SlideShare a Scribd company logo
1 of 4
Week 10 Discussion
"Information Security and Digital Crime and Terrorism" Please
respond to the following:
· From the first e-Activity, identify one to two (1-2) potential
ethical challenges that security professionals may face as
technology advances, applications become more mobile, and
computer criminals become more innovative. Speculate on one
(1) solution that security professional could take in order to
mitigate the challenge(s) in question. Justify your response.
· From the second e-Activity, among the three (3) definitions of
cyber terrorism, give your opinion as to the one (1) definition
that is the most accurate with regard to information security and
infrastructure protection. Next, describe the impact that digital
crimes and digital terrorism are likely to have in the future.
Provide a rationale for your response.
Please also reply to the student
Latonya Walker
RE: Week 10 Discussion
· From the first e-Activity, identify one to two (1-2) potential
ethical challenges that security professionals may face as
technology advances, applications become more mobile, and
computer criminals become more innovative. Speculate on one
(1) solution that security professional could take in order to
mitigate the challenge(s) in question. Justify your response.
A potential ethical challenge that security professionals may
face as technology advances, applications become more mobil;e
and computer criminals become more innovative is that most of
the crime comes from the inside so they can cover up their
tracks and know to avoid random audits. Also the ignorance of
not knowing and leaving information carelessly in the wrong
hands by leaving screens up without protection, losing a mobile
device with links to sensitive documents, password protection
and if working from home, not having enough security or
backup. It is hard to speculate a solution that security
professionals can take in order to migitate the challenges except
to get in a routine. Like if you always lose your car keys one
may get in the habit of putting them on a rack, so a routine can
be innovated to boost security. As well as randomly performing
audits and password changes.
· From the second e-Activity, among the three (3) definitions of
cyber terrorism, give your opinion as to the one (1) definition
that is the most accurate with regard to information security and
infrastructure protection. Next, describe the impact that digital
crimes and digital terrorism are likely to have in the future.
Provide a rationale for your response.
One definition that i find is accurate is that there is no
satisfactory definition because it changes and evolves. When
you think of cyber crime it may start with the computer but ends
in the homes and business of people. They may start with an
income that is funding terrorist acts and then go to recruiting
them and having the people to relocate. So it began by the
computer but definitely expanded many different ways. The
future will had more options and ways to commit crime, because
the very people that produce the computer programs and the
solutions for bugs, they are also the ones
selling information and leaking out the procedures. Working in
the financial industry it involves a lo of trust and if you do not
keep the people happy that holds your organization together,
then you may be at risk.
Week 10 Discussion
"Organized Crime" Please respond to the following:
· From the e-Activity, analyze the primary manner in which
organized crime may impact all areas in our lives. Next, based
on the text, specify the main ways in which the government uses
Racketeer Influenced and Corrupt Organizations Act (RICO)
and Continuing Criminal Enterprise Statute (CCE) to combat
global organized financial crimes like drug trafficking. Provide
one (1) example of the use of RICO and CCE to support your
response.
· Per the text, money laundering has been called the world’s
third largest business. Discuss the overall impact that money
laundering has had on the world’s financial systems. Next, give
your opinion of whether or not the laws in place to combat such
crime are efficient. Justify your response.
Please also reply to the student
Nicholas Mayfield
RE: Week 10 Discussion
It seems like the main way organized crime impacts the lives of
everyone is the effect it has on the economy. Organized crime
makes up a considerable portion of the worlds GDP (15%,
according to the video), and the economy governs every type of
consumer transaction. Criminal organizations tend to deal in
either illicit goods (drugs and prostitution) or counterfeit goods.
Counterfeit goods not only provide not only a source of income
for criminals, but also have an impact on legitimate companies
by hindering their ability to market their products. Illicit goods
are nontaxable, and so are some of the methods of distribution
of counterfeit goods, which causes a loss of revenue for
governments. Criminal organizations also use tax avoidance as a
source of income, such as selling untaxed cigarettes. The RICO
act targets members of criminal organizations, and can be used
to prosecute people who conspire to repeatedly commit criminal
acts in consistent manner, regardless of the organizations
structure. The example in the text of the criminals robbing night
safe deposit boxes illustrates that, under the RICO act, a
criminal enterprise does not have to have a designated leader.
The CCE statute is used to prosecute those that enable a
criminal enterprise to function. An example of this would be the
basenesses that distribute counterfeit goods, such as the online
pharmaceutical companies selling counterfeit medications.
The primary impact of money laundering is that it allows for
other criminal activity to evade detection. The most concerning
area of this is what we discussed last week, funding for terrorist
organizations. It stands to reason that, when someone compiles
large amounts of money and are unable to account for where it
came from, they are likely to be involved in illicit activities.
Although it could be argued that the tactics currently used to
prevent money laundering aren't sufficient, as a great deal of
money laundering operations are still successful, it would seem
that the laws in place are efficient, since they are commonly
used to secure convictions. I would suggest that the best way to
crack down on money laundering would be for law enforcement
to come up with more efficient means of monitoring and
detecting this activity, rather than putting new laws in place to
punish those guilty of it.
Bottom of Form
Bottom of Form
Bottom of Form
Bottom of Form

More Related Content

Similar to Week 10 Discussion Information Security and Digital Crime and .docx

PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docxPROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docx
briancrawford30935
 
Botnet Research TemplateLearning ContentKey Botnet Notes.docx
Botnet Research TemplateLearning ContentKey Botnet Notes.docxBotnet Research TemplateLearning ContentKey Botnet Notes.docx
Botnet Research TemplateLearning ContentKey Botnet Notes.docx
jasoninnes20
 
I need answers to both discussions questions as well as replies to f.docx
I need answers to both discussions questions as well as replies to f.docxI need answers to both discussions questions as well as replies to f.docx
I need answers to both discussions questions as well as replies to f.docx
anthonybrooks84958
 

Similar to Week 10 Discussion Information Security and Digital Crime and .docx (9)

PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docxPROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docx
 
Botnet Research TemplateLearning ContentKey Botnet Notes.docx
Botnet Research TemplateLearning ContentKey Botnet Notes.docxBotnet Research TemplateLearning ContentKey Botnet Notes.docx
Botnet Research TemplateLearning ContentKey Botnet Notes.docx
 
Cyber crime modified
Cyber crime modifiedCyber crime modified
Cyber crime modified
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems upload
 
A report on cyber Crime
A report on cyber CrimeA report on cyber Crime
A report on cyber Crime
 
Life On Other Planets Essay Ideas. Online assignment writing service.
Life On Other Planets Essay Ideas. Online assignment writing service.Life On Other Planets Essay Ideas. Online assignment writing service.
Life On Other Planets Essay Ideas. Online assignment writing service.
 
How To Write An Argument Essay. Online assignment writing service.
How To Write An Argument Essay. Online assignment writing service.How To Write An Argument Essay. Online assignment writing service.
How To Write An Argument Essay. Online assignment writing service.
 
I need answers to both discussions questions as well as replies to f.docx
I need answers to both discussions questions as well as replies to f.docxI need answers to both discussions questions as well as replies to f.docx
I need answers to both discussions questions as well as replies to f.docx
 
Public Surveillance In The USA Essay
Public Surveillance In The USA EssayPublic Surveillance In The USA Essay
Public Surveillance In The USA Essay
 

More from aryan532920

According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docx
According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docxAccording to the NASW Code of Ethics section 6.04 (NASW, 2008), .docx
According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docx
aryan532920
 
According to the text, crime has been part of the human condition si.docx
According to the text, crime has been part of the human condition si.docxAccording to the text, crime has been part of the human condition si.docx
According to the text, crime has been part of the human condition si.docx
aryan532920
 
According to Ronald Story and Bruce Laurie, The dozen years between.docx
According to Ronald Story and Bruce Laurie, The dozen years between.docxAccording to Ronald Story and Bruce Laurie, The dozen years between.docx
According to Ronald Story and Bruce Laurie, The dozen years between.docx
aryan532920
 
According to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docxAccording to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docx
aryan532920
 
According to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docxAccording to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docx
aryan532920
 

More from aryan532920 (20)

According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docx
According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docxAccording to the NASW Code of Ethics section 6.04 (NASW, 2008), .docx
According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docx
 
According to the text, crime has been part of the human condition si.docx
According to the text, crime has been part of the human condition si.docxAccording to the text, crime has been part of the human condition si.docx
According to the text, crime has been part of the human condition si.docx
 
According to Ronald Story and Bruce Laurie, The dozen years between.docx
According to Ronald Story and Bruce Laurie, The dozen years between.docxAccording to Ronald Story and Bruce Laurie, The dozen years between.docx
According to Ronald Story and Bruce Laurie, The dozen years between.docx
 
According to Kirk (2016), most of your time will be spent work with .docx
According to Kirk (2016), most of your time will be spent work with .docxAccording to Kirk (2016), most of your time will be spent work with .docx
According to Kirk (2016), most of your time will be spent work with .docx
 
According to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docxAccording to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docx
 
According to Kirk (2016), most of our time will be spent working.docx
According to Kirk (2016), most of our time will be spent working.docxAccording to Kirk (2016), most of our time will be spent working.docx
According to Kirk (2016), most of our time will be spent working.docx
 
According to Kirk (2016), most of your time will be spent working wi.docx
According to Kirk (2016), most of your time will be spent working wi.docxAccording to Kirk (2016), most of your time will be spent working wi.docx
According to Kirk (2016), most of your time will be spent working wi.docx
 
According to Davenport (2014) the organizational value of healthcare.docx
According to Davenport (2014) the organizational value of healthcare.docxAccording to Davenport (2014) the organizational value of healthcare.docx
According to Davenport (2014) the organizational value of healthcare.docx
 
According to the authors, privacy and security go hand in hand; .docx
According to the authors, privacy and security go hand in hand; .docxAccording to the authors, privacy and security go hand in hand; .docx
According to the authors, privacy and security go hand in hand; .docx
 
According to Gilbert and Troitzsch (2005), Foundations of Simula.docx
According to Gilbert and Troitzsch (2005), Foundations of Simula.docxAccording to Gilbert and Troitzsch (2005), Foundations of Simula.docx
According to Gilbert and Troitzsch (2005), Foundations of Simula.docx
 
According to Klein (2016), using ethical absolutism and ethical .docx
According to Klein (2016), using ethical absolutism and ethical .docxAccording to Klein (2016), using ethical absolutism and ethical .docx
According to Klein (2016), using ethical absolutism and ethical .docx
 
According to Franks and Smallwood (2013), information has become.docx
According to Franks and Smallwood (2013), information has become.docxAccording to Franks and Smallwood (2013), information has become.docx
According to Franks and Smallwood (2013), information has become.docx
 
According to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docxAccording to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docx
 
According to the authors, privacy and security go hand in hand; and .docx
According to the authors, privacy and security go hand in hand; and .docxAccording to the authors, privacy and security go hand in hand; and .docx
According to the authors, privacy and security go hand in hand; and .docx
 
According to recent surveys, China, India, and the Philippines are t.docx
According to recent surveys, China, India, and the Philippines are t.docxAccording to recent surveys, China, India, and the Philippines are t.docx
According to recent surveys, China, India, and the Philippines are t.docx
 
According to the authors, countries that lag behind the rest of the .docx
According to the authors, countries that lag behind the rest of the .docxAccording to the authors, countries that lag behind the rest of the .docx
According to the authors, countries that lag behind the rest of the .docx
 
According to Peskin et al. (2013) in our course reader, Studies on .docx
According to Peskin et al. (2013) in our course reader, Studies on .docxAccording to Peskin et al. (2013) in our course reader, Studies on .docx
According to Peskin et al. (2013) in our course reader, Studies on .docx
 
According to Franks and Smallwood (2013), information has become the.docx
According to Franks and Smallwood (2013), information has become the.docxAccording to Franks and Smallwood (2013), information has become the.docx
According to Franks and Smallwood (2013), information has become the.docx
 
According to Ang (2011), how is Social Media management differen.docx
According to Ang (2011), how is Social Media management differen.docxAccording to Ang (2011), how is Social Media management differen.docx
According to Ang (2011), how is Social Media management differen.docx
 
According to (Alsaidi & Kausar (2018), It is expected that by 2020,.docx
According to (Alsaidi & Kausar (2018), It is expected that by 2020,.docxAccording to (Alsaidi & Kausar (2018), It is expected that by 2020,.docx
According to (Alsaidi & Kausar (2018), It is expected that by 2020,.docx
 

Recently uploaded

Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health Education
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 

Week 10 Discussion Information Security and Digital Crime and .docx

  • 1. Week 10 Discussion "Information Security and Digital Crime and Terrorism" Please respond to the following: · From the first e-Activity, identify one to two (1-2) potential ethical challenges that security professionals may face as technology advances, applications become more mobile, and computer criminals become more innovative. Speculate on one (1) solution that security professional could take in order to mitigate the challenge(s) in question. Justify your response. · From the second e-Activity, among the three (3) definitions of cyber terrorism, give your opinion as to the one (1) definition that is the most accurate with regard to information security and infrastructure protection. Next, describe the impact that digital crimes and digital terrorism are likely to have in the future. Provide a rationale for your response. Please also reply to the student Latonya Walker RE: Week 10 Discussion · From the first e-Activity, identify one to two (1-2) potential ethical challenges that security professionals may face as technology advances, applications become more mobile, and computer criminals become more innovative. Speculate on one (1) solution that security professional could take in order to mitigate the challenge(s) in question. Justify your response. A potential ethical challenge that security professionals may face as technology advances, applications become more mobil;e and computer criminals become more innovative is that most of the crime comes from the inside so they can cover up their tracks and know to avoid random audits. Also the ignorance of not knowing and leaving information carelessly in the wrong hands by leaving screens up without protection, losing a mobile
  • 2. device with links to sensitive documents, password protection and if working from home, not having enough security or backup. It is hard to speculate a solution that security professionals can take in order to migitate the challenges except to get in a routine. Like if you always lose your car keys one may get in the habit of putting them on a rack, so a routine can be innovated to boost security. As well as randomly performing audits and password changes. · From the second e-Activity, among the three (3) definitions of cyber terrorism, give your opinion as to the one (1) definition that is the most accurate with regard to information security and infrastructure protection. Next, describe the impact that digital crimes and digital terrorism are likely to have in the future. Provide a rationale for your response. One definition that i find is accurate is that there is no satisfactory definition because it changes and evolves. When you think of cyber crime it may start with the computer but ends in the homes and business of people. They may start with an income that is funding terrorist acts and then go to recruiting them and having the people to relocate. So it began by the computer but definitely expanded many different ways. The future will had more options and ways to commit crime, because the very people that produce the computer programs and the solutions for bugs, they are also the ones selling information and leaking out the procedures. Working in the financial industry it involves a lo of trust and if you do not keep the people happy that holds your organization together, then you may be at risk. Week 10 Discussion "Organized Crime" Please respond to the following: · From the e-Activity, analyze the primary manner in which organized crime may impact all areas in our lives. Next, based on the text, specify the main ways in which the government uses Racketeer Influenced and Corrupt Organizations Act (RICO)
  • 3. and Continuing Criminal Enterprise Statute (CCE) to combat global organized financial crimes like drug trafficking. Provide one (1) example of the use of RICO and CCE to support your response. · Per the text, money laundering has been called the world’s third largest business. Discuss the overall impact that money laundering has had on the world’s financial systems. Next, give your opinion of whether or not the laws in place to combat such crime are efficient. Justify your response. Please also reply to the student Nicholas Mayfield RE: Week 10 Discussion It seems like the main way organized crime impacts the lives of everyone is the effect it has on the economy. Organized crime makes up a considerable portion of the worlds GDP (15%, according to the video), and the economy governs every type of consumer transaction. Criminal organizations tend to deal in either illicit goods (drugs and prostitution) or counterfeit goods. Counterfeit goods not only provide not only a source of income for criminals, but also have an impact on legitimate companies by hindering their ability to market their products. Illicit goods are nontaxable, and so are some of the methods of distribution of counterfeit goods, which causes a loss of revenue for governments. Criminal organizations also use tax avoidance as a source of income, such as selling untaxed cigarettes. The RICO act targets members of criminal organizations, and can be used to prosecute people who conspire to repeatedly commit criminal acts in consistent manner, regardless of the organizations structure. The example in the text of the criminals robbing night safe deposit boxes illustrates that, under the RICO act, a criminal enterprise does not have to have a designated leader. The CCE statute is used to prosecute those that enable a criminal enterprise to function. An example of this would be the basenesses that distribute counterfeit goods, such as the online pharmaceutical companies selling counterfeit medications.
  • 4. The primary impact of money laundering is that it allows for other criminal activity to evade detection. The most concerning area of this is what we discussed last week, funding for terrorist organizations. It stands to reason that, when someone compiles large amounts of money and are unable to account for where it came from, they are likely to be involved in illicit activities. Although it could be argued that the tactics currently used to prevent money laundering aren't sufficient, as a great deal of money laundering operations are still successful, it would seem that the laws in place are efficient, since they are commonly used to secure convictions. I would suggest that the best way to crack down on money laundering would be for law enforcement to come up with more efficient means of monitoring and detecting this activity, rather than putting new laws in place to punish those guilty of it. Bottom of Form Bottom of Form Bottom of Form Bottom of Form