. Military Space News .
Terror And Crime Go Digital

This virtual world of role-playing games presents a number of challenges to U.S. law enforcement. First and foremost, no specific laws apply to it. Second, by virtue of its anonymous and virtual nature, it is nearly impossible to track real money deposited into and cashed out of the game. Third, the challenge of identification is compounded by the fact that neither players nor recipients are subject to any rigorous due diligence beyond the disclosure of an e-mail address, and even that can be spoofed. Fourth, there are no limits on the amount of money -- real or virtual -- that may be used in the game. Furthermore, since there are no clear jurisdictions, violations of laws are hard to prosecute.
by Rachel Ehrenfeld And John Wood
UPI Outside View Commentators
New York (UPI) May 23, 2007
Emerging digital technologies to move money instantaneously and anonymously open up new possibilities for criminals and terrorists, while regulatory and law-enforcement agencies are limping far behind. On May 3, at the release of the 2007 Money Laundering Strategy, the U.S. Treasury spokesperson was pleased to note: "Focusing on well-established money laundering methods and emerging trends identified in the Assessment, we have created a robust strategy for combating money laundering, deterring criminals, and addressing areas vulnerable to exploitation."

Yet the latest digital advances open to criminals and terrorists -- mobile phones or other mobile devices to secretly transfer money globally, or M-payments; gambling; and transfer of virtual money through online role-playing games, or RPGs -- are missing from this long-awaited government strategy.

The fast-growing pace and value of the virtual economy led the Congressional Joint Economic Committee to study the possibility of taxing virtual assets generated by online role-playing games, thus raising a myriad of issues: What method of valuation will apply? How will fair market value be determined? Where does the tax instance arise in cyberspace? What part of the goods and services are subject to state tax? How does one levy and enforce the tax in cyberspace? What tax provisions will apply for international transactions?

While the United States banned online gambling in October 2006, it has no regulations whatsoever to control specifically the use of mobile phones for gambling online. And no country, including the United States, regulates online role-playing games, which in 2006 had more than 14 million subscribers, generating more than $1 billion in revenues ($576 million in North America and $299 million in Europe).

This virtual world of role-playing games presents a number of challenges to U.S. law enforcement. First and foremost, no specific laws apply to it. Second, by virtue of its anonymous and virtual nature, it is nearly impossible to track real money deposited into and cashed out of the game. Third, the challenge of identification is compounded by the fact that neither players nor recipients are subject to any rigorous due diligence beyond the disclosure of an e-mail address, and even that can be spoofed. Fourth, there are no limits on the amount of money -- real or virtual -- that may be used in the game. Furthermore, since there are no clear jurisdictions, violations of laws are hard to prosecute.

Moving funds from one criminal/terrorist to another can work like this: A criminal/terrorist using fake IDs opens a virtual account in an online game. He then deposits real money via an ATM into his virtual account. With his virtual currency he buys virtual real estate from his co-conspirator and transfers virtual payment for the property to the seller's virtual account. The seller then converts the virtual currency into real money and withdraws it from an ATM.

Already in 2001, the Financial Action Task Force noted that "Internet-based gambling operations can also act as a haven for illegal cash-washing operations." Indeed, a few criminal cases have been prosecuted by the Justice Department for laundering hundreds of million of dollars worth of Internet gambling wagers. But the new mobile technology now allows criminals and terrorists operating through remote gambling accounts to store funds until they can be safely transferred into legitimate accounts of businesses or charities.

Asked about the lack of appropriate measures to counter this problem, U.S. Financial Crimes Enforcement Network spokeswoman Anne Marie Kelly told Brett Wolf, an anti-money laundering consultant with Complinet Inc., on May 7, "The bureau is aware of the laundering and terror finance risks posed by emerging payment technologies ... (and have) an ongoing dialogue with the industries involved ... to study and work with (them) in order to provide the law enforcement community with guidance on how these systems operate and the money laundering challenges they may present." However, she did not say how long this "study" will take, or what FinCEN will do in the meantime to control this problem.

Director of National Intelligence Michael McConnell's call to include future technological advances within the scope of the updated 1978 Foreign Intelligence Surveillance Act is crucial for our national security. Congress and/or Treasury should also initiate a law requiring the communications industry to design adequate real-time tracking and blocking mechanisms in each and every cellular phone or mobile device to prevent criminals and terrorists from transferring funds freely and anonymously.

(Rachel Ehrenfeld is author of "Funding Evil: How Terrorism is Financed and How to Stop It" and a member of the Committee on the Present Danger. John Wood is the president of The Playfair Group.)

(United Press International's "Outside View" commentaries are written by outside contributors who specialize in a variety of important issues. The views expressed do not necessarily reflect those of United Press International. In the interests of creating an open forum, original submissions are invited.)

Source: United Press International

Email This Article

Related Links
US Congressional Joint Economic Committee
Cyberwar - Internet Security News - Systems and Policy Issues

China Sees More Backing For Home-Grown Encryption Standard
Beijing (AFP) May 23, 2007
A growing number of Chinese telecom and computer companies support a local encryption standard for wireless Internet that challenges US technology in the field, state media said Wednesday. The WAPI encryption standard, a Chinese-made rival of the US-backed 802.11 standard, has received the endorsement of companies such as cellphone operator China Mobile and PC vendor Lenovo, the China Daily reported.







  • US Missile Shield Could Relaunch Arms Race Warns Putin
  • NATO Reassures Russia Over Eastern Moves
  • How Much Will Beijing Pay For The Olympics
  • Is China A Military Threat Or Another Paper Tiger

  • North Korea Protests South Korean Computer Wargames As Banking Crisis Follows Old Patterns
  • The EU At A Dead End Over Iran As US Aramda Builds In Gulf
  • North Korea Bank Settlement Taking Too Long Says South Korea
  • Amid Tensions With Tehran, US Displays Naval Power In Gulf

  • New Raytheon-Built Joint Standoff Weapon Will Hit Moving Maritime Targets
  • Gripen Conducts High Altitude Firing With Meteor
  • Lockheed Martin-Built Trident II D5 Successfully Launched In Atlantic Two-Missile US Navy Test
  • Latest Chinese Missile To Target US Carriers

  • A Weekend Of Missile Tests And Deployments Across The Pacific
  • As Czechs Protest At ABM Govt Threatens Return To Conscription
  • In Search Of A Compromise For ABM Deployment Across Europe
  • BMD Collision Course

  • Australia Fears Jet Flight Guilt Could Hit Tourism
  • New FAA Oceanic Air Traffic System Designed By Lockheed Martin Fully Operational
  • Nondestructive Testing Keeps Bagram Aircraft Flying
  • NASA Seeks New Research Proposals

  • Northrop Grumman Presents Risk Reduction Approach To BAMS Program
  • US Army MQ-8B Fire Scout Unmanned Aerial Vehicle Completes First Engine Run
  • New Generation Of UAVs Could Borrow A Few Secrets From Bats
  • Northrop Grumman Demos Low-Cost Autonomous Control System For Recon Planes

  • Democrats Prepare New Strategy On Iraq War
  • Joint Organization Trains Troops To Defeat IEDs
  • Iraq Set To Spend Billions On New Weapons As US Breaks Up Anti-Chopper Cell
  • War Czar Compromise - Part 3

  • Cobasys Strengthens Hybrid Heavy-Duty Truck Activities With US Army High-Tech Vehicles
  • Laser-Based Device Offers Alternative To Video Surveillance
  • NGC's Airborne Signals Intelligence Payload Embarks On the Performance Phase of Its Flight Test Program
  • Excalibur Team Tests Extended-Range Precision-Guided Artillery Projectiles

  • The content herein, unless otherwise known to be public domain, are Copyright 1995-2006 - SpaceDaily.AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA PortalReports are copyright European Space Agency. All NASA sourced material is public domain. Additionalcopyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by SpaceDaily on any Web page published or hosted by SpaceDaily. Privacy Statement