Tracking Illicit P2P Transactions

From P2P Foundation
Jump to navigation Jump to search

* Report: Shadowy figures: tracking illicit financial transactions in the murky world of digital currencies, peer–to–peer networks, and mobile device payments" by John Villasenor, Cody Monk and Christopher Bronk.

Document available at: http://www.bakerinstitute.org/publications/ITP-pub-FinancialTransactions-082911.pdf

Abstract

The history of the movement of money is as complex and varied as the history of money itself, and includes ships laden with gold bullion, desert caravans carrying salt or cowry shells, armored trucks filled with banknotes, paper checks, and today, a large and quickly growing list of digital transfer methods. Secrecy and anonymity have always played roles in the movement of money, most commonly because they offer a strong measure of privacy and protection against being targeted by thieves, but also because the parties in financial transactions can have other reasons—some legitimate, some not—for keeping a low profile.

The combination of the enormous growth in social networks, the complexity of peer-to-peer systems and software, and the number of Internet and wirelessly connected devices is altering the landscape of financial transactions at a rate and to a degree that is unprecedented. Today, such transactions can be conducted not only using traditional, state-backed currencies, but also through purely digital currencies, virtual currencies, and virtual goods. In addition, mobile phone-based money transfer systems enabling traditional currencies to be moved in novel ways are experiencing rapid adoption, particularly in developing nations.

Almost no one would argue that governments do not have a right to track and trace digital financial transactions associated with activities such as terrorism and human trafficking. It is less clear, however, how governments can surmount the formidable technical and organizational challenges associated with detecting and monitoring these transactions. The solution will require a combination of self-regulation, government-industry collaboration, and change in both technology and culture within government agencies.


Bibliography

  • William Goldman, script for All The President’s Men (based on the book of the same name by Carl Bernstein and Bob Woodward), Internet Movie Script Database, accessed July 15, 2011, http://www.imsdb.com/scripts/All- the-President's-Men.html.
  • Hawala is a money transfer system that has its roots in the Islamic world. In a Hawala transfer, money can be provided to an operator in one country and disbursed to the recipient by an operator in another country. See “Hawala Definition,” Duhaime Legal Dictionary, http://www.duhaime.org/LegalDictionary/H/Hawala.aspx.
  • Nikos Passas, “Hawala and Other Informal Value Transfer Systems: How to Regulate Them?,” Special Issue: Regulation, Risk and Corporate Crime in a “Globalised” Era, Risk Management 5, no. 2 (2003): 49-59.
  • “Digital Currency Business E-Gold Indicted For Money Laundering And Illegal Money Transmitting,” U.S. Department of Justice, last modified April 27, 2011, accessed June 23, 2011, http://www.justice.gov/criminal/ cybercrime/egoldIndict.htm.
  • Annie Lowrey, “My Money Is Cooler Than Yours: Why the new electronic currency Bitcoin is a favorite of libertarian hipsters and criminals,” Slate, last modified May 18, 2011, accessed July 16, 2011, http://www.slate.com/ id/2294980/.
  • Detailed charts regarding recent bitcoin transactions and other statistics are available at bitcoin charts, accessed July 23, 2011, http://bitcoincharts.com/markets/.
  • Michael Protos, “Digital currency makes cocaine and heroin deliveries as easy as Domino’s,” Government Computer News, last modified June 9, 2011, accessed July 17, 2011, http://gcn.com/articles/2011/06/09/bitcoins- digital-currency-silk-road-charles-schumer-joe-manchin.aspx?s=gcndaily_100611.
  • Edward Castronova, “A cost-benefit analysis of real-money trade in the products of synthetic economies,” Info 8, no. 6 (2006): 51-68.
  • Richard Heeks, “Current Analysis and Future Research Agenda on ‘Gold Farming’: Real-World Production in Developing Countries for the Virtual Economies of Online Games” (IDPM Working Papers, Institute for Development Policy and Management, School of Environment and Development, University of Manchester, U.K., 2008): 2.
  • Choe Sang-Hun, “Seoul Warns of Latest North Korean Threat: An Army of Online Gaming Hackers,” New York Times, last modified August 4, 2011, accessed August 5, 2011, http://www.nytimes.com/2011/08/05/world/ asia/05korea.html.
  • "M-Pesa Moved Sh727 Billion Last Year,” Mobile Money Africa, last modified July 5, 2011, accessed July 17, 2011, http://mobilemoneyafrica.com/?p=3757. The annual total of 727 Kenyan shillings corresponds to a daily average of 2 billion Kenyan shillings. The corresponding average daily volume figure of over $24 million is a conservative calculation using an exchange rate of 81 Kenyan shillings to the dollar. During 2010, the exchange rate varied from about 75 to about 82 shillings to the dollar and was below 81, often by a substantial amount, for much of the year. See “US Dollar (USD) in Kenyan Shilling (KES),” Google Finance, http://www.google.com/ finance?q=USDKES for historical exchange rates between the two currencies.
  • “Savings” was defined in the MIT survey as holding funds for more than 24 hours.
  • People v. Western Express Intl., Inc., N.Y. Slip Op 03136 (App. Div., 1st Dept. 2011).
  • “Decision denying motion to dismiss appeal,” New York Supreme Court, Appellate Division, First Department, last modified April 19, 2011, accessed July 20, 2011, http://www.courts.state.ny.us/REPORTER/ 3dseries/2011/2011_03136.htm.
  • “Gartner Says Worldwide Mobile Device Sales to End Users Reached 1.6 Billion Units in 2010; Smartphone Sales Grew 72 Percent in 2010,” Gartner, Inc., last modified February 9, 2011, accessed July 21, 2011. http://www.gartner.com/it/page.jsp?id=1543014.
  • “Worldwide Mobile Device Sales,” Gartner.
  • Sending money in M-PESA is accomplished by selecting a menu option on the phone, entering the recipient’s phone number, and a PIN. A confirmation is sent to both the sender and recipient via SMS. See “Send (Transfer) Money,” Safaricom, accessed July 22, 2011, http://www.safaricom.co.ke/index.php?id=268.
  • “Facing the Unknown: Building a strategy for regulatory compliance in an uncertain landscape,” SWIFT white paper, last modified June 2011, accessed July 19, 2011, http://www.swift.com/resources/documents/ SWIFT_Regulatory_White_paper_201106_FINAL.pdf.
  • FSSCC members include many of the largest companies in the American financial industry. See “Council Members,” Financial Services Sector Coordinating Council, accessed July 22, 2011, https://www.fsscc.org/fsscc/ about/members.jsp.
  • “Memorandum of Understanding Between Department of Homeland Security Science and Technology Directorate and Department of Commerce National Institute of Standards and Technology and Financial Services Sector Coordinating Council for Critical Infrastructure Protection and Homeland Security,” last modified December 2010, accessed July 22, 2011, http://www.whitehouse.gov/sites/default/files/microsites/ostp/ FSSCC_DHS_NIST _MOU_12062010.pdf.
  • Mehmet Ercan Nergiz, Christopher Clifton, and Ahmet Erhan Nergiz, “Multirelational k-Anonymity.” IEEE Transactions on Knowledge and Data Engineering 21, no. 8 (August 2009): 1104-1117.
  • Colin Gray, “Thinking Asymmetrically in Times of Terror,” Parameters 32, no. 1 (2002): 5-6.