Skip to main content
Top

The Financial War on Crime and Terrorism

Opportunities and Challenges

  • 2025
  • Book

About this book

The financial crime landscape is rapidly evolving, and so too have government responses over the past decade. This book, a product of the Financial Integrity Hub (FIH), critically examines global vulnerabilities and proposes innovative solutions to combat illicit activities. It addresses the rising sophistication of financial crimes, fuelled by technological advances, globalisation, human fallibility, and regulatory gaps.

The book highlights the systemic nature of financial crime, connecting areas such as AML leadership challenges, exploitation of the gaming sector, AI in crime detection, wildlife trafficking financing, and opportunities in public-private and private-private information sharing. It explores how criminal activity can shift to exploit weaknesses in global systems, from corruption and godfatherism to state capture, underscoring the need for proactivity, along with suitable legal frameworks and enforcement.

Chapters explore the ethical dimensions of financial crime, including the role of professional facilitators, and highlight gaps in current legal frameworks, advocating stronger whistleblower protections, transparency in beneficial ownership, and adaptable regulations.

Through case studies and analysis, this book equips practitioners, policymakers, and academics with the knowledge to better prevent, detect, and mitigate financial crime, contributing to a more secure, transparent global financial system. It is essential reading for professionals across finance, law enforcement, regulation, and academia seeking to understand and mitigate financial crime risks.

Chapter “Geopolitcal of State Capture: Systemic Corruption as a Professional Service” is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

Table of Contents

  1. Frontmatter

  2. Financial Crime Prevention in an Age of Paradox

    Jamie Ferrill, Louis de Koker, Doron Goldbarsht
    This chapter delves into the intricate world of financial crime prevention, highlighting the paradoxes that arise from global enforcement regimes and technological advancements. It explores the historical context of financial crime, tracing its evolution from the 1980s to the present day, and examines the role of the Financial Action Task Force (FATF) in setting global standards. The chapter also discusses the impact of technological innovations, such as regulatory technology (RegTech) and supervisory technology (SupTech), on financial crime prevention efforts. It highlights the unintended consequences of these measures, including the rise of financial exclusion and the challenges of implementing effective prevention strategies. The chapter concludes by emphasizing the need for a more nuanced and evidence-based approach to financial crime prevention, one that balances the opportunities and challenges presented by technological advancements and global enforcement regimes.
  3. Leadership in the Evolving Landscape of Financial Crime: Navigating AML/CTF Risks and Controls

    Jamie Ferrill, Rachel Southworth
    This chapter delves into the pivotal role of leadership in the effectiveness of Anti-Money Laundering (AML) and Counter-Terrorist Financing (CTF) compliance programs. It explores the human and social-organisational dynamics that contribute to the success or failure of these programs, an area often overlooked in the industry. The text introduces a theoretical construct for effectiveness in AML/CTF compliance, emphasizing the importance of leadership in achieving desired outcomes. It also presents a case study of leadership and AML/CTF compliance program ineffectiveness, highlighting the underexplored role of leadership as a causal factor in compliance failures. Furthermore, the chapter discusses the challenges in measuring the effectiveness of AML/CTF compliance at global, national, and institutional levels, and the role of leadership in navigating these complexities. The conclusion underscores the necessity of effective leadership in the ever-evolving landscape of financial crime, paving the way for future research and practical applications in the field.
  4. FATF and the Conundrum of Public-Private Sector Intelligence and Information Sharing

    Paula Chadderton
    The chapter delves into the critical role of the Financial Action Task Force (FATF) in promoting information sharing between public and private sectors to combat financial crimes such as money laundering, terrorism financing, and proliferation financing. It explores the current landscape of information sharing, highlighting the importance of data, information, and intelligence in the fight against financial crimes. The text identifies key barriers and risks in public-private sector information sharing, including legal, technological, political, and cultural barriers. It also examines the role of Financial Intelligence Units (FIUs) and the limitations of the FATF Standards in supporting two-way information sharing. The chapter concludes with practical recommendations for improving information sharing practices, emphasizing the need for clear, specific provisions in the FATF Standards to empower and facilitate effective collaboration between public and private sectors. By addressing these issues, the chapter aims to enhance the overall effectiveness of AML/CTF/CPF efforts and better equip professionals to mitigate financial crime risks.
  5. Private to Private: The Next Frontier of Financial Intelligence Sharing

    Doron Goldbarsht, Timothy Goodrick
    This chapter delves into the transformative potential of private-to-private (P2P) information sharing in the fight against financial crime. It begins by outlining the evolution of public-private partnerships (PPPs) and their limitations in providing a complete picture of financial transactions. The text then argues for P2P information sharing as the next frontier, offering enhanced detection and disruption of financial crimes such as money laundering and terrorism financing. The chapter explores the benefits of P2P sharing, including improved risk assessments, operational efficiency, and reduced de-risking. It also discusses the challenges and legal considerations, highlighting the need for secure data-sharing channels and regulatory alignment. Case studies from the United States, Singapore, and the Netherlands illustrate different models of P2P information sharing, providing practical insights into implementation. The chapter concludes by emphasizing the need for further research and collaboration to overcome barriers to participation and enhance the effectiveness of P2P information sharing in combating financial crime.
  6. Network Analytics and Generative Artificial Intelligence: A Hybrid Approach to Money Laundering Detection

    Milind Tiwari
    This chapter delves into the innovative approach of combining network analytics with generative artificial intelligence to bolster money laundering detection efforts. It begins by outlining the traditional methods of money laundering and the challenges faced by current detection systems. The text then introduces the concept of using graph databases to model and analyse complex financial networks, highlighting how this can reveal hidden relationships and patterns that are often obscured in traditional data formats. A significant portion of the chapter is dedicated to exploring the role of generative AI, particularly large language models (LLMs), in enhancing these investigations. It demonstrates how LLMs can be used to generate sophisticated queries, uncover new lines of inquiry, and make advanced data analysis more accessible to a broader range of users. The chapter also discusses the importance of data quality, ethical considerations, and the need for human oversight in ensuring the reliability of AI-driven insights. Practical examples and case studies are provided to illustrate the effectiveness of this hybrid approach, including the identification of suspicious activities such as lack of beneficial ownership disclosure, shared addresses among multiple companies, and directors holding numerous executive appointments. The chapter concludes by highlighting the potential of this integrated approach to significantly enhance the capabilities of financial institutions and regulatory bodies in detecting, investigating, and disrupting illicit financial flows. It also outlines future research directions, including the development of robust methodologies for LLM integration, exploring the scalability of the hybrid approach, and fostering interdisciplinary collaboration to ensure responsible deployment of these technologies.
  7. Illegal Wildlife Trade as a Method of Financing Terrorism

    Cayle Lupton
    This chapter explores the potential of illegal wildlife trade (IWT) as a method of financing terrorism, focusing on the African continent. It begins with an overview of the terrorism landscape in Africa, highlighting the activities of groups like Al-Shabaab and Boko Haram, and their known and suspected financing methods. The chapter then analyzes the factors that contribute to the appeal of IWT for terrorism financing, including profitability, proximity to poachers and wildlife, porous borders, reliance on cash and informal payment systems, and AML/CTF considerations. The discussion also covers the challenges in addressing the terrorism financing-IWT nexus, such as the lack of awareness and resources for financial investigations in wildlife cases. The chapter concludes by emphasizing the need for an integrated approach involving multiple stakeholders to effectively address this complex issue. Readers will gain insights into the evolving financing mechanisms of terrorist groups, the role of IWT in terrorism financing, and the importance of cross-discipline collaboration in combating this threat.
  8. Practice to Deceive: A Taxonomy of Money Laundering Deception Based on US and Australian Case Studies

    Ben Scott
    This chapter examines the role of deception in money laundering, focusing on the legal frameworks in the US and Australia. It introduces a taxonomy of deception developed by cybersecurity researchers Rothstein and Rowe, which is applied to two real-life case studies: the Australian Changjiang Financial case and the US Toronto Dominion Bank case. The chapter explores how deception is used in money laundering, distinguishing between primary deception practiced by criminal organizations and secondary deception practiced by financial service providers. It also discusses the challenges of detecting and preventing money laundering, highlighting the importance of understanding deception in this context. The chapter concludes with insights into how governments and the private sector can more effectively detect, disrupt, and prevent financial crime.
  9. Geopolitics of State Capture: Systemic Corruption as a Professional Service

    • Open Access
    Nicholas Donaldson, Christian Leuprecht
    This chapter delves into the geopolitics of state capture, a systemic corruption phenomenon that has become embedded in global capital markets. It examines how elites instrumentalise state institutions to extract rents and launder proceeds through transnational professional enablers, notably financial institutions. The chapter also explores how state capture transcends self-serving corruption, with countries like China and Russia using it as a tool for hybrid warfare and grey-zone tactics. The text provides a proof-of-concept for a theoretically-driven comparative approach to state capture, drawing on case studies of the Eastern European Laundromat and the Zuma administration in South Africa. It also conceptualises the failures of legal and regulatory regimes through a global state capture lens and expands upon nascent research on state capture as a political modality. The chapter concludes that state capture is not merely an outcome but a dynamic and strategic mode of governance with significant geopolitical implications.
    Download PDF-version
  10. Corrupt Elites and Godfathers in Nigeria: Structural Impunity and the Undermining of Accountability

    Jackie H. Harvey, Petrus C. van Duyne
    This chapter examines the pervasive issue of political elitism and godfatherism in Nigeria, focusing on their historical context, characteristics, and consequences. It begins by exploring the concept of 'elite', its various definitions, and the challenges in delineating it. The chapter then delves into the phenomenon of godfatherism, its role in political decision-making, and its link to corruption. It also discusses the impact of these issues on Nigeria's democracy and economic development. The analysis is based on a review of literature, media sources, and NGO reports, providing a comprehensive overview of the subject. The chapter concludes by highlighting the need for further research and the importance of addressing these issues to strengthen Nigeria's democratic processes and promote economic growth.
  11. Dangerous Play: AML/CTF/CPF Risks in the Gaming Sector

    Jeffrey Simser
    This chapter delves into the complex interplay between the gaming sector and money laundering, revealing how criminal organizations exploit vulnerabilities in both regulated and unregulated markets. It explores the three stages of money laundering—placement, layering, and integration—and how gaming platforms can be used to disguise illicit wealth. The chapter examines regulatory systems in Canada, highlighting the role of FINTRAC and provincial regulators in mitigating money laundering risks. It also discusses various money laundering typologies, including the Vancouver Method, junket operators, and the use of underground banking networks. Additionally, the chapter touches on the risks posed by match-fixing, proliferation financing, and the use of cryptocurrency in money laundering schemes. The conclusion emphasizes the need for increased political awareness, improved regulatory systems, and operational cooperation to combat the growing threat of money laundering in the gaming industry.
  12. International Arbitration and Money Laundering: Is There an Actual Issue?

    Robert Walters
    This chapter examines the evolving landscape of international arbitration and its potential role in money laundering activities. It explores the challenges posed by the principle of confidentiality in detecting and reporting illicit financial transactions. The chapter delves into the use of advanced technologies such as blockchain, artificial intelligence, and quantum computing in arbitration processes and their implications for money laundering detection. It also compares arbitration rules and institutional frameworks across various jurisdictions, highlighting the complexities and inconsistencies in addressing money laundering within arbitration proceedings. The chapter concludes by discussing the ethical and legal obligations of arbitrators in reporting suspected money laundering activities, emphasizing the need for further research and regulatory clarity in this area.
  13. The Impact of the Financial Action Task Force (FATF) Standards and Focus: From Effectiveness to Effect

    Nicholas Morris, Louis de Koker
    The chapter delves into the role and impact of the Financial Action Task Force (FATF) in setting and enforcing global standards for anti-money laundering and combating the financing of terrorism (AML/CFT). It explores the effectiveness of FATF's measures, focusing on the correlation between FATF activities, technical compliance, and governance outcomes. The chapter also examines the unintended consequences of FATF standards, such as financial exclusion and higher remittance costs. It provides a detailed analysis of FATF's impact on various countries, using a range of indicators and data sources. The chapter concludes that while FATF has achieved high levels of technical compliance, there is little evidence of a meaningful 'real-world' impact on governance or crime prevention outcomes. It suggests that the FATF's focus on larger economies in the fifth round of mutual evaluations may increase the overall effectiveness of the implementation of the FATF standards.
  14. The Financial War on Crime and Terrorism—Important Research Questions

    Louis de Koker, Doron Goldbarsht, Jamie Ferrill
    This chapter explores the critical research questions shaping the future of anti-money laundering (AML), counter-terrorism financing (CTF), and counter-proliferation financing (CPF) efforts. It delves into the optimal strategies for AML/CTF/CPF measures, the challenges in measuring their effectiveness, and the transition from reactive to proactive approaches. The role of Artificial Intelligence (AI) as both a risk vector and an opportunity for detection and prevention is also examined. Additionally, the chapter discusses the impact of shifting geopolitical realities and emerging technological risks on financial crime control measures. It provides a historical context, tracing the evolution of financial crime policy from the 1970s to the post-9/11 era, and highlights the complexities and urgencies of these questions in the ongoing financial war on crime and terrorism. The chapter concludes by emphasizing the need for improved alignment between researchers, policymakers, compliance officers, and law enforcement to build a resilient, effective, and efficient AML/CTF/CPF framework.
  15. Correction to: Geopolitics of State Capture: Systemic Corruption as a Professional Service

    • Open Access
    Nicholas Donaldson, Christian Leuprecht
    This chapter delves into the geopolitics of state capture, focusing on systemic corruption as a professional service. It presents corrected Venn diagrams that illustrate the overlapping roles and activities of corporate and legal service providers, financial institutions, and public relations firms. These diagrams highlight shared practices such as aggressive tax avoidance, money laundering, reputational laundering, and political lobbying, as well as strategic philanthropy and brokerage. The chapter also includes a bar and line chart showing FCPA enforcement data from 1977 to 2024, revealing fluctuations and notable peaks in enforcement actions involving intermediaries. Additionally, a bar chart breaks down FCPA enforcement actions by the type of intermediary involved, emphasizing the predominance of actions involving agents, consultants, and brokers. The chapter concludes with a comprehensive analysis of the data, providing insights into the patterns and prevalence of corruption in various sectors.
    Download PDF-version
Title
The Financial War on Crime and Terrorism
Editors
Doron Goldbarsht
Louis de Koker
Jamie Ferrill
Copyright Year
2025
Electronic ISBN
978-3-032-06360-1
Print ISBN
978-3-032-06359-5
DOI
https://doi.org/10.1007/978-3-032-06360-1

PDF files of this book have been created in accordance with the PDF/UA-1 standard to enhance accessibility, including screen reader support, described non-text content (images, graphs), bookmarks for easy navigation, keyboard-friendly links and forms and searchable, selectable text. We recognize the importance of accessibility, and we welcome queries about accessibility for any of our products. If you have a question or an access need, please get in touch with us at accessibilitysupport@springernature.com.

Premium Partner

    Image Credits
    Salesforce.com Germany GmbH/© Salesforce.com Germany GmbH, IDW Verlag GmbH/© IDW Verlag GmbH, Diebold Nixdorf/© Diebold Nixdorf, Ratiodata SE/© Ratiodata SE, msg for banking ag/© msg for banking ag, Governikus GmbH & Co. KG/© Governikus GmbH & Co. KG, Horn & Company GmbH/© Horn & Company GmbH, EURO Kartensysteme GmbH/© EURO Kartensysteme GmbH, Jabatix S.A./© Jabatix S.A.