How to identify dirty money

Nov 09, 2010

Global standards for preventing money laundering and terrorism financing have come under heat after substantial evidence has shown they do not work.

The problem, Case Western Reserve financial law expert Richard K. Gordon says, is that the private sector-mostly in the form of financial institutions-is required to monitor transactions and report to the government those that raise suspicion.

However, the individuals responsible for such monitoring don't have sufficient expertise, access to data or incentives to do so effectively. , on the other hand, doesn't have enough responsibility in identifying suspected cases of laundering or terrorism financing.

"Dividing these tasks between the private sector and law enforcement is inherently inefficient," Gordon says. "It separates expertise and data, making it difficult and unlikely to effectively identify possible criminals."

Explore further: Consumer sentiment brightens holiday spending

More information: Gordon will outline the problems with current preventive measures and offer suggestions for change in the March 2011 issue of the Duke Journal of Comparative & International Law.

add to favorites email to friend print save as pdf

Related Stories

New alliance to study and combat ID theft

Jul 01, 2006

A dramatic increase in the number of investigations into identity theft and fraud over the past few years has sparked a partnership between law enforcement, government, the corporate world and academia.

Recommended for you

Consumer sentiment brightens holiday spending

1 hour ago

Consumer confidence posted its fourth consecutive monthly gain in November, rising to its highest level since July 2007, according to the Thomson Reuters/University of Michigan Surveys of Consumers.

Over-identifying restrictions in economic analysis

Nov 25, 2014

The analysis of empirical economics has long made use of a tool called the generalized method of moments (GMM). This method is used as a generic way of estimating parameters in an empirical model where the ...

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.