17.01.2010

ALTERNATIVE TO THE BANKING: CHOP, HUNDI, HAWALA


There is an argument for saying that parallel banking is defined not by activity but by whether the activities are conducted by a regulated business. Banks have three essential functions - warehousing savings, lending money and settling obligations between customers. Advisory services are, in essence, developments or broking of one of these three. Parallel bankers strip out the basics and perform only one or more of those three functions.

It follows, then, that when we use the term parallel banking, we are not talking about any business activity different from that which is done by your retail banker whose business is to take your money and keep it until you want it back (warehousing), to pool it with the money he receives from all his other customers and then to lend it to customers that will pay a fee for the use of it (lending) and to assess the risk attached to that lending decision (broking).

However, your retail banker is subject to a considerable body of rules and regulations that govern his relationship with you, his relationship with his customers, his relationship with the state that grants him a licence to operate as a bank, and supervises the conduct of his business. Where that system of regulation and supervision breaks down - or is ill formed in the first place - fraud is simple and bank collapses are frequent.

The parallel banking industry works outside that system of regulation and supervision. In countries where a licence is required for a particular activity, and the conduct of the activity without a licence is a crime, parallel bankers are by definition criminals. But that does not make them fraudsters. There are many, many money transmitters who operate out of sight of the law, even where required to licence. They operate, often, within a close knit community, often using lines of communication built up all over the world over a period of decades - or in some cases millennia.

Some of the money transfer mechanisms (the chop, hawala, etc.) which form the basis of parallel banking were developed to enable the movement of value without the movement of money. This was so that banditry could be avoided.

Now, with the use of technology, the principles of moving value without money are available to all.

AML-CTF: CASE STUDIES


1. Cross-Border Activities:

A European FIU received some thirty disclosures from several exchange offices regarding Asian nationals residing in that country and remittances being made to their home country. The money was always deposited in cash and therefore the origin of the funds was unknown.

Analysis revealed the following elements:

􀂃 The regularity and scope of the transactions could not be justified by the economic profile of the individuals involved, that is, they did not perform any known professional activity, were not officials of a company, nor were they registered for Value Added Tax.

􀂃 Furthermore, the majority of these individuals were registered as candidate refugees.

􀂃 Several names and addresses of principals were linked to an organisation responsible for various terrorist attacks in Asia.

􀂃 Several individuals involved were known in a case related to human trafficking.

All these elements indicated that the transactions performed could be related to terrorism financing.

Given that the individuals involved did not perform any professional activities, the money was believed to have originated, in whole or in part, from illegal activities, i.e. trafficking in human beings.

Indicators:
• Transactions not in keeping with expectations
 
2. Fraud Related Activities:
 
Mr. L, a foreigner residing in Eastern Europe, opened a current and a securities account with a bank in Country A. Immediately after it was opened the current account was credited with amounts between 20 and 70 EUR. These were payments for articles sold on an auction site. The payments were mostly by order of persons from Western Europe. The communications referred to the sale of luxury brands. The money was subsequently transferred to Mr. L’s account in his country of residence. Over the course of a few months, the total sum amounted to several thousand Euros. There was no economic justification for opening bank accounts in Country A nor for the transactions being performed there as the individuals did not have any ties with the Country.

Searches on the auction site revealed that Mr. L used a different name and that the buyers had posted negative comments about him, mentioning that the goods offered by him were counterfeit.

The amounts deposited on Mr. L’s account to pay for the articles on the auction site were particularly low for luxury items and this was mentioned in the communications accompanying the payments.

All these elements indicated that the person was involved in counterfeit trade through an auction site and the proceeds were laundered through more than one account.

Indicators:
• Use of foreign bank accounts
 
3. Misuse of Business Facilities:
 
Company A, managed by Mr. O, sold a property to company B, managed by Mr. R, for a significant amount for which the deposit was paid in cash. A large part of the final price was also paid in cash. When the notary who had executed the transaction noticed these transactions he sent a disclosure to the European Financial Intelligence Unit.

The Unit’s analysis revealed the following elements:

􀂃 The notary deed showed that money for the cheque to the notary was put in the account of company A by way of a cash deposit two days before the cheque was issued.

􀂃 Information from the bank showed that company A and Mr. O’s personal account were credited by substantial cash deposits. This money was used for, among other things, reimbursing a mortgage loan, and was withdrawn in cash.

􀂃 Police sources revealed that Mr. O and Mr. R were the subject of a judicial inquiry into money laundering with regard to trafficking of narcotics. They were suspected of having invested their money into purchasing several properties in Europe through their companies.

Indicators:
• Purchase of valuable assets
 
4. Misuse of Charities:
 
A European national asked his bank for a direct debit instruction from his account to a NPO in Country A. The reference that accompanied this direct debit instruction referred to the sponsoring of an individual.

Further investigation revealed that the NPO was known to be closely linked to certain groups who financed acts of terrorism. Furthermore, the name of the individual who was to be sponsored was mentioned on the United Nations list of persons and organisations suspected of being linked to Osama Bin Laden, the Al Qaeda network and the Taliban.

 Indicators:
• Abuse of non-profit organizations
 
5. Misuse of Charities:
 
An NPO held an account on which two individuals from the Middle East, residing in Country D, held power of attorney. The bank found it unusual that the name of the account was not stated correctly by the principals and that some deposits included references in a foreign language which referred to terrorist activities.

Further investigation identified that the NPO’s account was credited by small transfers from several individuals and referenced as donations for the poor in the Middle East. Some cash deposits were also received. Some of the funds were subsequently withdrawn in cash.

Police checks revealed that the NPO was the subject of an investigation for the financing of terrorism. The funds collected by the NPO were apparently intended for training camps in the Middle East.

The police are investigating.

Indicators:
• Abuse of non-profit organisation
 
6. Misuse of Business Facilities:

X, a non-native, repeatedly went to several agencies of two exchange offices in a European country to exchange various currencies into Euros. This amounted to almost 2 million Euros over a period of a couple of months. There was no economic justification for the way these transactions were performed and X had no relation at all with the country in which he was performing these exchanges; he resided abroad and did not have any known professional activity.

The FIU's analysis revealed that there were similarities between X and other persons whose transactions also originated from the same country as X and that they resided in the same neighbouring country. They did not have any professional activity and reputedly were still students. Some of these transactions were even performed the same day within a thirty-minute interval.

Information from the FIU in the individual’s country of residence made clear that the individuals involved were known for trafficking in narcotics, which corresponded to the typological indicators in this case file.

The police are investigating.

Indicators:
• Currency exchanges / cash conversion
 
7. Fraud Related Activities:
 
The account of Mr. X with bank A in a European country was credited with a substantial amount by means of an international transfer by order of Mr. Y with bank B abroad. The next day Mr. X withdrew all the funds in cash. Subsequently bank A were informed by bank B that the transfer was fraudulent, the bank then disclosed to the FIU.

The Unit’s analysis revealed the following elements:

􀂃 Mr. X’s account was credited by a transfer from company P, established in a neighbouring country.

􀂃 An employment contract was signed between this company and Mr. X. This stipulated that the personal bank account of the latter would be credited by an international transfer. This transfer corresponded to the transactions disclosed by bank A. In accordance with the agreement Mr. X withdrew almost all of the money in cash. The rest of the money, which apparently corresponded to his commission, remained in his account.

􀂃 The money was subsequently transferred to a beneficiary in Eastern Europe through a money remittance service and later withdrawn in cash.

Apparently company P used Mr. X as a financial intermediary, using his account in exchange for a commission of 8%.

The first stage of the deceit was "phishing" of a private individual's account, then an international transfer being made unbeknown to the patron, which led to a money remittance to Eastern Europe via the account of another private person in the European country. The money was later laundered by means of cash withdrawal.

Indicators: Phishing
• Unexplained business transactions
 
8. Fraud Related Activities:

A bank disclosed several suspicious transactions by Asian nationals residing in a Western European country who had opened several accounts in Country A. Over the period of a few months, the account of one of these Asians, Mr. X, was credited with various international transfers from Western Europe. The account was then debited by a substantial transfer to a foreign account in name of Mr. X as well as to accounts of other Asians. There was no economic justification for these transactions.

Analysis revealed the following elements:

􀂃 Mr. X was a tax consultant who was introduced to the bank by a lawyer.

􀂃 Mr. X and the lawyer later introduced other Asians to the bank.

􀂃 Mr. X was known to the police for fraud. He was suspected of having received money from Asians by offering interest of 4%-20%. The amounts assigned to him were never paid back. Part of the money was sent to Country A.

􀂃 Mr. X possibly moved part of the money from Eastern Europe to Country A to hamper further investigation into the origins of the money.

These elements indicate that the money credited to Mr. X’s account from Eastern Europe, which was partially transferred to an account abroad in his name, probably originated from the fraud that he had set up.

Indicators:
• Use of foreign bank accounts
 
9. Misuse of Charities:

Several individuals from the Middle East residing in a European Country X opened accounts with various financial institutions in the names of Company A and Company B, both companies having been established in Western Europe, and an NPO established in Country X. These foreign nationals were officers of the companies and organisation and all were active in film production and telecommunications.

Several cash deposits from foreign nationals took place on these accounts. The total of the deposited funds amounted to up to several million Euros. Part of the money was used to increase company A’s capital and part was used for international transfers to other companies which were also active in film production. Police sources revealed that company A’s managers were active in an organisation suspected of being involved in terrorism and the deposits were suspected to have originated from terrorist activities.

This case file was referred to the criminal court.

Indicators:
• Abuse of non-profit organizations
• Mingling
 
10. Misuse of Charities:

Mr X, of Middle Eastern origin, held two accounts that were solely credited by transfers from the social services and by several cash deposits.

The bank noticed several irregularities, firstly, there was no economic justification for the number of cash deposits as the individual did not have any known profession. Secondly, most of the deposits included references to the telephone industry.

Mr X also had power of attorney on the account of an NPO. This account was only used to perform cash deposits from donors. The amounts credited to the accounts of Mr X and the NPO were mainly withdrawn in cash by Mr X.

Police sources revealed that this NPO was a place of worship where Mr X performed services and they also revealed that this NPO could be linked to terrorist activities.

The police are investigating.

Indicators:
• Abuse of non-profit organisations

11. Alternative/Emerging Remittance Services:

An African national residing in a European country (Country Z) declared that he performed Hawala banking activities. His account was exclusively credited by cash deposits and numerous transfers for small amounts.

Over the course of several months the funds were transferred to company A in Africa. Shortly thereafter the funds were transferred to company B in Country Z. Companies A and B performed international money remittance services. According to the subject, he performed Hawala activities for fellow countrymen wishing to send money to Africa. However, he did not hold any position within companies in country Z where he executed the transactions and he was not registered as a representative of an authorised exchange office.

Police enquiries revealed that he was known to be a member of a terrorist organisation and it is thought that this alternative remittance system may have been used for terrorism financing.

Indicators:
• Underground banking / alternative remittance services
• Wire transfers
• Use of foreign bank accounts
 
12. Gambling:

A suspected drug trafficker was gambling large sums and using third parties to purchase gaming chips on his behalf. The casino reported this activity and multiple chip cash outs on the same day, some being transacted just below the legal reporting limit.

Further investigations found that the subject would send large cash payments to various entities in an Asian country through a remittance dealer, who was a compliant associate and therefore did not make reports on this activity to the FIU.

Indicators:
• Gambling activities
• Criminal knowledge of and response to law enforcement / regulations
• Structuring (smurfing)
 
13. Alternative/Emerging Remittance Services:

The suspects of this case purchased stolen bank account and credit card details from Russia and Eastern Europe via the internet. Payments for these purchases were made through international funds transfers (IFT's) of approximately £1,000 and by way of e-Gold payments. The principal was arrested on multiple fraud and computer crime offences in relation to using these bank details to withdraw funds without authorisation via internet transfers to 'mule' accounts.

Computers seized on arrest revealed details of IFT's transacted through money transfer businesses and e-gold. These transfer methods used by the suspect avoided reports being made to the FIU.

Indicators:
• New payment technologies
 
14. Fraud Related Activities:

Mr B sent emails to people claiming that they could obtain millions of dollars in return for sending him an up-front fee to cover expenses. This is commonly known as advanced fee fraud.

Searches conducted by the FIU identified persons of interest, including Mr B’s wife and associates.

As the investigation continued, analysts from the investigating agency conducted routine searches of the FIU database. These searches were performed to identify the victims of the scam and their location which was critical given the international nature of the offences. The financial intelligence gathered identified that the man had defrauded approximately 5 million dollars from his unsuspecting victims which was crucial in obtaining the man’s conviction.

He has been sentenced to more than 5 years jail having pleaded guilty to the internet scam.

Indicators:
• Use of the internet

15. Terrorism Financing:


A European national asked his bank for a direct debit instruction from his account to a non-profit organisation in another European country. The reference that accompanied this direct debit instruction referred to the sponsoring of an individual. Information collected by the FIU showed that this non-profit organisation was known to be closely linked to certain groups that financed terrorist acts. Furthermore, the name of the individual that was to be sponsored was also mentioned on the United Nations list of persons and organisations suspected of being linked to terrorist groups.

Indicators
• Abuse of non-profit organisations
 
16. Use of Gatekeepers:


An FIU in country Z received information from a foreign FIU regarding two trusts that were established there.

The trustee had been requested to make two payments in favour of a bank in an offshore finance centre.

Correspondence between the trustees and the settlor was always conducted through a law firm, which had also established the trust.

Investigation identified that the beneficiaries of the trusts were siblings. These subjects (Mr A and Mr B) were managers of two companies, established in country Z that had been the subject of a serious fraud investigation. Even though Messrs A and B were not managers of the companies at the time of the investigation, it became clear that part of the funds in the trusts may have originated from the criminal activity of the said companies as they were managed by their father at the time.

Indicators
• Use of gatekeepers
• Use of nominees, trusts, family members or third parties
• Use of offshore banks / businesses
 
17. Terrorism Financing:


The FIU of a European country (Country Z) were made aware of suspicious transactions on a bank account, over which Mr A held power of attorney. The account was held for a non-profit organisation established in country Z and was receiving large amounts of cash.

Mr A was vague in his explanation as to the source of funds and intimated that it was from donations.

As Mr A did not go to the branch office where the account was held, the bank refused to accept the deposits and advised Mr A to attend the branch office where the non-profit organisation’s account was held, however he failed to do so.

The FIU analysed the account and found that the debit transactions included a cheque that had been made out to a notary for the purchase of real estate.

This cheque was covered by the alleged donations and a transfer by order of Mr A. The analysis of Mr A’s personal account revealed multiple cash deposits that corresponded to donations from private individuals. The debit transactions consisted of transfers to the non-profit organisation and international transfers to Mr B.

Mr A was connected to individuals who were thought to be linked to terrorist activities, including Mr B.

It was revealed that Mr A used the non-profit organisation to raise funds and filtered these through his personal account, whilst siphoning some of them to Mr B, where they were possibly intended for terrorism financing.

Indicators
• Frequent cash deposits.
• Abuse of non-profit organisations.
• Purchase of valuable assets.
 
18.Terrorism Financing:


Mr X, a resident of a European country who originated from the Middle East held a bank account which received significant credits from abroad, which were immediately withdrawn in cash. Mr X stated that the money was from a family member abroad.

Apart from these international transfers, the account was also credited with several cash deposits by X a few months later.

Mr X was not known to have any professional activity and received state assistance.

He was known to the police for trafficking in humans and terrorism financing. These elements revealed that his account may have been used to place money from trafficking in humans intended for terrorism financing.

Indicators:
• Wire transfers
 
19.Terrorism Financing:


A political refugee resident in a European country held power of attorney over two accounts (at a bank in that country) in the names of his family members. He did not hold any accounts of his own. One of the accounts exclusively received state assistance benefit payments as the subject was unemployed and had no independent income. The other account was credited by cash deposits. All of the credits were withdrawn via cash machines, thus preventing the identification of the final beneficiary of the money.

Open source checks revealed that the subject had links to a terrorist organisation and further analysis suggested that he was a fund raiser for that organisation.

Indicators
• Use of nominees, trusts, family members or third parties
 
20.Terrorism Financing:


A subject opened two accounts in different branch offices of the same bank, in Country A where he had no official links. The first account was opened in the name of company X, established in North America, and the second one was opened in the name of company Y, established in another jurisdiction.

Both companies were active in the catering supplies sector and their accounts were mainly credited by significant cash deposits (often for round figures) and to a lesser extent by transfers from abroad by order of companies also active in the catering supplies sector.

The funds were then transferred to other European companies in the same sector.

No business rationale or economic justification could be found for performing these transactions in this manner.

Further enquiries found that the individual concerned was the subject of a terrorism investigation in another jurisdiction.

It is suspected that the catering supplies business and the co-mingling may have been a cover for his criminal activities.

Indicators
• Frequent cash deposits.
• Mingling.
• Wire transfers.
• Structuring.
 
21. Terrorism Financing:


A resident of a European country ‘A’ was repeatedly sending funds to his own account in the Middle East with an interval of a couple of days between each deposit.

The FIU in country ‘A’ learnt that the individual was the manager of a company active in the distribution of phone cards and that this company was already known to the police for fraudulent activity.

The subject also managed a phone shop that had already shown irregularities upon regulatory examination.

Enquiries made by Law Enforcement revealed that the individual was known to the police as a fundraising manager for a domestic terrorist organisation.

Analysis would indicate that the individual’s business activities could have been used as a cover for his criminal activities.

Indicators
Mingling

11.01.2010

KARA PARA AKLAMA : EKONOMİK AND POLİTİK FAKTÖRLER

EKONOMİK VE POLİTİK FAKTÖRLER:

RİSK(ler)-suç geliri aklama riski ve terörün finansmanı riski- yanlızca minimize edilebilir; tamamen ortadan kaldırılamaz !

Suç gelirlerinin aklanmasının ve terörün finansmanının arkasında değişik faktörler yer almaktadır. Suç Geliri aklamanın arkasında ekonomik faktör(ler), Terörün Finansmanının arkasında ise politik faktör(ler) yer almaktadır.

Risk belirsizliği ifade ettiğinden beklenmeyen kayıp ile ilişkilendirilmesi gereken bir kavramdır. Beklenen bir kayıp, risk değildir; risk beklenmeyen veya belirsiz olandır. SGA/TF riski, kişilerin (kurum ve kuruluşların) sakınmak istediği zararın elemanı olup belirsizliği, şüpheyi, kayıp olasılığını ve zarar ihtimalini ifade eder.

Modus Operandi of Economic and Political Crime:

Modus (or Modi operandi) means an orderly method of recording and coding information designed to reveal habits, characteristics, or practices of criminal suspects profile. Suspect's modus/ modi operandi- the method(s) of operating or functioning- helps in identification, arresting or constrainting criminals.

8.01.2010

KKTC'DE ŞANS VE TALİH OYUNLARI (KUMAR OYUNLARI)


Şans Oyunu Salonlarında (Kumarhanelerde) oynatılabilen "şans oyunları" şunlardır:
  • 1. Kategori Şans Oyunları:
Amerikan Ruleti
Fransız Ruleti
Las Vegas Craps (zar oyunu)
Black Jack
Poker
Chemin-de-fer
Punto Banco
Bakara
Bowle
Keno (bir çeşit tombala)
Bingo (tombala)
  • 2. Kategori Şans Oyunları:
Chug-a-Lug
Wheel of Fortune
Hazard
Kallooka
Rummy
Tavla
Elektronik ve diğer oyun makineleri
Bahis oyunları (Bet)


Suç Gelirlerinin Aklanmasının Önlenmesi Bakımından Denetim (4/2008):

"Şans Oyunu Salonu bilgisayarında Yasalar gereği tutulması gereken müşteri bilgileri ve mali hususlara ilişkin tüm bilgiler detaylı olarak tutulur ve sürekli olarak güncellenir ve bu bilgiler ile bunlarla ilgili her türlü ortamdaki kayıtlar ve bunlara ulaşmak için gerekli tüm bilgi ve şifreler, Suç Gelirlerinin Aklanmasının Önlenmesi Yasası uyarınca denetime gelen yetkililere derhal verilir. Bu kapsamdaki bilgilerin muhafazası en az 12 (oniki) yıl olmalıdır".




KKTC Şans Oyunları Yasası

1.09.2009

Risk-Based Approach in Anti-Money Laundering

Risk-based approach in anti-money laundering (AML) and combating the financing of terrorism (CFT) involves an understanding of geography and country risk, business and entity risk, and product (and linked distribution channel) and transaction risk.

Effective and efficent risk-based approach in anti-money laundering (AML) and combating the financing of terrorism (CFT) implies the adoption of a risk management process for dealing with money laundering and terrorist financing. This process encompasses recognising the existence of the risk(s), undertaking an assessment of the risk(s) and developing strategies to manage and mitigate the identified risks.



Risk Based Approach: Top Down Approach

  1. Geography and Country Risk
  2. Business and Entity Risk
  3. Product and Transaction Risk
Financial institutions need to take a systematic approach to risk that covers all three bases rather than just one or the other. These risk models are then applied to due diligence activities at account opening and the ongoing monitoring process including enhanced due diligence (EDD).

1. Geography and Country Risk

Firms that have a significant proportion of their customer base located in countries without adequate AML strategies where;
  1. Cash is the normal medium of exchange;
  2. There is a politically unstable regime with high levels of public or private sector corruption; that are known to be drug producing or drug transit countries; or have been classified as countries with inadequacies in their AML strategies will need to consider what additional "know your customer" (KYC) and monitoring procedures might be necessary to manage the enhanced risks of moneylaundering.
  3. In particular, additional monitoring of inward payments from countries without equivalent AML strategies should be considered.
2. Business and Entity Risk

The characteristics that make businesses high risk vary. Casinos, gaming, brokers-dealers for example, are popular money laundering targets because a mature AML culture is yet to develop in these businesses. Such businesses with a high volume of cash activity need to be watched carefully.

Offshore banks provide financial services that are conducted behind the shield of strict banking and corporate secrecy laws.

Professionals facilitate the creation of laundering vehicles and schemes including real estate linked.

Car, boat and airplane dealers, as well as jewel, gem and precious metal dealers, provide launderers access to 'big ticket items', which often can be purchased with little or no customer identification and later sold to provide a 'legitimate' source of cash proceeds.

Import and export companies provide cover for international money laundering operations through false trade pricing schemes.

Cash intensive businesses allow launderers to disguise cash derived from illegal activities in deposits containing cash derived from regular, legitimate business activity.

The above list is by no means comprehensive. Other sources of negative information include media searches and/or KYC databases such as IntegraScreen Online, World-Check etc.

3. Product and Transaction Risk

Products or services with the highest risk are those where unlimited third party funds can be
freely received, or where funds can regularly be paid to third parties, without evidence of identity of the third parties being taken.

The product or services could support high-speed movement of funds or along with a high volume of transactions, or both, and could conceal the source of those funds. It may facilitate a higher degree of anonymity, or involve the handling of high volumes of currency or currency equivalents. It could allow a customer to readily convert cash to a monetary instrument.

Some of the highest-risk products are those offering money transfer facilities though chequebooks, monetary instruments, drafts, telegraphic transfers, SWIFT, CHAPS, automated clearing house (ACH), deposits from third parties or other means, electronic cash (e.g., stored value and payroll cards), payable upon proper identification (PUPID) transactions, third-party payment processors, automated teller machines (ATMs), and electronic banking.

Corporate and private current accounts fall within this category because unlimited third party funds are continually received for credit to the account and it would be impractical to identity all providers of such funds. Private banking – both domestic and international - can be particularly vulnerable just as trust and asset management services, is.

Similarly, other products and services that constitute high-risk include:

  1. Foreign correspondent accounts – pouch activity, payable through accounts, and money drafts.
  2. International trade finance (letters of credit).
  3. Special use or concentration accounts.
  4. Lending activities, particularly loans to small and medium enterprises secured by
    cash collateral, marketable securities; and credit card lending.
  5. Nondeposit account services (e.g., nondeposit investment products, insurance and safe deposit boxes).
  6. Risks increase if the money launderer can hide behind corporate structures such as private limited companies, offshore trusts, special purpose vehicles and nominee arrangements that increase anonymity. Company formation agents offer nominee director, shareholder and authorized signatory services.
  7. Offshore shell company ownership by another offshore bearer share company is a favourite.
  8. Another favourite is where assets are conveyed to an offshore company 100% of whose shares are held by an offshore Asset Protection Trust which has as its sole beneficiary a second trust – this is called a Layered Trust structure. Hence, understanding the ownership and control structure for companies and trusts is critical.
  9. When devising their internal procedures, firms should consider how their customer base and operational systems impact upon their staff's capacity to identify suspicious transactions.
Some of the lowest risk products are those where funds can only be received from a named investor by way of payment from an account held in the investor's name and where the funds can only be returned to the named investor. No third party funding or payments are possible and, therefore, the beneficial owner of the funds deposited or invested is always the same.

The FATF 2002 consultation report on the 40 principles, the Wolfsberg group of banks pointed out that certain transactions or activities have a minimal risk of money laundering or terrorist financing. They give some examples as follow:
  1. Transactions where a financial is acting as a principal rather than on behalf of third parties
    (such as foreign exchange, derivatives, capital market transactions and some extensions of credit);
  2. Accounts established for a specific purpose with funds received or disbursed under
    limited defined circumstances to identified third-parties, such as escrow, corporate trusts, paying agency and custody accounts;
  3. Accounts for the investment of funds that are subject to a regulatory scheme, such as investment of funds of regulated pension or retirement plans; and
  4. Accounts held by other financial institutions that are themselves subject to a robust AML
    regime.
  5. Customer categories where the risk of money laundering or terrorist financing is lower.
  6. Generally large public listed companies subject to regulatory disclosure requirements are regarded as lower risk than unlisted companies.
  7. Government administrations or enterprises are also potentially lower risk.
  8. Pooled accounts held by designated non-financial businesses or professions regulated to FATF standards may also be lower risk.
Bank staff should be well versed with the products and services that have been categorised as high-risk by the industry bodies or by the regulators.

Bank staff should question themselves whether the nature of the client's account or business justifies the products or services the client is asking for. It is important to consider all dimensions of money laundering risk when assessing an account opening or a transaction.

Case Study:

Mr B is the Managing Director of an offshore company incorporated in country A in June 2000. He seeks to open an account for moving his business from another bank that he claims is providing bad service. Mr B wants to set up a trade financing line to import microprocessors from the US for his computer business. He provides details of the Letter of Credit to be set-up that he says would be fully secured with cash assets.

1. Geography and Country:

  • Country A is in the Caribbean, which is a hot-bed for laundering drug money coming out of the US both directly and indirectly.
  • You are aware that the country A was removed from the FATF black list in June 2001 but your AML officer advises that regimes that are removed from the FATF black list may also be vulnerable for historical reasons.
  • Furthermore, Country A was involved in recent high-profile corporate scams, increasing the discomfort.
2. Business and Entity:
  • You are aware that import-export businesses are a key high-risk business for money laundering.
  • You further do a search on your PEP commercial database that shows a match. Mr B is a distant relative of a key politician in a country known for corruption. Mr B concealed this fact.
  • Mr B is unable to provide an introduction to facilitate account opening and can only provide identification documentation. Given the risks, you feel uncomfortable with this fact.
3. Product and Transaction:
  • You know that over-valued imports are a mechanism for laundering money. From your Internet Research you note that the price is higher by 30 percent from various online quotes for the same quantity and brand.
  • His offer of full security also raises discomfort for in your experience, customers do not do so easily.
  • Also, why is he not using a local supplier for microprocessors? All the other computer assemblers who have accounts with your bank, source such parts locally as all the major manufacturers have local suppliers in the country.

RED FLAG LISTS: EXPORT TRANSACTIONS

Red Flag Indicators in Export Transactions  "When Exporting, You Must "Know Your Customer"

Use this as a check list to discover possible violations of the Export Administration Regulations. You may also wish to visit WEB page that provides "Know Your Customer Guidance".

13 Red Flag Indicators for Export Transactions as follows:
  1. The customer or its address is similar to one of the parties found on the Commerce Department’s [BIS's] list of denied persons.
  2. The customer or purchasing agent is reluctant to offer information about the end-use of the item.
  3. The product's capabilities do not fit the buyer's line of business, such as an order for sophisticated computers for a small bakery.
  4. The item ordered is incompatible with the technical level of the country to which it is being shipped, such as semiconductor manufacturing equipment being shipped to a country that has no electronics industry.
  5. The customer is willing to pay cash for a very expensive item when the terms of sale would normally call for financing.
  6. The customer has little or no business background.
  7. The customer is unfamiliar with the product's performance characteristics but still wants the product.
  8. Routine installation, training, or maintenance services are declined by the customer.
  9. Delivery dates are vague, or deliveries are planned for out of the way destinations.
  10. A freight forwarding firm is listed as the product's final destination.
  11. The shipping route is abnormal for the product and destination.
  12. Packaging is inconsistent with the stated method of shipment or destination.
  13. When questioned, the buyer is evasive and especially unclear about whether the purchased product is for domestic use, for export, or for reexport.
Know Your Customer:

In assessing diversion risks, identifying potential export violations, verifying end-uses, and determining the suitability of end-users to receive commodities or technology; Laws and regulations require that exporting firms come to "know their customers" by exerting all reasonable efforts to ascertain the end-use, the end-user, the ultimate destination, and other facts relating to a transaction or activity.
Before engaging in a transaction or activity, an exporter must determine whether "red flag indicators" are present.

These "red flag indicators" are specifically intended to assist exporters in exploring whether abnormal circumstances exist such that the transaction or activity may be destined for an inappropriate end-use, end-user, or destination.

The "red flag indicators" were developed to illustrate the types of circumstances that should cause reasonable suspicion that a transaction or activity may violate laws and regulations.

10 Percent Inspiration and 90 Percent Perspiration: Compliance Processes and Training

Banks are victim of internal and external fraud

Fraud risk cannot be eliminated but it damages can be minimized...!

Knowing employees is as important as knowing customers.

To Minimize internal Fraud Risk;

  1. Issue a statement of company integrity. This should provide a clear message from the boardroom about the organisation's legal and ethical values.
  2. Develop an anti-fraud policy and culture which ensures that commercially prudent measures are taken. This should be determined by management, and be commensurate with operational activity.
  3. Know your staff. Many frauds are committed in collusion with staff.
  4. Check CVs and take up references. The more sensitive the holder's position, the more detailed your enquiry should be.
  5. When staff move within an organisation, remember to change their computer and building access level.
  6. Encourage a whistle-blowing philosophy within your company. Very often other employees know or suspect something but do nothing about it.
  7. Have broadly-based and effective contingency and recovery plans. Have powers vested in managers to cancel or freeze transactions as soon as fraud is discovered. Undue delay often means that funds have been transferred beyond reach.
  8. Take a hard line on culprits. Give a clear message that they will be caught, prosecuted and, where necessary, pursued through the civil courts to recover losses.
For Insiders;

The major cases involving identity theft, impersonation and the take-over of customer accounts have shown that many cases depend on the complicity of collusive employees.

Known as 'insiders', these employees are unlikely to be working independently and more often than not are part of a larger, organised group obtaining personal details from various sources.

If compromised within one business, they will often be re-positioned into similar employment with access to the same material and the same potential to inflict financial loss.

They are especially valuable to the criminal fraternity while working at bank counters, as they can serve the "foot soldiers"sent out to present stolen or counterfeit cheques or withdraw cash in fraudulent card transactions.

This instantly negates the need for detailed, credible identity documentation to be produced and other preventative systems can be over-ridden.

Knowing employees is as important as knowing customers.

As well as placing people within your organisation, be aware that criminals do also try to recruit existing employees.  They typically target specific workers and make their initial approaches in a social setting, such as in a pub. Often, employees inadvertantly give away a few pieces of seemingly harmless information in conversation and due to their worry that they have committed a crime can be coupled with threats of violence if your employees do not agree to provide the information which the criminals need.

Assess risk means: "Thinking Like A Fraudster" !

What information has value?
–Customer data
–Vendor data
–Employee data
–Data protected by patent/copy write
–Attorney/client data
–Competitive data

Preventive:
What you do to ensure that the right things happen; wrong things do no happen

Detective:
What you do to find the things that preventive control did not prevent
The following websites useful:

The British Bankers Association Website
The National Hi-Tech Crime Unit Website
the Bank Safe Online Website

12.06.2009

Money Laundering and Terrorist Financing Red Flags

The following are examples of potentially suspicious activities, or "red flags" for both money laundering and terrorist financing. Although these lists are not all-inclusive, they may help banks and examiners recognize possible money laundering and terrorist financing schemes.

Management’s primary focus should be on reporting suspicious activities, rather than on determining whether the transactions are in fact linked to money laundering, terrorist financing, or a particular crime.

The following examples are red flags that, when encountered, may warrant additional scrutiny. The mere presence of a red flag is not by itself evidence of criminal activity. Closer scrutiny should help to determine whether the activity is suspicious or one for which there does not appear to be a reasonable business or legal purpose.

Potentially Suspicious Activity that May Indicate Money Laundering
  1. A customer uses unusual or suspicious identification documents that cannot be readily verified.
  2. A customer provides an individual tax identification number after having previously used a Social Security number.
  3. A customer uses different tax identification numbers with variations of his or her name.
  4. A business is reluctant, when establishing a new account, to provide complete information about the nature and purpose of its business, anticipated account activity, prior banking relationships, the names of its officers and directors, or information on its business location.
  5. A customer’s home or business telephone is disconnected.
  6. The customer’s background differs from that which would be expected on the basis of his or her business activities.
  7. A customer makes frequent or large transactions and has no record of past or present employment experience.
  8. A customer is a trust, shell company, or Private Investment Company that is reluctant to provide information on controlling parties and underlying beneficiaries. Beneficial owners may hire nominee incorporation services to establish shell companies and open bank accounts for those shell companies while shielding the owner’s identity.
Efforts to Avoid Reporting or Recordkeeping Requirement
  1. A customer or group tries to persuade a bank employee not to file required reports or maintain required records.
  2. A customer is reluctant to provide information needed to file a mandatory report, to have the report filed, or to proceed with a transaction after being informed that the report must be filed.
  3. A customer is reluctant to furnish identification when purchasing negotiable instruments in recordable amounts.
  4. A business or customer asks to be exempted from reporting or recordkeeping requirements.
  5. A person customarily uses the automated teller machine to make several bank deposits below a specified threshold.
  6. A customer deposits funds into several accounts, usually in amounts of less than $3,000, which are subsequently consolidated into a master account and transferred outside of the country, particularly to or through a location of specific concern (e.g., countries designated by national authorities and Financial Action Task Force on Money Laundering (FATF) as non-cooperative countries and territories).
  7. A customer accesses a safe deposit box after completing a transaction involving a large withdrawal of currency, or accesses a safe deposit box before making currency deposits structured at or just under $10,000, to evade Currency Transaction Report (CTR) filing requirements.
Funds Transfers
  1. Many funds transfers are sent in large, round dollar, hundred dollar, or thousand dollar amounts.
  2. Funds transfer activity occurs to or from a financial secrecy haven, or to or from a high-risk geographic location without an apparent business reason or when the activity is inconsistent with the customer’s business or history.
  3. Many small, incoming transfers of funds are received, or deposits are made using checks and money orders. Almost immediately, all or most of the transfers or deposits are wired to another city or country in a manner inconsistent with the customer’s business or history.
  4. Large, incoming funds transfers are received on behalf of a foreign client, with little or no explicit reason.
  5. Funds transfer activity is unexplained, repetitive, or shows unusual patterns.
  6. Payments or receipts with no apparent links to legitimate contracts, goods, or services are received.
  7. Funds transfers are sent or received from the same person to or from different accounts.
  8. Funds transfers contain limited content and lack related party information.
Automated Clearing House Transactions
  1. Large-value, automated clearing house (ACH) transactions are frequently initiated through third-party service providers (TPSP) by originators that are not bank customers and for which the bank has no or insufficient due diligence.
  2. TPSPs have a history of violating ACH network rules or generating illegal transactions, or processing manipulated or fraudulent transactions on behalf of their customers.
  3. Multiple layers of TPSPs that appear to be unnecessarily involved in transactions.
  4. Unusually high level of transactions initiated over the Internet or by telephone.
  5. National Automated Clearing House Association (NACHA) information requests indicate potential concerns with the bank’s usage of the ACH system.
Activity Inconsistent with the Customer’s Business
  1. The currency transaction patterns of a business show a sudden change inconsistent with normal activities.
  2. A large volume of cashier’s checks, money orders, or funds transfers is deposited into, or purchased through, an account when the nature of the accountholder’s business would not appear to justify such activity.
  3. A retail business has dramatically different patterns of currency deposits from similar businesses in the same general location.
    Unusual transfers of funds occur among related accounts or among accounts that involve the same or related principals.
  4. The owner of both a retail business and a check-cashing service does not ask for currency when depositing checks, possibly indicating the availability of another source of currency.
  5. Goods or services purchased by the business do not match the customer’s stated line of business.
  6. Payments for goods or services are made by checks, money orders, or bank drafts not drawn from the account of the entity that made the purchase.
Lending Activity
  1. Loans secured by pledged assets held by third parties unrelated to the borrower.
  2. Loan secured by deposits or other readily marketable assets, such as securities, particularly when owned by apparently unrelated third parties.
  3. Borrower defaults on a cash-secured loan or any loan that is secured by assets which are readily convertible into currency.
  4. Loans are made for, or are paid on behalf of, a third party with no reasonable explanation.
  5. To secure a loan, the customer purchases a certificate of deposit using an unknown source of funds, particularly when funds are provided via currency or multiple monetary instruments.
  6. Loans that lack a legitimate business purpose, provide the bank with significant fees for assuming little or no risk, or tend to obscure the movement of funds (e.g., loans made to a borrower and immediately sold to an entity related to the borrower).
Changes in Bank-to-Bank Transactions
  1. The size and frequency of currency deposits increases rapidly with no corresponding increase in noncurrency deposits.
  2. A bank is unable to track the true accountholder of correspondent or concentration account transactions.
  3. The turnover in large-denomination bills is significant and appears uncharacteristic, given the bank’s location.
  4. Changes in currency-shipment patterns between correspondent banks are significant.
Cross-Border Financial Institution Transactions
  1. U.S. bank increases sales or exchanges of large denomination U.S. bank notes to Mexican financial institution(s).
  2. Large volumes of small denomination U.S. banknotes being sent from Mexican casas de cambio to their U.S. accounts via armored transport or sold directly to U.S. banks. These sales or exchanges may involve jurisdictions outside of Mexico.
  3. Casas de cambio direct the remittance of funds via multiple funds transfers to jurisdictions outside of Mexico that bear no apparent business relationship with the casas de cambio. Funds transfer recipients may include individuals, businesses, and other entities in free trade zones.
  4. Casas de cambio deposit numerous third-party items, including sequentially numbered monetary instruments, to their accounts at U.S. banks.
  5. Casas de cambio direct the remittance of funds transfers from their accounts at Mexican financial institutions to accounts at U.S. banks. These funds transfers follow the deposit of currency and third-party items by the casas de cambio into their Mexican financial institution.
Trade Finance
  1. Items shipped that are inconsistent with the nature of the customer’s business (e.g., a steel company that starts dealing in paper products, or an information technology company that starts dealing in bulk pharmaceuticals).
  2. Customers conducting business in high-risk jurisdictions.
  3. Customers shipping items through high-risk jurisdictions, including transit through non-cooperative countries.
  4. Customers involved in potentially high-risk activities, including activities that may be subject to export/import restrictions (e.g., equipment for military or police organizations of foreign governments, weapons, ammunition, chemical mixtures, classified defense articles, sensitive technical data, nuclear materials, precious gems, or certain natural resources such as metals, ore, and crude oil).
  5. Obvious over- or under-pricing of goods and services.
  6. Obvious misrepresentation of quantity or type of goods imported or exported.
  7. Transaction structure appears unnecessarily complex and designed to obscure the true nature of the transaction.
  8. Customer requests payment of proceeds to an unrelated third party.
  9. Shipment locations or description of goods not consistent with letter of credit.
  10. Documentation showing a higher or lower value or cost of merchandise than that which was declared to customs or paid by the importer.
  11. Significantly amended letters of credit without reasonable justification or changes to the beneficiary or location of payment. Any changes in the names of parties should prompt additional OFAC review.
Privately Owned Automated Teller Machines
  1. Automated teller machine (ATM) activity levels are high in comparison with other privately owned or bank-owned ATMs in comparable geographic and demographic locations.
  2. Sources of currency for the ATM cannot be identified or confirmed through withdrawals from account, armored car contracts, lending arrangements, or other appropriate documentation.
Insurance
  1. A customer purchases products with termination features without concern for the product’s investment performance.
  2. A customer purchases insurance products using a single, large premium payment, particularly when payment is made through unusual methods such as currency or currency equivalents.
  3. A customer purchases product that appears outside the customer’s normal range of financial wealth or estate planning needs.
  4. A customer borrows against the cash surrender value of permanent life insurance policies, particularly when payments are made to apparently unrelated third parties.
  5. Policies are purchased that allow for the transfer of beneficial ownership interests without the knowledge and consent of the insurance issuer. This would include secondhand endowment and bearer insurance policies.
  6. A customer is known to purchase several insurance products and uses the proceeds from an early policy surrender to purchase other financial assets.
Shell Company Activity
  1. A bank is unable to obtain sufficient information or information is unavailable to positively identify originators or beneficiaries of accounts or other banking activity (using Internet, commercial database searches, or direct inquiries to a respondent bank).
  2. Payments to or from the company have no stated purpose, do not reference goods or services, or identify only a contract or invoice number.
  3. Goods or services, if identified, do not match profile of company provided by respondent bank or character of the financial activity; a company references remarkably dissimilar goods and services in related funds transfers; explanation given by foreign respondent bank is inconsistent with observed funds transfer activity.
  4. Transacting businesses share the same address, provide only a registered agent’s address, or have other address inconsistencies.
    Unusually large number and variety of beneficiaries are receiving funds transfers from one company.
  5. Frequent involvement of multiple jurisdictions or beneficiaries located in high-risk offshore financial centers.
  6. A foreign correspondent bank exceeds the expected volume in its client profile for funds transfers, or an individual company exhibits a high volume and pattern of funds transfers that is inconsistent with its normal business activity.
  7. Multiple high-value payments or transfers between shell companies with no apparent legitimate business purpose.
  8. Purpose of the shell company is unknown or unclear.
Embassy and Foreign Consulate Accounts
  1. Official embassy business is conducted through personal accounts.
  2. Account activity is not consistent with the purpose of the account, such as pouch activity or payable upon proper identification transactions.
  3. Accounts are funded through substantial currency transactions.
    Accounts directly fund personal expenses of foreign nationals without appropriate controls, including, but not limited to, expenses for college students.
Employees
  1. Employee exhibits a lavish lifestyle that cannot be supported by his or her salary.
  2. Employee fails to conform to recognized policies, procedures, and processes, particularly in private banking.
  3. Employee is reluctant to take a vacation.
Other Unusual or Suspicious Customer Activity
  1. Customer frequently exchanges small-dollar denominations for large-dollar denominations.
  2. Customer frequently deposits currency wrapped in currency straps or currency wrapped in rubber bands that is disorganized and does not balance when counted.
  3. Customer purchases a number of cashier’s checks, money orders, or traveler’s checks for large amounts under a specified threshold.
  4. Customer purchases a number of open-end stored value cards for large amounts.
  5. Purchases of stored value cards are not commensurate with normal business activities.
  6. Customer receives large and frequent deposits from on-line payments systems yet has no apparent on-line or auction business.
  7. Monetary instruments deposited by mail are numbered sequentially or have unusual symbols or stamps on them.
  8. Suspicious movements of funds occur from one bank to another, and then funds are moved back to the first bank.
  9. Deposits are structured through multiple branches of the same bank or by groups of people who enter a single branch at the same time.
  10. Currency is deposited or withdrawn in amounts just below identification or reporting thresholds.
  11. Customer visits a safe deposit box or uses a safe custody account on an unusually frequent basis.
  12. Safe deposit boxes or safe custody accounts opened by individuals who do not reside or work in the institution’s service area, despite the availability of such services at an institution closer to them.
  13. Customer repeatedly uses a bank or branch location that is geographically distant from the customer’s home or office without sufficient business purpose.
  14. Customer exhibits unusual traffic patterns in the safe deposit box area or unusual use of safe custody accounts. For example, several individuals arrive together, enter frequently, or carry bags or other containers that could conceal large amounts of currency, monetary instruments, or small valuable items.
  15. Customer rents multiple safe deposit boxes to store large amounts of currency, monetary instruments, or high-value assets awaiting conversion to currency, for placement into the banking system. Similarly, a customer establishes multiple safe custody accounts to park large amounts of securities awaiting sale and conversion into currency, monetary instruments, outgoing funds transfers, or a combination thereof, for placement into the banking system.
  16. Unusual use of trust funds in business transactions or other financial activity.
  17. Customer uses a personal account for business purposes.
  18. Customer has established multiple accounts in various corporate or individual names that lack sufficient business purpose for the account complexities or appear to be an effort to hide the beneficial ownership from the bank.
  19. Customer makes multiple and frequent currency deposits to various accounts that are purportedly unrelated.
  20. Customer conducts large deposits and withdrawals during a short time period after opening and then subsequently closes the account or the account becomes dormant. Conversely, an account with little activity may suddenly experience large deposit and withdrawal activity.
  21. Customer makes high-value transactions not commensurate with the customer’s known incomes.
Potentially Suspicious Activity that May Indicate Terrorist Financing

The following examples of potentially suspicious activity that may indicate terrorist financing are primarily based on guidance "Guidance for Financial Institutions in Detecting Terrorist Financing" provided by the FATF. FATF is an intergovernmental body whose purpose is the development and promotion of policies, both at national and international levels, to combat money laundering and terrorist financing.

Activity Inconsistent with the Customer’s Business
  1. Funds are generated by a business owned by persons of the same origin or by a business that involves persons of the same origin from high-risk countries (e.g., countries designated by national authorities and FATF as non-cooperative countries and territories).
  2. The stated occupation of the customer is not commensurate with the type or level of activity.
  3. Persons involved in currency transactions share an address or phone number, particularly when the address is also a business location or does not seem to correspond to the stated occupation (e.g., student, unemployed, or self-employed).
  4. Regarding nonprofit or charitable organizations, financial transactions occur for which there appears to be no logical economic purpose or in which there appears to be no link between the stated activity of the organization and the other parties in the transaction.
  5. A safe deposit box opened on behalf of a commercial entity when the business activity of the customer is unknown or such activity does not appear to justify the use of a safe deposit box.
Funds Transfers

  1. A large number of incoming or outgoing funds transfers take place through a business account, and there appears to be no logical business or other economic purpose for the transfers, particularly when this activity involves high-risk locations.
  2. Funds transfers are ordered in small amounts in an apparent effort to avoid triggering identification or reporting requirements.
  3. Funds transfers do not include information on the originator, or the person on whose behalf the transaction is conducted, when the inclusion of such information would be expected.
  4. Multiple personal and business accounts or the accounts of nonprofit organizations or charities are used to collect and funnel funds to a small number of foreign beneficiaries.
  5. Foreign exchange transactions are performed on behalf of a customer by a third party, followed by funds transfers to locations having no apparent business connection with the customer or to high-risk countries.
Other Transactions That Appear Unusual or Suspicious
  1. Transactions involving foreign currency exchanges are followed within a short time by funds transfers to high-risk locations.
  2. Multiple accounts are used to collect and funnel funds to a small number of foreign beneficiaries, both persons and businesses, particularly in high-risk locations.
  3. A customer obtains a credit instrument or engages in commercial financial transactions involving the movement of funds to or from high-risk locations when there appear to be no logical business reasons for dealing with those locations.
  4. Banks from high-risk locations open accounts.
  5. Funds are sent or received via international transfers from or to high-risk locations.
  6. Insurance policy loans or policy surrender values that are subject to a substantial surrender charge.