Here we are going to discuss about how the Amendments to the Bank Secrecy Act of 1970, commonly referred to as the Money Laundering Control Act of 1986, apply to cyberspace and cyberlaundering. Without delving into the actual techniques involved in using public keys, blind signatures or any other encryption or decryption device, the best way to explain how anonymous digital cash could benefit money launderers' is by example. The following example will be used to demonstrate the law's application.
Doug Drug Dealer is the CEO of an ongoing narcotics corporation. Doug has rooms filled with hard currency which is the profits from his illegal enterprise. This currency needs to enter into the legitimate, mainstream economy so that Doug can either purchase needed supplies and employees, purchase real or personal property or even draw interest on these ill-gotten gains. Of course, this could be accomplished without a bank account, but efficiency demands legality. Anyhow, Doug employs Linda Launderer to wash this dirty money. Linda hires couriers ("smurfs") to deposit funds under different names in amounts between $7500 and $8500 at branches of every bank in certain cities. This operation is repeated twice a week for as long as is required. In the meantime, Linda Launderer has been transferring these same funds from each branch, making withdrawals only once a week, and depositing the money with Internet banks that accept ecash. To be safe, Linda has these transfers limited to a maximum of $8200 each. Once the hard currency has been converted into digital ecash, the illegally earned money has become virtually untraceable; anonymous. Doug Drug Dealer now has access to legitimate electronic cash.
Doug Drug Dealer is, of course, likely to be found guilty of more than just participating in a money laundering scheme. However, how the law applies to Linda Launderer and the Internet banks is more confusing. The purpose of the 1986 Act was to specifically criminalize the structuring of transactions so as to avoid the reporting requirements. Linda and her army of couriers are almost certainly violating structuring regulations by depositing small amounts in regular bank accounts. The problem is how to apply current money laundering law to cyberlaundering.
In the scenario above, Linda Launderer transfers sums of money less than $10,000 from non-Internet bank accounts to Internet-based ecash accounts. If the Internet bank is FDIC insured, as Mark Twain Bank then federal depository regulations may apply. However, the cyberbank will not automatically be required to file a CTR regarding these transactions as all are under the $10,000 filing requirement. Nevertheless, if any employee of the Internet bank has even a suspicion of structuring, a CTR may be filed. As in the tangible banking world, the information contained on a CTR is only as insightful as the information presented by the bank conducting the prior transaction.In essence, each record in the chain of transfers is only as strong as the previous recordation.
The catch is that Linda Launderer's transfer was deposited into an ecash account. According to one cyberbank which currently accepts ecash, ecash accounts are not FDIC insured. A lack of federal insurance protection is understandable for the reason that digital money is currently created by private vendors, rather than the Federal Reserve. Thus, digital cash does not enter into the marketplace of hard currency thereby affecting monetary supply or policy, yet.
Since Linda Launderer's transfer was deposited into a non-FDIC insured, and thus, presumably non-federally regulated account, then there should be no mandatory compliance with the filing regulations contained within the Money Laundering Control Act of 1986. If these assumptions prove correct, whether digital money is anonymous or not will be of less relevance to money launderers and law enforcement. If certain cyberbanks, or even specific non-FDIC currency accounts within a cyberbank are able to operate outside the reach of current federal regulations, laundering on the Web may become one of the most rapidly expanding growth industries. It should be remembered that a criminal organization desires to clean its dirty money, not necessarily protect their deposits from institutional banking failures.
Once the ecash account has been established, digital funds can be accessed from any computer that is properly connected to the Intenet. A truly creative, if not paranoid, launderer could access funds via telnet. Telnet is a basic command that involves the protocol for connecting to another computer on the Internet.Thus, Linda Launderer could transfer illegally earned funds from her laptop on the Pacific Island of Vanuatu, telneting to her account leased from any unknowing Internet Service Provider in the United States and have her leased Internet account actually call the bank to transfer the funds, thus concealing her true identity. This would, of course, leave an even longer trail for law enforcement to follow. Anyhow, ecash, being completely anonymous, allows the account holder total privacy to make Internet transactions. Thus, the bank holding the digital cash, as well as any seller which accepts ecash, has virtually no means of identifying the purchaser. Therefore, the combination of anonymous ecash and the availability of telnet may give a launderer enough of a head start to evade law enforcement, for the moment.
In the world of earth and soil, money can be laundered by the purchase of real and personal property. However, any cash transaction over $10,000 is subject to a transaction filing requirement. Real estate agents and automobile dealers, to name a few, are prime targets for the deposit of large sums of cash. In fact, such agents and dealers have been indicted for allowing drug money to be used to purchase expensive property.
51
On the Internet, anonymous ecash would allow for anonymous purchases of real and personal property. This fact yields at least two separate, but interrelated problems. First, the launderer or drug dealer will be able to discretely use illegally obtained profits to legitimately purchase property. However, currently, the opportunity to spend thousands of dollars of digital money, or ecash for that matter, on the Internet is virtually nonexistent. Second, the temptation for automobile and real property dealers to become players in the game for anonymous ecash seems overwhelming. If a seller or dealer understands that it can not possibly trace who spent ecash at its establishment, the fear of becoming involved with dirty money is drastically reduced.Under current law, a seller of property must file a CTR for any cash transaction over $10,000. If the purchaser's identity is anonymous, and even the bank can not trace the spent ecash, the force of the Money Laundering Control Act of 1986 is withered into mere words on a page. Of course, Congress could attempt to legislate in this new area of commerce.
Obviously, transferring hard currency to ecash and then spending the ecash is an appealing opportunity to potential launderers'. What if the ecash is then transferred back to a regular hard currency account? This may seem a foolish act as the entire purpose is to reap the benefits of anonymous ecash. However, presently, there are no opportunities to purchase automobiles or real property by the exclusive use of anonymous ecash. Thus, the desire to convert private and untraceable ecash into a more functional means of purchasing is understandable.
Whether a regular, non-Internet currency account already exists or must be created to deposit the transferred ecash into may be irrelevant. Filing a CTR would be a legal necessity if the transfer amount is over the $10,000 reporting limit, as the transfer will deposit hard currency in a tangible, institutionalized, and regulated bank account. A transfer from completely anonymous ecash to hard currency might alert law enforcement as to the existence of the ecash account. While this alone would not track down laundered money, it might put a suspicious agent on notice.
In summary, Linda Launderer has knowingly structured financial transactions so as to avoid reporting requirements. Under current law she is in violation of The Money Laundering Control Act of 1986. However, if the cyberbanks in which she has ecash deposits are outside the reach of current banking regulations, these banks have no duty to file any currency transaction reports. Nevertheless, assuming that cyberbanks which accept anonymous ecash are somehow subject to the same laws and regulations which financial institutions in the tangible world are, Linda must first be caught before she can be found guilty. This is where anonymous ecash may save Linda from fines and jail time. Even if cyberbanks are required to file transactional reports pertaining to ecash, the reports will be virtually useless, as the banks have no knowledge as to which funds are Linda's. Thus, Linda, our overly creative launderer, and Doug, our devious drug dealer, may enjoy the benefits of completely anonymous money laundering. That is, unless Congress decides to attempt legislation in the area of digital money and virtual banking, or FinCen is somehow granted the constitutional authority to secretly monitor all cyberbanking transactions, despite its lack of accountability to the general population.
Reference:
http://osaka.law.miami.edu/~froomkin/seminar/papers/bortner.htm