Handbook of Research on Counterfeiting and Illicit Trade
Show Less

Handbook of Research on Counterfeiting and Illicit Trade

Edited by Peggy E. Chaudhry

This unique Handbook provides multiple perspectives on the growth of illicit trade, primarily exploring counterfeits and internet piracy. It includes expert opinion on a wide range of topics including the evaluation of key global enforcement issues, government and private-sector agency initiatives to stifle illicit trade, and the evolution of piracy on the internet. The authors also assess the efficacy of anti-counterfeiting strategies such as targeted consumer campaigns, working with intermediaries in the supply chain, authentication technology, and online brand protection.
Buy Book in Print
Show Summary Details
You do not have access to this content

Chapter 4: Reaching beyond banks: how to target trade-based money laundering and terrorist financing outside the financial sector

Ross S. Delston and Stephen C. Walls

Abstract

Anti-money laundering and combating the financing of terrorism (AML/CFT) measures have succeeded in restricting the two traditional avenues of money laundering, namely, the abuse of financial intermediaries and the physical movement of money across borders. Consequently, international criminal and terrorist organizations have turned to trade-based money laundering (TBML) to conceal and legitimize their funds, as this is a channel that remains relatively untouched by international AML/CFT efforts. This abuse of the global trade network has received increasing recognition from the Financial Action Task Force, the international standard-setter, as the next front in AML/CFT. Because TBML methods may be used not only to launder money, but also to finance international terrorism, facilitate weapons proliferation, and conceal and transport weapons of mass destruction (WMDs), this article proposes a far-reaching solution—that those in the international supply chain be required by law to adopt AML/CFT safeguards to protect their businesses, including filing suspicious activity reports, identifying their customers, and designating an AML/CFT compliance officer.

You are not authenticated to view the full text of this chapter or article.

Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.

Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.

Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.


Further information

or login to access all content.