Money laundering in Ozark
Oct. 8th, 2017 06:43 pm![[personal profile]](https://www.dreamwidth.org/img/silk/identity/user.png)
As shows like
Some of what was described seemed to make sense. One expects strip clubs and casinos to take a lot of cash. The bearer title to a business seemed an interesting way to prevent transactions from being traced to an individual. What I did not understand was the inflation of construction costs, billing for more air conditioners than were received, etc. At least, I cannot easily construct an ongoingly effective and sufficiently performant mechanism that stands up to a relatively simple audit that looks at the double-entry bookkeeping of both buyer and seller. I am clearly missing something.
I do not like to be failing to spot a technical means of subversion because from a professional point of view I must consider devious techniques when looking for security vulnerabilities in software.
Breaking Bad(2008) have before it,
Ozark(2017) features money laundering techniques. The ones in
Breaking Badmade some sense. For example, overdeclaring the amount of cash that a business takes can raise flags if it outstrips the check and credit card receipts by too high a factor for the industry but that is not quite a smoking gun. However, one of
Ozark's methods seems dangerously flaky to me so I may be wrongly guessing the detail. I provide a spoiler cut but it is a rather mild spoiler as I shall simply mention some of the show's featured techniques.
Some of what was described seemed to make sense. One expects strip clubs and casinos to take a lot of cash. The bearer title to a business seemed an interesting way to prevent transactions from being traced to an individual. What I did not understand was the inflation of construction costs, billing for more air conditioners than were received, etc. At least, I cannot easily construct an ongoingly effective and sufficiently performant mechanism that stands up to a relatively simple audit that looks at the double-entry bookkeeping of both buyer and seller. I am clearly missing something.
I do not like to be failing to spot a technical means of subversion because from a professional point of view I must consider devious techniques when looking for security vulnerabilities in software.