Thursday, June 13, 2019

Investment Law - Money Laundering and Terrorist Finance Essay

Investment Law - Money Laundering and Terrorist Finance - Essay Example50)2.We can therefore describe silver laundering as a process whereby the proceeds from activities of crime are covered to conceal their source or origin which is unlawful. Money laundering may entail three unadorned reas alternative actus (Graham, 2007, p. 51)3. These includes the one, the transfer or conversion of lieu bearing in mind that such property or asset a criminal proceeds, two, the blind or disguise of the source, nature, disposition, location, rights ownership or the movement with regards to the property bearing in mind that such property is a criminal proceeds and three, the property possession, the acquisition or use having in mind that the reception time that the property is of criminal proceeds (Graham, 2007, p. 51)4.On the other hand, financial act of terrorism involves collection, preparation or solicitation of funds with an objective that the funds may be utilized to enhance terrorist org anizations or acts. These funds may come from either illicit or legal sources. To define more precisely, a person is said to commit of terrorist support if the person by any way indirectly or directly, willfully or unlawfully collects or provides funds with the aim that the money or the funds be used or the person has the knowledge that the money will be used in part or full support of a criminal offense with the convectional offense (Graham, 2007, p. 51)1. The major objective of an entities or individual engaging in terrorist financing is thus not necessarily hide the money but both nature and financing of the activity of financing (Graham, 2007, p. 51)2.The risk that may be associated with money laundering is that, it damages financial sectors which the key institutions for economic growth of a country. Money laundering and financial terrorism reduces the productivity with a country since most of resources are diverted to criminal activities encouraging practices of corruption (G raham, 2007, p.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.