convergence
convergence
convergence
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Lindholm and Realuyo<br />
pay you virtual dollars for your virtual food, drink, and entertainment) and can cash out for<br />
real-world currency. (As of October 29, 2011, for example, one online site was exchanging 286<br />
Second Life Lindens [SLL] per U.S. dollar and 392 per euro. 30 ) There are dozens of similar<br />
online-based financial transaction services available, many of which use the Open Metaverse<br />
Currency—OM¢—and which trade through online currency exchanges or even virtual ATMs<br />
within their multiuser virtual worlds.<br />
Other Web-based sources of currency exchange such as bitcoin (“no prerequisites or<br />
arbitrary limits” 31 ) and paysafecard (“personal details not required” 32 ) can be a concern for law<br />
enforcement and intelligence agencies. These exchanges cater to those whose goal is to remain<br />
anonymous in their financial transactions, typically consumers who want to avoid the compliance<br />
checks common to traditional banking systems. These activities can be hard to trace, are<br />
unregulated or less regulated, and are thus popular with Internet-savvy criminals. (A Twitter<br />
post on July 27, 2011, from LulzSec, a hacker group, recommended to like-minded colleagues:<br />
“Get yourself a slice of MyBitCoin, Liberty Reserve, WebMoney, Neteller, Moneybookers,<br />
and start using prepaid credit and gift cards” to avoid detection.)<br />
In the case of E-Gold, a digital currency firm, the U.S. Government alleged that the<br />
company’s untraceable exchanges had become “a preferred means of payment for child pornography<br />
distributors, identity thieves, online scammers, and other criminals around the world to<br />
launder their illegal income anonymously.” 33 In 2008, its directors pleaded guilty to charges of<br />
money laundering and running an unregistered money service business. 34 Assistant Director<br />
James E. Finch, of the FBI’s Cyber Division, summed up the original charges by observing that,<br />
“the advent of new electronic currency systems increases the risk that criminals, and possibly<br />
terrorists, will exploit these systems to launder money and transfer funds globally to avoid law<br />
enforcement scrutiny and circumvent banking regulations and reporting.” 35<br />
Combating Threat Finance<br />
Recognizing financing as the lifeblood of illicit networks, the United States and its international<br />
allies have developed multidimensional strategies and measures to combat threat financing.<br />
International cooperation, institutional capacity-building, public-private partnerships, and<br />
intelligence and law enforcement operations are key components of these counterthreat<br />
financing strategies.<br />
The Use of Financial Intelligence<br />
At the Treasury Department, the Office of Terrorism and Financial Intelligence marshals<br />
the department’s intelligence and enforcement functions to protect the financial system<br />
against illicit use and combat rogue nations, terrorist facilitators, WMD proliferators, money<br />
launderers, drug kingpins, and other national security threats. 36 After the 9/11 attacks, the<br />
Treasury Department established the Terrorist Finance Tracking Program (TFTP) to identify,<br />
track, and pursue terrorists such as al Qaeda and their networks. The Treasury Department<br />
is uniquely positioned to track terrorist money flows and assist in broader U.S. Government<br />
efforts to uncover terrorist cells and map terrorist networks at home and around the world. 37<br />
120