• Title/Summary/Keyword: Money laundering prevention

Search Result 7, Processing Time 0.021 seconds

Prevention Policies for Money Laundering through Capital Market Instruments: The Case of Indonesia

  • BINTORO, Sutarno;SJAMSUDDIN, Sjamsiar;PRATIWI, Ratih Nur;HERMAWAN, Hermawan
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.2
    • /
    • pp.1269-1275
    • /
    • 2021
  • The phenomenon of money laundering through capital market instruments and various investment instruments in it is a challenge for law enforcement officials, particularly the Corruption Eradication Commission (KPK) in investigating money laundering crimes originating from corruption. This study aims to analyze comprehensively about: (1) implementation of policies on prevention and eradication of money laundering at the KPK in the context of handling money laundering on the capital market; and (2) an effective model for implementing policies to prevent and eradicate money laundering in the KPK in the context of handling money laundering on the capital market. By using a qualitative approach and Interactive Model analysis from Miles and Huberman, it was concluded that the results of the implementation of the policy of preventing and eradicating money laundering at the Corruption Eradication Commission in the context of handling money laundering crimes in the capital market had a positive impact on society, individuals and groups. The theoretical implications of the results of this study are related to the content of policy that is still relevant but for the context of implementation it needs to be refined or reconstructed by adding three elements, namely: communication, monitoring, and evaluation and security.

A Study on the Design of Smart Contracts mechanism based on the Blockchain for anti-money laundering (자금 세탁 방지를 위한 블록체인 기반 스마트 컨트랙트 메커니즘 설계)

  • Kang, Heejung;Kim, Hye Ri;Hong, Seng-phil
    • Journal of Internet Computing and Services
    • /
    • v.19 no.5
    • /
    • pp.1-11
    • /
    • 2018
  • The Blockchain is a technique that prevents data from being manipulated and guarantees the integrity and reliability of the data by all participants in the network jointly owning and validating the data. Since the Blockchain characterized by security, scalability and transparency, it is used in a variety of fields including logistics, distribution, IoT and healthcare, including remittance. In particular, there is a growing interest in smart contract that can create different forms of contracts and automate implementation based on Blockchain. Smart Contract can be used to pre-programme contracts and are implemented immediately when conditions are met. As a result, digital data can be more reliable. In this paper, we are conducting a study on the smart contract design as a way to solve such problems as illegal misuse of funds on virtual currency, which has become an issue recently. Through this process, we applied the customer identification and money laundering prevention process using smart contract, and then check the possibility of preventing money laundering and propose the ASM (AML SmartContract Mechant) design.

International Legal Measures of Protection of Critical Infrastructure Facilities in Banking Sphere

  • Oleg, Batiuk;Oleg, Novikov;Oleksandr, Komisarov;Natalia, Benkovska;Nina, Anishchuk
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.145-154
    • /
    • 2022
  • Based on the obtained results of the study, the most problematic issues and legal conflicts are identified, which are related to the ratio of norms of domestic and foreign legislation, taking into account the requirements of the Constitution of Ukraine and the provisions of the Law of Ukraine "On international agreements". Along with this, it is stated in this scientific article that there are a number of provisions and examples of positive practice on the specified topic abroad and in international legal acts today, which should be used by Ukraine both in improving legislation on the issues of banking activity and in increasing the level of criminal legal protection of relevant critical infrastructure facilities, especially those that are substantively related to prevention and counteraction of activity, with regard to the legalization (laundering) of criminally obtained funds, financing of terrorism and the financing of the proliferation of weapons of mass destruction, which is quite relevant for our state, given the military conflict that is taking place on its territory in the Donbass. Again, in the same context, the need for more active cooperation between Ukraine and the FATF (international body developing a policy to combat money laundering) has been proven.

Implementation of an Integrated Access Control Rule Script Language and Graphical User Interface for Hybrid Firewalls (익명 통신로를 이용한 Escrow 전자화폐)

  • 김춘수;박춘식;전희종
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.1
    • /
    • pp.29-46
    • /
    • 1999
  • Most of the previous researches for the electronic cash system guarantee unconditional untraceability for the purpose of individual privacy. Such untraceable electronic cash system that only focuses on untraceability, however, has side effect such as money laundering, criminal activities. We present a escrow cash model using anonymous channel that supports not only untaceability but also crime prevention, and prove the efficiency of our scheme relative to previous escrow cash systems.

A Study on the Types of Crime and Scalability in Metaverse (메타버스 내 범죄발생 유형과 확장성에 관한 연구)

  • Song, HyeJin;Nam, Wanwoo
    • Journal of the Society of Disaster Information
    • /
    • v.18 no.1
    • /
    • pp.218-227
    • /
    • 2022
  • Purpose: In the case of cavity discovered by ground penetrating radar exploration, it is necessary to accurately predict the filling amount in the cavity in advance, fill the cavity sufficiently and exert strength to ensure stability and prevent ground subsidence. Method: The cavity waveform analysis method by GPR exploration and the method using the cavity shape imaging equipment were performed to measure the cavity shape with irregular size and shape of the actual cavity, and the amount of cavity filling of the injection material was calculated during rapid restoration. Result: The expected filling amount was presented by analyzing the correlation between the cavity size and the filling amount of injection material according to the cavity scale and soil depth through the method by GPR exploration and the cavity scale calculation using the cavity shaping equipment. Conclusion: The cavity scale measured by the cavity imaging equipment was found to be in the range of 20% to 40% of the cavity scale by GPR exploration. In addition, the filling amount of injection material compared to the cavity scale predicted by GPR exploration was in the range of about 60% to 140%, and the filling amount of the injection material compared to the cavity size by the cavity shaping equipment was confirmed to be about 260% to 320 Purpose: The purpose of this study is to examine the types of crimes taking place in the metaverse, and to establish a crime prevention strategy and find a legal deterrent against it. Method: In order to classify crime types in the metaverse, crime types were analyzed based on the results of previous studies and current incidents. Result: Most of the crimes taking place in the metaverse are done in games such as Roblox or Zeppetto. Most of the game users were teenagers. Looking at the types, there are many teens for sexual crimes, violent crimes, and defamation, but professional criminals are often included in copyright infringement, money laundering using virtual currency, and fraud. Conclusion: Since the types of crimes in the metaverse are diverse, various institutional supplementary mechanisms such as establishment of police crime prevention strategies, legal regulations, and law revisions will have to be prepared.

A Study on the Progress of Pig Butchering Crimes Using Cryptocurrency (암호화폐를 이용한 "돼지도살(Pig Butchering)" 사기범죄 진행과정에 대한 연구)

  • HyeJin Song
    • Journal of the Society of Disaster Information
    • /
    • v.20 no.3
    • /
    • pp.663-671
    • /
    • 2024
  • Purpose: The purpose of this study is to examine the risks and criminal progress of pig murder fraud crimes in the absence of related research and statistics amid a surge in pig murder fraud damage in Korea, and to approach the methods, problems, and countermeasures that can be prevented in Korea through foreign cases. Method: In order to classify the types of pig murder fraud crimes, the progress was analyzed through related reports and statistics, and various damage cases. Result: The crime of pig murder fraud can be seen as an organized crime that organically combines simple romance scams, investment fraud, and human trafficking. In the case of victims, unlike simple fraud, psychological problems such as suicide impulse and panic disorder were found, and in the case of cryptocurrency acquired through fraud, a path was found to flow back into the criminal organization through money laundering. Conclusion: In the case of pig murder fraud crimes that have been detected as a danger worldwide, the scale will be even wider. Therefore, various institutional supplements and policies should be prepared through crime type analysis in Korea for crime prevention and countermeasures.

Research on the limiting factors and countermeasures of the virtual asset industry (가상자산 산업의 한계요인과 대응방안 연구)

  • Yoo, Soonduck
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.1
    • /
    • pp.19-26
    • /
    • 2021
  • The purpose of this study is to provide an environment that can support the development of the virtual asset industry. The limiting factors and countermeasures currently possessed by the virtual asset industry were considered in terms of legal and institutional aspects, technical aspects, and market aspects.Small businesses classified as virtual asset operators have difficulty meeting the government's requirements.Accordingly, SMEs with insufficient funds and manpower are withdrawn from the market, creating an environment where only large-scale enterprises with capital power survive.It is difficult to develop desirable technologies and markets in the virtual asset technology industry. In addition, small and medium-sized companies may be expelled from the market, causing damage to current users. Therefore, in terms of legal and institutional aspects, there is a lack of an exact scope of virtual asset providers, and thus it is necessary to respond to the controversial elements of virtual asset providers. In terms of technology, it is necessary to cope with the slowdown of the P2P method, the difficulty in recovering errors, and the absence of operational experts. Therefore, technology standardization and stabilization are required, and efforts must be made to cultivate operational technical personnel who can support them.In terms of the market, it is necessary to prepare measures to protect users of virtual assets and to establish countermeasures for companies operating virtual assets against weak user protection, inadequate application of the AML method, and limitations of taxation. This study is expected to contribute to active utilization support or related policies in the virtual asset industry.