Cyberlaundering:
Anonymous Digital Cash and Money Laundering


Copyright 1996 R. Mark Bortner
The author hereby grants the right to copy this article in its entirety or any portion thereof by any means possible and to distribute such copies freely and without charge. The author simply requests that when a portion of this article or its entirety is included within another work, that such copied material be clearly and correctly cited to.

Presented as final paper requirement for Law & the Internet (LAW 745).
A seminar at the University of Miami School of Law.


Introduction

This article will explore the latest technique in money laundering: Cyberlaundering by means of anonymous digital cash. Part I is a brief race through laundering history. Part II discusses how anonymous Ecash may facilitate money laundering on the Intenet. Part III examines the relationship between current money laundering law and cyberlaundering. Part IV addresses the underlying policy debate surrounding anonymous digital currency. Essentially, the balance between individual financial privacy rights and legitimate law enforcement interests. In conclusion, Part V raises a few unanswered societal questions and attempts to predict the future.


Disclaimer:

Although the author discusses this subject in a casual, rather than rigidly formal tone, money laundering is a serious issue which should not be taken lightly. As this article will show, fear of money laundering only serves to increase banking regulations which, in turn, affect everyone's ability to conduct convenient, efficient and relatively private financial transactions.


Part I Humble Beginnings

In the beginning, laundering money was a physical effort. The art of concealing the existence, the illegal source, or illegal application of income, and then disguising that income to make it appear legitimate 1 required that the launderer have the means to physically transport the hard cash.2 The trick was, and still is, to avoid attracting unwanted attention, thus alerting the Internal Revenue Service (IRS) and other government agencies 3 involved in searching out ill-gotten gains.4

In what could be described as the "lo-tech" world of money laundering, the process of cleaning "dirty money" was limited by the creative ability to manipulate the physical world. Other than flying cash out of one country and depositing it in a foreign bank with less stringent banking laws,5 bribing a bank teller, or discretely purchasing real or personal property, the classic approach was for a "smurf"6 to deposit cash at a bank. Essentially, platoons of couriers assaulted the lobbies of banks throughout the United States with deposits under the $10,000 reporting limit as required under the Bank Secrecy Act.7 The result was the formation of a serious loophole under the Bank Secrecy Act, allowing couriers almost limitless variables in depositing dirty money such as the number of banks, the number of branch offices, the number of teller stations at one branch office, the number of instruments purchased, the number of accounts at each bank, and the number of persons depositing the money.

In 1986, the Money Laundering Control Act (the Act)8 attempted to close the loopholes in the prior law that allowed for the structuring of transactions to flourish.9 In criminalizing the structuring of transactions to avoid reporting requirements, Congress attempted to "hit criminals right where they bruise: in the pocketbook."10 Under the Act, the filing of a currency transaction report (CTR)11 is required even if a bank employee "has knowledge" of any attempted structuring.12 Thus, it appeared as if the ability to launder the profits from illegal activity would be severely hampered.

As the physical world of money laundering began to erode, the tendency to use electronic transfers to avoid detection gained a loyal following. Electronic transfers of funds are known as wire transfers.13 Wire transfer systems allow criminal organizations, as well as legitimate businesses and individual banking customers, to enjoy a swift and nearly risk free conduit for moving money between countries.14 Considering that an estimated 700,000 wire transfers occur daily in the United States, moving well over $2 trillion, illicit wire transfers are easily hidden.15 Federal agencies estimate that as much as $300 billion is laundered annually, worldwide.16 As the mountain of stored, computerized information regarding these transfers reaches for the virtual stars above, the ability to successfully launder increases as the workload of investigators increases.17

Although wire transfers currently provide only limited information regarding the parties involved,18 the growing trend is for greater detail to be recorded.19 If the privacy of wire transfers is compromised, due to burdensomely detailed record keeping regulations,20 electronic surveillance of transfers, or other potentially invasionary tactics,21 then the leap from the physical to the virtual world will be nearly complete. If laundering is to survive it must expand its approach, entering the world of cyberspace.

While change is often a frighteningly awkward experience, for an enterprising criminal operation, that wishes to remain open for business, it is a necessity. As the above mentioned race through laundering history demonstrates, creativity, and not necessarily greed, has been the launderer's salvation. The recent explosion of Internet access,22 may be the new type of detergent which allows for cleaner laundry.


Part II Enter, Anonymous Ecash

In the virtual universe of cyberspace the demand for efficient consumer transactions has lead to the establishment of electronic cash.23 Electronic cash, or digital money, is an electronic replacement for cash.24 Digital cash has been defined as a series of numbers that have an intrinsic value in some form of currency.25 Using digital cash , actual assets are transferred through digital communications in the form of individually identified representations of bills and coins - similar to serial numbers on hard currency.27 While the ultimate goal of each vendor is to facilitate transactional efficiency, bolster purchasing power on the Internet, and, of course, earn substantial profit in a new area of commerce, each vendor plays by slightly different rules.28 Although the intricacies of individual vendors are quite fascinating, for the purpose of this article, it is fair to say that all but one vendor have one trait in common: lack of anonymity.

The exception to the general rule of lack of anonymity is DigiCash.29 Digicash is an Amsterdam-based company created by David Chaum,30 a well respected cryptologist. DigiCash's contribution to Internet commerce is an online payment product called "ecash."31 According to DigiCash, electronic cash by DigiCash "combines computerized convenience with security and privacy that improve on paper cash."32 Ecash is designed for secure payments from any personal computer to any other workstation, over e-mail or Internet.33 In providing security and privacy for its customers, DigiCash uses public key digital blind signature techniques.34 Ecash, unlike even paper cash, is unconditionally untraceable. The "blinding" carried out by the user's own device makes it impossible for anyone to link payment to payer. But users can prove unequivocally that they did or did not make a particular payment, without revealing anything more.35 While ecash's security technology may be among the best in the business as of this writing, the focus of this article is upon one aspect of DigiCash that is of particular interest to money launderers and law enforcement: Anonymity.


Part III The Money Laundering Control Act and Anonymous Laundering

This section examines how the Amendments to the Bank Secrecy Act of 1970, commonly referred to as the Money Laundering Control Act of 1986,36 apply to cyberspace and cyberlaundering. Without delving into the actual techniques involved in using public keys, blind signatures or any other encryption or decryption device, the best way to explain how anonymous digital cash could benefit money launderers' is by example. The following example will be used to demonstrate the law's application.

Doug Drug Dealer is the CEO of an ongoing narcotics corporation. Doug has rooms filled with hard currency which is the profits from his illegal enterprise. This currency needs to enter into the legitimate, mainstream economy so that Doug can either purchase needed supplies and employees, purchase real or personal property or even draw interest on these ill-gotten gains. Of course, this could be accomplished without a bank account, but efficiency demands legality. Anyhow, Doug employs Linda Launderer to wash this dirty money. Linda hires couriers ("smurfs") to deposit funds under different names in amounts between $7500 and $8500 at branches of every bank in certain cities. This operation is repeated twice a week for as long as is required. In the meantime, Linda Launderer has been transferring these same funds from each branch, making withdrawals only once a week, and depositing the money with Internet banks that accept ecash. To be safe, Linda has these transfers limited to a maximum of $8200 each. Once the hard currency has been converted into digital ecash, the illegally earned money has become virtually untraceable; anonymous. Doug Drug Dealer now has access to legitimate electronic cash.

Doug Drug Dealer is, of course, likely to be found guilty of more than just participating in a money laundering scheme. However, how the law applies to Linda Launderer and the Internet banks is more confusing. The purpose of the 1986 Act was to specifically criminalize the structuring of transactions so as to avoid the reporting requirements.37 Linda and her army of couriers are almost certainly violating structuring regulations by depositing small amounts in regular bank accounts.38 The problem is how to apply current money laundering law to cyberlaundering.

In the scenario above, Linda Launderer transfers sums of money less than $10,000 from non-Internet bank accounts to Internet-based ecash accounts. If the Internet bank is FDIC insured,39 as Mark Twain Bank40 then federal depository regulations may apply. However, the cyberbank will not automatically be required to file a CTR regarding these transactions as all are under the $10,000 filing requirement. Nevertheless, if any employee of the Internet bank has even a suspicion of structuring,41 a CTR may be filed.42 As in the tangible banking world, the information contained on a CTR is only as insightful as the information presented by the bank conducting the prior transaction.43 In essence, each record in the chain of transfers is only as strong as the previous recordation.

The catch is that Linda Launderer's transfer was deposited into an ecash account. According to one cyberbank which currently accepts ecash,44 ecash accounts are not FDIC insured.45 A lack of federal insurance protection is understandable for the reason that digital money is currently created by private vendors, rather than the Federal Reserve.46 Thus, digital cash does not enter into the marketplace of hard currency thereby affecting monetary supply or policy, yet.

Since Linda Launderer's transfer was deposited into a non-FDIC insured, and thus, presumably non-federally regulated account, then there should be no mandatory compliance with the filing regulations contained within the Money Laundering Control Act of 1986. If these assumptions prove correct, whether digital money is anonymous or not will be of less relevance to money launderers and law enforcement. If certain cyberbanks, or even specific non-FDIC currency accounts within a cyberbank are able to operate outside the reach of current federal regulations, laundering on the Web may become one of the most rapidly expanding growth industries. It should be remembered that a criminal organization desires to clean its dirty money, not necessarily protect their deposits from institutional banking failures.

Once the ecash account has been established, digital funds can be accessed from any computer that is properly connected to the Intenet. A truly creative, if not paranoid, launderer could access funds via telnet.47 Telnet is a basic command that involves the protocol for connecting to another computer on the Internet.48 Thus, Linda Launderer could transfer illegally earned funds from her laptop on the Pacific Island of Vanuatu, telneting to her account leased from any unknowing Internet Service Provider49 in the United States and have her leased Internet account actually call the bank to transfer the funds, thus concealing her true identity. This would, of course, leave an even longer trail for law enforcement to follow. Anyhow, ecash, being completely anonymous, allows the account holder total privacy to make Internet transactions. Thus, the bank holding the digital cash, as well as any seller which accepts ecash, has virtually no means of identifying the purchaser. Therefore, the combination of anonymous ecash and the availability of telnet may give a launderer enough of a head start to evade law enforcement, for the moment.

In the world of earth and soil, money can be laundered by the purchase of real and personal property. However, any cash transaction over $10,000 is subject to a transaction filing requirement.50 Real estate agents and automobile dealers, to name a few, are prime targets for the deposit of large sums of cash. In fact, such agents and dealers have been indicted for allowing drug money to be used to purchase expensive property.51

On the Internet, anonymous ecash would allow for anonymous purchases of real and personal property. This fact yields at least two separate, but interrelated problems. First, the launderer or drug dealer will be able to discretely use illegally obtained profits to legitimately purchase property. However, currently, the opportunity to spend thousands of dollars of digital money, or ecash for that matter, on the Internet is virtually nonexistent.52 Second, the temptation for automobile and real property dealers to become players in the game for anonymous ecash seems overwhelming. If a seller or dealer understands that it can not possibly trace who spent ecash at its establishment, the fear of becoming involved with dirty money is drastically reduced.53 Under current law, a seller of property must file a CTR for any cash transaction over $10,000.54 If the purchaser's identity is anonymous, and even the bank can not trace the spent ecash, the force of the Money Laundering Control Act of 1986 is withered into mere words on a page. Of course, Congress could attempt to legislate in this new area of commerce.

Obviously, transferring hard currency to ecash and then spending the ecash is an appealing opportunity to potential launderers'. What if the ecash is then transferred back to a regular hard currency account? This may seem a foolish act as the entire purpose is to reap the benefits of anonymous ecash. However, presently, there are no opportunities to purchase automobiles or real property by the exclusive use of anonymous ecash. Thus, the desire to convert private and untraceable ecash into a more functional means of purchasing is understandable.

Whether a regular, non-Internet currency account already exists or must be created to deposit the transferred ecash into may be irrelevant. Filing a CTR would be a legal necessity if the transfer amount is over the $10,000 reporting limit, as the transfer will deposit hard currency in a tangible, institutionalized, and regulated bank account. A transfer from completely anonymous ecash to hard currency might alert law enforcement as to the existence of the ecash account. While this alone would not track down laundered money, it might put a suspicious agent on notice.

In summary, Linda Launderer has knowingly structured financial transactions so as to avoid reporting requirements. Under current law she is in violation of The Money Laundering Control Act of 1986. However, if the cyberbanks in which she has ecash deposits are outside the reach of current banking regulations, these banks have no duty to file any currency transaction reports. Nevertheless, assuming that cyberbanks which accept anonymous ecash are somehow subject to the same laws and regulations which financial institutions in the tangible world are, Linda must first be caught before she can be found guilty. This is where anonymous ecash may save Linda from fines and jail time.55 Even if cyberbanks are required to file transactional reports pertaining to ecash, the reports will be virtually useless, as the banks have no knowledge as to which funds are Linda's. Thus, Linda, our overly creative launderer, and Doug, our devious drug dealer, may enjoy the benefits of completely anonymous money laundering. That is, unless Congress decides to attempt legislation in the area of digital money and virtual banking, or FinCen is somehow granted the constitutional authority to secretly monitor all cyberbanking transactions, despite its lack of accountability to the general population.


Part IV The Struggle For Privacy

To be or not to be... anonymous digital cash! That is the question! The battle that emerges is between the right to privacy by means of anonymous digital cash verses the desire of law enforcement to ferret out crime. The fact of complete anonymity guarantees that some money laundering will be easier to pull off. On the other hand, the lack of anonymity means that every move made on the Internet will be traceable. Thus, whether money laundering becomes rampant under the guise of anonymous ecash may be one of the first tests of the practical aspects of DigiCash's future. Any discussion of privacy rights would be woefully incomplete without mentioning the famous privacy article published by Samuel Warren and Louis Brandeis in 1890.56 This article, barely a century after the Constitutional Convention, professed that the "right to be let alone"57 was of the utmost importance. Almost two hundred years after the Constitution was initially ratified, the Supreme Court defined the scope of privacy58 for an individual's financial information in two landmark decisions.59

In California Bankers Association v. Schultz, the Court held that bank record keeping requirements do not violate the Fourth Amendment right to privacy and do not amount to an illegal search and seizure.60 In United States v. Miller, the Court held that a criminal defendant had no Fourth Amendment right to protection of his bank records,61 and did not have a legitimate expectation of privacy regarding these papers.62

Concluding over two centuries of Constitutional erosion, it is apparent that an individual's right to financial privacy is limited. The issue involving cyberspace is whether financial privacy rights are so limited that the federal government could monitor a digital cash user's financial transactions in a detailed fashion. In effect, rendering completely anonymous digital cash completely pointless.

While the Supreme Court has sliced financial privacy rights on several, previously mentioned, occasions, Congress has attempted to restore financial and informational privacy rights to the individual. The Privacy Act of 1974,63 The Right to Financial Privacy Act of 1982,64 and The Electronic Communications Privacy Act of 198665 are currently the three best hopes for individual financial privacy.

First, The Privacy Act of 1974 regulates the practices of federal agencies regarding personal information.66 With certain exceptions,67 no federal agency may disclose any record contained in its system to any other person or agency without the written request or consent of the individual.68

Next, The Right to Financial Privacy Act of 1982 ("RFPA") attempted to further protect financial records.69 Under RFPA, in order to obtain a customer's financial records from a financial institution, the federal government must serve a subpoena on the customer before or concurrently with service on the bank.70 The government must show that the records are related to a "legitimate law enforcement inquiry,"71 and notify the customer that it can take steps to block the bank's disclosure of the records.72

Finally, The Electronic Communications Privacy Act of 1986 ("ECPA") attempts to protect the individual against the unauthorized interception of electronic communications.73 Title I focuses on the interception of wire, oral and electronic communications.74 Title II prohibits an electronic communications service provider from knowingly divulging the contents of a communication while in electronic storage.75

Applying current law to the Internet, the result is inadequate protection of individual financial privacy. The combination of The Privacy Act and RFPA prevent the government from groundless searches of individual financial records. However, the standard required for a search is only that there exist some evidence that the records are related to a "legitimate law enforcement inquiry."76 Due to this relaxed standard, individual financial privacy may be violated without any probable cause.77 A "legitimate law enforcement inquiry" is clearly an easier requirement to meet than a Fourth Amendment probable cause standard.

Expanding into cyberspace, if the Internet falls under the protection of the ECPA, as it is an electronic communication, then individual financial privacy in cyberspace is afforded as little protection as financial privacy in the tangible world. Essentially, the government need only claim that it requires access to financial records due to a "legitimate law enforcement inquiry."

Taking one step further, the application of current financial privacy laws to DigiCash's Ecash may be the eulogy for completely anonymous digital cash. If the government believes that ecash is overflowing with money launderers, a "legitimate law enforcement inquiry" into the situation would likely allow access to ecash account records. Since even the bank can not trace ecash to a user, pressure would be placed on various agencies to solve the problem.

First, the Federal Reserve would likely announce that all cyberbanks accepting anonymous ecash conform with FDIC regulations. Thus, these banks would be subject to federal scrutiny and pressured into insuring anonymous ecash deposits. Since insuring anonymous ecash might prove unprofitable, it is probable that many timid cyberbanks will succumb to federal intimidation and abandon anonymous ecash altogether.

Second, cyberbanks could be convinced to implement special "investigatory software" into their computer systems so as to flag suspicious ecash accounts. While the technical aspects of such a system are beyond the scope of this article, it is fair to say that if such programming is both possible and practical, then no ecash account would be safe from the "legitimate law enforcement inquiring" software.

Finally, if ecash accounts become subject to greater scrutiny, the IRS and FinCen will capitalize on the additional information being unearthed. Since there is no requirement of probable cause to search an individual's financial account, the IRS and FinCen could use the preliminary information obtained from the "legitimate law enforcement inquiry" so as to have sufficient facts to establish probable cause, enabling a full scale search and seizure of an individual's financial records.


Part V Conclusion

Above, the sky is a swirling mixture of pale blue and chalky white. Waves of liquid life endlessly wash ashore, greeting the soft warm sand. Palm trees gracefully sway in a quiet dance with the wind. Amidst this tranquil bliss, Linda Launderer sits on the beach with her laptop computer "jacked-in" to the Internet. Unlike the AT&T commercial which portrays an individual faxing messages from a sunny beach to a business associate in a cold northern state, Linda is simply transferring funds into anonymous ecash accounts so as to conceal the illegally obtained profits of her employer, Doug Drug Dealer. Hence, Linda is laundering money over the Internet while sipping a Margarita.

If anonymous digital cash becomes a practical reality, the scenario of a far away beach, a portable "laundering laptop" and one creative launderer may be more fact than fantasy. The truth is that technology has created the means and ability to launder money by use of completely untraceable digital currency. While current money laundering laws apply to the fledgling art of cyberlaundering, the actual effect of these laws may be limited.

Structuring of transactions so as to avoid currency reporting requirements becomes less risky if the funds used to structure are virtually untraceable. In addition, the filing of currency transaction reports may be pointless if the money can not be traced into a specific account. However, the actual requirement that a transaction report be filed may be nonexistent if cyberbanks which accept ecash deposit accounts do not fall under current federal or state regulation of financial institutions.

For these reasons, the federal government is justifiedly worried that the Internet may become a launderer's paradise. Nevertheless, should completely anonymous digital cash be prohibited or secretly monitored solely for the reason that it may facilitate some illegal activities? Such action would be one additional nail in the coffin of privacy rights. Since the business of collecting and then selling information on individuals is becoming common, shouldn't an individual who desires some protection from prying eyes have the right to prevent his or her financial history from becoming a mere commodity for sale to the highest bidder?

The result may be a compromise between federal agencies that wish to have access to all financial records and the individual desire for some reasonable level of financial privacy.78 Since it has been determined that there is no legitimate expectation of complete privacy in financial records held at a financial institution,79 and that the production of such records is not self-incriminating in violation of the Fifth Amendment,80 then allowing for anonymous digital cash transactions is not as threatening as once believed. In effect, it may be more difficult to trace criminal activity which uses anonymous currency. However, if sufficient cause exists,81 the government clearly has the right to compel an individual and his or her banking establishment to produce all relevant financial records upon court order. In essence, forcing the ecash account holder to disclose its identity by revealing its "blinding" factors.82 The result being that the privileged right to privacy regarding digital currency carries a price: responsibility. If such liberty is misused, then it should be taken away from that specific violator, rather than confiscated prior to its misuse.

Therefore, prohibiting or secretly monitoring ecash transactions on the grounds that such transactions are more difficult to trace is not sufficient justification for invasionary tactics aimed at further limiting financial privacy. Fear of the unknown is not an adequate reason to quash a potential privacy restoring means of conducting financial transactions.


...and I will give him a white pebble, and on that pebble a new
name written which no one knows except the one receiving it.83


Endnotes: These are essential to fully understand this article!

1. For a good background on money laundering see Sarah N. Welling, Comment, Smurfs, Money Laundering and the Federal Criminal Law, 41 Fla. L. Rev. 287, 290 (1989).

2. In this article, "hard cash or currency" refers to any non-Internet-based money. As an illustration of hard cash, a suitcase filled with $1million worth of $20 bills weighs more than 100 lbs. See Business Week, Money Laundering, March 18, 1985.

3. The United States Department of the Treasury has created a technology-based law enforcement unit called Financial Crimes Enforcement Network (FinCen). FinCen has been delegated the job of oveerseeing and implementing policies to prevent and detect money laundering. See FinCen at URL: http://www.ustreas.gov/treasury/bureaus/fincen.facts.html.

4. While the profits from sales of illegal narcotics is the most common and widely publicized example of "dirty money," the gains from illegal gambling, prostitution, extortion, and essentially any illegal activity are a suspect classification. See H.R. Rep. No. 975, 91st Cong., 2d Sess. 11, reprinted in 1970 Code Cong. & Admin. News 4394, 4396.

5. Traditional non-U.S. hotspots for laundering include, but are not limited to, Switzerland, Panama, Bahamian Islands and Luxembourg. However, recently, even the Swiss have been turning away deposits from suspected illegal gains. See Swiss bankers changing rules, St. Pete. Times, Oct. 10, 1995, at 17A & 24A.

6. Courriers who scurry from bank to bank to conduct multiple cash transactions under the $10,000 reporting limit. The name "smurf" is from the hyperactive blue cartoon characters that seemed to be everywhere at once.

7. 31 C.F.R. sect. 103.22(a)(1) (requirement that a currency transaction report (CTR) be filed for "transactions" of more than $10,000). The Bank Secrecy Act itself is contained at 18 U.S.C. sects. 1956-1957 (1970). It incorporates related statutes such as 31 C.F.R. sect. 103.22.

8. Money Laundering Control Act of 1986, Pub. L. No. 99-570, Title I, Subtitle H, sects. 1351-67, 100 Stat. 3207-18 & 3207-39 (1986) (codified as amended at 18 U.S.C. sects. 1956-1957 (1988 & Supp. V 1993)).

9. 18 U.S.C. sect. 1956(a)(1) criminalizes structuring and attempted structuring of financial transactions so as to avoid reporting requirements. The reporting requirements are set forth in 31 C.F.R. sect. 103.22.

10. H.R. Rep. No. 855, 99th Cong., 2d Sess. 13 (1986).

11. A CTR is a transactional report which may include the date and time of the transaction, the amount involved and certain information regarding the identity of the originator and the beneficiary of the transaction. See 31 U.S.C. sect. 5313 (1988); 31 C.F.R. sect. 103.22 (1988).

12. 18 U.S.C. sect. 1956(a) (based upon the text, actual subjective knowledge that the money used in the transaction was derived from an unlawful source, rather than what should have been known is the standard to be applied). See 31 C.F.R. sect. 103.22(a)(1) (1988) ("Has knowledge" is defined as pertaining to that of a partner, director, officer or employee of a financial institution or on the part of any existing system at the institution that permits it to aggregate transactions).

13. A wire transfer is simply the transfer of funds by electronic messages between banks. U.C.C. Article 4A Prefatory Note (1991) defines a wire transfer as "a series of transactions, beginning with the originator's payment order, made for the purpose of making payment to the beneficiary of the order."

14. There are three major electronic funds transfer systems: (1) SWIFT: the Society for Worldwide Interbank Financial Telecommunication, is a Belgian-based association of banks that provides the communications network for a large number of international funds transfers, as well as intracountry transfers within the United States; (2) CHIPS: the Clearing House Interbank Payments System, is a funds settlement system operated by the New York Clearing House; and (3) Fedwire: the funds transfer system operated exclusively by the Federal Reserve System.

15. See Office of Technology Assessment, Congress of the United States, Information Technology for the Control of Money Laundering, iii (1995) (OTA-ITC-630).

16 Id. at 2.

17. In 1994, the number of CTRs was approximately 10,765,000. The IRS, who is in charge of checking on suspicious transactions, does not have enough investigators to consistently check these reports. However, FinCen, in its desire to keep the IRS up to speed, is currently attempting to process every CTR by means of its artificialintelligence system. See Id. at 6-7.

18. See supra note 11 for a brief explanation of the limited contents of a CTR.

.

19. As a result of the Money laundering Suppression Act of 1994, an additional form will be required for suspect transfers. If it currently cost a bank between $3 to $15 to file a CTR, the cost will only increase as additional forms are required. See Office of Technology Assessment, supra note 15 at 7.

20. In addition to the information contained on a CTR, a financial institution may be required to retain either the original or a copy of both sides of the monetary instrument for a period of five years. 31 C.F.R. sect. 103.38.

21. "Using evidence from the first court-ordered wiretap on a computer network, federal agents have charged an Argentine student with hacking his way into the U.S. military and NASA computers." WiretapSnares Hacker Who Raided Defense Net, Chicago Trib., March 29, 1996, at 1. (This could just as easily be performed on wire transfer system).

22. Twenty-five million Americans had Internet access in early 1995. See Legal Issues in the World of Digital Cash, available online at URL: http://www.info-nation.com/cashlaw.html/.

23. Electronic Cash, digital cash, digital currency and cybercurrency are synonyms for an electronic medium of exchange which has no intrinsic value, and the barest trace of physical existence. See Daniel C. Lynch & Leslie Lundquist, Digital Money: the new area of Internet commerce, 1996 at 99.

24. Id. at 99.

25. David Cline, Term Paper, Cryptographic Protocols for Digital Cash, George Washington University, School of Engineering and Applied Science (Computer Security I). Available online at URL: http://www.seas.gwu.edu/student/clinedav/.

26. Information Infrastructure Task Force, The Report of the Working Group on Intellectual Property Rights, Intellectual Property on the National Information Infrastructure, 193 (Sept. 1995). Available online at URL: http://www.uspto.gov/web/ipnii (PDF format); and URL: gopher://ntian1.ntia.doc.gov:70/00/papers/documents/files/ipnii.txt (ASCII format).

27. See Lynch & Lundquist, supra note 23 at 24, table 2.1.

       Some of the major vendors are:
DigiCash                                 http://www.digicash.com/
CyberCash                               http://www.cybercash.com/
Checkfree                                http://www.checkfree.com/
Netscape Communications     http://www.mosaic.mcom.com/
Open Market, Inc.                   http://www.openmarket.com/
First Virtual Holdings             http://www.fv.com/

28. See Lynch & Lundquist, supra note 23 at 37, table 2.2.

     Comparative strengths of various major vendors:
Organization              Main Customer          Distinguishing Service
DigiCash                      Consumers                Anonymity
CyberCash                   Banks                       Bank and merchant transactions
Checkfree                     Consumers               Bill paying
Netscape                       Consumers               Info and universities
OMI                              Businesses               Secure storefront
First Virtual                  Info Businesses       Microtransactions for selling info

29. Digicash homepage. Available online at URL: http://www.digicash.com/.

30. For more information on David Chaum see the following web sites:

URL: http://www.digicash.com/digicash/people/david.html/;
            URL: http://www.mediamatic.nl/whoiswho/Chaum?DavidChaum.html/;
            URL: http://www.mif.se/NetCash.html/.

31. "Ecash" is the exclusive brand of digital money created by Digicash. Although ecash and electronic cash are virtually synonymous, ecash is a brand name while electronic cash is a general term used to identify digital currency. See URL: http://www.digicash.com/ecash/ecash-home/html/.

32. See URL: http://www.digicash.nl/publish/digibro.html/.

33. See URL: http://www.digicash.nl/ecash/about.html/.

34. For an overview of DigiCash's cryptographic and blind signature techniques see URL: http://www.digicash.nl/ecash/about.html; URL: http://www.digicash.nl/ecash/aboutsecurity.html; URL: http://www.digicash.com/publish/sciam.html.


On the other hand, blind signatures restore the privacy lost in regular digital signatures. Before sending a note number to the bank for signing, the sender multiplies it by a random factor. The bank knows nothing about what it is signing except that it carries the sender's digital signature. After receiving the blinded note signed by the bank, the sender/bank customer divides out the blinding factor and uses the note as anonymous digital cash. Because the bank has no idea of the blinding factor, it has no way of linking the note numbers to the account holder's identity. This anonymity is limited only by the unpredictability of the creator's numbers.

35. A user always has the option to reveal itself when using ecash. For a more indepth look at ecash security see DigiCash at URL: http://www.digicash.com/publish/digibro.html/; URL: http://www.digicash.com/publish/sciam.html/. See also Lynch & Lundquist, supra note 23 at 114.

36. Money Laundering Control Act of 1986, Pub. L. No. 99-570, Title I, Subtitle H, sects. 1351-67, 100 Stat. 3207-18 & 3207-39 (1986) (codified as amended at 18 U.S.C. sects. 1956-57 (1988 & Supp. V 1993)).

37. 31 U.S.C. sect. 5324 (Supp. IV 1986) (It is a crime to structure or assist in structuring, or attempt to structure or assist in an attempt at structuring, any transaction with one or more domestic financial institutions).

38. Webster's New Collegiate Dictionary 1146 (1981) defines "to structure" as to form into something arranged in a definite pattern of organization.

39. FDIC is the acronym for the Federal Deposit Insurance Corporation, through which the Federal government insures deposit accounts up to a value of $100,000 at qualified banks. The FDIC was established as a result of the Banking Act of 1933. While banks insured by the FDIC must comply with specific regulations, the price is apparently justified as insured banks hold virtually all of the nations bank deposits. See Edward L. Symons, Jr. & James J. White, Banking Law, 39-40 (3d ed. 1991).

40. Mark Twain Bank. Available online at URL: http://www.marktwain.com/.

41. 31 C.F.R. sect. 103.22(a)(1) (1988) "Has knowledge" is defined as pertaining to that of a partner, director, officer or employee of a financial institution, or on that part of any existing system at the institution that permits it to aggregate transactions. See also supra note 12.

42. 31 U.S.C. sect. 5311 declares that its purpose is to require certain reports where they have a high degree of usefulness in criminal, tax, or regulatory investigations or proceedings, and to provide for uniform laws and enforcement for purposes of preventing money laundering.

43. As with wire transfers, each order or transfer in the chain contains limited information concerning previous transfers as each bank or funds transfer system has a different computer protocol for its account transfers and internal record keeping.

44. Mark Twain Bank. Available online at URL: http://www.marktwain.com/.

45. See URL: http://www.marktwain.com/money.html/.

46. Under the Constitution of the United States, Art. I, sect. 8, cl. 5, "Congress shall have the power to coin money, regulate the value thereof...." Congress delegated its duty to "coin money" to the Federal Reserve under the Federal Reserve Act of 1913. However, there is no federal law that prevents individuals from creating their own currency. Nevertheless, privately issued digital cash is not technically considered legal tender for debts. See Legal Issues in the World of Digital Cash, available online at URL: http://www.info-nation.com/cashlaw.html. See also Lynch & Lundquist, supra note 23 at 99-104.

47. For a detailed definition and explanation of the function of "telnet" see URL: http://www.cis.ohio-state.edu/htbin/rfc/rfc764.html/. To obtain Windows telnet shareware and freeware see URL: http://www.winnet.com/docs/ewan/contents.html/.

48. Greg R. Notess, Telnet explored, Online, Jan. 1, 1994. (Type telnet, a space, and the Internet address of the computer, and you're there).

49. An Internet Service Provider ("ISP") generally provides services such as Internet access, e-mail accounts, downloadable software, direct support, and user forums. Popular examples of ISPs are: America Online (AOL), CompuServe and Prodigy. Of course, telnet raises other legal issues. For instance, what is an ISP's liability, if any, if a customer launders by means of telneting to a computer host of the ISP?

50. 18 U.S.C. sects. 5311-5316 (Supp. IV 1986); 31 C.F.R. sect. 103.22(a)(1) (1988).

51. See United States v. Long, 977 F.2d 1264 (8th Cir. 1992) (finance manager of automobile lot convicted under 18 U.S.C. sect. 1956 of the 1986 Act for knowingly falsifying documents to finance purchases of automobiles for known drug dealers). See also United States v. Campbell, 977 F.2d 854 (4th Cir. 1992) (real estate agent or broker may be aiding in a criminal activity if there is knowledge as to the illegal source of the income used to purchase a home).

52. Currently, there are a variety of "cybershops" on the Internet. However, unless a shopper has the means and the naive desire to place a credit card order for a large purchase over the easily hacked Internet, purchasing an automobile or a home is not a real option. To go "cybershopping" see: The Internet Mall, URL: http://www.meclerweb.com/imall/; The Shopper Expressway, URL: http://shopex.gens.com/. For a list of "shops" accepting ecash see URL: http://www. marktwain.com/shops/alpha.html/.

53. Once again, the requirement is "knowledge" on the part of the dealer. See 18 U.S.C. sect. 1956(a) (1986) (conviction may not be based on what defendant should have known, but both direct and circumstantial evidence can be used to establish knowledge and are given equal weight). For additional information on "knowledge" see supra note 12.

54. 31 C.F.R. sect. 103.22(a)(1) (each "financial institution" ...shall file a report... which involves a transaction in currency of more than $10,000). 31 U.S.C. sect. 5312(a)(1)(T) includes within the definition of "financial institution" " a business engaged in vehicle sales, including automobile, airplane, and boat sales;" sect. 5312(a)(1)(U) includes "persons involved in real estate closings and settlements."

55. 31 U.S.C. sect. 5322 sets forth criminal penalties for a person convicted of money laundering.

56. Samuel Warren & Louis Brandeis, The Right To Privacy, 4 Harv. L. Rev. 193 (1890).

57. Id. at 193.

58. An individual is afforded the right of privacy under the Fourth Amendment. The Fourth Amendment states, "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable search and seizures, shall not be violated, and no Warrant shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized." U.S. Const. amend. IV.

59. See California Bankers Association v. Schultz, 416 U.S. 21, 52-53 (1974); United States v. Miller, 425 U.S. 435, 438 (1976).

60. California Bankers, at 52-53.

61. United States v. Miller, 425 U.S. 435, 438 (1976).

62. Id. at 442-443.

63. The Privacy Act of 1974, 5 U.S.C. sect. 552(a).

64. The Right to Financial Privacy Act of 1982, 12 U.S.C. sects. 3401-3409.

65. The Electronic Communications Privacy Act of 1986, 18 U.S.C. sects. 2510-2518.

66. 5 U.S.C. sect. 552(a).

67. Id. sects 552(a)(1)-(12).

68. Id. sect. 552a(b)

69. 12 U.S.C. sect. 3404.

70. 12 U.S.C. sect. 3409(a).

71. Id. sect. 3401(8). "Law enforcement inquiry" is defined as "lawful investigaton or official proceeding inquiring into a violation of, or failure to comply with, any criminal or civil statute or any regulation, rule, or order issued pursuant thereto."

72. Id. A customer must usually bring an action in court after the agency has accessed the financial records.

73. 18 U.S.C. sect. 2510(12).

74. Id. sects. 2510(1), (2) & (12) respectively.

75. 18 U.S.C. sect. 2510.

76. 12 U.S.C. sect. 3401(8).

77. Under 31 U.S.C. sect. 5317(a), the Secretary of the Treasury may apply for a search warrant when there exists a reasonable belief that a CTR has not been filed or has a material omission or misstatement. The court may issue a search warrant on a showing of probable cause.
The catch is the language "This subsection does not affect the authority of the Secretary under another law." The other law is the RFPA, which allows for a search of individual financial records based solely on a "legitimate law enforcement inquiry." What better means to evade probable cause than to rely on "another, less stringent, law."

78. If no compromise is reached, the result may be worse than the uncompromising federal agencies realize. For instance, what is to prevent a potential laundering organization from establishing an Internet-only cyberbank so as to launder their illegally earned profits? If the cyberbank is non-chartered and not subject to current banking regulations, then establishing the bank would be only as difficult as installing the needed programming and creating a web site.

For a discussion on the process of chartering a bank see Edward L. Symons, Jr. & James J. White, Banking Law, ch. 2 (3d ed. 1991).

79. United States v. Miller, 425 U.S. 435, 442-443 (1976).

80. California Bankers Association v. Schultz, 416 U.S. 21, 49 (1974).

81. Although a probable cause standard is arguably more appropriate when attempting to invade another's privacy, law enforcement will likely evade this standard by using the lesser requirement contained within RFPA, which allows for investigation of a financial account if the records relate to a "legitimate law enforcement inquiry." The author is merely stating an opinion of what should be, rather than what is!

82. See supra notes 34 & 35 for information on "blinding" and revealing account identity.

83. Revelation 2:17.