Matching Items (2)
132032-Thumbnail Image.png
Description
Money laundering and drugs are commonly thought to go hand in hand; however, money laundering has many forms and can take place in a variety of industries and by the use of many instruments. The main source of Money Laundering data is Suspicious Activity Reports (SARs) which are collected by

Money laundering and drugs are commonly thought to go hand in hand; however, money laundering has many forms and can take place in a variety of industries and by the use of many instruments. The main source of Money Laundering data is Suspicious Activity Reports (SARs) which are collected by the Treasury Department. This paper outlines a number of ways Money Laundering can occur and analyzes Money Laundering-related SAR data to determine if SARs are more likely to originate from Depository Institutions compared to other industries. This paper concludes with a discussion of possible limitations of SARs and suggests improvements to SARs and bank AML processes.
ContributorsOwens, Madeleine (Author) / Loftus, Charles (Thesis director) / White, Roger (Committee member) / School of Accountancy (Contributor) / School of Criminology and Criminal Justice (Contributor) / Barrett, The Honors College (Contributor)
Created2019-12
171276-Thumbnail Image.png
Description
Despite cryptocurrencies exploding in popularity over the past decade, the US government has engaged very little with them and their underlying technology, blockchain. This discrepancy between widespread use and a lack of regulation has constructed a murky environment remarkably profitable to criminal actors and even some nation-states. In particular, the

Despite cryptocurrencies exploding in popularity over the past decade, the US government has engaged very little with them and their underlying technology, blockchain. This discrepancy between widespread use and a lack of regulation has constructed a murky environment remarkably profitable to criminal actors and even some nation-states. In particular, the blockchain's technical characteristics are being exploited to financially incentivize ransomware, theft, sanctions evasion, espionage and more. Through a critical examination of its history and applications, this thesis explores how blockchain technology undermines deterrence efforts and poses serious national security threats.
ContributorsGrossman, Daniel (Author) / Schmidle, Robert (Thesis director) / Whittaker, Scott (Committee member) / Anderson, Ian (Committee member) / Barrett, The Honors College (Contributor) / School of Life Sciences (Contributor)
Created2022-12