CSE5010: Inside the Mind of a Hacker Lab 7( week8) - Business Models 6 Reference: Aston, M., McCombie, S., Reardon, B., \& Watters, P. (2009). A preliminary profiling of internet money mules: An australian perspective. In Ubiquitous, Autonomic and Trusted Computing, 2009. UICATC'09. Symposia and Workshops on (pp. 482487). IEEE. Le-Khac, N. A., Markos, S., ONNeill, M., Brabazon, A., \& Kechadi, M. T. (2009). An Efficient Search Tool For An Anti-Money Laundering Application Of An Multi-National Bank's Dataset. In IKE (pp. 151157). Task: Following on from Activity 12, it is necessary for hackers to be able to "cash out" or launder the proceeds of their criminal activity. While crypto currencies like Bitcoin provide one mechanism, traditionally, crime gangs make use of "money mules". In a study of Australian money mules, Aston et al (2009) found that money mules were non-randomly distributed around Melbourne, based on location and demographic data provided by a major Australian bank: being male, aged in 20 s, and living near a University were key predictors of being a money mule. In this activity, you will consider all the ways that hacking gangs could use to launder their criminal proceeds. What financial systems or services do they use? How do they use placement, layering. and integration? What business, legal and technical strategies could you put in place to ensure that criminal gangs could not cash out their proceeds? Form a small group, and tabulate these reflections, and discuss. Each group will then share with the class. We will gather all the results for the class, and see whether our class has the right skills to prevent the laundering of criminal proceeds.