Misplaced Pages

Australian Transaction Reports and Analysis Centre

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.

Financial intelligence ( FININT ) is the gathering of information about the financial affairs of entities of interest, to understand their nature and capabilities, and predict their intentions. Generally the term applies in the context of law enforcement and related activities. One of the main purposes of financial intelligence is to identify financial transactions that may involve tax evasion , money laundering or some other criminal activity. FININT may also be involved in identifying financing of criminal and terrorist organisations. Financial intelligence can be broken down into two main areas, collection and analysis. Collection is normally done by a government agency, known as a financial intelligence organisation or Financial Intelligence Unit (FIU). The agency will collect raw transactional information and Suspicious activity reports (SAR) usually provided by banks and other entities as part of regulatory requirements. Data may be shared with other countries through intergovernmental networks. Analysis, may consist of scrutinizing a large volume of transactional data using data mining or data-matching techniques to identify persons potentially engaged in a particular activity. SARs can also be scrutinized and linked with other data to try to identify specific activity.

#128871

67-561: Australian Transaction Reports and Analysis Centre ( AUSTRAC ) is an Australian government financial intelligence agency responsible for monitoring financial transactions to identify money laundering , organised crime , tax evasion , welfare fraud and terrorism financing . AUSTRAC was established in 1989 under the Financial Transaction Reports Act 1988 . It implements in Australia the recommendations of

134-505: A "handle" (a term deriving from CB slang ), " user name", " login name", " avatar ", or, sometimes, " screen name ", " gamertag ", "IGN ( I n G ame ( N ick) N ame)" or " nickname ". On the Internet, pseudonymous remailers use cryptography that achieves persistent pseudonymity, so that two-way communication can be achieved, and reputations can be established, without linking physical identities to their respective pseudonyms. Aliasing

201-726: A Web server that disguises the user's IP address. But most open proxy addresses are blocked indefinitely due to their frequent use by vandals. Additionally, Misplaced Pages's public record of a user's interest areas, writing style, and argumentative positions may still establish an identifiable pattern. System operators ( sysops ) at sites offering pseudonymity, such as Misplaced Pages, are not likely to build unlinkability into their systems, as this would render them unable to obtain information about abusive users quickly enough to stop vandalism and other undesirable behaviors. Law enforcement personnel, fearing an avalanche of illegal behavior, are equally unenthusiastic. Still, some users and privacy activists like

268-528: A culture, and of amounts that would not require reporting if in a conventional financial institution. IVTS also can be used for criminal purposes of avoiding oversight. Examples of financial intelligence analysis could include: At the highest level, US domestic FININT, and also some international work, comes under the Under Secretary of the Treasury for Terrorism and Financial Intelligence , heading

335-445: A degree of privacy, to better market themselves, and other reasons. In some cases, pseudonyms are adopted because they are part of a cultural or organisational tradition; for example, devotional names are used by members of some religious institutes , and "cadre names" are used by Communist party leaders such as Trotsky and Lenin . A collective name or collective pseudonym is one shared by two or more persons, for example,

402-421: A favorable reputation, they are more likely to behave in accordance with the site's policies. If users can obtain new pseudonymous identities freely or at a very low cost, reputation-based systems are vulnerable to whitewashing attacks, also called serial pseudonymity , in which abusive users continuously discard their old identities and acquire new ones in order to escape the consequences of their behavior: "On

469-546: A field dominated by women – have used female pen names. A few examples are Brindle Chase, Peter O'Donnell (as Madeline Brent), Christopher Wood (as Penny Sutton and Rosie Dixon), and Hugh C. Rae (as Jessica Sterling). A pen name may be used if a writer's real name is likely to be confused with the name of another writer or notable individual, or if the real name is deemed unsuitable. Authors who write both fiction and non-fiction, or in different genres, may use different pen names to avoid confusing their readers. For example,

536-630: A financial organization. From a legal standpoint, this type of collection can be quite complex. For example, the CIA obtained access to the Society for Worldwide Interbank Financial Telecommunication (SWIFT) data streams through the Terrorist Finance Tracking Program , but this violated Belgian privacy law. Reporting requirements may not affect Informal value transfer systems (IVTS) the use of which may simply be customary in

603-434: A good reputation. System operators may need to remind experienced users that most newcomers are well-intentioned (see, for example, Misplaced Pages's policy about biting newcomers ). Concerns have also been expressed about sock puppets exhausting the supply of easily remembered usernames. In addition a recent research paper demonstrated that people behave in a potentially more aggressive manner when using pseudonyms/nicknames (due to

670-491: A large volume of transactional data, usually provided by banks and other entities as part of regulatory requirements. Alternatively, data mining or data-matching techniques may be employed to identify persons potentially engaged in a particular activity. Many industrialized countries have regulatory reporting requirements for its financial organisations. It may be possible for the FININT organization to obtain access to raw data at

737-481: A manner that the new name becomes permanent and is used by all who know the person. This is not an alias or pseudonym, but in fact a new name. In many countries, including common law countries, a name change can be ratified by a court and become a person's new legal name. Pseudonymous authors may still have their various identities linked together through stylometric analysis of their writing style. The precise degree of this unmasking ability and its ultimate potential

SECTION 10

#1732765516129

804-535: A new name that entirely or legally replaces an individual's own. Many pseudonym holders use them because they wish to remain anonymous and maintain privacy, though this may be difficult to achieve as a result of legal issues. Pseudonyms include stage names , user names , ring names , pen names , aliases, superhero or villain identities and code names, gamer identifications, and regnal names of emperors, popes, and other monarchs. In some cases, it may also include nicknames . Historically, they have sometimes taken

871-488: A process known as de-identification . Nicolaus Copernicus put forward his theory of heliocentrism in the manuscript Commentariolus anonymously, in part because of his employment as a law clerk for a church -government organization. Sophie Germain and William Sealy Gosset used pseudonyms to publish their work in the field of mathematics – Germain, to avoid rampant 19th century academic misogyny , and Gosset, to avoid revealing brewing practices of his employer,

938-431: A pseudonym in literature is to present a story as being written by the fictional characters in the story. The series of novels known as A Series of Unfortunate Events are written by Daniel Handler under the pen name of Lemony Snicket , a character in the series. This applies also to some of the several 18th-century English and American writers who used the name Fidelia . An anonymity pseudonym or multiple-use name

1005-412: A pseudonym is called a stage name , or, occasionally, a professional name , or screen name . Members of a marginalized ethnic or religious group have often adopted stage names, typically changing their surname or entire name to mask their original background. Stage names are also used to create a more marketable name, as in the case of Creighton Tull Chaney, who adopted the pseudonym Lon Chaney Jr. ,

1072-401: A pseudonym representing the trio of James Madison , Alexander Hamilton , and John Jay . The papers were written partially in response to several Anti-Federalist Papers , also written under pseudonyms. As a result of this pseudonymity, historians know that the papers were written by Madison, Hamilton, and Jay, but have not been able to discern with certainty which of the three authored a few of

1139-441: A pseudonym to disguise the extent of their published output, e. g. Stephen King writing as Richard Bachman . Co-authors may choose to publish under a collective pseudonym, e. g., P. J. Tracy and Perri O'Shaughnessy . Frederic Dannay and Manfred Lee used the name Ellery Queen as a pen name for their collaborative works and as the name of their main character. Asa Earl Carter , a Southern white segregationist affiliated with

1206-667: A right to speak using a pseudonym. This right does not, however, give citizens the right to demand publication of pseudonymous speech on equipment they do not own. Most Web sites that offer pseudonymity retain information about users. These sites are often susceptible to unauthorized intrusions into their non-public database systems. For example, in 2000, a Welsh teenager obtained information about more than 26,000 credit card accounts, including that of Bill Gates. In 2003, VISA and MasterCard announced that intruders obtained information about 5.6 million credit cards. Sites that offer pseudonymity are also vulnerable to confidentiality breaches. In

1273-459: A soldier prêt à boire , ready to drink). In 1716, a nom de guerre was mandatory for every soldier; officers did not adopt noms de guerre as they considered them derogatory. In daily life, these aliases could replace the real family name. Noms de guerre were adopted for security reasons by members of World War II French resistance and Polish resistance . Such pseudonyms are often adopted by military special-forces soldiers, such as members of

1340-440: A study of a Web dating service and a pseudonymous remailer , University of Cambridge researchers discovered that the systems used by these Web sites to protect user data could be easily compromised, even if the pseudonymous channel is protected by strong encryption. Typically, the protected pseudonymous channel exists within a broader framework in which multiple vulnerabilities exist. Pseudonym users should bear in mind that, given

1407-773: A type of ATM that allowed anonymous cash deposits up to $ 20,000. In June 2018, the Commonwealth Bank agreed to pay a $ 700 million fine to settle the action, with CBA admitting to a host of breaches, including that millions of dollars were laundered through its ATMs by criminals including drug and firearms importers and that CBA failed to properly file more than 53,000 reports to Austrac over cash deposits of more than $ 10,000 in its ATMs. CBA also admitted that 149 “suspicious matter reports” were filed late, or not at all. In November 2019, AUSTRAC took action against Westpac alleging "systemic non-compliance" with AML/CTF 23 million times and covering $ 11 billion of transactions, involving

SECTION 20

#1732765516129

1474-406: Is a name used by many different people to protect anonymity. It is a strategy that has been adopted by many unconnected radical groups and by cultural groups, where the construct of personal identity has been criticised. This has led to the idea of the "open pop star", such as Monty Cantsin . Pseudonyms and acronyms are often employed in medical research to protect subjects' identities through

1541-624: Is attributable in large measure to its nearly non-existent initial participation costs. People seeking privacy often use pseudonyms to make appointments and reservations. Those writing to advice columns in newspapers and magazines may use pseudonyms. Steve Wozniak used a pseudonym when attending the University of California, Berkeley after co-founding Apple Computer , because "[he] knew [he] wouldn't have time enough to be an A+ student." When used by an actor, musician, radio disc jockey, model, or other performer or "show business" personality

1608-410: Is available for use by law enforcement, revenue, regulatory, security and other agencies. The transactions that "reporting entities" are required to report to AUSTRAC include: Australia's cash controls require travellers to report to AUSTRAC when they carry $ 10,000 or more (or equivalent in a foreign currency) of cash (or equivalent) into or out of Australia, which can be done on forms available from

1675-621: Is known to system operators but is not publicly disclosed), and unlinkable pseudonyms (the link is not known to system operators and cannot be determined). For example, true anonymous remailer enables Internet users to establish unlinkable pseudonyms; those that employ non-public pseudonyms (such as the now-defunct Penet remailer ) are called pseudonymous remailers . The continuum of unlinkability can also be seen, in part, on Misplaced Pages. Some registered users make no attempt to disguise their real identities (for example, by placing their real name on their user page). The pseudonym of unregistered users

1742-453: Is the use of multiple names for the same data location. More sophisticated cryptographic systems, such as anonymous digital credentials , enable users to communicate pseudonymously ( i.e. , by identifying themselves by means of pseudonyms). In well-defined abuse cases, a designated authority may be able to revoke the pseudonyms and reveal the individuals' real identity. Use of pseudonyms is common among professional eSports players, despite

1809-506: Is their IP address , which can, in many cases, easily be linked to them. Other registered users prefer to remain anonymous, and do not disclose identifying information. However, in certain cases, Misplaced Pages's privacy policy permits system administrators to consult the server logs to determine the IP address, and perhaps the true name, of a registered user. It is possible, in theory, to create an unlinkable Misplaced Pages pseudonym by using an Open proxy ,

1876-712: Is uncertain, but the privacy risks are expected to grow with improved analytic techniques and text corpora . Authors may practice adversarial stylometry to resist such identification. Businesspersons of ethnic minorities in some parts of the world are sometimes advised by an employer to use a pseudonym that is common or acceptable in that area when conducting business, to overcome racial or religious bias. Criminals may use aliases, fictitious business names , and dummy corporations ( corporate shells ) to hide their identity, or to impersonate other persons or entities in order to commit fraud. Aliases and fictitious business names used for dummy corporations may become so complex that, in

1943-521: The Freedom of Information Act 1982 , any person can access records held by AUSTRAC, subject to certain exemptions. Entities which are required to report transactions to AUSTRAC are called "reporting entities", which are specified in the AML/CTF Act. These entities deal in cash, bullion, cryptocurrencies and financial transactions, and include: Reporting entities must identify their customers using

2010-413: The 100-point check system. Accounts may be opened without identification, but can only be operated (i.e., withdrawals made) by an identified customer, and an unidentified customer is blocked from making withdrawals. Generally, identification can be transferred from one account to another, so that for instance a person once identified does not need to produce documents again when opening a second account at

2077-539: The American Civil Liberties Union believe that Internet users deserve stronger pseudonymity so that they can protect themselves against identity theft, illegal government surveillance, stalking, and other unwelcome consequences of Internet use (including unintentional disclosures of their personal information and doxing , as discussed in the next section). Their views are supported by laws in some nations (such as Canada) that guarantee citizens

Australian Transaction Reports and Analysis Centre - Misplaced Pages Continue

2144-526: The Border Force at airports and sea ports . The Border Force attempts to detect evasion of this requirement. Airlines are not liable for what their passengers carry. Cross-border movement of bearer negotiable instruments of any amount must also be reported if requested by a Border Force or police officer. Digital currency exchanges are required to monitor transactions and report any suspicious activity or transactions over $ 10,000. It's an offence under

2211-649: The Criminal Code Act 1995 (Cth), it is illegal to finance terrorism. The list of designated terror organisation is maintained by the Attorney-General's Department . In 2014 AUSTRAC released a report, Terrorism financing in Australia 2014 , which says, "Terrorism financing poses a serious threat to Australians and Australian interests at home and abroad." AUSTRAC is a member of the Egmont Group of Financial Intelligence Units and an observer in

2278-568: The Financial Action Task Force on Money Laundering (FATF), which Australia joined in 1990. AUSTRAC's existence was continued under the Anti-Money Laundering and Counter-Terrorism Financing Act 2006 (Cth) (AML/CTF Act). The AML/CTF Act came into effect on 12 December 2006, and extended the existing monitoring regime to cover terrorism financing and designated terrorist organisations . Under Division 103 of

2345-559: The Guinness Brewery . Satoshi Nakamoto is a pseudonym of a still unknown author or authors' group behind a white paper about bitcoin . In Ancien Régime France, a nom de guerre ( French pronunciation: [nɔ̃ də ɡɛʁ] , "war name") would be adopted by each new recruit (or assigned to them by the captain of their company) as they enlisted in the French army. These pseudonyms had an official character and were

2412-456: The SAS and similar units of resistance fighters , terrorists, and guerrillas . This practice hides their identities and may protect their families from reprisals; it may also be a form of dissociation from domestic life. Some well-known men who adopted noms de guerre include Carlos, for Ilich Ramírez Sánchez ; Willy Brandt , Chancellor of West Germany ; and Subcomandante Marcos , spokesman of

2479-905: The Zapatista Army of National Liberation (EZLN). During Lehi 's underground fight against the British in Mandatory Palestine , the organization's commander Yitzchak Shamir (later Prime Minister of Israel) adopted the nom de guerre "Michael", in honour of Ireland's Michael Collins . Pseudonym was also stylized as suedonim in a common misspelling of the original word so as to preserve the price of telegrams in World War I and II. Revolutionaries and resistance leaders, such as Lenin , Stalin , Trotsky , Golda Meir , Philippe Leclerc de Hauteclocque , and Josip Broz Tito , often adopted their noms de guerre as their proper names after

2546-419: The online disinhibition effect ) as opposed to being completely anonymous. In contrast, research by the blog comment hosting service Disqus found pseudonymous users contributed the "highest quantity and quality of comments", where "quality" is based on an aggregate of likes, replies, flags, spam reports, and comment deletions, and found that users trusted pseudonyms and real names equally. Researchers at

2613-412: The $ 10,000 threshold, apparently to avoid that reporting. His sentence for those transactions was 4 months jail. In March 2017, AUSTRAC fined Tabcorp Holdings Limited $ 45 million for breaches of anti-money laundering and counter-terrorism financing laws. Tabcorp were found to have failed to make reports of suspicious behaviour on 108 occasions over more than five years. In the agreed facts put forward to

2680-661: The AUSTRAC rules took place ahead of the Dutch takeover of TNT (see TNT N.V. ) in 1999. Simon Hannes was an executive at Macquarie Bank , which was advising TNT, and he bought about $ 90,000 of TNT call options under the name "Mark Booth" to profit when the bid was announced. He was convicted of insider trading but also of two offences under the Financial Transactions Reports Act since he had made multiple cash withdrawals and deposits each just under

2747-547: The Act for anyone to split a transaction into two or more parts if the dominant purpose is to avoid reporting rules and thresholds. Certain classes of transactions are exempt, or may be exempted on application. For example, established customers transacting amounts typical of their lawful business, such as for payroll , or retail or vending machine takings, etc. Motor vehicle traders are specifically not eligible for exemption, as are boats, farm machinery and aircraft traders. Under

Australian Transaction Reports and Analysis Centre - Misplaced Pages Continue

2814-910: The Camden Assets Recovery Interagency Network (CARIN) and is a member of FATF and the Global Forum on Transparency and Exchange of Information for Tax Purposes . It is also a member of the Asset Recovery Interagency Network Asia Pacific . Certain classes of financial services are required to be reported to AUSTRAC, in particular bank cash transactions (i.e., notes and coins ) of A $ 10,000 or more, as well as suspicious transactions and all international transfers. The reporting requirements extend to digital currency transactions. Reports to AUSTRAC must be made within 10 business days. The information that AUSTRAC collects

2881-615: The Federal Court by AUSTRAC and Tabcorp, Tabcorp directors were not made aware of any significant deficiencies in the company's AML/CTF program, until such matters were raised directly with Tabcorp by AUSTRAC, in 2014. On 3 August 2017, AUSTRAC took action against the Commonwealth Bank alleging that it did not report cash transactions over $ 10,000 within the required 10 business day period, or at all. The alleged breaches involved over 53,700 transactions over $ 10,000 through

2948-554: The French-language phrase nom de plume (which in French literally means "pen name"). The concept of pseudonymity has a long history. In ancient literature it was common to write in the name of a famous person, not for concealment or with any intention of deceit; in the New Testament, the second letter of Peter is probably such. A more modern example is all of The Federalist Papers , which were signed by Publius,

3015-462: The Internet, nobody knows that yesterday you were a dog, and therefore should be in the doghouse today." Users of Internet communities who have been banned only to return with new identities are called sock puppets . Whitewashing is one specific form of a Sybil attack on distributed systems. The social cost of cheaply discarded pseudonyms is that experienced users lose confidence in new users, and may subject new users to abuse until they establish

3082-509: The KKK, wrote Western books under a fictional Cherokee persona to imply legitimacy and conceal his history. A famous case in French literature was Romain Gary . Already a well-known writer, he started publishing books as Émile Ajar to test whether his new books would be well received on their own merits, without the aid of his established reputation. They were: Émile Ajar, like Romain Gary before him,

3149-982: The Office of Terrorism and Financial Analysis, including: International financial activity comes primarily from the Department of the Treasury and the Central Intelligence Agency . See CIA access to the Society for Worldwide Interbank Financial Telecommunication (SWIFT). Following the September 11, 2001 attacks an allegation was made in The Wall Street Journal that tanzanite stones were being used as an untraceable currency and source of income for terrorists. This has not since been firmly established. See possible examples . The custom common in Africa, uncut diamonds tend to be

3216-817: The University of Cambridge showed that pseudonymous comments tended to be more substantive and engaged with other users in explanations, justifications, and chains of argument, and less likely to use insults, than either fully anonymous or real name comments. Proposals have been made to raise the costs of obtaining new identities, such as by charging a small fee or requiring e-mail confirmation. Academic research has proposed cryptographic methods to pseudonymize social media identities or government-issued identities, to accrue and use anonymous reputation in online forums, or to obtain one-per-person and hence less readily-discardable pseudonyms periodically at physical-world pseudonym parties . Others point out that Misplaced Pages's success

3283-623: The author's true identity being discovered, as with Elena Ferrante and Torsten Krol . Joanne Rowling published the Harry Potter series as J. K. Rowling. Rowling also published the Cormoran Strike series of detective novels including The Cuckoo's Calling under the pseudonym Robert Galbraith. Winston Churchill wrote as Winston S. Churchill (from his full surname Spencer Churchill which he did not otherwise use) in an attempt to avoid confusion with an American novelist of

3350-631: The books related to people of their neighbourhood. Anne Brontë 's The Tenant of Wildfell Hall (1848) was published under the name Acton Bell, while Charlotte Brontë used the name Currer Bell for Jane Eyre (1847) and Shirley (1849), and Emily Brontë adopted Ellis Bell as cover for Wuthering Heights (1847). Other examples from the nineteenth-century are novelist Mary Ann Evans ( George Eliot ) and French writer Amandine Aurore Lucile Dupin ( George Sand ). Pseudonyms may also be used due to cultural or organization or political prejudices. Similarly, some 20th- and 21st-century male romance novelists –

3417-543: The co-authors of a work, such as Carolyn Keene , Erin Hunter , Ellery Queen , Nicolas Bourbaki , or James S. A. Corey . The term pseudonym is derived from the Greek word " ψευδώνυμον " ( pseudṓnymon ), literally "false name", from ψεῦδος ( pseûdos ) 'lie, falsehood' and ὄνομα ( ónoma ) "name". The term alias is a Latin adverb meaning "at another time, elsewhere". Sometimes people change their names in such

SECTION 50

#1732765516129

3484-469: The current state of Web security engineering, their true names may be revealed at any time. Pseudonymity is an important component of the reputation systems found in online auction services (such as eBay ), discussion sites (such as Slashdot ), and collaborative knowledge development sites (such as Misplaced Pages ). A pseudonymous user who has acquired a favorable reputation gains the trust of other users. When users believe that they will be rewarded by acquiring

3551-455: The de facto standard currency of the illicit small arms trade. Diamonds may be easily counted with a uniform valuation per carat to people in places of the world where there are no automated teller machines. An entire briefcase filled with uncut diamonds without the serial numbers found on refined precious metals can be used to make large illicit value transfers. The practice coexists with human trafficking, narcotics, weapons dealing, terrorism, and

3618-542: The evasion of economic sanctions and embargoes. However, the Internal Revenue Service has since instituted new anti-money laundering regulations to control the gem trade. Another intriguing possibility is that a terrorist might buy stocks which are likely to appreciate in the event of a terrorist attack, such as defense industry stocks, or sell short stocks which are likely to depreciate, such as airlines. This possibility led to many investigations of

3685-420: The fact that many professional games are played on LAN . Pseudonymity has become an important phenomenon on the Internet and other computer networks. In computer networks, pseudonyms possess varying degrees of anonymity, ranging from highly linkable public pseudonyms (the link between the pseudonym and a human being is publicly known or easy to discover), potentially linkable non-public pseudonyms (the link

3752-528: The failure to properly vet thousands of transactions that could be linked to child exploitation and live child sex shows in the Philippines and other parts of south-east Asia. A Crown Resorts executive authorised the transfer of $ 500,000 to a drug trafficker and nightclub operator in January 2017, which was not reported to AUSTRAC for a year. Financial intelligence FININT involves scrutinizing

3819-443: The financial markets subsequent to the September 11, 2001 attacks . Pseudonym A pseudonym ( / ˈ sj uː d ə n ɪ m / ; from Ancient Greek ψευδώνυμος ( pseudṓnumos )  ' lit. falsely named') or alias ( / ˈ eɪ l i . ə s / ) is a fictitious name that a person assumes for a particular purpose, which differs from their original or true meaning ( orthonym ). This also differs from

3886-728: The form of anagrams , Graecisms, and Latinisations . Pseudonyms should not be confused with new names that replace old ones and become the individual's full-time name. Pseudonyms are "part-time" names, used only in certain contexts: to provide a more clear-cut separation between one's private and professional lives, to showcase or enhance a particular persona, or to hide an individual's real identity, as with writers' pen names, graffiti artists' tags, resistance fighters' or terrorists' noms de guerre , computer hackers ' handles , and other online identities for services such as social media , online gaming , and internet forums . Actors, musicians, and other performers sometimes use stage names for

3953-478: The form of a teknonym , either literal or figurative. Such war names have also been used in Africa. Part of the molding of child soldiers has included giving them such names. They were also used by fighters in the People's Liberation Army of Namibia , with some fighters retaining these names as their permanent names. Individuals using a computer online may adopt or be required to use a form of pseudonym known as

4020-404: The papers. There are also examples of modern politicians and high-ranking bureaucrats writing under pseudonyms. Some female authors have used male pen names, in particular in the 19th century, when writing was a highly male-dominated profession. The Brontë sisters used pen names for their early work, so as not to reveal their gender (see below) and so that local residents would not suspect that

4087-432: The predecessor of identification numbers : soldiers were identified by their first names, their family names, and their noms de guerre (e. g. Jean Amarault dit Lafidélité ). These pseudonyms were usually related to the soldier's place of origin (e. g. Jean Deslandes dit Champigny , for a soldier coming from a town named Champigny ), or to a particular physical or personal trait (e. g. Antoine Bonnet dit Prettaboire , for

SECTION 60

#1732765516129

4154-614: The romance writer Nora Roberts writes mystery novels under the name J. D. Robb . In some cases, an author may become better known by his pen name than their real name. Some famous examples of that include Samuel Clemens, writing as Mark Twain , Theodor Geisel, better known as Dr. Seuss , and Eric Arthur Blair ( George Orwell ). The British mathematician Charles Dodgson wrote fantasy novels as Lewis Carroll and mathematical treatises under his own name. Some authors, such as Harold Robbins , use several literary pseudonyms. Some pen names have been used for long periods, even decades, without

4221-482: The same institution. For banks and similar reporting entities, identification requirements are determined by a risk-based approach, which may differ for each reporting entity. It's an offence to open or operate an account with a reporting entity under an alias or false name, punishable by a fine or up to 2 years imprisonment. The information that AUSTRAC collects is also available to a large number of government agencies, including: One prominent attempted evasion of

4288-478: The same name . The attempt was not wholly successful – the two are still sometimes confused by booksellers. A pen name may be used specifically to hide the identity of the author, as with exposé books about espionage or crime, or explicit erotic fiction. Erwin von Busse used a pseudonym when he published short stories about sexually charged encounters between men in Germany in 1920. Some prolific authors adopt

4355-588: The struggle. George Grivas , the Greek-Cypriot EOKA militant, adopted the nom de guerre Digenis (Διγενής). In the French Foreign Legion , recruits can adopt a pseudonym to break with their past lives. Mercenaries have long used "noms de guerre", sometimes even multiple identities, depending on the country, conflict, and circumstance. Some of the most familiar noms de guerre today are the kunya used by Islamic mujahideen . These take

4422-459: The words of The Washington Post , "getting to the truth requires a walk down a bizarre labyrinth" and multiple government agencies may become involved to uncover the truth. Giving a false name to a law enforcement officer is a crime in many jurisdictions; see identity fraud . A pen name is a pseudonym (sometimes a particular form of the real name) adopted by an author (or on the author's behalf by their publishers). English usage also includes

4489-436: Was awarded the prestigious Prix Goncourt by a jury unaware that they were the same person. Similarly, TV actor Ronnie Barker submitted comedy material under the name Gerald Wiley. A collective pseudonym may represent an entire publishing house, or any contributor to a long-running series, especially with juvenile literature. Examples include Watty Piper , Victor Appleton , Erin Hunter , and Kamiru M. Xhan. Another use of

#128871