Chapter 1 Risks of ML and TF-Overview Flashcards

1
Q

When was the FATF formed?

A

Formed in 1989, the Financial Action Task Force (FATF) is an intergovernmental body created by the Group of Seven industrialized nations to set standards and foster international action against money laundering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Insurance Companies Overview

A

The insurance industry provides risk transfer, savings, and investment
products to a variety of consumers worldwide, ranging from individuals to
large corporations to governments

An important aspect of the way the
insurance industry operates is that most of the business conducted by
insurance companies is transacted through intermediaries, such as agents
and independent brokers. Insurers, with some exceptions, are subject to AML
requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Insurance Companies Risks

A

The susceptibility of the insurance industry to money laundering is not as high
as that for other types of financial organizations

certain sectors of the insurance industry, such as life insurance and annuities, are a
primary target of criminals who engage in money laundering and terrorist
financing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Insurance Companies Risks Part 2

A

the sector’s vulnerability to money laundering is
similar to that of the securities sector; in some jurisdictions, life insurance
policies are even viewed as investment vehicles similar to securities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the highest risk product for Insurance?

A

life insurance is by far the most attractive area of the insurance sector to money launderers. Substantial sums can be invested in widely available life insurance products, and many feature a high degree of flexibility, while at the same time ensuring nonnegligible rates of return

Other life insurance products such as whole and permanent life insurance have an investment value which in turn can create an cash value above the original investment when the policy is cancelled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Lowest risk product for insurance

A

Life insurance products with no cash
surrender value

Products that feature payments of
cash surrender value and the opportunity to nominate beneficiaries from the
first day of the policy are the most attractive and therefore higher risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Insurance-Annuities

A

An annuity is an investment that provides a defined series of payments in the future in
exchange for an up-front sum of money. Annuity contracts can allow criminals
to exchange illicit funds for an immediate or deferred income stream, which
typically takes the form of monthly payments starting on a specified date

A policyholder can place a large sum of money into a policy with
the expectation that it will grow based on the underlying investment, which
can be fixed or variable. Unit-linked policies and insurance wrappers are also
high-risk insurance products because of their high value accumulation and
flexibility in adding and managing assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Features of High Risk Insurance Products

A
  • Offers the ability to fold funds and assets into the policy
  • Full or partial underlying investments under the control of the customer
  • Can offer the option of asset transfers
  • Can have a high upper limit for the amount of funds held
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a strong indicator of ML in the Insurance field?

A

A potential policyholder is more interested in a policy’s cancellation
terms than its benefits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Vulnerabilities in the insurance sector

A
  • Lack of oversight/controls over intermediaries
  • Decentralized oversight over aspects of the sales force
  • Sales-driven objectives
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Examples of ML in the Insurance industry part 1-Overfunding policy

A
  • The customer can overfund the policy and move funds into and out of the policy while paying early withdrawal penalties. When such funds are reimbursed by the insurance company (e.g., by check), the
    launderer has successfully obscured the link between the crime and the
    generated funds.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Examples of ML in the Insurance industry part 2-Single premium insurance bonds

A
  • The purchase and redemption of single premium insurance bonds are key
    laundering vehicles. The bonds can be purchased from insurance
    companies and then redeemed prior to their full term at a discount. In such
    cases, the balance of the bond is paid to a launderer in the form of a
    sanitized check from the insurance compan
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Examples of ML in the Insurance industry part 3-Free look period

A
  • A free-look period is a feature that allows investors—for a short period of
    time after the policy is signed and the premium paid—to back out of a policy
    without penalty. This process allows the money launderer to receive an
    insurance check, which represents cleaned funds. However, as more
    insurance companies are subject to AML program requirements, this type of
    money laundering is more readily detected and reported.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Examples of ML in the Insurance industry part 4-Cancellation

A

One indicator of possible money laundering is when a potential policyholder
is more interested in the cancellation terms of a policy than the benefits of
the policy. The launderer buys a policy with illicit money and then tells the
insurance company that he has changed his mind and does not need the
policy. After paying a penalty, the launderer redeems the policy and
receives a clean check from a respected insurer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Examples of ML in the Insurance industry part 5-Third parties

A

Third parties that fund insurance policies (i.e., not the policyholder) have not
been subject to regular identification procedures when the insurance
contract was concluded. The source of funds and the relationship between
policyholder and the third party might be unclear to the insurance company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Examples of ML in the Insurance industry part 6- Investment opportunities using large deposits

A

Money laundering is enabled by using large sums of money to make substantial payments into single-premium life insurance policies, which serve as wrapped investment policies.

A variation on this method is the use of large premium deposits to fund annual premiums. Such policies, which are comparable to single-premium policies, also enable the customer to invest substantial amounts of money with an insurance
company. Because the annual premiums are paid from an account that
must be funded with the total amount, a life insurance product with apparently lower money laundering risk will bear the features of the higher risk single-premium polic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Factors to consider for Insurance companies ML risks

A
  • Use cash or cash equivalents to purchase insurance products
  • Purchase an insurance product with a single premium or lump-sum
    payment
  • Borrow money against an insurance product’s value
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Securities Broker-Dealers Overview

A

The world’s capital markets are vast in size,
dwarfing deposit banking

FATF has strongly recommended money laundering controls for the securities field since 1992, in conjunction with the Madrid-based International Organization of Securities Commissions (IOSCO), a global association of governmental bodies that includes the Commodity Futures Trading
Commission (CFTC), which regulates the securities and futures markets. The
difficulty in dealing with money laundering in the securities field is that typically
little currency is involved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Concentration Accounts

A

Concentration accounts are internal accounts established to facilitate the processing and settlement of multiple or individual customer transactions

Concentration accounts are also known as special-use, omnibus,
settlement, suspense, intraday, sweep, and collection accounts

Audit trail can be lost when ID info is seperate from transaction info

  • Requiring dual signatures on general ledger tickets
  • Prohibiting direct customer access to concentration accounts
  • Capturing customer transactions in the customers’ account statements
  • Prohibiting customers’ knowledge of concentration accounts and their ability to direct employees to conduct transactions through these accounts
  • Retaining appropriate transaction and customer identification information
  • Frequently reconciling accounts by an individual who is independent of the transactions
  • Establishing a timely discrepancy-resolution process
  • Identifying and monitoring recurring customer names
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Securities Industry ML risks

A
  • International nature
  • Speed of transactions
  • Ability to conduct free-of-payment asset transfers, in which securities are transferred without a corresponding transfer of funds
  • Ease of conversion of holdings to cash without significant loss of principal
  • Routine use of wire transfers to, from, and through multiple jurisdictions
  • Competitive, commission-driven environment
  • Practice of brokerage firms of maintaining securities accounts as nominees or trustees, thus permitting concealment of the identities of the true beneficiaries
  • Weak AML programs that do not have effective CDD, suspicious activity
    monitoring, and other controls.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Securities Industry risks-Layering

A

For illegal funds originating outside the sector, securities transactions for the creation of legal entities can be used to conceal or obscure the source of these fund

In the case of illegal activities within the securities market itself (e.g., embezzlement, insider trading, securities fraud, and market manipulation), the transactions and manipulations generate illegal funds that must then be laundered

In either case the dual advantage is ML plus profit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Securites Industry-ML indicators

A

1.Use of customer accounts to hold funds and that can bypass more stringent ML controls
2.Wash Trading and offsetting transactions- the process of matching buys and sells to create the illusion of trading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Securities Industry-Greatest ML vulnerabilities

A

The FATF Money Laundering and Terrorist Financing in the Securities Sector typologies report identifies the following

  • Wholesale markets
  • Unregulated funds
  • Wealth management
  • Investment funds
  • Bearer securities
  • Bills of exchange
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Securities Industry-Unique challenges

A

1.Variety and complexity of securities: Security offerings are broad, with some products tailored to the needs of a single customer and others designed for sale to the general public

2.High-risk securities: Although most securities are issued by legitimate
companies, securities that are underregulated or established for illegitimate purposes pose risks. In the United States, securities that are not traded on regulated exchanges are typically sold over-the-counter, with tiers such as “pink sheets” that require only minimal reporting

3.Multiple layers and third-party risk: The securities industry involves many
participants, including financial organizations and broker-dealers, financial
advisors, transfer agents, securities lenders, custodians, introducing brokers, and sales agents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Securities Industry-ML Indicators

A

1.A customer with a significant history with the securities firm who abruptly
liquidates all of her assets in order to remove wealth from the jurisdiction

  1. A customer who opens an account or purchases a product without regard
    to loss, commissions, or other costs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Securities Industry-ML Indicators part 2

A
  1. A securities account that is used for payments or outgoing wires with little
    or no securities activity (e.g., account appears to be used as a depository
    account or a conduit for transfers)

4.A customer’s transactions that include a pattern of sustained losses, which
might indicate the transfer of value from one party to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Securities Industry-ML Indicators-part 3

A

5.Transactions in which one party purchases securities at a high price and
then sells them at a considerable loss to another party, which might indicate the transfer of value from one party to another

  1. A customer who is unfamiliar with a financial product’s performance and
    specifications but wants to invest in it nonetheless
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Securities Industry-ML Indicators-part 4

A

7.A customer who is known to have friends or family who work for the securities issuer, or a trading pattern that suggests he might have nonpublic information

  1. Two or more unrelated accounts at a securities firm that trade an illiquid or
    low-priced security, or “penny stock,” suddenly and simultaneously
  2. A customer who deposits physical securities that (1) are in large quantities;
    (2) are titled differently from the name of the account; (3) do not bear a
    restrictive legend, even though the history suggests that they should; or (4)
    lack sense in terms of the method by which they were acquired
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Securities Industry-Retail Brokers

A

Retail broker-dealers are the industry’s frontline defense—and its most
vulnerable access point.

pressure to expand their client base and manage more assets. The more assets in a
client’s account, the more commission will be generated.

Money launderers can promise a large or steady commission stream. Therefore, it is important for broker-dealers to understand their customers and monitor transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Securities Industry-Retail Brokers requirements

A

Requirements established by the SEC, FINRA (Financial Industry Regulatory Authority) which compel brokers to have AML programs.

These include appointed BSA officer,CDD,SARs monitoring ,training, transaction monitoring, and independent audits.

Oversight also done by SEC and/or FINRA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Securities Industy-Case Study

A

Financial Conduct Authority fined Duestche Bank 163m GBP for inadequate ML controls between 2012-2015

The infractions and resulting loopholes allowed the front office of Deutsche Bank’s Russia-based subsidiary, DB Moscow, to
execute more than 2,400 pairs of mirror trades between April 2012 and October 2015, these trades were used to transfer USD 6 Billion from Russia , funds went through various locations including Cyprus,Estonia and Latvia. DB Moscow executed the mirror trades. Investigations found connections between DB Moscow and DB London customers.Rubles were changed into USD and withdrawn.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Securities Industy-Case Study part 2

A

The deficiencies included:
* Inadequate KYC and customer due diligence (CDD)
* Failure to ensure that the CB&S front office took responsibility for its KYC obligations
* Flawed customer and country risk-rating methodologies
* Deficient AML policies and procedures
* Inadequate AML information technology infrastructure
* Lack of automated AML systems for detecting suspicious trades
* Failure to provide adequate oversight of trades booked in the UK by
traders in non-UK jurisdictions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Securities Industy-Key Takeaways

A
  • Inadequate AML/CFT frameworks allow abuse of the financial system by
    criminals.
  • Real-time mirror trades involve the rapid transfer of significant sums of
    money around the world.
  • It is critical to have adequate KYC and CDD procedures in place to identify
    suspicious activity.
  • Organizations need to undertake continuous risk assessment and ensure
    controls are in place to mitigate against existing, new, and emerging risks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Securities Industry Case Study 2:

A

In June 2020 SFC (Hong Kong Securities and Futures Commission) fined Guotai Junan Securities HK 25M

From 2014-15 GJS failed to account for 15,600 3rd party deposits and withdrawals totalling HK 37.5 Billion

Failure to respond to several red flags , more than 5000 deposits made into accounts with knowing the depositor identities

HK 28.8M used by 5 clients to purchase shares of a HK listed company were deposited by the same 3rd party that exceeded their self declared net worth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Securities Industry Case Study 2: Takeaways

A
  • Ongoing transaction monitoring is a key component of an effective
    AML/CFT compliance program.
  • Share offerings have associated risks for money laundering, insider trading, and wash trades.
  • Both potential and confirmed breaches should be promptly disclosed to
    the relevant regulator.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Casinos-Overview

A

Casinos and other businesses associated with gambling, such as bookmaking,
lotteries, and horse racing, are associated with money laundering because they
provide an excuse for recently acquired wealth with no apparent legitimate
source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Casinos- ML

A

ML in casinos generally occures in the layering and placement stages

Buying chips with illegal cash, request repayment by check drawn on casino’s account or can request a casino to provide credit.

One laundering technique involves the person actually gambling the money to be laundered, but in such a way that he is reasonably sure of ultimately recovering his stake in theform of checks issued or funds transferred by the gambling or betting agency and reflecting verifiable winnings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Casinos-Junkets

A

Junkets, a form of casino-based tourism, also present significant money
laundering risk, because junket participants largely rely on third parties, or junket
operators, to move the funds across borders and through multiple casinos creating a layer of obscurity.

In some countries Junkets can rent private gaming rooms, monitor player activity,collect credit, operate pool funds.

In certain regions, licensed junket operators act as fronts for junket operators in another country. The front operators supply
players to a casino through the casino’s licensed junket companies, which
might not qualify for a license in the country where the players will be gambling

several jurisdictions do not require licensing of junket operators and their agents, further increasing the risks of money laundering.
FATF emphasizes the need to ensure that junket operators are not under criminal influence and that financial transactions are transparent and subject to
relevant AML/CFT measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Casinos- Suspicious behaviours part 1

A

FinCEN and FATF have identified specific behaviors to watch for, including:

  • Attempts to evade AML reporting and recordkeeping requirements, such
    as

1.Paying of large debt without triggering threshold
2. Two or more customers combining funds after minimal gambling to request for a casino check
3.Customer receives payout in excess of USD 10k but requests less and takes the remaining in cash
4.Structuring transactions to avoid tax filings or CTR
5. Reducing the presented chips when asked for ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Casinos- Suspicious behaviours part 2

A

Using the cashier’s cage solely for its banking-like financial services, such as:

1.Wiring of funds originated from nongaming proceeds to another country
2.Using the casino as a temporary repository of funds by depositing money and requesting transfers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Casinos- Suspicious behaviours part 3

A

Minimal gaming activity without a reasonable explanation, such as:

  1. Purchasing many chips, doing a bit of gambling then redeeming chips
    2.Using credit to purchase chips, doing minimal gambling, pay off credit in currency and redeems chips for a casino check
  2. Large deposit using small denomination bills, withdraws at the chips table–> minimal gambling–>exchanges chips for large denominations
    4.Inserting a high # of small bills into slot machine engaging in minimal play and exchanges the voucher for large denom bills or casino check
  3. Purchasing chips under a reporting threshold, engages in minimal play, leaves casino without cashing out
    6.Customer transfers funds to a casino into a front account, withdraws it as chips in a table then asks chips to be exchange for casino check
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Casinos- Suspicious behaviours part 4

A
  • Unusual gaming and transaction patterns, such as:
  1. 2 customers both sides of a bet to cover each other
    2.Customer requests casino check issued to 3rd parties
    3.Using multiple fin instruments to pay off large markers
  2. Requesting casino checks under reporting threshold
    5.Establish high value deposit then remain dormant.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Casinos-High Rollers

A

It is a serious mistake for casinos to allow play and accept the revenue without
reasonably determining the source of a customer’s gaming funds. FinCEN
expects US casinos to know the source of high rollers’ funds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Casinos-Examples of failures of AML/CTF programs

A

Tinian Dynasty Hotel & Casino fined US$75 million (2015)-Failed to file CTRs,assisted in structuring transactions

Caesars Palace fined US$9.5 million (2015):
Promoted private salons without proper monitoring transactions

Sparks Nugget fined US$1 million (2016): Failed to file STRs and instructed it’s compliance manager to avoid interacting with regulatory auditors

Artichoke Joe’s Casino (AJC) fined US$8million (2017). Failed to file STRs despite knowing that loan sharks were using chips for money laundering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Casinos-use of tools and online gambling

A

Casinos can use AML tools specifically designed for casinos for their AML needs.

Online gambling provides an effective method of money laundering for cybercriminals, because transactions are conducted principally
through credit and debit cards. Site operators are typically unregulated
offshore organizations Site operators also may have accounts in reputable banks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Casinos-Onling Gambling

A

Due to the regulatory environment and framework some credit card issuers do not allow online gambling, banks screen the types of org the accepting the card and thus can block it from conducting a transaction

However other methods such as prepaid cards, wire transfers, peer to peer , virtual currencies can fund online gambling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Casinos-ML Indicators

A
  1. A ML colludes with a site operator to deposit illicit funds into an account and then withdraws them as winnings, the launderer declares the winnings with the tax authorities and uses funds for a legit purpose

2.ML deposits funds into an account using stolen identity

  1. ML logs into the account from multiple countries

4.Player is a PEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Casinos- Case Study

A

ILGA (Australian Independent Liquor and Gaming Authority) investigated Crown Melbourne

Crown accepted large deposits by Chinese nationals at a VIP room operated by a Junkey agency, they also used shell companies to facilitate transactions with China that were not reported to the regulator, the Australian Transaction Reports and Analysis Center

Vids showed bricks of cash being exchanged for chips which happened regulary in the VIP rooms.

Crown used two shell companies to enable VIP gamblers and Junket agents and circumvent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Casino Case Study-Key Takeaways

A

Casino cashiers can be exploited for placement.
* Intermediaries, such as junket agents and shell companies, can be used to
place, layer, and integrate funds through casino operations.
* A VIP customer’s commercial value must not protect them from suspicion,
scrutiny, or AML controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Dealers in High-Value Items-Overview

A

The USA PATRIOT Act requires certain dealers including precious metals, stones, and jewels, to establish AML programs.
However, in many other jurisdictions, these are not required.

Gold has high value and can be bought and sold easily.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Dealers in High Value Items-FATF Report Takeways

A
  1. Gold is an extremely attractive vehicle for laundering money.
  2. The gold market is a target for criminal activity because it is lucrative.
    Understanding and knowing the various stages of the gold market and types
    of predicate offenses is critical in identifying money laundering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Dealers in High Value Items-ML Indicators

A

1.Payments or returns to persons other than the owner-owner of the metal directs payments to a third party
2.Precious Metal Pool Accounts-Group of companies that hold precious metal credits for a company which can be used by a customer.(Monetary/delivery etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Dealers in High Value Items-Diamonds

A

Diamonds are commonly used for TF/ML

Direct purchase of gems with illegal money

Common type of activities:
FX Transactions
Fraudulent Invoicing
Commingling proceeds
International fund transfers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Dealers in High Value Items-Fine Art

A

Anonymous agents at art auction houses bid millions of dollars for priceless works. Payment is later wired to the auction house by the agents’ principals from accounts in offshore havens.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Dealers in High Value Items-Fine Art-How to decrease ML Risks

A
  1. Require all art vendors to provide names and addresses and sign on a form stating the art is not stolen

2.Verify addresses of new vendors and customers
3.Contact the Art loss register if the art is believed to be stolen
4. Be wary of customers wanting to deal in cash
5.Appoint a staff to which people can report STRs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Precious metals- Case Study-Operation Apex

A

12 people arrested in relation to the Wu Gang , engaged in criminal activities

Established a shark finning business, legal in Florida not in California using fake ID, fake invoices and paperwork used

Proceeds from shark finning and drug trafficking put into 3rd party accounts around the world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Precious metals- Case Study-Operation Apex-Key Takeaways

A

Converting illicit proceeds into precious metals and gems is attractive to
financial criminals because:
* They have high value in a compact form, and their value tends to hold for long periods of time.
* They are easy to transport, so value can be transferred across borders without customs declarations.
* Their origins are difficult to trace.
* They can be easily exchanged for cash or used as currency in most areas of the world.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Precious metals- Case Study-Elemetal

A

Firm did not undertake basic KYC procedures

Refined billions of dollars worth of gold

Forfeited USD $ 15 Million

US Federal law requires precious metal dealers to have an AML program

Firm did not have confirmation on supplier identities and accepted gold which was most likely smuggled

3 employees pled guilty to importing illicit gold, Elemetal removed from London Bullion and COMEX-gold futures market

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Precious metals- Case Study-Elemetal-Takeaways

A

1.AML risks inherent in the gold trade include heavy reliance on cash,
anonymity, and difficulty tracing the source and origin of gold

2.The BSA requires precious metals dealers to perform KYC on suppliers and
identify the source and origin of metals

3.In addition to KYC, AML programs must also implement Know Your
Employee controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Fine Art Case Study-Philip Rivkin

A

In 2016, US biodiesel businessman Philip Rivkin pled guilty in Houston, Texas, to
laundering US$78 million through many avenues, including purchasing over
2,000 pieces of art

10 years imprisonment and $138m fine

Investigators determined that
Rivkin’s company Green Diesel was not in fact producing biodiesel, but merely
selling certificates and defrauding its customers

He bought a collection of Photos worth $15M to legitimize his income

within months of the US
imposing sanctions on the Russian brothers Arkady and Boris Rotenberg, they
illegally spent more than US$18 million on art in the US using shell companies
linked to Russian oligarchs to evade sanctions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Fine Art Case Study-Philip Rivkin-Key Takeaways

A

1.Art markets are high risk
2. Shell companies are used to enhance secrecy
3. Following legislation in place for art markets
The responsible art market initiative/the AML act of 2020/the EU fifth directive
4.Art participants should understand AML law and are liabile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Travel Agencies and Websites-Overview

A

ML can occur in the following ways

1.Purchasing an expensive ticket for another person who then asks for a refund
2.Paying for services in installments that are actually structured wire
transfers in amounts small enough to avoid recordkeeping requirements, a
method used especially by criminals from foreign countries
3.Establishing tour operator networks with false bookings and
documentation to justify significant payments from foreign travel groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Travel Agencies-Case Study-ISIS-Malaysia

A

In 2015, Indonesian militant suspect Gigih Rahmat Dewe opened a travel
agency on Bintan Island, Indonesia, as a cover for the terrorist organization the
Islamic State of Iraq and Syria (ISIS).

Cash intensive business can allow for comingling of funds, such transfer of funds raise minimal suspicion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Travel Agencies-Case Study-ISIS-Malaysia-Key Takeaways

A
  • Travel agencies are cash-intensive businesses.
  • Travel agencies solve logistics problems for terrorists.
  • Travel agencies can allow the use of false identities.
  • Travel agencies can be used to commingle legitimate and illegitimate fund.
  • Travel agencies can be used in all three stages of money laundering.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Vehicle Sales-Overview-ML indicators

A

1.Structuring cash deposits below the threshold
2.Purchasing vehicles with sequentially # cheques or pay orders
3.Trading in vehicles and conducting successive transactions in buying/selling
4.Accepting 3rd party payments from jurisdictions with low controls

Cases have also occurred in which car dealers laundered money by allowing
drug dealers to trade in cars for less expensive models and to be paid in
checks, not cash, for the difference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Vehicle Sales-Case Study-Luxury Vehicles

A

Leontaritis was the owner and operator of Vanderhall Exotics of Houston LLC,
which specialized in exotic luxury automobiles. He used his car dealership to
launder drug money for a large Houston-based drug trafficking organization
that smuggled drugs from Mexico into the US

Accepted cash from drug dealers for high luxury vehicles, used fraudulent dealer invoices to hide IDs and did not report cash payments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Vehicle Sales-Case Study-Luxury Vehicles-Key Takeaways

A
  • Cash-intensive businesses, such as car dealerships, are particularly
    vulnerable to money laundering.
  • Fraudulent invoices can be used to hide buyers’ identities.
  • The purchase of luxury vehicles and other assets can be used to place
    large amounts of illicit money into the financial system seemingly
    legitimately
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Gatekeepers: Notaries, Accountants,
Auditors, and Lawyers-Overview

A

FATF identified the following functions provided by lawyers, notaries,
accountants, and other professionals as the most useful to potential money
launderers

  • Creating and managing corporate vehicles and other complex legal
    arrangements, such as trusts
  • Buying or selling property: Property transfers can serve as the cover for
    illegal fund transfers
  • Performing financial transactions: These professionals might carry out
    various financial operations on behalf of a client
  • Providing introductions to financial organizations
  • Undertaking certain litigation
  • Setting up and managing charities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Gatekeepers: Notaries, Accountants,
Auditors, and Lawyers-Overview-red flag indicators - part 1

A

The FATF report also describes five categories of red flag indicators of money
laundering or terrorism financing:
1.Characteristics of a client:
Overly secretive
* Uses an agent or an intermediary or avoids personal contact without a
logical reason
* Reluctant to provide or refuses to provide information or documents
usually required to enable the execution of a transaction
* Holds or has previously held a senior public position or has professional
or family ties to such individuals
* Known to have been the subject of investigation for an acquisitive crime
(i.e., one in which the offender derives material gain from the crime,
such as theft or embezzlement)
* Known to have ties to criminals
* Shows unusual interest and asks repeated questions on the procedures for applying ordinary standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Gatekeepers: Notaries, Accountants,
Auditors, and Lawyers-Overview-red flag indicators - part 2

A
  1. Characteristics of the involved parties:
    * Native to, residents in, or incorporated in a high-risk country
    * Connected without an apparent business reason; that is, tied in a way
    that generates doubts as to the real nature of the transaction
    * Appear in multiple transactions over a short period of time
    * Incapacitated or under legal age, with no logical explanation for their
    involvement
    * Attempt to disguise the real owner or parties to the transaction
    * Not directing the transaction, (i.e., the person directing the operation is
    not one of the formal parties to the transaction)
    * Do not appear to be suitable representatives
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Gatekeepers: Notaries, Accountants,
Auditors, and Lawyers-Overview-red flag indicators - part 3

A
  1. Characteristics of the source of funds:
    * Provided using unusual payment arrangements
    * Collateral located in a high-risk jurisdiction
    * Represents a significant increase in capital for a recently incorporated
    company, including foreign capital, without a logical explanation
    * Represents unusually high capital in comparison with similar businesses
    * Stems from a security transferred with an excessively high or low price
    attached
    * Stems from large financial transactions that cannot be justified by the
    corporate purpose
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Gatekeepers: Notaries, Accountants,
Auditors, and Lawyers-Overview-red flag indicators - part 4

A
  1. Characteristics of the lawyer:
    * Located at a significant distance from the client or transaction without a
    legitimate or economic reason
    * Little or no experience in providing the specific services needed
    * Being paid substantially higher than usual fees without a legitimate reason
    * Frequently changed by the client, or the client has multiple legal
    advisors without legitimate reason
    * Provides services previous refused by another professional
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Gatekeepers: Notaries, Accountants,
Auditors, and Lawyers-Overview-red flag indicators - part 5

A
  1. Characteristics of the retainer:
    * Transactions that are unusual with regard to the type of operation and
    the transaction’s typical size, frequency, or execution
    * Transactions that do not correspond to the client’s normal business
    activities and show that he does not have a suitable knowledge of the
    nature, object, or purpose of the professional performance requested
    * Creation of complicated ownership structures or structures with
    involvement of multiple jurisdictions without a legitimate or economic
    reason
    * Client transaction history with no documentation to support company
    activities
    * Inconsistencies and unexplained last-minute changes to instructions
    * No sensible commercial, financial, or tax reason for the transactions or
    increased complexity that unnecessarily results in higher taxes or fees
    * Exclusively keeping documents or other goods, or holding large
    deposits or otherwise using the client account without provision of legal
    services
    * Abandoned transactions without concern for fee level or after the
    receipt of funds
    * Power of attorney sought for the administration or disposal of assets
    under unusual circumstances without logical reason
    * Litigation that is settled too easily or quickly with little or no involvement
    of legal professional retained
    * Requests for payments to third parties without substantiating reason or
    corresponding transaction
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Gatekeepers-Alternatives to Lawyers

A
  • Deferring regulation until adequate education is conducted
  • Imposing internal controls and due diligence duties on lawyers regarding
    unprivileged communications
  • Using a joint government-private sector body to regulate lawyers who
    engage in financial activities, requiring registration with and regulation by
    an agency
  • Devising a new hybrid approach, such as through guidance notes and best
    practices standards from FATF

Many regulators within the United States want the scope to coincide with the European Union Directive, which requires EU members to ensure that obligations are imposed on a wide range of professionals, including auditors, attorneys, tax advisors, real estate agents, and notaries.

75
Q

Gatekeepers (Case example: Role of
gatekeepers in facilitating money
laundering)

A

Jan 2019,Ross Mckay,7 years prison, 1450 GBP

McKay was a “go-to,” or preferred, lawyer for criminals because he did not
conduct basic KYC checks, including understanding the nature of the client’s
business, inquiring about the source of funds, or understanding connections
between the parties and transactions

McKay conducted more than 80 criminal transactions that helped a buy-tolease landlord use illicit money to fraudulently build a £10.8 million property
empire.

McKay committed mortgage fraud by disguising the source of funds
for property deposits and used nominee names instead of the names of the
legitimate purchasers on mortgage applications

76
Q

Gatekeepers (Case example: Role of
gatekeepers in facilitating money
laundering)-Key Takeaways

A
  • Lawyers, accountants, financiers, and other “professional enablers” can
    abuse their positions to facilitate financial crimes via seemingly legitimate
    means.
  • Professional service providers need to be aware of their responsibilities to
    identify, report, and avoid money laundering risks.
  • Professional service providers need to ensure that they understand all the
    laws and regulations that apply to them, particularly when involved in
    multijurisdictional business.
  • Professional enablers who commit crimes can be imprisoned and will likely
    be unable to operate again within their chosen profession
77
Q

Role of Gatekeepers (Case example:
Special skills)

A

The attorney had helped to invest his client’s drug proceeds by
forming a corporation in the name of the client’s wife and arranging a loan
from the corporation to another (noncriminal) client

He then drafted a fake
construction work contract, making the repayment of the loan appear to be
payment for construction work performed by the company

78
Q

Role of Gatekeepers (Case example:
Special skills)-Key Takeaways

A

Key takeaways
* Gatekeepers can help disguise the source of illicit funds so they appear to
originate from a legitimate business activity, such as a sale or loan.
* Money laundering schemes facilitated by gatekeepers can involve multiple
parties, some of whom might not be aware of their own involvement.
* The special skills of gatekeepers enable them to help their clients evade
detection using sophisticated money laundering schemes

79
Q

Investment and Commodity Advisors

A
  • Commodities: Goods such as food, grains, and metals through futures contracts
  • Futures/futures contracts:
  • Options/options contracts:
  • Commodity pool: A combination of funds from various investors to trade in
    futures or options contracts
  • Omnibus accounts: Accounts held by one futures commission merchant
    (FCM) for another, in which case transactions of multiple account holders
    are combined, and their identities are unknown to the holding FCM
80
Q

Other commodity advisors

A
  • Commodity pool operator: Operator or solicitor of funds for a commodity
    pool, which combines funds from members and trades futures or options contracts
  • Futures commission merchant (FCM):
  • Introducing broker-dealer in commodities (IB-C): A firm or person that
    solicits and accepts orders for commodity futures from customers but
    does not accept funds. IB-Cs can be guaranteed or independent:

o Guaranteed introducing broker-dealer: An IB-C with an exclusive written
agreement with a futures commission merchant, which obligates the
FCM to assume responsibility for the IB-C’s performance

o Independent introducing broker-dealer: An IB-C who is subject to
minimum capital and financial reporting requirements, and who may
introduce accounts to any FCM

  • Investment advisor: Provides advice on securities and investments and
    manages client assets
81
Q

The investment and commodity advising industry-ML risks

A
  • Withdrawal of assets through transfers to unrelated accounts or high-risk
    jurisdictions
  • Frequent additions to or withdrawals from accounts
  • Clients invest via checks drawn on, or wire transfers from, accounts of third
    parties with no relation to them
  • Clients request custodial arrangements that allow them to remain anonymous
  • Transfers of funds to the investment advisor, followed by transfers to
    accounts at other institutions that suggest a layering scheme
  • CTAs or other professionals invest illegal proceeds for a client
  • Movement of funds to disguise their origin
82
Q

Trust and Company Service Providers
-Overview

A

Trust and company service providers (TCSPs) are gatekeepers who set up
trusts between parties and provide certain legal and administrative functions
for corporations

TCSPs include any
person or business that provides any of the following services to third parties:

1.Acting as agent on behalf of third parties
2.Acting as a director or sec of a company,partners etc

3.Providing registered office,correspondence for a company
4.Acting as a trustee of an express trust
5.Acting as nominee shareholder

FATF report mentions that trust companies must obtain detailed info on customers and source of funds and identify UBOs

Some countries regulate TCSPs like Lawyers in which clients can request confidentiality

83
Q

Trust and Company Service Providers
-Red Flags

A
  • Unknown or inconsistent application of regulatory guidelines regarding
    identification and reporting requirements
  • Limited market restriction on practitioners to ensure adequate skills,
    competence, and integrity
  • Inconsistent recordkeeping across the industry
  • Potential for TCSPs to operate in an unlicensed environment
  • Potential for a TCSP’s CDD to be performed by other financial
    organizations, depending on the jurisdictional requirements
84
Q

Trust and Company Service Providers
-ML indicators

A

1.Complex Transactions
2.Payments to shell companies
3. Use of TCSP in countries that have lax UBO laws
4.Legal arrangements in jurisdictions with weak AML laws and/or strict secrecy laws
5.Intercompany loan transactions and multijurisdictional wire transfers that serve no legal purpose.

According to Transparency International, a global coalition working to end the
injustice of corruption, it is important to focus on service providers, rather than
the company or trust, because the latter is merely the tool through which
money launderers operate

85
Q

Real Estate-Overview

A

Investing illegal proceeds into real estate is very common

Escrow accounts, generally maintained by real estate agents, brokers, and other fiduciaries, are designed to hold funds entrusted to someone for protection and proper disbursement

escrow accounts can facilitate the movement of funds by
cashier’s checks, wire transfers, and company checks to seemingly legitimate
individuals and companies

Cash is common but large checks are also used,

86
Q

Real Estate-Overview-Closing

A

A money laundering title insurance agent can make multiple deposits of cash on a given day at several banks in amounts under the currency reporting threshold,
credited to different, nonexistent closings

Each closing also entails numerous routine disbursements for payment of the
proceeds to the seller, payoff of the mortgage, real estate commissions,
taxes, satisfaction of liens, and other payments

Property seller may accept lower money than valuation and take the rest in cash

Loan back method, criminal provides fund to an associate who then provides a loan in the same amount

87
Q

Real Estate-FinCEN published Suspected Money Laundering in the Real Estate Industry

A

The report makes a distinction
between fraudsters and money launderers

Lenders are likely to file a SAR
when they are the target of failed or successful mortgage fraud schemes that
threaten their organization’s revenues

However it can be tough to detect Mortgage loan fraud

Only 20% of SARs pertained to ML

88
Q

Real Estate-Attractiveness for ML

A

The Australian Transaction Reports and Analysis Centre (AUSTRAC)

real estate is an attractive channel for laundering illicit funds because:
* It can be purchased with cash.
* The ultimate beneficial ownership can be disguised.
* It is a relatively stable and reliable investment.
* Value can be increased through renovations and improvements.

Money laundering through real estate can be relatively uncomplicated
compared with other methods and requires little planning or expertise

89
Q

Real Estate- ML methods

A

In Australia, common money laundering methods involving real estate include:
* Using third-party straw buyers described as “cleanskins”
* Using loans and mortgages as a cover for laundering
* Manipulating property values to disguise undisclosed cash payments
through overvaluing, undervaluing, or flipping
* Generating rental income to legitimize illicit funds
* Conducting criminal activity, such as the production of cannabis or
synthetic drugs, at the purchased property
* Using illicit cash to make property improvements to increase the value and
profits at sale
* Using front companies, shell companies, trusts, and other company
structures to hide beneficial ownership and obvious links to criminals
* Using gatekeepers, such as real estate agents, conveyancers, and
solicitors, to conceal criminal involvement, complicate the money
laundering process, and provide a veneer of legitimacy to the transaction
* Investing by overseas-based criminals to conceal assets and avoid
confiscation from authorities in their home jurisdiction

90
Q

Real Estate- Red Flag indicators

A
  • Various uses of cash to aggregate funds for property purchase, down
    payment, and loan repayment
  • Multiple purchases and sales in a short period of time, possibly involving
    property overvaluation, undervaluation, or straw buyers
  • Use of offshore lenders
  • Unknown sources of funds for purchase, such as incoming foreign wires in
    which the originator and beneficiary customer are the same
  • Ownership being the customer’s only link to the country in which the real
    estate is being purchased
91
Q

Real Estate-Towers of Secrecy- NYT

A

Half of the most expensive properties are bought via shell companies in the US

37% Non American owners in the Time Warner Center at least 16 have been investigated

Property docs were not properly singned

There was no requirement for Real Estate firms to identify UBOs

Subsequently in 2016 , FinCEN
began issuing a series of geographic targeting orders (GTOs) to help law
enforcement identify individuals acquiring luxury residential properties

Now Natural persons are required to be identified behind shell companies within 180 days(Geographic Targeting Orders)

92
Q

International Trade

A

Trade-based money laundering and
the Black-Market Peso Exchange (BMPE) are two significant money laundering techniques that have proven successful in illicit finance

93
Q

International Trade Free Trade Zones

A

According to FATF, systemic weaknesses for FTZs include:
* Inadequate AML/CFT safeguards
* Minimal oversight by local authorities
* Weak procedures to inspect goods and legal entities, including inadequate
recordkeeping and information technology systems
* Lack of cooperation between FTZs and local customs authorities

Some FTZs are as large as cities

94
Q

Trade-Based Money Laundering

A

FATF defines trade-based money laundering (TBML) as the process of
disguising the proceeds of crime and moving value by using trade
transactions to legitimize their illicit origins

TBML techniques vary in complexity and are frequently used in combination with other money laundering techniques to further
obscure the money trail

Money launderers can move money out of one country by using their illicit
funds to purchase high-value products and then exporting them at low prices
to a colluding foreign partner, who then sells them in the open market at their
true value

95
Q

Trade Based ML-Guidance Paper

A

According to the Guidance Paper on Combating Trade-based Money
Laundering, developed by the Hong Kong Association of Banks, understanding
the commercial purpose of any trade transaction is a key requirement in
determining its money laundering risk

1.Over and under invoicing
2.Over shipping/Short shipping quantities
3. Ghost Shipping-ficticious buy and sell
4.Shell Companies
5.Multiple invoices for shipment
6.Black Market Trades

Letters of credit are also used

96
Q

Trade Based ML-Letters of Credit

A

transferring money from a country with lax exchange controls, thus creating
the appearance that an import transaction is involved

Manipulation of prices

LCs can be used with wire transfers to bolster appearance of real transaction

97
Q

TBML-Tackling TBML

A

The Asia/Pacific Group on Money Laundering (APG) cited the lack of reliable
statistics relating to TBML as a major obstacle in devising strategies to tackle it.

Strategies should be based on dismantling TBML

Interagency cooperation, training and further research

98
Q

TBML-Fincen and Funnel Accounts

A

The advisory was the result of the possible impact of the 2010 Mexican law that
restricted cash deposits of US dollars in Mexican banks then in exchange houses and brokerages

FinCEN defines a funnel account as “an individual or business account in one
geographic area that receives multiple cash deposits, often in amounts below
the cash reporting threshold, and from which the funds are withdrawn in a
different geographic area with little time elapsing between the deposits and
withdrawals.

99
Q

TBML-Funnel Accounts-Red Flags

A
  1. An account opened in one US state receives numerous cash deposits of
    less than $10,000 outside of the geographic region
  2. Business account deposits take place in a different geographic region from where the business operates
    3.Individuals opening or making deposits to funnel accounts lack information
    about the stated activity of the account, the account owner, or the source of the cash
    4.Business account receives deposits out of state and debits not related to business purpose
    5.Differences in amount and signatures on checks issued from an account receving out of state deposits
    6.Wire transfers or checks issued from a funnel account deposited/cleared via US correspondent bank in Mexico
100
Q

TBML-Case Study

A

-Sophisticated Organized Crime Groups-OCG
-They had created a network of companies to launder the proceeds of drug trafficking via TBML activity and legitimize the illegal proceeds
-Faked invoicing and used tax fraud scheme
-Scheme began by buying luxury cars in Germany and then faking paper trails for sales and purchases
-Convinced a legitimate supplier to supply vehicles to bolster image
-Import/Export companies owned by OCG used to import various other items to supply to drug traffickers
-Used TBML to launder criminal proceeds

101
Q

TBML-Case Study-Key Takeaways

A
  • Criminals use international trade to disguise illegal activities.
  • Shell companies and fake invoicing are common techniques.
  • Joint investigations mitigate cross-border and jurisdictional challenges.
  • Criminals add complexity to cross border trade by commingling with
    legitimate activity
102
Q

Black Market Peso Exchange

A

the BMPE is a process by which money in the United States derived from illegal activity is purchased by Colombian peso brokers and deposited in US bank accounts established by the brokers

Colombian importers created the BMPE in the 1950s as a mechanism for
buying US dollars on the black market to avoid domestic taxes and duties on
the official purchase of US dollars and imported goods purchased with dollars.

FinCEN reported that black market currency exchange systems have evolved
beyond the Colombian BMPE method, mainly because of increased diligence
by US banks.

103
Q

Black Market Peso Exchange Part 2

A

A common method of placement is structured deposits in the form of cash and other instruments , ML use account holders to smuggle cash in bulk from the US which is then placed in foreign instituitions.

104
Q

BMPE Typical transaction

A

A BMPE employee is in contact with a drug trafficker who wants to bring over his USD to Mexico and convert to pesos.

Peso broker finds businesses in Mexico willing to buy goods from the US and needs USD.

Peso broker arranges for the illegal USD to be given to US vendors to pay for the goods purchased.

Once goods are shipped and sold by the Mexico based business , the pesos are given to the broker who then pays the trafficker in Mexico.

105
Q

Links of TMBL and BMPE schemes (Case
example: Methods of money laundering)

A

The DEA found that the network ran operations in the US and Columbia that
enabled drug traffickers to move funds into the banking system. They then
laundered the funds and moved them across the border, using a blackmarket peso exchange (BMPE) scheme. Among the charges was operating
an MSB without a license

In January 2020, an investigation by the Offices of the United States Attorneys
and the DEA discovered that drug dealers in the US were connected to
Columbian drug cartels. These dealers generated US dollars by selling
Columbian drugs in the US

The US based Agarwal Electronics Business exported consumer electronics
globally, including to Columbia. Its CEO knowingly participated in the scheme
and worked with the money broker by offering use of his bank account to
receive the funds in the US

This account was then used to transfer the
proceeds of drug sales to accounts in Middle and South America. Upon
receiving the funds into his bank account, the CEO arranged for the export of
the roughly equivalent value of electronics products to certain Colombian
suppliers. They in turn arranged to pay for the products by delivering pesos to
an individual in Colombia

106
Q

Links of TMBL and BMPE schemes (Case
example: Methods of money laundering)

A

Key takeaways
* The BMPE scheme enabled the cartels to place the money into the
banking system and move it across borders.
* A TBML scheme was used to pay the money brokers in Columbian pesos.
* Cash intensive business and cross border activity are at higher risk of being
used to facilitate money laundering

107
Q

Complex TBML/BMPE schemes (Case
example: Methods of money laundering)

A

In April 2015, FinCEN issued a GTO that lowered cash-reporting thresholds and
implemented additional recordkeeping requirements for certain financial
transactions for approximately 700 Miami-based electronics exporters

drug proceeds in the United States are converted into goods that are shipped to South America, sold for local currency, and ultimately transferred to drug cartels

Key takeaways
* DTOs (Drug Trafficking Organisations) take advantage of complex BMPE schemes involving the export of
goods across the US/Mexico border to help move funds from the US back
to the country where the DTO is based.
* Lower cash-reporting requirements can help enforcement agencies
detect BMPE schemes and alert regulated organizations to potentially suspicious activity.
* Robust recordkeeping can help to detecting BMPE schemes, so that
enforcement officers can access a regulated organization’s transaction
records.

108
Q

Wildlife Trafficking

A

Wildlife trafficking is defined as the illegal trade, smuggling, poaching, capture,
and collection of endangered species and protected wildlife. It also includes
wildlife derivatives and byproducts, such as leather, food, medicines, and
exotic pets

109
Q

Wildlife Trafficking-Stages

A

1.Source-Location where poaching takes place, lowest profit generation
2.Transit-Movement of wildlife these can clear customs
3.Destination-Arriving at final destination

110
Q

Wildlife Trafficking-How to fight it

A
  • Joining the United for Wildlife Financial Taskforce and signing the Mansion House Declaration
  • Using current suspicious activity reporting mechanisms to report potential wildlife trafficking
  • Reviewing United for Wildlife Financial Taskforce intelligence alerts and
    implementing policies and procedures to support the detection and
    reporting of wildlife trafficking
  • Reviewing FATF’s Money Laundering and the Illegal Wildlife Trade report
    for valuable insights and red flags
111
Q

Risk Associated with New
Payment Products and Services-

Prepaid Cards, Mobile Payments, and
Internet-Based Payment Services

A

In October 2006, FATF first published a report that examined the ways in
which money can be laundered through the exploitation of new payment
methods, such as prepaid cards, internet payment systems, mobile payments,
and digital precious metals. The report found that, although there is a legitimate
market demand for these payment methods, money laundering and terrorist
financing vulnerabilities exist

Since 2006, FATF has published additional guidance on
new payment methods, typologies, and the risk-based approach

112
Q

Prepaid cards

A

They are portable, valuable, exchangeable, and anonymous.
Typically, prepaid products require the consumer to pay in advance for future
purchases of goods and services

Open or close loop. Openloop prepaid cards, many of which are network branded by American Express, Visa, or MasterCard, can be purchased and loaded with money by one person and used like regular debit cards by the same person or another
person to make purchases or ATM withdrawals anywhere in the world

Closed-loop prepaid products are of limited use for a specific purpose or
service, such as with a certain merchant or retailer

There might be an account for
each card that is issued or, alternatively, a pooled account that holds the
prepaid funds for all cards issued.

113
Q

Prepaid cards-Risk Factors

A
  • Anonymous cardholders
  • Anonymous funding
  • Anonymous access to funds
  • High value limits and no limits on the number of cards individuals can
    acquire
  • Global access to cash through ATMs
  • Offshore card issuers that might not observe laws in all jurisdictions
  • Use as substitute for bulk-cash smuggling

5th AML directive 2020: EU
the monthly transaction limit and maximum amount that can be stored on prepaid cards not subject to due diligence is €150. Online
transactions associated with such cards have similarly been limited to €50. Geographic restrictions also used.

114
Q

Electronic money

A

JMLSG’s sectoral guidance

E-money products can be card-based,
app-based, or online account-based

All UK e-money institutions are regulated by the FCA and governed under the Electronic Money Regulations (2011), which require
compliance with all AML/CFT and sanctions requirements. In the UK, this means all e-money institutions are subject to the Money Laundering Regulations 2017

115
Q

Electronic money-Risk Factors

A
  • High transaction or purse limits
  • The ability of a customer to hold numerous purses or cards
  • E-money issuers using complex business models (e.g., “white-label”
    products and outsourcing, particularly to overseas jurisdictions), resulting in
    a complex AML/CFT control environment
  • Certain merchant activity with high-risk businesses, such as gambling,
    which allows for the movement of higher amounts of funds
  • Funding with unverified persons, whether customers or third parties
  • Funding with cash that leaves no electronic trail to the source of funds, as
    well as the ability for cash withdrawal
  • Funding with other e-money that lacks verified persons and/or source of
    funds
  • Non-face-to-face transactional activity
  • Features that increase the functionality of the card in terms of how to
    execute transactions, such as person-to-person, business-to-person,
    business-to-business, and person-to-business transactions
116
Q

Electronic money-Controls

A
  • Conducting robust oversight of outsourced functions
  • Placing limits on storage values, transactions, and turnover
  • Implementing transaction monitoring systems
  • Implementing systems to detect individuals holding multiple
    purses, accounts, and cards, including across multiple e-money issuers
  • Utilizing geolocation, device-related information, and IP addresses to
    identify discrepancies in customer activity
  • Cooperating with merchants that accept e-money to better detect
    suspicious activity
  • Instituting geographic restrictions on the use and function of e-money
    products

FATF guidance paper Digital
Identity, non-face-to-face onboarding can be just as robust, if not more so, as
face-to-face onboarding when the appropriate systems and controls are in
place to verify identities using reliable, independent sources

117
Q

Virtual Currency

A

Although a simplification, VCs often fall into two categories: centralized and decentralized

the Bahamian Sand Dollar, the first fully launched central bank digital currency)
or a non-government administrator (e.g., Facebook’s Diem). Decentralized
VCs (e.g., Bitcoin) have no repositories or administrators, but they work as a
peer-to-peer media of exchange without the need for an intermediary

VCs can be convertible or non convertible

VCs allow value to be transmitted anywhere in the world without the requirement of a centralized bank or institutional authority.

For most coins, there is a value that is
expressed in fiat currency that is based upon economic and market
forces

it can be difficult to identify who is
behind a specific wallet address, where the funds originated, and the
destination of the funds in the “fiat” space

118
Q

Virtual Currencies-Guidance

A

FinCEN was one of the first FIUs to offer interpretative guidance on VCs and to
clarify their regulatory status. FinCEN categorized participants in the
ecosystem into three segments:

  • A User is a person who obtains VC to purchase goods or services.
  • An Exchanger is a person engaged as a business in the exchange of VC for
    real currency, funds, or other virtual currency.
  • An Administrator is a person engaged as a business in issuing VC and who
    has the authority to redeem such virtual currency

Admins/Exchangers are considered MSB and must comply with AML laws

VC kiosks use distributed ledger technology not controlled by a single administrator

FATF Recommendation 15- VASPs to be regulated

119
Q

Corporate Vehicles- IBC

A

International business corporations (IBCs) are entities formed outside a
person’s or business’s country of residence, typically in offshore jurisdictions

IBCs permit the person to
reduce transparency between the owner in her home country and the
offshore entity where the company is registered

IBC typically require registration via agent in jurisdiction which may reduce transparency

Private investment
companies are established and used in a similar manner; however, they are
typically limited to holding investment assets in tax-neutral offshore financial
jurisdictions

120
Q

Virtual currency (Case example: Dark web)

A

Operation DisrupTor’s actions in the US and Europe resulted in the arrest of 179 darknet drug traffickers and other criminals

seizure of over US$6.5 million in cash and virtual currency, mainly Bitcoin, 500 kilograms of drugs worldwide, and 63 firearms.

conducted by the US Joint Criminal Opioid and Darknet Enforcement (JCODE) and Europol

One criminal group operating in the US city of Los Angeles completed more than 18,000
individual drug sales on several darknet sites

Key takeaways
* Cryptocurrency is the preferred payment method for darknet.

  • Law enforcement is increasingly capable of countering encryption and identifying anonymous data sources and transactions.
  • Criminals will always search for new avenues of communication to avoid
    detection
121
Q

Use of virtual currency (Case example:
Methods of money laundering)

A

2017 Investigation BTC-e, users were allowed to

  • Operate with high levels of anonymity, limited ID requirements
  • Obscure and anonymize transactions
  • Openly discuss criminality on the BTC-e user chat
  • Obtain advice from BTC-e on how to access illegally obtained money from
    drug sales

Alexander Vinnik charged by Paris for ML

BTC-e was seized with 38% of user funds , ML worth USD 4 Billion

Vinnik linked to corruption and organized crime

122
Q

Virtual Currencies-FATF

A

The Second 12-Month Review of the
Revised FATF Standards, released in July 2021, noted that significant progress
had been made globally in implementing the revised Recommendations, but
that more work was still needed. Of 128 jurisdictions assessed in 2021, 70 (55%)
had yet to implement the revised Recommendations into national law

The report noted that the most
common misuse of VCs was connected to sales of illicit substances,
particularly through activity on the “dark web.”

FATF updated guidance to include risk indicators which include, peer to peer VC exchanges and the travel rule

Guidance addresses how FATF applied to specific Fiat currency or commodity this followed a report to te G 20, guidance also takes about Decentralized Finance-DeFi

123
Q

Use of virtual currency (Case example:
Methods of money laundering)-Key Takeaways

A

1.Crypto exchanges offer anonymity
2.VCs tough to track as only done via user exchange account or wallet address
3.Crypto transactions conducted within seconds
4.VC Risk assessments should be done

124
Q

Corporate Vehicles Used to
Facilitate Illicit Finance-Public Companies and Private Limited
Companies-LLC

A

LLCs are an attractive vehicle because they can be owned or managed anonymously

FinCEN has undertaken a number of activities to better monitor LLCs

125
Q

Shell and Shelf Companies

A

FATF offers the following definitions:
* Shelf company: A corporation that has had no activity; it has been created and “put on the shelf.” This corporation is then later sold to someone who prefers a previously registered corporation over a new one.

  • Shell company or corporation: A company that at the time of incorporation has no significant assets or operations
126
Q

FATF issued a report called The Misuse of Corporate Vehicles, Including Trust and Company Service Providers

A

it states that the ease with which
corporate vehicles can be created and dissolved in some jurisdictions is of particular concern. This allows the vehicles to be used not only for legitimate purposes (e.g., business finance, mergers and acquisitions, and estate and tax
planning), but also by financial criminals to conceal the sources of funds, while keeping their ownership concealed

127
Q

Shell Companies

A

Shell companies can be set up in onshore as well as offshore locations, and their ownership structures can take several forms

Shell companies are often legally incorporated and registered by the criminal organization, but they have no legitimate business

Sometimes, the stock of these shell corporations is issued in
bearer shares, which means that whoever carries them is the purported owner

128
Q

The Money Laundering in Canada report

A

offered four related purposes for establishing or controlling a shell company for money laundering:

1.Convert cash proceeds of crime into alternative assets
2.Create illusion that illicit funds generated from legal source, the shell company can then create commercial accounts with other businesses to further layer and place the illicit funds
3.Can be used to hire criminals, lend money to criminals buy real estate etc
4.Effective in concealing ownership, Nominees can be used as directors,officers and shareholders. Can be established as an offshore subsidiary of another company.Can register assets in their own name.

129
Q

The Money Laundering in Canada report part 2

A

The Canadian report identifies the following money laundering techniques used in conjunction with criminally controlled companies:

1.Using nominees as owners or directors:Nominees will often, but not always, have no criminal record. Further, companies established by lawyers are often registered in the lawyers’ names

2.Layering: Several companies are established to create a complex structure

3.Loans: Lending money between criminal organizations to avoid detection

4.Fake invoicing/business: Use of double invoicing , an org owns both companies and uses a purchase/sale fake transaction to make the transaction appear legitimate.

  1. Sale of business: Becomes a legitimate source of capital

6.Buying a company already owned by the enterprise: Used to repatriate illicit money sent to tax havens , criminal proceeds from offhsore are used to buy a company already owned by the enterprise.

7.Paying out fake salaries

130
Q

Trusts

A

Trusts are private fiduciary arrangements that allow a grantor, or settlor, to place assets for future distribution to beneficiaries

The grantor/settlor will usually appoint a third party, a trustee, to administer the assets in accordance with the instructions provided in the trust document

Revocable and Irrevocable

Trust assets can flow to the beneficiaries in a variety of ways

Trusts also name “remaindermen,” who are designated to receive any residual assets after the conclusion of the trust’s term

Trusts can be used to conceal ownership via secrecy rules in some jurisdictions , can hide assets from creditors ,protect property from seizure

131
Q

Asset Protection Trusts

A

an asset protection trust (APT) is a form of irrevocable
trust that is usually created (i.e., settled) offshore for the principal purposes of preserving and protecting part of one’s wealth from creditors

APTs are generally used for asset protection and are usually tax neutral. Their ultimate function is to provide for beneficiaries. Some proponents advertise APTs as allowing foreign trustees to ignore US court orders and simply transfer the trust to another jurisdiction in response to legal action threatening the trust’s assets.

Lawyers often serve as trustees by holding money or assets “in trust” for clients. This enables lawyers to conduct transactions and administer the client’s affairs.

132
Q

Terrorist Financing

A

FATF issued the first eight of its Special
Recommendations, which have since been incorporated into the current
FATF Recommendations. (See the chapter “International AML/CFT Standards”
for more detail.)

Recommendation 5 encourages countries to criminalize terrorist financing
and the financing of terrorist organizations and individual terrorists with or
without a link to a specific terrorist act, as well as ensuring these crimes are
designated as money laundering predicate offenses

133
Q

Differences and Similarities between
Terrorist Financing and Money Laundering

A

The most basic difference between the two crimes involves the origin of the
funds. Terrorist financing uses funds for an illegal political purpose, but the
money is not necessarily derived from illicit proceeds

Although it would seem logical that funding from legitimate sources does not need to be laundered, terrorist groups do need to
disguise the link between them and their legitimate funding sources

134
Q

Hawala System

A

The hawala system is an informal value-transfer system involving the
international transfer of value outside the legitimate banking system. Based on
a trusted network of individuals, this system has also played a role in moving
terrorist-related funds.

money raised for terrorist groups can be
used for mundane expenses

135
Q

Detecting Terrorist Financing

A

To avoid becoming conduits for terrorist financing, organizations must
consider, among other things, the following factors:
* Use of an account as a front for a person with suspected terrorist links
* Appearance of an account holder’s name on a list of suspected terrorists
* Frequent large cash deposits in accounts of nonprofit organizations
* High volumes of transactions in accounts
* Lack of a clear relationship between the banking activity and the nature of
the account holder’s business

136
Q

Detecting terrorist financing (Case
example: The Maute Group)

A

The 2018 Analyst Exchange Program (AEP) was a multinational project
involving financial intelligence analysts from Australia, the Philippines, Malaysia,
and Indonesia

The Maute terrorists were trained by the Islamic State of Iraq and Syria (ISIS) and gained experience in Syria and Iraq, or they were trained locally by a wealthy Muslim
family, the Maute family. They were funded by:
* The Maute family
* ISIS
* The sale of shabu, a slang term for methamphetamine
* Anonymous mobile payments

137
Q

Detecting terrorist financing (Case
example: The Maute Group)-Key Takeaways

A

Key takeaways
* Terrorists need to raise, move, store, and use funds in order to sustain their
operations.
* Countries must identify, assess, and understand terrorist financing risk as
an essential part of dismantling and disrupting terrorist networks.
* Engaging with foreign counterparts is important in detecting and assessing
cross-border terrorist financing risks.
* It’s important to establish procedures and mechanisms to handle the
exchange of sensitive information at an early stage in collaboration.

138
Q

How Terrorists Raise, Move, and Store
Funds

A

They have forged destructive and very profitable links with drug and criminal
syndicates—among others. And they abuse charitable causes to trick individuals to contribute

oil trade, extortion, undetected cash couriers, kidnapping for ransom, trafficking
of humans and arms, and racketeering

139
Q

Use of Hawala and Other Informal Value
Transfer Systems

A

Alternative remittance systems, or informal value transfer systems (IVTSs), are
often associated with ethnic groups from Africa, Asia, and the Middle East.

Hawala was created centuries ago in India and China for the movement of funds

Merchant traders would deposit funds with a hawala broker or hawaladar, who typically owned a trading business. The hawaldar for a fee would make sure the funds are available for withdrawal from another hawaldar.

Nowadays, deposits and withdrawals are made through hawala bankers rather than traditional financial institutions. The third parties are typically immigrants or visiting workers who send small sums to their homelands to avoid bank fees for wire transfers

140
Q

Why use Hawala?

A

Reasons for legitimate use of hawala and other IVTS include less expensive and faster money transmission, lack of banking access in the remittance-receiving country, cultural preference, and lack of trust in the
formal banking system

No physical movement of currency
and poor controls regarding verification and recordkeeping. The money transfer takes place by coded information that is passed through chits, couriers, letters, faxes, emails, text messages, and online chat systems, followed by some form of telecommunications confirmation

FATF has said that regulation and supervision of hawalas and other similar service providers remains a key challenge to authorities

Because hawala is a remittance system, it can be used at any phase of the money laundering cycle

141
Q

Hawala System in the ML stages

A

Placement: Broker receives cash and deposits in the banks

Layering: Account to account transfer using several brokers to make the money trail more difficult

Intergration: The money can be
reinvested in a legitimate (or legitimate-appearing) business. A hawaladar
could, for example, very easily arrange for the transfer of money from the
United States to Pakistan and then back to the United States, apparently as
part of an investment in a business there

Hawalas are not subject to formal goverment oversight, Al Qaeda used 12 trusted brokers before 9/11

142
Q

Detecting terrorist financing (Case
example: Use of hawala and other informal
value transfer systems)

A

Mohammad Younis pled guilty in Manhattan federal court to operating an unlicensed money transfer business between the United States and Pakistan

January to May 2010, Younis provided money transmitting services to individuals in the New York City area by assisting in the operation of a hawala

Younis provided thousands of dollars in cash to the individuals at the direction of a coconspirator in Pakistan, but without
knowledge of how the customers were planning to use the funds. At no time
did Younis have the license to operate a money transmitting business from
either state or federal authorities

143
Q

Detecting terrorist financing (Case
example: Use of hawala and other informal
value transfer systems)-Key Takeaways

A
  1. Hawalas can be used to transfer funds out of some countries
  2. Hawalas are useful for moving funds for illicit purposes
  3. Limited scrutiny makes Hawaldars attractive
144
Q

Use of Charities and Nonprofit
Organizations (NPOs)

A

the US government initiated the
Terrorist Finance Tracking Program (TFTP) to identify, track, and pursue the
funding sources of terrorist groups.

FATF acknowledges the importance of the nonprofit organization (NPO) sector to the global community. However, FATF found that more than a decade after the abuse of NPOs by terrorists and terrorist
organizations was formally recognized as a concern, the terrorism threat to
the sector remains.

145
Q

Charities and NPOs attractiveness for ML

A
  • Enjoying the public trust
  • Having access to considerable sources of funds
  • Being cash-intensive
  • Frequently having a global presence, often in or next to areas exposed to
    terrorist activity
  • Often being subject to little or no regulation and/or having few obstacles to
    their creation

FATF issued guidelines on best practices for charities in combating the abuse of NPOs,recommendation 8 says to use a risk based approach when providing service to NPOs to ensure NPOs not abused by Terrorist groups and cannot be exploited

146
Q

Charities and NPOs attractiveness for ML-FATF and Charity commission recommendations

A

1.NPOs to maintain a full budget accounting for everything
2.Use formal bank accounts to store and transfer funds

The Charity Commission is an independent regulator of charities in England
and Wales which states a 4 pronged approach

  1. Cooperation with regulators national and international
  2. Raising awareness in the sector of the risks charities face from terrorism
  3. Proactive monitoring of the sector in
    areas identified as being at higher risk
  4. Intervention when abuse, or the risk of abuse, related to terrorist activity is
    apparent
147
Q

Detecting terrorist financing (Case
example: Using NPOs)

A

NPO collecting funds for humanitarian purposes outside religious instituitions , funds held in bank account

NPO was assisting Terrorists

NPOs can also collect in one country and transfer to another in another country to aid Terrorists there

148
Q

Detecting terrorist financing (Case
example: Using NPOs)-Key Takeaways

A
  • NPOs are at high risk for exploitation by terrorists.
  • The diversion of funds occurs when funds raised for charitable purposes are redirected to support terrorist activity.
  • The diversion of funds can be perpetrated internal or external individuals to the org.
  • Diverted funds are used to support terrorist activities both domestically
    and abroad
149
Q

Detecting terrorist financing (Case
example: NPOs and Islamic Defenders Front
of Indonesia)

A

One method exploitation of NPOs to support terrorism is to form an operational affiliation between an NPO and a terrorist entity. These affiliations can range from informal personal connections involving NPO directors and terrorist entities to more formalized relationships

The Islamic Defenders Front (FPI), conducted vigilante operations.

FPI gained support by appearing to be an NPO that provided voluntary-based welfare services in disaster-struck and poverty-ridden regions and neighborhoods

On Dec 30, 2020 the FPI was banned , 29 convicted of terrorism.

150
Q

Detecting terrorist financing (Case
example: NPOs and Islamic Defenders Front
of Indonesia)-Key Takeaways

A
  • A key risk that NPOs face is that they operate in the same vulnerable environments in which terrorists operate.
  • Affiliations between NPOs and terrorists can range from informal personal connections to more formalized relationships.
  • In NPOs that are exploited by internal actors affiliated with terrorist entities, these individuals are able to exercise influence over the NPO’s operations to ultimately support terrorist activities.
  • Organizations must know their NPO customers, their staff members, and the individuals and entities with whom the NPO affiliates.
151
Q

Emerging Risks for Terrorist Financing

A

FATF warns of several rising threats and vulnerabilities, including:
* Self-funding by foreign terrorist fighters (FTFs)
* Raising funds through social media
* New payment products and services
* Exploitation of natural resources

152
Q

Self-funding by FTFs

A

FTFs and terrorist sympathizers can self-radicalize and communicate with terrorist organizations more efficiently than ever before

Self funding can be family, employment, social assistance, bank loans.

Terrorists have leveraged social media through
methods such as crowdfunding and sharing of virtual and prepaid account information

153
Q

Exploitation of natural resources

A

Gas, oil, timber, diamonds, gold and other
precious metals, wildlife (e.g., ivory trading), and historical artifacts, or extort companies that extract those resources to both fund terrorist acts and support day-to-day activities.

Regulators must be aware in which terrotories terrorists operate

Red flags include the association of a customer with
PEPs, complex legal entities structures with multiple internal transactions, and the rapid shipment of resources to distant jurisdictions

154
Q

Detecting terrorist financing (Case
example: Islamic State and cryptocurrency)

A

Chaudhary received money from supporters and transferred over £50,000 abroad using Bitcoin

These funds paid smugglers to help captured ISIS militants escape from Kurdish-controlled prison camps in northern Syria

Chaudhary immersed himself online on encrypted chat and video platforms, from which he spread terrorist propaganda and solicited funds

155
Q

Detecting terrorist financing (Case
example: Islamic State and cryptocurrency)-Key Takeaways

A
  • Terrorists are adapting to technology and increasingly conducting
    transactions digitally, including through cryptocurrency.
  • Terrorists also use cyber-enabled tools to communicate.
  • Law enforcement employs tools and investigative techniques to identify terrorist funding through misuse of cryptocurrency.
  • Criminals often attempt to disguise terrorist funding as humanitarian activity.
  • The first line of defense (LOD) is responsible for identifying and reporting suspicious cryptocurrency activity.
156
Q

Detecting terrorist financing (Case
example: Use of social media)

A

According to the “Social Media & Terrorist Financing Report,” by the
Asia/Pacific Group on Money Laundering (APG) and the Middle East & North Africa Financial Action Task Force (MENAFATF), multiple platforms have been exploited by organized networks to collect donations for extremist organizations

One case was detected through suspicious matter reports (SMRs) received by the Kuwait financial intelligence unit (FIU)

Social media services, including Facebook, YouTube, Telegram, Twitter, and Instagram, were used to collect donations for extremist organizations

Cash, ATM deposits, bank transfers, bank websites, and exchange companies were used for funding

Monitoring and surveillance of social media platforms by law enforcement can
greatly enhance the detection of social media abuse by terrorists

157
Q

Detecting terrorist financing (Case
example: Use of social media)-Key Takeaways

A
  • Social media can serve as a tool to facilitate and enable terrorist funding,
    recruitment, and propaganda.
  • Social media services are commonly used as communication channels by
    terrorists and their financiers to solicit funding.
  • Multiple social media platforms are exploited by organized networks.
  • Monitoring and surveillance of social media platforms by law enforcement
    can greatly enhance the detection of social media abuse by terrorists.
158
Q

Electronic Transfer of Funds

A
  • Funds transfers occur to or from a financial secrecy haven or high-risk geographic location without an apparent business reason or when the activity is inconsistent with the customer’s business or history.
  • Large incoming funds transfers are received on behalf of a foreign client, with little or no explanation or apparent reason.
  • Checks and money orders are used to receive many small, incoming
    transfers of funds or to make deposits. Upon credit to the account, all or most of the transfers or deposits are wired to another account in a
    different geographic location in a manner inconsistent with the customer’s business or history.
  • Funds activity is unexplained, repetitive, or reveals unusual patterns.
  • Payments or receipts are received that have no apparent link to legitimate contracts, goods, or services.
  • Funds transfers are sent or received from the same person to or from different accounts
159
Q

Remote Deposit Capture

A

efforts must be made to integrate RDC processing into other controls, such as monitoring and fraud-prevention systems.

sequentially numbered checks and money orders

total volume of activity processed for an account via RDC is
incorporated into the overall transaction monitoring system

limits are placed on a customer’s ability to deposit checks via RDC

160
Q

Correspondent Banking

A

Correspondent banking is vulnerable to financial crime, especially because correspondent banks do not know the customers of the respondent directly and rely on the respondent bank’s internal controls

Before establishing correspondent accounts, a bank should identify the respondent bank’s owners and understand the nature of its regulatory oversight

a bank’s due diligence on a respondent bank should be based on the respondent’s risk profile and the nature of the business relationship with that respondent bank

If the parent does not exercise substantial and
effective control, due diligence should be conducted on both the respondent

161
Q

The risks of correspondent banking

A
  • The correspondent does not or cannot conduct typical due diligence to know the customers of the respondent
  • The correspondent does not have data on respondent transactions that typically enable transaction monitoring controls
  • The correspondent can identify the respondent’s regulators, but not
    always the degree of supervision
  • The correspondent might have limited information on the respondent’s anti-financial crime controls—perhaps through a questionnaire—yet still needs to rely on the respondent
  • Some respondents are, themselves, correspondents to third banks, a practice called “nesting.” Nested accounts further shield correspondent banks from knowing the parties involved
162
Q

Correspondent banking (Case example:
Methods of money laundering)

A

July 2020,New York State Department of Financial Services (DFS) ,US$150 million,

significant compliance failures in connection with the bank’s relationship with disgraced American financier Jeffrey Epstein
and its correspondent banking relationships, including those with Danske Bank Estonia (Danske) and FBME Bank

Billions of dollars in suspicious transactions passed through Deutsche Bank’s accounts and, in the case of Danske, significant flows were linked to money laundering by Russian oligarchs

nternal compliance controls had flagged concerns with
FBME as early as 2005 and with Danske Bank Estonia from the start of the relationship in 2007,Deutsche Bank identified 826 suspicious transactions associated with FBME Bank after that rating

FBME Bank declined to respond to Deutsche Bank’s queries regarding UBOs,UBO was a Russian businessman associated with a Syrian military research and development organization

In 2013 and 2014, Deutsche Bank compliance staff recommended that the relationship be exited, but no action was taken until 2015.Over US$150 billion was routed from Danske Bank Estonia through Deutsche Bank. Deutsche Bank identified 340 suspicious transactions

163
Q

Correspondent banking (Case example: Methods of money laundering)-Key takeaways

A
  • Senior management support is essential for compliance officers to
    effectively execute their duties.
  • Organizations that ignore red flags associated with a customer relationship can suffer significant reputational, regulatory, and financial consequences.
  • Nested accounts are high-risk because
    o Correspondent banks should include periodic reviews of their
    respondent bank’s AML/CFT framework as part of their larger AML/CFT framework.
    o Correspondent banks need to undertake risk assessments and ensure that their policies and procedures regarding respondent bank
    relationships and their transactions are adequate to mitigate against
    identified risks, especially in high-risk relationships.
164
Q

Payable-Through Accounts

A

the respondent bank’s customers are permitted to conduct their own transactions

PTAs differ from typical correspondent accounts in that the foreign bank’s customers have the ability to directly control funds at the correspondent bank

PTAs can have a virtually unlimited number of subaccount holders

Sometimes, however, the identification of the subaccount holders is not given to the correspondent bank.

165
Q

Payable-Through Accounts-Risks

A
  • PTAs with foreign institutions licensed in offshore financial service centers with weak or under-developed bank supervision and licensing laws
  • PTA arrangements in which the correspondent bank regards the
    respondent bank as its sole customer and fails to apply its customer due diligence (CDD) policies
  • PTA arrangements in which subaccount holders have currency deposit and withdrawal privileges
  • PTAs used in conjunction with a subsidiary, representative, or other office of the respondent bank, which might enable the respondent bank to offer the same services as a branch without being subject to supervision
166
Q

Use of payable-through accounts (Case example: Methods of money laundering)

A

Lombard Bank Ltd, a bank licensed by the South Pacific island of Vanuatu, opened a correspondent PTA at American Express Bank International (AEBI)

Lombard offered its Central American customers nearly full banking
services through its PTA at AEBI

Lombard’s PTA subaccount holders brought cash deposits to Lombard representatives in four Central American countries. Lombard couriers would then transport the cash to the bank’s Miami affiliate, Lombard Credit Corporation, for deposit in the PTA at AEBI. Lombard customers also brought cash to the Lombard office in Miami, which was located in the same building as AEBI. That cash was also deposited in AEBI’s PTA

June 1993, as much as US$200,000 in cash was received by Lombard’s Miami affiliate on 104 occasions

167
Q

Use of payable-through accounts (Case example: Methods of money laundering)-Key takeaways

A
  • PTAs often do not know the source of funds and customers’ identities.
  • Because PTAs can be offered to an unlimited number of subaccount
    holders, the exposure of correspondent banks to financial crime is very high.
  • When correspondent banks offer PTAs, they should set clear limits on their use, depending on internal policies and the risk profile of the respondent
168
Q

Private Banking

A

The following factors can contribute to the vulnerabilities of private banking to
money laundering:
* Perceived high profitability
* Intense competition
* Powerful clientele
* High level of confidentiality
* Close trust developed between relationship managers and their clients
* Commission-based compensation for relationship managers
* Culture of secrecy and discretion developed by the relationship managers for their clients
* Role of relationship managers as client advocates to protect their clients
* Use of private investment companies by clients to reduce transparency of their beneficial owners
* Clients maintaining personal and business wealth in numerous jurisdictions,
including offshore jurisdictions
* Clients’ ability to utilize and control numerous legal entities for personal and family estate planning purposes

169
Q

Private banking (Case example)

A

FCA,2015,These regulatory breaches related to a £1.88 billion transaction that Barclays arranged

customers involved were politically exposed persons (PEPs)
The FCA fined Barclays more than £72 million

it assessed the transaction as high risk due to the involvement
of private banking, ultra-high net-worth customers, and PEPs, among other factors

Barclays did not obtain the necessary information from the customers to comply with financial crime requirements.

Barclays agreed to keep details of the transactions strictly confidential, even within the firm, and to compensate the customers up to £37.7 million if it failed to comply with these confidentiality restrictions

170
Q

Private banking (Case example)-Key Takeaways

A
  • Business interests should never take precedence over compliance with laws and regulations.
  • The close relationships established in private banking often require a higher degree of confidentiality, but this should not reduce or minimize the required compliance checks.
  • Strong AML/CFT compliance programs need organizations to follow the policies and procedures that support them.
  • Failure to follow a robust compliance plan can lead to fines, even if no actual financial crime event occurred.
171
Q

Use of Private Investment Companies in
Private Banking

A

PICs are corporations established by individual bank customers and others in offshore jurisdictions to hold assets

They are shell companies formed to maintain clients’ confidentiality and serve various tax- and trust-related purposes

Secrecy laws of offshore havens can conceal UBOs

some PICs are established by company formation agents with nominee directors who hold titles to companies for the benefit of individuals

172
Q

Use of PICs in private banking (Case
example: Methods of money laundering)

A

In 2014, Israeli-based Bank Leumi admitted that it had assisted more than 1,500 US taxpayers in hiding their assets in Bank Leumi’s offshore affiliates in Switzerland and Luxembourg

the bank assisted in organizing nominee corporate entities
registered in Belize and other offshore jurisdictions to hide their clients’ private offshore accounts and maintained several US clients’ accounts under
assumed names or numbered accounts

Key takeaways
Nominee corporate entities registered in high-risk offshore jurisdictions are an attractive vehicle for evading tax obligations.
* Care should be taken when dealing with assets associated with nonnationals to reduce the risk of them being moved or placed to deliberately avoid tax.
* Facilitating tax evasion is a serious offense that can lead to large fines and negatively impact a regulated firm’s ability to do business with certain customers and jurisdictions.

173
Q

Politically Exposed Persons

A

Relatives and close associates of PEPs are also considered to be PEPs. The definition of PEPs is not intended to cover middle ranking and more junior individuals in the above categories

174
Q

Structuring

A

It is a crime in many countries and must be reported by filing a suspicious activity report (SAR).

The individuals engaged in structuring may be “runners” hired by the launderers, that is, individuals who travel from bank to bank depositing cash and purchasing monetary instruments in amounts under reporting thresholds

“Smurfing” is a common structuring technique that involves multiple individuals making multiple cash deposits and/or buying multiple monetary instruments or bank drafts in amounts under the reporting threshold to evade detection.

175
Q

Structuring (Case example: Methods of
money laundering)

A

In June 2018, Commonwealth Bank (CBA) agreed to pay a AUD700 million settlement plus legal costs

In Australia, banks are required to file threshold transaction reports (TTRs) to AUSTRAC for transactions of AUD10,000 or more within 10 business days. CBA failed to report over 53,000 transactions Intelligent deposit machines (IDMs)

AUSTRAC alleged that CBA did not limit the number of transactions a customer could make per day; its IDMs allowed up to 200 bills per transaction. A criminal who inserted AUD100 bills could deposit up
to AUD20,000 in one transaction

In May and June 2016, more than AUD1 billion in cash moved through CBA’s IDMs

176
Q

Structuring (Case example: Methods of
money laundering)-Key takeaways

A
  • Structuring can involve many channels, such as IDMs.
  • Adequate controls must be in place to ensure proper monitoring and reporting.
  • New technologies need to be critically assessed for AML/CFT risks.
  • Organizations need to limit the number of customers’ daily transactions and the number of bills per transaction
177
Q

Microstructuring

A

the cash proceeds of US drug sales were deposited into accounts in New York with linked ATM cards, which were provided to associates in Colombia. Deposits were made on a regular schedule, with the Colombian associates withdrawing the funds as they were deposited and giving them to the drug lords

Microstructuring red flags include:
* The use of counter deposit slips instead of preprinted deposit slips
* Frequent activity in an account immediately following the opening of the account with only preliminary and incomplete documentation
* Frequent visits to make cash deposits of nominal amounts that are
inconsistent with typical business or personal banking activity
* Cash deposits followed by ATM withdrawals, particularly in high-risk
countries
* Cash deposits made into business accounts by third parties with no
apparent connection to the company

178
Q

Credit Unions and Building Societies

A

In general, they help to negotiate shared contracts for common services, allowing many smaller credit unions to leverage economies of scale that they would not otherwise be able to do

credit unions operate very similarly to banks in most jurisdictions. They have capital, liquidity, riskmanagement, recordkeeping, and reporting obligations similar to banks, although there might be minor differences between institutions that are subject to the oversight of regional versus federal regulators and regulations.

Joint Money Laundering Steering Group (JMLSG),credit unions potentially pose lower money laundering and terrorist financing risks, because they typically have a restricted or localized customer base and offer fewer products and services, with more limitations, than retail banks

One risk factor highlighted is adult parents or guardians who
use a child’s account to launder funds

179
Q

Credit Card Industry

A
  • Credit card associations, such as American Express, MasterCard, and Visa,
  • Issuing banks, which solicit potential customers and issue the credit cards
  • Acquiring banks, which process transactions for merchants who accept credit cards
    Third-party payment processors (TPPP), which contract with issuing and acquiring banks to provide payment-processing services to merchants and other business entities
180
Q

Third-Party Payment Processors

A

provide payment-processing services to merchants and other business entities

Often, they are not subject to AML/CFT requirements.

TPPPs traditionally contracted with US retailers (i.e., merchants) that had physical locations in the United States in order to help collect monies owed by customers

also covered ACH debits and creating and depositing remotely created checks (RCCs)

181
Q

risks posed by TPPP

A
  • Multiple financial organization relationships: The TPPP might maintain relationships at multiple organizations, which hinders the organizations’ ability to know the entire customer relationship
  • Money laundering: TPPPs can be used by criminals to mask transactions and launder the proceeds of crime
  • High return rates from unauthorized transactions: TPPPs engaged in suspicious activity, and those being used by criminals might have higher than average return rates related to unauthorized transactions
182
Q

Money Services Business

A

(MSB) or money or value transfer service (MVTS), as defined by FATF, transmits or converts currencies
* Dealer in foreign exchange
* Check casher:
* Issuer of traveler’s checks or money orders:
* Money transmitter:
* Provider and seller of prepaid access:
* US Postal Service:

Traditional MSBs typically provide services to the underserved or unbanked individuals

In the United States, principal MSBs are required to have written AML policies, procedures, and internal controls; appoint a BSA officer; provide education and training; conduct independent reviews and audits; and monitor transactions for suspicious activity.

Agents of a principal MSB are required to follow regulations as a principal MSB

183
Q

Use of MSBs (Case example: Methods of money laundering)

A

Bangko Sentral ng Pilipinas (BSP), in its
campaign to combat illegal money movement via MSBs, revoked the licenses
of three MSB companies, due to “significant violations” in AML compliance

Key takeaways
* MSBs must comply with the same AML requirements as banks.
* Small MSBs might lack resources and experience, leading to compliance
issues.
* The cash-intensive and transactional nature of MSBs can facilitate money
laundering.
* MSBs offer valuable services and are important for financial inclusion