MONEY LAUNDERING AND TRANS-NATIONAL ORGANIZED CRIME -THE NEXUS BY - PREETI ADHIKARY

MONEY LAUNDERING AND TRANS-NATIONAL ORGANIZED CRIME -THE NEXUS
 
AUTHORED BY - PREETI ADHIKARY
 
 

Money Laundering and Terrorist activities-The Nexus

1.      Terrorism Financing Methods: An Overview by Michael Freeman and Moyara Ruehsen Vol. 7, No. 4, Terrorism Research Initiative, August 2013.
How terrorists move money and how this might be halted is a topic that is sometimes neglected. Instead, academics and decision-makers concentrate on either the means of financing terrorism or the items that terrorists buy, such as weapons and the actual attacks. However, the transfer of funds is a crucial intermediary step. Terrorist organizations frequently solicit money in locations other than where they are located and other than potential attack sites.
 
  1.  Baradaran, Shima, et al. “Funding Terror.” vol. 162, no. 3, University of Pennsylvania Law Review, 2014,.
Terrorists utilize a variety of financial instruments to track their actions, including money laundering, charity, and shell corporations. To avoid being discovered, terrorists use money laundering. Terrorists conceal their unlawful sources of revenue by using money laundering to disguise them and make them seem genuine. Shell businesses are crucial to this layering process since transactions involve the movement of money verbally. To purportedly trustworthy businesses. To counter the financing of terrorism through money laundering, informal value transfer networks are widely used throughout East and Asia. To prevent corruption and stop the financing of terrorism both domestically and abroad, the legislation includes a provision for financial openness.
 
  1. Nicola Limodio, “Terrorism Financing, Recruitment, and Attacks: Evidence from a Natural Experiment”. No. 32, Chicago Booth Research Paper, April 2019,
To understand how timing and location of funding influence attacks, This study investigates the relationships between funding, recruiting, and terrorist acts. There is a correlation between the timing and place of money and attacks, nevertheless, terrorist organizations experience difficulty storing or transferring their funds. In such circumstances, local circumstances, The success of an assault may be greatly influenced by factors like the ease with which recruits may be found and the sophistication of the attacks. Documenting the connection between the timing and location of finance and terrorist actions can therefore be extremely important from two perspectives.
 
  1. Akartuna, Eray Arda, Shane D. Johnson, and Amy E. Thornton. "The money laundering and terrorist financing risks of new and disruptive technologies: a futures-oriented scoping review." 1-36, Security Journal, (2022)
This article is centered on new disruptive technology, which includes financial technology like fintech, new payment systems, and distributed ledger technology like cryptocurrencies. which embodies the contemporary manner of concluding financial transactions and has a lengthy history of ML/TF dangers. Financial services are currently the major target of anti-money laundering and counter-terrorism funding regulations. Financial institutions speak with you and your clients to understand their typical transactional patterns. The manipulation of digital invoices is comparable to transaction laundering. Future technologies can be future-proofed during their development phases by using these tendencies as the foundation for risk assessments.
 
  1. Isoaho, Essi, and Ida-Ellen Kaski. National risk assessment of money laundering and terrorist financing 2021. Ministry of Finance, 2022.
Based on EU directives and FATF guidelines, Finland's national legislation on the prevention of money laundering and terrorist funding. The Financial Intelligence Unit Act and the Anti-Money Laundering Act are preventive laws from an administrative standpoint, whereas the core provisions of money laundering and terrorist financing in the Criminal Code deal with the retrospective assessment of the activities. mostly through fraud, currency exchange, and providers of hawala payment services. They do a wonderful job of explaining how the COVID-19 outbreak has affected people. Legal professionals have high scores for money laundering and financing terrorism since the real person behind them isn't acting in their name. The NPO sector's risk is also examined.
 
 

THE EXPANSION OF MONEY LAUNDERING AND TRANSNATIONAL ORGANIZED CRIME IN MIDDLE EAST ASIA AND SOUTH-EAST ASIA.

1.      Smith, Samuel A. Terrorism in Southeast Asia: The Case of the Abu Sayyaf Group and Jemaah Islamiyah. International Institute for Counter-Terrorism (ICT), 2015.
There are several similarities between Delhi's groups throughout southeast Asia, particularly SG, and JI. The first is this group ending develops there the weak state is most vulnerable referred to those areas as terrorist black holes. Many of the Islamic movements in southeast Asia have legitimate greens as a result of centuries of conflict and opinions. It is on the borderline between Nations where there is a melting pot of several cultures and religions there is some degree of persuasion at present. The US-led global war on the terrors of southeast Asia as a second front after Afghanistan. The ideology created by Al that is those groups act as a foundation and can inspire future generations to come. Counter-terrorism critics provide a short-term trade of terrorism long terms of required non-military approaches.
 
  1. KHALIL, LYDIA. “COUNTERING TERRORISM IN THE MIDDLE EAST: EGYPT TO OMAN.” COUNTERTERRORISM YEARBOOK 2017, edited by Jacinta Carroll, Australian Strategic Policy Institute, 2017.
In this article, saw that in many states in Egypt woman, there are financing terrorist groups. A Significant role in the terrorist financing in Qatar and Saudi Arabia particularly in Syria terrorist groups. It actively supports Islamic militant groups regarding its history as a means of racist Soviet influence. The Middle East has often been used as a tool to concentrate state control at the expense of political and civil rights security strategy of trees to combat terrorism have both deterred and spurred violations in Middle Eastern countries.
 
  1. Bedi, Shruti. "Combatting Terrorism in South-East Asia: ASEAN’s ‘Soft’Approach."
Southeast Asia first had to combat terrorism after Al Qaeda and the World Trade Center, then ISIS's conflict in 2014, and the re-emergence of foreign terrorist fighters (FTF) in 2017. 2001 saw the adoption of the Asian Declaration on Cooperation in Counter Terrorism. And talk with Asian nations about more counterterrorism conventions. Due to both structural planning and a dearth of preventive measures inside the counterterrorism framework, Asia is having problems with the counterterrorism issue. To improve regional coordination and security, the obstacles between ASEAN member nations in terms of executive authority and sovereignty must be swiftly removed.
 
  1. Basit, Abdul, et al. "South Asia: Afghanistan, Bangladesh, India, Pakistan, Sri Lanka." 11.1, Counter Terrorist Trends and Analyses  (2019):
Afghanistan and Bangladesh terrorist groups like Al Qaeda and Taliban are popular. During the covid 19 pandemic, Muslim sentiment was stopped online in the same function of the Sinhala majority media causing a decrease in local Muslims. Given that IS previously looked at communal tensions as well as violations against sections of the Muslim community to spread a radical ideology and recruit into its network the government will need to wear more effective Signals and intellectual ability with countering violations extremely initiatives to guide against future antagonism. Sri Lanka also requires community-level initiative that promotes the moral form of Islam which has increasingly been marginalized by more destroyed variants of recent decades. Also, the same thing happened with the Maldives and India.
 
  1. Sheet, Fatimah M. Mohammed, and Mohamed Naef Mahmood. "The Expected Financial Effects Of Cryptocurrencies: A Study On A Sample Of Arab Countries That Deal In Them." 6.8 Journal of Positive School Psychology (2022):
This article discusses the new formation of payment new type of currency that’s not a physical currency like cryptocurrency and Bitcoins specifically in Arabic countries. The concept of the black chain is necessary to understand the basic database of those virtual coins. The speed of cryptocurrency affects facial policies increasing the volume of tax evasion money laundering crimes drug and arms trafficking and balance of payment and the declining rate of productive investment. Countries have not joined focus to develop an international legislative reward for regular dealing with virtual currencies.
 
  1. Fabe, Amparo Pamela, Joan Andrea Toledo, and Sylvia Laksmi. "The Growth of Financial Technology in Indonesia: Implications for Terrorism Financing." 60.2, International Annals of Criminology 60.2 (2022).
This is based on a connection between updated technology advancement and financing for terrorism made by Indonesia's FinTech sector and banks in Southeast Asia. Transferring and paying money, investing, financial planning, cryptocurrency, etc. Abuse of this technology resource carries a considerable danger of financial crime, including financing of terrorism and money laundering. The essay discusses the shortcomings of the laws and policies as well as the need for forms and remedies.
 

Complications in detecting the crime and prosecuting offenders due to technological advancement

1.      Sanderson, Thomas M. “Transnational Terror and Organized Crime: Blurring the Lines.” vol. 24, no. 1, The SAIS Review of International Affairs, 2004.
Without ever coming into direct touch, terrorists and groups associated with organized crime might adopt each other's tactics and characteristics. In terms of politics and practice, organized crime groups detest drawing unwanted attention, whereas many terrorist organizations aim to overthrow corrupt or secular authorities. The South Eastern European Cooperative Initiative Center, a global organization, has an anti-terrorist task force that aids its member nations in severing the ties between organized crime and terrorism. The international criminal police agencies stationed in Lyon, France, have created a fusion task force to manage the connection between organized crime and terrorism. Organizations that support terrorism and organized crime are more trustworthy and adaptable than the authorities and international organizations that hunt them. The connection between organized crime and terrorism, or how it becomes a threat, is expanding and changing daily.
 
  1. Shelley, Louise I., and John T. Picarelli. "Methods and motives: Exploring links between transnational organized crime and international terrorism." 9.2, Trends in Organized Crime (2005).
Giving law enforcement and intelligence organizations actionable information requires describing how criminal and terrorist organizations communicate. The IPB technology has long been employed to support those objectives in the areas of interest by the military and intelligence. PIE's physical functions necessitated a considerable alteration to IPB methods because they have a sole focus on Pakistan, do not squander resources, and aim to promote cooperation between Al Qaeda and international gangs. Banking transactions in CDE are accused of having illicit features and utilizing corruption in the instance of Tri-Border Area Financial Transactions and money laundering.
  1. Ering, Simon Odey. "Trans-border crime and its socio-economic impact on developing economies." 2.2, Journal of Sociology and Social Anthropology (2011).
This article aims to make a connection between the socioeconomic development of developing economies and the larger issue of economic ramifications that are related to money laundering. Organized criminal gangs utilize money laundering as a technique to hide the proceeds of serious crimes including drug trafficking, merchandise smuggling, and other crimes. Creating effective law enforcement strategies and boosting our cooperation through public-private partnerships are important for prevention.
 
  1. Gabriel Weimann,Terrorist Migration to the Dark Web” Vol. 10, No. 3, Perspectives on Terrorism, (June 2016).
Terrorists use the internet to provide information to their fellow terrorists to recruit, and radicalism spreads propaganda to raise funds and coordinate actions and attacks. Even they have their web pages for example Jihad Wiki and al-Aqsa IT Team. The dark web is also becoming a medium for some terrorist organizations to sell online black market human organs as well as stolen oil and smuggling antiquities. Draco’s episode triggered an international search for a solution to combat illegal and criminal activities but one of that should not imperial legitimate lawful freedom of expression.
 
  1. Weber, Julia, and Edwin W. Kruisbergen. "Criminal markets: the dark web, money laundering and counterstrategies overview of the 10th Research Conference on Organized Crime." 22.3, Trends in Organized Crime, (2019).
The primary focus of this conference is on collaborative research and practices of an open exchange of experience and knowledge, and The problems that were brought up concerning the fight against illegal online markets from the perspectives of both research and law enforcement. and emphasized the requirement for a global network to research black markets. Police techniques and context-specific strategies cover certain criminal marketplaces. A criminal lifestyle circle would receive a more concentrated treatment. In terms of justice, there is some compensation for the society that has been designated as the victim as well as the expense of police operations, court cases, and asset recovery.
 
 
Abstract

This article examines the worldwide consequences of both money laundering and transnational organized crime. Despite an enhanced understanding, money laundering persists with evolving methods that intersect with organized crime. Organized crime, characterized by collaborative professionalism, involves activities such as smuggling and drug trade, impacting societal well-being. The escalation of transnational crime, driven by conflicts and economic disparities, results in an annual global cost of $1 trillion, with Southeast Asia contributing over $100 billion. In nations with inadequate anti-crime measures, especially in the Arab world, organized crime is exacerbated. Technological progress inadvertently facilitates transnational crime. The article emphasizes the necessity for comprehensive strategies to address these issues.

 

Keywords
Trans-national Organized crime, Money laundering, Risk Assessment, New technologies, rules and regulations, suggestions.
 
The United Nations Office on Drugs and Crime (UNODC) estimates that $800 billion to $2 trillion in current US dollars, or 2 to 5% of the world's GDP, is laundered annually. Estimating the precise amount of money that goes through the laundering cycle is difficult, though, because of the hidden nature of the practice.
 
"Money laundering" refers to the actions done to hide the true source, origin, ownership, destination, or usage of money or other property.  It is illegal to process ill-gotten riches, sometimes known as "dirty" money, through a sequence of transactions to "clean" the money and make it seem like the product of a legitimate company[1]. Regardless of where the "dirty" money came from or what sort of illegal activity it was intended for the "dirty" money's objective is to make it seem as though it has been obtained from a legitimate source or is being used for a lawful purpose[2]. We now have a better knowledge of how complicated money laundering is because of the work of local, national, and international institutions and organizations. However, many different avenues can be used to facilitate money laundering today, and these alternatives are always evolving to support criminal activity, technology development, and preventative measures that aim to render money laundering permanently ineffective.[3]
 
A crime is referred to be "organized crime" if it necessitates the cooperation of multiple people or organizations to be carried out successfully. Typically, organized crime is professional criminality. The structure may be formal and specific, comprising a system of connections with reciprocal duties and benefits, or it may be generic and flexible. Small and large groups can both be a part of criminal organizations. [4]Smuggling, the sale of illegal narcotics, and theft are examples of illegal activities that are not allowed by law and are considered to produce social "bad" since they reduce society's welfare, if not also the welfare of the persons engaging in them. The totals of national income do not include earnings from these activities. Such actions have a connection to various forms of crime. But some crimes, like murder or gender-based violence, are not related to earning money. As a result, such offenses will not be caught by the black economy. Additionally, criminality connected to economic activities that generate cash is typically related to organized crime, whether it occurs within nations or across borders (the latter is known as transnational organized crime)[5].
 
The rise in regional wars, the relaxation of border controls, the increased mobility of persons and things across borders, and the widening economic gaps between rich and developing nations all contribute to the inevitable growth of transnational crime. Due to these elements and the effects of globalization, political terrorists and international criminal organizations are now able to flourish[6]. The United Nations Office on Drugs and Crime estimates that TOC costs the global economy $1 trillion a year. Based on a reasonable estimate, Southeast Asia contributed close to 10% of this total, or more than $100 billion annually. Southeast Asia is home to widespread drug trafficking, illegal immigration, terrorism, money laundering, transnational prostitution, piracy, arms smuggling, credit card fraud, and corruption[7]. More than 75% of people on earth reside in nations with high rates of crime and weak anti-crime movements. At least five of the top 25 nations where organized crime is rife—and usually made easier by authorities and their clients—are in the Arab world[8].
 
The technical developments experienced in all sectors of human endeavor throughout the previous millennium have inadvertently, or simply put, enabled and created an enabling worldwide climate for transnational crime to grow.
 

1.    Concept of organized crime and transnational organized crime

The definition of organized crime is described as pre-organized unlawful operations that are managed by strong groups and typically performed on a large scale[9]. It is available in a wide range of media in numerous nations. The various forms of activities that make up organized crime might include trafficking illegal products, guns, persons, and drugs. These objectives are frequently attained by armed robbery. To cash in on the assets and hide their traces, counterfeiting, and money laundering are also done. Organized crime has the potential to threaten the safety of the nation and the lives of millions of people[10].
 
However, a broad definition is limited because organized crime activity differs across nations, regions, crime types, and organizational structures. Consequently, Understanding organized crime's essential elements is important, but understanding how it emerges in different environments and criminal scenarios requires more in-depth information. Global vices like the drug and narcotics trades, human trafficking, the trafficking of small arms, and all other forms of deviant globalization have shown the power and impact of criminal organizations. In dense cities, war zones, and the information (or cyber) domain, gangs, and cartels battle for identity on a variety of levels as a substantial show of social and political power as well as a conflict driver[11].
A system of institutionalized violence is what organized crime is[12]. Such violent behavior contains some of the same components as other ritualized behavior in many societal subgroups. There are particular votaries tasked with the office of violence. There are several circumstances, some with undertones that seem to be closely related to religious issues, that lead to violence. In addition, the pattern of institutionalized violence in organized crime is significantly impacted by changes like those in that form of crime, which frequently mirror changes in the socioeconomic structure of the greater society. There are current tendencies in organized crime that point away from reducing such expertise and toward bureaucratization, risk reduction, and the replacement of violence with more subversive and indirect methods. Occasionally, too, like champion prizefighters who have lost their hunger and rage, organized criminals leave their environment and cling to the less pugnacious values and standards found among actual and fictitious customers for their wares[13].
 
The criminal organization is set up to endure leadership changes and to continue operating after the lives of individual members. The group continues to engage in illegal behavior. These organizations don't just pop up randomly. However, the groups have been around for a while. Similarly, it seems that offspring of organized crime offenders are considerably more likely to become offenders themselves than are children of 'generic' offenders.
 

1.1 Types of Organized Crimes

1.1.1 Drug trafficking

The trade-in illegal psychoactive substances is one of the most frequent and significant organized crime activities today. Despite the huge margins of error in the data, the illicit drug markets supported by drug trafficking are likely the "largest" illicit market in the world in terms of revenue. A UNODC At current rates, the 340 tons of heroin used worldwide each year and the 430–450 tons seized each year constitute the yearly influx of heroin into the international market. Of the total, 50 tons are produced by opium from Myanmar and the Lao People's Democratic Republic, while the rest 380 tons are utilized in Afghanistan to produce heroin and morphine. Only around 5 tons are consumed and confiscated in Afghanistan, while the remaining 375 tons are transported across the globe via routes that enter and pass via its neighbors[14].
Some drug trafficking organizations are family businesses, meaning they are managed by blood relatives, who occasionally turn to a network of unrelated individuals to complete the most hazardous duties. Some are non-kin organizations that are created around a more or less charismatic leader, who subsequently achieves some level of stability and builds a more or less basic division of labor. Others are hurried connections of people that develop, break up, and then reassemble when the time is right. Many dealers work alone, especially at the intermediate and lower levels, either to support their drug use or, less frequently, to make quick money.
 
According to the world-system approach, certain phenomena are structural effects of the system. For instance, the physical distance between the countries of origin and destination may affect the usage of the same trafficking routes for various drugs. As you get closer to your destination, the number of possibilities reduces. Therefore, rather than being the result of a carefully thought-out scheme, poly trafficking would be a natural outcome of transportation opportunities. Using the same route for various commodities is typical in legal markets. A very small number of trafficking channels seem to be employed for various narcotics. Only 132 countries appear to ship two or three different types of pharmaceuticals. One type of narcotics is transported by the vast majority of pairings (n=694; 84.0%), setting the black market apart from legitimate trading[15].
 

1.1.2      Arm trafficking

Surface-to-air missiles (SAMs), assault rifles, and pistols are examples of man-portable personal and military weapons that fall under the category of "small arms." Many features of small guns contribute to their quick and frequent circulation across borders, between states, among various kinds of illicit organizations, and some enterprising people. By their very nature, these weapons are portable. Their ability to travel covertly and covertly at low cost is made possible by this trait. Arms transfers have been made to terrorist and rebel organizations by boats, lorries, pack animals as well as people, as well as mail. Additionally, light weapons are reasonably priced, creating a very sizable market for buyers, even in the world's most underdeveloped regions. Finally, light guns are robust and only need a minimal amount of field maintenance[16].
Smaller muscles take place in the white, black, grey, and covert military transactional marketplaces, respectively[17]. The lawful selling of weapons to other nations or states by governments or private producers is referred to as the "white market." Even though the white market is seen as being lawful, a significant amount of trafficking weaponry is allegedly made up of surplus government weapons that are either deposited, stolen, or find their way into the black market.  Black market transactions are prohibited due to their hidden nature, illegality of the buyer, seller, or transaction, and other factors. The concealing of weapons by incorrect labeling, document forgery, and the laundering of transaction proceeds are all ways that transactions can be made secret. This involves clandestine military operations—covert transfers of weapons from one government to another, notably to insurgent forces due to their secrecy and lack of openness. The term "grey market" refers to business deals that are not regarded as unlawful but do not fit into the white market category. Governments incur risks in these covert arrangements while downplaying any potential dangers. For instance, in addition to direct violations of the arms embargo (black market deals), there are also sales of arms to nations that are subject to the embargo with the knowledge that the weapons will later be sold to the intended state to circumvent the embargo. Typically, this is done with the help of proxies like insurgent groups or individual brokers. Utilizing current global networks made up of illicit trade associations and rogue traffickers is one way to do this. These networks enable the diversion of transfers that were initially legally made between states into areas of conflict.
 
The obvious link between organized crime and illicit arms trafficking can be extended to conflict circumstances, where criminal organizations are unavoidably present and provide sides with illegal military hardware and ammunition. As organized crime grows under the conditions of lax law enforcement, brutality, and legal trade limitations that accompany conflict, supporting disastrous war economies and the conflicts themselves, a new trend of "military commercialism" can be noticed[18].
 

1.1.3      Human trafficking

As the millennium goes on, we have a serious problem of illegal human migration, which includes migrant smuggling, forced labor migration, irregular migration, human trafficking, and trafficking in women. These deeds violate human rights and endanger people's safety. Organized crime is a significant component in encouraging unlawful human trafficking.  Organized crime groups assist in people trafficking and illicit employment by doing both.  Trafficking, illicit migrant labor, and human smuggling are all related. People who have been trafficked or smuggled work illegally both in the country of destination and occasionally in that same country, depending on how long they spend in the transit country[19].
 
If a person enters a country without being a citizen or a permanent resident to gain financial or material advantage, they are doing so illegally. This is referred to as human smuggling. The difference between human trafficking and people smuggling must be made clear.  If someone is being hired, moved, transferred, housed, or received to abuse them, that individual is deemed to be involved in human smuggling. This can be accomplished through paying or receiving benefits from those in control of them, as well as by using threats of force, coercion, abduction, fraud, deception, or abuse of authority against them. Human trafficking is the practice of selling someone abroad against their will for purposes of sexual or other exploitation.  The victims are in a state of slavery because they are coerced into prostitution or other behaviors while being denied the freedom to change. The victims' socioeconomic circumstances and age distribution made them seem weak and disadvantaged.
 
The demand for prostitution and other commercially offered sexual services, sometimes referred to as "sex trafficking," is the key factor driving trafficking for sexual exploitation. The supply and demand for trafficked women globally are correlated, according to experts, with trafficking patterns. The sex industry is influenced by supply and demand in the same way that "every other capitalist industry" is.
 

1.1.4      Smuggling of Migrant

In 2020, there will be 281 million international migrants on the planet, accounting for 3.6% of the global population, according to the latest UN forecasts[20].
 
The unlawful entrance of a person who isn't a citizen or a permanent resident into a State Party to earn, directly or indirectly, financial advantage or another tangible benefit is the official definition of migrant smuggling established by the UN in 2000[21]. This provision was included in the Protocol to Combat Migrant Smuggling, which was adopted by the United Nations Convention against Transnational Organized Crime. to the extent permitted under the UN Convention against Transnational Organized Crime and its Protocol to Prevent, Suppress, and Punish Person Trafficking[22], they include recruiting, transportation, transfer, harboring, or receiving of persons, all of which are implicated in migrant smuggling. Human trafficking differs in its deeds less from migrant smuggling[23].
 
Migrant traffickers are criminals, not aid workers. Gaining material or financial advantage drives them. They might be lone wolves or a member of a well-developed, international network. Small-scale and cross-border migrant smuggling often doesn't demand complex smuggling methods. Where pre-planned smuggling happens over longer distances and includes several border crossings, it is customary for a chain of coordinators to monitor certain legs of the smuggling activity, communicate with one another, and collaborate with local groups in the transit and destination countries.
 
The vast majority of trafficking networks rely on fluid interactions and have weak connections. However, organized organizations are more numerous. As an illustration, it appears that a large portion of the smuggling industry in North Africa is based on more hierarchical organizational systems than in other locations[24]. In transit and destination nations where pre-planned smuggling happens across longer distances and necessitates many border crossings, it is usual for a chain of coordinators or organizers to monitor specific legs of the smuggling enterprise, interact with one another, and collaborate with local groups. Local service coordinators and providers are frequently not affiliated with one particular organization but rather are a part of a broad network. The primary goal of migrant smuggling, like other parts of organized crime, is profit. While some immigrants opt to pay cash in advance, others must establish payment arrangements after arriving, which necessitates some advance financial preparation.
 
The UN Protocol against the Smuggling of Migrants by Land, Sea, and Air is the sole instrument that addresses and prevents migrant smuggling and is legally enforceable. Immigration smuggling needs to be prohibited in the countries that ratify the Protocol. The three primary objectives of the Protocol are to prevent and combat migrant smuggling, to promote cooperation among States that have signed the Protocol, and to safeguard and defend the rights of smuggled migrants.
 

1.1.5      Terrorism       

‘Terrorism is a   strategy   or a   tactic   that employs   violence   or   force to reach   political objectives[25]
The end of the Cold War and the consequent reduction in governmental backing for terrorism have resulted in terrorist organizations throughout the world primarily relying on organized crime as a source of finance. A site merged in Latin America based on the narco-terrorism paradigm. Since the 1980s, terrorism has used crime more frequently. The 1990s may be seen as the decade since the relationship between crime and terrorism was enhanced throughout this decade. The term "nexus" is most usually used to describe how terrorist organizations exploit criminality as a source of finance, for as by killing drug dealers or using credit cards illegally. The formation of partnerships between terrorist and criminal organizations has also been described using this phrase[26]. The main components of the contemporary nexus are these two sorts of relationships; however, the connection between organized crime and terrorism has grown increasingly complicated.
 
Organized criminal gangs frequently use terrorist tactics to accomplish specific operational objectives. Although at times these groups have appeared to be involved in politics, it is important to remember that their goal was to safeguard their operational environment rather than to upset the status quo. Dishman claims that criminal organizations use "selective and calibrated violence" to drive out rivals and scare anti-drug authorities. As a result, a violent act committed by a TCO [transnational criminal organization] targets a specific anti-constituency rather than the whole public and is devoid of any political undertones[27]. The major objective of these organizations continues to be the maximizing of illicit money, notwithstanding the employment of terrorist tactics like bombings and assassinations. Even though organized crime engages in a variety of activities, its connections to terrorism come from the unlawful trafficking of drugs, weapons, and people as well as money laundering. Armed and financially supported terrorist organizations are required to fight against the security forces, whether they are domestic or supported by other nations. Conglomerates of organized crime require clients and smugglers who can transport people, weapons, and drugs across borders.
 

1.1.6      Money Laundering

Organized crime relies on money laundering heavily for funding, and it also helps criminal groups expand their operations and hide their assets. The phrase "money laundering" first originated in the US during the Mafia's effort to "launder" illegal funds through cash-heavy washing salons that were under their control in the 1930s[28]. According to testimony, several issues currently make it difficult for the commission and the police to determine the income generated by organized crime.
 
Money launderers are continually looking for new strategies. Economies with new or developing financial hubs but insufficient controls are particularly vulnerable when countries with existing financial centers build robust anti-money laundering policies.
 

1.1.7      Terrorist Financing

When using a front to support, aid, or carry out an act of terrorism, rather than doing so for financial benefit, is the main motivation, that is when it is terrorism funding[29]. Frequently, increasingly complicated strategies are used to move funds. Worldwide networks that support terrorism can access both the financial systems of underdeveloped and developed nations. Even though both monies might come from legal rather than illegal sources, the money laundering concept and the model for financing terrorists are not the same. Additionally, the intimately related activities of money laundering and terrorism financing can be influenced by a variety of different factors. The non-financial objectives of terrorist organizations frequently include publicity, the propagation of an ideology, the overthrow of a society or state, and the simple spread of terror[30]. Terrorist organizations appear to be the main perpetrators of terrorism that are motivated or inspired by religion. Even though certain fundamentalists with no affiliation have carried out terrorist attacks, most Jihadists seem to be, at least in part, connected to a terrorist organization in reality, In addition to having ideological reasons, terrorist organizations frequently have financial needs. The goal of money launderers is to create as many layers between transactions as they can, making it difficult to determine where the money came from. The situation with finance for terrorism is just the opposite. To fund criminal activities and to use force and coercion to subjugate a people or state are the two goals of terrorism financing[31].
 

1.2    Nature and ambit of money laundering

According to both domestic and international law, money laundering is an organized economic crime[32]. It influences investments, national income, domestic pricing, the value of national currencies, and various economic policies, particularly in the context of monetary and fiscal policy environments. State public budgets are affected by all of this. The United Nations and other international and regional institutions, which serve as the representatives of national legislators in each state and the international community, have been inspired to act and fight to stop it.
 
The money obtained by criminal activity cannot be spent as easily as money obtained through legitimate means, especially not on luxury items like mansions, sports vehicles, and boats. Money laundering is necessary to spend the proceeds from illegal activity. Al Capone, a thief, coined the term "money laundering" to describe the process he used to transmit his illicit wealth via launderettes. Fighting money laundering is a continual effort. One of the top issues the international financial world is facing is money laundering[33]. Conversion or transfer of property made with knowledge that it was acquired illegally, to conceal or obscure its illegal source, or to assist anybody who is suspected of involvement in the crime escape facing the consequences of his conduct[34]. Easily, the act of processing criminally obtained funds to conceal their illicit source is known as money laundering[35]. For instance, a drug dealer may own a restaurant to conceal narcotics proceeds among the restaurant's legitimate income. To make the income appear as though it was generated properly, the drug proceeds are "laundered" through the restaurant in this fashion. Because of the ease with which offenders would be caught if they could not "merge" their illicit funds into, say, a legitimate company, bank, or piece of real estate, organized crime activities depend heavily on money laundering.
 
The kind of people and organizations who turn to money laundering and the extent to which they do so are determined by penal laws and law enforcement initiatives, as was covered in the section before this one. The techniques that criminals will use to avoid detection and forfeiture are also influenced by police operations. Money laundering adjusts to the places with the lowest pressure, much like air in a balloon. Following the initial focus of police attention on the banking business, money launderers switched to the insurance sector. When the insurance industry was included in anti-money laundering (AML) initiatives, criminals stepped up their real estate laundering operations.
 

1.3    Process of Money Laundering

It is now more difficult to comprehend and stop the conventional money-laundering process and techniques as a result of the opportunities provided by economic globalization and technological development. Any attempt to contrast this crime accurately is severely hampered by this. Money laundering is a cat-and-mouse game that keeps spreading into more and more spheres of the economy. Criminals and their intermediaries have created a variety of unique money laundering strategies during the process. All of these different strategies try to detach money from its questionable sources and give it the illusion of legitimacy through a sequence of acts that are frequently divided into three distinct stages: placement, layering, and integration. This categorization primarily serves as a heuristic aid and is not meant to represent a predetermined "natural law." Money laundering transactions don't always proceed through the three phases, and occasionally, additional complexity levels are introduced. Several distinct countries are frequently involved in these deals, albeit not always[36]. Three commonly acknowledged and independent steps can frequently occur at the same time, even though they may employ a wide variety of techniques:
First stage -Illegal action is frequently financed by money.  Large quantities of cash are difficult to spend secretly, difficult to carry, and difficult to conceal. Placement of the money in the financial system, where it will be safer, much easier to move, and much easier to hide, is the only option to address these problems. The crucial phase in money laundering known as "placement" involves introducing illegal currency into the financial system. 
 
Second stage -Once the illegal gains have entered the financial system, the money launderer must keep them hidden.  By shifting the money that has been put into the financial system between companies (often but not always made up of organizations), countries, and continents, the money launderer can do this. Making it extremely challenging and time-consuming for law enforcement to follow the trail left by this is the entire point of this. Moving the money via a convoluted, lengthy route during the "layering" stage of money laundering helps to hide its origin, owner, or use.
Final stage - Once the illicit monies have been hidden through the layering process, the money launderer is ready to spend the money.  To "resurface" the money, the money launderer looks for efficient ways to do so, such as through the legal sale of commodities, employment, or consulting fees from what appear to be legitimate enterprises or the return on legal investments.  Making illicit monies accessible is the "integration" step of money laundering, which makes the funds seem "clean."[37]
 

1.4    Nexus between money laundering and organized crime

Money laundering is the technique used by criminals and their collaborators to transform the proceeds of their crimes into assets or money that appear to be lawful on the surface. Gaining money is the driving force behind organized crime; consequently, the key question is to develop ways to legalize the profit aggregated. Members of criminal organizations have been able to follow policies that allow them to integrate into lawful economic methods. To clean filthy money, they developed an increasing number of Phantom corporations and entities. The financial system will be flooded with clean illusory money. As a result, the bank has important standards in place for tracking revenues, gathering evidence of transactions, and transferring assets[38]. Due to latency, precise assessment of the amount rinsed clean is nearly impossible. Money laundering shall never refer to a single transaction, but to chains of transfers; thus, the involvement of banks in tracing illicit money transfers is critical. Criminalizing money laundering also safeguards customers' trust in banks' legitimate and sensible practices. More often than not, the process of money laundering cell results in the waste of earnings of some form, but the illicit money provides adequate recompense. Although groups of organized crime appear to conflict and interfere with one another, their cooperative attempts to mislead and smack up law enforcement authorities to maximize money are rather obvious.
 
Instead of carrying out legal activity, criminal organizations developed phony businesses to reintroduce filthy money into the economy. Restaurants, counseling firms, retail shops, hotels, bars, nightclubs, casinos, international financial intermediaries, laundry, salons, sports enterprises, vending machine enterprises, amusement parks, and parking facility enterprises are particularly suitable for money laundering.
 
The key difficulties are always the huge cash flow, the security that unlawful money is being mixed, and the cell eventually appearing as legal after-tax revenue.
 
To weaken each other, organizations cooperate with authorities to provide information and access to investigations, so the hidden interests of cooperating parties must always be taken into account by the proceeding law enforcement bodies, thus putting a member of a criminal organization under investigation frequently results in straightening and benefiting another framework taken over the territories of the organization investigated.
 
Typically, unlocks entire income affairs in situations when the majority of the dirty money is tied to the drug trade, It appears most crime cases may stay in tiny seas Finally success of the war against money laundering remains one of the most sufficient methods to limit. Criminal organizations can be approached from a variety of perspectives, with financial measures that leave the group numb and ineffective appearing to be the most acceptable answer.
 

1.5    The link between money laundering and funding for terrorism

According to the description, the process is an example of transnational organized crime that incorporates several jurisdictions and a variety of legal standards. This kind results from the passage of illegal monies via the official or unauthorized financial systems of several nations to an unidentified final destination to hide their true source by exchanging them for fiat currency or by funding terrorist, extremist, or other organizations[39], to make it more challenging to locate them, criminal syndicates like the Italian-American Mafia (Camorra), Japanese Yakuza (Yamaguchi Gumi), Russian Mafia (Solntsevskaya Bratva), or those in the Calabria region generally carry out their primary illegal activities in one location and subsequently engage in money laundering in a separate location[40].
 
Terrorist funding, in contrast, pertains to the phase where funds are provided and collected, whether through legal or illegal means, for the potential future execution of terrorist acts; thus, it is a preparatory stage. This funding encompasses transactions that may or may not be conducted on behalf of terrorists but are intended to facilitate terrorist activities, as well as provide resources to terrorists using the proceeds of criminal actions. Terrorist organizations have used a number of strategies to fund their networks and activities throughout the years. Because it sometimes includes obtaining funding from governmental and commercial sponsors rather than "dirty money," terrorist financing varies from money laundering and presents unique difficulties for the counterterrorism community. The horrible strikes of September 11, 2001, made it evident how Al Qaeda used the global banking system to finance the preparation and execution of the operations. To stop terrorist financing and money laundering, the international public and private sectors implemented stronger regulations on the conventional banking sector following 9/11. To counter the increased scrutiny of the financial industry, terrorist organizations have, as we have observed throughout the years, adopted a range of fundraising mechanisms and strategies[41]. Let us look at some of the processes utilized by terrorist networks that go beyond ordinary banking.
Charities and nongovernmental organizations (NGOs) may draw terrorists to raise and transfer their assets as a result of the lack of openness in the field. The Report on Money Laundering Typologies 2002-2003 by the Financial Action Task Force (FATF) on Money Laundering makes this allegation[42], Some organizations have served as a front for the transfer of money to finance terrorist acts, typically on a global scale, in addition to being a direct source of income.
 
The movement of huge sums of money using cash couriers or bulk cash smuggling is a tempting terrorist financing method.  It is transported in large quantities across the border by car, ferry, or airplane. The terrorist completely controls the movement of the money via cash couriers; There are no traceable paper trails or other parties involved. The riskier form of funding terrorism is this one, though. There is a possibility that the money will be stolen by a courier or an informant working for the network, or that border inspections or government investigations would put the network or operation in danger. Al Qaeda in Iraq used large-scale cash smuggling during the Iraq War to fund their operations and foreign fighters, which was made easier by a lack of regulation.
Due to the opaque and liquid characteristics of the Hawala system, Terrorist groups employ this sort of informal banking system or alternative remittance route to transfer their assets. Money sent home by a foreign employee is referred to as a remittance. In an informal banking system, money is received to send it—or something equivalent—to a third party in a different region. These transactions are frequently carried out outside of the traditional banking system by nonbank money services, companies, or other unregistered and unregulated commercial organizations[43]. Money transfers from or to nations without reputable, authorized financial institutions are carried out by traders and migratory workers through informal banking methods. These informal networks are still used by immigrant ethnic minorities in Europe and the US because of their effectiveness and cost. These networks heavily rely on connections, such as relationships with families or regions, and are founded on trust.
 
Therefore, the act of raising or supplying money for terrorist causes is known as terrorist financing. While funds used to finance terrorism may come from both legal and illegal sources, funds used for money laundering almost invariably come from illegal ones. Therefore, individuals responsible for funding terrorism do not need to disguise the source of the money; instead, they must conceal both the financial activity and the nature of the supported action. Both money laundering and financing of terrorism use comparable methods. Both times, the actor makes improper use of the financial industry. The techniques used to finance terrorist activities and terrorism are often extremely similar, if not the same. Therefore, preventing, identifying, and penalizing illegal monies from entering the financial system as well as funding terrorist individuals, groups, and/or operations are two risk problems that must be addressed for an anti-money laundering/counter-terrorism financing strategy to be effective. The utilization of the financial trail to identify the various elements of the criminal or terrorist network is another area where AML and CFT methods intersect. Both strategies attempt to undermine the criminal or terrorist organization through its financial operations. This calls for the adoption of technologies that can read all financial transactions and spot shady money transfers.
 

1.6    Middle and Southeast Asia-regional Risk Assessment of Transborder Crimes

The expansion of crime as a concern for global security results from the interconnectedness of international marketplaces, particularly regarding unlawful commodities and services, as well as the emergence of tough transnational criminal organizations. The United Nations Convention against Transnational Organized Crime, generally known as the Palermo Convention 2001[44], is the main international agreement and acknowledges the destructive impact of organized crime. The treaty was swiftly and broadly ratified, and it became effective in 2003. In 2004, the 'High-level Panel on Dangers, Challenges, and Change' established by the United Nations pinpointed six significant challenges to global security. One of these identified threats was transnational organized crime. Within these six threats, there are factors like civil conflicts, "small wars," and poverty that can contribute to criminal activities, while the consequences of organized crime tend to escalate the potential for terrorism.
 
The remarkable variety within the region poses a challenge when trying to devise effective regional strategies to combat transnational crime. Asia is home to over half of the global population, primarily dominated by China and India as the most populous nations. This vast continent encompasses all four major world religions—Islam, Buddhism, Hinduism, and Christianity—and includes socialist market-based nations like China and Vietnam. Asia, as a whole, boasts some of the world's most rapidly expanding economies, but it is also marked by significant levels of inequality and poverty, often overlooked by governments. The connected problems of bad governance and corruption as well as several different types of crime are all influenced by these disparities.
 
As an illustration, the South Asian Association for Regional Collaboration (SAARC) has yet to demonstrate that it can function as a multilateral organization that successfully promotes collaboration in the fight against transnational crime[45]. Despite being more active recently, the Association of South East Asian Nations (ASEAN) has always trailed behind regional trends in crime.  In West and Southwest Asia, as well as to a lesser extent in Central Asia, there are no global efforts to tackle transnational organized crime[46]. The potential for cross-border crime has increased as a result, but regional governing capability has not.
 
Transnational organized crime is highly prevalent in Southeast Asia and the Middle East. In the 21st century, there has been an uptick in organized crime activities, accompanied by a growing focus on innovative methods and technological advancements that facilitate transnational and international criminal activities. The emergence of China as a major player in the world economy has had an impact on governments that are coping with considerable changes in crime and corruption. Organized crime, characterized by corruption, unstable or ineffective governance, and misconduct within the corporate world, remains a persistent challenge for many developing nations in Asia. Organized crime has flourished in the Middle East, where the Arab Spring brought the overthrow of governments and the breakdown of judicial and law enforcement institutions. In almost every situation, conflicts, shifting political environments, advances in technology, communication, and travel, as well as the advent of a worldwide economy, have forced organized crime in Asia and the Middle East to adapt[47]. Symbiotic relationships between organizations have frequently resulted in the formation of a multinational network of organized crime. The most prevalent sorts of these relationships include involvement in various types of criminal trafficking, money laundering, and unlawful technology endeavors. Some criminal organizations in Southeast Asia and the Middle East have remade themselves as they adjust to the new global order to evade international law enforcement operations and take advantage of new "markets" worldwide[48].
 
South Asia, like many other regions, is coping with the threat of terrorism, which is escalating and becoming more widespread. Al-Qaeda and the Islamic State of Iraq and the Levant (ISIL) are two groups that have linked regional resentments and sociopolitical issues to a more general war narrative[49]. Civil society groups work together with a range of experts and practitioners at the national and local levels to address a variety of problems and challenges that support violent extremism and terrorism. These initiatives include expanding access to social services, free healthcare, and public education; fostering inclusive and varied communities; and arguing for improved national institutions. The varied physical geography brought about by Indonesia, Malaysia, and the Philippines' intertwined borders has made the maritime Southeast Asia area conducive to assaults by groups like Jemaah Islamiyah (JI). The lengthy five-month Battle for Marawi offered as evidence of the tenacity of terrorist organizations like the Maute Group and the Abu Sayyaf Group, both of whom have a record of using violence[50].
 
The "Golden Triangle" is frequently mentioned when talking about the linkages between criminal networks and violent extremist movements. The area bordering Myanmar, Laos, and Thailand is the second-largest opium-producing region in the world, according to a recent UNODC report. The conflict has been prolonged by the influx of funds from the opiate trade[51]. The infusion of money from the opiate trade has extended the battle. However, the illegal opium trade serves purposes apart from supporting rebels fighting the authorities. The drug trade has been used by Myanmar's military government since the late 1980s to finance and bolster its armed forces[52]. Unfortunately, the creation of synthetic pharmaceuticals on an industrial scale has coincided with the unregulated opium trade in Southeast Asia.
Migration in Southeast Asia and its connection to the crime-terrorism nexus varied significantly from one another. There is no evidence that the trafficking of persons for sexual exploitation or there is a connection between crime and terrorism in the region and the trafficking of Southeast Asians to the West. The main migration-related issue that might have an impact on how IS develops in Southeast Asia is the disagreement over how to treat Muslim Rohingyas[53].
 
Transnational criminal activity has targeted several nations, especially in the areas of widespread public and private corruption, illegal immigration, arms trafficking, the exploitation of women and children, online scams, fraud, abduction, and child pornography. The majority of these crimes are being performed by organized crime groups that are skilled and resourceful. Since there are connections between organized crime and terrorist organizations in the Middle East, terrorism has also contributed to the destabilization of regimes there.
 
Russian organized crime groups have an impact on nations in the Middle East. Although Islam predominates in most nations, Christianity and Judaism were born in this region. Local or regional organized crime has historically predominated in Egypt, with the military's control or involvement in several important businesses playing a large role. There has been a lot of corruption by government officials (kickbacks, bribery, and white-collar crime). The illegal immigration of women from Africa or Eastern Europe to work as domestic helpers or to transit the nation to Israel as laborers or servants is one of the organized gangs' activities. Organized crime in Egypt has stepped up drug trafficking operations in recent years, working with other nations.
 
Israel is linked to international organized crime. Numerous gangs, or syndicates, are active within the nation and carry out illegal actions anywhere in the world, including in the US. It engages in prostitution, human trafficking, money laundering, protection and extortion networks, the sale of drugs and weapons, and the fencing of stolen goods, among other things. An important factor in the development of transnational organized crime was the inflow of Russian Jews with ties to the Russian Mafia, who introduced new and more advanced methods of money laundering, drug trafficking, and people trafficking[54].
 
The criminal actions of Lebanon's greatest terrorist group, Hezbollah, frequently eclipse organized crime. Hezbollah, or the Party of God, is a Shiite Muslim political party established in Lebanon that is designated as a terrorist organization by the United States and other, largely Western, countries[55]. As funding from Iran and Syria has dried up due to internal instability and sanctions imposed by a variety of states, Hezbollah has resorted to organized crime for financial and weapons backing.
 
The majority of local crime in Saudi Arabia is committed by foreigners who are allowed to work in low-level positions, and the nation's organized crime scene is relatively tiny. Most people agree that beheading someone to death is an effective crime deterrent. Organized criminal activity in the nation includes gambling, human trafficking, hostage-taking, the sale of illegal goods including spirits (which are prohibited in the nation), and to a lesser extent, drug trafficking. Concern has been expressed by the US State Department on human trafficking in Saudi Arabia. In the kingdom, both skilled and unskilled labor are frequently employed, and commercial sex exploitation involves organized crime groups working with regional staffing agencies.
 
The Turkish organized criminal scene is legendary[56][57]. International gangs are involved in illegal immigration, drug trafficking, and commodities smuggling, with street gangs handling the majority of these crimes.
 
The most significant development in criminal activity over the preceding ten years has been the growth of multinational and transnational organized crime groups. Due to the weaker criminal justice systems and high levels of police corruption, several organizations have increased their operations throughout the many nations that have given rise to organized crime. Many of these organizations have a long history and have established international networks that cooperate to further their unlawful economic endeavors and money-laundering operations. The situation is exacerbated by the fallout from the Arab Spring uprisings and a developing pattern in which terrorist groups collaborate with organized crime groups or have formed their gangs. For instance, Al-Qaeda in the Maghreb (AQIM) has carried out "abductions, hostage-taking operations, drug smuggling, and bank robberies" to achieve its goals.
 

1.7    BLACK HAWALA

The Islamic State of Iraq and the Levant ("ISIL"), also known as The Islamic State of Iraq and Syria ("ISIS") or Dawla al Islamiya (hereinafter ISIL), is the most technologically advanced terrorist organization at the moment. Thanks to its varied marketing approach, the organization has gained support from supporters all around the world, usually in the form of monetary donations[58]. The group has received support from sympathizers all across the world, frequently in the form of monetary gifts, thanks to its diverse marketing strategy[59]. Hawala has historically participated in these transactions due to its quickness and anonymity. A supporter in the US can anonymously donate money to Middle Eastern fighters[60]. Although there is a chance of abuse, hawala is legal in many nations. Even for the sake of global security, the Middle East is still hesitant to abandon tradition, but the United States has effectively resisted the threat of "black" hawala, particularly with the rise of ISIL.
 
Hawala is a useful alternative in regions lacking alternatives from the formal economy, including several regions of the Middle East[61]. Hawala requires little funding and dedication in contrast to conventional banking institutions. Unlike banks, which require an account before conducting business and charge a bank draw fee, hawaladars just ask for a one- to two-percent fee on the amount sent. There are no additional fees or technical requirements.
 

1.8    Role of the Different International Organizations,

International acknowledgment of the gravity of the threat presented by drug trafficking, money laundering, corruption, and other crimes came about in the 20th century. This acknowledgment came about as a result of the rising size of these problems, which go beyond the purview of particular governments and have a considerable, detrimental influence on national security, the economy, and people. The United Nations (UN) is an essential player in the fight against transnational organized crime and the creation of international law. The UN has recently published a series of global papers on combatting transnational organized crime (TOC) because it became apparent that nations' capacity to curb the spread of international criminality did not equal the seriousness of the crimes. The first international experience of combating transnational criminal difficulties was associated with the adoption of intergovernmental accords, like the Viennese convention of 1815 against the slave trade[62].
 
The United Nations Convention against Transnational Organized Crime (UNTOC), which was established by General Assembly Resolution 55/25 on November 15, 2000, is the primary tool used on a global scale to combat transnational organized crime[63]. It was made available for Member States to sign during a High-Level Political Conference that took place in Palermo, Italy, from December 12–15, 2000. The date of effect was September 29, 2003. The Protocol to Prevent, Suppress, and Punish Trafficking in Persons, Particularly Women, and Children; the Protocol Against the Smuggling of Migrants by Land, Sea, and Air; and the Protocol Against the Illicit Manufacturing and Trafficking in Firearms, their Parts and Components, and Ammunition are three Protocols that supplement the Convention and address particular aspects and manifestations of organized crime. Nations must adopt the changes.
 
Protocol for the Prevention, Prohibition, and Punishment of Human Trafficking, Especially of Women and Children It is the first legally binding agreement with a recognized definition of human trafficking, having been created in 2003.
 
Agreement Against Smuggling of Migrants by Land, Sea, and Air This 2004 agreement addresses the problem of organized criminal gangs that smuggle immigrants, frequently at the expense of the migrants,s and great financial gain to the offenders.
 
Firearms, Parts & Components, and Ammunition Illicit Manufacturing and Trafficking Protocol Its declared purpose is to promote, facilitate, and enhance international cooperation to stop, eliminate, and completely eradicate the production and trafficking of illegal firearms, their parts, and ammunition.
Article 2 defines According to the current Convention, an organized criminal group as a structured entity made up of three or more people that has existed for a specific amount of time and collaborates to commit one or more serious crimes with the intention of directly or indirectly gaining financial or other material advantages.
 
In contrast, the Convention itself does not explicitly incorporate the term "transnational organized crime." The UN definition does, however, take into account elements that are connected to TOC, including its worldwide scope, the size of criminal organizations, and the length of their activities. Participation in organized crime (Article 5), money laundering (Article 6), corruption (Article 8), and obstructing the administration of justice (Article 23) are now included in the list of forbidden actions. Extradition, reciprocal legal aid, cooperation between law enforcement agencies, information sharing, and the fight against transnational organized crime are all covered under the Convention's provisions.
 
The United Nations Office on Drugs and Crime (UNODC) is entrusted with the responsibility of overseeing the UNTOC. The UNODC is tasked with assisting Member States in their efforts to combat narcotics, crime, and terrorism, and it leads international efforts to address illegal drug use and transnational crime. The UNODC supports States Parties in carrying out their obligations under international drug control treaties, such as the UN Convention against Transnational Organized Crime and its Protocols, as well as international counterterrorism laws. Additionally, it creates and upholds global norms and standards for criminal justice and crime reduction.
 
Strengthening international standards for national anti-crime practices, enhancing cooperation and the provision of mutual legal assistance, and coordinating the efforts of national law enforcement agencies are important goals in the effort to promote the global fight against transnational crime. The majority of states now recognize the threats posed by transnational criminal organizations, the necessity of international cooperation in pursuing criminals and enforcing penalties, and the refinement of key terms and definitions in the field. These are all notable victories in the fight against transnational organized crime[64].
 
 
The United Nations Convention Against Corruption (UNCAC) stands as the inaugural internationally binding agreement targeting corruption. It was the result of negotiations among UN member states and received approval from the UN General Assembly in October 2003, taking effect in December 2005. This treaty addresses the cross-border dimension of corruption by including provisions on global cooperation and the repatriation of ill-gotten gains while underlining the significance of both preventive and punitive measures. The UNCAC's administrative body is situated in Vienna, specifically within the UN Office on Drugs and Crime (UNODC). Its overarching objective is to combat various forms of corruption, including those with international reach, such as bribery and abuse of power, as well as corruption within the corporate sector. The Convention is organized into five key sections, encompassing preventive strategies, criminalization, and law enforcement, international collaboration, asset recovery, technical support, and the exchange of information. The Convention addresses diverse manifestations of corruption, such as bribery, influence peddling, misuse of authority, and other forms of corrupt practices within the business world. Notably, the UNCAC includes a dedicated chapter on asset recovery, aiming to restore unlawfully acquired assets to their rightful owners, including countries from which they were illegally taken. The majority of United Nations Member States have signed this Convention.
 
The establishment of financial intelligence units (FIUs), the criminalization of money laundering, the ability to freeze and seize the proceeds of crime, the requirement that the private sector produce financial intelligence, the criminalization of money laundering, and formal legal agreements requiring state cooperation between states are a few examples of AML measures. Even though AML's restrictions were once limited to property acquired via illegal conduct, they have since been expanded to include property used to finance or carry out criminal behavior, most notably the spread of WMD and terrorist operations. Even though countries signed a treaty against the funding of terrorism in 1999, it wasn't until after the September 11 attacks that anti-terrorism finance measures were incorporated into international law[65].
 
Over the past three decades, the international community has established a strong global governance structure to combat illicit money. This endeavor is being spearheaded by the Financial Action Task Force (FATF). Even though FATF is mostly obscure to those who do not work directly with it or perform research on it, the anti-money laundering (AML) standards it sets have developed into essential tools of both local and international economic and security policy. The G20 leaders identified FATF as a key actor in attempts to create "a new international financial regulatory architecture" in the aftermath of the 2008 financial crisis, alongside other financial giants like the IMF and the OECD[66]. An international agency called the Financial Action Task Force (FATF) creates and promotes rules and guidelines for combating financial crime[67].
 
The FATF released a report with forty recommendations in April 1990, less than a year after it was founded, to offer a thorough action plan to combat money laundering. The FATF announced its Ninth Special Recommendations in 2004, which enhanced the (40+9) Recommendations, the globally accepted criteria for combating money laundering and terrorism funding. To address emerging threats such as financing the proas proliferation of WMD, the FATF revised and expanded its standards in 2012[68]. Governments can choose to use FATF principles as benchmarks to assess the effectiveness of their anti-money laundering (AML), counter-terrorism financing (CTF), and proliferation financing (PF) laws, as well as the behavior of service providers and cross-border cooperation in criminal matters. These recommendations outline particular behaviors that every country should designate criminals to support the goals of the FATF. They also outline the client due diligence (CDD) processes that financial institutions must follow to reduce the dangers of money laundering and the financing of terrorism through illegal means. These CDD techniques cover duties including confirming each client's identification, keeping an eye on transactions for any suspicious or unusual activity, and swiftly informing the national financial intelligence agency of any such activity.
 
One of the things that makes the FATF effective as a standard-setting organization is its system of reciprocal evaluation of standard compliance and indirect economic consequences for noncompliance. The system for monitoring compliance includes non-members. Governments who do not comply risk reprisal from other nations and their financial institutions. This effectively means that all commercial dealings and connections with citizens of such states are closely inspected. These remedies increase the cost of doing business with these nations, impede the flow of transactions, and frequently lead to the dissolution of corporate ties[69].
 
In its initial response, the FATF defended its rules while criticizing national regulators for taking incorrect, cautious measures[70]. The FATF claims that if regulators use a "risk-based approach" (RBA), many risks may be reduced. Nations and financial institutions were given authorization to set up an RBA for specific AML/CTF framework components by the FATF Recommendations of 2003. Nations may decide to exclude activity from AML/CTF regulations if it is restricted and has a low level of ML/TF risk, as evaluated by the FATF's RBA. Although the fundamental ideas behind an RBA were well understood, there was no agreement on what constitutes an adequate risk assessment, effective risk mitigation techniques, or the range of potential applications for an RBA. Because of worries that the FATF would disagree with a particular interpretation and consider them non-compliant, several smaller nations have had difficulty creating effective RBA frameworks[71].
 
In two open papers released three times a year, the FATF lists countries with weak anti-money laundering and counter-terrorist financing (AML/CFT) regulations. The FATF's system for publicly designating countries with weak AML/CFT policies has worked well. The FATF gives a candidate country up to a year to execute necessary policy reforms before deciding whether or not to list it. Governments work with the FATF to create and carry out action plans to address shortcomings; countries that are slow to carry out their plans are more likely to be listed. The FATF bases its listing choices, in addition to political will, on a "risk-based approach," where countries with larger financial sectors or greater rates of money laundering or terrorism are excluded. Aadhar factors in a nation's legal system, how it reacts to requests for international help, and whether it participates in a follow-up procedure[72].
 
There are significant strategic flaws in the anti-money laundering, anti-terrorist funding, and anti-proliferation finance systems in high-risk nations[73]. The FATF urges all authorities to do additional due diligence on all nations that have been designated as high-risk and calls on other members to do the same. To safeguard the global financial system against national risks related to money laundering, terrorist financing, and proliferation financing (ML/TF/PF), countries are recommended to take action in the most catastrophic situations. This list is frequently referred to as a "black list" by outsiders. Even though Iran and the DPRK are already subject to the FATF's obligation for countermeasures, the review procedure for these two countries has been put off till February 2020 as a result of the COVID-19 issue. Please refer to the notification concerning these nations that was released on February 21, 2020. Even if the statement may not accurately reflect the real AML/CFT regimes in Iran and the Democratic People's Republic of Korea, the FATF's call for action against these high-risk nations is still in force. Increased due diligence procedures that are suitable for the dangers posed by Myanmar's jurisdiction are advocated for FATF member nations and other jurisdictions.
 
When the FATF places a jurisdiction under enhanced monitoring, it implies that the government has agreed to address recognized strategic shortcomings within specific periods and is being closely watched. Others commonly refer to this list as a "grey list" when describing it[74]. The following jurisdictions continue to collaborate with the FATF and regional groups based on the FATF as they provide updates on their success in eliminating strategic weaknesses. The FATF does not advise these countries to implement better due diligence practices. The FATF Standards mandate a risk-based approach rather than derisking or barring a whole customer. Thus, the FATF urges its members and other authorities to consider the information below when assessing risks. The FATF thus encourages its members and other authorities to use the facts presented below in their risk evaluations.
 
One of the major goals of the FATF is to remove unlawful assets from offenders. According to the FATF and INTERPOL, asset recovery must be a significant component of a country's strategy for preventing money laundering and the funding of terrorism[75], which are collaborating with national authorities. To locate, seize, and confiscate stolen money and assets and return them to their original locations, national authorities must create effective means for doing so.
 
The United Nations Office on Drugs and Crime believes that fewer than 1% of all illicit cash flows are now intercepted and recovered by countries[76]. Facilitating the secure communication of sensitive information among various anti-corruption and asset recovery authorities is a critical step toward enhancing the system. Successful asset recovery also requires rigorous and trustworthy investigations, as well as a willingness to communicate evidence via both formal and informal means, particularly in cross-border situations.
 
Lastly, Interpol is an international clearinghouse for data on criminals and crime commodities, giving information to its member law enforcement agencies in every country for many years. To offer a more useful worldwide intelligence and information service, Interpol has reevaluated its work on organized crime. The Analytical Criminal Intelligence Unit, for instance, was founded by Interpol at its Ste. Cloud, France, headquarters with freshly hired personnel who have undergone specialized training in intelligence and criminal analysis. Through the four activity streams listed below, INTERPOL will assist member countries in fending off organized and new criminal threats[77]:
 
1.      Identifying criminal networks; Identify significant persons involved in serious transnational crime, as well as the criminal networks that support them.
2.      Illicit trafficking and marketplaces; Combat criminal networks involved in all sorts of unlawful trafficking, as well as identify and respond to new trends and illicit marketplaces.
3.      Facilitating illicit activity and criminal convergence; Identify connections between seemingly unrelated sorts of crimes, as well as how one crime can be used to support another and assist authorities in preventing such enabling crimes from leading to more criminal behavior.
4.      Illicit money and asset flows; Disrupt the revenues of organized criminal networks by tracking and prohibiting criminals from moving.
 

1.9    Advancement in technology and changing dimensions of organized crimes.

In 20 years, technology and globalization have had unanticipated consequences for criminals. We have benefited from our fast-paced, high-tech environment, yet criminals have been given a digital platform to further their illegal activities. Technology and globalization allow criminals to operate across borders, expanding their scope, crimes, and profits. Just as the Internet has changed every area of our lives, it has also become a focal point for criminal activity. What happens in the Internet's blazing sunlight resonates in the darker recesses of the dark web. The Internet allows respectable businesses to sell their products, but it also allows criminals to sell drugs, guns, and endangered wildlife[78]. Millions of people use social media to share their happy moments, while the dark web preserves the privacy of criminals who are also networking and forming relationships. Accepted by the financial sector, the explosion of Crypto-currencies aids criminals in money laundering and reduces detection risk.
 
The widespread usage of the internet, and its broader impact on all areas of society, creates new opportunities. crime syndicates The use of information technology in organized crime raises various intriguing questions. This is especially true when we promote primes such as cybercrime or the use of modern technology in classic organized crime, which are tied to current knowledge, concepts, and ideas in the field of organized crime. Consider, for example, what its use entails for the way organized primes groups arise and grow. The internet, for example, has reduced the necessity of real-life social capital for participation in organized crime[79]. Another intriguing subject is the use of information technology in the logistics of organized crime. Any type of organized crime can be regarded as a logistical process with several necessary components[80]. These steps may involve, for example, drug production/purchase, transportation and storage, border crossing, and sales.
 
Intelligent criminals also employ modern technology to cut themselves off from their illicit enterprises and sources of revenue, such as electronic money transfer and virtual banking platforms that allow them to transact digitally without physically meeting. Even while these services use digital logs to identify the digital identities of the sender and recipient, criminals may hide their digital identities by simply forging their Internet Protocol address or using another person's account, thereby rendering their activities untraceable[81]. By enabling value transfers without disclosing any personally identifiable information, new virtual currencies like Bitcoin provide an extra level of anonymity. Due to the rule makers' lack of planning, regulations usually fail to affect such virtual currencies, leaving a legal ambiguity. As a result, criminals can continue to expand their illegal activities by taking advantage of technical advancement. One criminal activity that will profit from technological advancement is money laundering.
 
A virtual currency functions in some ways like a currency but is not identical to real money. Transactions using virtual currencies are therefore distinct from those involving the simple electronic transfer of fiat money. Because there are no physical things to observe or intercept for proof of illegal conduct, unlike typical monetary transfers, virtual currencies make AML operations more difficult.
 
Bitcoin is a peer-to-peer (direct user-to-user transactions) network that is both decentralized and essentially anonymous[82] (also known as pseudonymous). Bitcoin's decentralization and peer-to-peer technology make it almost impervious to server raids and the loss of a central database to hackers.
 
Typically, five parties are involved in a Bitcoin transaction, especially when money laundering is involved. (1) a Bitcoin sender who initiates the transaction on the network, in this case using ill-gotten gains; (2) a Bitcoin receiver who accepts the bitcoins, or (3) Bitcoin miners who process and verify transactions by completing blocks, sometimes for free; (4) the core Bitcoin development team, which updates the Bitcoin codebase as necessary; and (5) Bitcoin exchanges.
The major features of Bitcoin that are beneficial to its survival but harmful to efficient AML regulation are the protocol's resiliency through flexibility and anonymity. Enforcement agencies would struggle to follow the injection, stacking, and reentry of laundered cash without the ability to link an identified person to a particular Bitcoin address. Every mining node on the network receives and processes every transaction, so to stop the Bitcoin network from operating, all of the miners on the network must be shut down. The Bitcoin network automatically scales the difficulty for concluding blocks based on the sum of all miners' processing power. As a result, AML initiatives have to deal with a target that is challenging to find and generally resistant to disruption.
 
Bitcoin allows any user, legal or otherwise, to move money at virtually instantaneous rates, for little to no cost, with extremely few obstacles to entry, and while staying anonymous without the need for a clear paper trail. AML procedures are made more difficult by users' ability to instantaneously exchange bitcoins for other currencies, transfer money through an endless number of unique Bitcoin addresses for obfuscation, and exchange goods for cash with other users. In essence, Bitcoin and other virtual currencies would make it easier than ever for criminals to surreptitiously, quickly, and inexpensively launder money.
 
A portion of the Bitcoin infrastructure is being used to launder money from unlawful sources, particularly the drug trade. Bitcoins are also used as a payment method by the escalating ransomware menace. A study by the blockchain analytics company Chainalysis found that criminals laundered $8.6 billion (£6.4 billion) in bitcoin in 2021, up 30% from the year before. The use of Bitcoin by criminal organizations is prompting law enforcement to take action, and the number of cryptocurrency seizures is rising. To help with the response to the use of cryptocurrencies in questionable financial operations, legislative reforms are also being discussed.[83]
 
The Invisible Internet Project (I2P), Freenet, and TOR are just a few of the high-security and anonymity protocols that make up the Dark Web. Because it is a component of the Deep Web, this article will concentrate on it. The Dark Web is a virtual Internet environment where information is shared and viewed anonymously. Navigation is essentially anonymous, and the privacy of shared material is secured by the highly complicated encryption used[84].
 
But like any useful technology, its application has occasionally been misinterpreted. It was just this unsuitable location that made the Dark Web well-known in 2013 when the Federal Bureau of Investigation (FBI) shut down Silk Road, a page that provided illegal drugs freely and openly. Due to the idea muddle and misunderstanding mentioned above, it became more well-known under the moniker of the genre it belonged to, Deep Web.
 
The use of the Dark Web is linked to crimes of all kinds, including the trade of personal information, terrorism, human organ trafficking, pedophilia, cannibalism, the sale of classified government documents, a range of tutorials (homemade bombs, poisons, etc.), falsified documents, rent killers, torture, snuff movies (movies with real people's murderers), trafficking in people, guns, and drugs[85].
 
Let's talk about what criminals do on the Dark Web[86].
Money laundering is a widespread crime on the dark web because it allows illicit monies to be transferred to anonymous accounts. Phishing is a widespread cyber-attack that has afflicted today's digital world. It is a simple approach for criminals to commit fraud by creating false websites, emails, and messages that appear real, and ordinary people are unable to determine that they are fake. They deceive people, steal their credit card information, and pose significant financial and identity theft dangers.  Identity theft is a significant cyber problem nowadays, with criminals impersonating legitimate web users, stealing their data, and accessing their financial accounts.  Malware is software that contains a virus and hacks into a mobile phone or computer. Criminals steal credit card information to make large-amount purchases and engage in fraudulent transactions. They also purchase stolen credit card data from other cybercriminals who have taken advantage of the vulnerable cyber infrastructure.
 
Criminals that operate on the dark web are compensated with virtual currencies, which make money laundering even easier. Most countries do not recognize virtual currencies. Authorities confront numerous obstacles in uncovering money laundering crimes involving virtual currency. It makes tracking people and their internet activity harder for surveillance authorities.
 
There are already more than 65,000 different URLs with the suffix onion on the Tor network. The most prevalent capabilities include communication via forums, chat rooms, file and image hosting, as well as commerce via marketplaces, according to a 2018 survey by computer security company Hyperion Grey. In free societies, a broad variety of legal and acceptable uses are supported by these functional obligations, particularly those that relate to communication[87]. Furthermore, more than half of all dark web domains are legal, according to Terbium Labs' 2016 analysis of 400 randomly chosen onion sites.
 
It should not be acceptable to reinforce child abusers, arms traffickers, and drug lords to protect political dissidents, privacy activists, and whistleblowers. Regulators and law enforcement agencies must devise methods that tread a fine line between upholding liberal principles in an era of information control and spotting and suppressing the most evil practices on the dark web. By enhancing information sharing, enhancing law enforcement's technical capacity to shut down important criminal markets, and regulating the transfer of cryptocurrency transactions, the international community has made great strides in addressing these difficulties over the past few years.
 

CONCLUSION

organizations have in dealing with governments, and the fact that criminal activities frequently reflect market dynamics that are not easily weakened – and can sometimes even be strengthened – by government interventions. The existence of legal systems founded on various ideas and criminalizing diverse acts, which often makes it difficult for governments to collaborate, is one of the obstacles to more effective governance.
 
Even in poorer countries, organized crime is prevalent. for example, Economic differences cause irregular migration within Southeast Asia. Even though borders are open, the UNODC estimates that more than 80% of irregular migrants rely on smugglers[88]. Each year, an estimated half a million migrants, primarily from Myanmar (but also from Cambodia and Lao PDR), are smuggled into Thailand. Fees for smuggling services are low, ranging from a few dollars to a few hundred dollars, making smuggling services often cheaper than traditional labor migration procedures.
 
Another challenge, even for governments devoted to tackling transnational organized crime and unlawful marketplaces, is that they are pursuing other, conflicting objectives. Even trade liberalization encourages higher trade flows, which gives extra cover for narcotics; and both privatization and financial liberalization boost prospects for money laundering[89].
 
Money laundering is a problem, and governments have acknowledged this and passed legislation making it illegal. However, because they are founded on a faulty understanding of the problem, AML legislation continues to fall short of adequately combating money laundering. The traditional "placement, layering, and integration" strategy is out-of-date and unable to take into account current advancements in money laundering, including new criminal behaviors made possible by technology and globalization.
 
However, it is heartening that the General Assembly recently approved the Convention in a legally binding decision, reflecting a growing awareness of transnational crime on a worldwide scale. The majority of UN member states are participating in the current Conference of the Parties to the Convention, which demonstrates a worldwide commitment to building institutional capability and legal instruments to reinforce national and international responses to this type of criminal action. However, the study and evaluation required to determine whether these initiatives have any influence on the TOC problem have only been done on an ad hoc basis thus far. Few countries have engaged in determining the extent and manner in which laws, regulations, training, and public awareness campaigns are effective[90]. This investment is the most difficult issue in combating the problem of transnational organized crime.
 
A convention will be successful only if each member follows through on their commitment to establish laws against international organized crime and to cooperate in investigation, prosecution, and forfeiture processes. Even if a majority of U.N. members ratified such a convention, certain states would remain hesitant or unwilling to truly battle criminals. Myanmar, for example, has ratified the United Nations Drug Convention, but its government remains involved in the large-scale drug trade that occurs on its territory[91]. Some in the US administration have recommended identifying countries that fail to comply with existing international conventions relating to organized crime and implementing sanctions on those who refuse to act due to a lack of will. Those who have failed owing to a lack of resources rather than a lack of will receive support.
 
It is quite challenging to prevent money laundering given the range of methods that are employed. Organized crime is challenging to examine using a scripting technique because it typically involves complicated networks, individuals from the legitimate economy, and illegal companies[92].  Although the need to combat money laundering still makes sense, current preventive techniques don't seem to be doing enough to cut down on it, in part because many of the best preventative measures are quite expensive to execute[93].
 
The dark web, built upon security and anonymity protocols, presents both legitimate and criminal opportunities. Criminal activities on the dark web range from money laundering to phishing, identity theft, and malware attacks. Virtual currencies facilitate the compensation of criminals and add complexity to tracking and surveillance efforts.
 
The difficulty facing law enforcement is finding a balance between protecting privacy and pursuing the most nefarious activity. To overcome these concerns, advancements have been made in information exchange, technical advancement, and bitcoin transaction regulation. Ongoing efforts are required to address the dynamic nature of cybercrime and its ramifications for society as both technology and criminal tactics develop.
 

The Following Are International Measures Proposed

·         For defining the many features of crimes committed in a computerized environment, uniform international model laws may be created.
·         To increase the likelihood of combating transnational crimes, international legislation governing collaboration between nations may be standardized. This would include provisions for a quicker manner of cooperation than the current process using letters of request.
·         To boost the flow of information about crimes committed and technologies produced for foreseeing, addressing, and enforcing the law, there should be more official and informal interaction between law enforcement agencies of other nations.
 
BIBLIOGRAPHY
Reports
1.   FATF REPORT, THE ROLE OF HAWALA AND OTHER SIMILAR SERVICE PROVIDERS IN MONEY LAUNDERING AND TERRORIST FINANCING, October 2013.
2.   Federal Financial Institutions Examination Council, Bank Secrecy Act – Anti-Money Laundering Examination Manual," 2006, p. 7.
3.   Financial Action Task Force on Money Laundering, Report on Money Laundering Typologies, 2002–2003, 14 February 2003.
4.   Protocol to Prevent, Suppress and Punish Trafficking in Persons Especially Women and Children, supplementing the United Nations Convention against Transnational Organized Crime, by General Assembly resolution 55/25, 15 November 2000
5.   World Migration Report 2022.
 
Books
1.   Asia." EAST AND SOUTH-EAST ASIA: INTERNATIONAL RELATIONS AND SECURITY PERSPECTIVES, Andrew TH Tan, ED., Routledge, London (Forthcoming) (2012).
2.   Cragin, Kim, et al. Arms trafficking and Colombia. Rand Corporation, 2003.
3.   Edwards, Adam, and Peter Gill, eds. Transnational organized crime: perspectives on global security.Routledge, 2004.
4.   Gilman, Nils, Jesse Goldhammer, and Steven Weber, eds. Deviant globalization: Black market economy in the 21st century. A& C Black, 2011.
5.   John A. Hide and Seek: Intelligence, law enforcement, and the stalled war on terrorist finance. Potomac Books, Inc., 2006.
6.   Maimbo, Samuel Munzele. The Money Exchange Dealers of Kabul: a study of the Hawala system in Afghanistan. No. 13. World Bank Publications, 2003.
7.   Narli, Nilufer. Human trafficking and smuggling: the process, the actors and the victim profile. na, 2006.
8.   Schwenkenbecher, Anne, and Anne Schwenkenbecher. What Is Terrorism?. Palgrave Macmillan UK,2012.
9.   Wagner, Kim. Thuggee: banditry and the British in early nineteenth-century India. Springer, 2007.
10. Wright, Alan. Organized crime. Routledge, 2013


[1] Federal Financial Institutions Examination Council, Bank Secrecy Act – Anti-Money Laundering Examination Manual," p. 7, 2006.
[2] Greg Baldwin  “Anti-Money Laundering:  The Criminal And Regulatory Framework, And Anti-Money Laundering Compliance”,  Holland & Knight LLP 701 Brickell Ave, Suite 3000 Miami, Florida 33131. 
[3] Gilmour, Nicholas. "Understanding money laundering. A crime script approach." The European Review of Organised Crime 1.2, pp 35-56, 2014
[4] Lindesmith, Alfred R. “Organized Crime.” The Annals of the American Academy of Political and Social Science, vol. 217, pp. 119–27,  1941,
[5] Kumar, Arun. “India, Transnational Organized Crime: Analyses of a Global Challenge to Democracy”, Transcript Verlag, pp,115-26, 2013.
[6] Shelley, Louise. “Unraveling the New Criminal Nexus.” Georgetown Journal of International Affairs, vol. 6, no. 1, pp. 5–13, 2005.
[7] Luong HT, “Transnational crime and its trends in South-East Asia: A detailed narrative in Vietnam”, International Journal for Crime, Justice and Social Democracy 9(2), pp. 88-101, 2020.
[8] HAFED AL-GHWELL, “How organized crime bleeds the Middle East dry”, October 09, 2021, 23:15, https://arab.news/6qchb.
[9] United Nations Convention against Transnational Organized Crime Adopted by the UN General Assembly: https://www.unodc.org/e4j/zh/organized-crime/module-1/key-issues/definition-in-convention.html
[10] Organized crime is defined by Black's Law Dictionary, “Long-term criminal activity conducted in a structured and systematic manner, with the aim of generating illicit income”.
[11] Sullivan, John P, “The Information Age: Transnational Organized Crime, Networks, and Illicit Markets”, Journal of Strategic Security, vol. 16, no. 1, pp. 51–71, 2023.
[12] Geis, Gilbert, “Violence and Organized Crime”, The Annals of the American Academy of Political and Social Science, vol. 364, pp. 86–95, 1966.
[13] Gilman, Nils, Jesse Goldhammer, and Steven Weber, eds. Deviant globalization: Black market economy in the 21st century. A&C Black, 2011.
[14] Paoli, Letizia. "What is the link between organized crime and drug trafficking?." Rausch 6.4, pp 181-189,  2017
[15] Boivin, Rémi. "Drug trafficking networks in the world economy." Crime and networks, pp 182-194, 2013.
[16] Cragin, Kim, et al, “Arms trafficking and Colombia”,Rand Corporation, 2003.
[17] Rothe, Dawn L., and Victoria Collins, “An exploration of applying system criminality to arms trafficking”, International Criminal Justice Review 21.1.pp- 22-38, 2011
[18] Davis, Ian, Chrissie Hirst, and Bernardo Mariani, “Organised crime, corruption and illicit arms trafficking in an enlarged EU”. London -Saferworld, 2001.
[19]   Narli, Nilufer, “Human trafficking and smuggling: the process”, the actors and the victim profile. na, 2006.
[20] World Migration Report, 2022 – JournalsOfIndia, https://journalsofindia.com/world-migration-report-2022/#:~:text=The%20World%20Migration%20Report%20(WMR,extreme%20disasters%20and%20weather%20events.
[21] Article 3, Smuggling of Migrants Protocol procurement, “The unlawful admission of a person into a State Party of which the individual is not a national nor a permanent resident, in order to acquire, directly or indirectly, a pecuniary advantage or another material benefit”.
[22] The act of employing, transporting, transferring, housing, or receiving someone with the intent to take advantage of them by the use of force, threats of force, other types of coercion, abduction, fraud, deceit, abuse of authority, taking advantage of a weak situation, or by giving or getting advantages. At the very least, prostitution and other kinds of sexual exploitation, forced labor and servitude, slavery or actions that resemble slavery, organ harvesting, and coerced labor or services are all seen as forms of exploitation.
[23] Triandafyllidou, Anna, “Migrant smuggling”, Routledge Handbook of Immigration and Refugee Studies. Routledge, pp 426-433, 2022.
[24] UNODC – MIGRANT SMUGGLING FAQs, https://www.unodc.org/unodc/en/human-trafficking/migrant-smuggling/faqs.html
[25] Schwenkenbecher, Anne, and Anne Schwenkenbecher. What Is Terrorism?. Palgrave Macmillan UK, 2012.
[26] Makarenko, Tamara. "The crime-terror continuum: tracing the interplay between transnational organised crime and terrorism." Global crime 6.1 (2004): 129-145.
[27] Chris Dishman, “Terrorism, Crime, and Transformation”, Studies in Conflict & Terrorism, Volume: 24 Issue: 1, pp 43-58, January-February 2001.
[28] Schneider, Friedrich, “Money laundering and financial means of organised crime: some preliminary empirical findings”, Global Business and Economics Review 10.3, pp 309-330, 2008.
[29]   World Bank. org.2003
[30] Freeman, Michael, and Moyara Ruehsen, “Terrorism Financing Methods: An Overview”, Perspectives on Terrorism, vol. 7 no. 4, pp. 5–26,  2013.
[31] Tofangsaz, Hamed, “Rethinking terrorist financing; where does all this lead?”, Journal of Money Laundering Control 18.1, pp 112-130, 2015.
[32] N. Gilmour, “Understanding the practices behind money laundering: A rational choice interpretation”, International Journal of Law, Crime and Justice 44, pp 1-13, 2016.
[33] The statement made by the Interim Committee of the International Monetary Fund (IMF), the IMF's top decision-making body, at the October 1996 Annual Meetings in Washington, D.C. https://www.imf.org/en/News/Articles/2015/09/28/04/53/sp021098
[34] UN Vienna Convention 1988, Article 3.1 describes Money Laundering as, “the conversion or transfer of property with knowledge that it was obtained through a crime(s), with the intent to hide or cover up the crime(s)' source or help anybody engaged in them avoid facing the legal repercussions of their conduct.”
[35] According to Article 1 of the 1990 European Communities (EC) Convention on Laundering, The concealment or disguise of the true nature, source, location, disposition, movement, rights with regard to, or ownership of property, knowing that such property is derived from serious crime, with the intent to conceal or disguise the illicit origin of the property or to help any person who is involved in committing such an offense or offenses to evade the legal consequences of his action.
[36] Greg Baldwin , “Anti-Money Laundering:  The Criminal And Regulatory Framework, And Anti-Money Laundering Compliance Programs”, Holland & Knight LLP 701 Brickell Ave, Suite 3000 Miami, Florida 33131
[37]   Jojarth, Christine, “Money Laundering: Motives, Methods, Impact, and Countermeasures”, Transnational Organized Crime: Analyses of a Global Challenge to Democracy, edited by Heinrich-Böll-Stiftung and Regine Schönenberg, Transcript Verlag, pp. 17–34,  2013.
[38]DR. ENDRE NYITRAI‘Money Laundering and Organised Crime’,JOURNAL OF EASTERNEUROPEAN CRIMINAL LAW, No. 2/2015, 94- 100
[39] Fundamentally, the term "extremism" refers to political activity that violates state norms, is wholly intolerant of others, rejects democracy as a form of government and a method of problem-solving, and also rejects the established social order.[ https://www.ojp.gov/pdffiles1/nij/Mesko/208033.pdf]
[40] Keesoony, Selina. "International anti-money laundering laws: the problems with enforcement." Journal of Money Laundering Control 19.2 (2016): 130-147.
[41] Realuyo, Celina B. “Following the Terrorist Money Trail.” Connections, vol. 10, no. 2, pp. 105–24, 2011,
[42] Financial Action Task Force on Money Laundering, Report on Money Laundering Typologies, 2002–2003, 14 February 2003,  http://www.fatf-gafi .org/dataoecd/29/33/34037958 .pdf, accessed 19 September 2009
[43] Passas, Nikos, “Hawala and Other Informal Value Transfer Systems: How to Regulate Them?”, Risk Management, vol. 5, no. 2, pp. 49–59,  2003.
[44]The UN High-Level Panel on Threats, Challenges, and Change has identified several risks, including interstate conflict, internal conflict involving genocide, civil war, and other severe atrocities, terrorism, and transnational organized crime. Economic and social threats also include poverty, infectious diseases, and environmental degradation. Drug trafficking and transnational organized crime continue to represent a severe danger to international security in several parts of the world, according to the UN Security Council (quoted in UN 2010: p2; UNSC February 2010).
[45] Gordon, Sandy, “Regionalism and cross-border cooperation against crime and terrorism in the Asia-Pacific”, Security Challenges 5.4, pp 75-102, 2009.
[46] Broadhurst, Roderic, and Vy Kim Le, “Transnational Organized Crime in East and South East Asia”, East And South-East Asia: International Relations And Security Perspectives, Andrew TH Tan, ED, Routledge, London (Forthcoming), 2012.
[47] Karmon, Ely, “The Middle East–A [very] Cautious Evaluation 10.5102/URI. v9i1. 1391”, Universitas: Relaçoes Internacionais 9.1, 2011.
[48] Ward, Richard H., and Daniel J. Mabrey, “Organized Crime in Asia and the Middle East”, Handbook of Transnational Crime and Justice 443, 2013.
[49] Bhulai, Rafia, and Naureen Chowdhury Fink, “Strengthening Regional Cooperation to Prevent and Counter Violent Extremism in South Asia: What Role for Civil Society?”, Global Center on Cooperative Security, 2016.
[50] Justin Hastings, “Geography, Globalization, and Terrorism: The Plots of Jemaah Islamiyah”, Security Studies 17:3 (2008), pp. 505-530.
[51] “Southeast Asia Opium Survey 2015”, UNODC (2015) https://www.unodc.org/documents/crop-monitoring/sea/Southeast_Asia_Opium_Survey_2015_web.pdf.
[52] Patrick Meehan, “How the military benefits from Myanmar’s growing opium economy” East Asia Forum (14/6/16)
[53] Sumpter, Cameron, and Joseph Franco. "Migration, transnational crime and terrorism: Exploring the nexus in Europe and Southeast Asia." Perspectives on Terrorism 12.5 (2018): 36-50.
[54] Glenny, Misha. "Balkan Organised Crime." Is there an Albanian Question (2008): 87-104.
[55] Hezbollah's principal purpose is to destroy Israel, and the party has developed a powerful political presence as well as a formidable paramilitary organisation over the years. The group has used suicide bombers as well as rockets and missiles against Israel.
[56] Richard H. Ward and Daniel J. Mabrey, “Organized Crime in Asia and the Middle East”,  https://sk.sagepub.com/books/transnational-organized-crime
[57]   Demiroz, Fatih, and Naim Kapucu, “Anatomy of a dark network: the case of the Turkish Ergenekon terrorist organization”, Trends in organized crime 15, pp 271-295, 2012
[58] Caulderwood, Kathleen, “Al-Shabab’s Finances: The Militant group gets funding from local businesses, sources abroad”,  International Business Times, 2014.
[59] Sink, J, “ISIS rakes in donations on Twitter. The Hill”, 2014.
[60] Network, Financial Crimes Enforcement, “The Hawala alternative remittance system and its role in money laundering”, 2000.
[61] Maimbo, Samuel Munzele. The Money Exchange Dealers of Kabul: a study of the Hawala system in Afghanistan. No. 13. World Bank Publications, 2003.
[62] Thomas Curson Hansard, The Parliamentary Debates from the Year 1803 to the Present Time, volume 32, 1 February to 6 March 1816 (London: T. C. Hansard, 1816), 200-201.
[63] The UN General Assembly adopted resolution 55/25 on November 15, 2000.Signatories: 147, Parties: 191 (as of 20 February 2023), entry into force: 29 September 2003, in accordance with article 38.
[64] Chitadze, Nika. “Global Dimensions of Organized Crime and Ways of Preventing Threats at International Level.” Connections, vol. 15, no. 3, pp. 17–32,  2016.
[65] Simon NM Young, “Money Laundering in International Law”, Oxford Billiographies ,LAST MODIFIED: 27 OCTOBER 2021
[66] Nance, Mark T. "The regime that FATF built: An introduction to the Financial Action Task Force." Crime, Law and Social Change 69, pp 109-129, 2018.
[67] The FATF was created in 1989 at the behest of the G7 and is headquartered in Paris
[68] FATF, FATF GUIDANCE ON ANTI-MONEY LAUNDERING AND TERRORIST FINANCING MEASURES AND FINANCIAL INCLUSION (2011) [hereinafter FATF 2011 GUIDANCE],
[69] INT’L MONETARY FUND [IMF], ANTI-MONEY LAUNDERING AND COMBATING THE FINANCING OF TERRORISM (AML/CFT): REPORT ON THE EFFECTIVENESS OF THE PROGRAM, 83-84 (2011).
[70] Paul Vlaanderen, FATF President, Speech at the ESAAMLG 9th Council of Ministers Meeting (Aug. 21, 2009).
[71] De Koker, Louis. "The 2012 revised FATF recommendations: Assessing and mitigating mobile money integrity risks within the new standards framework." Washington Journal of Law, Technology & Arts 8.3 (2013): 165.
[72] FATF - High-risk and other monitored jurisdictions,  https://www.fatf-gafi.org/en/topics/high-risk-and-other-monitored-jurisdictions.html
[73]FATF, Topic- High-risk and other monitored jurisdictions
[74]Since the COVID-19 outbreak, the FATF has let nations without approaching deadlines to voluntarily report their progress. The FATF has assessed the development of the following nations since October 2022: Albania, Barbados, Burkina Faso, Cambodia, Cayman Islands, Gibraltar, Haiti, Jamaica, Jordan, Mali, Morocco, Myanmar, Panama, Philippines, Senegal, South Sudan, Türkiye, UAE, and Uganda. Below are updated statements for these nations. The Democratic Republic of the Congo, Mozambique, and Tanzania made the decision to postpone reporting; as a result, the statements they issued in October 2022 are included below, however, they might not accurately reflect the most current condition of their AML/CFT regimes. The FATF has reviewed and added South Africa and Nigeria to its list. .
[75] INTERPOL-  International Criminal Police Organization, and it is an inter-governmental organization. It has 195 member countries and helps police in all of them to work together to make the world a safer place.
[76] FATF- Topic “Asset recovery”, https://www.fatf-gafi.org/en/topics/asset-recovery.html
[77] INTERPOL- ‘Global Strategy of Organized And Emerging Crime’, https://www.interpol.int/en/content/download/19816/file/OEC%20Short%20Strategy%20EN.pdf
[78] UNDOC- “In Just Two Decades, Technology Has Become A Cornerstone Of Criminality”,  23 October 2017.
https://www.unodc.org/unodc/en/frontpage/2017/October/in-just-two-decades--technology-has-become-a-cornerstone-of-criminality.html
[79] Lavorgna, Anita, Robert Lombardo, and Anna Sergi, “Organized crime in three regions: comparing the Veneto, Liverpool, and Chicago”, Trends in Organized Crime 16, pp 265-285,  2013.
[80] Cornish, Derek B., and Ronald V. Clarke, “Analyzing organized crimes, Rational choice and criminal behavior”,  Recent research and future challenges 32, pp 41-63, 2002.
[81] Bryans, Danton, “Bitcoin and money laundering: mining for an effective solution”,  Ind. LJ 89 , pp 441, 2014.
[82] Bitcoin—"A pseudonymous cryptographic currency . Pseudonymity is the use of a fictitious name or identity”. BLACK’S LAW DICTIONARY 1347 (9th ed. 2009).
[83] “Crypto money laundering rises 30%, report finds”. BBC News, Published 26 January 2022, https://www.bbc.com/news/technology-60072195
[84] Ciancaglini, Vincenzo, et al. "the Deep Web." Trend Micro (2015).
[85]   Braga, Romulo Rhemo Palitot, and Arthur Augusto Barbosa Luna, “Dark Web and Bitcoin: An Analysis of the Impact of Digital Anonymate and Cryptocurrencies in the Practice of Money Laundering Crime”, Direito e Desenvolvimento 9, pp – 270, 2018.
[86] “The Dark Connection Between the Dark Web and Money Laundering”- https://amluae.com/connection-between-the-dark-web-and-money
[87]ADITI KUMAR, ERIC ROSENBACH, “THE TRUTH ABOUT THE DARK WEB”, IMF, SEPTEMBER 2019
[88] Southeast Asia and the Pacific Regional Office of the UNODC.- "Migrant trafficking," https://www.unodc.org/roseap/en/what-we-do/toc/smuggling-of-migrants.html
[89]Williams, Phil. "Crime, illicit markets, and money laundering." Managing global issues: Lessons learned 37 (2001).
[90] Albanese, Jay S, “Deciphering the linkages between organized crime and transnational crime”, Journal of International Affairs, pp 1-16, 2012.
[91] Guymon, CarrieLyn Donigan, “International legal mechanisms for combating transnational organized crime: The need for a multilateral convention”, Berkeley J. Int'l L. 18, pp 53, 2000
[92] Riccardi, Michele, and Ernesto Ugo Savona, “The identification of beneficial owners in the fight against money laundering,” 2013.
[93] Schneider, Friedrich, ”Money laundering and financial means of organised crime: some preliminary empirical findings”, Global Business and Economics Review 10.3, pp 309-330, 2008

Authors : PREETI ADHIKARY
Registration ID : 106522 Published Paper ID: IJLRA6522
Year : Dec-2023 | Volume : II | Issue : 7
Approved ISSN : 2582-6433 | Country : Delhi, India
Email Id : mepreetiadhikary@gmail.com
Page No :49 | No of times Downloads: 0065
Doi Link