Professional Documents
Culture Documents
https://www.emerald.com/insight/1368-5201.htm
Law
Juridical review of law enforcement enforcement
on money launderers: case study on money
launderers
from Indonesia
Meiryani
Accounting Department, School of Accounting, Bina Nusantara University,
Jakarta, Indonesia, and
Dezie Leonarda Warganegara
Management Department, BINUS Business School, Doctor of Research in
Management, Bina Nusantara University, Jakarta, Indonesia
Abstract
Purpose – Efforts to prevent and eradicate the crime of money laundering require a strong legal basis to
ensure legal certainty. This paper aims to analyse law enforcement on money launderers with juridical review
perspectives.
Design/methodology/approach – The research method used in this study is the statute approach,
which is to examine all laws and regulations related to the crime of money laundering. The writing method
used is the normative method, which is a type of research that uses the analysis of certain legislation.
Findings – Three new findings were discovered. In assessing the validity or validation of a business
ownership or business transaction, there are at least three pieces of evidence that need to be used, namely,
presence/absence of company/business registration in an official government database; the presence/absence
(including the amount) of tax reported on income tax and VAT; and the presence/absence of other legal
documents relating to the existence or general licensing of a business.
Research limitations/implications – The results of this study are also expected to be helpful for the
community, government agencies, or institutions, such as the police, to combat corruption, and money
laundering. The Prosecutor’s Office and the Corruption Eradication Commission (KPK) describe the handling
of money laundering crimes originating from money laundering crimes.
Social implications – This research can provide an overview and input for the broader community as an
early warning so as not to commit money laundering crimes.
Originality/value – This is one of the pioneer studies looking into law enforcement on money launderers
with comprehensive juridical review.
Keywords Law enforcement, Money launderers, Juridical review, Perspectives
Paper type Literature review
Introduction
Law enforcement against perpetrators of the crime of money laundering has recently shown
an increase (Harvey, 2005). At this time, money laundering has become a social phenomenon
and challenge. Money laundering is a serious crime (Masciandaro et al., 2007). The financial
This study is supported by BINUS University 2022 funding, as a part of Research Grant of Proyek
Inisiatif BINUS (BINUS Initiative Project) entitled “Publikasi International Bereputasi, Hak Kekayaan
Journal of Money Laundering
Intelektual dan Multidisiplin Research Output dalam Integrated Catur Dharma Perguruan Tinggi” or Control
“Reputable International Publication, Intellectual Property Rights and Multidisciplinary Research © Emerald Publishing Limited
1368-5201
Output in Integrated Catur Dharma College”. DOI 10.1108/JMLC-05-2022-0062
JMLC system is very functional for organized and white-collar criminals (Reuter, 2007). The
purpose of money laundering is to obscure the origin of what is entered into the financial
system (Walker, 2007). Indonesia is a country based on law where everything related to the
life of society, nation and state is regulated by law and various kinds of regulations such as
laws, Presidential Regulations, Government Regulations and Regional Regulations (Simser,
2013). The state of Indonesia is ranked 3 as a place for money laundering, from the CPI
(Corruption Perception Index) rating of 88 below Nigeria and above Russia. One of the
crimes that are directly related to money laundering in Indonesia is the criminal action
of corruption (Veng Mei Leong, 2007). The participation of the government of the
Republic of Indonesia in efforts to eradicate money laundering activities is contained in the
United Nations, namely, the UN Convention Against Illicit Traffic in Narcotics, Drugs and
Psychotropic Substances of 1988, which was later ratified by the government through Law
Number 7 of 1997. Money laundering is the process of removing traces of the origin of
money resulting from illegal activities or crimes through a series of investment activities or
transfers carried out repeatedly with the aim of obtaining legal status for money invested or
entered into the financial system (Teichmann, 2020a).
Money laundering is an attempt to hide or disguise the origin of money/funds or assets
resulting from a criminal act through various financial transactions so that the money or the
price of assets resulting from a crime is carried out through various financial transactions so
that the money or the price of the assets appears as if it came from activities (Harvey, 2004).
According to a report from the Egmont Group of Financial Intelligence Units, the typology
of money laundering is divided into five forms, namely:
(1) concealment within the company;
(2) legitimate business abuse;
(3) use of fake documents or identities;
(4) exploitation of international jurisdiction issues; and
(5) use of unnamed asset types (Walker, 1999).
In practice, money launderers use more than one typology and combine them with complex
schemes. This makes money laundering difficult to track and requires cooperation and
understanding from law enforcement and mature judges as well as a strong rule of law
(Schneider, 2008). In general, perpetrators of criminal acts try to hide or disguise the origin of
assets, which are the result of criminal acts in various ways so that the assets resulting from
criminal acts are difficult to trace by law enforcement officers and that they can freely use
the assets for both legal and illegal activities (Muller et al., 2007). The economic, political,
legal, social and cultural damage caused by money laundering is so great that it undermines
the very foundations of the structure of society (Sharman, 2008). Money laundering has the
potential to destroy the economy and security and has social impacts (Van Fossen, 2003).
Therefore, the crime of money laundering does not only threaten the stability and integrity
of the economic system and financial system, but can endanger the foundations of social,
national and state life based on Pancasila and the 1945 Constitution of the Republic of
Indonesia (Schneider, 2010). For this reason, efforts to prevent and eradicate the crime of
money laundering require a strong legal basis to ensure legal certainty, the effectiveness
of law enforcement as well as tracking and returning of assets resulting from criminal acts
(Hughes, 1991).
Literature review
Changes in the legal basis of money laundering in Indonesia are as follows:
Law Number 15 of 2002 concerning the Crime of Money Laundering. Law
Law Number 25 of 2003 concerning Amendments to Law Number 15 of 2002 enforcement
concerning the Crime of Money Laundering. on money
Law Number 8 of 2010 concerning the Prevention and Eradication of the Crime of launderers
Money Laundering regulates the forms of money laundering in seven articles,
namely, Articles 3–10. The other forms of criminal acts related to money laundering
are in six articles, namely, Articles 11–16.
Regulation of the Supreme Court Number 1 of 2013 concerning Procedures for
Settlement of Applications for Handling Assets in the Crime of Money Laundering
or Other Crimes.
Law of the Republic of Indonesia Law Number 25 of 2003, which has been amended into
Law Number 8 of 2010 concerning the Prevention and Eradication of the Crime of Money
Laundering, where money laundering is divided into three criminal acts:
(1) Active money laundering is any person who places, transfers, spends, pays,
grants, entrusts, takes abroad, changes form, exchanges for money or securities or
other actions on assets that he/she knows or it is reasonable to suspect that it is the
result of a criminal act as referred to in Article 2 paragraph (1) with the aim of
concealing or disguising the origin of assets (Article 3 of the Law of the Republic of
Indonesia Number 8 of 2010).
(2) Passive money laundering is imposed on any person who receives or controls the
placement, transfer, payment, grant, donation, safekeeping, exchange or use of
assets which he/she knows or reasonably suspects is the result of a criminal act as
referred to in Article 2 paragraph (1). This is also considered the same as money
laundering.
(3) Article 4 of the Law of the Republic of Indonesia Number 8 of 2010 is also imposed
on those who enjoy the proceeds of the crime of money laundering, which is
imposed on anyone who hides or disguises the origin, source of location, allocation,
transfer of rights or ownership. In fact, the assets which he/she knows or
reasonably suspects are the proceeds of a criminal act as referred to in Article 2
paragraph (1).
2. Law No. 8 of 2010 concerning the prevention and eradication of the crime of crime of
money laundering
Law on the prevention and eradication of the crime of money laundering in lieu of Law
Number 15 of 2002 concerning the crime of money laundering as amended by Law
Number 25 of 2003 concerning Amendments to Law Number 15 of 2002 concerning the
crime of money laundering. The content material contained in this Law, among others,
are as follows:
Redefinition of the definition of matters related to the crime of money laundering;
perfecting the criminalization of the crime of money laundering;
regulations regarding the imposition of criminal sanctions and administrative
sanctions;
strengthening the application of the principle of recognizing service users;
expansion of the reporting party;
determination of the type of reporting by providers of other goods and/or services;
arrangements regarding compliance supervision;
granting authority to the reporting party to postpone the transaction;
expansion of the authority of the Directorate General of Customs and Excise to
carry cash and other payment instruments into or out of the customs area;
granting authority to investigators for predicate crimes to investigate allegations of
money laundering;
JMLC expansion of agencies entitled to receive Financial Transaction Reports and
Analysis Center (PPATK) analysis or examination results;
restructuring of Financial Transaction Reports and Analysis Center (PPATK)
institutions;
additional authority of Financial Transaction Reports and Analysis Center
(PPATK), including the authority to temporarily suspend transactions;
re-arrangement of the law on the examination of the criminal act of money
laundering; and
regulation regarding confiscation of assets originating from criminal acts.
1 Corruption 80 41.3
2 Narcotics 51 39.1
3 Fraud 25 19.4
4 Embezzlement 19 11.2
5 Banking 16 9.2
6 Letter forgery 11 7.4
7 Psychotropic 6 3.1
8 Gambling 5 3.4
9 Theft 4 3.1
10 Cash-carrying violations 4 3.1
11 Forestry 3 2.1
12 Bribery 3 2.1
Table 1. 13 Other crimes 6 4.6
Money laundering
case Source: Results of data processing
additional interest from a sum of money that is simultaneously invested in various products Law
such as Bank Indonesia certificates (SBI), placements in time deposits, placements in enforcement
Investment Banks and insurance. Besides being invested, there is a pattern of book-entry of
a number of funds between Mr A’s account and his family, and there is also a book-entry to
on money
a newly opened account and closing an old one. In addition, it is known that the Bahasyim launderers
family owns a family company which was founded in 2005. However, it can be identified
that the assets owned by the family do not come from the results of business activities, as
seen from the period of acquisition of family assets since 1998, which is played in various
family accounts and invested in products, investment banking, and insurance. Based on the
company’s account mutation, it does not show any significant transactions that can show
the results of business activities. Ownership of significant amounts of assets and the
existence of a deposit from a private company owner are considered unreasonable and
indicate a criminal act of corruption considering that the person concerned is an official in a
government institution tasked with supervising the field of state financial revenues. At the
cassation level, Bahasyim was found guilty of committing a criminal act of corruption in the
form of visiting the taxpayer, asking for money and receiving Rp. 1,000,000,000 from
the taxpayer. Bahasyim is also considered to have committed acts that meet the elements of
money laundering offences. Although the person concerned showed a number of evidences
that his assets came from a business, the panel of judges considered that the evidence
presented was insufficient for consideration, one of which was because in the period
between 2004 and around March 2010, the defendant formally did not have a business.
Subsequently, the panel of judges ordered the state to confiscate cash in the amount of
Rp. 783,637, Rp. 5,679,763, Rp. 1,178,343,800 and Rp. 217,530,156, which was originally in
the account of the child concerned.
2. Case of Argandiono
From 2004 to 2010, when Argandiono served as Head of Prevention and Investigation
in Makassar and Palembang then Head of the Customs and Excise Service Office
Type A Juanda Regional Office VII DJBC Type A Surabaya, the person concerned
could be proven to have received Rp. 1,651,000,000 from several export and import
entrepreneurs as well as several other entrepreneurs who are engaged in business
fields related to the positions and authorities concerned. Argandiono never reported
the receipt of funds from these entrepreneurs to the KPK, and used the money for
personal interests, such as buying vehicles and houses in the name of other parties. At
trial, Argandiono stated that the source of his money came from a loan because
friendship was not related to the authority concerned. However, for the loan, the panel
of judges still considered that Argandiono could not show valid evidence of the source
of his acquisition. The panel of judges assessed that Argandiono’s actions had
fulfilled the elements of the money laundering crime.
Discussion
Evidence of money laundering cases as a stand-alone crime
According to Eddy O.S. Hiariej (2012, p. 52), evidence is anything that can be used to prove
the truth of an event in court. According to him, in the context of theory, the form of evidence
can be varied, such as eyewitnesses, documents, experts, fingerprints and DNA. Colin
Evans, as quoted by Eddy O.S. Hiariej (2012, p. 52), divides evidence into two categories,
namely, direct evidence and circumstance evidence. In the trial, there was no distinction
between direct and indirect evidence; however, regarding the strength of the evidence, the
difference was quite significant. Circumstantial evidence is defined as a form of evidence
that the judge may consider regarding facts that are not directly seen by eye witnesses.
Phyllis B. Gerstenfield, as quoted by Eddy O.S. Hiariej (2012, p. 52), explains that direct
evidence is evidence that tends to show the existence of facts without additional evidence.
However, circumstantial evidence is one that requires further evidence before drawing
conclusions on the evidence. Meanwhile, Max M. Houck explained that circumstantial
evidence is evidence based on a conclusion and not from knowledge or observation. Of
course, the circumstantial evidence must be adjusted with other evidence (Hughes, 1991). On
this basis, Houck argues that not all evidence has the same proving power. It is possible that
one evidence has a more important position than the other evidence, which all depends on
the proof of a case (Van Duyne, 2003).
Larry E. Sullivan and Marie Simonetti Rosen, as quoted by Eddy O.S. Hiariej (2012,
p. 52), divides evidence into three categories, namely, direct evidence, indirect evidence and
physical evidence. Direct evidence forms the element of a crime through eyewitness
accounts, confessions or whatever is observed, including writing and sound, video or other
digital recordings. Indirect evidence is based on sound words and analysis (Stessens, 2000).
Physical evidence is produced from a criminal investigation to determine the existence of a
crime that is linked between an object, the victim and the perpetrator (Meiryani et al., 2022).
A person who commits a crime always tries to get rid of the evidence that can ensnare him.
Therefore, although in criminal cases there is no hierarchy in the evidence, testimony
usually has the main place. Letters and other written evidence, including electronic
documents, can only be used as evidence if they are related to the crime committed
(Alexander, 2001). Nevertheless, the truth of the contents of the letter and other written
evidence, including electronic documents, must also be proven. Ian Dennis, as quoted by
Eddy O.S. Hiariej (2012, p. 52), documents that evidence have an important value if they
meet the following criteria:
regarding the authenticity of documents;
the contents of a document; and
if the document is implemented in accordance with its contents.
In the ML case, Article 73 of the PPTPPU Law states that the valid evidence in proving the
crime of money laundering is:
evidence as referred to in the criminal procedure law; and/or
other evidence in the form of information that is spoken, sent, received or stored
electronically by means of optical or optical-like devices and documents (Keesoony,
2016).
Based on Article 1 point 16 of the PPTPPU Law, documents are data, recordings or Law
information that can be seen, read and/or heard, which can be issued with or without the enforcement
help of a means, whether written on paper, any physical object other than paper, or recorded
on money
electronically, including but not limited to:
text, sound or image;
launderers
maps, designs, photographs or the like; and
letters, signs, numbers, symbols or perforations that have meaning or can be
understood by people who are able to read or understand them.
Meanwhile, when viewed in Article 184 of the Criminal Procedure Code for evidence,
namely, witness statements, expert statements, letters, instructions and statements of the
defendant, then the document is one of the evidence in Article 184 of the Criminal Procedure
Code, namely, letters, but in the Money Laundering Law, documents are defined more. In
addition to letters, instructions can also be found, exceeding letters and instructions, so that
the letters and instructions in Article 184 of the Criminal Procedure Code cannot
accommodate evidence as stated in the money laundering law, so it appears that the
development of information technology has advanced rapidly (Stessens, 2000).
The formulation of evidence in the PPTPPU law is in line with the Law on the
Eradication of Corruption Crimes; the basic difference lies in that the PPTPPU Law has
regulated information and documents as evidence, whereas in the Law on the Eradication of
Criminal Acts of corruption, the two evidences are only an extension of sources of evidence
in the Criminal Procedure Code (KUHAP) in the form of witness statements, letters and
statements from the defendant. Based on several decisions on money laundering offenses, as
has been reviewed in part 3 of this paper, several characteristics can be identified. Among
them, that the money laundering offenses case was cumulatively indicted with corruption
cases. In this case, law enforcers have been able to identify and prove the existence of
a criminal act of corruption over all or part of the confiscated assets (Naheem, 2020). In the
case of Argandiono and Rudi Rubiandini, all of the assets charged with ML are assets that
can be proven entirely from corruption. The existence of the criminal act of money
laundering, in this case, is evidenced by the placement, transfer and safekeeping to other
parties, placement in SDB, exchange in other currencies and spending on money resulting
from the crime of corruption. In the case of Rudi Rubiandini, the act of entrusting a certain
amount of money to the SDB of another party is one of the indicators that strengthens
efforts to conceal the origin of assets resulting from crime and makes it difficult to track law
enforcement. On the other hand, although Argandiono admitted that he received a number
of funds from the private sector related to export/import activities, at the trial, he stated that
the amount of funds was a loan that had been repaid. However, the formal legality of the
loan agreement cannot be demonstrated (Favarel-Garrigues et al., 2008).
Meanwhile, in the case of Bahasyim Asyifie, Wa Ode Nurhayati, Djoko Susilo and M.
Akil Mochtar, law enforcement only succeeded in proving the existence of a criminal act of
corruption from a small portion of the assets seized by the state. The four parties in court
admitted that the source of their wealth was from business (Sheptycki, 2000). However, from
the evidence presented by the defendant, it is not enough to be sure that the source of the
acquisition comes from a legitimate business (Gilmour, 2022). The existence of a money
laundering crime in this case is proven by the presence of the following:
Most of the assets and businesses are not reported in the State Administrator
Wealth Report.
JMLC Based on information regarding the official income in question which can be
identified, it is certain that it cannot be a source of acquisition of assets.
No legal ownership of a business has been found, which is supported by a pattern of
transactions that does not reflect a business activity.
The act of placing, entrusting, transferring, diverting, etc. (Takats, 2007).
The existence of an alleged criminal act, in this case, can only be proven by means of
evidence showing the characteristics of money laundering offenses, which is strengthened
by the existence of another criminal act that has been/concurrently proven at trial. This
condition can occur because of many factors. The main factor that is most likely because of
the success of the perpetrators in breaking the chain of criminal acts with their assets. In
keeping away the origins of the assets resulting from crime, money laundering actors often
use complex, diverse, invisible and secret transaction schemes (Orlova, 2008). In addition to
using a complex financial system, money laundering actors often take advantage of the
weaknesses of inefficient or corrupt systems to carry out the money laundering process. On
the other hand, the application of the principle of reverse proof by the defendant in the trial
process actually harms the prosecution process if the public prosecutor cannot prove
otherwise based on the arguments or evidence presented by the defendant who tries to
refute the public prosecutor’s charges. This condition can occur partly because of the
possibility of perpetrators submitting evidence of business transactions from information
sources that were not successfully obtained by the public prosecutor or other law
enforcement or government agencies prior to the prosecution process. The actors in this case
are very likely to manipulate financial transaction information assisted by gatekeepers
(Pavlidis, 2020).
In handling money laundering offenses cases, the evidentiary technique to assess the
truth and validity of a business ownership is always crucial, considering that a crime that
generates finance at the end or at the time the crime is committed will always use the
underlying business to hide the origin of the acquisition of its assets (Ross and Hannan,
2007). The application of the principle of reverse proof by the defendant in the trial process,
on the one hand, can harm the prosecution process if the defendant can convince the judge
about the origin of his assets from a business activity. In fact, the perpetrators engineered
financial transaction information assisted by gatekeepers. To overcome this, it is necessary
to strengthen the evidence in ML cases, especially those originating from corruption crimes.
This strengthening of evidence is also in line with the theory of evidence and evidence which
states that evidence is anything that can be used to prove the truth of an event in court,
which is directly or indirectly related to a crime as long as it can be judged as relevant
evidence that support the evidentiary process (Teichmann, 2020b).
In a number of ML case decisions stemming from criminal acts of corruption, the
evidence used refers to the elements in Articles 3, 4 and 5 of the law of money laundering in
the form of evidence confirming the act of transferring, entrusting, changing the form,
exchanging with currency or securities, hiding or disguise origins and so on. The use of
evidence and evidence to assess the truth and validity of a business ownership needs to be
encouraged as evidence related to the act of “hiding or disguising the origin” (Article 4 law
of money laundering) by investigators, public prosecutors and judges. The nature of
proving the truth of a business ownership uses the principles commonly used in civil cases,
in this case what is sought is formal truth. In formal evidence, the existence of official
documents and through verifiable means needs to be encouraged as evidence to assess the
validity or validation of a business ownership or business transaction (John Madinger,
1999).
Conclusion Law
The target in the Money Laundering Law is to prevent and eradicate the money laundering enforcement
system or process in the form of placement, layering and integration. In principle, money
laundering is an attempt to hide or disguise the origin of assets obtained from various
on money
criminal acts, such as corruption, bribery, smuggling, labor smuggling, immigrant launderers
smuggling, banking, narcotics, psychotropic substances, slave trade, women and children,
trafficking illegal weapons, kidnapping, terrorism, theft, embezzlement and fraud, which are
committed in the territory of the Republic of Indonesia or outside the territory of the
Republic of Indonesia and these crimes are also criminal acts according to Indonesian law. If
there is an indication of money laundering, the service provider is obliged to report to the
PPATK and the PPATK can forward it to the investigator (Police). To anticipate the
enactment of the Money Laundering Law, the service provider must prepare itself,
especially the administration system for prospective customers, the system and strategic
investigations that will be carried out by a special unit, and conversely the general public
must understand money laundering, in addition to the need for cooperation between parties
involved, related parties and other countries in eradicating the crime of money laundering;
without cooperation, the crime of laundering will continue to develop.
Handling of the crime of money laundering in Indonesia, which began with the
enactment of Law Number 15 of 2002 concerning the Crime of Money Laundering as
amended by Law Number 25 of 2003 concerning Amendments to Law Number 15 of 2002
concerning the Crime of Money Laundering, has shown a positive direction. This is reflected
in the increasing awareness of the implementers of the Law on the Crime of Money
Laundering, such as financial service providers in carrying out reporting obligations, the
Supervisory and Regulatory Agency in making regulations, the Financial Transaction
Reports and Analysis Center (PPATK) in analytical activities and enforcement agencies.
Law in following up on the results of the analysis to the imposition of criminal sanctions
and/or administrative sanctions. In order for the anti-money laundering law enforcement
system to work effectively, it is necessary to improve the quality of human resources
involved in efforts to prevent and eradicate money laundering, especially in important
institutions such as the judiciary, prosecutors, police, Financial Transaction Reports and
Analysis Center and financial service providers. We need to encourage restrictions on cash
transactions in business activities and encourage the existence of an integrated, easy and
accessible database regarding business ownership and other legal documents in preventing
money laundering.
References
Alexander, K. (2001), “The international anti-money-laundering regime: the role of the financial action
task force”, Journal of Money Laundering Control, Vol. 4 No. 3, pp. 231-248.
Hiariej, Eddy O.S., (2012), Theory and Law of Evidence, Erlangga Publisher, Yogyakarta.
Favarel-Garrigues, G., Godefroy, T. and Lascoumes, P. (2008), “Sentinels in the banking industry:
private actors and the fight against money laundering in France”, British Journal of Criminology,
Vol. 48 No. 1, pp. 1-20.
Gilmour, P.M. (2022), “Reexamining the anti-money-laundering framework: a legal critique and new
approach to combating money laundering”, Journal of Financial Crime, Vol. ahead-of-print No.
ahead-of-print., doi: 10.1108/JFC-02-2022-0041.
Harvey, J. (2004), “Compliance and reporting issues arising for financial institutions from money
laundering regulations: a preliminary cost benefit study”, Journal of Money Laundering Control,
Vol. 7 No. 4, pp. 333-346.
JMLC Harvey, J. (2005), “An evaluation of money laundering policies”, Journal of Money Laundering Control,
Vol. 8 No. 4, pp. 339-345, doi: 10.1108/13685200510620876.
Hughes, S.J. (1991), “Policing money laundering through funds transfers: a critique of regulation under
the Bank Secrecy Act”, Indiana Law Journal, Vol. 67, pp. 283-330.
John Madinger (1999), Money Laundering Guide for Criminal Investigators, CRC Pres, Washington, DC.
Keesoony, S. (2016), “International anti-money laundering laws: the problems with enforcement”, Journal
of Money Laundering Control, Vol. 19 No. 2, pp. 130-147, doi: 10.1108/JMLC-06-2015-0025.
Masciandaro, D., Takats, I. and Unger, B. (2007), Black Finance: The Economics of Money Laundering,
Edward Elgar, Cheltenham.
Meiryani, M., Soepriyanto, G. and Audrelia, J. (2022), “Effectiveness of regulatory technology
implementation in Indonesian banking sector to prevent money laundering and terrorist
financing”, Journal of Money Laundering Control, doi: 10.1108/JMLC-04-2022-0059.
Muller, W.H., Kalin, C.H. and Goldsworth, J.G. (Eds) (2007), Anti-Money Laundering: International Law
and Practice, John Wiley and Sons, Hoboken.
Naheem, M.A. (2020), “The agency dilemma in anti-money laundering regulation”, Journal of Money
Laundering Control, Vol. 23 No. 1, pp. 26-37, doi: 10.1108/JMLC-01-2016-0007.
Orlova, A.V. (2008), “Russia’s anti-money laundering regime: law enforcement tool or instrument of
domestic control?”, Journal of Money Laundering Control, Vol. 11 No. 3, pp. 210-233, doi: 10.1108/
13685200810889371.
Pavlidis, G. (2020), “Financial information in the context of anti-money laundering: Broadening the
access of law enforcement and facilitating information exchanges”, Journal of Money
Laundering Control, Vol. 23 No. 2, pp. 369-378, doi: 10.1108/JMLC-10-2019-0081.
Reuter, P. (2007), “Are estimates of the volume of money laundering either useful or feasible?”, Paper
Prepared for the Conference ‘Tackling Money Laundering’, University of Utrecht, Utrecht, The
Netherlands, November 2007.
Schneider, F. (2008), “Money laundering and financial means of organised crime: some
preliminary empirical findings”, Global Business and Economics Review, Vol. 10 No. 3,
pp. 309-330.
Schneider, F. (2010), “Turnover of organized crime and money laundering: some preliminary empirical
findings”, Public Choice, Vol. 144 Nos 3/4, pp. 473-486.
Sharman, J.C. (2008), “Power and discourse in policy diffusion: anti-money laundering in developing
states”, International Studies Quarterly, Vol. 52 No. 3, pp. 635-656.
Sheptycki, J. (2000), “Policing the virtual launderette: money laundering and global governance”, in
Scheptycki, J. (Ed.), Issues in Transnational Policing, Routledge, London, pp. 134-176.
Simser, J. (2013), “Money laundering: emerging threats and trends”, Journal of Money Laundering
Control, Vol. 16 No. 1, pp. 41-54, doi: 10.1108/13685201311286841.
Stessens, G. (2000), Money Laundering: An International Enforcement Model, Cambridge University
Press, Cambridge.
Takats, E. (2007), “A theory of ‘crying wolf’: the economics of money laundering enforcement”, IMF
working paper 7–81. International Monetary Fund, Washington, DC.
Teichmann, F. (2020a), “Recent trends in money laundering”, Crime, Law and Social Change, Vol. 73
No. 2, pp. 237-247, doi: 10.1007/s10611-019-09859-0.
Teichmann, F.M.J. (2020b), “Money laundering in the Jewellery business”, Journal of Money Laundering
Control, Vol. 23 No. 3, pp. 691-697, doi: 10.1108/JMLC-03-2018-0020.
Van Duyne, P.C. (2003), “Money laundering policy – fears and facts”, Criminal Finances and Organising
Crime in Europe, pp. 67-104.
Van Fossen, A.B. (2003), “Money laundering, global financial instability, and tax havens in the pacific
islands”, The Contemporary Pacific, Vol. 15 No. 2, pp. 237-275.
Veng Mei Leong, A. (2007), “Chasing dirty money: domestic and international measures against money Law
laundering”, Journal of Money Laundering Control, Vol. 10 No. 2, pp. 140-156, doi: 10.1108/
13685200710746857. enforcement
Walker, J. (1999), “How big is global money laundering?”, Journal of Money Laundering Control, Vol. 3 on money
No. 1, pp. 25-37. launderers
Walker, J. (2007), “Measuring global money laundering”, Paper presented at the conference
‘Tackling Money Laundering’, University of Utrecht, Utrecht, The Netherlands,
November 2007.
Further reading
Harvey, J. (2009), “The search for crime money—debunking the myth: facts versus imagery”, Journal of
Money Laundering Control, Vol. 12 No. 2, pp. 97-100.
Ross, S. and Hannan, M. (2007), “Money laundering regulation and risk-based decision-making”, Journal of
Money Laundering Control, Vol. 10 No. 1, pp. 106-115, doi: 10.1108/13685200710721890.
Gunawan, A. (2013), Limiting Cash Transactions Opportunities and Challenges, Tahir Foundation, Jakarta.
Center for Financial Transaction Reports and Analysis (2013), Annotation on Decisions on Money
Laundering Crimes, PPATK, Jakarta.
Center for Financial Transaction Reports and Analysis (2014), Annotation on Decisions on Money
Laundering Crimes, PPATK, Jakarta.
Center for Financial Transaction Reports and Analysis (2015), Annotation on Decisions on Money
Laundering Crimes, PPATK, Jakarta.
Gunadi (2010), Comprehensive Guide to General Tax Provisions, MUC Consulting Group, Jakarta.
Hamza, A. (2010), Introduction to Indonesian Criminal Law, PT. Yarsif Watampone, Jakarta,
First Edition.
Corresponding author
Meiryani can be contacted at: meiryani@binus.edu
For instructions on how to order reprints of this article, please visit our website:
www.emeraldgrouppublishing.com/licensing/reprints.htm
Or contact us for further details: permissions@emeraldinsight.com