZNE WALKI Z PRZESTĘPCZOŚCIĄ ZORGANIZOWANĄWYBRANE ASPEKTY TECHNOLOGICZNE WALKI Z PRZESTĘPCZOŚCIĄ ZORGANIZOWANĄ
WYBRANE ASPEKTY TECHNOLOGICZNE WALKI Z PRZESTĘPCZOŚCIĄ ZORGANIZOWANĄ
 
Przedstawienie zakresu współpracy między sektorami publicznym i prywatnym pr...
Przedstawienie zakresu współpracy między sektorami publicznym i prywatnym pr...Przedstawienie zakresu współpracy między sektorami publicznym i prywatnym pr...
Przedstawienie zakresu współpracy między sektorami publicznym i prywatnym pr...
 
Zagrożenia podmiotów innowacyjnych przez proceder prania pieniędzy
Zagrożenia podmiotów innowacyjnych przez proceder prania pieniędzyZagrożenia podmiotów innowacyjnych przez proceder prania pieniędzy
Zagrożenia podmiotów innowacyjnych przez proceder prania pieniędzy
 
wyniki ankiet nt przestępczości zorganizowanej w opinii sędziów
wyniki ankiet nt przestępczości zorganizowanej w opinii sędziówwyniki ankiet nt przestępczości zorganizowanej w opinii sędziów
wyniki ankiet nt przestępczości zorganizowanej w opinii sędziów
 
Sposoby Finansowania Terroryzmu
Sposoby Finansowania TerroryzmuSposoby Finansowania Terroryzmu
Sposoby Finansowania Terroryzmu
 
The Phenomenon Of Money Laundering As A Field Of Research In Poland
The Phenomenon Of Money Laundering As A Field Of Research In PolandThe Phenomenon Of Money Laundering As A Field Of Research In Poland
The Phenomenon Of Money Laundering As A Field Of Research In Poland
 
Przeciwdziałanie i Zwalczanie Zjawiska Prania Pieniędzy w Szwajcarii – Teoria...
Przeciwdziałanie i Zwalczanie Zjawiska Prania Pieniędzy w Szwajcarii – Teoria...Przeciwdziałanie i Zwalczanie Zjawiska Prania Pieniędzy w Szwajcarii – Teoria...
Przeciwdziałanie i Zwalczanie Zjawiska Prania Pieniędzy w Szwajcarii – Teoria...
 
Odpowiedzialność Podmiotów Zbiorowych Za Finansowanie Terroryzmu
Odpowiedzialność Podmiotów Zbiorowych Za Finansowanie TerroryzmuOdpowiedzialność Podmiotów Zbiorowych Za Finansowanie Terroryzmu
Odpowiedzialność Podmiotów Zbiorowych Za Finansowanie Terroryzmu
 

Recently uploaded

Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 

Recently uploaded (20)

Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 

Cyberlaundering

  • 1. Blanchiment d’argent : les schémas d’aujourd’hui Mercredi 21 février 2007, Genève, Hôtel de la Paix Money Laundering via The Internet: The Used Methods dr Wojciech Filipkowski School of Law University of Bialystok Poland
  • 2. „The online revolution will undoubtedly be of major import on money laundering.” „Many transfers are now instantaneous form account to account, and the trick is to do it without leaving a trace or conceal the transfer under legitimate trading labels, all of which is easy to do.” Victor T Le Vine, a professor of political science at Washington University in St Louis, Missouri (2000) 2
  • 3. „Development in electronic payment as an everyday means of settlement will usher in a whole new epoch of global liquidity for ill-gotten gains.” (2000) „There is an enormous degree of hype being generated on this issue of cyberlaundering. It makes great copy, but it really has not yet achieved the level of sophistication that some commentators would have us believe” Rowan Bosworth-Davies former British Fraud Squad officer (2001) 3
  • 4. „The study found there is a legitimate market demand served by each of the payment methods analysed, yet potential money laundering and terrorist financing vulnerabilities do exist. Specifically, offshore providers of new payment methods may pose additional money laundering and terrorist financing risks compared with service providers operating within a jurisdiction.” Financial Action Task Force, Report on New Payment Methods, 13 December 2006, Paris, 4 p. 18. (2006)
  • 5. Agenda: I. Characteristic of Internet – What attracts launderers? II. Financial services available on-line through Internet III. How Internet can be abused? IV. Preventative measures – acting in accordance with FATF Recommendations 5
  • 6. What attracts launderers? • Anonymity: fake identities, spoofing IP address, modem connection, Wi-Fi technology, pre-paid phones, encryption • No Face-To-Face transactions • Speed – instant transactions • Globalization process: free movement of goods, services & people and new payment technologies • Cross border activity: involves several jurisdiction, mutual legal assistance 6 treaties issues
  • 7. On-line financial services • Internet payment services (incl. mobile payments, micro-payments or digital precious metals) • Stored value cards (smart cards, e- purse) • On-line banking 7
  • 8. Cyberlaundering: The process of legalization of ill-gotten gains using services available on the Internet (in the cyberspace) as a : • reason (a legal title) to do transaction (transfer of funds) or • tool to do transaction (transfer of funds) 8
  • 9. The Idea #1: BANK 2 Service Bank Account B Legal Title for Transaction Internet Internet BANK 1 Bank Account A 9
  • 10. The Idea #2.a: BANK 2 Internet Bank Account B Internet BANK 1 Bank Account A 10
  • 11. The Idea #2.b: Internet Bank Account B BANK Bank Account A Internet 11
  • 12. How Internet can be abused? Stages of ML: • Placement – using ATM or ill-gotten gains derived from cybercrimes • Layering – wide range of services available on the Internet • Integration – i.a. transfer-pricing, on- line gambling („winning ticket”), front companies, loan-back 12
  • 13. The used methods? Including: • e-banking and other on-line services • use of credit cards in the Internet • pre-paid cards • on-line gambling and betting – sport wagering • on-line auctions • mobile payments • stock exchange • digital precious metal • virtual money laundering 13
  • 14. On-Line Services: BANK A Transfer of Funds Deposits Title Internet Opening an Account Access&Payment BANK B Internet Service Off-shore Financial 14 Center
  • 15. Credit cards: BANK A Transfer of Funds Opening an Account&Deposits Title Issuing e-Card/Charge Card Financial Intermediary Access&Payment BANK B Internet Service Off-shore Financial 15 Center
  • 16. Pre-paid cards: Transfer of Funds BANK A Internet Opening an Account&Deposits Company issuing pre-paid cards BANK B Issuing Another A pre-paid card country 16
  • 17. On-line Gambling: Transfer of Funds BANK A Opening an Account&Deposits Issuing e-Card/Charge Card Financial Intermediary Access&Buying Chips BANK B BANK C Internet Gambling Off-shore Financial 17 Center
  • 18. On-line Auction Sale #1: BANK 2 Bank Account B Internet Selling On-Line Auctions Company Title Buying BANK 1 Internet Bank Account A 18
  • 19. On-line Auction Sale #2: BANK 2 Bank Account B Internet Selling BANK 3 On-Line Auctions& Financial Intermediary Company Bank Account C Buying Title BANK 1 Internet Bank Account A 19
  • 20. On-line Auction Sale #3: BANK 2 Bank Account B Internet Financial Selling Intermediary BANK 3 On-Line Auctions Company Bank Account C Buying Title BANK 1 Internet Bank Account A 20
  • 21. Mobile-payments: Phone Bill Charging Pre-Paid Phone BANK 4 Mobile Phone Operator BANK 1 Premium SMS, WAP Mobile or Internet BANK 3 Network Service B Internet BANK 2 Service A 21
  • 22. Stock exchange: BANK A Opening an Account Brokerage Transfer of Funds &Deposits Company Settlements BANK B Internet Access&Trading Stocks BANK C Stock Exchange 22
  • 23. Digital Precious Metal: Transfering ownership of DPM Openning an Account DPM Company Title Openning an Account BANK B BANK C Selling DPM Buying derivatives Buying DPM Gold BANK A Market 23
  • 24. Virtual Money Laundering: VR Trading Openning an Account Virtual Currency Title BANK B BANK C Openning an Account Buying&Exchanging Virtual Currency BANK A 24
  • 25. FATF’s cases: Type of on-line service Number of cases 1. Pre-paid cards (open system) 3 2. Pre-paid cards (closed system) 2 3. Electronic purse 0 4. Mobile payments 0 5. Internet payment systems 0 6. Digital precious metals 3 25
  • 26. Polish experiences: • Opening accounts with Internet access or getting one for existing accounts (so called „sleeping account”). • Smurfing – many people open accounts (for commission) and then hand it over to launderer or they receive money (usually from abroad), withdraw them and hand it over to launderer – rather small amounts of money (up to few thousands PLN). • Collecting accounts by launderers. • Banks usually inform the correspondent bank about the suspicious transactions. • Computer crimes or illegal on-line gambling abroad – as predicate offences – e.g. phishing attacks, identity theft. • Asymmetric regulations concerning some of the offences – pornography or on-line gambling – how prosecute them? 26
  • 27. Preventative measures: Handbook on Inter Banking (1999): • Unusual requests, timing of transactions or e-mail formats. • Anomalies in the types, volumes or values of transactions. • A customer who submits an incomplete on-line account application and then refuses to respond to a request for more information. • An on-line account application with conflicting information such as a physical address that does not match the location of the given e-mail address. • On-line applications for multiple accounts with no apparent reason to do so. • A customer who uses the bank’s on-line transaction services to send repeated inter-bank wire transfers between several accounts with no apparent reason to do so. 27
  • 28. Preventative measures: Monitoring Cybercrimes According to FATF: • Require ISPs to maintain reliable subscriber registers with appropriate identification information. • Require ISPs to establish log files with traffic data relating Internet-protocol (IP) number to subscriber and to telephone number used in the connection. • Require that this information be maintained for a reasonable period (possibly 6 to 12 months) – data retention. • Ensure that this information may be made available internationally in a timely manner when conducting criminal investigations. 28
  • 29. Preventative measures: FATF 40 Recommendations: 5# Recommendation: Financial institutions should not keep anonymous accounts or accounts in obviously fictitious names. 8# Recommendation: Financial institutions should pay special attention to any ML threats that may arise from developing technologies that may favour anonymity, and take measures, if needed, to prevent their use in ML schemes. 29
  • 30. Preventative measures: FATF 40 Recommendations: 21# Recommendation: To close off business relationships and transactions with persons, including companies and financial institutions, from NCCT. 23# Recommendation: At a minimum, businesses providing a service of money or value transfer, or money or currency changing should be licensed or registered, and subject to effective systems for monitoring and ensuring compliance with national requirements to combat ML and TF. 30
  • 31. Preventative measures: FATF 9 Special Recommendations: Special Recommendation VI: Each country should take measures to ensure that persons or legal entities, including agents, that provide a service for the transmission of money or value, including transmission through an informal money or value transfer system or network, should be licensed or registered and subject to all the FATF Recommendations that apply to banks and non-bank financial institutions. 31
  • 32. Preventative measures: FATF 9 Special Recommendations: Special Recommendation VII: Countries should take measures to require financial institutions, including money remitters, to include accurate and meaningful originator information (name, address and account number) on funds transfers and related messages that are sent, and the information should remain with the transfer or related message through the payment chain. 32
  • 33. Preventative measures: EU 3rd Directive: It gives the possibility to EU countries to allow e- money issuers not to apply customer due diligence (CDD) in respect of e-money. Simplified CDD applies to other products or transactions carrying a low risk of money laundering or terrorist financing. Simplified CDD shall not apply in the case where there is information available that suggests a product is subject to a high risk of being misused for money laundering or terrorist financing purposes. 33
  • 34. Thank You for Your attention … Dr Wojciech Filipkowski School of Law University of Bialystok, Poland fwojtek@uwb.edu.pl 34
  • 35. No parts of this paper have the aim to abet or help somebody to commit a crime. The presented methods serves only as an examples to make a criminological analysis of different modus operandi. 35