06.04.2013 Views

convergence

convergence

convergence

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Lindholm and Realuyo<br />

pay you virtual dollars for your virtual food, drink, and entertainment) and can cash out for<br />

real-world currency. (As of October 29, 2011, for example, one online site was exchanging 286<br />

Second Life Lindens [SLL] per U.S. dollar and 392 per euro. 30 ) There are dozens of similar<br />

online-based financial transaction services available, many of which use the Open Metaverse<br />

Currency—OM¢—and which trade through online currency exchanges or even virtual ATMs<br />

within their multiuser virtual worlds.<br />

Other Web-based sources of currency exchange such as bitcoin (“no prerequisites or<br />

arbitrary limits” 31 ) and paysafecard (“personal details not required” 32 ) can be a concern for law<br />

enforcement and intelligence agencies. These exchanges cater to those whose goal is to remain<br />

anonymous in their financial transactions, typically consumers who want to avoid the compliance<br />

checks common to traditional banking systems. These activities can be hard to trace, are<br />

unregulated or less regulated, and are thus popular with Internet-savvy criminals. (A Twitter<br />

post on July 27, 2011, from LulzSec, a hacker group, recommended to like-minded colleagues:<br />

“Get yourself a slice of MyBitCoin, Liberty Reserve, WebMoney, Neteller, Moneybookers,<br />

and start using prepaid credit and gift cards” to avoid detection.)<br />

In the case of E-Gold, a digital currency firm, the U.S. Government alleged that the<br />

company’s untraceable exchanges had become “a preferred means of payment for child pornography<br />

distributors, identity thieves, online scammers, and other criminals around the world to<br />

launder their illegal income anonymously.” 33 In 2008, its directors pleaded guilty to charges of<br />

money laundering and running an unregistered money service business. 34 Assistant Director<br />

James E. Finch, of the FBI’s Cyber Division, summed up the original charges by observing that,<br />

“the advent of new electronic currency systems increases the risk that criminals, and possibly<br />

terrorists, will exploit these systems to launder money and transfer funds globally to avoid law<br />

enforcement scrutiny and circumvent banking regulations and reporting.” 35<br />

Combating Threat Finance<br />

Recognizing financing as the lifeblood of illicit networks, the United States and its international<br />

allies have developed multidimensional strategies and measures to combat threat financing.<br />

International cooperation, institutional capacity-building, public-private partnerships, and<br />

intelligence and law enforcement operations are key components of these counterthreat<br />

financing strategies.<br />

The Use of Financial Intelligence<br />

At the Treasury Department, the Office of Terrorism and Financial Intelligence marshals<br />

the department’s intelligence and enforcement functions to protect the financial system<br />

against illicit use and combat rogue nations, terrorist facilitators, WMD proliferators, money<br />

launderers, drug kingpins, and other national security threats. 36 After the 9/11 attacks, the<br />

Treasury Department established the Terrorist Finance Tracking Program (TFTP) to identify,<br />

track, and pursue terrorists such as al Qaeda and their networks. The Treasury Department<br />

is uniquely positioned to track terrorist money flows and assist in broader U.S. Government<br />

efforts to uncover terrorist cells and map terrorist networks at home and around the world. 37<br />

120

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!