• +91 7042148991
  • editor@ijlra.com
image
  • Home
  • Ethics & policy
    • Duties Of Authors
    • Editors Responsibilities
    • Reviewrs Responsibilities
    • Plagiarism Policy
    • Copyright Policy
  • For authors
    • About us
    • Call for paper
    • Verify certificate
    • Track Paper
    • Copyright form
    • How to Publish Paper
  • Issue
    • Past issue
    • VOLUME 1
      • ISSUE 9
      • VOLUME 1 ISSUE 3
      • VOLUME 1 ISSUIE 7
      • VOLUME 1 ISSUIE 5
      • VOLUME 1 ISSUIE 6
    • VOLUME 2
      • VOLUME 2 ISSUE 5
      • VOLUME 2 ISSUE 6
      • VOLUME 2 ISSUE 7
      • VOLUME II ISSUE 7
      • VOLUME 2 ISSUIE 1
      • VOLUME 2 ISSUE 2
      • VOLUME 2 ISSUE 8
      • VOLUME 2 ISSUE 9
      • VOLUME 2 ISSUE 10
    • VOLUME 3
      • VOLUME 3 ISSUE 1
      • VOLUME 3 ISSUIE 2
  • Editorial Board
  • Verify certificate
  • Submit Paper
image
  • Home
  • Ethics & policy
    • Duties Of Authors
    • Editors Responsibilities
    • Reviewrs Responsibilities
    • Plagiarism Policy
    • Copyright Policy
  • For authors
    • About us
    • Call for paper
    • Verify certificate
    • Track Paper
    • Copyright form
    • How to Publish Paper
  • Issue
    • Past issue
    • VOLUME 1
      • ISSUE 9
      • VOLUME 1 ISSUE 3
      • VOLUME 1 ISSUIE 7
      • VOLUME 1 ISSUIE 5
      • VOLUME 1 ISSUIE 6
    • VOLUME 2
      • VOLUME 2 ISSUE 5
      • VOLUME 2 ISSUE 6
      • VOLUME 2 ISSUE 7
      • VOLUME II ISSUE 7
      • VOLUME 2 ISSUIE 1
      • VOLUME 2 ISSUE 2
      • VOLUME 2 ISSUE 8
      • VOLUME 2 ISSUE 9
      • VOLUME 2 ISSUE 10
    • VOLUME 3
      • VOLUME 3 ISSUE 1
      • VOLUME 3 ISSUIE 2
  • Editorial Board
  • Verify certificate
  • Submit Paper

CYBER ATTACKS A REAL THREAT BY: TRIPTI

Authors : TRIPTI
Registration ID : 106523 Published Paper ID: IJLRA6523
Year : Dec-2023 | Volume : II | Issue : 7
Approved ISSN : 2582-6433 | Country : Delhi, India
Email Id : nikkint281997@gmail.com
Page No :16 | No of times Downloads: 0065
Doi Link
  • Share on:
  • Citation
  • Download
  • Full Details
  • Search on Google

MONEY LAUNDERING AND TRANS-NATIONAL ORGANIZED CRIME -THE NEXUS BY - PREETI ADHIKARY

Authors : PREETI ADHIKARY
Registration ID : 106522 Published Paper ID: IJLRA6522
Year : Dec-2023 | Volume : II | Issue : 7
Approved ISSN : 2582-6433 | Country : Delhi, India
Email Id : mepreetiadhikary@gmail.com
Page No :49 | No of times Downloads: 0065
Doi Link
  • Share on:
  • Citation
  • Download
  • Full Details
  • Search on Google

FREEDOM OF CHOICE IN MARRIAGE – A CASE ANALYSIS OF LAXMIBAI CHANDARAGI B & ANR. V. THE STATE OF KARNATAKA & ORS. BY - ASHHAD SAJID KHAN

Authors : ASHHAD SAJID KHAN
Registration ID : 106521 Published Paper ID: IJLRA6521
Year : Dec-2023 | Volume : II | Issue : 7
Approved ISSN : 2582-6433 | Country : Delhi, India
Email Id : khanashhadsajid@gmail.com
Page No :10 | No of times Downloads: 0065
Doi Link
  • Share on:
  • Citation
  • Download
  • Full Details
  • Search on Google

LEGAL FRAMWORK OF SECURITISATION IN INDIA BY - NEETI GOYAL

Authors : NEETI GOYAL
Registration ID : 106520 Published Paper ID: IJLRA6520
Year : Dec-2023 | Volume : II | Issue : 7
Approved ISSN : 2582-6433 | Country : Delhi, India
Email Id : neetigoyal.30@gmail.com
Page No :13 | No of times Downloads: 0065
Doi Link
  • Share on:
  • Citation
  • Download
  • Full Details
  • Search on Google

VIVAD SE VISHWAS BY - SHUBHAM SRIVASTAV

Authors : SHUBHAM SRIVASTAV
Registration ID : 106519 Published Paper ID: IJLRA6519
Year : Dec-2023 | Volume : II | Issue : 7
Approved ISSN : 2582-6433 | Country : Delhi, India
Email Id : shubhamsrivastav949@gmail.com
Page No :16 | No of times Downloads: 0065
Doi Link
  • Share on:
  • Citation
  • Download
  • Full Details
  • Search on Google

EXECUTION OF DECREE UNDER THE CIVIL PROCEDURE CODE 1908: ARREST, DETENTION, RELEASE AND SEIZURE BY - ALIND GUPTA

Authors : ALIND GUPTA
Registration ID : 106518 Published Paper ID: IJLRA6518
Year : Dec-2023 | Volume : II | Issue : 7
Approved ISSN : 2582-6433 | Country : Delhi, India
Email Id : alindgpt@yahoo.co.in
Page No :16 | No of times Downloads: 0065
Doi Link
  • Share on:
  • Citation
  • Download
  • Full Details
  • Search on Google

JUDICIAL ACTIVISM AND OVERREACH BY - YOGYA SHARMA

Authors : YOGYA SHARMA 
Registration ID : 106517 Published Paper ID: IJLRA6517
Year : Dec-2023 | Volume : II | Issue : 7
Approved ISSN : 2582-6433 | Country : Delhi, India
Email Id : yogya.s10@gmail.com
Page No :17 | No of times Downloads: 0065
Doi Link
  • Share on:
  • Citation
  • Download
  • Full Details
  • Search on Google

INTERNATIONAL MIGRATION: A BANE OR BOON TO THE WORLD ECONOMY AND SOCIAL DEVELOPMENT BY - DR. UDAI PRATAP SINGH MS. ANUPRIYA R. PRASAD

Authors : DR. UDAI PRATAP SINGH  MS. ANUPRIYA R. PRASAD
Registration ID : 106515 Published Paper ID: IJLRA6515 & IJLRA6516
Year : Dec-2023 | Volume : II | Issue : 7
Approved ISSN : 2582-6433 | Country : Delhi, India
Email Id : judaip.singh@ddn.upes.ac.in
Page No :15 | No of times Downloads: 0065
Doi Link
  • Share on:
  • Citation
  • Download
  • Full Details
  • Search on Google

THE NEED FOR AN UPGRADED EMPHASIS ON AN INTERNATIONAL DIGITAL LAWFARE STRATEGY BY INDIA: A NOD FOR/ AGAINST AN IMPACTFUL CHANGE? BY - JOHN MARIADAS

Authors : JOHN MARIADAS
Registration ID : 106514 Published Paper ID: IJLRA6514
Year : Dec-2023 | Volume : II | Issue : 7
Approved ISSN : 2582-6433 | Country : Delhi, India
Email Id : john.mariadas@law.christuniversity.in
Page No :13 | No of times Downloads: 0065
Doi Link
  • Share on:
  • Citation
  • Download
  • Full Details
  • Search on Google

THE CONFLICT BETWEEN PARLIAMENTARY PRIVILEGES AND FUNDAMENTAL RIGHTS: A STUDY OF THE INDIAN SCENARIO BY - KALYANI RAVINDRA YADAV

Authors : KALYANI RAVINDRA YADAV
Registration ID : 106513 Published Paper ID: IJLRA6513
Year : Dec-2023 | Volume : II | Issue : 7
Approved ISSN : 2582-6433 | Country : Delhi, India
Email Id : kalyaniyadav3748@gmail.com
Page No :16 | No of times Downloads: 0065
Doi Link
  • Share on:
  • Citation
  • Download
  • Full Details
  • Search on Google
« Previous Next »

International journal for legal research and analysis

Abbreviation:IJLRA

ISSN:2582-6433

Website:https://www.ijlra.com/

Accessibility:Open Access

License:Creative Commons 4.0

Submit Manuscript:Click here

Licensing:

All research articles published INTERNATIONAL JOURNAL FOR LEGAL RESEARCH AND ANALYSIS are fully open access. i.e. immediately freely available to read, download and share. Articles are published under the terms of a Creative Commons license which permits use, distribution and reproduction in any medium, provided the original work is properly cited.

Disclaimer:

The opinions expressed in this publication are those of the authors. They do not purport to reflect the opinions or views of the INTERNATIONAL JOURNAL FOR LEGAL RESEARCH AND ANALYSIS or its members. The designations employed in this publication and the presentation of material therein do not imply the expression of any opinion whatsoever on the part of the INTERNATIONAL JOURNAL FOR LEGAL RESEARCH AND ANALYSIS

Ethics and Policy

  • Duties of Authors
  • Editors Responsibilities
  • Reviewrs Responsibilities
  • Plagiarism Policy
  • Copyright Policy

For Authors

  • About us
  • Call for paper
  • Verify Certificate
  • Copyright Form
  • How to Publish Paper
  • Editorial Board
  • Contact us

Citation

[1] https://www.kaspersky.com/resource-center/definitions/what-is-cyber-security
[2] https://www.cisco.com/c/en_in/products/security/what-is-cybersecurity.html#~how-cybersecurity-works
[3] https://www.upguard.com/blog/cybersecurity-important
[4] https://www.comptia.org/content/articles/why-is-cybersecurity-important
[5] https://www.simplilearn.com/tutorials/cyber-security-tutorial/types-of-cyber-attacks
[6] https://microage.ca/cybersecurity-layering-approach/
[7] https://www.meity.gov.in/writereaddata/files/downloads/National_cyber_security_policy-2013%281%29.pdf
[8] https://www.indiacode.nic.in/bitstream/123456789/13116/1/it_act_2000_updated.pdf
66C. Punishment for identity theft. –
[9] https://www.indiacode.nic.in/bitstream/123456789/13116/1/it_act_2000_updated.pdf
[10] https://www.indiacode.nic.in/bitstream/123456789/2263/1/aA1860-45.pdf
[11] https://www.indiacode.nic.in/bitstream/123456789/2263/1/aA1860-45.pdf
[12] AIR 2015 SC 1523
[13] https://enhelion.com/blogs/2021/03/01/landmark-cyber-law-cases-in-india/
[14]  (2008) 105 DRJ 721
[15] https://enhelion.com/blogs/2021/03/01/landmark-cyber-law-cases-in-india/
[16] 105 DRJ 721
[17] https://enhelion.com/blogs/2021/03/01/landmark-cyber-law-cases-in-india/
[18] CM APPL. No. 33474 of 2016
[19] https://enhelion.com/blogs/2021/03/01/landmark-cyber-law-cases-in-india/
[20] https://unacademy.com/content/upsc/internal-security-notes/indias-challenges-in-cyberspace/#:~:text=India%20is%20the%20third%20most,by%20security%20solutions%20provider%20Symantec.

Citation

[1] Federal Financial Institutions Examination Council, Bank Secrecy Act – Anti-Money Laundering Examination Manual," p. 7, 2006.
[2] Greg Baldwin  “Anti-Money Laundering:  The Criminal And Regulatory Framework, And Anti-Money Laundering Compliance”,  Holland & Knight LLP 701 Brickell Ave, Suite 3000 Miami, Florida 33131. 
[3] Gilmour, Nicholas. "Understanding money laundering. A crime script approach." The European Review of Organised Crime 1.2, pp 35-56, 2014
[4] Lindesmith, Alfred R. “Organized Crime.” The Annals of the American Academy of Political and Social Science, vol. 217, pp. 119–27,  1941,
[5] Kumar, Arun. “India, Transnational Organized Crime: Analyses of a Global Challenge to Democracy”, Transcript Verlag, pp,115-26, 2013.
[6] Shelley, Louise. “Unraveling the New Criminal Nexus.” Georgetown Journal of International Affairs, vol. 6, no. 1, pp. 5–13, 2005.
[7] Luong HT, “Transnational crime and its trends in South-East Asia: A detailed narrative in Vietnam”, International Journal for Crime, Justice and Social Democracy 9(2), pp. 88-101, 2020.
[8] HAFED AL-GHWELL, “How organized crime bleeds the Middle East dry”, October 09, 2021, 23:15, https://arab.news/6qchb.
[9] United Nations Convention against Transnational Organized Crime Adopted by the UN General Assembly: https://www.unodc.org/e4j/zh/organized-crime/module-1/key-issues/definition-in-convention.html
[10] Organized crime is defined by Black's Law Dictionary, “Long-term criminal activity conducted in a structured and systematic manner, with the aim of generating illicit income”.
[11] Sullivan, John P, “The Information Age: Transnational Organized Crime, Networks, and Illicit Markets”, Journal of Strategic Security, vol. 16, no. 1, pp. 51–71, 2023.
[12] Geis, Gilbert, “Violence and Organized Crime”, The Annals of the American Academy of Political and Social Science, vol. 364, pp. 86–95, 1966.
[13] Gilman, Nils, Jesse Goldhammer, and Steven Weber, eds. Deviant globalization: Black market economy in the 21st century. A&C Black, 2011.
[14] Paoli, Letizia. "What is the link between organized crime and drug trafficking?." Rausch 6.4, pp 181-189,  2017
[15] Boivin, Rémi. "Drug trafficking networks in the world economy." Crime and networks, pp 182-194, 2013.
[16] Cragin, Kim, et al, “Arms trafficking and Colombia”,Rand Corporation, 2003.
[17] Rothe, Dawn L., and Victoria Collins, “An exploration of applying system criminality to arms trafficking”, International Criminal Justice Review 21.1.pp- 22-38, 2011
[18] Davis, Ian, Chrissie Hirst, and Bernardo Mariani, “Organised crime, corruption and illicit arms trafficking in an enlarged EU”. London -Saferworld, 2001.
[19]   Narli, Nilufer, “Human trafficking and smuggling: the process”, the actors and the victim profile. na, 2006.
[20] World Migration Report, 2022 – JournalsOfIndia, https://journalsofindia.com/world-migration-report-2022/#:~:text=The%20World%20Migration%20Report%20(WMR,extreme%20disasters%20and%20weather%20events.
[21] Article 3, Smuggling of Migrants Protocol procurement, “The unlawful admission of a person into a State Party of which the individual is not a national nor a permanent resident, in order to acquire, directly or indirectly, a pecuniary advantage or another material benefit”.
[22] The act of employing, transporting, transferring, housing, or receiving someone with the intent to take advantage of them by the use of force, threats of force, other types of coercion, abduction, fraud, deceit, abuse of authority, taking advantage of a weak situation, or by giving or getting advantages. At the very least, prostitution and other kinds of sexual exploitation, forced labor and servitude, slavery or actions that resemble slavery, organ harvesting, and coerced labor or services are all seen as forms of exploitation.
[23] Triandafyllidou, Anna, “Migrant smuggling”, Routledge Handbook of Immigration and Refugee Studies. Routledge, pp 426-433, 2022.
[24] UNODC – MIGRANT SMUGGLING FAQs, https://www.unodc.org/unodc/en/human-trafficking/migrant-smuggling/faqs.html
[25] Schwenkenbecher, Anne, and Anne Schwenkenbecher. What Is Terrorism?. Palgrave Macmillan UK, 2012.
[26] Makarenko, Tamara. "The crime-terror continuum: tracing the interplay between transnational organised crime and terrorism." Global crime 6.1 (2004): 129-145.
[27] Chris Dishman, “Terrorism, Crime, and Transformation”, Studies in Conflict & Terrorism, Volume: 24 Issue: 1, pp 43-58, January-February 2001.
[28] Schneider, Friedrich, “Money laundering and financial means of organised crime: some preliminary empirical findings”, Global Business and Economics Review 10.3, pp 309-330, 2008.
[29]   World Bank. org.2003
[30] Freeman, Michael, and Moyara Ruehsen, “Terrorism Financing Methods: An Overview”, Perspectives on Terrorism, vol. 7 no. 4, pp. 5–26,  2013.
[31] Tofangsaz, Hamed, “Rethinking terrorist financing; where does all this lead?”, Journal of Money Laundering Control 18.1, pp 112-130, 2015.
[32] N. Gilmour, “Understanding the practices behind money laundering: A rational choice interpretation”, International Journal of Law, Crime and Justice 44, pp 1-13, 2016.
[33] The statement made by the Interim Committee of the International Monetary Fund (IMF), the IMF's top decision-making body, at the October 1996 Annual Meetings in Washington, D.C. https://www.imf.org/en/News/Articles/2015/09/28/04/53/sp021098
[34] UN Vienna Convention 1988, Article 3.1 describes Money Laundering as, “the conversion or transfer of property with knowledge that it was obtained through a crime(s), with the intent to hide or cover up the crime(s)' source or help anybody engaged in them avoid facing the legal repercussions of their conduct.”
[35] According to Article 1 of the 1990 European Communities (EC) Convention on Laundering, The concealment or disguise of the true nature, source, location, disposition, movement, rights with regard to, or ownership of property, knowing that such property is derived from serious crime, with the intent to conceal or disguise the illicit origin of the property or to help any person who is involved in committing such an offense or offenses to evade the legal consequences of his action.
[36] Greg Baldwin , “Anti-Money Laundering:  The Criminal And Regulatory Framework, And Anti-Money Laundering Compliance Programs”, Holland & Knight LLP 701 Brickell Ave, Suite 3000 Miami, Florida 33131
[37]   Jojarth, Christine, “Money Laundering: Motives, Methods, Impact, and Countermeasures”, Transnational Organized Crime: Analyses of a Global Challenge to Democracy, edited by Heinrich-Böll-Stiftung and Regine Schönenberg, Transcript Verlag, pp. 17–34,  2013.
[38]DR. ENDRE NYITRAI‘Money Laundering and Organised Crime’,JOURNAL OF EASTERNEUROPEAN CRIMINAL LAW, No. 2/2015, 94- 100
[39] Fundamentally, the term "extremism" refers to political activity that violates state norms, is wholly intolerant of others, rejects democracy as a form of government and a method of problem-solving, and also rejects the established social order.[ https://www.ojp.gov/pdffiles1/nij/Mesko/208033.pdf]
[40] Keesoony, Selina. "International anti-money laundering laws: the problems with enforcement." Journal of Money Laundering Control 19.2 (2016): 130-147.
[41] Realuyo, Celina B. “Following the Terrorist Money Trail.” Connections, vol. 10, no. 2, pp. 105–24, 2011,
[42] Financial Action Task Force on Money Laundering, Report on Money Laundering Typologies, 2002–2003, 14 February 2003,  http://www.fatf-gafi .org/dataoecd/29/33/34037958 .pdf, accessed 19 September 2009
[43] Passas, Nikos, “Hawala and Other Informal Value Transfer Systems: How to Regulate Them?”, Risk Management, vol. 5, no. 2, pp. 49–59,  2003.
[44]The UN High-Level Panel on Threats, Challenges, and Change has identified several risks, including interstate conflict, internal conflict involving genocide, civil war, and other severe atrocities, terrorism, and transnational organized crime. Economic and social threats also include poverty, infectious diseases, and environmental degradation. Drug trafficking and transnational organized crime continue to represent a severe danger to international security in several parts of the world, according to the UN Security Council (quoted in UN 2010: p2; UNSC February 2010).
[45] Gordon, Sandy, “Regionalism and cross-border cooperation against crime and terrorism in the Asia-Pacific”, Security Challenges 5.4, pp 75-102, 2009.
[46] Broadhurst, Roderic, and Vy Kim Le, “Transnational Organized Crime in East and South East Asia”, East And South-East Asia: International Relations And Security Perspectives, Andrew TH Tan, ED, Routledge, London (Forthcoming), 2012.
[47] Karmon, Ely, “The Middle East–A [very] Cautious Evaluation 10.5102/URI. v9i1. 1391”, Universitas: Relaçoes Internacionais 9.1, 2011.
[48] Ward, Richard H., and Daniel J. Mabrey, “Organized Crime in Asia and the Middle East”, Handbook of Transnational Crime and Justice 443, 2013.
[49] Bhulai, Rafia, and Naureen Chowdhury Fink, “Strengthening Regional Cooperation to Prevent and Counter Violent Extremism in South Asia: What Role for Civil Society?”, Global Center on Cooperative Security, 2016.
[50] Justin Hastings, “Geography, Globalization, and Terrorism: The Plots of Jemaah Islamiyah”, Security Studies 17:3 (2008), pp. 505-530.
[51] “Southeast Asia Opium Survey 2015”, UNODC (2015) https://www.unodc.org/documents/crop-monitoring/sea/Southeast_Asia_Opium_Survey_2015_web.pdf.
[52] Patrick Meehan, “How the military benefits from Myanmar’s growing opium economy” East Asia Forum (14/6/16)
[53] Sumpter, Cameron, and Joseph Franco. "Migration, transnational crime and terrorism: Exploring the nexus in Europe and Southeast Asia." Perspectives on Terrorism 12.5 (2018): 36-50.
[54] Glenny, Misha. "Balkan Organised Crime." Is there an Albanian Question (2008): 87-104.
[55] Hezbollah's principal purpose is to destroy Israel, and the party has developed a powerful political presence as well as a formidable paramilitary organisation over the years. The group has used suicide bombers as well as rockets and missiles against Israel.
[56] Richard H. Ward and Daniel J. Mabrey, “Organized Crime in Asia and the Middle East”,  https://sk.sagepub.com/books/transnational-organized-crime
[57]   Demiroz, Fatih, and Naim Kapucu, “Anatomy of a dark network: the case of the Turkish Ergenekon terrorist organization”, Trends in organized crime 15, pp 271-295, 2012
[58] Caulderwood, Kathleen, “Al-Shabab’s Finances: The Militant group gets funding from local businesses, sources abroad”,  International Business Times, 2014.
[59] Sink, J, “ISIS rakes in donations on Twitter. The Hill”, 2014.
[60] Network, Financial Crimes Enforcement, “The Hawala alternative remittance system and its role in money laundering”, 2000.
[61] Maimbo, Samuel Munzele. The Money Exchange Dealers of Kabul: a study of the Hawala system in Afghanistan. No. 13. World Bank Publications, 2003.
[62] Thomas Curson Hansard, The Parliamentary Debates from the Year 1803 to the Present Time, volume 32, 1 February to 6 March 1816 (London: T. C. Hansard, 1816), 200-201.
[63] The UN General Assembly adopted resolution 55/25 on November 15, 2000.Signatories: 147, Parties: 191 (as of 20 February 2023), entry into force: 29 September 2003, in accordance with article 38.
[64] Chitadze, Nika. “Global Dimensions of Organized Crime and Ways of Preventing Threats at International Level.” Connections, vol. 15, no. 3, pp. 17–32,  2016.
[65] Simon NM Young, “Money Laundering in International Law”, Oxford Billiographies ,LAST MODIFIED: 27 OCTOBER 2021
[66] Nance, Mark T. "The regime that FATF built: An introduction to the Financial Action Task Force." Crime, Law and Social Change 69, pp 109-129, 2018.
[67] The FATF was created in 1989 at the behest of the G7 and is headquartered in Paris
[68] FATF, FATF GUIDANCE ON ANTI-MONEY LAUNDERING AND TERRORIST FINANCING MEASURES AND FINANCIAL INCLUSION (2011) [hereinafter FATF 2011 GUIDANCE],
[69] INT’L MONETARY FUND [IMF], ANTI-MONEY LAUNDERING AND COMBATING THE FINANCING OF TERRORISM (AML/CFT): REPORT ON THE EFFECTIVENESS OF THE PROGRAM, 83-84 (2011).
[70] Paul Vlaanderen, FATF President, Speech at the ESAAMLG 9th Council of Ministers Meeting (Aug. 21, 2009).
[71] De Koker, Louis. "The 2012 revised FATF recommendations: Assessing and mitigating mobile money integrity risks within the new standards framework." Washington Journal of Law, Technology & Arts 8.3 (2013): 165.
[72] FATF - High-risk and other monitored jurisdictions,  https://www.fatf-gafi.org/en/topics/high-risk-and-other-monitored-jurisdictions.html
[73]FATF, Topic- High-risk and other monitored jurisdictions
[74]Since the COVID-19 outbreak, the FATF has let nations without approaching deadlines to voluntarily report their progress. The FATF has assessed the development of the following nations since October 2022: Albania, Barbados, Burkina Faso, Cambodia, Cayman Islands, Gibraltar, Haiti, Jamaica, Jordan, Mali, Morocco, Myanmar, Panama, Philippines, Senegal, South Sudan, Türkiye, UAE, and Uganda. Below are updated statements for these nations. The Democratic Republic of the Congo, Mozambique, and Tanzania made the decision to postpone reporting; as a result, the statements they issued in October 2022 are included below, however, they might not accurately reflect the most current condition of their AML/CFT regimes. The FATF has reviewed and added South Africa and Nigeria to its list. .
[75] INTERPOL-  International Criminal Police Organization, and it is an inter-governmental organization. It has 195 member countries and helps police in all of them to work together to make the world a safer place.
[76] FATF- Topic “Asset recovery”, https://www.fatf-gafi.org/en/topics/asset-recovery.html
[77] INTERPOL- ‘Global Strategy of Organized And Emerging Crime’, https://www.interpol.int/en/content/download/19816/file/OEC%20Short%20Strategy%20EN.pdf
[78] UNDOC- “In Just Two Decades, Technology Has Become A Cornerstone Of Criminality”,  23 October 2017.
https://www.unodc.org/unodc/en/frontpage/2017/October/in-just-two-decades--technology-has-become-a-cornerstone-of-criminality.html
[79] Lavorgna, Anita, Robert Lombardo, and Anna Sergi, “Organized crime in three regions: comparing the Veneto, Liverpool, and Chicago”, Trends in Organized Crime 16, pp 265-285,  2013.
[80] Cornish, Derek B., and Ronald V. Clarke, “Analyzing organized crimes, Rational choice and criminal behavior”,  Recent research and future challenges 32, pp 41-63, 2002.
[81] Bryans, Danton, “Bitcoin and money laundering: mining for an effective solution”,  Ind. LJ 89 , pp 441, 2014.
[82] Bitcoin—"A pseudonymous cryptographic currency . Pseudonymity is the use of a fictitious name or identity”. BLACK’S LAW DICTIONARY 1347 (9th ed. 2009).
[83] “Crypto money laundering rises 30%, report finds”. BBC News, Published 26 January 2022, https://www.bbc.com/news/technology-60072195
[84] Ciancaglini, Vincenzo, et al. "the Deep Web." Trend Micro (2015).
[85]   Braga, Romulo Rhemo Palitot, and Arthur Augusto Barbosa Luna, “Dark Web and Bitcoin: An Analysis of the Impact of Digital Anonymate and Cryptocurrencies in the Practice of Money Laundering Crime”, Direito e Desenvolvimento 9, pp – 270, 2018.
[86] “The Dark Connection Between the Dark Web and Money Laundering”- https://amluae.com/connection-between-the-dark-web-and-money
[87]ADITI KUMAR, ERIC ROSENBACH, “THE TRUTH ABOUT THE DARK WEB”, IMF, SEPTEMBER 2019
[88] Southeast Asia and the Pacific Regional Office of the UNODC.- "Migrant trafficking," https://www.unodc.org/roseap/en/what-we-do/toc/smuggling-of-migrants.html
[89]Williams, Phil. "Crime, illicit markets, and money laundering." Managing global issues: Lessons learned 37 (2001).
[90] Albanese, Jay S, “Deciphering the linkages between organized crime and transnational crime”, Journal of International Affairs, pp 1-16, 2012.
[91] Guymon, CarrieLyn Donigan, “International legal mechanisms for combating transnational organized crime: The need for a multilateral convention”, Berkeley J. Int'l L. 18, pp 53, 2000
[92] Riccardi, Michele, and Ernesto Ugo Savona, “The identification of beneficial owners in the fight against money laundering,” 2013.
[93] Schneider, Friedrich, ”Money laundering and financial means of organised crime: some preliminary empirical findings”, Global Business and Economics Review 10.3, pp 309-330, 2008

Citation

[1] Shafin Jahan v. Asokan K. M & Ors, (2018) 7 SCC 192
[2] K.S. Puttaswamy v. Union of India, (2017) 10 SCC 1, AIR 2017 SC 4161.
[3] Shakti Vahini v. Union of India (2018) 7 SCC 192
[4] Asha Ranjan v. State of Bihar, (2017), AIR 2017 SC 1079, 2017(2) SCALE 709.

Citation

[1]Assistant Professor- Senior Scale, UPES, School of Law, Knowledge acres, Kandoli, Dehradun- 248007, Uttrakhand, India.
[2] India's financial system in its latter half of the last century was dependent on the financial institutions which provides credit to the small ventures. SIDBI was created in 1989 to
facilitate" finar.cial assistance leading to the promotion, financing, and development of small- scale projects and microenterprises."
 
[3] ICSI, Corporate Restructuring, Valuation And Insolvency, available at: www.icsi.edu/docs/webmodules/Publications/Full%20Book%20of%20PP-CRVI-2014.pdf
(Last Modified on: 02/04/2016).
The Securitisation and Reconstruction of Financial Assets and Enforcement of Security Interest Act, 2002, S.2(1)(z)
 
[4] The Securitisation and Reconstruction of Financial Assets and Enforcement of Security Interest Act, 2002, S.2(1)(z)
[5] Any financial institution, banks, insurance company, State Financial Corporation,
Trustee, State Industrial Development Corporation, or any AMC on behalf of any mutual fund, provident fund, gratuity fund or pension fund, FIIs registered with SEBI or any other body corporate specified by SEBI”.
[6] The Securitisation and Reconstruction of Financial Assets and Enforcement of Security Interest Act, 2002, S.2(1)(I)
15 The Securitisation and Reconstruction of Financial Assets and Enforcement of Security Interest Act, 2002, S.2(1)(za),
16 The Securitisation and Reconstruction of Financial Assets and Enforcement of Security Interest Act, 2002, S.2(1)(v),
17 The Securitisation and Reconstruction of Financial Assets and Enforcement of Security Interest Act, 2002, S.2(1)(b),
[7] The Reserve Bank may, for the purpose of considering the application for registration of a securitisation company or reconstruction company to commence or carry on the business of securitisation or asset reconstruction, as the case may be, require to be satisfied, by an inspection of records or books of such securitisation company or reconstruction company, or otherwise, that the certain conditions are fulfilled.
[8] ºThe Securitisation and Reconstruction of Financial Assets and Enforcement of Security Interest Act, 2002, S.5.
[9] The Securitisation and Reconstruction of Financial Assets and Enforcement of Security Interest Act, 2002, S.9.
[10] Reserve Bank Of India, "Master Circular - Prudential norms on Income Recognition, Asset Classification and Provisioning pertaining to Advances", July 1, 2015, available at: https://www.rbi.org.in/Scripts/BS_ViewMasCirculardetails.aspx?id=9908 (Last Modified on March7, 2016)
[11] Securitisation and Reconstruction of Financial Assets and Enforcement of Security Interest Act, 2002, S.2(1)(0)

Citation

[1] Gajendra Yadav,” Her Balancing Act : Won’t tax – will spend”, Indian Express, August 8,2023.
[2]Harish Damodaran, ”After Targeting rural and urban poor, the pre-2024 message ”,Indian Express, 02.Feburary,2023
[3] Liz Mathew,“ Budget focus aligns with BJP support base of middle class, youth, women”, Indian Express, February 02,2023.
[4] Hitesh Vyas and Sukalp Sharma , “Economy on right track; to grow at 7% in FY23:FM”,Indian Express, February 02,2023.
[5] Anchal Magazine, ”Renewed thrust on capex: Rs. 10 lakh cr outlay, 33% hike”, Indian Express ,February 02.2023
[6] HariKishan Sharma, “Highest ever PMAY-G outlay to spur capex”, Indian Express, February 02,2023.
[7] Anonna Dutt ,“Overall health allocation up, but capital spending cut”, Indian Express, February 02,2023
[8] Express News Service, “centre monitoring inflation closely with ground level data : Sitharaman”, Indian Express, May 30, 2023.
[9] Visited on June 13,2023.
  Vivad Se Vishwas Scheme 2020 (taxguru.in)
[10] Ibid.
[11] Ibid.
[12] Ibid.
[13] Ibid.
[14] Ibid.
[15] Ibid.
[16] Udit Misra, “3rd largest economy in 3rd Modi term ? Anatomy of India’s growth”, The India Express,July 28,2023.
[17] Hitesh Vyas, “FPIs back with a bang, but tighter disclosures may impact inflows”, The Indian Express, June 5,2023.
[18] Enrique Manalo,“Partnership for the future”, Indian Express, June 29,2023.
[19] Soumy Arendra Barik & Avinash Nair, “India Will be your trusted global partner, P.M. promises semi conductors makers”, The Indian Express, July 29,2023.
[20] Soumy Arendra Barik, “AMD to invest $400 m n in India over 5 years for its biggest design centre”, The Indian Express, July 29,2023.

Citation

[1] CK Thakker, Civil Procedure (6th edn, Eastern Book Company 2011) 587.
[2] Halsbury’s Laws of England (vol17, 4th edn, 2009) 232.
[3] Civil Procedure Code 1908, s51.
[4] ibid OXXI R37. 
[5] CK Thakker, Civil Procedure (8th edn, Eastern Book Company 2017) 603.
[6] Halsbury’s Laws of England (4th edn, 2009) vol17, 232.
[7] Civil Procedure Code 1908 s36.
[8] Civil Procedure Code 1908 s38.
[9] Punjab State Electricity Board v Ramesh Kumar Gupta (2009) 16 SCC 307.
[10] (1991) 4 SCC 379.
[11] Thakker (n1) 604.
[12] Law Commission of India, Reforms of Judicial Administration (14th report, 1958) 431< http://lawcommissionofindia.nic.in/1-50/Report14Vol1.pdf> accessed on 20 November 2018.
[13] ibid 441.
[14] Law Commission of India, Civil Procedure Code 1908 (54th report, 1973) 72-92 < http://lawcommissionofindia.nic.in/51-100/Report54.pdf> accessed on 20 November 2018; Law Commission of India, Code of Civil Procedure 1908 (27th report, 1964) 174-210 < http://lawcommissionofindia.nic.in/1-50/Report27.pdf> accessed on 20 November 2018.
[15] Civil Procedure Code 1908 s51.
[16] Thakker (n1) 627.
[17] Mahadeo Prasad Singh v Ram Lochan (1980) 4 SCC 354.
[18] Civil Procedure Code 1908 s51(a).
[19] Civil Procedure Code 1908 s51(b).
[20] Civil Procedure Code 1908 s51(c).
[21] Civil Procedure Code 1908 s51(d).
[22] Civil Procedure Code 1908 s51(e).
[23] Civil Procedure Code 1908 s51.
[24] Constitution of India 1950 Art 21.
[25] Santanu Dey, ‘Legal Provisions of Section 51 of Code of Civil Procedure 1908, (C.P.C.), India – Procedure in Execution’ (Share Your Essays) <http://www.shareyouressays.com/knowledge/legal-provisions-of-section-51-of-code-of-civil-procedure-1908-c-p-c-india-procedure-in-execution/114388> accessed on 20 November 2018.
[26] Thakker (n1) 647.
[27] (2014) 8 SCC 470.
[28] Anoop Koneeri, ‘Supreme Court rejects Subrata Roy’s plea against his detention’ (Live Law, May 2014) < https://www.livelaw.in/supreme-court-rejects-subrata-roys-plea-detention/> accessed on 20 November 2018.
[29] AIR 1980 SC 470.
[30] International Covenant on Civil and Political Rights Art 11.
[31] Harpreet Kaur, ‘Arrest and detention under civil law’ < https://www.lawctopus.com/academike/arrest-and-detention-under-civil-law/> accessed on 20 November 2018.
[32] Bhagwandas Agrawal v Shriram Govinda 1979 SCCOnLine Bom 94.
[33] Thakker (n1) 651.
[34] PG Rangnatha v Mayavaram Financial Corporation AIR 1974 Mad 1.
[35] Civil Procedure Code 1908 s58.
[36] MP Jain, The Code of Civil Procedure (3rd edn, 2011) 232.
[37] Doraswamy Reddy v. Kodananda Naidu (1997) 2 AP LJ 107 (SN).
[38] ibid.
[39] Civil Procedure Code 1908 s59.
[40] Jain (n31) 233.
[41] S Mohan v Rani Ammal 2010 SCC OnLine Mad 2129.
[42] Black’s Law Dictionary (2nd edn) < https://dictionary.thelaw.com/seizure/> accessed 20 November 2018.
[43] Takwani (n5).
[44] Jain (n31) 247.
[45] AIR 1961 SC 803.
[46] Shyam Singh v Collector, Hamirpur 1993 Supp (1) SCC 693.
[47] Rahul Shah v Jinendra Kumar Gandhi 2021 SCC OnLine SC 341.
[48] Jolly George v Bank of Cochin AIR 1980 SC 470.

Citation


[1] Khosla, S. (2013). Human Rights and Judicial Activism in India. GUIDELINES TO CONTRIBUTORS, 154.
[2] Shukla, S. (2018). Judicial Overreach: The Role of the Judiciary in Contemporary India. Anish Kumar Verma, 25.
[3] Gauri, V. (2009). Public interest litigation in India: overreaching or underachieving? World Bank Policy Research Working Paper, (5109).
[4] SC 1979 AIR 1369
[5] (1978) 4 SCC 409
[6] Jain, A. G., & Rosencranz, A. (2014). The Indian Supreme Court Promotes Interlinking of India's Rivers: Judicial Overreach. Envtl. L. Rep. News & Analysis, 44, 10348.
[7] Avishek Goenka vs. Union of India, (2012) 5 SCC 321
[8] In Re: Ramlila Maidan Incident (2012) 5 SCC 1, 2012 AIR SCW 3660
[9] Ahmed, H. (2016). ‘The concept of Public Interest Litigation lies at the root of judicial activism in India. ‘Elaborate with suitable examples.
[10] Satapathy, A., & Satapathy, S. Judicial Overreach Under The Garb Of Judicial Activism: Where Did We Go Wrong?.
[11] Upendra Baxi, ?The Avatars of Indian Judicial Activism: Explorations in the Geographies of (in) Justice in S.K.Verma and Kusum, Fifty Years of Supreme Court of India – Its Grasp and Reach 173 (2000).
[12] A.K Gopalan v. State of Madras 1950 AIR 27
[13] Golaknath v. State of Punjab 1967 AIR 1643
[14] Keshavananda Bharti v. State of Kerala AIR 1973 SC 1461
[15] Bhagalpur Blinding case 1982 AIR 1008
[16] Balaji v. State of Mysore 1963 AIR 649
[17] Asian Games case  1982 AIR 1473
[18] Rahman, M. M., & Badhon, R. Z. (2018). A Critical Analysis on Judicial Activism and Overreach.
[19] Jain, N. (2010). Judicial Power: From Judicial Review to Judicial Overreach. Indian Journal of Public Administration, 56(2), 331-342.
[20] Speaking at the Conference of Chief Ministers and Chief Justices held in New Delhi in Apr 08, 2007.
[21] Bhasin, K. (2018). Environmental Governance in India: An inefficient outcome due to lack of “specialized” and strong institution?.
[22] Shyam Narayan Chouksey v. Union of India (2017) 1 SCC 42
[23] S. P. Sathe, Judicial Activism: The Indian Experience (2001) 6 Washington University Journal of Law & Policy 29.

Citation

[1] Assistant Professor (Senior Scale), School of Law, UPES, Dehradun.
[2]  Student, LLM, School of Law, UPES, Dehradun.

Citation


[1] Akhil Oka, ‘India acts tough amid LAC faceoff, to ban 54 Chinese apps over threat to national security’, Republic World (New Delhi, 14 Feb 2020) A1.
[2] Kiritka Suneja, ‘China accuses India of discriminatory trade measures during a meeting at the WTO’, Economic Times (New Delhi, 04 Oct 2020) C3.
[3] Ryan Sean, ‘Under-Mining Public Trust: The Rhetoric of Lawfare’ (2017) 4(88) Australian Quarterly 43.  
[4] Arindrajit Basu, Gurshabad Grover, ‘India needs a digital lawfare strategy to counter China’, The Diplomat (Beijing, 08 October 2020) C2.
[5] Luban David, ‘Lawfare and legal ethics in Guantanamo’, (2008) 6(60) Stanford Law Review 1986.
[6] Arindrajit Basu, ‘Extraterritorial algorithmic surveillance and the incapacitation of international human rights law’ (2019) 12(189) NUJS Law Review 190. 
[7] Winckler, H., Godement, F., & Kratz, A., ‘China: Waging ‘lawfare’ on NGOs’ (2015) 1(22) European Council on Foreign Relations 33.
[8] Ryan Sean, ‘Under-Mining Public Trust: The Rhetoric of Lawfare’ (2017) 4(88) Australian Quarterly 43.  
[9] The Steering Committee, GoI, ‘Making India 5G ready’ (Report of 5G High Level Forum 23 August 2018) <https://dot.gov.in/sites/default/files/5G%20Steering%20Committee%20report%20v%2026_0.pdf?download=1> accessed on 15 Aug 2022.
[10] Frederick, Kara, ‘The New War of Ideas: Counterterrorism Lessons for the Digital Disinformation Fight’ (2019) 8 (19) Center for a New American Security 33.
[11] Burwell F G, Propp K, ‘The European Union and the Search for Digital Sovereignty: Building ‘Fortress Europe’ or Preparing for a New World?’ (2020) 5(19) Atlantic Council 89.
[12] Brandão, C., ‘Lawfare (or, simply, War)’ (2018) 9(32) CLACSO 35.
[13] Maxwell, Neville, ‘Sino-India Dispute: A variant view’ (2000) 2(4) The Journal of International Issues 150.
[14] Amit Bhandari, Blaise Fernandez, Aashna Agarwal, ‘Chinese Investments in India’ (Gateway House Report No. 3 07 Feb 2020) <https://www.gatewayhouse.in/wp-content/uploads/2020/03/Chinese-Investments-in-India-Report_2020_Final.pdf> accessed on 15 Aug 2022.
[15] Wallace, D., & Visger, M, ‘Responding to the Call for a Digital Geneva Convention: An Open Letter to Brad Smith and the Technology Community’ (2018) 6(2) Journal of Law & Cyber Warfare 54. 
[16] Ünver, H. Ak?n, ‘Politics of Digital Surveillance, National Security and Privacy’ (2018) 1(1) Centre for Economics and Foreign Policy Studies 32.
[17]The Transatlantic Digital Dialogue, ‘Extraterritorial Access to Data’ (2015) 3(56) German Marshall Fund of the United States 12.

Citation

[1] https://www.studyiq.com/articles/parliamentary-privileges/
[2] https://www.drishtiias.com/daily-updates/daily-news-analysis/the-privileges-of-members-of-parliament 3 n Analysis of the Interplay between Parliamentary Privileges and Fundamental Rights" by Kishlay Pandey, published in the NALSAR Student Law Review in 2017.
[3] "The Constitution of India: A Contextual Analysis" by Arun K. Thiruvengadam and "Parliamentary Privileges in India" by M.P. Jain and S.N. Jain
[4] n Analysis of the Interplay between Parliamentary Privileges and Fundamental Rights" by Kishlay Pandey, published in the NALSAR Student Law Review in 2017.
[5] Parliamentary Privileges and the Fundamental Rights of Citizens: A Delicate Balance" by Nishtha Chopra, published in the Indian Law Journal in 2019
[6] "The Constitution of India: A Contextual Analysis" by Arun K. Thiruvengadam and "Parliamentary Privileges in India" by M.P. Jain and S.N. Jain
[7] Supreme Court and High Court judgments and orders on conflicts between parliamentary privileges and fundamental rights in India, Keshav Singh's case (1965), Raja Ram Pal's case (2007), and Subramanian Swamy's case (2016)
[8] udicial Review and Parliamentary Privileges: The Case of India" by Philip A. Thomas, published in the Journal of Legislative Studies in 2010
[9] The Balancing Act: Parliamentary Privileges and Fundamental Rights in India" by J. Sai Deepak, published in the Economic and Political Weekly in 2018
[10] "The Constitution of India: A Contextual Analysis" by Arun K. Thiruvengadam and "Parliamentary Privileges in India" by M.P. Jain and S.N. Jain

Citation 2

65876451 adaskdjlkh lkhlkhasd

IJLRA N. Raj Kumar ; Kamble Shivadayal . "Design of Fault Tolerance Parallel FFT’s Using Xilinx 14.5v" Iconic Research And Engineering Journals Volume 5 Issue 8 2022 Page 1-6
IEEE N. Raj Kumar ; Kamble Shivadayal . "Design of Fault Tolerance Parallel FFT’s Using Xilinx 14.5v" Iconic Research And Engineering Journals, 5(8)
  • +91-7042148991
  • editor@ijlra.com

LAW JOURNAL

  • About Us
  • Verify certificate
  • Editorial Board
  • Contact Us

IMPORTANT LINKS

  • Call for paper
  • How to Publish Paper
  • Submit Paper
  • Track your Paper Status
  • Search Issue

ETHICS & POLICY

  • Duties Of Authors
  • Editors Responsibilities
  • Reviewrs Responsibilities

© 2022 International Journal For Legal Research and Analysis

Designed by 1Web Experts