Table of Contents
What is the definition of Money Laundering?
Money Laundering is:
a. The conversion or transfer, knowing that such property is the proceeds of crime.
b. The concealment or disguise of the true nature, source, location, disposition, movement or ownership of or rights with respect to the property, knowing that such property is the proceeds of crime; and
c. The acquisition, possession, or use of property, knowing, at the time of the receipt, that such property is the proceeds of crime.
Difficult to understand? Money Laundering has a more simple definition i.e., the ways and means by which illegally obtained money is cleansed to legal money. But why does illegally obtained money require cleansing?
1. Crime money is not free to use:
Money laundering is the criminal’s way of trying to ensure that, in the end, crime pays meaning they have free access to use the funds obtained illegally. The most common types of criminals who need to launder money are drug traffickers, embezzlers, corrupt politicians and public officials, mobsters, terrorists and con artists. Especially, drug traffickers are in serious need of good laundering systems because they deal almost exclusively in cash, which causes all sorts of logistics problems. Not only does cash draw the attention of law-enforcement officials, but it's also really heavy. In practice, criminals are trying to disguise the origins of money obtained through illegal activities so it looks like it was obtained from legal sources. Otherwise, they can't use the money because it would connect them to the criminal activity, and law-enforcement officials would seize it.
2. Socio Cultural Spectrum of AML:
On the socio-cultural end of the spectrum, successfully laundering money means that criminal activity actually does pay off. This success encourages criminals to continue their illicit schemes because they get to spend the profit with no repercussions. This means more fraud, more corporate embezzling (which means more workers losing their pensions when the corporation collapses), more drugs on the streets, more drug-related crime, law-enforcement resources stretched beyond their means and a general loss of morale on the part of legitimate business people who don't break the law and don't make nearly the profits that the criminals do.
3. Financing of Money Laundering:
Money launderers are not interested in profit generation from their investments but rather in protecting their proceeds. Therefore, they invest their funds in activities that are not necessarily economically beneficial to the country where the funds are located. Furthermore, to the extent that money laundering and financial crime redirect funds from sound investments to low quality investments that hide their proceeds, economic growth can suffer. In some countries, for example, entire industries, such as construction and hotels, have been financed not because of actual demand, but because of the short-term interests of money launderers. When these industries no longer suit the money launderers, they abandon them, causing a collapse of these sectors and immense damage to these economies
4. Economic effects of Money Laundering:
The economic effects are on a broader scale. Developing countries often bear the brunt of modern money laundering because the governments are still in the process of establishing regulations for their newly privatized financial sectors. Other major issues facing the world's economies include errors in economic policy resulting from artificially inflated financial sectors. Massive influxes of dirty cash into particular areas of the economy that are desirable to money launderers create false demand, and officials act on this new demand by adjusting economic policy. When the laundering process reaches a certain point or if law-enforcement officials start to show interest, all of that money that will suddenly disappears without any predictable economic cause and that financial sector falls apart.
While the financial sector is an essential constituent in the financing of the legitimate economy, it can be a low-cost vehicle for criminals wishing to launder their funds. Consequently, the flows of large sums of laundered funds poured in or out of financial institutions might undermine the stability of financial markets. In addition, money laundering may damage the reputation of financial institutions involved in the scheming resulting to a loss in trust and goodwill with stakeholders. In worst case scenarios, money laundering may also result in bank failures and financial crises.
Money laundering diminishes government tax revenue and therefore indirectly harms honest taxpayers. It also makes government tax collection more difficult. This loss of revenue generally means higher tax rates than would normally be the case if the untaxed proceeds of crime were legitimate. It also threatens the efforts of many states to introduce reforms into their economies through privatisation. Furthermore, while privatisation initiatives are often economically beneficial, they can also serve as a vehicle to launder funds. In the past, criminals have been able to purchase marinas, resorts, casinos, and banks to hide their illicit proceeds and further their criminal activities.
There is also a risk posed to the securities markets, notably the derivatives markets. As a result of the degree of complexity of some derivative products, their liquidity and the daily volume of transactions, these markets have the ability to disguise cash flows and hence are extremely attractive to the professional money launderer. However, their activities pose huge risks to these markets. Firstly, the brokers used to execute orders on behalf of money laundering clients may be criminally liable for aiding and abetting money launderers. A worrying situation is the money launderers' skilful manipulation of the futures markets. On local futures exchanges, individuals have colluded to take correspondingly short and long positions so as to clean money debts being paid with dirty money, while profits now being clean money. Secondly, another major risk created is through the use of offshore banks that may wash money using derivative markets. As these banks are foreign, they are not required to abide by the same regulations as those of domestic investors as regards overexposure to uncovered risk; they are able to take on huge risk relative to their institutional size. Should losses result from such positions the debts may not be fully paid as the contracts purchased may be only one step in the course of a complex laundering chain that is untraceable. Thus, potentially huge losses could be incurred by legitimate investors, causing damage to the derivatives markets.
5. Microeconomic effects of money laundering:
One of the most serious microeconomic effects of money laundering is felt in the private sector. Money launderers often use front companies, which co-mingle the proceeds of illicit activity with legitimate funds, to hide the ill-gotten gains. In some cases, front companies are able to offer products at prices below what it costs the manufacturer to produce. Therefore, front companies have a competitive advantage over legitimate firms that draw capital funds from financial markets. This makes it difficult, if not impossible, for legitimate business to compete against front companies with subsidised funding, a situation that can result in the crowding out of private sector business by criminal organisations. The management principles of these criminal enterprises are not consistent with traditional free market principles of legitimate business, which results in further negative macroeconomic effects. Money laundering majorly happens in trade-based transactions hence; Government should put a cap on huge cash transactions as these mostly take place in illegal activities like drug trade and betting deals. There is a need to check the generation of black money in the education sector and through donations to religious institutions and charities, generation of black money through cricket betting, misuse of exemption on Long Term Capital gains tax so on and so forth.
1. Terrorism a long term fight:
Terrorism has long threatened nation states. However, especially since the attacks on the World Trade Centre in New York on September 11, 2001, terrorism has become a major challenge for all countries in the international arena. While domestic terrorism still accounts for the majority of terrorist incidents, transnational terrorism has become more relevant and is now considered as particularly dangerous. The direct and indirect costs of terrorism, ranging from the loss of human lives and assets to reduced growth and life satisfaction, are substantial, making it advisable to fight terrorism with a variety of means at the same time.
2. Terrorist attacks are of lower cost:
Terrorists want to achieve the biggest possible (political) effect in terms of media attention and destabilization. This, however, can be achieved at rather low cost, so that most terrorist attacks are rather inexpensive. This imposes further challenges for prosecutors as the financial flows they need to detect are usually small. Especially since terrorists are increasingly organized in networks nowadays, anti‐money laundering instruments may fail to yield the desired success, while at the same time interfering with fundamental civil rights in a problematic way. Terrorism may harm the economy directly and indirectly, where the latter effect refers to the reaction of economic agents (e.g., consumers, foreign investors, government) to terrorism.
3. Effects of Terrorism:
Similar to the negative economic consequences of civil war, there exist several channels of transmission from terrorism to the economy, namely destruction, disruption, diversion, dissaving and portfolio substitution. Destruction refers to the direct costs of terrorism. Human and physical capital is destroyed through terrorist attacks, resulting in a reduced economic output. The other effects refer to the indirect consequences of terrorism on the economy that emerge from the response of economic agents. The disruption effect may become manifest in higher transaction costs, as the effectiveness of public institutions is challenged and manipulated by terrorism, or as insecurity in general increases. For instance, given that terrorism creates uncertainty, it may consequently lead to the postponement of long‐term investments and thus reduced economic activity. Diversion occurs when public resources are shifted from output‐enhancing to non‐productive expenditures.
For instance, a government may increase spending on security at the expense of (more productive) spending on education and infrastructure, which may impede future economic development. Dissaving refers to a decline in savings that affects an economy's capital stock. Portfolio substitution means the flight of human, physical and financial capital from a country in the face of conflict.
Terrorism financing can be raised by legitimate sources such as fund-raising activities and business profits, as well as illegitimate sources such as the drug trade and fraud.
4. How Terrorists obtain money?
The fight against terrorism financing requires an understanding of the way terrorist organisations obtain their money as given below:
1. Illegal Activities: Terrorists obtain funds from illegal activities such as drug trafficking, smuggling, kidnapping and extortion. Drug trafficking is particularly lucrative. In Latin America, “Narco-terrorist” obtain much of their money from the drugs trade.
2. Wealthy Sponsors: Terrorists may receive funds from wealthy individual or sponsors which can support their terrorist activities.
3. Charitable and Religious Institutions: Legitimate charitable and religious institutions can be a source of funding for terrorists. They are ideal conduits because they are very lightly regulated and do not need to provide a commercial justification for their activities.
4. Commercial Enterprises: Terrorist organisations may run or own otherwise legitimate commercial enterprises to generate profits and commingle illegal funds. These include jewellery businesses, trading companies, convenience stores, real estate ventures and investment management firms.
5. State Sponsors: A number of rogue nations have been known to provide assistance, financial support and safe harbour to terrorist organisations. A prime example of this was Afghanistan under the Taliban regime.
5. Why Terrorist organisations need money?
Terrorist organisations need money to:
1) Recruit and sustain: Money is needed to recruit, support, train, transport, house, compensate and equip terrorist agents
2) Acquire influence: Money is needed to sustain media campaigns and win political support
3) Build the support base: Money is needed for educational and social programs to win members and create a support base
4) Carry out terrorist activity: Money is required to execute the planning.
Their success in accessing and deploying this money has disastrous results. Terrorist organisations do not require a lot of money to achieve disastrous results.
6. How terrorist usually move money?
terrorist usually move money in the below mentioned ways:
1. Financial Institutions: Often, individual accounts are opened and small withdrawals and deposits of less than reportable thresholds are made in order to avoid the reporting requirements of anti-money laundering and counter-terrorism financing legislation.
2. Alternative Remittance Systems: Unregulated remittance systems such as 'Hawala' and 'Hundi' are extensively used to transfer funds without any documentation.
3. Currency transfers: Cash is smuggled across borders, particularly through land crossings and sea shipments.
4. Trade financing: With the growth of terrorist-owned commercial firms, trade finance is increasingly being used.
5. Theft of personal Id: The theft of personal identity information is a common method used by terrorists and criminals to operate in the legitimate system.
7. September 11 Case facts:
The United States Federal Bureau of Investigation (FBI) uncovered some of the financing techniques used by the '9/11' (September 11, 2001) terrorists. The 9/11 terrorists opened a set of 24 accounts at a bank in the United States using false identities, social security numbers and documents. About US$325,000 was deposited into such accounts from benefactors in different countries. The terrorists also used debit cards issued by foreign banks to finance their activities in the United States.
I. Placement
In the initial - placement - stage of money laundering, the launderer introduces “dirty” illegal money into the financial system. This might be done by breaking up large amounts of cash into less conspicuous smaller sums that are then deposited directly into a bank account, or by purchasing a series of monetary instruments (cheques, money orders, etc.) that are then collected and deposited into accounts at another location.
Examples of Placement:
1) Smurfing:
Smurfing is a common placement technique. Cash from illegal sources is divided between 'deposit specialists' or 'smurfs' who make multiple deposits into multiple accounts (often using various aliases) at any number of financial institutions. In this way, money enters the financial system and is then available for layering. Suspicion is often avoided as it is difficult to detect any connection between the smurfs, deposits and accounts. Smurfing is a common placement technique. Cash from illegal sources is divided between 'deposit specialists' or 'smurfs' who make multiple deposits into multiple accounts (often using various aliases) at any number of financial institutions. In this way, money enters the financial system and is then available for layering. Suspicion is often avoided as it is difficult to detect any connection between the smurfs, deposits and accounts.
2) Structuring:
Structuring involves splitting transactions into separate amounts under the reportable threshold levels (10000$ for US) to avoid the transaction reporting requirements. Many money launderers rely on this placement technique because numerous deposits can be made without triggering the cash reporting requirements.
However, it can backfire if an attentive financial institution notices a pattern of deposits just under the reportable threshold. This can lead to reporting such activity to FIU under the suspicious activity provisions of these instruments. Structuring is a criminal offence itself, as well as an indicator of other potentially illegal activity.
3) Alternative Remittance:
‘Alternative remittance’ refers to funds transfer services usually provided within ethnic community groups and known by names particular to each culture. Generally, such services accept cash, cheques or monetary instruments in one location and pay an equivalent amount to a beneficiary in another location. In some communities this form of money transfer is commonly known as hawala, hundi, chuyen tien, yok song geum, or pera padala. These are mostly person-to-person transfer systems that involve minimal documentation, if any.
Alternative remittance is also known as underground or parallel banking. There are large networks of these systems in operation around the world. The larger networks are prevalent in South East Asia, Latin America, North America and the Middle East. Alternative remittance systems predate the mainstream banking system and have been used in China and India for centuries. After the terrorist attacks of 11 September 2001, these systems have come under intense scrutiny as avenues for the transfer of money by terrorist groups.
These services are used to transfer both legal and illegal money. In many countries, the Western-style banking systems are under developed. Alternative remittance services have been called upon to ordinary people, workers, travellers and immigrants to transfer legal funds to their families and business counterparts. However, these alternative systems can also be used by tax evaders, terrorists, money launderers and other criminals.
4) Bulk Movement:
Bulk movement involves the physical transportation and smuggling of cash and monetary instruments, such as money orders and cheques. Often money launderers use their cash to purchase less bulky items such as diamonds, gold or even collector's stamps and other expensive goods. The criterion is that the items must be of high value and small, making them physically easy to smuggle as well as relatively easy to reconvert into cash at the point of destination.
Bulk shipments of illegally obtained funds (or goods acquired with the funds) are smuggled across borders concealed in private vehicles, commercial trucks and air and maritime cargo. They may also be carried by couriers travelling on commercial airlines, trains and buses. Further, they can also be sent through parcel delivery and express mail services. The simplest bulk movement method is to smuggle the cash out of one country into another country that does not have currency regulations or where the regulations are not enforced. Note that, like alternative remittance, bulk shipment is the first step in placing the money. Once the funds or assets have been successfully transported, they still need to be placed into the financial system.
5) Gambling:
Gambling is used to launder money by inserting illegal money into gaming machines. The money inserted can be cashed out and treated as proceeds from gambling. Funds that appear to be winnings can easily be used to justify unusual spikes in income. This income can then be deposited into a legitimate bank account.
Other types of gambling techniques include:
1. Claiming gaming machine prizes/payouts whilst not being the legitimate prize-winner (that is, not the player who has accumulated the subject credits or turnover)
2. Exchanging cash for or purchased gaming prizes/payouts from legitimate prize winners Exchanging cash for prize-winning cheques. This may be coordinated by ‘spotters’ who look for winners. They target problem gamblers who may want their winnings straight away and are willing to receive 95% of the face value of the ticket
3. Exchanging cash for prize-winning gaming machine tickets
4. Negotiating cash loans to other members/patrons for the purposes of gambling
6) Insurance Purchase:
Illegal money is used to buy insurance policies and instruments, which can be 'cashed in' at a later date. The end result is that the illegal funds have been legitimised by being ‘washed’ through a legitimate insurance business.
‘Single premium’ insurance products can be particularly vulnerable. They involve a single payment 'up-front' and the ability to immediately purchase a fully paid instrument. To a money launderer, these products are attractive because they:
• Involve a one-time payment
• Have a cash surrender value
• May be transferable
Insurance is sold through many channels. Any of these channels may be tapped by money launderers to place illegal funds.
II. Layering
After the funds have entered the financial system, the second – layering – stage takes place. In this phase, the launderer engages in a series (also called layers) of conversions or movements of the funds to distance them from their source. The funds might be channelled through the purchase and sales of investment instruments, or the launderer might simply wire the funds through a series of accounts at various banks across the globe. In some instances, the launderer might disguise the transfers as payments for goods or services, thus giving them a legitimate appearance. Let us look at some of the techniques as given below:
1) Electronic Funds Transfers:
The use of electronic funds transfers is a common layering technique. Typically, layers are created by moving money through electronic funds transfers into and out of domestic and offshore bank accounts of fictitious individuals and shell companies. Given the large number of electronic funds transfers daily and the sometimes, limited information disclosed about each transfer, it is often difficult for authorities to distinguish between clean and dirty money.
2) Offshore Banks:
Offshore banks are banks that allow for the establishment of accounts from non-resident individuals and corporations. A number of countries have well-developed offshore banking sectors. In some cases, these banking sectors follow loose anti-money laundering regulations.
Offshore banks are popular with money launderers (for layering funds), tax evaders and corrupt officials. Money launderers also like to keep funds in offshore banks because their fixed term deposit accounts provide interest income. Some offshore centres combine loose anti-money laundering procedures with strict bank secrecy rules. Criminals can easily maintain and transfer funds from banks in these centres because details of client activities are generally denied to third parties, including most law enforcement agencies. The financial centres that host offshore banks can be very large and help facilitate many illegitimate cross-border financings.
3) Shell Corporations:
Sophisticated money launderers use a complex maze of shell corporations in different countries. Most money transfers take place through these shell corporations. At times, money is transferred through numbered accounts rather than through named accounts. To further avoid unwanted attention; money launderers build the transaction history of the shell corporation so that it looks as if it has been in business for a long time. In many countries (particularly offshore banking centres), the reporting and record-keeping requirements for corporations are quite minimal, which makes it easy to disguise ownership of the corporation.
In a number of countries, ownership in corporations can be represented by 'bearer shares'. In these corporations, the holder of the bearer share certificate is regarded as the owner of the shares. This makes it easy to disguise and transfer ownership.
4) Trusts:
Trusts can act as layering tools because they enable the creation of false paper trails and transactions. Trusts are principally governed by a deed of trust drawn up by the person who establishes the trust. Trusts are more complex to use than corporations, but they are less regulated. The private nature of trusts makes them attractive to money launderers. Secrecy and anonymity rules help conceal the identity of the true owner or beneficiary of trust assets. Also, the presence of a corporate trustee provides an appearance of legitimacy. In addition, offshore trusts may contain a 'flee clause'. This clause allows the trustee to shift the controlling jurisdiction of the trust if it is in danger because of war, civil unrest or, more likely, the activities of law enforcement officers or litigious investors and consumers. Typically, trusts are used in combination with corporations in money laundering schemes. Trusts are used less frequently than corporations because of their complexity and their disuse in business transactions.
5) Walking Accounts:
A walking account is an account for which the account holder has provided standing instructions that all funds be transferred immediately on receipt to one or more other accounts. By setting up a series of walking accounts, criminals can automatically create several layers as soon as any funds transfer occurs.
Money launderers use this layering technique because it is extremely difficult to detect and money moves very fast through accounts across the world. Due to these reasons, walking accounts create substantial investigation hurdles for regulators.
6) Intermediaries:
Money launderers like to use intermediaries because they lend credibility and decrease suspicion. In addition, these professionals generally have confidentiality obligations to their clients so the risk of money launderers getting caught is low. Many countries have realised that criminals are increasingly using non-financial professionals as intermediaries. To counter these activities, many countries have included non-financial professionals in new anti-money laundering legislation.
III. Integration
Having successfully processed the criminal profits through the first two phases the launderer then moves them to the third stage – integration – in which the now-“clean” funds re-enter the legitimate economy. The launderer might choose to invest the funds into real estate, luxury assets, or business ventures.
1) Credit and Debit Cards:
Credit and debit cards are efficient ways for money launderers to integrate illegal money into the financial system. By maintaining an account in an offshore jurisdiction through which payments are made, the criminals limit the financial trail that leads to their country of residence. Credit and debit cards are efficient ways for money launderers to integrate illegal money into the financial system. By maintaining an account in an offshore jurisdiction through which payments are made, the criminals limit the financial trail that leads to their country of residence. In recent years, authorities have grown more attuned to the use of offshore credit cards as a money laundering technique. As a result, certain offshore jurisdictions now enable regulators to obtain from banks all records of transactions made by their credit card clients.
2) Consultants:
Consultancy arrangements can cover a wide range of non-quantifiable services and are often used to integrate illegal funds into the legitimate financial system. The use of consultants in money laundering schemes is quite common. The consultant might not even exist. For example, the criminal could actually be the consultant. In this case, the criminal is channelling money back to him/herself. This money is declared as income from services performed and can be used as legitimate funds. In many cases, the criminal will employ an actual consultant (e.g., accountant, lawyer or investment manager) to do some legitimate work. This could involve purchasing assets. Often, the criminal transfers funds to the consultant's client account from where the consultant makes payments on behalf of the criminal.
3) Corporate Financing:
Corporate financing offers a flexible way to transfer money between companies. This technique is often used in sophisticated money laundering schemes. Corporate financing is typically combined with a number of other techniques, including the use of offshore banks, consultants, complex financial arrangements, electronic funds transfers, shell corporations and actual businesses. This allows money launderers to integrate very large amounts of money into the legitimate financial system. Money launderers may also take a tax deduction on interest payments made by them in corporate financings. From appearances alone, such transactions are identical to legitimate corporate finance transactions. Financial service professionals serving legitimate businesses need to look closely to find peculiarities in their dealings, such as:
Large loans by unknown entities
Financing that appears inconsistent with the underlying business
Unexplained write-offs of debts.
4) Asset Sales and Purchases:
To integrate illegal funds into a legitimate financial system, money launderers often resort to actual or fictitious sales and purchases of assets. This technique can be used directly by the criminal or in combination with shell corporations, corporate financing and other sophisticated methods. The end result is that the criminal can treat the earnings from the transaction as legitimate profits from the sale of the assets. Around the world, real estate sales and purchases are a favoured method of integrating illegal money.
5) Business Recycling:
Business recycling is a common integration technique in which illegal funds are mixed with cash flow from a seemingly legitimate business. Legitimate businesses that also serve as conduits for money laundering are referred to as 'front businesses’. Cash-intensive retail businesses are some of the most traditional methods of laundering money. This technique combines the different stages of the money laundering process.
1. Transactions Monitoring and Controlling Money Laundering:
Banks can effectively control and reduce their risk only if they have an understanding of the normal and reasonable activity of the customer so that they have the means of identifying transactions that fall outside the regular pattern of activity.
However, the extent of monitoring will also, depend on the risk sensitivity of the account.
Banks should pay special attention to all complex, unusually large transactions and all unusual patterns which have no apparent economic or visible lawful purpose. Banks may prescribe threshold limits for a particular category of accounts and pay particular attention to the transactions which exceed these limits. Transactions that involve large amounts of cash inconsistent with the normal and expected activity of the customer should particularly attract the attention of the bank. Very high account turnover inconsistent with the size of the balance maintained may indicate that funds are being 'washed' through the account. High-risk accounts have to be subjected to intensified monitoring.
Every bank should set key indicators for such accounts, taking note of the background of the customer, such as the country of origin, sources of funds, the type of transactions involved and other risk factors. Banks should identify suspicious transactions and file Suspicious Transaction Reports through MLRO with the respective country’s Financial Intelligence Unit.
2. Two elements of Transaction Monitoring:
1. Pre-Transaction Monitoring:
Pre-transaction monitoring is carried out while the actual transaction is happening, and mainly applies to situations of face-to-face contact between the customer and the bank employee. For example, when a customer visits a bank to exchange a quantity of banknotes in certain denominations or foreign currency, or to make a cash deposit. Another example is trade finance, in which a bank is expected to carry out a specific proposed transaction. Banks should have a pre-transaction monitoring process in place, with appropriate measures to detect unusual transactions when or preferably before they are conducted. Pre-transaction monitoring is, either as an automated or a manual process, can effectively contribute to the detection of unusual transactions as it is in this stage that actual customer contact takes place. As such, the front office has a substantial responsibility in detecting unusual transactions such as money laundering and terrorist financing. This is relevant when a clear profile of expected transactions is drawn up at the start of the customer relationship for monitoring purposes. This will allow the institution to detect unusual proposed transactions even before they are affected, and notify them to FIU without delay.
2. Post-Transaction Monitoring:
Customer due diligence is part of the transaction monitoring process. Customer due diligence provides banks with knowledge of its customers, including the purpose and intended nature of the business relationship with the customer. This knowledge enables the bank to conduct risk-based assessments to ascertain whether the transactions carried out have unusual patterns that could indicate money laundering or terrorist financing. The bank must tailor its transaction monitoring to the type of customer, the type of services provided and the risk profile of the customer or customer segment. This means monitoring can have a different set-up for the various customer segments and products to which the bank provides its services.
Step 1: Risk Identification:
The first step in the transaction monitoring process is risk identification. During the identification process a bank must systematically analyses the money laundering and terrorist financing risks that particular customers, products, distribution channels or transactions pose. The bank then documents the results of this analysis in the TRANSACTION MONITORING Risk analysis Sheet. The Risk identified is applied to policy, business processes and procedures relating to transaction monitoring. When identifying and analyzing risks, a bank must classify its customers in various risk categories, such as high, medium and low, based on the money laundering and terrorist finance risks attached to the business relationship with the customer. To determine the customer’s risk profile, a bank should prepare a transaction profile based on expected transactions or expected use of the customer’s (or customer group’s) account. By preparing a transaction profile in this way a bank can sufficiently monitor transactions conducted throughout the duration of the relationship to ensure they are consistent with its knowledge of the customer and their risk profile. By identifying the expected transaction behaviour of their customer, a bank can assess whether the transactions the customer carries out are consistent with its knowledge of the customer.
Step 2: Detection of patterns and transactions:
For the second step, detecting the unusual transaction patterns and transactions that may indicate money laundering or terrorist financing, a bank must have a transaction monitoring system in place. Before making use of such a system the bank should ensure that all data are fully and correctly included in the transaction monitoring process. This can be data concerning the customer, the services and the transactions. If there are large numbers of transactions then it is appropriate to have an automated transaction monitoring system in place to be able to safeguard the effectiveness, consistency and processing time of the monitoring. The system must at least include pre-defined business rules: detection rules in the form of scenarios and threshold values. In addition to this, more advanced systems may also be needed, and in applicable cases may be essential, depending on the nature and the size of the transactions and the nature of the institution in question. So, for example, a highly advanced system would be less necessary for a bank with a limited number of simple transactions. It may also be the case that a bank considers the use of a highly advanced system, which makes use of artificial intelligence (AI) for example, to be essential. In any case, the responsibility for effectively detecting unusual transactions remains with the bank. A bank must have a good understanding of its systems, and should not just rely on the algorithms provided by external suppliers. When opting for an AI-based system, it may therefore be advisable to involve staff with relevant expertise.
The trigger activities that are usually the output from surveillance systems in banks are:
1. Change in Behaviour:
Change in behaviour is simply the change in volume or frequency or attempt to structure funds, or velocity or speed with which inward and outward remittances happens in a bank account. To make it simple, Surveillance system finds anomalies, such as an abnormally high volume or value of transactions or patterns of transactions falling out of threshold levels or large transactions just below the threshold levels.
2. Recurring Large Transactions:
Surveillance system finding the following anomalies under this heading are:
1. Huge value transactions incoming into an account which is way beyond the normal transactions level of the customer.
2. Huge volume of transactions incoming into an account which is way beyond the normal transactions level of the customer when aggregated.
3. Sudden huge transaction going out of account.
3. Transactions to, or incoming from a high-risk jurisdiction:
High-risk jurisdictions have significant strategic deficiencies in their regimes to counter money laundering, terrorist financing, and financing of proliferation. Surveillance systems usually are fed with the list of such countries. Any transaction happening to or from such high-risk countries are triggered as suspicious transactions.
4. Pattern of funds transactions:
The surveillance systems will trigger the following under this heading.
a) Substantial increases in cash deposits without apparent cause.
b) Regular Transfers to unknown third party or parties.
c) Regular receipt of funds from unknown third party or parties.
5. Rapid movement of funds:
The surveillance systems will trigger the following under this heading.
1. Rapid movement of funds between accounts.
2. Rapid movement of funds to or from third parties.
6. Sequentially numbered checks:
The surveillance systems will trigger alert for any transactions of monetary instruments such as checks or drafts with sequential number.
7. Structuring:
The surveillance systems will trigger any probable structuring such as daily transactions below thresholds levels, Frequent ATM deposits at night, considerable transactions above threshold for the customer type defined by the bank.
8. Large Credit Card Transactions:
The surveillance systems will trigger alert any large credit card transactions frequently.
9. Un related third party transfers:
The surveillance systems will trigger alert any unrelated third party transfers outside the hierarchy structure known to the bank.
10. Pattern of originator beneficiary in correspondent banking relationship:
The surveillance systems will trigger alert for regular transfers by the same originator to the same beneficiary frequently.
Step 3: Data Analysis:
A bank should analyze its transaction data using its transaction monitoring system and relevant intelligent software. The system generates alerts on the basis of business rules. An alert is a signal that indicates a potentially unusual transaction. Any alerts are investigated. The findings of this investigation must be adequately and clearly recorded. When the findings of the investigation reveal that the transaction is unusual, the bank must notify this to FIU without delay. A bank must have sufficiently described and documented the considerations and decision-making process as to whether or not to report a transaction. When a bank fails to meet its notification duty – even if this is not deliberate – it constitutes an economic offence.
Step 4: Assessment, Measures and Documentation:
The bank must then assess the consequences of the notification to FIU and a possible feedback report from FIU for the customer’s risk profile and determine whether any additional control measures have to be taken. The final part of the transaction monitoring process is to ensure all the details of the process are properly recorded. In this connection, the bank keeps the data relating to the notification of the unusual transaction and records them in readily accessible form for five years after the notification was made, allowing the transaction to be reconstructed.
3. Levels of reporting alerts:
All the alerts generated by the surveillance systems are not suspicious hence, those alerts which do not qualify for suspicion are required to be determined as “False Positive” and closed with well written judgment for the closure. Mostly, banks and financial institutions have three levels of officers who decide on, “True Positive” which needs to be escalated and “False Positive” which needs to be closed with proper closure comments of why suspicion is deemed to be false. Let us learn the levels as given below.
These levels might not be consistent across banks and financial institutions, but more or less are same.
1. Level I:
The team will receive all the alerts generated in their queue. The team leader assigns the alerts the team of transaction monitoring officers. The transaction monitoring officers check internal records, KYC records and other publicly available sources to determine whether the alerts are true or false positive. The sanctions related alerts are generally assigned to senior level officers who have been sufficiently trained and are accredited to make decisions on true or false positives. Their decisions of all deemed true positive hits directly flow to Level III which have officers’ experts in sanctions.
2. Level II:
The team of Level II officers in today’s banking scenarios are onshore or employees at head office who have sufficient experience in deciding whether or not to report the suspicion. They also have additional tools such as access to Lexis Nexis or Bankers almanac or Bloomberg terminals or other higher ranged tools to decide. Once the suspicion is confirmed as true positive, a draft is prepared and sent to MLRO for final decision.
3. Level III:
The team of Level III are sanctions specialists and look only into sanctions related alerts. Since they require higher attention, usually true positive hits ascertained by Level III team are seen by MLRO on priority.
MLRO’s based on draft “suspicions activity report” thoroughly investigate the case and decide whether or not to report further to FIU.
1. About Politically Exposed Person:
PEPs have used banks as conduits for their illegal activities, including corruption, bribery, and money laundering. However, not all PEPs present the same level of risk. This risk will vary depending on numerous factors, including the PEP's geographic location, industry, or sector, position, and level or nature of influence or authority. Risk may also vary depending on factors such as the purpose of the account, the actual or anticipated activity, products and services used, and size or complexity of the account relationship.
As a result of these factors, some PEPs may be lower risk and some may be higher risk for foreign corruption or money laundering. Banks that conduct business with dishonest PEPs face substantial reputational risk, additional regulatory scrutiny, and possible supervisory action. Banks should take all reasonable steps to ensure that they do not knowingly or unwittingly assist in hiding or moving the proceeds of corruption by PEP's or, their families, and their associates. Because the risks presented by PEPs will vary by customer, product/service, country, and industry, identifying, monitoring, and designing ML/TF controls for these accounts and transactions should be risk-based.
2. Definition:
There is no single, globally agreed definition of PEP. However, a basic element of the PEP definition is that PEP is a natural person.
A politically exposed person or (PEP) is defined by the Financial Action Task Force as an individual who is or has been entrusted with a prominent public function.
Examples of PEP are individuals who hold positions such as, Heads of State or of government, senior politicians, senior government, judicial or military officials, senior executives of state owned corporations, important political party officials etc.
Relationships with PEPs may represent increased risks due to the possibility that individuals holding such positions may misuse their power and influence for personal gain or advantage, or for the personal gain or advantage of close family members and close associates. Such individuals may also use their families or close associates to conceal funds or assets that have been misappropriated as a result of abuse of their official position or resulting from bribery and corruption.
You may note that any corporate which has PEP as ultimate beneficial owner holding more than 10%, such corporate is termed as PEP corporate. Here, the corporate status is PEP because of the presence of PEP individual.
3. Different types of PEP’s:
1. Foreign PEPs: Individuals who are or have been entrusted with prominent public functions by a foreign country.
2. Domestic PEPs: Individuals who are or have been entrusted domestically with prominent public functions.
3. International Organisation PEPs: Persons who are or have been entrusted with a prominent function by an international organisation such as World Bank UN, refers to members of senior management or individuals who have been entrusted with equivalent functions, that is directors, deputy directors and members of the board or equivalent functions.
4. Family Members of PEP: Family members are individuals who are related to a PEP either directly or through marriage or similar (civil) forms of partnership.
5. Close Associates of PEP: Persons who are closely connected to a PEP, either socially or professionally.
Involvement of PEP who himself/herself might open an account or has been identified during CDD of a business profile to be either the owner or key controller of the customer, the whole profile needs to be set as high risk and enhanced due diligence is required to be performed for such profiles. Certain banks also insist on PEP forms which have several questions for determining the risk levels of profile due to involvement of PEP.
4. Relevant factors while assessing a PEP are as given below.
1. An individual’s seniority, prominence or importance in holding a prominent public position.
2. The nature of the relevant country’s political and legal system and its vulnerability to corruption as per various publicly available, independent indices, such as Transparency International index.
3. The official responsibilities of the individual’s function,
4. The nature of the title, such as honorary or salaried political function.
5. The level of authority the individual has over governmental activities and over other officials.
6. Whether the function affords the individual access to significant government assets and funds, or the ability to direct the awards of government tenders or contracts.
7. Whether the individual has links to an industry that is particularly prone to corruption.
8. Number of years the individual was out of office. Usually, any individual out of office for more than 10 years is not categorized as PEP.
9. Many state-owned entities and public sector bodies will have PEPs in controlling positions within the organization. Here, these individuals however, should not be categorized as PEP’s as they are PEP's due to their positions and rare chances of such individuals will transfer corruption risk to that organization. A small caution of note, if these PEP’s are directors in some other organization which is being on boarded, a full PEP analysis is required.
5. How to do a PEP Analysis?
The questions and the way its asked can differ from bank to bank.
1. What is the position of the PEP and in which country the position is held?
2. How many years has the PEP been in office?
3. Is the PEP presently in the office or not?
4. Is the PEP, PEP due to the position held by such individual in the organization?
5. Since how many months and or years the PEP has been out of Office?
6. Is the individual, a close relative or blood relative of a PEP?
7. Is the individual, has only business relations with the associated PEP?
8. Is the individual, has much of the say in political circle and has friends or relations with Multiple PEP’s?
9. What is the nature and intended purpose of the relationship or account that a PEP wishes to have with the bank?
10. What is the source of funds to open an account?
11. How the individual who is a PEP has earned the Wealth or in short what is the source of wealth?
12. What are the anticipated levels of PEP individual’s account activity?
13. Is the PEP individual identified with Negative News or Adverse Media?
14. Is the individual still politically connected even if they have left office?
The most common objectives of bank regulations across the world is:
1. To protect the Depositors in the bank.
2. To reduce the banking failures including that of "Too Big to Fail"
3. To avoid misuse of banks by employees or outsiders for Money Laundering, Terrorist Financing or Fraud.
4. To ensure banks have sufficient internal controls to reduce the risk of banks being used for criminal purposes.
5. To protect banking confidentiality
6. To ensure all customers are fairly treated.
7. To direct credit to only those who are worth it.
8. Ensuring each bank is ethical and are aware of their corporate social responsibility.
1. About Dodd-Frank:
Dodd-Frank Wall Street Reform and Consumer Protection Act or simply Dodd-Frank Act was passed during the Obama administration on 21st July 2010 as a response to the financial crisis of 2008.
The act was named after sponsors Senator Christopher J. Dodd and congressman Barney Frank.
The act contains numerous provisions, spelled out over roughly 2,300 pages, that were to be implemented over a period of several years.
2. The aim of Dodd-frank act:
To promote the financial stability of the United States by improving accountability and transparency in the financial system.
To end too big to fail.
To protect the American taxpayer by ending bailouts.
To protect consumers from abusive financial services practices, and for other purposes.
3. Titles of Dodd:
Title I:
Under Title I the following were established
1. Financial Stability Oversight Council:
The Financial Stability Oversight Council serves as the federal “systemic risk regulator, “.
Meaning that the agency is tasked with identifying and resolving issues with the nation's financial systems that threaten the entire financial system of the nation as a whole, such as widespread bank closures.
The council has the authority to collect information from its member agencies, regulatory agencies, and the Federal Insurance Office.
In order to identify potential threats to financial stability, the council monitors the financial services marketplace as well as domestic and international financial regulations.
The Financial Stability Oversight Council can also advise and make recommendations to Congress and member agencies for the purpose of enhancing the “integrity, efficiency, competitiveness, and stability of the U.S. financial markets.
2. The Office of Financial Research:
It is an independent bureau within the United States Department of the Treasury.
It helps to promote financial stability by looking across the financial system to measure and analyse risks, perform essential research, and collect and standardize financial data.
The Dodd-Frank Act of 2010 established the Office of Financial Research, principally to support the Financial Stability Oversight Council and its member agencies.
3. Additional Board of Governors Authority for Certain Nonbank Financial Companies and Bank Holding Companies:
The Board of Governors shall establish prudential standards for nonbank financial companies supervised by the Board of Governors and bank holding companies that shall include
1. risk-based capital requirements and leverage limits.
2. liquidity requirements
3. overall risk management requirements
4. resolution plan and credit exposure report requirements; and
5. concentration limits.
Title II:
Title II, the Orderly Liquidation Authority or OLA of the Dodd-Frank Act, provides a process to quickly and efficiently liquidate a large, complex Non-Banking Financial Institution which is systemically important financial institution or SIFI, that is close to failing.
The secretary of treasury based on several factors decides whether an OLA should be invoked or not and submits a report within 180 days to the President.
In order to invoke the OLA, the FDIC also needs the agreement of the Federal Reserve Board of Governors (by a 2/3 majority).
Once invoked, The FDIC is given certain powers as receiver, and a three-to-five-year time frame in which to finish the liquidation process.
The FDIC needs access to cash to operate these firms while they go through resolution.
Title II of Dodd-Frank created a new fund, the Orderly Liquidation Authority, to be funded by complex, large institutions and non-bank SIFIs.
Unlike the Deposit insurance fund which is pre-funded, OLA is funded only after a failure.
The Treasury lends the FDIC money to resolve the institution.
If there is a net cost, the FDIC then recovers the money spent by imposing a fee on surviving large, complex financial institutions.
Title III:
Title III streamlines the supervision of depository institutions and their holding companies by abolishing the Office of Thrift Supervision and transferring its regulatory and rulemaking authority to the Office of the Comptroller of the Currency, Federal Deposit Insurance Corporation, and Board of Governors of the Federal Reserve System.
Title III also reforms federal deposit insurance.
Title IV:
Title IV clarifies the registration and record-keeping requirements of advisers to most private funds (hedge funds and private equity funds) to provide the Securities and Exchange Committee and the Federal Deposit Insurance Corporation with information necessary to evaluate systemic risk of these private funds.
Title V:
Title V of the Dodd-Frank Act establishes a Federal Insurance Office within the Department of the Treasury to promote national coordination in the insurance sector.
The Office has authority over all lines of insurance, except health insurance, most long term care insurance and crop insurance.
The Federal Insurance Office is authorized to gather information, enter into information sharing agreements with state insurance regulators, analyze and disseminate data, and issue reports on the insurance industry.
Title VI:
Title VI provides for heightened regulation of bank holding companies, savings and loan holding companies, and depository institutions to ensure that these institutions do not threaten the United States' financial stability.
Title VI requires the Federal Reserve to consider whether a proposed acquisition of a bank, a merger, or consolidation would result in greater or more concentrated risks to the stability of the United States banking or financial system.
Title VI, says a banking entity shall not engage in proprietary trading; or acquire or retain any equity, partnership, or other ownership interest in or sponsor a hedge fund or a private equity fund.
Title VI requires financial holding companies to remain well capitalized and well managed.
Title VI, says an insured State bank may engage in a derivative transaction, only if the law with respect to lending limits of the State in which the insured State bank is chartered takes into consideration credit exposure to derivative transactions.
Title VI, says an insured depository institution may not purchase an asset from, or sell an asset to, an executive officer, director, or principal shareholder of the insured depository institution, or any related interest of such person if the transaction represents more than 10 percent of the capital stock and surplus of the insured depository institution.
Title VII:
Title VII of Dodd-Frank Act addresses the gap in U.S. financial regulation of OTC swaps by providing a comprehensive framework for the regulation of the OTC swaps markets.
Title VII says, it shall be unlawful for any person to act as a security-based swap dealer unless the person is registered as a security-based swap dealer with the Securities and Exchange Commission.
The Dodd-Frank Act divides regulatory authority over swap agreements between the CFTC and SEC. The SEC has regulatory authority over “security-based swaps,” which are defined as swaps based on a single security or loan or a narrow-based group or index of securities or events relating to a single issuer or issuers of securities in a narrow-based security index. The CFTC has primary regulatory authority over all other swaps, such as energy and agricultural swaps. The CFTC and SEC share authority over “mixed swaps,” which are security-based swaps that also have a commodity component.
Title VIII:
Title VIII of the Dodd-Frank Act provides a new framework for assessing the systemic risk associated with financial institutions and financial market utilities involved in clearing activities for financial transactions. The Title grants authority to the Board of Governors of the Federal Reserve System, U.S. Commodities Futures Trading Commission, Securities & Exchange Commission, and Federal Deposit Insurance Corporation to work together to promulgate rules and standards of operation, enforce those rules, and generally help manage the systemic risk of these clearing entities and other financial market utilities.
Title IX:
Title IX of the Dodd-Frank Act contains Increasing Investor Protection, Increasing Regulatory Enforcement and Remedies, Improvements to the Regulation of Credit Rating Agencies, Improvements to the Asset-Backed Securitization Process, Accountability and Executive Compensation, Improvements to the Management of the Securities and Exchange Commission, Strengthening Corporate Governance, Municipal Securities and other matters.
Title X:
Title X of this Act creates a new Bureau of Consumer Financial Protection within the Federal Reserve Board as a new supervisor for certain financial firms and as a rule-maker and enforcer against unfair, deceptive, abusive, or otherwise prohibited practices relating to most consumer financial products or services.
Title XI:
Title XI addresses changes to the Federal Reserve System. First, the Title allows greater supervision of the Federal Reserve's operations by allowing the Comptroller General of the United States to audit the Federal Reserve Board, banks and credit facilities.
Title XII:
Title XII authorizes the Secretary of the United States Department of the Treasury to create multi-year grant programs designed to encourage Title XII’s targeted group, low-to-moderate income individuals, to utilize mainstream financial products and services. Title XII also authorizes participating institutions to issue small-dollar loans to targeted individuals and provide them with the financial counselling necessary to conduct transactions and manage their accounts.
Title XIII:
Title XIII, commonly known as the “Pay It Back Act”, amends the Emergency Economic Stabilization Act of 2008 by decreasing the Secretary of the Treasury's authority to purchase distressed assets under the Troubled Asset Relief Program or (“TARP”) from $700 billion to $475 billion.
Title XIV:
Title XIV amends the Truth in Lending Act to establish a duty of care for all mortgage originators, which would require them to be properly qualified. , registered and licensed as needed, and to comply with any regulations designed by the Federal Reserve Board to monitor their operations.
Title XV:
Title XV contains seven miscellaneous provisions. Title XV restricts the ability of the United States' Executive Director at the International Monetary Fund to approve loans to foreign countries that are unlikely to be repaid in full.
Title XVI:
Title XVI prevents investors holding swaps from experiencing increased volatility in taxable capital gains and losses.
1. About EMIR:
The European Market Infrastructure Regulation or simply EMIR is a European Union regulation number 648 of the year 2012 introduced on 04 July 2012 and date of entry into force was 16 August 2012.
2. EMIR Regulation lays down the following:
1. Clearing and bilateral risk-management requirements for over-the-counter derivative contracts.
2. Reporting requirements for derivative contracts. And,
3. Uniform requirements for the performance of activities of central counterparties and trade repositories.
Meaning, entities that qualify for EMIR must report every derivative contract they enter into, to a trade repository. They must implement risk management standards according to EMIR, including margining related to their bilateral OTC derivatives and their operational processes. EMIR also covers trades that are not cleared by a central counterparty, meaning, irrespective where the counterparties trade whether in the European Economic Area or elsewhere, they must file reports wherever they enter into derivatives transactions.
3. Some of the important definitions:
1. OTC Derivatives:
OTC derivatives are derivatives which are not executed on a regulated market or on a third-country market considered equivalent to a regulated market.
2. Trade Repository:
A Trade Repository is an entity that centrally collects and maintains the records of over-the-counter or OTC derivatives.
3. A non-financial counterparty:
A non-financial counterparty is an undertaking established in the European Union other than the entities referred to below:
a) Investment Firm.
b) Credit Institution.
c) Insurance Undertaking or Reinsurance Undertaking.
d) UCITS and, where relevant, its Management Company.
e) Institution for Occupational Retirement Provision (IORP).
f) Alternative Investment Fund.
4. Central Counter-party:
A Central Counterparty or Central Clearing Counterparty or in short CCP, are intermediaries who help counterparties which are part of a derivative trade to clear and settles derivate transactions. The CCP’s are generally banks who collects enough money from each buyer and seller to cover potential losses in case agreement is not followed by any of the counterparty.
5. Trading Venue:
A trading venue is either a Regulated Market, or a Multilateral Trading Facility, or a Organised Trading Facility.
4. Salient features of EMIR:
1. The legal persons who are in the scope of EMIR are.
a) Over the counter derivatives.
b) Central clearing counterparties.
c) Trade repositories.
d) Non-financial counterparties and
e) Trading Venue.
2. OTC derivative contracts that are intragroup transactions shall not be subject to the clearing obligation.
3. The OTC derivative contracts that are subject to the clearing obligation shall be cleared in a CCP and listed in the register of trade repositories.
4. Where a competent authority of a member state, authorizes a CCP to clear a class of OTC derivatives, it shall immediately notify ESMA of that authorization.
5. The ESMA shall draft regulatory technical standards or RTS taking into consideration the following criteria:
a) the expected volume of the relevant class of OTC derivatives;
b) whether more than one CCP already clear the same class of OTC derivatives;
c) the ability of the relevant CCPs to handle the expected volume and to manage the risk arising from the clearing of the relevant class of OTC derivatives;
d) the type and number of counterparties active, and expected to be active within the market for the relevant class of OTC derivatives;
e) the period of time a counterparty subject to the clearing obligation needs in order to put in place arrangements to clear its OTC derivative contracts through a CCP;
f) the risk management and the legal and operational capacity of the range of counterparties that are active in the market for the relevant class of OTC derivatives.
6. ESMA maintain and keep up to date a public register in order to identify the classes of OTC derivatives subject to the clearing obligation. The register shall include:
a) The classes of OTC derivatives that are subject to the clearing obligation.
b) The CCPs that are authorised or recognised for the purpose of the clearing obligation.
7. A CCP that has been authorised to clear OTC derivative contracts shall accept clearing such contracts on a non-discriminatory and transparent basis, regardless of the trading venue.
8. A trading venue shall provide trade feeds on a non-discriminatory and transparent basis to any CCP that has been authorised to clear OTC derivative contracts traded on that trading venue upon request by the CCP.
9. Counterparties and CCPs shall ensure that the details of any derivative contract they have concluded and of any modification or termination of the contract are reported to a trade repository no later than the working day following the conclusion, modification or termination of the contract.
10. Where a non-financial counterparty takes positions in OTC derivative contracts and those positions exceed the clearing threshold, that non-financial counterparty shall immediately notify ESMA and the competent authority.
11. Financial counterparties and non-financial counterparties that enter into an OTC derivative contract not cleared by a CCP, shall ensure, exercising due diligence, that appropriate procedures and arrangements are in place to measure, monitor and mitigate operational risk and counterparty credit risk.
12. Member States shall lay down the rules on penalties applicable to infringements or violations.
13. A CCP shall have a permanent and available initial capital of at least EUR 7.5 million to be authorised.
14. Within 30 calendar days of the submission of a complete application, the CCP’s competent authority shall establish, manage and chair a college to facilitate the exercise of the tasks of that CCP. And, within four months of the submission of a complete application by the CCP, the CCP’s competent authority shall conduct a risk assessment of the CCP and submit a report to the college.
15. The CCP’s competent authority shall withdraw authorisation where the CCP:
a) has not made use of the authorisation within 12 months, or has provided no services or performed no activity for the preceding six months.
b) has obtained authorisation by making false statements or by any other irregular means;
c) is no longer in compliance with the conditions under which authorisation was granted.
d) has seriously and systematically infringed any of the requirements laid down in this Regulation.
16. The competent authorities shall review the arrangements, strategies, processes and mechanisms implemented by CCPs to comply with this Regulation and evaluate the risks to which CCPs are, or might be, exposed. The competent authorities shall regularly, and at least annually, inform the college of the results of the review and evaluation.
17. Each Member State shall designate the competent authority responsible for carrying out the duties resulting from this Regulation for the authorisation and supervision of CCPs established in its territory and shall inform the European Commission and ESMA thereof.
18. Competent authorities shall cooperate closely with each other, with ESMA and, if necessary, with the European System of Central Banks or ESCB.
19. The CCP’s competent authority or any other authority shall inform ESMA, the college, the relevant members of the ESCB and other relevant authorities without undue delay of any emergency situation relating to a CCP.
20. A CCP established in a third country may provide clearing services to clearing members or trading venues established in the Union only where that CCP is recognised by ESMA.
21. A CCP shall have robust governance arrangements, which include a clear organisational structure with well-defined, transparent and consistent lines of responsibility.
22. The senior management of a CCP shall be of sufficiently good repute and shall have sufficient experience so as to ensure the sound and prudent management of the CCP.
23. A CCP shall establish a risk committee, which shall be composed of representatives of its clearing members, independent members of the board and representatives of its clients.
24. A CCP shall maintain, for a period of at least 10 years, all the records on the services and activity provided so as to enable the competent authority to monitor the CCP’s compliance with this Regulation.
25. The competent authority shall not authorise a CCP unless it has been informed of the identities of the shareholders or members, whether direct or indirect, natural or legal persons, that have qualifying holdings and of the amounts of those holdings.
26. A CCP shall notify its competent authority of any changes to its management
27. A CCP shall maintain and operate effective written organisational and administrative arrangements to identify and manage any potential conflicts of interest between itself, including its managers, employees, or any person with direct or indirect control or close links, and its clearing members or their clients known to the CCP.
28. A CCP shall establish, implement and maintain an adequate business continuity policy and disaster recovery plan
29. Where a CCP outsources operational functions, services or activities, it shall remain fully responsible for discharging all of its obligations under this Regulation
30. A CCP and its clearing members shall publicly disclose the prices and fees associated with the services provided.
31. A CCP shall keep separate records and accounts that shall enable it, at any time and without delay, to distinguish in accounts with the CCP the assets and positions held for the account of one clearing member from the assets and positions held for the account of any other clearing member and from its own assets.
32. A CCP shall measure and assess its liquidity and credit exposures to each clearing member
33. A CCP shall impose, call and collect margins to limit its credit exposures from its clearing members
34. To limit its credit exposures to its clearing members further, a CCP shall maintain a pre-funded default fund to cover losses that exceed the losses to be covered by margin requirements.
35. A CCP shall at all times have access to adequate liquidity to perform its services and activities.
36. A CCP shall accept highly liquid collateral with minimal credit and market risk to cover its initial and ongoing exposure to its clearing members.
37. A CCP shall invest its financial resources only in cash or in highly liquid financial instruments with minimal market and credit risk
38. A CCP shall have detailed procedures in place to be followed where a clearing member does not comply with the participation requirements of the CCP
39. A CCP shall, where practical and available, use central bank money to settle its transactions.
40. A CCP may enter into an interoperability arrangement with another CCP. CCPs that enter into an interoperability arrangement shall put in place adequate policies, procedures and systems to effectively identify, monitor and manage the risks arising from the arrangement so that they can meet their obligations in a timely manner.
41. A trade repository shall submit an application for registration to ESMA.
42. If a trade repository which is applying for registration is an entity which is authorised or registered by a competent authority in the Member State where it is established, ESMA shall, without undue delay, notify and consult that competent authority prior to the registration of the trade repository.
43. ESMA shall, within 40 working days from the notification, examine the application for registration based on the compliance of the trade repository and shall adopt a fully reasoned registration decision or decision refusing registration.
44. ESMA may by simple request or by decision require trade repositories to provide all information that is necessary in order to carry out its duties under this Regulation.
45. Where, ESMA finds that a trade repository has, intentionally or negligently, committed one of the infringements, it shall adopt a decision imposing a fine.
I. Introduction:
MIFID was intended to replace the Investment Services Directive or (ISD). The directive created a single market for investment services and activities, which improves the competitiveness in European Union markets. MIFID was introduced to the European Union as a directive on 21 April 2004.
One of the objectives of this Directive is to protect investors. In order to protect investors, they should be classified as per their awareness of the financial markets and risks they can take. MIFID introduces two main categories of client (retail clients and professional clients), and a separate and distinct third category for a limited range of business (eligible counterparties). Different levels of regulatory protection attach to each category and hence to clients within each category.
Retail clients are afforded the most regulatory protection. Professional clients are considered to be more experienced, knowledgeable and sophisticated and able to assess their own risk and are afforded fewer regulatory protections. Eligible Counterparties are investment firms, credit institutions, insurance companies, UCITS and their management companies, other regulated financial institutions and in certain cases, other undertakings. MIFID provides a ‘light-touch’ regulatory regime when investment firms bring about or enter into transactions with ECPs. Let us understand each of the categorization in detail as given below.
1. Retail and Professional Clients.
Professional clients are considered to possess the experience, knowledge and expertise to make their own investment decisions and assess the risks inherent in their decisions. MIFID recognises certain persons as having these qualifications and automatically classifies them as professional clients. These persay professional clients are:
1. Entities which are required to be authorised or regulated to operate in the financial markets:
• credit institutions;
• investment firms;
• other authorised or regulated financial institutions;
• insurance companies;
• collective investment schemes and their management companies;
• pension funds and their management companies;
• commodity and commodity derivative dealers;
• locals;
• other institutional investors.
2. Large undertakings meeting two of the following size requirements on a company basis:
• balance sheet total of €20m,
• net turnover of €40m,
• own funds of €2m.
3. National and regional governments, public bodies that manage public debt, central banks and international and supranational institutions.
4. Other institutional investors whose main activity is to invest in financial instruments, including entities dedicated to the securitisation of assets or other financing transactions.
Any clients not falling within this list are, by default, retail clients.
2. Eligible counterparties or ECPs:
ECPs are considered to be the most sophisticated investor or capital market participant. Article 24 of MIFID permits those investment firms authorised to execute orders on behalf of clients and or to deal on own account and or receive and transmit orders, to bring about or enter into transactions with ECPs without complying with certain of the conduct of business obligations in MIFID. The list of entities automatically recognized as ECPs (persay eligible counterparties) are:
• investment firms;
• credit institutions;
• insurance companies;
• UCITS and their management companies;
• pension funds and their management companies;
• other financial institutions authorized and regulated under Community legislation or the national law of a Member State;
• undertakings exempted from the application of MIFID under Article 2(1)(k) or (l);
• national governments and their corresponding offices, including public bodies that deal with public debt;
• central banks and supranational institutions.
3. Meanings of few terms which will help better understand the MIFID Regulations:
1. A Systematic Internaliser (“SI”) is an investment firm which is a counterparty dealing with its proprietary capital.
2. Professional client is a client who possesses the experience, knowledge and expertise to make its own investment decisions and properly assess the risks that it incurs.
3. Competent Authorities are required to enforce the wide-ranging obligations laid down in this Directive. Usually, they are the regulators in the member states.
4. "Investment firm" means any legal person whose regular occupation or business is the provision of one or more investment services to third parties and/or the performance of one or more investment activities on a professional basis.
5. Ancillary services mean.
(1) Safekeeping and administration of financial instruments for the account of clients, including custodianship and related services such as cash/collateral management;
(2) Granting credits or loans to an investor to allow him to carry out a transaction in one or more financial instruments, where the firm granting the credit or loan is involved in the transaction;
(3) Advice to undertakings on capital structure, industrial strategy and related matters and advice and services relating to mergers and the purchase of undertakings;
(4) Foreign exchange services where these are connected to the provision of investment services;
(5) Investment research and financial analysis or other forms of general recommendation relating to transactions in financial instruments;
(6) Services related to underwriting.
6. "Market maker" means a person who holds himself out on the financial markets on a continuous basis as being willing to deal on own account by buying and selling financial instruments against his proprietary capital at prices defined by him.
7. Market operator" means a person or persons who manages and/or operates the business of a regulated market. The market operator may be the regulated market itself.
8. "Multilateral trading facility or (MTF)" means a multilateral system, operated by an investment firm or a market operator, which brings together multiple third-party buying and selling interests in financial instruments.
4. The salient features of MIFID:
1. Each Member State shall require that the performance of investment services or activities as a regular occupation or business on a professional basis be subject to prior authorisation granted by the home Member State competent authority. Authorisation shall in no case be granted solely for the provision of ancillary services.
2. Member States shall establish a register of all investment firms. This register shall be publicly accessible and shall contain information on the services and/or activities for which the investment firm is authorised.
3. The investment firm shall provide all information, including a programme of operations setting out inter alia the types of business envisaged and the organisational structure, necessary to enable the competent authority to satisfy itself. An applicant shall be informed, within six months of the submission of a complete application, whether or not authorisation has been granted.
4. The competent authority may withdraw the authorisation issued to an investment firm where such an investment firm:
(a) does not make use of the authorisation within 12 months, or has provided no investment services or performed no investment activity for the preceding six months.
(b) has obtained the authorisation by making false statements or by any other irregular means.
5. Member States shall require the persons who effectively direct the business of an investment firm to be of sufficiently good repute and sufficiently experienced as to ensure the sound and prudent management of the investment firm.
6. The competent authorities shall not authorise the performance of investment services or activities by an investment firm until they have been informed of the identities of the shareholders or members, whether direct or indirect, natural or legal persons, that have qualifying holdings and the amounts of those holdings.
7. The competent authority shall verify that any entity seeking authorisation as an investment firm meets its obligations on investor-compensation schemes.
8. Member States shall ensure that the competent authorities do not grant authorisation unless the investment firm has sufficient initial capital.
9. An investment firm shall establish adequate policies and procedures sufficient to ensure compliance of the firm including its managers, employees and tied agents with its obligations as well as appropriate rules governing personal transactions by such persons.
10. Member States shall require that investment firms or market operators operating an MTF, establish transparent and non-discretionary rules and procedures for fair and orderly trading and establish objective criteria for the efficient execution of orders.
11. Member States shall ensure that the competent authorities monitor the activities of investment firms so as to assess compliance with the operating conditions.
12. Member States shall require investment firms to take all reasonable steps to identify conflicts of interest between themselves, including their managers, employees and tied agents, or any person directly or indirectly linked to them by control and their clients or between one client and another that arise in the course of providing any investment and ancillary services, or combinations thereof.
13. Member States shall require that, when providing investment services and/or, where appropriate, ancillary services to clients, an investment firm act honestly, fairly and professionally. All information, including
a) marketing communications, addressed by the investment firm to clients or potential clients shall be fair, clear and not misleading.
b) Appropriate information shall be provided in a comprehensible form to clients or potential clients about the investment firm and its services, financial instruments and proposed investment strategies.
c) Appropriate guidance on and warnings of the risks associated with investments in those instruments or in respect of particular investment strategies, information on execution venues, and costs and associated charges.
14. When providing investment advice or portfolio management the investment firm shall obtain the necessary information regarding the client's or potential client's knowledge and experience in the investment field relevant to the specific type of product or service, his financial situation and his investment objectives so as to enable the firm to recommend to the client or potential client the investment services and financial instruments that are suitable for him.
15. Member States shall ensure that investment firms, when providing investment services, ask the client or potential client to provide information regarding his knowledge and experience in the investment field relevant to the specific type of product or service offered or demanded so as to enable
the investment firm to assess whether the investment service or product envisaged is appropriate for the client.
16. The client must receive from the investment firm adequate reports on the service provided to its clients. These reports shall include, where applicable, the costs associated with the transactions and services undertaken on behalf of the client.
17. Member States shall require that investment firms take all reasonable steps to obtain, when executing orders, the best possible result for their clients taking into account price, costs, speed, likelihood of execution and settlement, size, nature or any other consideration relevant to the execution of the order. Nevertheless, whenever there is a specific instruction from the client the investment firm shall execute the order following the specific instruction.
18. Member States shall require that where an investment firm decides to appoint a tied agent it remains fully and unconditionally responsible for any action or omission on the part of the tied agent when acting on behalf of the firm.
19. Member States shall require that investment firms authorised to execute orders on behalf of clients implement procedures and arrangements which provide for the prompt, fair and expeditious execution of client orders, relative to other client orders or the trading interests of the investment firm.
20. Member States shall ensure that investment firms authorised to execute orders on behalf of clients and/or to deal on own account and/or to receive and transmit orders, may bring about or enter into transactions with “eligible counterparties” without being obliged to comply with the following.
1. Article 19 where an investment firm is required to reasonably make the client understand the nature and risks of the investment service and of the specific type of financial instrument that is being offered.
2. Article 21 where an investment firm is required to provide information on the different venues where the investment firm executes its client orders and the factors affecting the choice of execution venue.
3. Article 22 of (1) where investment firms are required to execute order fast and as per the client orders in accordance with the time of their reception by the investment firm.
21. Member States shall recognise as eligible counterparties for the purposes of MIFID as investment firms, credit institutions, insurance companies, UCITS and their management companies, pension funds and their management companies, other financial institutions authorised or regulated under Community legislation or the national law of a Member State, national governments and their corresponding offices including public bodies that deal with public debt, central banks and supranational organisations.
22. Member States shall ensure that appropriate measures are in place to enable the competent authority to monitor the activities of investment firms to ensure that they act honestly, fairly and professionally and in a manner which promotes the integrity of the market and to restraint insider dealing and market manipulation.
23 Member States shall require that investment firms and market operators operating an MTF establish and maintain effective arrangements and procedures, relevant to the MTF.
24. Systematic internalisers shall make public their quotes on a regular and continuous basis during normal trading hours. They shall be entitled to update their quotes at any time. They shall also be allowed, under exceptional market conditions, to withdraw their quotes.
25. Member States shall, at least, require investment firms which, either on own account or on behalf of clients, conclude transactions in shares admitted to trading on a regulated market outside a regulated market or MTF, to make public the volume and price of those transactions and the time at which they were concluded. This information shall be made public as close to real-time as possible, on a reasonable commercial basis, and in a manner which is easily accessible to other market participants.
26. Member States shall, at least, require that investment firms and market operators operating an MTF make public current bid and offer prices and the depth of trading interests at these prices which are advertised through their systems in respect of shares admitted to trading on a regulated market.
27. Member States shall ensure that any investment firm authorised and supervised by the competent authorities of another Member State, may freely perform investment services and/or activities as well as ancillary services within their territories, provided that such services and activities are covered by its authorisation.
28. Member States shall not prevent investment firms and market operators operating an MTF from entering into appropriate arrangements with a central counterparty or clearing house and a settlement system of another Member State with a view to providing for the clearing and/or settlement of some or all trades concluded by market participants under their systems.
29. Member States shall require the persons who effectively direct the business and the operations of the regulated market to be of sufficiently good repute and sufficiently experienced as to ensure the sound and prudent management and operation of the regulated market.
30. Member States shall require the regulated market:
a) to have arrangements to identify clearly and manage the potential adverse consequences.
b) to be adequately equipped to manage the risks to which it is exposed.
c) to have arrangements for the sound management of the technical operations of the system, including the establishment of effective contingency arrangements to cope with risks of systems disruptions;
d) to have transparent and non-discretionary rules and procedures that provide for fair and orderly trading and establish objective criteria for the efficient execution of orders;
e) to have effective arrangements to facilitate the efficient and timely finalisation of the transactions executed under its systems;
f) to have available, at the time of authorisation and on an ongoing basis, sufficient financial resources to facilitate its orderly functioning.
31. Member States shall require that regulated markets have clear and transparent rules regarding the admission of financial instruments to trading and require the operator of the regulated market to communicate, on a regular basis, the list of the members and participants of the regulated market to the competent authority of the regulated market.
32. Member States shall, at least, require regulated markets to make public current bid and offer prices and the depth of trading interests at those prices which are advertised through their systems for shares admitted to trading.
33. Member States shall, at least, require regulated markets to make public the price, volume and time of the transactions executed in respect of shares admitted to trading. Member States shall require details of all such transactions to be made public, on a reasonable commercial basis and as close to real time as possible.
34. The European Commission shall publish a list of the competent authorities in the Official Journal of the European Union at least once a year and update it continuously on its website.
35. Member States shall require that competent authorities exchange any information which is essential or relevant to the exercise of their functions and duties.
36. Competent authorities shall be given all supervisory and investigatory powers that are necessary for the exercise of their functions.
37. Member States shall determine the sanctions to be applied for failure to cooperate in an investigation.
38. Member States shall ensure that any decision taken under laws, regulations or administrative provisions adopted in accordance with this Directive is properly reasoned and is subject to the right to apply to the courts.
39. Member States shall encourage the setting-up of efficient and effective complaints and redress procedures for the out-of-court settlement of consumer disputes concerning the provision of investment and ancillary services provided by investment firms, using existing bodies where appropriate.
40. Member States shall ensure that any legal person authorised and responsible for carrying out the statutory audits of accounting documents in an investment firm, shall have a duty to report promptly to the competent authorities any fact or decision concerning that undertaking of which that person has become aware while carrying out that task and which is liable to:
a) Constitute a material breach of the laws, regulations or administrative provisions which lay down the conditions governing authorisation or which specifically govern pursuit of the activities of investment firms;
b) Affect the continuous functioning of the investment firm;
c) Lead to refusal to certify the accounts or to the expression of reservations.
1. MIFID II Directive applies to:
1. Investment firms
2. Market operators,
3. Data reporting services providers, and
4. Third-country firms providing investment services or performing investment activities through the establishment of a branch in the European Union.
2. This Directive shall not apply to:
1. Insurance undertakings
2. Persons providing investment services exclusively for their parent undertakings
3. Persons dealing on own account in financial instruments other than commodity derivatives or emission allowances or derivatives thereof and not providing any other investment services or performing any other investment activities in financial instruments other than commodity derivatives or emission allowances or derivatives thereof unless such persons:
4. Market makers;
5. Deal on own account when executing client orders;
6. Collective investment undertakings and pension funds
7. Central Securities Deposits that are regulated.
8. The members of the European System of Central Banks and other national bodies performing similar functions in the Union.
3. Understanding some of the definitions:
1. Investment Firm:
Investment Firm means any legal person whose regular occupation or business is the provision of one or more investment services to third parties and/or the performance of one or more investment activities on a professional basis.
2. Investment services and activities:
1. Reception and transmission of orders in relation to one or more financial instruments; (2) Execution of orders on behalf of clients;
2. Dealing on own account;
3. Portfolio management;
4. Investment advice;
5. Underwriting of financial instruments and/or placing of financial instruments on a firm commitment basis;
6. Placing of financial instruments without a firm commitment basis;
7. Operation of a Multilateral trading facility;
8. Operation of an Organised trading facility.
3. Ancillary services means the following:
1. Safekeeping and administration of financial instruments for the account of clients, including custodianship and related services such as cash/collateral management.
2. Granting credits or loans to an investor to allow him to carry out a transaction in one or more financial instruments, where the firm granting the credit or loan is involved in the transaction.
3. Advice to undertakings on capital structure, industrial strategy and related matters and advice and services relating to mergers and the purchase of undertakings.
4. Foreign exchange services where these are connected to the provision of investment services;
5. Investment research and financial analysis or other forms of general recommendation relating to transactions in financial instruments;
6. Services related to underwriting.
4. Financial instruments means:
1. Transferable securities;
2. Money-market instruments;
3. Units in collective investment undertakings;
4. Options, futures, swaps, forward rate agreements and any other such derivative contracts relating to securities, currencies, interest rates, emission allowances or contracts relating to commodities.
5. ‘investment advice’ means the provision of personal recommendations to a client, either upon its request or at the initiative of the investment firm, in respect of one or more transactions relating to financial instruments;
6. Market makers are typically large banks or financial institutions who help to ensure there's enough liquidity in the markets, meaning there's enough volume of trading so trades can be done seamlessly.
7. A multilateral trading facility or (MTF) is a term for a trading system that facilitates the exchange of financial instruments between multiple parties. Example, Chi-X Europe, Liquidnet Europe, Currenex MTF, and UBS MTF.
8. ‘organised trading facility’ or ‘OTF’ means a multilateral system which is not a regulated market or an MTF and in which multiple third-party buying and selling interests in bonds, structured finance products, emission allowances or derivatives are able to interact in the system in a way that results in a contract.
9. ‘trading venue’ means a regulated market, an MTF or an OTF.
10. ‘third-country firm’ means a firm that would be a credit institution providing investment services or performing investment activities or an investment firm if its head office or registered office were located within the European Union.
4. Salient features of MiFID II:
1. Member States shall authorise any market operator to operate an MTF or an OTF, subject to the prior verification of their compliance by the home Member State competent authority.
2. Member States shall register all investment firms. The register shall be publicly accessible and shall contain information on the services or activities for which the investment firm is authorised. It shall be updated on a regular basis. Every authorisation shall be notified to European Securities and Markets Authority or E.S.M.A and E.S.M.A shall establish a list of all investment firms in the Union.
3. The home Member State shall ensure that the authorisation specifies the investment services or activities which the investment firm is authorised to provide. The authorisation may cover one or more of the ancillary services. However, authorisation shall in no case be granted solely for the provision of ancillary services.
4. The competent authority may withdraw the authorisation issued to an investment firm where such an investment firm:
a) does not make use of the authorisation within 12 months, or performed no investment activity for the preceding six months.
b) has obtained the authorisation by making false statements or by any other irregular means.
5. Member States shall ensure that the management body of an investment firm defines, oversees and is accountable for the implementation of the governance arrangements that ensure effective and prudent management of the investment firm including the segregation of duties in the investment firm and the prevention of conflicts of interest, and in a manner that promotes the integrity of the market and the interest of clients.
6. The competent authorities shall not authorise the provision of investment services or performance of investment activities by an investment firm until they have been informed of the identities of the shareholders or members, whether direct or indirect, natural or legal persons, that have qualifying holdings and the amounts of those holdings.
7. Member States shall ensure that the competent authorities do not grant authorisation unless the investment firm has sufficient initial capital.
8. An investment firm shall establish adequate policies and procedures sufficient to ensure compliance of the firm including its managers, employees and tied agents with its obligations under this Directive as well as appropriate rules governing personal transactions by such persons.
9. An investment firm shall arrange for records to be kept of all services, activities and transactions undertaken by it which shall be sufficient to enable the competent authority to fulfil its supervisory tasks.
10. An investment firm shall, when holding financial instruments belonging to clients, make adequate arrangements so as to safeguard the ownership rights of clients, especially in the event of the investment firm’s insolvency, and to prevent the use of a client’s financial instruments on own account except with the client’s express consent.
11. An investment firm that engages in algorithmic trading shall have in place effective systems and risk controls suitable to the business it operates to ensure that its trading systems are resilient and have sufficient capacity, are subject to appropriate trading thresholds and limits and prevent the sending of erroneous orders or the systems otherwise functioning in a way that may create or contribute to a disorderly market.
12. Member States shall require that investment firms and market operators operating an MTF or an OTF establish transparent rules regarding the criteria for determining the financial instruments that can be traded under its systems.
13. Member States shall require that investment firms and market operators operating an MTF, shall establish and implement non-discretionary rules for the execution of orders in the system.
14. Member States shall require that an investment firm and a market operator operating an OTF establishes arrangements preventing the execution of client orders in an OTF against the proprietary capital of the investment firm or market operator operating the OTF or from any entity that is part of the same group or legal person as the investment firm or market operator.
15. Member States shall ensure that the competent authorities monitor the activities of investment firms so as to assess compliance with the operating conditions provided for in this Directive.
16. Member States shall require that, when providing investment services or, where appropriate, ancillary services to clients, an investment firm act honestly, fairly and professionally in accordance with the best interests of its clients
17. Member States shall require investment firms to ensure and demonstrate to competent authorities on request that natural persons giving investment advice or information about financial instruments, investment services or ancillary services to clients on behalf of the investment firm possess the necessary knowledge and competence to fulfil their obligations. Member States shall publish the criteria to be used for assessing such knowledge and competence.
18. Member States shall ensure that investment firms, when providing investment services, ask the client or potential client to provide information regarding that person’s knowledge and experience in the investment field relevant to the specific type of product or service offered or demanded so as to enable the investment firm to assess whether the investment service or product envisaged is appropriate for the client.
19. The investment firm shall establish a record that includes the document or documents agreed between the investment firm and the client that set out the rights and obligations of the parties, and the other terms on which the investment firm will provide services to the client. The rights and duties of the parties to the contract may be incorporated by reference to other documents or legal texts.
20. Member States shall allow an investment firm receiving an instruction to provide investment or ancillary services on behalf of a client through the medium of another investment firm to rely on client information transmitted by the latter investment firm. The investment firm which mediates the instructions will remain responsible for the completeness and accuracy of the information transmitted.
21. Member States shall require that investment firms take all sufficient steps to obtain, when executing orders, the best possible result for their clients taking into account price, costs, speed, likelihood of execution and settlement, size, nature or any other consideration relevant to the execution of the order.
22. Member States shall require that investment firms authorised to execute orders on behalf of clients implement procedures and arrangements which provide for the prompt, fair and expeditious execution of client orders, relative to other client orders or the trading interests of the investment firm.
23. Member States shall allow an investment firm to appoint tied agents for the purposes of promoting the services of the investment firm, soliciting business or receiving orders from clients or potential clients and transmitting them, placing financial instruments and providing advice in respect of such financial instruments and services offered by that investment firm. Tied agents shall be registered in the public register in the Member State where they are established.
24. Member States shall require that investment firms from other Member States which are authorised to execute client orders or to deal on own account have the right of membership or have access to regulated markets established in their territory.
1. Introduction:
The Financial Record-keeping and Reporting of Currency and Foreign Transactions Act of 1970 is referred to as the Bank Secrecy Act or BSA. The purpose of the BSA is to require United States financial institutions to maintain appropriate records and file certain reports involving currency transactions and a financial institution’s customer relationships.
A currency transaction is any transaction involving the physical transfer of currency from one person to another and covers deposits, withdrawals, exchanges, or transfers of currency or other payments. U.S. financial institutions must file a Currency Transaction Report or CTR which is, Financial Crimes Enforcement Network (Fincen) Form 104, for each currency transaction over $10,000.
Currency is defined as currency and coin of the U.S. or any other country as long as it is customarily accepted as money in the country of issue. Multiple currency transactions shall be treated as a single transaction if the financial institution has knowledge that the transactions are by, or on behalf of, any person and result in either cash in or cash out totalling more than $10,000 during any one business day. All CTR’s must be filed to the IRS.
Transactions at all branches of a financial institution should be aggregated when determining reportable multiple transactions. A Suspicious Activity Report is filed by a reporting financial institution if it suspects or has reasonable grounds to suspect that funds are the proceeds of a criminal activity, or are related to terrorist financing. All SAR’s must be filed with Fincen.
Currency Transaction Reports and Suspicious Activity Reports are the primary means used by banks to satisfy the requirements of the BSA. The recordkeeping regulations include the requirement that a financial institution’s records be sufficient to enable transactions and activity in customer accounts to be reconstructed if necessary. In doing so, a paper and audit trail is maintained. These records and reports have a high degree of usefulness in criminal, tax, or regulatory investigations or proceedings.
2. Titles of BSA:
The BSA consists of two parts namely, Title 1 Financial Recordkeeping and, Title 2 Reports of Currency and Foreign Transactions.
Title 1: It authorizes the Secretary of the Department of the Treasury to issue regulations, which require insured financial institutions to maintain certain records.
Title 2: Title 2 is directed the Treasury to prescribe regulations governing the reporting of certain transactions by and through financial institutions in excess of $10,000 into, out of, and within the U.S.
The Treasury’s implementing regulations under the BSA, were originally intended to aid investigations into an array of criminal activities, from income tax evasion to money laundering. In recent years, the reports and records prescribed by the BSA have also been utilized as tools for investigating individuals suspected of engaging in illegal drug, and terrorist financing activities. Law enforcement agencies have found CTRs to be extremely valuable in tracking the huge amounts of cash generated by individuals and entities for illicit purposes.
SAR’s, used by financial institutions to report identified or suspected illicit or unusual activities, are likewise extremely valuable to law enforcement agencies. Several acts and regulations expanding and strengthening the scope and enforcement of the BSA, anti-money laundering (AML) measures, and counter-terrorist financing measures have been signed into law and issued, respectively, over the past several decades.
Example includes Money Laundering Control Act of 1986, Annuzio-Wylie Anti-Money Laundering Act of 1992, and The USA PATRIOT Act.
3. Exemptions:
Certain “persons” who routinely use currency may be eligible for exemption from CTR filings such as.
A bank to the extent of its domestic operations;
A Federal, State, or local government agency or department;
Any entity exercising governmental authority within the U.S. (U.S. includes District of Columbia, Territories, and Indian tribal lands);
Any listed entity other than a bank whose common stock or analogous equity interests are listed on the New York, American, or NASDAQ stock exchanges (with some exceptions);
Any U.S. domestic subsidiary (other than a bank) of any “listed entity” that is organized under U.S. law and at least 51 percent of the subsidiary’s common stock is owned by the listed entity.
A “payroll customer,” includes any other person not covered under the “exempt person” definition that operates a firm that regularly withdraws more than $10,000 in order to pay its U.S. Employees in currency.
The Securities and Exchange Commission (SEC) is responsible for regulating the securities markets at United States and thereby protecting the investors. Securities Exchange Act of 1934 created the Securities and Exchange Commission. The Act empowers the SEC with broad authority over all aspects of the securities industry. This includes the power to register, regulate, and oversee brokerage firms, transfer agents, and clearing agencies as well as the nation's securities self-regulatory organizations (SROs). The various securities exchanges, such as the New York Stock Exchange, the NASDAQ Stock Market, and the Chicago Board of Options are SROs.
The Financial Industry Regulatory Authority (FINRA) is also an SRO. The Act also identifies and prohibits certain types of conduct in the markets and provides the Commission with disciplinary powers over regulated entities and persons associated with them. The Act also empowers the SEC to require periodic reporting of information by companies with publicly traded securities.
Other Regulators: A bank's primary federal regulator could be the Federal Deposit Insurance Corporation (FDIC), the Federal Reserve Board, or the Office of the Comptroller of the Currency. The National Futures Association (NFA) is a self-regulatory organization that regulates the U.S. derivatives industry Derivatives Market. The National Association of Insurance Commissioners (NAIC) is the U.S. standard-setting and regulatory support organization created and governed by the chief insurance regulators from the 50 states, the District of Columbia and five U.S. territories.
MAS regulate financial institutions in the banking, capital markets, insurance and payments sectors. Meaning:
1. MAS regulate and supervise over 150 deposit-taking institutions in Singapore, including full banks, wholesale banks, merchant banks and finance companies.
2. MAS take responsibility for regulation and licensing for capital markets entities, including fund managers, REIT managers, corporate finance advisers, trustees, dealers, credit rating agencies and financial advisers.
3. MAS regulate licensed insurers, authorised reinsurers, approved Marine, Aviation and Transit (MAT) insurers, or foreign insurers.
4. MAS take responsibility for licensing, designation, regulations and guidance for payment service providers and payment systems in Singapore.
Further, The Accounting and Corporate Regulatory Authority (ACRA) is the regulator of business registration, financial reporting, public accountants and corporate service providers; it also facilitates enterprise.
1. Securities and Futures Commission:
a. Regulates and authorises publicly offered investment products and their offering documents eg unlisted investment products and listed exchange-traded funds (ETFs) and real-estate investment trusts (REITs) offered to the public in Hong Kong.
b. Licenses and supervises intermediaries eg brokers, investment advisers and fund houses.
c. Directly regulates takeovers and mergers of listed companies
d. Oversees market operator i.e., Hong Kong Exchanges and Clearing Limited which regulates listed companies and listed structured products.
2. Hong Kong Monetary Authority:
a. Regulates and supervises banks and deposit-taking companies
b. Regulates intermediaries i.e. banks and bank staff who are registered with the SFC for carrying on businesses in securities and futures.
3. Mandatory Provident Fund Schemes Authority:
a. Regulates and supervises MPF schemes / trustees
b. Acts as the registrar of the ORSO schemes
c. Registers MPF intermediaries who are regulated by the HKMA, IA and SFC for carrying on business in banking, insurance and securities respectively.\
4. Insurance Authority:
a. Authorises and supervises insurance companies
b. Regulates intermediaries i.e., insurance agents and brokers through overseeing self regulatory organisations.
Responsibility for the regulation and supervision of the Australian financial system is vested in four separate agencies:
1. The Australian Prudential Regulation Authority (APRA):
APRA is an independent statutory authority that supervises institutions across banking, insurance and superannuation.
2. The Australian Securities and Investments Commission (ASIC):
ASIC is Australia's integrated corporate, markets, financial services and consumer credit regulator.
3. The Reserve Bank of Australia (RBA):
The Reserve Bank has a role both in mitigating the risk of financial disturbances with potentially systemic consequences, and in responding in the event that a financial system disturbance does occur.
4. The Australian Treasury:
Treasury provides sound economic analysis and authoritative policy advice on issues such as: the economy, budget, taxation, financial sector, foreign investment, structural policy, superannuation, small business, housing affordability and international economic policy.
1. The Prudential Regulation Authority (“PRA”):
The PRA is the prudential regulator of around 1,500 banks, building societies, credit unions, insurers and major investment firms. As a prudential regulator, it has a general objective to promote the safety and soundness of the firms it regulates.
2. Financial Conduct Authority (“FCA”):
FCA regulates the conduct of around 51,000 businesses. They are the prudential supervisor for 49,000 firms and they set specific standards for around 18,000 firms.
a. Role of FCA in Banks:
The FCA supervises banks to:
a. Ensure they treat customers fairly
b. Encourage innovation and healthy competition
c. Help the FCA to identify potential risks early so they can take action to reduce the risks
b. Role of FCA in Mutual societies:
There are more than 10,000 mutual societies in the United Kingdom.The FCA are responsible for:
a. Registering new mutual societies.
b. Keeping public records.
c. Receiving annual returns.
c. Role of FCA in Financial advisers:
FCA ensure independent financial advisers (IFAs) are legally obliged to follow Retail Distribution Review (RDR) rules. In order to be classed as an IFA, a business must:
a. Offer a broad range of retail investment products.
b. Give consumers unbiased and unrestricted advice based on comprehensive and fair market analysis.
3. Bank of England:
Regulate UK banks and other financial firms, produce banknotes (cash) and oversee many of the other payment systems (eg with a debit or credit card).
4. Financial Policy Committee (FPC):
The Bank of England’s Financial Policy Committee (FPC) identifies, monitors and takes action to remove or reduce systemic risks with a view to protecting and enhancing the resilience of the UK financial system.
1. Office of the Superintendent of Financial Institutions (OSFI):
OSFI supervises and regulates federally registered banks and insurers, trust and loan companies, as well as private pension plans subject to federal oversight.
2. Bank of Canada:
The Bank’s four main areas of responsibility are:
Monetary policy: The Bank influences the supply of money circulating in the economy, using its monetary policy framework to keep inflation low and stable.
Financial system: The Bank promotes safe, sound and efficient financial systems, within Canada and internationally, and conducts transactions in financial markets in support of these objectives.
Currency: The Bank designs, issues and distributes Canada’s bank notes.
Funds management: The Bank is the "fiscal agent" for the Government of Canada, managing its public debt programs and foreign exchange reserves.
3. Canada Deposit Insurance Corporation:
Provide insurance against the loss of part or all of deposits;
Promote and otherwise contribute to the stability of the financial system in Canada;
Act for the benefit of depositors while minimizing loss.
1. The Reserve Bank of India:
The Reserve Bank of India performs the following functions:
1. Monetary Authority:
Formulates, implements and monitors the monetary policy.
maintain price stability while keeping in mind the objective of growth.
2. Regulator and supervisor of the financial system:
Prescribes broad parameters of banking operations within which the country's banking and financial system functions.
maintain public confidence in the system, protect depositors' interest and provide cost-effective banking services to the public.
3. Manager of Foreign Exchange:
Manages the Foreign Exchange Management Act, 1999.
Facilitate external trade and payment and promote orderly development and maintenance of foreign exchange market in India.
4. Issuer of currency:
Issues and exchanges or destroys currency and coins not fit for circulation.
Gives the public adequate quantity of supplies of currency notes and coins and in good quality.
5. Developmental role:
Performs a wide range of promotional functions to support national objectives.
6. Regulator and Supervisor of Payment and Settlement Systems:
Introduces and upgrades safe and efficient modes of payment systems in the country to meet the requirements of the public at large.
Maintain public confidence in payment and settlement system
7. Related Functions:
Banker to the Government: performs merchant banking function for the central and the state governments; also acts as their banker.
Banker to banks: maintains banking accounts of all scheduled banks.
2. Securities and Exchange Board of India (SEBI):
SEBI protects the interests of investors in securities.
Promote the development of securities market.
Regulate the securities market
3. Insurance Regulatory and Development Authority of India (IRDAI):
IRDAI is responsible for overall supervision and development of the Insurance sector in India.
There are countless organizations trying to get a handle on the problem of Money Laundering and Terrorist Financing. In the United States, the Department of Justice, the State Department, the Federal Bureau of Investigation, the Internal Revenue Service and the Drug Enforcement Agency all have divisions investigating money laundering and the underlying financial structures that make it work. State and local police also investigate cases that fall under their jurisdiction. Because global financial systems play a major role in most high-level laundering schemes, the international community is fighting money laundering through various means, including the Financial Action Task Force on Money Laundering . The United Nations, the World Bank and the International Monetary Fund also have anti-money-laundering divisions.
Let us check on some of the major contributors and their roles on AML/CTF as given below:
1. Introduction:
The Financial Action Task Force (FATF) is an inter-governmental body established in 1989 by the Ministers of its Member jurisdictions. The mandate of the FATF is to set standards and to promote effective implementation of legal, regulatory and operational measures for combating money laundering, terrorist financing and the financing of proliferation, and other related threats to the integrity of the international financial system. The FATF identifies jurisdictions with strategic deficiencies in their frameworks to combat money laundering and the financing of terrorism and proliferation. In collaboration with other international stakeholders, the FATF also works to identify national-level vulnerabilities with the aim of protecting the international financial system from misuse. The 40 FATF Recommendations set out a comprehensive and consistent framework of measures which countries should implement in order to combat money laundering and terrorist financing, as well as the financing of proliferation of weapons of mass destruction. Countries have diverse legal, administrative and operational frameworks and different financial systems, and so cannot all take identical measures to counter these threats. The FATF Recommendations, therefore, set an international standard, which countries should implement through measures adapted to their particular circumstances. The FATF Recommendations set out the essential measures that countries should have in place to:
Identify the risks, and develop policies and domestic coordination
Pursue money laundering, terrorist financing and the financing of proliferation
Apply preventive measures for the financial sector and other designated sectors
Establish powers and responsibilities for the competent authorities (e.g., investigative, law enforcement and supervisory authorities) and other institutional measures
Enhance the transparency and availability of beneficial ownership information of legal persons and arrangements; and
Facilitate international cooperation.
2. FATF Forty Recommendations:
The original FATF Forty Recommendations were drawn up in 1990 as an initiative to combat the misuse of financial systems by persons laundering drug money. In 1996 the Recommendations were revised for the first time to reflect evolving money laundering trends and techniques, and to broaden their scope well beyond drug-money laundering. In October 2001 the FATF expanded its mandate to deal with the issue of the funding of terrorist acts and terrorist organisations, and took the important step of creating the Eight (later expanded to Nine) Special Recommendations on Terrorist Financing. The FATF Recommendations were revised a second time in 2003, and these, together with the Special Recommendations, have been endorsed by over 180 countries, and are universally recognised as the international standard for anti-money laundering and countering the financing of terrorism (AML/CFT).
The forty recommendations are as given below. The contents have been shortened for easy understanding.
A – AML/CFT POLICIES AND COORDINATION
1. Assessing risks & applying a risk-based approach:
Countries should identify, assess, and understand the money laundering and terrorist financing risks for the country, and should take action, including designating an authority or mechanism to coordinate actions to assess risks, and apply resources, aimed at ensuring the risks are mitigated effectively.
2. National cooperation and coordination:
Countries should ensure that policy-makers, the financial intelligence unit (FIU), law enforcement authorities, supervisors and other relevant competent authorities, at the policymaking and operational levels, have effective mechanisms in place which enable them to cooperate, and, where appropriate, coordinate domestically with each other concerning the development and implementation of policies and activities to combat money laundering.
B – MONEY LAUNDERING AND CONFISCATION
3. Money laundering offence:
Countries should criminalise money laundering. Countries should apply the crime of money laundering to all serious offences, with a view to including the widest range of predicate offences.
4. Confiscation and provisional measures:
Countries should adopt measures to freeze or seize and confiscate the following:
Property laundered
Proceeds from, or instrumentalities used in or intended for use in money laundering or predicate offences
Property that is the proceeds of, or used in, or intended or allocated for use in, the financing of terrorism, terrorist acts or terrorist organisations
Property of corresponding value.
C – TERRORIST FINANCING AND FINANCING OF PROLIFERATION
5. Terrorist financing offence:
Countries should criminalise terrorist financing on the basis of the Terrorist Financing Convention.
6. Targeted financial sanctions related to terrorism & terrorist financing:
Countries should implement targeted financial sanctions regimes to comply with United Nations Security Council resolutions.
7. Targeted financial sanctions related to proliferation:
Countries should implement targeted financial sanctions to comply with United Nations Security Council resolutions relating to the prevention, suppression and disruption of proliferation of weapons of mass destruction and its financing.
8. Non-profit organisations:
Countries should review the adequacy of laws and regulations that relate to entities that can be abused for the financing of terrorism. Non-profit organisations are particularly vulnerable, and countries should ensure that they cannot be misused.
D – PREVENTIVE MEASURES
9. Financial Institution Secrecy Laws:
Countries should ensure that financial institution secrecy laws do not inhibit implementation of the FATF recommendations.
10. Customer Due Diligence:
Financial institutions should be prohibited from keeping anonymous accounts or accounts in obviously fictitious names. Financial institutions should be required to undertake customer due diligence (CDD) measures.
11. Record Keeping:
Financial institutions should be required to maintain, for at least five years, all necessary records on transactions, both domestic and international, to enable them to comply swiftly with information requests from the competent authorities.
12. Politically Exposed Persons:
Financial institutions should be required to take reasonable measures to determine whether a customer or beneficial owner is a domestic PEP or a person who is or has been entrusted with a prominent function by an international organisation.
13. Correspondent Banking:
Financial institutions should be prohibited from entering into, or continuing, a correspondent banking relationship with shell banks. Financial institutions should be required to satisfy themselves that respondent institutions do not permit their accounts to be used by shell banks.
14. Money or value transfer services:
Countries should take measures to ensure that natural or legal persons that provide money or value transfer services (MVTS) are licensed or registered, and subject to effective systems for monitoring and ensuring compliance with the relevant measures called for in the FATF Recommendations.
15. New technologies:
Countries and financial institutions should identify and assess the money laundering or terrorist financing risks that may arise in relation to (a) the development of new products and new business practices, including new delivery mechanisms, and (b) the use of new or developing technologies for both new and pre-existing products.
16. Wire transfers:
Countries should ensure that financial institutions include required and accurate originator information, and required beneficiary information, on wire transfers and related messages, and that the information remains with the wire transfer or related message throughout the payment chain.
17. Reliance on third parties’ requirements will be made available from the third party upon request without delay:
The financial institution should satisfy itself that the third party is regulated, supervised or monitored for, and has measures in place for compliance with, CDD and record-keeping requirements.
18. Internal controls and foreign branches and subsidiaries:
Financial groups should be required to implement groupwide programmes against money laundering and terrorist financing, including policies and procedures for sharing information within the group for AML/CFT purposes.
19. Higher-risk countries:
Financial institutions should be required to apply enhanced due diligence measures to business relationships and transactions with natural and legal persons, and financial institutions, from countries for which this is called for by the FATF.
20. Reporting of suspicious transactions:
If a financial institution suspects or has reasonable grounds to suspect that funds are the proceeds of a criminal activity, or are related to terrorist financing, it should be required, by law, to report promptly its suspicions to the financial intelligence unit (FIU).
21. Tipping-off and confidentiality:
Financial institutions, their directors, officers and employees should be: (a) protected by law from criminal and civil liability for breach of any restriction on disclosure of information imposed by contract or by any legislative, regulatory or administrative provision, if they report their suspicions in good faith to the FIU, even if they did not know precisely what the underlying criminal activity was, and regardless of whether illegal activity actually occurred; and (b) prohibited by law from disclosing (“tipping-off”) the fact that a suspicious transaction report (STR) or related information is being filed with the FIU.
22. Designated non-financial Businesses and Professions (DNFBPs) Customer due diligence:
The customer due diligence and record-keeping requirements should apply to designated non-financial businesses and professions (DNFBPs) in the following situations:
a) Casinos.
b) Real estate agents.
c) Dealers in precious metals and dealers in precious stones.
d) Lawyers, notaries, other independent legal professionals and accountants.
e) Trust and company service providers.
23. DNFBPs: Other measures:
The requirements set out in Recommendations 18 to 21 apply to all designated non-financial businesses and professions.
E – TRANSPARENCY AND BENEFICIAL OWNERSHIP OF LEGAL PERSONS AND ARRANGEMENTS
24. Transparency and beneficial ownership of legal persons:
Countries should take measures to prevent the misuse of legal persons for money laundering or terrorist financing. Countries should ensure that there is adequate, accurate and timely information on the beneficial ownership and control of legal persons that can be obtained or accessed in a timely fashion by competent authorities.
25. Transparency and beneficial ownership of legal arrangements:
Countries should take measures to prevent the misuse of legal arrangements for money laundering or terrorist financing.
F – POWERS AND RESPONSIBILITIES OF COMPETENT AUTHORITIES AND OTHER INSTITUTIONAL MEASURES
26. Regulation and supervision of financial institutions:
Countries should ensure that financial institutions are subject to adequate regulation and supervision and are effectively implementing the FATF Recommendations.
27. Powers of supervisors:
Supervisors should have adequate powers to supervise or monitor, and ensure compliance by, financial institutions with requirements to combat money laundering and terrorist financing, including the authority to conduct inspections.
28. Regulation and supervision of DNFBPs:
Designated non-financial businesses and professions should be subject to regulatory and supervisory measures.
29. Financial intelligence units:
Countries should establish a financial intelligence unit (FIU) that serves as a national centre for the receipt and analysis of:
a) suspicious transaction reports; and,
b) other information relevant to money laundering, associated predicate offences and terrorist financing, and for the dissemination of the results of that analysis.
30. Responsibilities of law enforcement and investigative authorities:
Countries should ensure that designated law enforcement authorities have responsibility for money laundering and terrorist financing investigations within the framework of national AML/CFT policies.
31. Powers of law enforcement and investigative authorities:
When conducting investigations of money laundering, associated predicate offences and terrorist financing, competent authorities should be able to obtain access to all necessary documents and information for use in those investigations, and in prosecutions and related actions.
32. Cash couriers:
Countries should have measures in place to detect the physical cross-border transportation of currency and bearer negotiable instruments, including through a declaration system and/or disclosure system.
33. Statistics:
Countries should maintain comprehensive statistics on matters relevant to the effectiveness and efficiency of their AML/CFT systems.
34. Guidance and feedback:
The competent authorities, supervisors and SRBs (Self-Regulatory Body) should establish guidelines, and provide feedback, which will assist financial institutions and designated non-financial businesses and professions in applying national measures to combat money laundering and terrorist financing, and, in particular, in detecting and reporting suspicious transactions.
35. Sanctions:
Countries should ensure that there is a range of effective, proportionate and dissuasive sanctions, whether criminal, civil or administrative, available to deal with natural or legal persons covered by Recommendations 6, and 8 to 23 that fail to comply with AML/CFT requirements.
G – INTERNATIONAL COOPERATION
36. International instruments:
Countries should take immediate steps to become party to and implement fully the Vienna Convention, 1988; the Palermo Convention, 2000; the United Nations Convention against Corruption, 2003; and the Terrorist Financing Convention, 1999.
37. Mutual legal assistance:
Countries should rapidly, constructively and effectively provide the widest possible range of mutual legal assistance in relation to money laundering, associated predicate offences and terrorist financing investigations, prosecutions and related proceedings.
38. Mutual legal assistance (freezing and confiscation):
Countries should ensure that they have the authority to take expeditious action in response to requests by foreign countries to identify, freeze, seize and confiscate property laundered.
39. Extradition:
Countries should constructively and effectively execute extradition requests in relation to money laundering and terrorist financing, without undue delay.
40. Other forms of international cooperation:
Countries should ensure that their competent authorities can rapidly, constructively and effectively provide the widest range of international cooperation in relation to money laundering, associated predicate offences and terrorist financing.
FATF mutual evaluations are in-depth country reports analysing the implementation and effectiveness of measures to combat money laundering and terrorist financing. Mutual evaluations are peer reviews, where members from different countries assess another country. A mutual evaluation report provides an in-depth description and analysis of a country’s system for preventing criminal abuse of the financial system as well as focused recommendations to the country to further strengthen its system.
Mutual evaluations are strict and a country is only deemed compliant if it can prove this to the other members. In other words, the onus is on the assessed country to demonstrate that it has an effective framework to protect the financial system from abuse.
Mutual Evaluations have two basic components, effectiveness and technical compliance.
a. The main component of a mutual evaluation is effectiveness. This is the focus of the on-site visit to the assessed country. During this visit, the assessment team will require evidence that demonstrates that the assessed country’s measures are working and deliver the right results. What is expected from a country differs, depending on the money laundering / terrorist financing and other risks it is exposed to. To ensure consistent and fair assessments, the FATF has developed an elaborate assessment methodology.
b. The assessment of technical compliance is part of each mutual evaluation. The assessed country must provide information on the laws, regulations and any other legal instruments it has in place to combat money laundering and the financing of terrorism and proliferation. This used to be the main focus of FATF, and FATF still requires the legal framework to be in place. But experience has shown that having the laws in the books is not enough, the main focus is now on effectiveness.
The United Nations (UN) was the first international organization to undertake significant action to fight money laundering on a truly world-wide basis. The UN is important in this regard for several reasons. First, it is the international organization with the broadest range of membership. Founded in October of 1945, there are currently 191 member states of the UN from throughout the world. Second, the UN actively operates a program to fight money laundering; the Global Programme against Money Laundering which is headquartered in Vienna, Austria, and is part of the UN Office of Drugs and Crime.
Third, and perhaps most importantly, the UN has the ability to adopt international treaties or conventions that have the effect of law in a country once that country has signed, ratified and implemented the convention, depending upon the country’s constitution and legal structure. In certain cases, the UN Security Council has the authority to bind a country through a Security Council Resolution regardless of other action.
1. The Vienna Convention:
As a result of growing concern with increased international drug trafficking and the tremendous amounts of related money entering the banking system, the UN, through the United Nations Drug Control Program (UNDCP) initiated an international agreement to combat drug trafficking and the money laundering resulting from it. In 1988, this effort resulted in the adoption of the United Nations Convention against Illicit Traffic in Narcotic Drugs and Psychotropic Substances (1988) (Vienna Convention). The Vienna Convention, named for the city in which it was signed, and 166 countries are party to the convention and deals primarily with provisions to fight the illicit drug trade and related law enforcement issues. Although it does not use the term money laundering, the convention defines the concept and calls upon countries to criminalize the activity. The Vienna Convention is limited, however, to drug trafficking as predicate offenses and does not address the preventive aspects of money laundering. The convention came into force on November 11, 1990.
2. The Palermo Convention:
In order to expand the effort to fight international organized crime, the UN adopted The International Convention against Transnational Organized Crime (2000) (Palermo Convention). This convention, also named for the city in which it was signed, contains a broad range of provisions to fight organized crime and commits countries that ratify this convention to implement its provisions through passage of domestic laws. With respect to money laundering, the Palermo Convention specifically obligates each ratifying country to:
Criminalize money laundering and include all serious crimes as predicate offenses of money laundering, whether committed in or outside of the country, and permit the required criminal knowledge or intent to be inferred from objective facts.
Establish regulatory regimes to deter and detect all forms of money laundering, including customer identification, record-keeping and reporting of suspicious transactions.
Authorize the cooperation and exchange of information among administrative, regulatory, law enforcement and other authorities, both domestically and internationally, and consider the establishment of a financial intelligence unit to collect, analyze and disseminate information and,
Promote international cooperation.
According to the UN, this convention is not yet in force; it has been signed by 147 countries and ratified by 32 countries. Forty countries need to ratify this convention before it can enter into force. The Palermo Convention is important because its AML provisions adopt the same approach previously adopted by the Financial Action Task Force on Money Laundering in its Forty Recommendations.
3. International Convention for the Suppression of the Financing of Terrorism:
The financing of terrorism was an international concern prior to the attacks on the United States of September 11, 2001. In response to this concern, the UN adopted the International Convention for the Suppression of the Financing of Terrorism (1999). This convention came into force on April 10, 2002, and 132 countries have signed the convention and 76 countries have ratified it. This convention requires ratifying states to criminalize terrorism, terrorist organizations and terrorist acts. Under the convention, it is unlawful for any person to provide or collect funds with the
intent that the funds be used for, or
knowledge that the funds be used to, carry out any of the acts of terrorism defined in the other specified conventions that are annexed to this convention.
4. Security Council Resolution 1373:
Unlike an international convention, which requires ratification and implementation by the UN member country to have the effect of law within that country, a Security Council Resolution passed in response to a threat to international peace and security under Chapter VII of the UN Charter, is binding upon all UN member countries. On September 28, 2001, the UN Security Council adopted Resolution 1373, which obligates countries to criminalize actions to finance terrorism. It further obligates countries to:
1. Deny all forms of support for terrorist groups.
2. Suppress the provision of safe haven or support for terrorist, including freeing funds or assets of persons, organizations or entities involved in terrorist acts
3. Prohibit active or passive assistance to terrorists and
4. Cooperate with other countries in criminal investigations and sharing information about planned terrorist acts.
5. Global Programme against Money Laundering:
The UN Global Programme against Money Laundering (GPML) is within the UN Office of Drugs and Crime (ODC). The GPML is a research and assistance project with the goal of increasing the effectiveness of international action against money laundering by offering technical expertise, training and advice to member countries upon request. It focuses its efforts in the following areas:
Raise the awareness level among key persons in UN member states.
Help create legal frameworks with the support of model legislation for both common and civil law countries.
Develop institutional capacity, in particular with the creation of financial intelligence units.
International Standard.
Provide training for legal, judicial, law enforcement regulators and the private financial sectors; Promote a regional approach to addressing problems; develop and maintain strategic relationships with other organizations; and,
Maintain a database of information and undertake analysis of relevant information.
Thus, the GPML is a resource for information, expertise and technical assistance in establishing or improving a country’s AML infrastructure.
6. The Counter-Terrorism Committee:
As noted above, on September 28, 2001, the UN Security Council adopted a resolution (Resolution 1373) in direct response to the events of September 11, 2001. That resolution obligated all member countries to take specific actions to combat terrorism. The resolution, which is binding upon all member countries, also established the Counter Terrorism Committee (CTC) to monitor the performance of the member countries in building a global capacity against terrorism.
The CTC, which is comprised of the 15 members of the Security Council, is not a law enforcement agency, nor is it a sanctions committee, nor does it prosecute or condemn individual countries. Rather, the Committee seeks to establish a dialogue between the Security Council and member countries on how to achieve the objectives of Resolution 1373. Resolution 1373 calls upon all countries to submit a report to the CTC on the steps taken to implement the resolution’s measures and report regularly on progress. In this regard, the CTC has asked each country to perform a self-assessment of its existing legislation and mechanism to combat terrorism in relation to the requirements of Resolution 1373. The CTC identifies the areas where a country needs to strengthen its statutory base and infrastructure, and facilitate assistance for countries, although the CTC does not, itself, provide direct assistance.
The CTC maintains a website with a directory for countries seeking help in improving their counter-terrorism infrastructures. It contains copies of model legislation and other helpful information.
The International Association of Insurance Supervisors (IAIS), established in 1994, is an organization of insurance supervisors from more than 100 different countries and jurisdictions.51
Its primary objectives are to:
Promote cooperation among insurance regulators
Set international standard for insurance supervision
Provide training to members, and
Coordinate work with regulators in the other financial sectors and international financial institutions.
In addition to member regulators, the IAIS has more than 60 observer members, representing industry associations, professional associations, insurance and reinsurance companies, consultants and international financial institutions. While the IAIS covers a wide range of topics including virtually all areas of insurance supervision, it specifically deals with money laundering in one of its papers. In January 2002, the association issued Guidance Paper No. 5, Anti-Money Laundering Guidance Notes for Insurance Supervisors and Insurance Entities (AML Guidance Notes). It is a comprehensive discussion on money laundering in the context of the insurance industry. Like other international documents of its type, the AML Guidance Notes are intended to be implemented by individual countries taking into account the particular insurance companies involved, the products offered within the country, and the country’s own financial system, economy, constitution and legal system. The AML Guidance Notes contain four principles for insurance entities:
• Comply with anti-money laundering laws
• Have “know your customer” procedures
• Cooperate with all law enforcement authorities, and
• Have internal AML policies, procedures and training programs for employees.
The Basel Committee on Banking Supervision (BCBS) is the primary global standard setter for the prudential regulation of banks and provides a forum for regular cooperation on banking supervisory matters. Basel Committee time to time releases AML/CFT guidelines on supervisory cooperation. E.g., updated version of its guidelines on Sound management of risks related to money laundering and financing of terrorism, with guides on the interaction and cooperation between prudential and anti-money laundering and combatting the financing of terrorism (AML/CFT) supervisors. These guidelines are intended to enhance the effectiveness of supervision of banks' money laundering and financing of terrorism (FT) risk management, consistent with and complementary to the goals and objectives of the standards issued by the Financial Action Task Force (FATF) and principles and guidelines published by the Basel Committee.
1. Introduction:
The European Union introduced its first anti-money laundering Directives on 10th June 1991. The first AML Directive adopted criminalization of drugs trafficking from 1988 United nations UN Convention. It adopted the definition of Money laundering and prohibited member states from being indulged in Money Laundering. The first AML Directive also talks about the initial customer due diligence and transaction monitoring requirements.
2. Salient Features of first AMLD:
1. Money laundering is prohibited among the member states.
2. Member States shall ensure that credit and financial institutions require identification of their customers, by means of supporting evidence when entering into business relations, particularly when opening an account or savings accounts, or when offering safe custody facilities.
3. The identification requirement shall also apply for any transaction with customers, involving a sum amounting to European Currency Unit 15000 or more, whether the transaction is carried out in a single operation or in several operations which seem to be linked.
4. For insurance policies if the periodic premium amount or amounts to be paid in any given year exceed the EUR 1000 threshold, identification shall be required. However, identification requirement is not compulsory for insurance policies in respect of pension schemes, taken out by virtue of a contract of employment or the insured's occupation, provided that such policies contain no surrender clause and may not be used as collateral for a loan.
5. All casino customers shall be identified if they purchase or sell gambling chips with a value of EUR 1000 or more. Casinos in the member states, wherever there is suspicion of money laundering, even where the amount of the transaction is lower than the threshold laid down, should carry out identification.
6. For Non face to face customer account opening, the financial institutions take additional measures of identification. Such measures shall ensure that the customers’ identity is established, for example, by requiring additional documentary evidence, or supplementary measures to verify or certify the documents supplied, or confirmatory certification by an institution, or by requiring that the first payment of the operations is carried out through an account opened in the customer’s name with a credit institution.
7. Member States shall ensure that the any financial institutions directors and employees cooperate fully with the authorities responsible for combating money laundering.
8. For notaries and independent legal professionals, Member States may designate an appropriate self-regulatory body of the profession concerned.
9. Member States shall ensure that the financial institutions and persons subject to this Directive refrain from carrying out transactions which they know or suspect to be related to money laundering until they have appraised the concerned money laundering authorities.
10. Member States shall ensure that supervisory bodies empowered by law or regulation to oversee the stock, foreign exchange and financial derivatives markets, inform the authorities responsible for combating money laundering if they discover facts that could constitute evidence of money laundering.
11. Member States shall ensure that the financial institutions and persons subject to this Directive, establish adequate procedures of internal control and communication in order to forestall and prevent operations related to money laundering, and take appropriate measures so that their employees are aware of the provisions contained in this Directive.
12. Member States shall ensure that the financial institutions and persons subject to this Directive, have access to up-to-date information on the practices of money launderers and on indications leading to the recognition of suspicious transactions.
1. Introduction:
The second AML directives of European Union were introduced on 04 December 2001.The directives provided clear definitions of credit institutions and Financial Institutions. The competent authorities for scope of examinations were increased to other firms.
2. Salient features of second AML directives:
1. The first AML directives has definition of credit institution limited to credit institutions having their head offices “outside” the Community. The definition slightly modified and said, credit institutions having their head offices “inside or outside” the Community.
2. The financial institutions definition included new firms such as currency exchange offices or bureaux de change, money transmission or remittance offices, investment firm, collective investment undertaking marketing its units or shares in its definition.
3. Under the criminal activities, the following were additionally added in second AML Directives:
A serious fraud, Corruption and an offence which may generate substantial proceeds and which is punishable by a severe sentence of imprisonment in accordance with the penal law of the Member State.
4. The supervision by competent authority in first AML Directives was restricted to credit or financial institutions. However, the definition expanded to the following institutions.
a) Legal or natural persons acting in the exercise of their professional activities of auditors, external accountants and tax advisors,
b) Real estate agents,
c) Notaries and other independent legal professionals according to their participation,
d) Dealers in high-value goods, such as precious stones or metals, or works of art, auctioneers, whenever payment is made in cash, and in an amount of EUR 15000 or more;
e) Casinos.
5. The transactions threshold for reporting money laundering was changed from European Union Currency unit to EURO currency.
6. In the case of identification, a copy or the references of the evidence required, for a period of at least five years after the relationship with their customer has ended.
7. Credit and financial institutions are replaced by institutions in the second directive and their directors and employees shall not disclose to the customer concerned nor to other third persons that information has been transmitted to the competent authorities that a money laundering investigation is being carried out.
1. Introduction:
The third AML directives of European union was introduced on 26 October 2005.The third AML directives was based on elements of FATF’s revised 40 Recommendations.
The directives newly initiated the elements of “Knowledge”, “intention” and “purpose” in Money laundering. The definition of Terrorist financing was introduced during third directives.
Trust or company service providers were newly included in the directives.
2. Salient features of third AML directives:
1. In the definition of Financial Institution, the two of the below have been added.
a) An insurance intermediary when they act in respect of life insurance and other investment related services.
b) Branches whose head offices are inside or outside the Community.
2. Definition of Beneficial owners included which is,
‘beneficial owner’ means a natural person or persons who ultimately owns or controls the customer and or the natural person on whose behalf a transaction or activity is being conducted.
3. The ‘trust and company service providers’ has been defined in this directive as any natural or legal person which by way of business provides any of the following services to third parties:
One, forming companies or other legal persons;
Two, acting as or arranging for another person to act as a director or secretary of a company, a partner of a partnership, or a similar position in relation to other legal persons;
Three, providing a registered office, business address, correspondence or administrative address and other related services for a company, a partnership or any other legal person or arrangement.
Fourth, acting as or arranging for another person to act as a trustee of an express trust or a similar legal arrangement;
Fifth, acting as or arranging for another person to act as a nominee shareholder for another person other than a company listed on a regulated market that is subject to disclosure requirements in conformity with Community legislation or subject to equivalent international standards;
4. ‘Politically Exposed Persons’ has been defined in this directive as natural persons who are or have been entrusted with prominent public functions and immediate family members, or persons known to be close associates, of such persons
5. ‘business relationship’ has been defined as a business, professional or commercial relationship which is connected with the professional activities of the institutions and persons.
6. Shell Bank as defined in this directive means a credit institution, or an institution engaged in equivalent activities, incorporated in a jurisdiction in which it has no physical presence, involving meaningful mind and management, and which is unaffiliated with a regulated financial group.
7. Member States shall prohibit their credit and financial institutions from keeping anonymous accounts or anonymous passbooks.
8. The institutions and persons covered by this Directive shall apply customer due diligence measures in the following cases:
When establishing a business relationship.
When carrying out occasional transactions amounting to EUR 15000 or more, whether the transaction is carried out in a single operation or in several operations which appear to be linked.
When there is a suspicion of money laundering or terrorist financing, regardless of any derogation, exemption or threshold;
When there are doubts about the veracity or adequacy of previously obtained customer identification data.
9. Member States shall require that the verification of the identity of the customer and the beneficial owner takes place before the establishment of a business relationship or the carrying-out of the transaction.
10. Member States shall require that institutions and persons covered by this Directive apply the customer due diligence procedures not only to all new customers but also at appropriate times to existing customers on a risk-sensitive basis.
11. In the first Money Laundering Directive, all casino customers be identified and their identity be verified if they purchase or exchange gambling chips with a value of EUR 1000 has been increased to EUR 2000 in this directive. This directive also has added, that the Casinos subject to State supervision shall be deemed in any event to have satisfied the customer due diligence requirements if they register, identify and verify the identity of their customers immediately on or before entry, regardless of the amount of gambling chips purchased.
12. A customer due diligence for life insurance, the following has been added.
1. Customer due diligence is not required for single premium which is no more than EUR 2500.
2. A pension, superannuation or similar scheme that provides retirement benefits to employees.
13. Member States shall prohibit the institutions and persons covered by this Directive from applying simplified due diligence to credit and financial institutions or listed companies from the third country.
14. Member States shall require the institutions and persons covered by this Directive to apply, on a risk-sensitive basis, enhanced customer due diligence measures, in situations which by their nature can present a higher risk of money laundering or terrorist financing.
15. Each Member State shall establish a FIU in order effectively to combat money laundering and terrorist financing.
16. Member States shall require that their credit and financial institutions have systems in place that enable them to respond fully and rapidly to enquiries from the FIU.
17. Member States shall provide that currency exchange offices and trust and company service providers shall be licensed or registered and casinos be licensed in order to operate their business legally.
18. Member States to lay down effective, proportionate and dissuasive penalties in national law for failure to curb Money Laundering and terrorist financing.
1. Introduction:
The European Parliament and the council passed the Fourth Anti-Money-Laundering Directive on May 20, 2015. It was aimed at preventing the use of the financial system for the purposes of money laundering or terrorist financing.
Fourth Anti-Money-Laundering Directive was about a fair international tax system and more effective international action against money laundering.
2. Salient features of third AML directives:
1. The application of directives have been amended from real estate agents to simply estate agents and casinos have been expanded to providers of gambling services.
2. Circumstances that the Third Money Laundering Directive automatically categorized as low risk such as when a customer was another institution, a listed company or a national authority will in in this directive be considered as only one of the risk factors.
3. In the case of legal entities, such as foundations, and legal arrangements, such as trusts, which administer and distribute funds, the beneficial owner model has been slightly modified and the directive says it shall at least include:
a) Where the future beneficiaries have already been determined, the natural persons who is the beneficiary of 25 % or more of the property of a legal arrangement or entity;
b) Where the individuals that benefit from the legal arrangement or entity have yet to be determined, the class of persons in whose main interest the legal arrangement or entity is set up or operates;
c) The natural persons who exercise control over 25 % or more of the property of a legal arrangement or entity;
4. PEP definition has been modified in this directive.
As per fourth directive, ‘politically exposed person’ means a natural person who is or who has been entrusted with prominent public functions and includes the following:
a) Heads of State, heads of government, ministers and deputy or assistant ministers;
b) Members of parliament or of similar legislative bodies;
c) Members of the governing bodies of political parties;
d) Members of supreme courts, of constitutional courts or of other high-level judicial bodies, the decisions of which are not subject to further appeal, except in exceptional circumstances;
e) members of courts of auditors or of the boards of central banks;
f) ambassadors, chargés d'affaires and high-ranking officers in the armed forces;
g) members of the administrative, management or supervisory bodies of State-owned enterprises;
h) directors, deputy directors and members of the board or equivalent function of an international organisation.
Family members includes the following:
a) the spouse, or a person considered to be equivalent to a spouse, of a politically exposed person;
b) the children and their spouses, or persons considered to be equivalent to a spouse, of a politically exposed person;
c) the parents of a politically exposed person;
‘Persons known to be close associates’ means:
a) Natural persons who are known to have joint beneficial ownership of legal entities or legal arrangements, or any other close business relations, with a politically exposed person;
b) Natural persons who have sole beneficial ownership of a legal entity or legal arrangement which is known to have been set up for the de facto benefit of a politically exposed person.
5. The below new definitions has been added in this directive.
1. ‘Senior Management’ means an officer or employee with sufficient knowledge of the institution's money laundering and terrorist financing risk exposure and sufficient seniority to take
decisions affecting its risk exposure, and need not, in all cases, be a member of the board of directors;
2. ‘Gambling Services’ means a service which involves wagering a stake with monetary value in games of chance, including those with an element of skill such as lotteries, casino games, poker games and betting transactions that are provided at a physical location, or by any means at a distance, by electronic means or any other technology for facilitating communication, and at the individual request of a recipient of services
3. ‘Group’ means a group of undertakings which consists of a parent undertaking, its subsidiaries, and the entities in which the parent undertaking or its subsidiaries hold a participation, as well as undertakings linked to each other by a relationship.
6. Risk Assessment has been introduced in this directive. The Member States shall ensure that obliged entities take appropriate steps to identify and assess the risks of money laundering and terrorist financing, taking into account risk factors including those relating to their customers, countries or geographic areas, products, services, transactions or delivery channels. Those steps shall be proportionate to the nature and size of the obliged entities.
7. The Member States shall ensure identification of third-country jurisdictions which have strategic deficiencies in their national AML or CFT regimes.
8. The fourth directive has modified the customer due diligence measures to be taken for persons trading in goods, when carrying out occasional transactions in cash amounting from EUR 15000 to EUR 10000 or more, whether the transaction is carried out in a single operation or in several operations which appear to be linked.
9. ‘Tax Crimes’ relating to direct and indirect taxes are included in the broad definition of ‘criminal activity’ in this Directive.
10. The Commission set up by European Union shall conduct an assessment of the risks of money laundering and terrorist financing affecting the internal market and relating to cross-border activities. The Commission shall update its report every two years, or more frequently if appropriate.
11. As per the new directive Member States shall require obliged entities that are part of a group to implement group-wide policies and procedures, including data protection policies and policies and procedures for sharing information within the group for AML or CFT purposes. Those policies and procedures shall be implemented effectively at the level of branches and majority-owned subsidiaries in Member States and third countries.
12. Obtaining approvals have been changed slightly changed: Obtaining approval from senior management for establishing business relationships does not need to imply, in all cases, obtaining approval from the board of directors. It should be possible for such approval to be granted by someone with sufficient knowledge of the institution's money laundering and terrorist financing risk exposure and of sufficient seniority to take decisions affecting its risk exposure.
1. Introduction:
The Fifth AML Directive was a response to the terrorist attacks across the European Union and the offshore leaks investigated in the Panama papers. The fifth directive was introduced on 30 May 2018.
2. Salient features of fifth AML Directives:
1. Till Fourth directives only auditors, external accountants and tax advisors were in scope for European Union Directive. In the fifth directive scope has been furthered to any person who undertakes directly or indirectly material aid, assistance or advice on tax matters as principal business or professional activity.
2. Till Fourth directives only estate agents were in scope for European Union Directive. The scope in fifth directive has been furthered to Estate Agents including intermediaries in relation to transactions for which the monthly rent amounts to EUR 10000 or more.
3. The new players have been added in the scope of fifth directive who are.
a) Providers engaged in exchange services between virtual currencies and fiat currencies.
b) Custodian wallet providers;
c) Persons trading or acting as intermediaries in the trade of works of art, including when this is carried out by art galleries and auction houses, where the value of the transaction or a series of linked transactions amounts to EUR 10000 or more.
d) Persons storing, trading or acting as intermediaries in the trade of works of art when this is carried out by free ports, where the value of the transaction or a series of linked transactions amounts to EUR 10000 or more.
4. In the existing Criminal activities, terrorist offences, offences related to a terrorist group and offences related to terrorist activities have been additionally added in fifth directive.
5. In identifying beneficial owner of a trust, apart from the settlor; the trustee(s) and the protector, the following have been added in fifth directive.
a) The beneficiaries or where the individuals benefiting from the legal arrangement or entity have yet to be determined, the class of persons in whose main interest the legal arrangement or entity is set up or operates;
b) Any other natural person exercising ultimate control over the trust by means of direct or indirect ownership or by other means.
6. The fifth AML directives has slightly modified the risk elements as given under:
a) The risks associated with each relevant sector should take into account the estimates of the monetary volumes of money laundering provided by Eurostat for each of those sectors.
b) Risk of transactions between Member States and third countries.
7. The commission’s report on AML or CFT Reports shall be made public at the latest six months after having been made available to Member States, except for the elements of the reports which contain classified information.
8. The newly added terms in fifth AML directive with regards to the risk assessment is that, Member States shall make the results of their risk assessments, including their updates, available to the Commission, the E.S.As and the other Member States.
9. The commission shall identify high-risk third countries, taking into account strategic deficiencies such as the extent of criminalization of money laundering and terrorist financing, measures relating to Customer due diligence, requirements relating to record-keeping and requirements to report suspicious transactions.
10. In case, Member States still maintain anonymous accounts, anonymous passbooks or anonymous safe-deposit boxes, under fifth directive are required that the owners and beneficiaries of existing anonymous accounts, anonymous passbooks or anonymous safe-deposit boxes be subject to customer due diligence measures.
11. Where the beneficial owner identified is the senior managing official, obliged entities shall take the necessary reasonable measures to verify the identity of the natural person who holds the position of senior managing official.
12. Whenever, entering into a new business relationship with a corporate or other legal entity, or a trust or a legal arrangement having a structure or functions similar to trusts which are subject to the registration of beneficial ownership information, the obliged entities shall collect proof of registration or an excerpt of the register.
13. Member States shall require that obliged entities apply the customer due diligence measures not only to all new customers but also at appropriate times to existing customers on a risk-sensitive basis, or when the relevant circumstances of a customer change, or when the obliged entity has any legal duty in the course of the relevant calendar year to contact the customer for the purpose of reviewing any relevant information relating to the beneficial owner(s).
14. Member States shall require obliged entities to examine, as far as reasonably possible, the background and purpose of all transactions that fulfil at least one of the following conditions:
(i) they are complex transactions;
(ii) they are unusually large transactions;
(iii) they are conducted in an unusual pattern;
(iv) they do not have an apparent economic or lawful purpose.
15. Member States shall require obliged entities to apply the following enhanced customer due diligence measures:
a) obtaining additional information on the customer and on the beneficial owner(s);
b) obtaining additional information on the intended nature of the business relationship;
c) obtaining information on the source of funds and source of wealth of the customer and of the beneficial owner(s);
d) obtaining information on the reasons for the intended or performed transactions;
e) obtaining the approval of senior management for establishing or continuing the business relationship;
f) conducting enhanced monitoring of the business relationship by increasing the number and timing of controls applied, and selecting patterns of transactions that need further examination.
16. Member States shall require obliged entities to apply, where applicable, one or more additional mitigating measures to persons and legal entities carrying out transactions involving high-risk third countries.
17. Each Member State shall issue and keep up to date a list indicating the exact functions which, according to national laws, regulations and administrative provisions, qualify as prominent public functions
18. Member States shall ensure that corporate and other legal entities incorporated within their territory are required to obtain beneficial owners of corporate or other legal entities, including through shares, voting rights, ownership interest, bearer shareholdings or control via other means.
19. Member States shall ensure that the information on the beneficial ownership is accessible in all cases to:
a) competent authorities and FIUs, without any restriction;
b) obliged entities, within the framework of customer due diligence in accordance with Chapter II;
c) any member of the general public.
20. Member States shall ensure that competent authorities and FIUs have timely and unrestricted access to all information held in the central register without alerting the entity concerned.
21. Member States shall require that the beneficial ownership information of express trusts and similar legal arrangements shall be held in a central beneficial ownership register set up by the Member State where the trustee of the trust or person holding an equivalent position in a similar legal arrangement is established or resides.
22. Member States shall ensure that competent authorities and F.I.Us are able to provide the information referred to in paragraphs 1 and 3 to the competent authorities and to the F.I.Us of other Member States in a timely manner and free of charge.
23. Member States shall put in place centralized automated mechanisms, such as central registries or central electronic data retrieval systems, which allow the identification, in a timely manner, of any natural or legal persons holding or controlling payment accounts and bank accounts identified by IBAN.
24. Member States shall ensure that individuals, including employees and representatives of the obliged entity who report suspicions of money laundering or terrorist financing internally or to the F.I.U, are legally protected from being exposed to threats, retaliatory or hostile action, and in particular from adverse or discriminatory employment actions.
25. Member States shall ensure that policy makers, the FIUs, supervisors and other competent authorities involved in AML or CFT, as well as tax authorities and law enforcement authorities when acting within the scope of this Directive, have effective mechanisms to enable them to cooperate and coordinate domestically.
26. Member States shall ensure that FIUs exchange, spontaneously or upon request, any information that may be relevant for the processing or analysis of information by the F.I.U related to money laundering or terrorist financing.
27. Member States shall ensure that FIUs designate at least one contact person or point to be responsible for receiving requests for information from FIUs in other Member States.
28. Member States shall require that all persons working for or who have worked for competent authorities supervising credit and financial institutions for compliance with this Directive and auditors or experts acting on behalf of such competent authorities shall be bound by the obligation of professional secrecy.
29. The Commission shall be assisted by the Committee on the Prevention of Money Laundering and Terrorist Financing.
30. The following is a non-exhaustive list of factors and types of evidence of potentially higher risk added in the Fifth Directives:
(1) Customer risk factors:
a) The business relationship is conducted in unusual circumstances;
b) Customers that are resident in geographical areas of higher risk as set out in point (3);
c) Legal persons or arrangements that are personal asset-holding vehicles;
d) Companies that have nominee shareholders or shares in bearer form;
e) Businesses that are cash-intensive;
f) The ownership structure of the company appears unusual or excessively complex given the nature of the company's business;
(2) Product, service, transaction or delivery channel risk factors:
a) private banking;
b) products or transactions that might favour anonymity;
c) non-face-to-face business relationships or transactions, without certain safeguards, such as electronic signatures;
d) payment received from unknown or unassociated third parties;
e) new products and new business practices, including new delivery mechanism, and the use of new or developing technologies for both new and pre-existing products;
(3) Geographical risk factors:
a) countries identified by credible sources, such as mutual evaluations, detailed assessment reports or published follow-up reports, as not having effective AML or CFT systems;
b) countries identified by credible sources as having significant levels of corruption or other criminal activity;
c) countries subject to sanctions, embargos or similar measures issued by, for example, the Union or the United Nations;
d) countries providing funding or support for terrorist activities, or that have designated terrorist organizations operating within their country.
1. Introduction:
The 6AMLD advances in what is already established in 5AMLD and implies an important and decisive development in certain areas of the law.
2. Salient features of Sixth AML Directives:
1. AMLD 6 Directive aims to combat money laundering by means of criminal law, enabling more efficient and swifter cross-border cooperation between competent authorities.
2. The definition of criminal activities which constitute predicate offences for money laundering should be sufficiently uniform in all Member States. Criminal Activities include the following:
Participation in an organized criminal group and racketeering, terrorism, trafficking in human beings and migrant smuggling, sexual exploitation, illicit trafficking in narcotic drugs and psychotropic substances, illicit arms trafficking, illicit trafficking in stolen goods and other goods, corruption, fraud, counterfeiting of currency, counterfeiting and piracy of products, environmental crime, murder, grievous bodily injury, kidnapping, illegal restraint and hostage-taking, robbery or theft, smuggling, tax crimes relating to direct and indirect taxes, extortion, forgery, piracy, insider trading and market manipulation and cybercrime.
3. The use of virtual currencies presents new risks and challenges from the perspective of combating money laundering. Member States should ensure that those risks are addressed appropriately.
4. Due to the impact of money laundering offences committed by public office holders on the public sphere and on the integrity of public institutions, Member States should be able to consider including more severe penalties for public office holders in their national frameworks in accordance with their legal traditions.
5. In criminal proceedings regarding money laundering, Member States should assist each other in the widest possible way and ensure that information is exchanged in an effective and timely manner in accordance with national law and the existing Union legal framework.
6. Member States should ensure that certain types of money laundering activities are also punishable when committed
by the perpetrator of the criminal activity that generated the property (‘self-laundering’).
7. A conviction should be possible without it being necessary to establish precisely which criminal activity generated the property, or for there to be a prior or simultaneous conviction for that criminal activity, while taking into account all relevant circumstances and evidence.
8. This Directive aims to criminalise money laundering when it is committed intentionally and with the knowledge
that the property was derived from criminal activity.
9. In order to deter money laundering throughout the Union, Member States should ensure that it is punishable by a maximum term of imprisonment of at least four years.
10. While there is no obligation to increase sentences, Member States should ensure that the judge or the court is able to take the aggravating circumstances set out in this Directive into account when sentencing offenders.
11. The freezing and confiscation of the instrumentalities and proceeds of crime remove the financial incentives which drive crime.
13. Given the mobility of perpetrators and proceeds stemming from criminal activities, as well as the complex cross border investigations required to combat money laundering, all Member States should establish their jurisdiction in order to enable the competent authorities to investigate and prosecute such activities.
14. This Directive respects the principles recognized by Article 2 of the Treaty on European Union or (TEU), respects fundamental rights and freedoms and observes the principles recognized, in particular, by the Charter of Fundamental Rights of the European Union.
Financial Action Task Force on Money Laundering (FATF) regional groups or FATF-Style Regional Bodies (FSRBs) are very important in the promotion and implementation of anti-money laundering (AML) and combating the financing of terrorism (CFT) standards within their respective regions. FSRBs are to their regions what FATF is to the world.
They are modelled after FATF and, like FATF, have AML and CFT efforts as their sole objectives. They encourage implementation and enforcement of FATF’s The Forty Recommendations on Money Laundering (The Forty Recommendations) and the eight Special Recommendations on Terrorist Financing (Special Recommendations). They, also administer mutual evaluations of their members, which are intended to identify weaknesses so that the member may take remedial action. Finally, the FSRBs provide information to their members about trends, techniques and other developments for money laundering in their Typology Reports, which are usually produced on an annual basis. The FSRBs are voluntary and cooperative organizations. Membership is open to any country or jurisdiction within the given geographic region that is willing to abide by the rules and objectives of the organization. Some members of FATF are also members of the FSRBs. In addition to voting members, non-voting observer status is available to jurisdictions and organizations that wish to participate in the activities of the organization. The FSRBs are:
Asia/Pacific Groups on Money Laundering (APG).
Caribbean Financial Action Task Force (CFATF).
Council of Europe–MONEYVAL.
Eastern and Southern Africa Anti-Money Laundering Group (ESAAMLG).
Financial Action Task Force on Money Laundering in South America (GAFISUD).
Certain FSRBs have issued their own conventions or instruments on AML. For example, in 1990, CFATF issued its “Aruba Recommendations,” which are 19 recommendations that address money laundering from the Caribbean regional perspective and which complement The Forty Recommendations. Further, in 1992, a Ministerial meeting produced the “Kingston Declaration,” which affirmed their respective governments’ commitment to implementing international AML standards. Similarly, the Council of Europe, in 1990, adopted its “Convention on Laundering, Search, Seizure and Confiscation of the Proceeds of Crime” (the Strasbourg Convention). These are important instruments in the implementation of AML standards for their respective regions.
The Organization of American States or (OAS) is the regional body for security and diplomacy in the Western Hemisphere. All 35 countries of the Americas have ratified the OAS charter. In 1986, the OAS created the Inter-American Drug Abuse Control Commission (known by its Spanish acronym CICAD) to confront the growing problem of drug-trafficking in the hemisphere. By 1994, the Heads of State and Government of the Western Hemisphere endorsed the role of CICAD to include regional AML efforts.
CICAD, is the consultative and advisory body of the OAS on the drug issue. It serves as a forum for OAS member states to discuss and find solutions to the drug problem, and provides them technical assistance to increase their capacity to counter the drug problem. Since its establishment in 1986, CICAD and its Executive Secretariat have responded to the ever-changing challenges of drug control, expanding its efforts to promote regional cooperation and coordination with and among its member states. The OAS' Hemispheric Drug Strategy, adopted in 2010, approaches the world drug problem as a complex, dynamic, and multi-causal phenomenon, requiring a comprehensive, balanced and multidisciplinary approach. The Strategy acknowledges drug dependence as a disease that should be addressed as a public health matter, and calls for countries to maintain an appropriate balance between demand reduction and supply reduction activities. The Hemispheric Plan of Action on Drugs (2016 to 2020), a guide for the implementation of the Strategy, sets priority actions for OAS member states, placing individuals at the core of drug policies and including a cross-cutting perspective on human rights, gender, and development, with a focus on evidence-based drug policies. Through its annual programming and wide range of national and regional projects in the Hemisphere, CICAD assists member states in strengthening their drug policies by conducting in-depth research and evaluation regarding drug-related issues and emerging trends, and by providing effective technical assistance and specialized training focused on capacity building. CICAD works closely with partners such as the United Nations Office on Drugs and Crime, the International Narcotics Control Board, the Pan American Health Organization, the Caribbean Community (CARICOM), the European Monitoring Centre for Drugs and Drug Addiction, and the Regional Security System. CICAD also maintains strong ties with civil society, including the participation of civil society in all CICAD regular sessions.
Recognizing the importance of international cooperation in the fight against money laundering and financing of terrorism, a group of Financial Intelligence Units (FIUs) met at the Egmont Arenberg Palace in Brussels, Belgium, and decided to establish an informal network of FIUs for the stimulation of international co-operation. Now known as the Egmont Group of Financial Intelligence Units, Egmont Group FIUs meet regularly to find ways to promote the development of FIUs and to cooperate, especially in the areas of information exchange, training and the sharing of expertise.
The Egmont Group has evolved over the years and is currently (2015) comprised of 151 member FIUs. The 2012 FATF Recommendations expect that FIUs apply for membership with the Egmont Group, therefore, the Egmont network of FIUs is expected to grow even further in the coming years.
After over 15 successful years of the Egmont Group, and with the publication of the revised FATF 40 Recommendations in 2012, it was necessary to amend the governing documents of the organization. The Charter Review Project team has produced a complimentary set of documents, which are interlinked and reference relevant FATF Recommendations. The revised Egmont Charter (2013), Egmont Principles for Information Exchange and Operational Guidance for FIUs provide the foundation for the future work of the Egmont Group and contribute to greater international cooperation and information exchange between FIUs.
The goal of the Egmont Group is to provide a forum for FIUs around the world to improve cooperation in the fight against money laundering and the financing of terrorism and to foster the implementation of domestic programs in this field. This support includes:
Expanding and systematizing international cooperation in the reciprocal exchange of information;
Increasing the effectiveness of FIUs by offering training and promoting personnel exchanges to improve the expertise and capabilities of personnel employed by FIUs;
Fostering better and secure communication among FIUs through the application of technology, such as the Egmont Secure Web (ESW);
Fostering increased coordination and support among the operational divisions of member FIUs;
Promoting the operational autonomy of FIUs; and
Promoting the establishment of FIUs in conjunction with jurisdictions with an AML/CFT program in place, or in areas with a program in the early stages of development.
The Wolfsberg Group is an association of thirteen global banks which aims to develop frameworks and guidance for the management of financial crime risks, particularly with respect to Know Your Customer, Anti-Money Laundering and Counter Terrorist Financing policies.
The Group came together in 2000, at the Château Wolfsberg in north-eastern Switzerland, in the company of representatives from Transparency International, including Stanley Morris, and Professor Mark Pieth of the University of Basel, to work on drafting anti-money laundering guidelines for Private Banking. The Wolfsberg Anti-Money Laundering Principles for Private Banking were subsequently published in October 2000, revised in May 2002 and again most recently in June 2012.
The Group then published a Statement on the Financing of Terrorism in January 2002, and also released the Wolfsberg Anti-Money Laundering Principles for Correspondent Banking in November 2002 and the Wolfsberg Statement on Monitoring Screening and Searching in September 2003. In 2004, the Wolfsberg Group focused on the development of a due diligence model for financial institutions, in co-operation with Banker's Almanac, thereby fulfilling one of the recommendations made in the Correspondent Banking Principles. More information is available by clicking on the "Due Diligence Repository" link above.
During 2005 and early 2006, the Wolfsberg Group of banks actively worked on four separate papers, all of which aim to provide guidance with regard to a number of areas of banking activity where standards had yet to be fully articulated by lawmakers or regulators. It was hoped that these papers would provide general assistance to industry participants and regulatory bodies when shaping their own policies and guidance, as well as making a valuable contribution to the fight against money laundering. The papers were all published in June 2006, and consisted of two sets of guidance: Guidance on a Risk Based Approach for Managing Money Laundering Risks and AML Guidance for Mutual Funds and Other Pooled Investment Vehicles. Also published were FAQs on AML issues in the Context of Investment and Commercial Banking and FAQs on Correspondent Banking, which complement the other sets of FAQs available on the site: on Beneficial Ownership, Politically Exposed Persons and Intermediaries.
In early 2007, the Wolfsberg Group issued its Statement against Corruption, in close association with Transparency International and the Basel Institute on Governance. It describes the role of the Wolfsberg Group and financial institutions more generally in support of international efforts to combat corruption. The Statement against Corruption identifies some of the measures financial institutions may consider in order to prevent corruption in their own operations and protect themselves against the misuse of their operations in relation to corruption. Shortly thereafter, the Wolfsberg Group and The Clearing House Association LLC issued a statement endorsing measures to enhance the transparency of international wire transfers to promote the effectiveness of global anti-money laundering and anti-terrorist financing programmes.
In 2008, the Group decided to refresh its 2003 FAQs on PEPs, followed by a reissued Statement on Monitoring, Screening & Searching in 2009. 2009 also saw the publication of the first Trade Finance Principles and Guidance on Credit/Charge Card Issuing and Merchant Acquiring Activities. The Trade Finance Principles were expanded upon in 2011 and the Wolfsberg Group also replaced its 2007 Wolfsberg Statement against Corruption with a revised, expanded and renamed version of the paper: Wolfsberg Anti-Corruption Guidance. This Guidance takes into account a number of recent developments and gives tailored advice to international financial institutions in support of their efforts to develop appropriate Anti-Corruption programmes, to combat and mitigate bribery risks associated with clients or transactions and also to prevent internal bribery.
Most recently, focus has expanded to the emergence of new payment methods and the Group published Guidance on Prepaid & Stored Value Cards, which considers the money laundering risks and mitigants of physical Prepaid and Stored Value Card Issuing and Merchant Acquiring Activities, and supplements the Wolfsberg Group Guidance on Credit/Charge Card Issuing and Merchant Acquiring Activities of 2009. The Wolfsberg Anti-Money Laundering Questionnaire has been designed to provide an overview of a financial institution’s anti-money laundering policies and practices. The Questionnaire requires an explanation when a “No” response is chosen (this does not imply that a “No” response is incorrect) and allows for an explanation when a “Yes” response is chosen. A copy of the Questionnaire can be downloaded from the Due Diligence Registry page on our website, www.wolfsberg-principles.com.
Institutions may use the Questionnaire as part of their AML programme’s due diligence requirements for a particular Correspondent, however, institutions are responsible for ensuring their AML programmes are designed to meet regulatory requirements/expectations and internal risk management standards, thereby determining the exact manner in which the Questionnaires are utilised in their AML programmes.
The World Bank and International Monetary Fund developed a unique Reference Guide to Anti-Money Laundering (AML) and Combating the Financing of Terrorism (CFT) in an effort to provide practical steps for countries implementing an AML/CFT regime in accordance with international standards. It explains the basic elements required to build an effective AML/CFT legal and institutional framework and summarizes the role of the World Bank and the International Monetary Fund in fighting money laundering and terrorist financing.
The primary objective of this joint Bank-Fund project is to ensure that the information contained in the Reference Guide is useful and easily accessible by developing countries that are working to establish and strengthen their policies against money laundering and the financing of terrorism. Additionally, this Guide is intended to contribute to global understanding of the devastating consequences of money laundering and terrorist financing on development growth, and political stability and to expand the international dialogue on crafting practical solutions to implement effective AML/CFT regimes.
Title III of the USA Patriot Act, titled "International Money Laundering Abatement and Financial Anti-Terrorism Act of 2001," is intended to facilitate the prevention, detection and prosecution of international money laundering and the financing of terrorism. It primarily amends portions of the Money Laundering Control Act of 1986 (MLCA) and the Bank Secrecy Act of 1970 (BSA). It was divided into three subtitles, with the first dealing primarily with strengthening banking rules against money laundering, especially on the international stage.
The second attempts to improve communication between law enforcement agencies and financial institutions, as well as expanding record keeping and reporting requirements. The third subtitle deals with currency smuggling and counterfeiting, including quadrupling the maximum penalty for counterfeiting foreign currency. The first subtitle tightened the record keeping requirements for financial institutions, making them record the aggregate amounts of transactions processed from areas of the world where money laundering is a concern to the U.S. government.
It also made institutions put into place reasonable steps to identify beneficial owners of bank accounts and those who are authorized to use or route funds through payable-through accounts. The U.S. Treasury was charged with formulating regulations intended to foster information sharing between financial institutions to prevent money-laundering. The second annotation made a number of modifications to the BSA in an attempt to make it harder for money launderers to operate and easier for law enforcement and regulatory agencies to police money laundering operations. One amendment made to the BSA was to allow the designated officer or agency who receives suspicious activity reports to notify U.S. intelligence agencies.
A number of amendments were made to address issues related to record keeping and financial reporting. One measure was a new requirement that anyone who does business file a report for any coin and foreign currency receipts that are over US$10,000 and made it illegal to structure transactions in a manner that evades the BSA's reporting requirements. To make it easier for authorities to regulate and investigate anti-money laundering operations Money Services Businesses (MSBs)—those who operate informal value transfer systems outside of the mainstream financial system—were included in the definition of a financial institution. The third subtitle deals with currency crimes.
Largely because of the effectiveness of the BSA, money launders had been avoiding traditional financial institutions to launder money and were using cash-based businesses to avoid them. A new effort was made to stop the laundering of money through bulk currency movements, mainly focusing on the confiscation of criminal proceeds and the increase in penalties for money laundering. Congress found that a criminal offense of merely evading the reporting of money transfers was insufficient and decided that it would be better if the smuggling of the bulk currency itself was the offense. Therefore, the BSA was amended to make it a criminal offense to evade currency reporting by concealing more than US$10,000 on any person or through any luggage, merchandise or other container that moves into or out of the U.S. The penalty for such an offense is up to 5 years imprisonment and the forfeiture of any property up to the amount that was being smuggled.
The Office of Foreign Assets Control (OFAC), a Bureau of the Treasury Department, The Office of Foreign Assets Control ("OFAC") of the US Department of the Treasury administers and enforces economic and trade sanctions based on US foreign policy and national security goals against targeted foreign countries, terrorists, international narcotics traffickers, and those engaged in activities related to the proliferation of weapons of mass destruction.
OFAC acts under Presidential wartime and national emergency powers, as well as authority granted by specific legislation, to impose controls on transactions and freeze foreign assets under US jurisdiction. As part of its enforcement efforts, OFAC publishes a list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them.
To protect investors and ensure the market’s integrity, FINRA—the Financial Industry Regulatory Authority—is a government-authorized not-for-profit organization that oversees U.S. broker-dealers. FINRA work every day to ensure that everyone can participate in the market with confidence. FINRA uses innovative AI and machine learning technologies to keep a close eye on the market and provide essential support to investors, regulators, policymakers, and other stakeholders. FINRA Rule 3310 sets forth minimum standards for broker-dealers' AML compliance programs. It requires firms to develop and implement a written AML compliance program. The program has to be approved in writing by a member of senior management and be reasonably designed to achieve and monitor the member's ongoing compliance with the requirements of the Bank Secrecy Act and the implementing regulations promulgated there under. Consistent with the Bank Secrecy Act, FINRA Rule 3310 also requires firms, at a minimum, to:
a) Establish and implement policies and procedures that can be reasonably expected to detect and cause the reporting of suspicious transactions;
b) Establish and implement policies, procedures, and internal controls reasonably designed to achieve compliance with the Bank Secrecy Act and implementing regulations;
c) Provide for annual (on a calendar-year basis) independent testing for compliance to be conducted by member personnel or by a qualified outside party. If the firm does not execute transactions with customers or otherwise hold customer accounts or act as an introducing broker with respect to customer accounts (e.g., engages solely in proprietary trading or conducts business only with other broker-dealers), the independent testing is required every two years (on a calendar-year basis);
d) Designate and identify to FINRA (by name, title, mailing address, e-mail address, telephone number, and facsimile number) an individual or individuals responsible for implementing and monitoring the day-to-day operations and internal controls of the program. Such individual or individuals are associated persons of the firm with respect to functions undertaken on behalf of the firm. Each member must review and, if necessary, update the information regarding a change to its AML compliance person within 30 days following the change and verify such information within 17 business days after the end of each calendar year.’
The Global Organization of Parliamentarians Against Corruption (GOPAC) is an International nongovernmental organization made up of parliamentarians from across the world, working together to combat corruption, strengthen good government, and uphold the rule of law based in Ottawa, Ontario, Canada.
The Anti-Money Laundering Global Task Force (GTF-AML) works with anti-money laundering experts, and organizations such as the Financial Action Task Force (FATF), the World Bank, the International Monetary Fund (IMF), the United Nations Office on Drugs and Crime (UNODC), Interpol, the Egmont Group, and Transparency International. The GTF-AML has developed a complementary approach to combating money laundering, in particular the laundering of corrupt money, and promotes the use of practical tools and techniques to limit or arrest such activity. To help parliamentarians in the fight against corruption in regards to money laundering, GTF-AML has developed a GOPAC Anti-Money Laundering Action Guide for Parliamentarians. This resource provides parliamentarians with information and tools to become actively engaged in their legislatures in the fight against money laundering. Through the guide parliamentarians will gain the knowledge necessary to introduce anti-money laundering legislation and build a coalition with other parliamentarians to police and prosecute money laundering in their countries. The GTF-AML is currently focusing its efforts in two areas: beneficial ownership transparency and the laundering of money for terrorism financing. The GTF-AML takes action through:
Capacity building – through anti-money laundering workshops, promoting among parliamentarians a good understanding of the evolving practices of money laundering as well as international initiatives to combat them, and, in particular, the ways in which parliamentarians can effectively contribute to this fight;
Partnerships – establishing links with international expert agencies to help ensure they have a clear understanding as to how parliamentarians can provide political leadership and support of the anti-money laundering initiatives carried out by those agencies; to help tailor international organisations’ informational material intended to provide information to parliamentarians; and provide parliamentarians seeking to reform country practices to have improved access to expertise;
Action Plans – developing global and regional plans required to help parliamentarians that are actively seeking to implement improved anti money laundering practices in their countries and regions.
There is no hard and fast rule that Money Laundering has to follow the sequence Placement, Layering and Integration mandatorily. There are several ways and means by which money laundering is possible. Also, it is not mandatory that all laundered money has to pass through financial institutions, there are several alternate methods such as hawala or cash smuggling. There is a myth that money laundering has to be international transactions. No absolutely not necessary; money laundering can be done domestically too. Money laundering is mostly related to or have political connection. Not mandatory, even businessmen and professionals (such as high net-worth lawyers or doctors) get involved in money laundering. Money laundering is not done by common people. Well unknowingly they can get associated with money laundering. The best example is cuckoo smurfing where common people fall prey.
Let us check on the methods of money laundering in the coming section:
Before we check on methods of money laundering, we must know several ways of making illegal money:
Individuals usually obtain illegal funds in the following ways:
a) Insiders Trading: Insider trading is defined as a malpractice wherein trade of a company's securities is undertaken by people who by virtue of their work have access to the otherwise non-public information which can be crucial for making investment decisions. For example, illegal insider trading would occur if the chief executive officer of Company A learned (prior to a public announcement) that Company A will be taken over and then bought shares in Company A while knowing that the share price would likely rise. An insider trading is considered illegal as this breach the investors’ confidence.
b) Bulk cash smuggling: This involves physically smuggling cash to another jurisdiction and depositing it in a financial institution, such as an offshore bank, with greater bank secrecy or less rigorous money laundering enforcement.
c) Corruption: Corruption and money laundering are intrinsically linked. Corruption offences, such as bribery or theft of public funds, are generally committed for the purpose of obtaining private gain.
d) Bribery: Bribery involves the improper use of gifts and favours in exchange for personal gain. This is also known as kickbacks or, in the Middle East, as baksheesh. The types of favours given are diverse and may include money, gifts, sexual favours, company shares, entertainment, employment and political benefits.
e) Embezzlement, Theft and Fraud: Embezzlement and theft involve someone with access to funds or assets illegally taking control of them. Fraud involves using deception to convince the owner of funds or assets to give them up to an unauthorized party.
f) Extortion and Blackmail: While bribery is the use of positive inducements for corrupt aims, extortion and blackmail centre on use of threats. This can be the threat of violence or false imprisonment as well as exposure of an individual's secrets or prior crimes.
g) Human Trafficking and Drug Trafficking: Drug trafficking is a global illicit trade involving the cultivation, manufacture, distribution and sale of substances which are subject to drug prohibition laws. Human trafficking is the trade of humans, most commonly for the purpose of sexual slavery, forced labor or commercial sexual exploitation for the trafficker or others.
This is a method of placement whereby cash is broken into smaller deposits of money, used to defeat suspicion of money laundering and to avoid anti-money laundering reporting requirements. The people who are involved in such kinds of money laundering are called “smurfs”. Smurfs adopt simple step of money laundering. They are aware that if a large dump of cash is deposited in a bank, it comes under the purview of banking surveillance. Hence, they break it into smaller deposits in different regions and different banks to avoid reporting thresholds. Smurfing looks simple but is a complex and time taking process as each day smurfs deposits small chunk of amounts. There is another term related to smurfing which is 'cuckoo smurfing' originated in Europe because of similarities between this typology and the activities of the cuckoo bird. Cuckoo birds lay their eggs in the nests of other species of birds which then unwittingly take care of the eggs believing them to be their own. In a similar manner, the perpetrators of this money laundering typology seek to transfer wealth through the bank accounts of innocent third parties. The term 'cuckoo smurfing' originated in Europe because of similarities between this typology and the activities of the cuckoo bird. Cuckoo birds lay their eggs in the nests of other species of birds which then unwittingly take care of the eggs believing them to be their own. In a similar manner, the perpetrators of this money laundering typology seek to transfer wealth through the bank accounts of innocent third parties. The Cuckoo Smurfers hire legitimate account holders who for a commission without having the knowledge that they are actually involved in money laundering transfer money as per the instructions from the smurfs.
A person structures a transaction if that person, acting alone, or in conjunction with, or on behalf of, other persons, conducts or attempts of conduct one or more transactions in currency in any amount, at one or more financial institutions, on one or more days, in any manner, for the purpose of evading the CTR filing requirements. In simple terms, it is the practice of executing financial transactions in a specific pattern, well planned and calculated to avoid triggering of suspicion in banks or other financial institutions. Structuring and Smurfing are similar with a hair line difference. Structuring is the act of altering a financial transaction to avoid a reporting requirement while Smurfing is the act of using runners (or smurfs) to perform multiple financial transactions to avoid the currency reporting requirements.
Cash intensive business is one that receives the majority of its revenue from a non-traceable source, such as, cash currency, money orders, barter, or some form of digital cash. Cash-intensive businesses and entities cover various industry sectors. Most of these businesses are conducting legitimate business; however, some aspects of these businesses may be susceptible to money laundering or terrorist financing. Common examples include, but are not limited to, the following:
Convenience Stores
Restaurants/Hotels/Bars/Night Clubs
Retail Stores
Liquor Stores
Vending Machine Operators
Parking Garages
The cash intensive business is hugely used to launder money. These businesses may be companies that actually do provide a good or service but whose real purpose is to clean the launderer's money. The launderer can combine his dirty money with the company's clean revenues in this case, the company reports higher revenues from its legitimate business than it's really earning; or the launderer can simply hide his dirty money in the company's legitimate bank accounts in the hopes that authorities won't compare the bank balance to the company's financial statements. The Launderer let’s say owns the restaurant would funnel his ill-gotten gains through the books of the restaurant fraudulently showing the funds as profits from food/other sales.
This system is the largest drug money-laundering mechanism in the Western Hemisphere came to light in the 1990s. The Colombian Black Market Peso Exchange [BMPE] has developed over the years to the point that it is widely portrayed, and generally accepted, as being a tool used by narco-traffickers to launder money.
The foundation for the BMPE was laid in the 1960’s by the government of Colombia, albeit inadvertently. The government did two things that gave birth to this system; specifically, they banned the US dollar, and they established high tariffs on imported goods. The idea was to strengthen the value of the Colombian peso, and increase the demand for Colombian goods.
Their intentions notwithstanding, this served to create an underground economy, generally referred to as a “black market,” and it created a black market exchange system where people, known as cambistas, exchanged Colombian pesos [COP] on the streets of Colombia for US dollars on deposit in American financial institutions.
The Black Market Peso Exchange system operates through brokers who purchase narcotics proceeds in the United States from the cartels and transfer pesos to the cartels from within Colombia.
The dollars are placed — that is, “laundered” — into the United States financial system by the peso broker without attracting attention;
The dollars are then “sold” by the brokers to businessmen in Colombia who need dollars to buy United States goods for export; and
Goods ready for export is often actually paid for by the peso broker, using the purchased narcotics dollars, on behalf of the Colombian importer.
This underground financial and trade financing system is a major—perhaps the single largest avenue for the laundering of the wholesale proceeds of narcotics trafficking in the United States. It also reflects the desire of Colombian importers (who may otherwise be legitimate businessmen) to avoid paying extensive Colombian import and exchange tariffs by smuggling goods into Colombia. Finally, this system exploits United States exports in the recycling of narcotics dollars. The U.S. Customs Service believes that the “United States exports that are purchased with narcotics dollars through the BMPE system often include household appliances, consumer electronics, liquor, cigarettes, used auto parts, precious metals, and footwear.”
Trust accounts can conceal the sources and uses of funds, as well as the identity of beneficial owners.
The settlor of the trust can transfer assets for possible money laundering or tax evasion.
A trust enables assets to segregate itself from sponsor hence, are secure avenues for money laundering.
Trust owners can be hidden under nominee set up.
Trust accounts are formed by the private banking department in a bank hence, clientele with criminal background gets expert advises to hide illegal funds.
A shell company can be defined as a non-operational company i.e., a legal entity that has no independent operations, significant assets, ongoing business activities, or employees, have no physical presence, and produce nothing. In essence, shells are companies that exist mainly on paper; they are frequently used to shield identities and/or to hide money. A shell company can often be identified by a number of red flag indicators including:
No phone number.
No e-mail address.
No physical address.
No company logo.
No contact person.
No federal identification number.
Shell Companies can open bank accounts and wire money like any other company, making them a favourite tool for money launderers to hide their business and assets from authorities.
A shelf corporation is a paper or shell corporation that is administratively formed and then "put on a shelf" for several years to age. A shelf corporation doesn't engage in any real business, but during the aging period some efforts may be undertaken to establish a credit history, file basic tax returns, open a business bank account, and other simple actions to demonstrate some activity.
Shelf corporations are legal and do have legitimate purposes. They are frequently used for holding personal or business assets. Another common purpose for the creation of a shelf corporation is as a turn-key business package that can later be sold to someone who wants to start and operate a company without going through the effort to form a new one; or, sold to and used by someone who may not otherwise qualify for a bank loan, line of credit, or government contract because they or their existing company do not have the required credit scores or a two to five year established business history. By purchasing a shelf corporation, an entrepreneur now instantly owns an established company that has been "in business" for several years without debts or liabilities.
Criminals can also create, purchase, and use shelf corporations. In some cases, they may use one with a name similar to a targeted legitimate company in order to specifically impersonate that company and deceive creditors or suppliers. In other cases, they may use a shelf corporation, or a series of shelf corporations, to appear to be a well-established, legitimate business in order to defraud other businesses, lenders, or financial institutions.
The Offshore Financial Centres were originally known as “tax havens” and later became “banking havens”. Offshore banking activity is practiced with non-resident clients and usually very rich. In the global economy, Offshore Financial Centres offer many advantages, but their main characteristic is the banking secrecy. Keeping the banking secret and the development of money laundering operations’ may encourage illegal and criminal activities.
Tax havens have the following main characteristics:
Lower taxes or total lack of the income tax
Financial and banking secrecy and ensuring commercial information protection
Important role of the banking activity
Promotional advertising through which are publicized the fiscal advantages offered in order to attract foreign investors.
Offshore financial centres provide financial management services to foreign users in exchange for foreign exchange earnings. There are many channels through which offshore financial services can be provided. These include the following:
Offshore banking which can handle foreign exchange operations for corporations or banks. These operations are not subject to capital, corporate, capital gains, dividend, or interest taxes or to exchange controls.
International business corporations (IBCs), which are often tax-exempt, limited-liability companies used to operate businesses or raise capital through issuing shares, bonds, or other instruments.
Offshore insurance companies, which are established to minimize taxes and manage risk. Onshore insurance companies establish offshore companies to reinsure certain risks and reduce their reserve and capital requirements.
Asset Management and protection allows individuals and corporations in countries with fragile banking systems or unstable political regimes to keep assets offshore to protect against the collapse of domestic currencies and banks. Individuals who face unlimited liability at home may use offshore centres to protect assets from domestic lawsuits.
Also known as Fiscal paradises they are generally small states with political and economic stability which favour the development of financial activities. The most famous and popular offshore banking centres in the global market are the Cayman Islands and Switzerland. Other well-known established destinations for offshore banking include the following (in alphabetical order):
Bahamas, Barbados, Belize, Bermuda, British Virgin Islands, Cyprus, Dominica, Gibraltar, Ghana, Hong Kong, Labuan, Malaysia, Liechtenstein, Luxembourg, Malta, Macau, Mauritius Monaco, Montserrat, Nauru, Panama, Seychelles, Turks and Caicos Islands.
Criminals prefer financial centres and offshore jurisdictions because the anonymity guaranteed by their banking, tax and company regulations provides an effective shield against requests for information by law enforcement agencies. Anonymity, in fact, is an essential requisite for the laundering of criminal proceeds and their reinvestment in the legitimate economy without incurring the “law enforcement risk”.
Travel agency is any person who sells, as an agent and not as a principal airline tickets, rail tickets, hotel and motel reservations, and cruise reservations, or some combination of these services. The definition excludes direct sales by service providers such as hotels and tour buses. Travel agencies can also be used as mode of money laundering for example, prepaid airline tickets--that is, tickets purchased through a travel agency for use by another person, usually in another city can be especially used as Money laundering tool. One can purchase an expensive airline ticket for another person who then asks for a refund. Another example can be sending a tour group to a country and making an offsetting payment in a foreign entity's U.S. or other account while instructing the accountholder to cover the cost of the group's trip. Travel agents can also arrange complex payment or invoicing for customers, thereby structuring cash payments to avoid currency reports. This method is one way that businesses involved in informal value transfer systems, such as hawala, transfer funds between entities in various countries. Let us check in detail:
Travel agents can maintain multiple bank accounts and help structuring.
Travel agents can deal in foreign currency exchange and hence, can help criminals convert currencies.
The same single person or group of persons can operate multiple travel agencies and can act as smurfs.
Travel agents are known for Human trafficking or smuggling of migrants.
Travel agents can operate without license in several countries and hence can escape scrutiny by government.
Travel agents since can clear and issue travelers cheques, they can help in micro structuring.
Since Travel agencies also deal in cash, they can easily co-mingle illegally obtained funds.
Travel agencies can act as hawala agents.
Since travel agents have connections, they can introduce criminals to their known persons working at airlines, cruise lines or hotel industry.
Travel agents can involve in complex wire transfers for their criminal customers.
Prepaid cards are one of the newer developments in the world of consumer electronic payments. Prepaid cards have incorporated in them pre-funding and are integrated into the Visa, MasterCard, and other payment card networks. Money laundering risk associated with prepaid cards lies in their easy transportability and the relative ease of moving and potentially accessing monetary value anonymously. Prepaid card programs do not require customer identification or that do not include rigorous monitoring of suspicious activity are most at risk for money laundering abuse. As these cards are integrated into VISA and Mastercard networks, money is easily access all over the world hence, making laundering of money easier.
Non-profit organisations (NPOs) are defined by their purpose, their reliance on contributions from supporters and the trust placed in them by the wider community. They often process large amounts of cash and regularly transmit funds between jurisdictions. NPOs have also traditionally operated under less formal regulatory control and generally, a less rigorous form of administrative and financial management. It is argued that the combination of these factors exposes the sector to an elevated risk of criminal and terrorist abuse.
Many countries recognize the important and significant role the charities plays in building a strong, caring and well functioning society as well as in contributing to employment, welfare and economic growth. As a consequence they provide tax incentives or tax relief to those organizations (and their donors) that typically constitute the charities.
The abuse of charities occurs when:
An organization poses as a registered charitable organization to perpetrate a tax fraud;
A registered charity wilfully participates in a tax evasion scheme for the personal benefit of its organisers or directors;
A registered charity is involved wilfully in a tax evasion scheme to benefit the organization and the donors, without the assistance of an intermediary;
A registered charity is involved wilfully in a tax evasion scheme to benefit the organization and donors with the assistance of an intermediary;
A charity is abused unknowingly by a taxpayer or a third party, such as unscrupulous tax return preparer who prepared and presented false charitable receipts;
Tax sheltered donations as part of a tax evasion scheme;
Salaried employees concealed as volunteer workers;
An organization registered as exempted from the VAT that is performing taxed activities;
The issuance of receipts for payments that are not true donations;
The issuance of receipts to individuals working for the beneficiary organization;
Criminals use names of legitimate organizations to collect money;
Terrorism financing scheme using charities to raise or transfer funds to support terrorist organizations;
Misuse of charity funds by charities; and
Manipulation of the values of donated assets.
Purchasing vehicles with structured checks and money orders, trading in vehicles for other ones and conducting successive transactions of buying and selling new and used vehicles to produce complex transaction layers, arranging complex payment or invoicing for customers, thereby structuring cash payments to avoid currency reports and accepting third-party payments, particularly from jurisdictions with lax laundering controls makes vehicle sellers vulnerable to money laundering.
Gatekeepers include lawyers, notaries, trust and company service providers (TCSPs), real estate agents, accountants, auditors and other designated nonfinancial businesses and professions (DNFBPs) who assist with transactions involving the movement of money in the domestic and international financial systems. “Gatekeepers are thought to be among the most common laundering agents, or at least facilitators. Gatekeepers often utilise the confidentiality afforded by attorney-client privilege as a tool in money laundering schemes. Gatekeepers can cite this privilege to bypass the rules concerning disclosure in numerous financial institutions, including Know Your Customer rules. This allows the gatekeepers to engage in a range of activities on behalf of their clients anonymously, including the establishment of shell companies, buying properties, opening bank accounts, and transferring assets on the behalf of their clients with associated parties or brokers.
Hundreds of billions of dollars are laundered annually by way of Trade-Based Money Laundering (TBML). It is one of the most sophisticated methods of cleaning dirty money, and also one of the most difficult to detect. By definition, TBML is the process by which criminals use a legitimate trade to disguise their criminal proceeds from their unscrupulous sources. The crime involves a number of schemes in order to complicate the documentation of legitimate trade transactions; such actions may include moving illicit goods, falsifying documents, misrepresenting financial transactions, and under- or over-invoicing the value of goods.
Criminals may be drawn to real estate as a channel to launder illicit funds due to the:
a) Ability to buy real estate using cash.
b) Ability to disguise the ultimate beneficial ownership of real estate.
c) Relative stability and reliability of real estate investment.
d) Ability to renovate and improve real estate, thereby increasing the value.
Criminals are also motivated to buy property for further profit or lifestyle reasons. Compared to other methods, money laundering through real estate – both residential and commercial – can be relatively uncomplicated, requiring little planning or expertise. Large sums of illicit funds can be concealed and integrated into the legitimate economy through real estate.
Criminals use loans or mortgages to layer and integrate illicit funds into high-value assets. Loans or mortgages are essentially taken out as a cover for laundering criminal proceeds. Lump sum cash repayments or smaller ‘structured’ cash amounts are used to repay loans or mortgages. This allows illicit funds to be commingled with legitimate funds. ‘Loan-back’ schemes are an example of this method. Loan-back schemes involve criminals borrowing their own illicit funds. Foreign offshore companies controlled by criminals are used as an apparently ‘arms-length’ lender. The loan is then used to buy real estate and repayments are made using illicit funds. This process hides the true nature of the funds and gives the loan repayments an appearance of legitimacy.
There are several ways launderers use Precious Metals and Diamonds as given below:
Money can be moved out of the Origin country to a foreign country by importing precious metals and gems at overvalued prices exporting the covered goods at undervalued prices.
Money can be moved into the origin country by importing precious metals and gems at undervalued prices or exporting the covered goods at overvalued prices.
Precious metals, precious stones, and jewels constitute easily transportable, highly concentrated forms of wealth. They serve as international mediums of exchange that can be converted into cash anywhere in the world. For these reasons, precious metals, precious stones, and jewels can be highly attractive to money launderers and other criminals, including those involved in the financing of terrorism.
Launderers use precious metals, especially gold, silver, and platinum which have a ready, actively traded market, and can be melted and poured into various forms, thereby obliterating refinery marks and leaving them virtually untraceable.
Transactions from dealers offsetting prices.
Launderers have specialist skills in, and knowledge of, the establishment and administration of company or corporate structures. These structures may include layers of companies and trusts in several foreign jurisdictions. These structures allow criminals to conceal illicit funds, obscure ownership through complex layers, legitimise illicit funds and in some cases avoid tax and regulatory controls. Establishing corporate structures in jurisdictions with preferential tax regimes and secrecy provisions provides a layer or insulation between criminals and their activities. This helps criminals to put distance between themselves and their illicit activities and funds. Let’s look at some more as given below:
Shell companies are the biggest risk of money laundering in the world.
Jurisdictions which allow companies to issue bearer shares without registration are the second largest money laundering risks of a company.
Front companies are good venues for money laundering.
Companies having franchisee model can launder money through False Import or Export Invoices.
Cash intensive Companies are also good venues for money laundering.
Companies can be a vehicle for trade-based money laundering.
Loans can be raised by companies and repaid through illegal monies.
Property dealings through corporate structures can be vulnerable to money laundering.
Insurance products, particularly life insurance, provide a very attractive and simple means of laundering money. Some popular methods as given below used by criminals and launderers:
Cash out policies prematurely, despite penalties for the early withdrawals.
Policies paid using cheques and wire transfers purchased with criminal money.
Use of dirty money to purchase a general insurance policy to insure some high-value goods (which is also usually obtained through illegal means by criminals).
Paying a large “top-up” into an existing life insurance policy.
Purchasing one or more single-premium investment linked policies, then cashing them in a short time later
Premiums being paid into one policy, from different sources.
Making over-payment on a policy and then asking for a refund.
High Value Goods Dealers (HVGDs) are businesses involved in the sale of goods of high value where the trader accepts cash payments either in one transaction or a series of linked transactions. Examples of these businesses include antique dealers, boat and car sales, dealers in precious stones, jewellers. Criminals and launderers find it easy to convert illicit money to clean money through purchase of high value goods arts and antiques and then selling the same in open and legal markets. Launderers use chains of dealers and auction houses to effectively do transactions which make feels the illicit money to be legal.
Until the bank of New York scandal erupted in 1999, international correspondent banking had received little attention as a high-risk area for money laundering. The general assumption had been that a foreign bank with a valid banking license operated under the watchful eye of its licensing jurisdiction and bank had no obligation to conduct its own due diligence. The lesson learn was that some foreign banks carry higher money laundering risks than others as they are seriously deficient in their bank licensing and supervision.
The reality is that Correspondent banking is highly vulnerable to money laundering for a host of reasons as given below:
1) Culture of Lax Due Diligence:
Big banks providing correspondent banking are found to be poorly informed about the banks they are servicing, particularly small foreign banks licensed in jurisdictions known for bank secrecy (Offshore Banks) or weak banking and anti-money laundering controls. Account information is often outdated and incomplete, lacking key information about a foreign banks management, major business activities, reputational and regulatory history, AML procedures and transaction monitoring procedures. At larger banks reviewing is often weak or absent between correspondent bankers and foreign clients of foreign banks. Wire transfers are frequently the key activity engaged by the foreign bank, the correspondent banks did not monitor those transfers for filing STR. Subpoenas or bank under legal proceedings directed at foreign banks or their clients were not always bought to the attention of the correspondent banker. Large correspondent banks usually maintain two or three thousand correspondent accounts at a time and process billions of dollars of wire transfers each day. Yet these banks did not invest in software, personnel or training needed to identify and manage money laundering risks.
2) Role of Correspondent Bankers:
Correspondent bankers also called the relationship managers should serve as the first line of defence against money laundering. However, many appear to be inadequately trained or insufficiently sensitive to the risk of money laundering taking place through accounts they manage. This is because, the RM's are paid for the number of new accounts they open or the amount of money their correspondent accounts bring into the bank. Their primary mission is to expand business, open new accounts, increase deposits, and sell additional services to the correspondent accounts. While doing this, they failed in their duties such as evaluating prospective bank clients, and reporting suspicious activity (if any). The RM’s are not collecting the required standard due diligence for foreign banks nor their clients allowing them to perpetrate through correspondent accounts.
3) Nested Correspondents:
Another practice in correspondent banking which increased money laundering risks in the field is the practice of foreign banks operating through the correspondent accounts of other foreign banks. There are numerous instances of foreign banks gaining access to the correspondent bank either directly or through another foreign bank having an account in the correspondent bank. The lack of knowledge that the foreign bank has actually nested in correspondent account another account of foreign bank is the major flaw.
4) Foreign jurisdictions with weak banking or accounting practices:
The international banking system is built upon differing bank licensing and supervisory approaches in the hundreds of countries that currently participate in international funds transfer systems. Some countries require heavy requirements to obtain license however, jurisdictions such as BVI which offer offshore banking services does not require huge investments with either central bank nor huge norms and regulations. The increased money laundering risks for correspondent banking are apparent in such banking systems. Also, in banking systems with weak accounting practices in foreign banks, accountants refusing to provide information about banks financial statements they had audited or about reports they had prepared in the role of a bank reviewer or falsifying certifications provided by the accounting firms all lead to misuse of correspondent banking for money laundering.
5) Bank Secrecy:
Bank secrecy laws further increase money laundering risk in international correspondent banking. Strict bank secrecy laws are a staple of many countries including those with offshore banking sectors. Some jurisdictions refuse to disclose bank ownership. Some refuse to disclose the results of bank audits or examinations. Some jurisdictions prohibit disclosure of information about particular bank clients or transactions to correspondent banks or regulators.
6) Cross Border Difficulties:
Due diligence reviews are difficult to obtain from foreign banks. Investigations around the solvency of banks, negativity is difficult to ascertain as limited information is available in public records. In some countries, have few or no public records. Travel to foreign jurisdictions by correspondent banks to gather first-hand information is costly and may not produce immediate or accurate information.
7) Money Laundering through Payable through account:
The 2012 FATF recommendations define the term payable-through accounts as correspondent accounts that are used directly by third parties to transact business on their own behalf. In other words, the institution providing the Correspondent Banking services allows its Correspondent Banking Clients’ accounts to be accessed directly by the customers of that correspondent, e.g., the customers of the correspondent may have cheque writing privileges or otherwise be able to provide transaction instructions directly to the institution. This is different than a traditional Correspondent Banking relationship in which the Correspondent Bank is executing transactions on behalf of its customers.
The arrangements pose greater risk to an institution if it does not have access to information about the third parties accessing the account. This account becomes a gateway to the launderers. Regulatory standards for managing the risks of payable-though arrangements may vary significantly by jurisdiction, but at a minimum, the institution providing such services should take additional steps to ensure that their Correspondent Banking Client has conducted sufficient client due diligence on its customers which have direct access to accounts of the Correspondent Bank, and that such information can be provided upon request. It may also be appropriate for the institution to conduct its own due diligence on the third parties.
8) Money Laundering through Concentration Accounts:
Concentration accounts are internal accounts established to facilitate the processing and settlement of multiple or individual customer transactions within the bank, usually on the same day. These accounts may also be known as special-use, omnibus, suspense, settlement, intraday, sweep, or collection accounts. Concentration accounts are frequently used to facilitate transactions for private banking, trust and custody accounts, funds transfers, and international affiliates.
Risk Factors:
Money laundering risk can arise in concentration accounts if the customer-identifying information, such as name, transaction amount, and account number, is separated from the financial transaction. If separation occurs, the audit trail is lost, and accounts may be misused or administered improperly. Banks that use concentration accounts should implement adequate policies, procedures, and processes covering the operation and recordkeeping for these accounts. Policies should establish guidelines to identify, measure, monitor, and control the risks.
Risk Mitigation:
Because of the risks involved, management should be familiar with the nature of their customers’ business and with the transactions flowing through the bank’s concentration accounts. Additionally, the monitoring of concentration account transactions is necessary to identify and report unusual or suspicious transactions. Internal controls are necessary to ensure that processed transactions include the identifying customer information. Retaining complete information is crucial for compliance with regulatory requirements as well as ensuring adequate transaction monitoring. Adequate internal controls may include:
Maintaining a comprehensive system that identifies, bank-wide, the general ledger accounts used as concentration accounts, as well as the departments and individuals authorized to use those accounts.
Requiring dual signatures on general ledger tickets.
Prohibiting direct customer access to concentration accounts.
Capturing customer transactions in the customer’s account statements.
Prohibiting customer’s knowledge of concentration accounts or their ability to direct employees to conduct transactions through the accounts.
Retaining appropriate transaction and customer identifying information.
Frequent reconciling of the accounts by an individual who is independent from the transactions.
Establishing timely discrepancy resolution process.
Identifying recurring customer names.
1. Huge amounts or funds are transacted during arms deals and hence, corruption and bribery monies can flow heavily during these transactions.
2. Arms deals can happen through smuggling and, the settlements happen through alternative remittance systems such as hawala.
3. Arms Dealers can get involved in trade-based money laundering.
4. Arms Dealers get involved in huge cash transactions and hence, can be vulnerable to money laundering.
Professional associations for Conducting games can form various team franchisees and auction teams. The teams can be purchased in an auction by a criminal.
Funds can be raised by a civic association by showing it to be for a particular cause but, can be towards laundering money.
International Clubs can be formed by criminals and show accounting entries as activities of a club which might have never happened.
A criminal can form a missionary association to co-mingle own funds.
Criminals can syndicate real estate by forming an association to actually launder money.
Criminals can invest in Alternative investments such as Hedge or PE funds through blockers.
Blockers can be used to evade taxes.
Ownership structures can be hidden by forming an offshore trust and then investing through blockers.
Through blockers, criminals now have access to foreign investments.
Blockers enables criminal syndicates to easily convert money to legal money.
The Cooperatives have access to sophisticated banking products such as ACH facilities and wire transfers and hence they can be vulnerable to money laundering.
Cooperatives can conduct transactions by creating fake accounts.
The criminals can become an owner and can hold large deposits in co-operatives and go un-detected.
Banks formed through cooperatives have the weakest AML procedures and hence, vulnerable to money laundering.
Cooperatives can be used as fronts (similar to front companies).
Credit Unions or Building Societies deal in cash hence, giving a chance to criminals to hide their illicit funds here.
Since Credit Unions or Building Societies allow wire transfers, they are better venues for structuring money than with banking institutions due to less scrutiny.
Easy availability of loans and mortgages to its members make criminal easy access to co-mingle the loan payments with illicit funds.
Children accounts provided by Credit Unions or Building Societies are susceptible to more money laundering as such transactions draw less attention
Criminals themselves can become the Members of Credit Unions and Building Societies.
Reluctance to provide documentary evidence of identity while opening an account can hide whereabouts of the members.
Possibility of third parties paying in cash on behalf of the members of the credit union or building societies.
Diamond dealers can be involved in Trade based money laundering such as over-invoicing or under-invoicing.
Diamond dealers can be a part of alternative remittance systems such as hawala.
Smuggled diamonds can be utilized for terrorist financing.
Diamond dealers can do transactions in bulk cash hence, vulnerable to money laundering.
Diamonds can be purchased by the dealers through illegal funds of criminals by forming partnerships or syndicates.
Diamonds can be used as an alternative currency to purchase prohibited or restricted goods.
Diamonds usually come from countries with lax AML controls hence, there may be involvement of government officials bribe or corruption money during transactions.
In most of the countries diamond businesses are not regulated and hence, they are vulnerable to money laundering.
Dealers of diamonds deal in cross-border movement hence, can easily do varied transactions on behalf of criminals.
Dealers of diamonds can be smurfs.
A criminal can set up a charity foundation and co mingle self-earned illegal funds as donations in the endowment funds of such charity.
The endowment property, within the foundation can be applied for the benefit of beneficiaries who are related to the criminals.
Criminally held non-profit organizations can park other criminal funds as endowment funds.
Criminals can co mingle illegal funds into their run hospital endowment fund and form an unrestricted endowment fund.
Criminals can be a trustee of foundations of religious endowments.
Foundations can receive donations from anywhere in the world. Quite possible that these donations actually are money received for laundering.
Registration of foundations is simple. Hence, it gives a chance for criminals to open foundations.
Foundations can invest freely and hence, are good conduits for laundering money.
Criminally owned Foundations which are grant making can provide grants to its own companies.
Foundations can own properties for criminals who are usually its founders directly or indirectly through self-owned corporates.
Foundations can transact with third parties hence, can be used by criminals.
Instead of criminals opening their own companies can opt for franchise model and co-mingle illegally obtained funds as most of the franchises are cash intensive businesses and the franchisers are already reputed.
Criminals can use franchise model to expand their front companies in other countries.
Criminals can do alternative remittances using franchise models.
Criminals can do trade-based money laundering using franchise models.
Criminals can start up charities (as if they want to do good) in any country where they have franchise and launder money easily.
General Partnership firms can consist of gatekeepers such as lawyers or CPA’s who can assist money laundering.
General Partnership firms can involve in sale or transfer of real estate purchased with laundered funds.
General Partnership firms can help launderers through investments into securities.
General Partnership firms can help criminals to create shell companies for money laundering.
By operating as General partnership firms, criminals can abuse international banking system.
Hedge funds are private placements hence, giving all the opportunity for criminals to invest in such funds.
Foreign investors with criminal backgrounds can invest in Hedge Funds through blockers.
The hedge fund manager is mostly interested in funding for the hedging than source of funds of its investors.
Hedge funds are not regulated and hence, can have lax anti money laundering representation.
Hedge funds can be used in the integration stage where money is already laundered and placed in hedge funds for giving a cleaner picture for such funds.
Criminals can invest in various companies through holding company structure.
Criminals can syndicate their money in a criminally managed holding company.
Criminals can hold casinos or gambling companies through holding company structures.
Criminals can invest in several cash intensive businesses through holding company structures.
Criminals can expand its businesses through franchise system and comingle its money through holding company structures.
The ICAV can be used to structure funds.
ICAV can be purchased through cash.
ICAV are open ended funds meaning, can be purchased and redeemed any time hence vulnerable to Money Laundering.
ICAV allows foreign investments hence, a good venue for money launderers.
ICAV can be used as a vehicle for tax evasion.
Two or more criminals from different countries can come together to form a JV and indulge in Trade based money laundering.
Joint Ventures may involve PEP’s and the investments can happen through bribe or corruption monies collected by these PEP’s.
A JV with a local company usually offers faster market entry and can help avoid foreign ownership restrictions a big advantage to criminals and money launderers.
A JV can be used for Cuckoo Smurfing using employees accounts.
A JV can be used for routing payments to the country where criminal wants to receive payments for expanding crime business.
Limited Liability companies can register without submitting the details of its owners and hence, are susceptible to money laundering.
Limited Liability companies can be used as a “pass through” to allow another company or business to smoothly move financial assets from one place to another.
Purchasing of condo units through a number of limited liability companies. A Condo is a private residence rented out to tenants.
Create different Limited Liability Companies and open bank accounts to structure money instead of opening bank account in launderers’ name.
Shell corporations can be the owners within the Limited liability companies.
Limited partners of Limited Liability Limited partnerships can compose of criminally held corporates.
Limited Liability Limited partnerships are new, are easy to form using agents and come with various protections. Hence, criminal can easily use these structures to launder money.
Criminally held Limited Liability Limited partnerships can hold real estate properties.
Criminals can have opportunity to run a publishing house or car dealerships to co-mingle their money.
Criminals can take advantage of loopholes in this new structure.
Limited Liability Partnerships especially at state of Delaware can be easily formed even by foreigners or foreign entities. These loopholes can be used by criminals to form a Limited Liability Partnership and use it as a front for money laundering.
Limited Liability Partnership Structures have firms such as attorney firms or law firms and chartered accountancy firms who usually help criminals to launder money.
Criminals can form partnerships inside Limited Liability Partnerships with domestic firms to do money laundering.
Limited Liability Partnerships can be created with the help of agencies. Hence, the agents themselves can teach a criminal how to be mindful about certain laws.
Limited Liability Partnerships do not require scrutiny by regulators and some jurisdictions do not even ask for annual returns to be filed.
Limited partners can compose of foreign corporate partners which are held by criminals.
A criminal can invest in film production houses or real estate or private funds such as venture capital, private equity and hedge funds through Limited partnership structures.
A limited partnership can hold property for a criminal.
Limited partnerships are easy to form using agents. Hence, criminal can easily form these structures to launder money.
Since Limited partnerships are pass through structures can be formed in tax neutral jurisdictions for tax evasion purposes.
Logistics companies can involve in over or under invoicing or ‘ghost shipments’ to benefit criminals
Logistics companies can aid in transportation of illegal drugs and counterfeit goods for laundering money.
Logistics companies can aid bulk cash smuggling.
Logistics companies need not do KYC as extensive as banks or sometimes, no KYC at all hence, giving leverage to Launderers for moving monies.
Logistic Companies can aid undervaluing the goods being shipped and benefit launderers to settle money laundering payments.
Mining companies can be used to do trade-based money laundering.
Illegitimate activity is more easily conducted through unregulated mining operators.
Raw precious metals are easy to smuggle giving a chance to Money launderers.
Criminal miners can run the organized crime groups and terrorist groups.
Miners investing in Private funds such as Private Equity, Venture capital and hedge funds as these avenues require huge investments.
The mutual funds can be used to structure funds.
Mutual Funds shares can be purchased through cash.
Mutual funds are usually open-end funds meaning, can be purchased and redeemed any time hence, vulnerable to Money Laundering.
Mutual funds allow foreign investments in some jurisdictions.
In certain jurisdictions, the mutual funds are not regulated. Hence, good avenue for criminals to convert funds by investing.
Since depositors or owners, criminals can syndicate to become major owners and have their influence in running the bank and thereby using the banks for money laundering.
Mutual Savings banks are good avenues for structuring the funds.
Criminals can perform layering using products and services of the Mutual savings banks.
It is easy to open banking account in mutual savings bank and hence, vulnerable to money laundering.
Mutual Savings banks are not as regulated as the commercial banks are hence, vulnerable to money laundering.
Insurance companies accepting cash or offering trial periods are susceptible to money laundering.
Investment management companies can carry criminal moneys for investments.
A brokerage firm can help set up investment avenues and structures for criminals to launder money.
Money services businesses and third-party payment processors can knowingly or unknowingly pass on money transfers for money laundering.
Infrastructure finance companies can be held by criminals to offer loans to customers whose source of money is any crime.
Criminals can take loans through loan companies or finance companies, and repay with ill gotten money.
Voluntary organizations receiving more dollars in foreign funds, makes the NGOs vulnerable to risks of money laundering and terror financing.
NGO’s receive funds from multiple donors and currencies often in cash hence, vulnerable to risks of money laundering.
NGO’s usually work within or near those jurisdictions that are most exposed to terrorist activity or the money laundering activity.
NGO’s may have unpredictable and unusual income.
NGO’s can have their most of the transactions in black and go un-noticeable.
The OEIC’s can be used to structure funds.
OEIC’s can be purchased through cash.
OEIC’s are open end funds meaning, can be purchased and redeemed any time hence vulnerable to Money Laundering.
OEIC’s allow foreign investments.
Private Investment Companies are typically used to hold individual funds and investments, and ownership can be vested through bearer shares.
Shares of a Private investment company may be held by a trust, which further obscures beneficial ownership of the underlying assets.
Private Investment Companies can offer confidentiality of ownership, hold assets centrally hence susceptible for money laundering.
Private Investment Companies are frequently incorporated in countries that impose low or no taxes on company assets and operations and hence encourage tax evasion.
Private Investment Company's require minimal or no record-keeping, hence can be easily exploited by criminals, money launderers, and terrorists.
Private Investment Company's provide only a registered agent’s address, hiding the true identification of Beneficial's address or whereabouts.
Private Investment Company's enable to hide the original originators of funds transfers.
Private Investment Companies can be good conduits for wire transfers for criminals.
Private Equity funds are private placements hence, giving all the opportunity for criminals to invest in such funds.
Private equity fund raises funds from foreign investors too, who can be criminals or can be criminally owned companies.
Private equity funds are not regulated and hence, can be vulnerable to money laundering.
Private equity funds can be used in the integration stage where money is already laundered and placed in Private equity funds for giving a cleaner picture for such funds.
Foreign political corruption funds can be indirectly invested in Private equity funds.
Real Estate Investment Trusts operate in high-risk geographies and may also operate in sanctions countries.
Real Estate Investment Trusts comes with complex holding structures
Criminally held foreign entities and individuals can participate in investments with Real Estate Investment Trusts.
REIT's accepts cash.
REIT's can be used as vehicle for tax evasions.
Savings and Loan Associations are managed by members some of whom can be criminals and have a say in the decision making or route self-transactions without entering the details in the software of the S&L.
Criminals can perform layering using products and services of the S&L.
Criminals can deposit large amounts of cash easily in the S&L accounts.
Illegal money’s can be converted to various term deposits offered by the S&L. After maturity, the same can be transferred back to the Savings account as proceeds of deposits.
It is easy to join S&L. Hence, S&L becomes good venue for Money Laundering.
Broker dealers can enable redeeming a long-term investment within a short period.
Broker dealers can enable change of share ownership in order to transfer wealth across borders.
Broker dealer firms can maintain securities accounts as nominees or trustees permitting concealment of the identities of the true beneficiaries.
Broker dealers can be Engaged for market manipulation such as “pump & dump” schemes (meaning artificial inflation of price of security) and engaging in boiler room operations. A boiler room is a scheme in which salespeople apply high-pressure sales tactics to persuade investors to purchase securities.
Broker dealers can enable customer accounts that are used only to hold funds and not for trading.
Broker dealers can help investors in wash trading meaning enabling customer to do matching buys and sells in particular securities, which creates the illusion of trading.
Broker dealers can enable customers to purchase bearer shares and physical securities in jurisdictions where it is legal to hold these securities.
The SPC’s can involve in Ponzi schemes.
The SPC structure can be used to evade taxes.
The SPC structure can be used for managing bad assets leading to willful defaults.
The SPC's can be used for tax evasions as they are exempted in tax heavens.
The SPC's can be easily formed.
Since these businesses are cash intensive, criminals have opportunity to co-mingle their ill-gotten money.
Especially shops, they can run alternative remittance system such as hawala.
Shops and establishments can be used as a means for structuring money.
Shops and establishments can get involved in gambling and small betting.
Shops and establishments can be used similar to front companies for laundering money.
SICAV can be used to structure funds.
SICAV units can be purchased through cash.
SICAV are usually open-end funds meaning, can be purchased and redeemed any time hence, vulnerable to Money Laundering.
SICAV allows foreign investments in some jurisdictions.
SICAV's can be a good avenue to evade taxes or launderers searching for alternative investments.
Sovereign Wealth Funds in jurisdictions with lax financial crime compliance can be haven to criminals especially involved in corruption and bribe.
Sovereign Wealth Funds can hail from non-democratic regimes where the officers and managers are political appointees.
Sovereign Wealth Funds can have a lack of transparency and unclear motivation.
Sovereign Wealth Funds performance and corporate governance practices and also usage of funds are not known.
Sovereign wealth funds are handled by PEP's, and hence can be vulnerable to Money Laundering.
Because of their normally off-balance sheet, bankruptcy remote and private nature Special Purpose Vehicles can be used for illegitimate purposes.
Special Purpose Vehicles are used for concealment of losses.
Special Purpose Vehicles held by criminals can be used for money transfers, disguising these transactions as legal business transactions.
Special Purpose Vehicles can be used for betting's or auctions to purchase something with illegal money.
Complex structured products can be created using Special Purpose Vehicles such as CDO’s or CLO’s.
Accounting irregularities can be used by criminals using a Special Purpose Vehicle.
Criminals can get accesses to payable through accounts using Special Purpose Vehicle structures to clear checks and conduct wires.
Criminals can structure money using Special Purpose Vehicles.
Criminals use Special Purpose Vehicle structure to evade tax.
Criminal companies can easily open accounts in international banks by sponsoring a Special Purpose Vehicle for doing transactions.
Most of the State-Owned entity directors and signatories are PEP’s and, possibility of these PEP’s being corrupt.
The transactions scrutiny level of an SOE is not so robust in banks as they are considered safe.
As SOE's are active in the global marketplace hence, can be abused for high-profile scandals.
Governments often issue operating licenses example, for exploitation of natural resources which can be mismanaged through bribery and corruption.
Mis-appropriation of funds in SOE transactions and receipt of funds to offshore accounts is possible.
Corrupt officials in the chains of supranational organization can join hands and help each other for money laundering.
Comingling of grant funds with self illegally gotten funds is possible.
Since the supranational have reach to several countries, it is easy for the officials of the supranational to open bank accounts in several countries.
There is very less scrutiny in banks for transactions related to Supranational organizations hence, multiple wire transfers is possible.
Supranational organizations can supply funds to criminal/terrorirst recipients through grants releases to charities run by these criminal/terrorist run organizations.
Banks providing services to Third Party Payment Processors maintains a relationship with the third-party payment processor and not the underlying merchant hence, it becomes difficult for the banks to know on whose behalf it is processing a transaction.
The banks are indirectly serving Casino’s and gaming enterprises and these types of businesses carry a high risk for consumer fraud and money laundering.
Remotely Created Checks for its customers by third-party payment processor’s is another Money Laundering risk.
The third-party payment processor can maintain relationships with multiple banks, which hinders bank’s ability to see the entire customer relationship.
International payments or receipts of a merchant processed by third-party payment processor itself is vulnerable to Money Laundering and to add to this third-party payment processors also provide International ACH payments which are still better avenues for criminals to launder their money.
The society can receive charities and hence, can be used for structuring funds.
The society can make grants and hence, criminals can form a society and make grants to other criminally held NGO’s or other societies or any other legal form held by them.
Societies can hold real estate properties for criminals.
Corruption and bribery money collected by bureaucrats or PEP’s can form society for welfare and can move money to offshore.
Society can be formed by foreigners hence, susceptible to money laundering.
Tax evasion is using illegal means to avoid paying taxes. Typically, tax evasion schemes involve an individual or corporation misrepresenting their income to the Tax Authorities. Misrepresentation may take the form either of under reporting income, inflating deductions, or hiding money and its interest altogether in offshore accounts. There is a huge difference between tax evasion and tax avoidance. Tax avoidance is doing proper tax planning and investing money in a manner where individuals get benefits from government (e.g., investing in Provident Fund) for making such investments. While Tax evasion is finding methods of not to pay tax through illegal means or hiding money in such a way that it does not come into the radar while filing taxes to the government.
Some jurisdictions allow bearer shares. Hence, Offshore Corporation whose assets are held by offshore trust can issue bearer shares for beneficiaries use.
The offshore trusts shield the beneficiary which criminals look out for hiding themselves and their money.
Offshore trusts can transfer money to any third party as instructed by the settlor.
Offshore trusts can be dissolved easily by creating a revocable trust and assets can be transferred to beneficiaries in whole.
The best thing that criminals like about offshore trusts is privacy, confidentiality and Offshore trusts are legally protected from creditors and law enforcement agencies.
Criminals can take-over financially unstable clubs and then pump illegal monies through the club structure through a series of donations or investments.
Structuring funds through club activities.
Criminals can run betting through clubs.
Investing in clubs to evade taxes.
Complex structures can be formed through franchisees to route money by the big clubs, say a football club.
Structuring is possible through UCITS.
UCITS can be purchased through cash.
UCITS can be held by foreigners through offshore accounts.
UCITS can be used as a tool for tax evasion.
UCITS after maturity becomes usable as it becomes source of funds as proceeds of funds. Hence, a good avenue for money launderers.
Funds used in investments may involve significant amounts of cash with funds being deposited by any party directly into the Unit Trust Manager’s account.
Unit trusts lacking in adequate processes for transactions monitoring.
There are no proper approval processes for the refund of the excess deposits made into account of the Unit Trusts.
Unit Trusts can be used for structuring.
Certain unit trusts are not regulated or authorized and hence, vulnerable to money laundering.
Variable Capital Company comes with inviting international investors and a criminal posing as investor can enter these structures.
Redemptions are easy for investors investing in variable capital companies hence, can be susceptible to money laundering.
VCC's can be good avenues for investors who wish to evade taxes at home country.
Investments in Variable Capital Company can be used for structuring funds.
Variable Capital Company can hold a single asset and can have single owner which can be held by a criminal.
A VCC has flexibility of segregating assets and liabilities of one sub-fund from the other in the same umbrella and hence, allowing fraud.
The term ‘round-tripping’ denotes to money returning to the same place from where its journey began. In the context of illegally obtained funds, it leaves the country through various channels such as inflated invoices, payments to shell companies overseas and the hawala route and so on. After going through various investments or purchases and sales (such as purchase of a Condo or Yacht) the money comes back to the origination as fresh funds completing a round-trip. This route is far from simple or straightforward. Those indulging in this game are past masters who make the money flow through multiple layers consisting of many entities and companies.
Most of the countries have banned Gambling and Casino businesses but, gambling or casinos still operate online or in waters (such as cruises and ships). Some countries or territories totally depend on gambling activities through casinos. Money laundering can happen in the following way:
1. Purchasing Casino Chips, playing for a while with no big profit and exchanging the remaining chips with valid bank check.
2. Clients ask to move deposits with gambling companies or casinos to transfer the funds in overseas accounts.
3. Casino or gambling account transactions conducted by persons other than account holder.
4. The launderers as players in gambling or casinos transfer funds to third party accounts by bribing the casino or gambling operators.
5. Funds getting transferred from gambling or casinos to charities for laundering money.
6. Criminals can operate as junkets (agents who on behalf of casinos or gambling destinations arrange for boarding and vacation facilities to customers who wish to play at gambling avenues and casinos) to launder money.
Sanctions are generally put in by UN, European Union and Office of Foreign Assets Control (OFAC) US. They enforce trade embargoes, sanctions, and financial transaction prohibitions against targeted foreign governments, entities, individuals and certain practices (such as proliferation of weapons of mass destruction and diamond trading).
Embargoes and sanctions can take a number of forms, but the most relevant types of sanctions are financial sanctions and trade sanctions.
Financial sanctions generally involve asset-freeze measures affecting the provision of funds and economic resources to certain entities or individuals ('designated persons'). They may also include restrictions on the use of assets by designated persons, receipt and transfers of funds to particular types of persons - for example, Iranian nationals - and prohibitions on the provision of financing or financial assistance connected to designated persons and prohibited transactions.
Trade sanctions prohibit trade in certain goods from affected countries, usually arms and commodities such as oil, timber, gold and diamonds; and equipment for use in the nuclear, oil and gas or petrochemical sector. Activities related to such trade may be prohibited.
It is also broadly prohibited to engage in any activity which is to circumvent sanctions. As a consequence, banks should not help corporate structure transactions to avoid international sanctions.
As the UN’s principal crisis-management body, the Security Council may respond to global threats by cutting economic ties with state and non-state groups. Sanctions, resolutions must pass the fifteen-member Council by a majority vote and without a veto from any of the five permanent members: the United States, China, France, Russia and UK. The most common types of UN sanctions which are binding on all member states, are:
Asset Freezes
Travel Bans and
Arms Embargoes.
UN sanctions regimes, including most of the sixteen in place in early 2015 (the most in history), are typically managed by a special committee and a monitoring group. The global police agency Interpol assists some sanctions committees, particularly those concerning al-Qaeda and the Taliban, but the UN has no independent means of enforcement and relies greatly on member states, many of which have limited resources and little political incentive. Anecdotal evidence suggests that enforcement is often weak.
Prior to 1990, the Council imposed sanctions against just two states: Southern Rhodesia (1966) and South Africa (1977). However, since the end of the Cold War, the body has used sanctions more than twenty times, most often targeting parties to an intrastate conflict, as in Somalia, Liberia, and Yugoslavia in the 1990s. But despite this cooperation, sanctions are often divisive, reflecting the competing interests of world powers. For instance, since 2011, Russia and China have vetoed all four Security Council resolutions concerning the conflict in Syria, some of which could have led to sanctions against Syria.
The European Union imposes sanctions (known more commonly in the twenty-eight-member bloc as restrictive measures) as part of its Common Foreign and Security Policy. Because the EU lacks a joint military force, many European leaders consider sanctions the bloc’s most powerful foreign policy tool. Sanctions policies must receive unanimous consent from member states in the Council of the European Union, the body that represents EU leaders.
Since its inception in 1992, the EU has levied sanctions more than thirty times (in addition to those mandated by the UN). It is said that comprehensive sanctions imposed on Iran in 2012 marked a turning point for the bloc, which had previously sought to limit sanctions to specific individuals or companies. Individual states, of course, may impose harsher, autonomous sanctions within their national jurisdiction.
The EU and the UK currently have sanctions in place against numerous countries, or certain individuals and entities from or within those countries. There are also measures in place in respect of terrorist organisations and associated individuals. EU and UK sanctions are particularly onerous in respect of Iran and Syria. Other countries affected include Afghanistan, Egypt, Iraq, North Korea, Sudan, and Libya. Extra care is needed when doing business in these countries or with people from or connected to these countries.
The jurisdictional reach of EU sanctions is extremely wide as they apply within the EU:
• To any person inside and outside the EU who is a national of a member state;
• To any company which is incorporated in an EU member state; and
• To any person or business in respect of any business done in whole or in part within the EU.
Long lists of designated persons and entities are published by national governments. These are persons and entities to whom, for example, certain products should not be provided, or from whom payment should not be received, whether directly or through a third party.
HM Treasury in the UK publishes a list called the 'consolidated list of financial sanctions targets in the UK', or 'Consolidated List' for short. This list includes all of the individuals and entities currently included on all financial sanctions lists applicable to the UK. There are currently around 2,700 individuals and entities on the list, including UK incorporated companies.
Trade embargoes and enhanced export controls usually also apply to countries which are the targets of sanctions. In the UK the Export Control Organisation (ECO) is responsible for issuing licenses to export controlled goods and for goods which, although not generally controlled, may be caught by a country specific embargo.
It should be noted that a licence to export does not necessarily allow products and services to be supplied where suppliers have reasonable cause to suspect that a designated person may be benefitting from the provision of the product or service, even if that benefit is only indirect. There is also still a need to make certain notifications to HM Treasury, and in some circumstances to obtain approvals from HM Treasury, for the transfers of funds to and from an Iranian person, including where an intermediary may be involved.
The United States uses economic and financial sanctions more than any other country. Sanctions policy may originate in either the executive or legislative branches. Presidents typically launch the process by issuing an executive order (EO) that declares a national emergency in response to an “unusual and extraordinary” foreign threat, such as “the proliferation of nuclear, biological, and chemical weapons” (EO 12938) or “the actions and policies of the Government of the Russian Federation with respect to Ukraine” (EO 13661). This affords the president special powers (pursuant to the International Emergency Economic Powers Act) to regulate commerce with regard to that threat for a period of one year, unless extended by him/her or terminated by a joint resolution of Congress. (Executive orders may also modify sanctions.)
Notably, most of the more than fifty states of emergency declared since Congress placed limits on their duration in 1976 remain in effect today, including the first, ordered by President Jimmy Carter in 1979 with respect to Iran. (This was last extended by President Barack Obama in 2014.)
Congress, for its part, may pass legislation imposing new sanctions or modifying existing ones, which it has done in many cases. In instances where there are multiple legal authorities, as with Cuba and Iran and others, congressional and executive action may be required to alter or lift the restrictions. For example, there are ten statutes and more than twenty-five executive orders associated with the Iran sanctions program.
For the most part, the twenty-six existing U.S. sanctions programs are administered by the Treasury Department’s Office of Foreign Assets Control (OFAC), while other departments, including State, Commerce, Homeland Security, and Justice may also play an integral role. For instance, the secretary of state can designate a group a Foreign Terrorist Organization, or label a country a State Sponsor of Terrorism, both of which have sanctions implications. (Travel bans are handled by the State Department as well.) State and local authorities, particularly in New York, may also contribute to enforcement efforts.
Details of Sanctions put in by OFAC:
Comprehensive Sanctions: Generally, prohibits all direct or indirect imports/exports, trade brokering, financing or facilitating against most goods, technology and services. Transactions will require a specific license or exemption from OFAC before any transaction can take place.
Limited Sanctions: Block specific practices, such as diamond trading. Most research and business activities may be conducted without an OFAC special license, so long as specific criteria are met as outlined in the regulations for a General License.
Regime or List Based Sanctions: Blocks specific property of targeted foreign governments, regimes, supporters and persons that are not necessarily country-specific, but which may be owned, controlled by, or acting for or on behalf of, targeted countries or entities as a front organization. Collectively, such targeted individuals and entities are called "Specially Designated Nationals.”
The U.S. Government currently maintains comprehensive or near comprehensive sanction programs against the following countries: Cuba, Iran, North Korea, Sudan and Syria. The following limited sanction programs are also in place: Belarus-Related, Burma (Myanmar), the Central African Republic, Cote d'Ivorie (Ivory Coast)-Related, Democratic Republic of the Congo-Related, Iraq-Related, Lebanon-Related, Libya, Somalia, Sudan, South Sudan-Related, Ukraine-Related (includes entities in Russia), Yemen-Related, and Zimbabwe. Generally speaking, the "related" sanctions programs do not apply to the named country, but rather to internal or external elements attempting to destabilize the named country or region; for example, the Ukraine-Related sanctions program includes several Russian nationals and entities. OFAC routinely adds (or deletes) entries on its blacklist of more than six thousand individuals, businesses, and groups (known as Specially Designated Nationals.) The assets of those listed are blocked, and U.S. persons, including U.S. businesses and their foreign branches, are forbidden from transacting with them.
Jurisdiction under OFAC sanctions usually extends to 'US persons', which is generally defined as:
Any US citizen or permanent resident overseas national, wherever situated in the world;
Any person while in the US;
Any US organised company and its foreign branches;
Any US subsidiary of a foreign company;
Any foreign company with a branch or other presence in the US; and
For Cuba, any foreign subsidiary of a US company.
Law enforcement agencies are responsible for prevention of crime, money laundering, terrorist financing and frauds. Law enforcement agency division within a country can typically be at more than one level, meaning at state, province, or territory level, and for at the sub division level, that is county, shire, or municipality or metropolitan area level. Law enforcement agencies have some form of geographic restriction on their ability to apply their powers. The responsibilities of a law enforcement agency vary from country to country. For example, in certain countries, they can be responsible for enforcing secular law or religious law, for example Sharia. Many law enforcement agencies have administrative and service responsibilities, often as their major responsibility, as well as their law enforcement responsibilities. This is typical of agencies such as customs or taxation agencies. Some of their important functions are:
Collect information about crime or cases involving crime, drugs, marijuana, frauds, money laundering and terrorist financing.
Gather evidence related to noncompliance with law
Direct subjects to provide information related to the noncompliance with a law and even seize property & assets if required.
Arrest and detain subjects.
Until 1970, many banks had no compunctions about accepting large cash deposits even when the circumstances indicated that the origin of the cash was probably illegal activity. The Currency and Foreign Transactions Reporting Act, commonly known as the Bank Secrecy Act of 1970 (BSA), was intended to deter tax evasion and money laundering by creating an audit trail that would allow law enforcement agents to track large cash transactions. Although it did not outlaw money laundering as such, it created an expectation that banks would be vigilant in identifying suspect customers and transactions.
Under the BSA, the Department of the Treasury promulgated reporting requirements for financial institutions. For every cash transaction over $10,000, banks must file a Currency Transaction Report (CTR); casinos similarly must report such transactions with the Internal Revenue Service (IRS) on a Currency Transaction Report by Casino (CTRC). Persons who export or import over $10,000 in cash or monetary instruments must file an International Transportation of Currency or Monetary Instruments Report (CMIR). U.S. citizens or residents must report foreign bank accounts by filing a Foreign Bank and Financial Accounts Report (FBAR). In 1984, an additional IRS requirement was imposed; businesses other than financial institutions (for example, automobile dealers) must report cash transactions of over $10,000 by filing an IRS form 8300. Bank regulators monitor banks’ compliance with BSA rules. IRS is responsible for monitoring compliance by nonbank financial institutions.
Although the BSA made a bank’s failure to file a CTR a crime, money laundering itself was not a crime until the Money Laundering Control Act of 1986. This statute fully criminalized money laundering, with penalties of up to 20 years and fines of up to $500,000 for each count. It also did several other things:
Made helping money launderers a crime
Outlawed structuring or “smurfing” operations (i.e., breaking large cash deposits into several deposits of less than $10,000 in order to avoid reporting requirements),
Extended criminality to persons knowingly engaging in financial transactions with money generated by certain crimes, and persons who are “willfully blind to” such unlawful activity, and Mandated compliance procedures to be required of banks; the procedures were spelled out in 1987 regulations.
The Anti-Drug Abuse Act of 1988 increased the civil and criminal penalties for money laundering and other BSA violations, to include forfeiture of any property or assets involved in an illegal transaction related to money laundering. The act gave the Treasury Department the power to require financial institutions in geographically defined areas to file additional transaction reports for purposes of law enforcement. It also directed the Department of the Treasury to negotiate bilateral agreements covering the recording of currency transactions and the sharing of this information among governments.
The Depository Institution Money Laundering Amendment Act of 1990 gave the federal government authority to request the assistance of a foreign banking authority in investigations and law enforcement, and to accommodate such requests from foreign authorities. The Annunzio-Wylie Anti-Money Laundering Act of 1992 requires financial institutions to have compliance procedures and staff training. Bank charters can be revoked, or their coverage by Federal Deposit Insurance can be terminated, if they are convicted of noncompliance. These sanctions are so powerful that, according to bank regulators, they are unlikely to be sought often.
The huge volume of CTRs now far exceeds the resources that law enforcement agencies have for investigating them. The Money Laundering Suppression Act of 1994 was designed to reduce the number of CTRs by about 30% annually, by mandating certain exemptions. This act also requires federal registration of all nonbanking money transmitters, or business enterprises that cash checks, transmit money, or exchange currency. This may include 10,000 American Express agents, 14,000 Western Union agents, 45,000 agents of Traveler’s Express, and all casas de cambio (currency exchange houses) and giro houses (money transmitters). The Treasury Department can require the reporting of monetary instruments drawn on or by foreign financial institutions. States are asked to draft uniform laws covering the licensing of nonbank money transmitters.
Federal Agencies’ Roles and Responsibilities:
Several federal law enforcement agencies are involved in control of money laundering. They include, within the Department of Justice, the Federal Bureau of Investigations (FBI) and the Drug Enforcement Administration (DEA); and, within the Department of the Treasury, the Internal Revenue Service (IRS) and the U.S. Customs Service. Each of these law enforcement agencies has an intelligence capability, but the agencies are further backed up by a shared information-development unit—namely, the Financial Crimes Enforcement Network (FinCEN) an analytical unit within the Department of the Treasury. There is also communication between law enforcement and national security agencies
The compliance of financial institutions with money laundering statutes is monitored by five federal regulatory agencies:
The Office of the Comptroller of the Currency,
The Board of Governors of the Federal Reserve System,
The Office of Thrift Supervision,
The National Credit Union Administration, and
The Federal Deposit Insurance Corporation.
Most large-scale money laundering control initiatives are intended to be multiagency efforts. In practice, investigations are usually initiated by one agency on the basis of information provided by informants and field agents, BSA reports, or referrals from financial institutions or bank examiners.
In part, the tension is also a by-product of the high value each law enforcement agency places on protecting its undercover agents and operations and the identity of established informers. In 1987, an agreement was entered into by the Departments of Treasury and Justice about their overlapping responsibilities, supplemented by a 1990 Memorandum of Understanding among those Departments and the U.S. Postal Service. Other mechanisms for cooperation have been developed for attempting to coordinate anti-money laundering efforts:
The Office of National Drug Control Policy (ONDCP) in the Executive Office of the President attempts to develop overall policy directions for drug control and control of drug-related money laundering.
The Multiagency Financial Investigations Center (MAFIC) is a coordinating mechanism for the DEA, IRS, FBI, U.S. Customs Service, and the Postal Authority.
There are several “High-Intensity Drug Trafficking Area” (HIDTA) task forces made up of IRS and DEA agents.
The Organized Crime Drug Enforcement Task Force program, composed of federal, state, and local agencies organized into 13 regional task forces, has conducted a number of successful and highly publicized operations known by colorful names—Polar Cap, Greenback, Dinero, and Green Ice.
A very successful New York City law enforcement unit—the El Dorado task force—is made up of Customs Service and IRS agents together with state and local police.
Cooperation among the regulatory agencies is encouraged by the Bank Fraud Working Group and the Bank Secrecy Act Advisory Group (a nongovernmental panel of experts appointed by the Secretary of the Treasury).
The ONDCP strongly encouraged increased emphasis on the comprehensive collection, analysis, and sharing of information, especially that which sheds light on the structure of drug trafficking operations and organizations. This is often resisted by the agencies, in part because of differences in their organizational cultures.
The FBI has broad jurisdiction to investigate money laundering through a wide range of statutory violations involving specified underlying criminal activity. This agency tends to focus on the underlying criminal activities, attempting to dismantle entire criminal organizations and jail their top leaders. Of the agency’s six “priority areas that most affect society”—drugs, organized crime, white collar crime, terrorism, foreign intelligence, and violent crimes—at least the first four nearly always involve some money laundering, and the FBI is increasingly alert to the financial aspects of criminal organization. The FBI Laboratories’ Racketeering Records Analysis Unit provides support to field divisions with its ability to trace the flow of illicit money through bank deposits, money orders, adding machine tapes, invoices, receipts, checks, bills of lading, and other financial records. The FBI signed a Memorandum of Understanding with representatives of the United Kingdom in late 1993 establishing a White Collar Crime Investigative Team, to cooperate on investigations and prosecutions in matters affecting the two countries and the Caribbean British Dependent Territories, including the Cayman Islands. The four-person team is based in Miami.
DEA, also in the Department of Justice, is the lead federal agency in enforcing narcotics and controlled substances laws and regulations. Through its Financial Investigations Section, DEA seeks to detect drug-related money laundering and encourage seizing the assets of drug traffickers. But its principal focus is on arresting drug dealers, and DEA tends to judge its operations by number of arrests. In general, the two Department of Justice agencies see financial crime analysis as important but subordinate to the larger battle against drugs and organized crime. Recognizing that crimes such as tax evasion and money laundering threaten the national financial system and its institutions, the Department of Treasury has an Under Secretary for Enforcement, elevated from the level of Assistant Secretary in 1994.
Three operating bureaus “The U.S. Customs Service”, “The Secret Service”, and “The Bureau of Alcohol, Tobacco, and Firearms” have among their responsibilities some aspects of control of money laundering. The U.S. Customs Service has the primary responsibility for stopping the illegal cross-border flow of funds, both as smuggled currency (the Office of Inspections and Control) and as wire transfers and funds transmittals (the Office of Enforcement). The Secret Service and Bureau of Alcohol, Tobacco, and Firearms concentrate more on counterfeiting but are sometimes called on to assist in anti-money-laundering operations
State Law Enforcement:
Twenty-three states have laws against money laundering; these differ somewhat as to the elements of the offense and as to penalties. Not all of the states with money laundering laws have active enforcement programs. The most long-standing and well-developed programs are in Arizona, Texas, and California. Only a few states require currency transaction reporting by state-chartered banks. Under FinCEN’s Project Gateway, states are able to receive electronically all CTRs pertinent to their jurisdiction. Some states have laws that allow for confiscation of property obtained with funds from illegal activities. The Arizona Racketeering Act is one of the most comprehensive and effective. Arizona has an aggressive multiagency anti money laundering program that includes experiments with the screening of international wire transfers.
UK law enforcement and prosecution agencies act at local, regional and national level
Local Level:
43 police forces in England and Wales (local policing in Northern Ireland and Scotland is the responsibility of the Police Service of Northern Ireland and Police Scotland).
Regional Level:
9 Regional Organised Crime Units (ROCUs) in England and Wales, which include Regional Assets Recovery Teams (RARTs) and Asset Confiscation Enforcement (ACE) teams. Regional Crown Prosecution Service offices (including dedicated asset recovery resources co-located with ROCUs).
National Level:
HM Revenue & Customs
National Crime Agency
Serious Fraud Office
National Crown Prosecution Service Functions
1. Local Policing:
There are 43 local forces in England and Wales, with Police Scotland and the Police Service of Northern Ireland providing local policing in Scotland and Northern Ireland. There are also a number of non-territorial police forces, such as the British Transport Police. There are approximately 128,000 police officers in the UK, supported by a further 13,000 Police Community Support Officers (PCSOs) and 64,000 civilian staff in the 43 forces in England and Wales. The size of forces varies widely, reflecting the size of the force area and its population.
The largest force, the Metropolitan Police Service, is 39 times the size of the smallest force, the City of London Police. The police have a broad responsibility to prevent and detect crime of all types, from anti-social behaviour to child sexual exploitation and the most serious organised crime including money laundering.
Tackling money laundering is a part of the total police response to crime although it is not a priority for the majority of police forces. In 2013/14, the police, including the Regional Assets Recovery Teams (RARTs), were responsible for the majority of confiscation orders with 5227 orders issued with an approximate value of £125 million and £30 million cash forfeited.
2. Regional Organised Crime Units and Regional Asset Recovery Teams:
Police forces in all nine policing regions in England and Wales have collaborated to form Regional Organised Crime Units (ROCUs). These units deliver specialist investigative and intelligence capabilities to all forces within a region, to help tackle serious and organised crime. ROCUs are the primary interface between the National Crime Agency (NCA) and forces and are accountable to their respective Police and Crime Commissioners.
They support the national coordination and tasking of the effort against serious and organised crime by providing capabilities for the police response to activity with regional impact.
They also support local forces, providing specialist resources and tactical advice to support local operations to counter serious and organised crime. Within each ROCU is a Regional Asset Recovery Team (RART). The RARTs develop financial intelligence in aid of investigation and disruption of subjects.
They utilise financial investigation to conduct money laundering investigations, disrupt subjects and recover assets through POCA legislation. There are approximately 180 staff in the RARTs, all of whom are operational. In 2013/14 the RARTs secured approximately £1 million in cash forfeitures and 261 confiscation orders with an equivalent value of approximately £22 million. The regional ACE teams, established in September 2014, recovered approximately £7 million of assets in the first 6 months of operations.
3. National Crime Agency:
The National Crime Agency (NCA) is the lead agency for the response to serious and organised crime in the UK. The NCA’s strategic priorities are set by the Home Secretary. The first is to identify and disrupt serious and organised crime including by investigating and enabling the prosecution of those responsible. Its principal functions are to reduce crime and to gather, analyse and disseminate criminal intelligence. Money laundering and criminal finance are important areas of work for the NCA. Money laundering, and bribery and corruption which is closely associated with it, have been identified as high priority threats in the NCA National Control Strategy, which prioritises the threats of serious and organised crime. The NCA has an intelligence hub which is responsible for gathering, analysing and disseminating information and an Economic Crime Command which is responsible for leading, supporting and coordinating resources to counter economic crime across the UK – including law enforcement, regulatory bodies and the private sector. This includes law enforcement efforts on money laundering, bribery and corruption, asset recovery and asset denial. It also supports partners, for example in the SFO and FCA by providing the NCA’s investigative capabilities to tackle high priority economic crime threats. The NCA co-ordinates activity through the multi-agency Criminal Finances Threat Group, which has sub-groups on cash-based money laundering (led by HMRC); non-cash based money laundering (led by NCA); and professional enablers (led by SFO).
NCA is focussing on money laundering and international corruption to protect the UK as an international financial centre. It is proactively using financial investigation and other law enforcement techniques in intelligence and evidence-gathering to target money laundering, as well as asset recovery tools after the event. It has various tools available to it including:
Intelligence and evidence-gathering
Cash seizure and forfeiture
Restraint and confiscation
Civil recovery and taxation
On asset recovery the NCA’s priority is denying criminals their assets by every lawful means it can, not just recovering them. The focus is on the disruptive value of taking assets away, not the size of the returns. However, in its first year, NCA led and coordinated operational activity that resulted in almost £126 million (£22 million domestically and £104 million internationally) being denied to criminals impacting on the UK. In regards to assets recovered, in its first year the
NCA achieved returns of £22.5 million. The NCA also works closely with its partners to assist their efforts against criminal finances, for example by working with UK police forces to identify and seize money derived from criminal activity. Since the NCA was established in 2013, its activity has led directly to operational partners seizing over £16 million in cash and making around 150 related arrests. NCA has also set up a dedicated Asset Confiscation Enforcement (ACE) team to coordinate activity across the Agency and with its partners, including the police, HMRC, SFO and HM Courts and Tribunal Service. Between 2 December 2013 and 31 December 2014, £40 million was collected by partners on a total of 161 priority cases across law enforcement. Through the work of ACE teams across the UK, law enforcement is tackling unenforced confiscation orders and prioritising the orders of the most serious criminals.
4. UK Financial Intelligence Unit:
The UK Financial Intelligence Unit (UKFIU) is part of the NCA Economic Crime Command, but is operationally independent of the NCA, meaning that it has the authority and capacity to act autonomously. The UKFIU is a law enforcement FIU which receives, analyses and distributes financial intelligence gathered from suspicious activity reports (SARs). UKFIU analyses the SARs to extract strategic and tactical intelligence, and makes all SARs available to law enforcement agencies for investigation (with the exception of SARs in certain sensitive categories). UKFIU receives the largest number of SARs of any EU member state. In 2013/14 UKFIU received 354,000 SARs of which 14,155 were requests for consent. This is an increase of approximately 38,000 reports on the totals for 2012/13.
The UKFIU works in close partnership with other key international organisations to fight money laundering and terrorist financing. The UKFIU is a fully active member of the Egmont Group (an international forum for FIUs, set up to improve cooperation in the fight against money laundering and the financing of terrorism). Membership allows the UKFIU to seek and receive financial intelligence from other members in order to support law enforcement operations and projects. It also acts as the conduit to this resource for the wider UK law enforcement community.
5. Serious Fraud Office (SFO):
The SFO is an independent government department that investigates and prosecutes serious or complex fraud, and corruption. It has jurisdiction in England, Wales and Northern Ireland but not in Scotland, where the responsibility rests with the Crown Office and Procurator Fiscal Service. Its expert forensic accountants and professional investigators and lawyers investigate and prosecute the most serious or complex instances of fraud and corruption. The SFO’s Proceeds of Crime Division deals with confiscation investigations, restraint proceedings, money laundering investigations and civil recovery work across the SFO’s cases. The Division comprises a multi-disciplinary team of 37 lawyers and financial investigators who work closely with the criminal case teams to ensure that a financial investigation strategy is in place from the outset. The team also deals with incoming requests for mutual legal assistance involving asset freezing and the enforcement of overseas confiscation orders. In the period 2014/15 the SFO secured 17 confiscation orders with an equivalent value of £22.7 million and one civil recovery order worth £520. They also recovered £13.8 million in net receipts.
6. HM Revenue and Customs (HMRC):
HMRC is the UK’s tax authority and was established by Act of Parliament in 2005 following the merger of the Inland Revenue and HM Customs & Excise. It is a non-ministerial department reporting to Parliament through its Treasury minister. HMRC is responsible for investigating crime involving all of the tax and other regimes it deals with. It uses civil, as well as criminal, procedures as this allows for a greater volume of cases to be pursued, as well as increasing the revenues secured for the Exchequer. HMRC is also a supervisor for some businesses under the regulations. Criminals, including organised criminals, seek to attack the UK's tax and duty systems to steal taxpayer's money. To counter this HMRC has similar criminal investigation powers to those that are available to other law enforcement agencies. In addition to the predicate offences, HMRC can also investigate money laundering offences using POCA investigative powers, recover criminal cash through summary proceedings and recover the proceeds of crime through working with the independent prosecutors. In the period 2014/14, HMRC secured £1.7 million in cash forfeitures and 171 confiscation orders with an equivalent value of £51.2 million. They also recovered £22.4 million in net receipts.
7. Crown Prosecution Service (CPS):
The CPS is headed by the Director of Public Prosecutions (DPP), who is in turn superintended by the Attorney General (AG). It is the principal independent prosecuting authority in England and Wales and is responsible for prosecuting money laundering and other criminal cases investigated by the police, HMRC, the NCA and other government agencies. It advises law enforcement on lines of inquiry, reviews cases for possible prosecution; determines the charge in all but minor cases; prepares cases for court; and applies for restraint, receivership and confiscation orders in respect of CPS prosecutions. The CPS also obtains restraint orders and enforces overseas confiscation orders on behalf of overseas jurisdictions pursuant to requests for Mutual Legal Assistance (MLA).
Recently it has developed and implemented a comprehensive asset recovery strategy in partnership with relevant government departments and other law enforcement agencies. Central to the strategy is the identification and targeting of priority countries where UK efforts can have most impact, and the deployment of dedicated Asset Recovery Advisors (ARAs), funded by the Home Office, to Spain, UAE, and the European and Caribbean regions.
1. Australian Federal Police (AFP):
The AFP's role is to enforce Commonwealth criminal law, contribute to combating complex, transnational, serious and organised crime impacting Australia's national security and to protect Commonwealth interests from criminal activity in Australia and overseas. The AFP also has responsibility for providing policing services to the Australian Capital Territory and Australia's territories, including Christmas Island, Cocos (Keeling) Islands, Norfolk Island and Jervis Bay.
2. Australian Defence Force(ADF):
The Australian Defence Force (ADF) is the military organisation responsible for the defence of Australia and its national interests. It consists of the Royal Australian Navy (RAN), Australian Army, Royal Australian Air Force (RAAF) and several "tri-service" units.
3. Royal Australian Corps of Military Police: The Royal Australian Corps of Military Police (RACMP) is a small, highly trained and professional corps providing command support and police support to the Army and the Australian Defence Force in peace, crisis and conflict on any operation, anywhere in the world.
Some of the federal Law enforcement agencies in India are under the Central Government and are known as Central Agencies which are:-
1. Central Bureau of Investigation (CBI)
2. Border Security Force (BSF)
3. India Income Tax Department
4. Central Industrial Security Force
5. Central Reserve Police Force
6. Directorate of Revenue Intelligence
7. Indo-Tibetan Border Police (ITBP)
8. National Security Guards (NSG)
9. National Investigating Agency (NIA)
10. Railway Protection Force (RPF)
11. Special Protection Group
12. Seema Suraksha Bal
13. Narcotics Control Bureau (NCB)
14. National Central Bureau (Interpol), New Delhi.
Then comes the organizations under the centre government which are:-
1. Bureau of Police Research & Development (BPR&D)
2. National Crime Records Bureau (NCRB)
3. Central Forensic Science Laboratory (CFSL)
4. National Institute of Forensic Sciences (NIFC)
Further the law enforcement agencies have been classified on the basis of security, intelligence / investigation and Armed Police Forces. Let us look into the classification based on security.
Internal Security
1. Intelligence Bureau.
2. Joint Intelligence Committee.
3. Central Bureau of Investigation.
4. Criminal Investigation Department.
5. All India Radio Monitoring Service.
External Security
1. Research and Analysis Wing.
2. Aviation Research Centre.
3. National Technical Research Organisation.
4. Radio Research Center.
5. Electronics and Technical Services.
Based on intelligence, the law enforcement agencies are further classified into defence intelligence and Economic Intelligence.
Defence Intelligence
1. Directorate of Military Intelligence
2. Defence of Intelligence Agency
3. Directorate of National Intelligence
4. Directorate of Air Intelligence
5. Image Processing and Analysis Centre
6. Directorate of Signals Intelligence
7. Joint Cipher Bureau
Economic Intelligence
1. Directorate of Revenue Intelligence
2. Economic Intelligence Council
3. Directorate of Income Tax Investigation
4. Narcotics Control Bureau
5. Central Economic Intelligence Bureau
6. Directorate of Economic Enforcement
7. Directorate of Anti-Evasion.
Based on the Armed Police Forces, the Classification is such as:-
Central Armed Police Forces
1. Border Security Force (BSF)
2. Central Industrial Security Force (CISF)
3. Central Reserve Police Force (CRPF)
4. Indo Tibetan Border Police (ITBP)
5. National Security Guards (NSG)
6. Railway Protection Force (RPF)
7. Special Protection Group (SPG)
8. Sashashtra Seema Bal/ Armed Border Force.
The State Police Consists of:
1. Organisation
2. Metropolitan Police
3. Traffic Police
4. State Armed Police Forces
The classification of Special Investigating Agencies is as below:-
Central Investigation and Intelligence Agencies
1. Central Bureau of Investigation
2. National Investigating Agency
3. Central Vigilance Commission
4. National Central Bureau (Interpol) New Delhi.
5. Narcotics Control Bureau
6. Directorate General of Income Tax (Intelligence & Criminal Investigation)
7. Directorate of Revenue Intelligence
8. Research and Analysis Wing
9. Enforcement Directorate
Suspicious activity reporting forms the cornerstone of all the reporting systems in a bank. It is critical to the bank’s ability to utilize financial information to help combat terrorism, terrorist financing, money laundering, and other financial crimes by reporting suspicious transactions to the concerned Financial Intelligence Units. A transaction includes a deposit; a withdrawal; a transfer between accounts; an exchange of currency; an extension of credit; a purchase or sale of any stock, bond, certificate of deposit, or other monetary instrument or investment security; or any other payment, transfer, or delivery “by through or” to a bank.
Banks should recognize that the quality of SAR content is critical to the adequacy and effectiveness of the suspicious activity reporting system. It is not possible for a bank to detect and report all potentially illicit transactions that flow through the bank. Banks should focus on evaluating its policies, procedures, and processes to identify, evaluate, and report suspicious activity. However, as part of the examination process, bank management should review individual SAR filing decisions to determine the effectiveness of the bank's suspicious activity identification, evaluation, and reporting process.
Suspicious activity monitoring and reporting are critical internal controls. Proper monitoring and reporting processes are essential to ensuring that the bank has an adequate and effective compliance program. Appropriate policies, procedures, and processes should be in place to monitor and identify unusual activity. The sophistication of monitoring systems should be dictated by the bank's risk profile, with particular emphasis on the composition of higher-risk products, services, customers, entities, and geographies. The bank should ensure adequate staff is assigned to the identification, research, and reporting of suspicious activities, taking into account the bank's overall risk profile and the volume of transactions. Monitoring systems typically include employee identification or referrals, transaction-based (manual) systems, surveillance (automated) systems, or any combination of these.
Generally, effective suspicious activity monitoring and reporting systems include five key components. The components, listed below, are interdependent, and an effective suspicious activity monitoring and reporting process should include successful implementation of each component. Breakdowns in any one or more of these components may adversely affect SAR reporting. The five key components to an effective monitoring and reporting system are:
Identification or alert of unusual activity (which may include: employee identification, law enforcement inquiries, other referrals, and transaction and surveillance monitoring system output).
Managing alerts.
SAR decision making.
SAR completion and filing.
Monitoring and SAR filing on continuing activity.
These components are present in banks of all sizes. However, the structure and formality of the components may vary. Larger banks will typically have greater differentiation and distinction between functions, and may devote entire departments to the completion of each component. Smaller banks may use one or more employees to complete several tasks (e.g., review of monitoring reports, research activity, and completion of the actual SAR). Policies, procedures, and processes should describe the steps the bank takes to address each component and indicate the person(s) or departments responsible for identifying or producing an alert of unusual activity, managing the alert, deciding whether to file, SAR completion and filing, and monitoring and SAR filing on continuing activity.
Banks use a number of methods to identify potentially suspicious activity, including but not limited to activity identified by employees during day-to-day operations, law enforcement inquiries, advisories issued by regulatory or law enforcement agencies, transaction and surveillance monitoring system output, or any combination of these.
a. Employee Identification:
During the course of day-to-day operations, employees may observe unusual or potentially suspicious transaction activity. Banks should implement appropriate training, policies, and procedures to ensure that personnel adhere to the internal processes for identification and referral of potentially suspicious activity. Banks should be aware of all methods of identification and should ensure that their suspicious activity monitoring system includes processes to facilitate the transfer of internal referrals to appropriate personnel for further research.
b. Law Enforcement Inquiries and Requests:
Banks should establish policies, procedures, and processes for identifying subjects of law enforcement requests, monitoring the transaction activity of those subjects when appropriate, identifying unusual or potentially suspicious activity related to those subjects, and filing, as appropriate, SARs related to those subjects. Law enforcement inquiries and requests can include grand jury subpoenas and National Security Letters (NSL) requests. A subpoena (pronounced "suh-pee-nuh") is a request for the production of documents, or a request to appear in court or other legal proceeding. It is court-ordered command that essentially requires you to do something, such as testify or present information that may help support the facts that are at issue in a pending case. The term "subpoena" literally means "under penalty". A person who receives a subpoena but does not comply with its terms may be subject to civil or criminal penalties, such as fines, jail time, or both. Under state and federal civil or criminal procedural laws, subpoenas offer attorneys a chance to obtain information to help prove or disprove their client's case. Criminal attorneys, for example, often use subpoenas to obtain "witness" or lay opinion testimony from a third party that may lead to someone's guilt or innocence at trial.
Mere receipt of any law enforcement inquiry does not, by itself, require the filing of a SAR by the bank. Nonetheless, a law enforcement inquiry may be relevant to a bank's overall risk assessment of its customers and accounts. For example, the receipt of a grand jury subpoena should cause a bank to review account activity for the relevant customer. A bank should assess all of the information it knows about its customer, including the receipt of a law enforcement inquiry, in accordance with its risk-based BSA/AML compliance program.
The bank should determine whether a SAR should be filed based on all customer information available. Due to the confidentiality of grand jury proceedings, if a bank files a SAR after receiving a grand jury subpoena, law enforcement discourages banks from including any reference to the receipt or existence of the grand jury subpoena in the SAR. Rather, the SAR should reference only those facts and activities that support a finding of suspicious transactions identified by the bank.
c. National Security Letters:
NSLs are written investigative demands that may be issued by the local intelligent units (such as FBI) and other governmental authorities in counterintelligence and counterterrorism investigations to obtain the following:
Telephone and electronic communications records from telephone companies and Internet service providers.
Information from credit bureaus.
Financial records from financial institutions.
NSLs are highly confidential documents; for that reason, no bank, or officer, employee or agent of the institution, can disclose to any person that a government authority or the FBI has sought or obtained access to records through a Right to Financial Privacy Act NSL. Banks that receive NSLs must take appropriate measures to ensure the confidentiality of the letters and should have procedures in place for processing and maintaining the confidentiality of NSLs.
If a bank files a SAR after receiving a NSL, the SAR should not contain any reference to the receipt or existence of the NSL. The SAR should reference only those facts and activities that support a finding of unusual or suspicious transactions identified by the bank.
A transaction monitoring system, sometimes referred to as a manual transaction monitoring system, typically targets specific types of transactions (e.g., those involving large amounts of cash, those to or from foreign geographies) and includes a manual review of various reports generated by the bank's MIS or vendor systems in order to identify unusual activity. Examples of MIS reports include currency activity reports funds transfer reports, monetary instrument sales reports, large item reports, significant balance change reports, ATM transaction reports, and nonsufficient funds (NSF) reports. Many MIS or vendor systems include filtering models for identification of potentially unusual activity. The process may involve review of daily reports, reports that cover a period of time (e.g., rolling 30-day reports, monthly reports), or a combination of both types of reports. The type and frequency of reviews and resulting reports used should be commensurate with the bank's AML risk profile and appropriately cover its higher-risk products, services, customers, entities, and geographic locations.
MIS or vendor system-generated reports typically use a discretionary threshold. Thresholds selected by management for the production of transaction reports should enable management to detect unusual activity. Upon identification of unusual activity, assigned personnel should review CDD and other pertinent information to determine whether the activity is suspicious.
Management should periodically evaluate the appropriateness of filtering criteria and thresholds used in the monitoring process. Each bank should evaluate and identify filtering criteria most appropriate for their bank. The programming of the bank's monitoring systems should be independently reviewed for reasonable filtering criteria. Typical transaction monitoring reports are as follows.
a. Currency activity reports:
Most vendors offer reports that identify all currency activity or currency activity greater than the threshold limits set by Regulators. These reports assist bankers with filing CTRs (Currency Transaction Reports) and identifying suspicious currency activity. Most bank information service providers offer currency activity reports that can filter transactions using various parameters, for example:
Currency activity including multiple transactions greater than the threshold limit.
Currency activity (single and multiple transactions) below the threshold reporting requirement.
Currency transactions involving multiple lower currency transactions that over a period of time (e.g., 15 days) aggregate to a substantial sum of money.
Currency transactions aggregated by customer name, tax identification number, or customer information file number.
Such filtering reports, whether implemented through a purchased vendor software system or through requests from information service providers, will significantly enhance a bank’s ability to identify and evaluate unusual currency transactions.
b. Funds transfer records:
Banks with significant funds transfer activity, use of spreadsheet or vendor software is an efficient way to review funds transfer activity for unusual patterns. Most vendor software systems include standard suspicious activity filter reports. These reports typically focus on identifying certain higher-risk geographic locations and larger amount funds transfer transactions for individuals and businesses. Each bank should establish its own filtering criteria for both individuals and businesses. Non-customer funds transfer transactions and payable upon proper identification (PUPID) transactions should be reviewed for unusual activity. Activities identified during these reviews should be subjected to additional research to ensure that identified activity is consistent with the stated account purpose and expected activity. When inconsistencies are identified, banks may need to conduct a global relationship review to determine if a SAR is warranted.
c. Monetary instrument records:
Records for monetary instrument sales are required by the Regulators. Such records can assist the bank in identifying possible currency structuring through the purchase of cashier’s checks, official bank checks, money orders, or traveler’s checks in amounts near to the threshold limits. A periodic review of these records can also help identify frequent purchasers of monetary instruments and common payees. Reviews for suspicious activity should encompass activity for an extended period of time (30, 60, 90 days) and should focus on, among other things, identification of commonalities, such as common payees and purchasers, or consecutively numbered purchased monetary instruments.
A surveillance monitoring system, sometimes referred to as an automated account monitoring system, can cover multiple types of transactions and use various rules to identify potentially suspicious activity. In addition, many can adapt over time based on historical activity, trends, or internal peer comparison. These systems typically use computer programs, developed in-house or purchased from vendors, to identify individual transactions, patterns of unusual activity, or deviations from expected activity. These systems can capture a wide range of account activity, such as deposits, withdrawals, funds transfers, automated clearing house (ACH) transactions, and automated teller machine (ATM) transactions, directly from the bank’s core data processing system. Banks that are large, operate in many locations, or have a large volume of higher-risk customers typically use surveillance monitoring systems.
Surveillance monitoring systems include rule-based and intelligent systems. Rule-based systems detect unusual transactions that are outside of system-developed or management-established "rules." Such systems can consist of few or many rules, depending on the complexity of the in-house or vendor product. These rules are applied using a series of transaction filters or a rules engine. Rule-based systems are more sophisticated than the basic manual system, which only filters on one rule (e.g., transaction greater than threshold levels). Rule-based systems can apply multiple rules, overlapping rules, and filters that are more complex. For example, rule-based systems can initially apply a rule, or set of criteria to all accounts within a bank (e.g., all retail customers), and then apply a more refined set of criteria to a subset of accounts or risk category of accounts (e.g., all retail customers with direct deposits). Rule-based systems can also filter against individual customer-account profiles.
Intelligent systems are adaptive and can filter transactions, based on historical account activity or compare customer activity against a pre-established peer group or other relevant data. Intelligent systems review transactions in context with other transactions and the customer profile. In doing so, these systems increase their information database on the customer, account type, category, or business, as more transactions and data are stored in the system.
Relative to surveillance monitoring, system capabilities and thresholds refer to the parameters or filters used by banks in their monitoring processes. Parameters and filters should be reasonable and tailored to the activity that the bank is trying to identify or control. After parameters and filters have been developed, they should be reviewed before implementation to identify any gaps (common money laundering techniques or frauds) that may not have been addressed. For example, a bank may discover that its filter for cash structuring is triggered only by a daily cash transaction in excess of threshold levels. The bank may need to refine this filter in order to avoid missing potentially suspicious activity because common cash structuring techniques often involve transactions that are slightly under the CTR threshold. Once established, the bank should review and test system capabilities and thresholds on a periodic basis. This review should focus on specific parameters or filters in order to ensure that intended information is accurately captured and that the parameter or filter is appropriate for the bank's particular risk profile.
Understanding the filtering criteria of a surveillance monitoring system is critical to assessing the effectiveness of the system. System filtering criteria should be developed through a review of specific higher-risk products and services, customers and entities, and geographies. System filtering criteria, including specific profiles and rules, should be based on what is reasonable and expected for each type of account. Monitoring accounts purely based on historical activity can be misleading if the activity is not actually consistent with similar types of accounts. For example, an account may have a historical transaction activity that is substantially different from what would normally be expected from that type of account (e.g., a check-cashing business that deposits large sums of currency versus withdrawing currency to fund the cashing of checks).
The authority to establish or change expected activity profiles should be clearly defined through policies and procedures. Controls should ensure limited access to the monitoring systems, and changes should generally require the approval of the compliance officer or senior management. Management should document and be able to explain filtering criteria, thresholds used, and how both are appropriate for the bank's risks. Management should also periodically review and test the filtering criteria and thresholds established to ensure that they are still effective. In addition, the monitoring system's programming methodology and effectiveness should be independently validated to ensure that the models are detecting potentially suspicious activity. The independent validation should also verify the policies in place and that management is complying with those policies.
Alert management focuses on processes used to investigate and evaluate identified unusual activity. Banks should be aware of all methods of identification and should ensure that their suspicious activity monitoring program includes processes to evaluate any unusual activity identified, regardless of the method of identification. Banks should have policies, procedures, and processes in place for referring unusual activity from all areas of the bank or business lines to the personnel or department responsible for evaluating unusual activity. Within those procedures, management should establish a clear and defined escalation process from the point of initial detection to disposition of the investigation.
The bank should assign adequate staff to the identification, evaluation, and reporting of potentially suspicious activities, taking into account the bank's overall risk profile and the volume of transactions. Additionally, a bank should ensure that the assigned staff possess the requisite experience levels and are provided with comprehensive and ongoing training to maintain their expertise. Staff should also be provided with sufficient internal and external tools to allow them to properly research activities and formulate conclusions.
Internal research tools include, but are not limited to, access to account systems and account information, including CDD and EDD information. CDD and EDD information will assist banks in evaluating if the unusual activity is considered suspicious. External research tools may include widely available Internet media search tools, as well those accessible by subscription. After thorough research and analysis, investigators should document conclusions including any recommendation regarding whether or not to file a SAR.
When multiple departments are responsible for researching unusual activities, the lines of communication between the departments must remain open. This allows banks with bifurcated processes to gain efficiencies by sharing information, reducing redundancies, and ensuring all suspicious activity is identified, evaluated, and reported.
If applicable, reviewing and understanding suspicious activity monitoring across the organizations affiliates, subsidiaries, and business lines may enhance a banking organization's ability to detect suspicious activity, and thus minimize the potential for financial losses, increased legal or compliance expenses, and reputational risk to the organization.
Banks are required to report suspicious activity that may involve money laundering, violations, terrorist financing, and certain other crimes above prescribed thresholds. However, banks are not obligated to investigate or confirm the underlying crime (e.g., terrorist financing, money laundering, tax evasion, identity theft, and various types of fraud). Investigation is the responsibility of law enforcement. When evaluating suspicious activity and completing the SAR, banks should, to the best of their ability, identify the characteristics of the suspicious activity.
After thorough research and analysis has been completed, findings are typically forwarded to a final decision maker (individual or committee). The bank should have policies, procedures, and processes for referring unusual activity from all business lines to the personnel or department responsible for evaluating unusual activity. Within those procedures, management should establish a clear and defined escalation process from the point of initial detection to disposition of the investigation. The decision maker, whether an individual or committee, should have the authority to make the final SAR filing decision. When the bank uses a committee, there should be a clearly defined process to resolve differences of opinion on filing decisions. Banks should document SAR decisions, including the specific reason for filing or not filing a SAR. Thorough documentation provides a record of the SAR decision-making process, including final decisions not to file a SAR. However, due to the variety of systems used to identify, track, and report suspicious activity, as well as the fact that each suspicious activity reporting decision will be based on unique facts and circumstances, no single form of documentation is required when a bank decides not to file.
The decision to file a SAR is an inherently subjective judgment. Examiners should focus on whether the bank has an effective SAR decision-making process, not individual SAR decisions. Examiners may review individual SAR decisions as a means to test the effectiveness of the SAR monitoring, reporting, and decision-making process. In those instances where the bank has an established SAR decision-making process, has followed existing policies, procedures, and processes, and has determined not to file a SAR, the bank should not be criticized for the failure to file a SAR unless the failure is significant or accompanied by evidence of bad faith.
One purpose of filing SARs is to identify violations or potential violations of law to the appropriate law enforcement authorities for criminal investigation. This objective is accomplished by the filing of a SAR that identifies the activity of concern. If this activity continues over a period of time, such information should be made known to law enforcement and the federal banking agencies. Certain regulators have suggested that banks should report continuing suspicious activity by filing a report at least every 90 calendar days. Subsequent guidance permits banks with SAR requirements to file SARs for continuing activity after a 90 day review with the filing deadline being 120 calendar days after the date of the previously related SAR filing. Banks may also file SARs on continuing activity earlier than the 120 day deadline if the bank believes the activity warrants earlier review by law enforcement. This practice will notify law enforcement of the continuing nature of the activity in aggregate. In addition, this practice will remind the bank that it should continue to review the suspicious activity to determine whether other actions may be appropriate, such as bank management determining that it is necessary to terminate a relationship with the customer or employee that is the subject of the filing.
Banks should be aware that law enforcement may have an interest in ensuring that certain accounts remain open notwithstanding suspicious or potential criminal activity in connection with those accounts. If a law enforcement agency requests that a bank maintain a particular account, the bank should ask for a written request. The written request should indicate that the agency has requested that the bank maintain the account and the purpose and duration of the request. Ultimately, the decision to maintain or close an account should be made by a bank in accordance with its own standards and guidelines.
The bank should develop policies, procedures, and processes indicating when to escalate issues or problems identified as the result of repeat SAR filings on accounts. The procedures should include:
Review by senior management and legal staff (e.g., Compliance officer or SAR committee).
Criteria for when analysis of the overall customer relationship is necessary.
Criteria for whether and, if so, when to close the account.
Criteria for when to notify law enforcement, if appropriate.
Further, SAR completion and filing are a critical part of the SAR monitoring and reporting process. Appropriate policies, procedures, and processes should be in place to ensure SARs are filed in a timely manner, are complete and accurate, and that the narrative provides a sufficient description of the activity reported as well as the basis for filing.
The time period for filing a SAR starts when the bank, during its review or because of other factors, knows or has reason to suspect that the activity or transactions under review meet one or more of the definitions of suspicious activity.
The SAR rules require that a SAR be electronically filed no later than 30 calendar days from the date of the initial detection of facts that may constitute a basis for filing a SAR. The phrase "initial detection" should not be interpreted as meaning the moment a transaction is highlighted for review. There are a variety of legitimate transactions that could raise a red flag simply because they are inconsistent with an accountholder’s normal account activity.
For example, a real estate investment (purchase or sale), the receipt of an inheritance, or a gift, may cause an account to have a significant credit or debit that would be inconsistent with typical account activity. The bank’s automated account monitoring system or initial discovery of information, such as system-generated reports, may flag the transaction; however, this should not be considered initial detection of potential suspicious activity. The 30-day period does not begin until an appropriate review is conducted and a determination is made that the transaction under review is "suspicious" within the meaning of the SAR regulation.
Whenever possible, an expeditious review of the transaction or the account is recommended and can be of significant assistance to law enforcement. In any event, the review should be completed in a reasonable period of time. What constitutes a "reasonable period of time" will vary according to the facts and circumstances of the particular matter being reviewed and the effectiveness of the SAR monitoring, reporting, and decision-making process of each bank.
The key factor is that a bank has established adequate procedures for reviewing and assessing facts and circumstances identified as potentially suspicious, and that those procedures are documented and followed.
For situations requiring immediate attention, in addition to filing a timely SAR, a bank must immediately notify, by telephone, an "appropriate law enforcement authority" and, as necessary, the bank’s primary regulator.
The time period for filing a SAR starts when the bank, during its review or because of other factors, knows or has reason to suspect that the activity or transactions under review meet one or more of the definitions of suspicious activity.
The SAR rules require that a SAR be electronically filed no later than 30 calendar days from the date of the initial detection of facts that may constitute a basis for filing a SAR. The phrase "initial detection" should not be interpreted as meaning the moment a transaction is highlighted for review. There are a variety of legitimate transactions that could raise a red flag simply because they are inconsistent with an accountholder’s normal account activity.
For example, a real estate investment (purchase or sale), the receipt of an inheritance, or a gift, may cause an account to have a significant credit or debit that would be inconsistent with typical account activity. The bank’s automated account monitoring system or initial discovery of information, such as system-generated reports, may flag the transaction; however, this should not be considered initial detection of potential suspicious activity. The 30-day period does not begin until an appropriate review is conducted and a determination is made that the transaction under review is "suspicious" within the meaning of the SAR regulation.
Whenever possible, an expeditious review of the transaction or the account is recommended and can be of significant assistance to law enforcement. In any event, the review should be completed in a reasonable period of time. What constitutes a "reasonable period of time" will vary according to the facts and circumstances of the particular matter being reviewed and the effectiveness of the SAR monitoring, reporting, and decision-making process of each bank.
The key factor is that a bank has established adequate procedures for reviewing and assessing facts and circumstances identified as potentially suspicious, and that those procedures are documented and followed.
For situations requiring immediate attention, in addition to filing a timely SAR, a bank must immediately notify, by telephone, an "appropriate law enforcement authority" and, as necessary, the bank’s primary regulator.
Banks are required to file SARs that are complete, thorough, and timely. Banks should include all known subject information on the SAR. The importance of the accuracy of this information cannot be overstated. Inaccurate information on the SAR, or an incomplete or disorganized narrative, may make further analysis difficult, if not impossible. However, there may be legitimate reasons why certain information may not be provided in a SAR, such as when the filer does not have the information. A thorough and complete narrative may make the difference in determining whether the described conduct and its possible criminal nature are clearly understood by law enforcement. Because the SAR narrative section is the only area summarizing suspicious activity, the section, as stated on the SAR, is "critical." Thus, a failure to adequately describe the factors making a transaction or activity suspicious undermines the purpose of the SAR.
By their nature, SAR narratives are subjective, and examiners generally should not criticize the bank's interpretation of the facts. Nevertheless, banks should ensure that SAR narratives are complete, thoroughly describe the extent and nature of the suspicious activity, and are included within the SAR.
Banks are required by the SAR regulations to notify the board of directors or an appropriate board committee that SARs have been filed. However, the regulations do not mandate a particular notification format and banks should have flexibility in structuring their format. Therefore, banks may, but are not required to, provide actual copies of SARs to the board of directors or a board committee. Alternatively, banks may opt to provide summaries, tables of SARs filed for specific violation types, or other forms of notification. Regardless of the notification format used by the bank, management should provide sufficient information on its SAR filings to the board of directors or an appropriate committee in order to fulfill its fiduciary duties, while being mindful of the confidential nature of the SAR.
Banks must retain copies of SARs and supporting documentation for five years from the date of filing the SAR. The bank can retain copies in paper or electronic format. Additionally, banks must provide all documentation supporting the filing of a SAR upon request by regulators or an appropriate law enforcement or federal banking agency. "Supporting documentation" refers to all documents or records that assisted a bank in making the determination that certain activity required a SAR filing.
Further, No bank, and no director, officer, employee, or agent of a bank that reports a suspicious transaction may notify any person involved in the transaction that the transaction has been reported. A SAR and any information that would reveal the existences of SAR are confidential.
As an AML officer, one should know that the failure to adequately describe the factors, making the transaction or activity suspicious, undermines the very purpose of the SAR and lessens its usefulness to law enforcement. Also, absence of supplementary information, and or inaccuracies in SARs have an impact upon law enforcement’s ability to determine whether,
1. A crime was committed or,
2. Continues to be committed.
The information generated from SAR filings plays an important role in identifying potential illegal activities such as money laundering and terrorist financing, and assists law enforcement in detecting and preventing the flow of illicit funds through our financial system. It is critical that the information provided in a SAR filing be as accurate and complete as possible. A Suspicious activity report usually have the below sections and may vary from country to country.
Part 1. Information of the suspect or subject.
Contains, Name, address, social security or tax ID's, birth date, drivers license numbers, passport numbers, occupation and phone numbers of all parties involved with the activity.
Part 2. Suspicious Activity Information.
Contains, Date Range and codes for the type of Suspicious Activity.
Part 3. Information about Financial Institution.
Information about Financial Institution where activity occurred.
Part 4. Filing Institution Contact Information.
Contains the contact information for the financial institution's compliance officer or equivalent and list of any law enforcement agency that has been contacted while investigating the activity.
Part 5. Suspicious Activity Information.
A Full description of written description of the activity.
A financial institution when has a reasonable ground to suspect that the transaction or attempted transaction is related to the commission of a money laundering offence or a terrorist activity financing offence, has to submit an SAR. Let us learn some of the examples of reasonable ground as given below.
The audit trial of transactions indicating possible money laundering or terrorist financing. Example, Structuring or cuckoo smurfing or consistent transactions to a country which is vulnerable to Money Laundering or terrorist financing.
Dealings in any property or proceeds of any property which is intended to be concealed or converted.
An entity, consistently doing transactions above the threshold levels set by financial institution in the transaction monitoring systems.
Non-Profit organizations, Foundations, or charitable institutions or any such entities, receiving sudden flush of money especially from countries which are high risk countries.
High, Low volume transactions or, high value transactions or high volumes transactions without a proper business reason.
Transactions moving in or out of an account done with third parties, which are not related to the businesses in any manner.
Consistent re-baseline occurring in expected versus actual activity reporting.
Children accounts having high value transactions.
Continuous buy and sell of similar securities indicating wash trading.
Consistent volumes of transaction in Cash intensive related businesses. This is not possible as there are always fluctuations in cash intensive businesses.
Sudden Transactions happening in Dormant or inactive accounts.
Transactions going to law firms or accounting firms at offshore countries, known for secrecy or are tax heavens.
The SAR narrative should identify the five essential elements of information which are who? what? when? where? and why? of the suspicious activity being reported. And should must include how? i.e., flow of funds.
A. Who:
The who part of SAR form should have specific suspect information in the narrative which are as given below.
1. If individual the narrative should have information on, occupation, position or title within the business, and if entity, the nature of the suspect’s businesses.
2. If more than one individual or businesses are involved in the suspicious activity, identify all suspects and any known relationships amongst them should be narrated in the SAR.
3. Addresses for suspects including, street addresses, other known addresses, any post office box numbers or apartment numbers where applicable.
4. Any identification numbers associated with the suspects, such as passport number, social security number, voter’s ID, or driver’s license numbers etcetera for individuals and, Tax identification numbers, registration numbers for entities.
B. What:
The what of a SAR should have the following.
1. The list of instruments used by the individual or entity, such as, wire transfers, ACH, letters of credit or such trade instruments, correspondent accounts, insurance policies, travellers checks, bank drafts, money orders, credit or debit cards, stored value cards etcetera.
2. The list of mechanisms that may be used in suspicious activity including structuring, cuckoo smurfing, use of shell companies’ etcetera.
C. When:
The when of a SAR should have the following:
1. Did the activity take place over a period of time or was a one-time transaction?
2. Indicate the date when the suspicious activity was first noticed and describe the duration of the activity.
3. A tabular presentation of the suspicious account activities, in and out of an account is always beneficial. The tabular presentation should have trial of funds, like, individual dates and amounts of transactions.
4. A graphical presentation where red flags are indicated.
D. Where:
The where of a SAR should have the following:
1. The list of financial institutions or list of beneficial owners’ account numbers in case of outward remittances made.
2. The list of originators in case of inward remittances made.
3. Standing instructions description if any.
4. A narrative of types of products and services where transactions were found suspicious. Going ahead, let’s learn the “why” of SAR.
E. Why:
Why of the activity or transaction being unusual for the customer should be clearly mentioned. Let us learn a few such activities.
1. Transactions done above threshold levels.
2. Pattern of transactions is suspicious. A graphical representation of Red Flags is beneficial.
3. Low value high frequency of transactions.
4. Possible structuring or smurfing.
5. A brief of expected activities and where there was a deviation from expected activities.
6. Bulk cash and monetary instrument transactions if used.
7. Unusual mixed deposits of money orders, third party checks, cash etc., into a business account.
8. Transactions seemingly designed to, or attempting to avoid reporting and record keeping requirements.
F. How:
In addition to the above narrative, the narrative of a SAR should mention the how part which are as given below.
1. Negotiation methods of funds such as the Internet, phone, mail, night deposit box, remote logins, couriers, or other information.
2. In summarizing the flow of funds, always include the source of the funds or the (origination) and recipient of the funds or the details of the as beneficiaries.
3. In documenting the movement of funds, identify all account numbers at the financial institution affected by the suspicious activity.
4. When possible, provide any account numbers held at other institutions and the names or locations of the other financial institutions, including MSBs and foreign institutions involved in the reported activity.
A federal, state, local, or foreign law enforcement agency investigating terrorist activity or money laundering may request local enforcement agency for certain information from a financial institution or a group of financial institutions. The foreign law enforcement agency or local investigating agency must provide a written certification to local enforcement agency attesting that there is credible evidence of engagement or reasonably suspected engagement in terrorist activity or money laundering for each individual, entity, or organization about which the foreign law enforcement agency or local investigating agency is seeking information. The foreign law enforcement agency or local investigating agency also must provide specific identifiers, such as a date of birth and address, which would permit a financial institution to differentiate among common or similar names. Upon receiving a completed written certification from a foreign law enforcement agency or local investigating agency, local enforcement agency may require a financial institution to search its records to determine whether it maintains or has maintained accounts for, or has engaged in transactions with, any specified individual, entity, or organization.
A federal, state, local, or foreign law enforcement agency investigating terrorist activity or money laundering may request local enforcement agency for certain information from a financial institution or a group of financial institutions. The foreign law enforcement agency or local investigating agency must provide a written certification to local enforcement agency attesting that there is credible evidence of engagement or reasonably suspected engagement in terrorist activity or money laundering for each individual, entity, or organization about which the foreign law enforcement agency or local investigating agency is seeking information. The foreign law enforcement agency or local investigating agency also must provide specific identifiers, such as a date of birth and address, which would permit a financial institution to differentiate among common or similar names. Upon receiving a completed written certification from a foreign law enforcement agency or local investigating agency, local enforcement agency may require a financial institution to search its records to determine whether it maintains or has maintained accounts for, or has engaged in transactions with, any specified individual, entity, or organization.
Financial institutions should develop and implement comprehensive policies, procedures, and processes for responding to requests from Enforcement agencies. A financial institution may only use the information to report the required information to Enforcement agency, to determine whether to establish or maintain an account or engage in a transaction, or to assist in AML compliance. While the subject list could be used to determine whether to establish or maintain an account, Enforcement agency strongly discourages financial institutions from using this as the sole factor in reaching a decision to do so unless the request specifically states otherwise. Unlike the OFAC lists, subject lists are not permanent "watch lists." In fact, subject lists generally relate to one-time inquiries and are not updated or corrected if an investigation is dropped, a prosecution is declined, or a subject is exonerated. Further, the names do not correspond to convicted or indicted persons; rather a subject need only be "reasonably suspected" based on credible evidence of engaging in terrorist acts or money laundering. Moreover, Enforcement agency advises that inclusion on a subject list should not be the sole factor used to determine whether to file a SAR. Financial institutions should establish a process for determining when and if a SAR should be filed.
A financial institution cannot disclose to any person, other than to Enforcement agency, the institution’s primary banking regulator, or the foreign law enforcement agency on whose behalf Enforcement agency is requesting information, the fact that Enforcement agency has requested or obtained information. A financial institution should designate one or more points of contact for receiving information requests.
Each financial institution must maintain adequate procedures to protect the security and confidentiality of requests from Enforcement agency. Financial institutions may keep a log of all requests received and of any positive matches identified and reported to Enforcement agency.
Additionally, documentation that all required searches were performed is essential. Banks may print or store a search self-verification document from the Web-based SISS for each subject list transmission. Additionally, a Subject Response List can be printed for documentation purposes. The Subject Response List displays the total number of positive responses submitted to Enforcement agency for that transmission, the transmission date, the submitted date, and the tracking number and subject name that had the positive hit. If the financial institution elects to maintain copies of the requests, it should not be criticized for doing so, as long as it appropriately secures them and protects their confidentiality. Audits should include an evaluation of compliance with these guidelines within their scope.
Law enforcement agencies also encourage financial institutions and associations of financial institutions to share information in order to identify and report activities that may involve terrorist activity or money laundering. The financial institution should designate a point of contact for receiving and providing information. A financial institution should establish a process for sending and receiving information sharing requests. Additionally, a financial institution must take reasonable steps to verify that the other financial institution or association of financial institutions with which it intends to share information has also submitted the required notice to Enforcement agency. Enforcement agency provides participating financial institutions with access to a list of other participating financial institutions and their related contact information.
Tax related regulations are important as its absence can result in huge losses for federal and states. Losses because people will tend to evade taxes or default it and try to save more as they have no risk of any action from the government. Legal persons are obliged to pay for the development of a country (unless the country is self-sufficient and has enough sources to service the public). Tax related crimes have been a topic of the decade as there are offshore centres, offshore trusts, private investment companies where individuals try to hide their funds. Not only that there are tax havens who in order to encourage investments ultimately help individuals to evade taxes by teaching them the how of it.
Let us check on some of the important tax laws that a banker must know.
I. Introduction:
FATCA is “The Foreign Account Tax Compliance Act”.
Going in history, the Hiring Incentives to Restore Employment Act or (HIRE) was a tax expenditure designed to encourage U.S. small businesses to hire new employees. HIRE included two tax expenditures of note: a payroll tax exemption to employers and a one-thousand-dollar tax credit for employers hiring employees between February of 2010 and January of 2011. FATCA was included in HIRE because the tax revenue collected from FATCA was supposed to offset the tax expenditures authorized by HIRE. The tax revenue FATCA was said to be targeting was from U.S. persons with foreign bank accounts who were evading tax.
(FATCA) is an important development in U.S. efforts to combat tax evasion by U.S. persons holding accounts and other financial assets offshore. FATCA will also require certain foreign financial institutions to report directly to the IRS, information about financial accounts held by U.S. taxpayers or by foreign entities in which U.S. taxpayers hold a substantial ownership interest. The reporting institutions will include not only banks, but also other financial institutions, such as investment entities, brokers, and certain insurance companies. Some non-financial foreign entities or NFFE will also have to report certain of their U.S. owners. A Passive NFFE must provide a list of its substantial US owners on the Form W-8BEN-E or on a withholding statement provided with a Form W-8IMY.
A substantial US owner generally refers to a US owner that has a 10% or greater interest in an NFFE. However, where the entity is an investment vehicle (e.g., a hedge fund), any US owner is considered a substantial US owner.
II. Requirements of FATCA:
Under FATCA, certain U.S. taxpayers holding financial assets outside the United States must report those assets to the IRS generally using Form 8938 also called, Statement of Specified Foreign Financial Assets. Form 8938 must be used to report the individuals specified foreign financial assets if the total value of all the specified foreign financial assets in which the individual have an interest is more than the reporting threshold. The aggregate value of these assets must exceed $50,000 to be reportable. The Form 8938 must be attached to the taxpayer’s annual tax return. Certain domestic corporations, partnerships, and trusts that are considered formed or availed of for the purpose of holding, directly or indirectly, specified foreign financial assets must also file Form 8938 if the total value of those assets exceeds $50,000 on the last day of the tax year or $75,000 at any time during the tax year.
Definition of a specified Individual and Corporation is as given below.
1. A specified individual who is:
A U.S. citizen or
A resident alien of the United States for any part of the tax year or
A non-resident alien who makes an election to be treated as resident alien for purposes of filing a joint income tax return or,
A non-resident alien who is a bona fide resident of American Samoa or Puerto Rico. 2. A specified domestic entity which is:
A domestic corporation that is closely held by a specified individual and where at least 50 percent of the corporation’s gross income is passive or at least 50 percent of its assets produce or are held for the production of passive income or
A domestic partnership that is closely held by a specified individual and where at least 50 percent of the partnership’s gross income is passive or at least 50 percent of its assets produce or are held for the production of passive income or
A domestic trust described that has one or more specified persons as a current beneficiary.
Going ahead, FATCA also requires foreign financial institutions or (FFIs) to report to the IRS information about financial accounts held by U.S. taxpayers, or by foreign entities in which U.S. taxpayers hold a substantial ownership interest. (FFIs) are required to search their records for customers with indicia of a connection to the U.S., including indications in records of birth or prior residency in the U.S., or the like, and to report the assets and identities of such persons to the U.S. Department of the Treasury. A U.S. Indicia means,
A U.S. place of birth or,
A current U.S. residence or mailing address (including a U.S. PO Box) or,
A current U.S. telephone number or,
Standing instructions to pay amounts from a foreign (meaning non-U.S.) account to an account maintained in the United States or,
A current power of attorney or signatory authority granted to a person with a U.S. address or A U.S. “in-care-of” or “hold mail” address that is the sole address with respect to the account holder or,
FFIs should collect curative documentation for all non-US owners with US indicia or,
FFIs are encouraged to either directly register with the IRS to comply with the FATCA regulations or comply with the FATCA Intergovernmental Agreements treated as in effect in their jurisdictions.
III. Intergovernmental agreements or IGA’s:
There are two types of Intergovernmental agreements.
1. Model 1, The Intergovernmental agreement 1 or IGA 1:
Under IGA Model 1, financial institutions in the partner country (Foreign Financial institutions for U.S.) report information about U.S. accounts to the tax authority of the partner country. That tax authority then provides the information to the United States. Model 1 comes in a reciprocal version (Model 1A), under which the United States will also share information about the partner country's taxpayers with the partner country, and a nonreciprocal version (Model 1B).
2. Model 2, The Intergovernmental agreement 2 or IGA 2:
Foreign Financial institutions in Model 2 jurisdictions are required to report directly to the United States Internal Revenue Service.
The FATCA Registration System is a secure, web-based system that Financial Institutions can use to register under FATCA. It establishes an online account for Financial Institutions to register with the IRS, renew their agreement, and complete and submit FATCA certifications. The Financial Institution and their branches are issued Global Intermediary Identification Numbers or (GIINs). A registered and compliant Financial Institution that has been issued a global intermediary identification number will appear on a monthly published IRS FFI list. A Foreign Financial Institution that does not both register and agree to report will face a 30% withholding tax on certain U.S. source payments made to them.
30% withholding under FATCA can apply to.
A Non-participating FFI.
A Non-financial foreign entity or NFFE that fails to identify its “substantial US owners, unless an exception applies.
Note: Exceptions are provided for NFFE’s deemed to represent a low risk of US tax evasion (e.g., publicly traded companies or affiliates of publicly traded companies, foreign governments, and active trades or businesses). You may note that even Participating Foreign Financial Institutions that enter into an agreement with the IRS to report on their account holders may be required to withhold 30% on certain payments to foreign payees if such payees do not comply with FATCA or they are a “Recalcitrant” account holder. Recalcitrant means an account holder of a foreign financial institution who,
Fails to comply with reasonable requests for information necessary to determine if the account is a United States account or,
Fails to provide the name, address, and TIN of each “specified United States person”.
IV. Which tax forms for FATCA classification?
Tax forms will be required to be submitted to the bank for FATCA classifications.
1. US Entities: US entities should complete a Form W-9.
2. If the entity is Non-US Entity and is a Beneficial owner, has to submit the following:
W8-EXP to be submitted by an entity which is a non-US government or international organization or non-US central bank of issue or Non-US tax-exempt organization or foreign private foundation.
W8-Ben-E to be submitted by an entity which is non-US entity.
W8-ECI by a Non-US person claiming that income is effectively connected with the conduct of a trade or business in the United States.
3. W8-IMY by Non-US intermediaries and flow-through entities that are Non-US entities and certain US branches.
V. Important Chapters of FATCA:
a. Chapter 3:
Chapter 3 of the Internal Revenue Code (Sections 1441 - 1446) generally requires withholding at a rate of 30% on US-source fixed or determinable, annual or periodic income paid to non-resident aliens. Chapter 3 determination requires an entity to classify as one of categories depending on whether the entity is completing a Form W-8BEN E or a Form W-8IMY. Some of the categories of W-8IMY are Qualified Intermediary, Non-Qualified Intermediary, Territory Financial Institution etc. Some of the categories of W-8BEN-E are Corporation, Partnership, Complex Trust, Grantor Trust etc.
b. Chapter 4:
Chapter 4 means chapter 4 of the Internal Revenue Code or (Taxes to Enforce Reporting on Certain Foreign Accounts). Chapter 4 contains sections 1471 through 1474. The term chapter 4 status means a person’s status as a U.S. person, specified U.S. person, foreign individual, participating FFI, deemed-compliant FFI, restricted distributor, exempt beneficial owner, non-participating FFI, territory financial institution, excepted NFFE, or passive NFFE.
I. Introduction to CRS:
Tax evasion entails taxpayers (such as individuals, and individuals who control entities such as corporations or trusts), deliberately misrepresenting the true state of their affairs to the tax authorities to reduce their tax liability. For doing this usually, such persons open accounts in foreign jurisdictions or do not report their holdings in foreign jurisdictions. The G20 countries were apprehensive of these huge amounts of tax evasions and hence, requested the organization for economic cooperation and development or OECD to develop standards for the automatic exchange of information of financial accounts on a global level between tax authorities to combat tax evasion. Hence, in 2014, the OECD came up with "The common reporting standard or CRS. The tax authorities of Jurisdictions who exchange such information are called the Competent Authorities.
The standard developed by OECD consists of the following 4 key parts:
A model Competent Authority Agreement (CAA), providing the international legal framework for the automatic exchange of CRS information;
The common reporting standard;
The commentaries on the CAA and the CRS; And,
The CRS XML Schema User Guide.
The aim of building such a model was to enable jurisdictions to exchange reportable accounts with each other on annual basis. A reportable account is any account maintained by a legal person of Jurisdiction A at Jurisdiction B, and both the jurisdictions are under CAA. Then, Jurisdiction B's financial institution will report to its tax authority the availability of such account of legal person from jurisdiction A. The tax authority or the competent authority of Jurisdiction B then will inform Jurisdiction A’s competent authority of availability of such account. The legal person of jurisdiction A who holds account with the financial institution in jurisdiction B is called reportable person. Further, the Jurisdiction B's financial institution will collect the following information of a reportable account.
a) the name, address, TINs and date and place of birth (in the case of an individual) of each Reportable Person that is an Account Holder of the account and, in the case of any Entity that is an Account Holder and that, after application of due diligence procedures consistent with the Common Reporting Standard, is identified as having one or more Controlling Persons that is a Reportable Person, the name, address, and TINs of the Entity and the name, address, TINs and date and place of birth of each Reportable Person;
b) The account number (or functional equivalent in the absence of an account number);
c) The name and identifying number (if any) of the Reporting Financial Institution;
d) The account balance or value (including, in the case of a Cash Value Insurance Contract or Annuity Contract, the Cash Value or surrender value) as of the end of the relevant calendar year or other appropriate reporting period or, if the account was closed during such year or period, the closure of the account;
e) In the case of any Custodial Account:
(1) the total gross amount of interest, the total gross amount of dividends, and the total gross amount of other income generated with respect to the assets held in the account, in each case paid or credited to the account (or with respect to the account) during the calendar year or other appropriate reporting period; and
(2) the total gross proceeds from the sale or redemption of Financial Assets paid or credited to the account during the calendar year or other appropriate reporting period with respect to which the Reporting Financial Institution acted as a custodian, broker, nominee, or otherwise as an agent for the Account Holder;
f) in the case of any Depository Account, the total gross amount of interest paid or credited to the account during the calendar year or other appropriate reporting period; and
g) in the case of any account not described in subparagraph 2(e) or (f), the total gross amount paid or credited to the Account Holder with respect to the account during the calendar year or other appropriate reporting period with respect to which the Reporting Financial Institution is the obligor or debtor, including the aggregate amount of any redemption payments made to the Account Holder during the calendar year or other appropriate reporting period.
For each section of the CRS and the Model Competent Authority Agreements, a detailed Commentary has been developed by the OECD that is intended to illustrate or interpret its provisions and that aims to ensure consistency in application across jurisdictions, as to avoid creating unnecessary costs and complexity for financial institutions, in particular those with operations in more than one jurisdiction.
Further, the CRS XML Schema is designed to be used for the automatic exchange of financial account information between Competent Authorities.
Who is a reportable person?
A reportable person means a reportable jurisdiction person other than the following.
(i) a corporation the stock of which is regularly traded on one or more established securities markets;
(ii) any corporation that is a Related entity of a corporation described in clause (i);
(iii) a government entity;
(iv) an International Organization;
(v) a Central bank; or,
(vi) a Financial Institution.
* Note, Under the CRS Entities are related where either they control the other or the two entities are under common control. Common control includes direct or indirect ownership of more than 50% of the voting rights and value of the entity. Further, controlling persons of passive Non-Financial Entity or NFE is also reportable person with 1 or more controlling persons.
By definition, a passive NFE, generally refers to entities with no trading activities and receive income or dividend generated from its assets including properties or shares.
The CRS requires financial institutions to identify the tax residency of all customers and in most cases report information on customers who are tax residents outside of the country where they hold their accounts. Here, the term tax resident means that a person is resident in a country or a tax resident for tax purposes in accordance with the local law. The criteria of tax residency may be different from one country to another. For individuals tax residents in the country can be based on the number of factors such as nationality, number of days one has spent in that country. However, some individuals can be tax resident in more than one country under CRS. Hence, financial institutions are required to collect a self-certification form from its account holders. Self-certification is the process whereby a Financial Institution asks their Account Holders to certify a number of details about themselves in order to determine the country or countries in which they are tax resident. Lastly, the self-certification form will remain valid unless there is a change in circumstances which affects clients tax residence status or where any information provided in the form becomes incorrect.
A red flag is used as an indicator for a suspicion of money laundering or terrorist financing by the screening and transaction monitoring executives in a bank. Though, not all red flags result in suspicious transaction reporting. The screening red flags indicate that any customer or associated party of a customer is either a PEP or have Negative news or have sanctions relation and are true matches. Such red flags are investigated to further the risk rating of a profile if required. And also, these red flags are mentioned in the AML risk summary of that customer profile. In the bank branch services too, the front office for account opening forms or sending customer instructions to back office can put their comments and observations of a possible red flag indicating money laundering.
Client does not want correspondence sent to home address.
Client appears to have accounts with several financial institutions in one area for no apparent reason.
Client conducts transactions at different physical locations in an apparent attempt to avoid detection.
Client repeatedly uses an address but frequently changes the names involved.
Client is accompanied and watched.
Client shows uncommon curiosity about internal systems, controls and policies.
Client has only vague knowledge of the amount of a deposit.
Client presents confusing details about the transaction or knows few details about its purpose.
Client appears to informally record large volume transactions, using unconventional bookkeeping methods or “off-the-record” books.
Client over justifies or explains the transaction.
Client is secretive and reluctant to meet in person.
Client is nervous, not in keeping with the transaction.
Client is involved in transactions that are suspicious but seems blind to being involved in money laundering activities.
Client's home or business telephone number has been disconnected or there is no such number when an attempt is made to contact client shortly after opening account.
Client appears to be acting on behalf of a third party, but does not tell you.
Client is involved in activity out-of-keeping for that individual or business.
Client insists that a transaction be done quickly.
Inconsistencies appear in the client's presentation of the transaction.
The transaction does not appear to make sense or is out of keeping with usual or expected activity for the client.
Client appears to have recently established a series of new relationships with different financial entities.
Client attempts to develop close rapport with staff.
Client uses aliases and a variety of similar but different addresses.
Client spells his or her name differently from one transaction to another.
Client uses a post office box or General Delivery address, or other type of mail drop address, instead of a street address when this is not the norm for that area.
Client provides false information or information that you believe is unreliable.
Client offers you money, gratuities or unusual favours for the provision of services that may appear unusual or suspicious.
Client pays for services or products using financial instruments, such as money orders or traveller's cheques, without relevant entries on the face of the instrument or with unusual symbols, stamps or notes.
Bank Officer is aware or become aware, from a reliable source (that can include media or other open sources), that a client is suspected of being involved in illegal activity.
A new or prospective client is known to bank officer as having a questionable legal reputation or criminal background.
Transaction involves a suspected shell entity (that is, a corporation that has no assets, operations or other reason to exist).
Client attempts to convince employee not to complete any documentation required for the transaction.
Client makes inquiries that would indicate a desire to avoid reporting.
Client has unusual knowledge of the law in relation to suspicious transaction reporting.
Client seems very conversant with money laundering or terrorist activity financing issues.
Client is quick to volunteer those funds are “clean” or “not being laundered.”
Client appears to be structuring amounts to avoid record keeping, client identification or reporting thresholds.
Client appears to be collaborating with others to avoid record keeping, client identification or reporting thresholds.
Client performs two or more cash transactions of less than threshold levels each just outside of 24 hours apart, seemingly to avoid the 24-hour rule.
Client provides doubtful or vague information.
Client produces seemingly false identification or identification that appears to be counterfeited, altered or inaccurate.
Client refuses to produce personal identification documents.
Client only submits copies of personal identification documents.
Client wants to establish identity using something other than his or her personal identification documents.
Client's supporting documentation lacks important details such as a phone number.
Client inordinately delays presenting corporate documents.
All identification presented is foreign or cannot be checked for some reason.
All identification documents presented appear new or have recent issue dates.
Client presents different identification documents at different times.
Client alters the transaction after being asked for identity documents.
Client presents different identification documents each time a transaction is conducted.
Client starts conducting frequent cash transactions in large amounts when this has not been a normal activity for the client in the past.
Client frequently exchanges small bills for large ones.
Client uses notes in denominations that are unusual for the client, when the norm in that business is different.
Client presents notes that are packed or wrapped in a way that is uncommon for the client.
Client deposits musty or extremely dirty bills.
Client makes cash transactions of consistently rounded-off large amounts (e.g., 9,900, 8,500, etc.).
Client consistently makes cash transactions that are just under the reporting threshold amount in an apparent attempt to avoid the reporting threshold.
Client consistently makes cash transactions that are significantly below the reporting threshold amount in an apparent attempt to avoid triggering the identification and reporting requirements.
Client presents uncounted funds for a transaction. Upon counting, the client reduces the transaction to an amount just below that which could trigger reporting requirements.
Client conducts a transaction for an amount that is unusual compared to amounts of past transactions.
Client frequently purchases traveller's cheques, foreign currency drafts or other negotiable instruments with cash when this appears to be outside of normal activity for the client.
Client asks you to hold or transmit large sums of money or other assets when this type of activity is unusual for the client.
Shared address for individuals involved in cash transactions, particularly when the address is also for a business location, or does not seem to correspond to the stated occupation (i.e., student, unemployed, self-employed, etc.)
Stated occupation of the client is not in keeping with the level or type of activity (for example a student or an unemployed individual makes daily maximum cash withdrawals at multiple locations over a wide geographic area).
Large transactions using a variety of denominations.
Transaction seems to be inconsistent with the client's apparent financial standing or usual pattern of activities.
Transaction appears to be out of the normal course for industry practice or does not appear to be economically viable for the client.
Transaction is unnecessarily complex for its stated purpose.
Activity is inconsistent with what would be expected from declared business.
A business client refuses to provide information to qualify for a business discount.
No business explanation for size of transactions or cash volumes.
Transactions of financial connections between businesses that are not usually connected (for example, a food importer dealing with an automobile parts exporter).
Transaction involves non-profit or charitable organization for which there appears to be no logical economic purpose or where there appears to be no link between the stated activity of the organization and the other parties in the transaction.
Client and other parties to the transaction have no apparent ties to own jurisdictions.
Transaction crosses many international lines.
Transactions involving high-volume international transfers to third party accounts in countries that are not usual remittance corridors.
Transaction involves a country known for highly secretive banking and corporate law.
Transactions involving any countries deemed by the Financial Action Task Force as requiring enhanced surveillance.
Foreign currency exchanges that are associated with subsequent wire transfers to locations of concern, such as countries known or suspected to facilitate money laundering activities.
Deposits followed within a short time by wire transfer of funds to or through locations of concern, such as countries known or suspected to facilitate money laundering activities.
Transaction involves a country where illicit drug production or exporting may be prevalent, or where there is no effective anti-money-laundering system.
Transaction involves a country known or suspected to facilitate money laundering activities.
Accumulation of large balances, inconsistent with the known turnover of the client's business, and subsequent transfers to overseas account(s).
Frequent requests for traveller's cheques, foreign currency drafts or other negotiable instruments.
Loans secured by obligations from offshore banks.
Loans to or from offshore companies.
Offers of multimillion-dollar deposits from a confidential source to be sent from an offshore bank or somehow guaranteed by an offshore bank.
Transactions involving an offshore “shell” bank whose name may be very similar to the name of a major legitimate institution.
Unexplained electronic funds transfer by client on an in-and-out basis.
Use of letter-of-credit and other method of trade financing to move money between countries when such trade is inconsistent with the client's business.
Use of a credit card issued by an offshore bank.
Client appears to have accounts with several financial institutions in one geographical area.
Client has no employment history but makes frequent large transactions or maintains a large account balance.
The flow of income through the account does not match what was expected based on stated occupation of the account holder or intended use of the account.
Client makes one or more cash deposits to general account of foreign correspondent bank (i.e., pass-through account).
Client makes frequent or large payments to online payment services.
Client runs large positive credit card balances.
Client uses cash advances from a credit card account to purchase money orders or drafts or to wire funds to foreign destinations.
Client takes cash advance to deposit into savings or chequing account.
Large cash payments for outstanding credit card balances.
Client makes credit card overpayment and then requests a cash advance.
Client visits the safety deposit box area immediately before making cash deposits.
Client wishes to have credit and debit cards sent to international or domestic destinations other than his or her address.
Client has numerous accounts and deposits cash into each of them with the total credits being a large amount.
Client deposits large endorsed cheques in the name of a third-party.
Client frequently makes deposits to the account of another individual who is not an employer or family member.
Client frequently exchanges currencies.
Client frequently makes automatic banking machine deposits just below the reporting threshold.
Client's access to the safety deposit facilities increases substantially or is unusual in light of their past usage.
Many unrelated individuals make payments to one account without rational explanation.
Third parties make cash payments or deposit cheques to a client's credit card.
Client gives power of attorney to a non-relative to conduct large transactions.
Client has frequent deposits identified as proceeds of asset sales but assets cannot be substantiated.
Client acquires significant assets and liquidates them quickly with no explanation.
Client acquires significant assets and encumbers them with security interests that do not make economic sense.
Client requests movement of funds that are uneconomical.
Client makes unusually large hydro bill payments.
High volume of wire transfers are made or received through the account.
Accounts are used to receive or disburse large sums but show virtually no normal business-related activities, such as the payment of payrolls, invoices, etc.
Accounts have a large volume of deposits in bank drafts, cashier's cheques, money orders or electronic funds transfers, which is inconsistent with the client's business.
Accounts have deposits in combinations of monetary instruments that are atypical of legitimate business activity (for example, deposits that include a mix of business, payroll, and social security cheques).
Accounts have deposits in combinations of cash and monetary instruments not normally associated with business activity.
Business does not want to provide complete information regarding its activities.
Financial statements of the business differ noticeably from those of similar businesses.
Representatives of the business avoid contact with the branch as much as possible, even when it would be more convenient for them.
Deposits to or withdrawals from a corporate account are primarily in cash rather than in the form of debit and credit normally associated with commercial operations.
Client maintains a number of trustee or client accounts that are not consistent with that type of business or not in keeping with normal industry practices.
Client operates a retail business providing cheque-cashing services but does not make large draws of cash against cheques deposited.
Client pays in cash or deposits cash to cover bank drafts, money transfers or other negotiable and marketable money instruments.
Client purchases cashier's cheques and money orders with large amounts of cash.
Client deposits large amounts of currency wrapped in currency straps.
Client makes a large volume of seemingly unrelated deposits to several accounts and frequently transfers a major portion of the balances to a single account at the same bank or elsewhere.
Client makes a large volume of cash deposits from a business that is not normally cash-intensive.
Client makes large cash withdrawals from a business account not normally associated with cash transactions.
Client consistently makes immediate large withdrawals from an account that has just received a large and unexpected credit from abroad.
Client makes a single and substantial cash deposit composed of many large bills.
Small, one-location business makes deposits on the same day at different branches across a broad geographic area that does not appear practical for the business.
There is a substantial increase in deposits of cash or negotiable instruments by a company offering professional advisory services, especially if the deposits are promptly transferred.
There is a sudden change in cash transactions or patterns.
Client wishes to have credit and debit cards sent to international or domestic destinations other than his or her place of business.
There is a marked increase in transaction volume on an account with significant changes in an account balance that is inconsistent with or not in keeping with normal business practices of the client's account.
Asset acquisition is accompanied by security arrangements that are not consistent with normal practice.
Unexplained transactions are repeated between personal and commercial accounts.
Activity is inconsistent with stated business.
Account has close connections with other business accounts without any apparent reason for the connection.
Activity suggests that transactions may offend securities regulations or the business prospectus is not within the requirements.
A large number of incoming and outgoing wire transfers take place for which there appears to be no logical business or other economic purpose, particularly when this is through or from locations of concern, such as countries known or suspected to facilitate money laundering activities.
Inconsistencies between apparent modest sources of funds of the organization (e.g., communities with modest standard of living) and large amounts of funds raised.
Inconsistencies between the pattern or size of financial transactions and the stated purpose and activity of the organization.
Sudden increase in the frequency and amounts of financial transactions for the organization, or the inverse, that is, the organization seems to hold funds in its account for a very long period.
Large and unexplained cash transactions by the organization.
Absence of contributions from donors located in Own jurisdictions.
The organization's directors are outside Own jurisdictions, particularly if large outgoing transactions are made to the country of origin of the directors and especially if that country is a high-risk jurisdiction.
Large number of non-profit organizations with unexplained links.
The non-profit organization appears to have little or no staff, no suitable offices or no telephone number, which is incompatible with their stated purpose and financial flows.
The non-profit organization has operations in, or transactions to or from, high-risk jurisdictions.
Client is reluctant to give an explanation for the remittance.
Client orders wire transfers in small amounts in an apparent effort to avoid triggering identification or reporting requirements.
Client transfers large sums of money to overseas locations with instructions to the foreign entity for payment in cash.
Client receives large sums of money from an overseas location and the transfers include instructions for payment in cash.
Client makes frequent or large funds transfers for individuals or entities that have no account relationship with the institution.
Client receives frequent funds transfers from individuals or entities who have no account relationship with the institution.
Client receives funds transfers and immediately purchases monetary instruments prepared for payment to a third party which is inconsistent with or outside the normal course of business for the client.
Client requests payment in cash immediately upon receipt of a large funds transfer.
Client instructs you to transfer funds abroad and to expect an equal incoming transfer.
Immediately after transferred funds have cleared, the client moves the funds to another account or to another individual or entity.
Client shows unusual interest in funds transfer systems and questions the limit of what amount can be transferred.
Client transfers funds to another country without changing the currency.
Large incoming wire transfers from foreign jurisdictions are removed immediately by company principals.
Client sends frequent wire transfers to foreign countries, but does not seem to have connection to such countries.
Wire transfers are received from entities having no apparent business connection with client.
Size of funds transfers is inconsistent with normal business transactions for that client.
Rising volume of remittances exceeds what was expected from the client when the relationship was established.
Several clients request transfers either on the same day or over a period of two to three days to the same recipient.
Different clients request transfers that are all paid for by the same client.
Several clients requesting transfers share common identifiers, such as family name, address or telephone number.
Several different clients send transfers that are similar in amounts, sender names, test questions, free message text and destination country.
A client sends or receives multiple transfers to or from the same individual.
Stated occupation of the client or the client's financial standing is not in keeping with the level or type of activity (for example a student or an unemployed individual who receives or sends large numbers of wire transfers).
Migrant remittances made outside the usual remittance corridors.
Personal funds sent at a time not associated with salary payments.
Country of destination for a wire transfer is not consistent with the nationality of the individual client.
Client requests transfers to a large number of recipients outside Own jurisdictions who do not appear to be family members.
Client does not appear to know the recipient to whom he or she is sending the transfer.
Client does not appear to know the sender of the transfer from whom the transfer was received.
Beneficiaries of wire transfers involve a large group of nationals of countries associated with terrorist activity.
Client makes funds transfers to free trade zones that are not in line with the client's business.
Country of destination for a transfer is not a member of the Financial Action Task Force or an FATF Style Regional Body.
Client conducts transactions involving countries known as narcotic source countries or as trans-shipment points for narcotics or that is known for highly secretive banking and corporate law practices.
Client suddenly repays a problem loan unexpectedly.
Client makes a large, unexpected loan payment with unknown source of funds, or a source of funds that does not match what you know about the client.
Client repays a long-term loan, such as a mortgage, within a relatively short time period.
Source of down payment is inconsistent with borrower's background and income.
Down payment appears to be from an unrelated third party.
Down payment uses a series of money orders or bank drafts from different financial institutions.
Client shows income from “foreign sources” on loan application without providing further details.
Client's employment documentation lacks important details that would make it difficult for you to contact or locate the employer.
Client's documentation to ascertain identification, support income or verify employment is provided by an intermediary who has no apparent reason to be involved.
Client has loans with offshore institutions or companies that are outside the ordinary course of business of the client.
Client offers large deposits or some other form of incentive in return for favourable treatment of loan request.
Client asks to borrow against assets held by another financial institution or a third party, when the origin of the assets is not known.
The loan transaction does not make economic sense (for example, the client has significant assets, and there does not appear to be a sound business reason for the transaction).
Customer seems unconcerned with terms of credit or costs associated with completion of a loan transaction.
Client applies for loans on the strength of a financial statement reflecting major investments in or income from businesses incorporated in countries known for highly secretive banking and corporate law and the application is outside the ordinary course of business for the client.
Down payment or other loan payments are made by a party who is not a relative of the client.
Client wants to use cash for a large transaction.
Client proposes to purchase an insurance product using a cheque drawn on an account other than his or her personal account.
Client requests an insurance product that has no discernible purpose and is reluctant to divulge the reason for the investment.
Client who has other small policies or transactions based on a regular payment structure makes a sudden request to purchase a substantial policy with a lump sum payment.
Client conducts a transaction that results in a conspicuous increase in investment contributions.
Scale of investment in insurance products is inconsistent with the client's economic profile.
Unanticipated and inconsistent modification of client's contractual conditions, including significant or regular premium top-ups.
Unforeseen deposit of funds or abrupt withdrawal of funds.
Involvement of one or more third parties in paying the premiums or in any other matters involving the policy.
Overpayment of a policy premium with a subsequent request to refund the surplus to a third party.
Funds used to pay policy premiums or deposits originate from different sources.
Use of life insurance product in a way that resembles use of a bank account, namely making additional premium payments and frequent partial redemptions.
Client cancels investment or insurance soon after purchase.
Early redemption takes place in the absence of a reasonable explanation or in a significantly uneconomic manner.
Client shows more interest in the cancellation or surrender of an insurance contract than in the long-term results of investments or the costs associated with termination of the contract.
Client makes payments with small denomination notes, uncommonly wrapped, with postal money orders or with similar means of payment.
The duration of the life insurance contract is less than three years.
The first (or single) premium is paid from a bank account outside the country.
Client accepts very unfavourable conditions unrelated to his or her health or age.
Transaction involves use and payment of a performance bond resulting in a cross-border payment.
Repeated and unexplained changes in beneficiary.
Relationship between the policy holder and the beneficiary is not clearly established.
Accounts that have been inactive suddenly experience large investments that are inconsistent with the normal investment practice of the client or their financial ability.
Any dealing with a third party when the identity of the beneficiary or counter-party is undisclosed.
Client attempts to purchase investments with cash.
Client wishes to purchase a number of investments with money orders, traveller's cheques, cashier's cheques, bank drafts or other bank instruments, especially in amounts that are slightly less than reportable thresholds, where the transaction is inconsistent with the normal investment practice of the client or their financial ability.
Client uses securities or futures brokerage firm as a place to hold funds that are not being used in trading of securities or futures for an extended period of time and such activity is inconsistent with the normal investment practice of the client or their financial ability.
Client wishes monies received through the sale of shares to be deposited into a bank account rather than a trading or brokerage account which is inconsistent with the normal practice of the client.
Client frequently makes large investments in stocks, bonds, investment trusts or other securities in cash or by cheque within a short time period, inconsistent with the normal practice of the client.
Client makes large or unusual settlements of securities in cash.
The entry of matching buying and selling of particular securities or futures contracts (called match trading), creating the illusion of trading.
Transfers of funds or securities between accounts not known to be related to the client.
Several clients open accounts within a short period of time to trade the same stock.
Client is an institutional trader that trades large blocks of junior or penny stock on behalf of an unidentified party.
Unrelated clients redirect funds toward the same account.
Trades conducted by entities that you know have been named or sanctioned by regulators in the past for irregular or inappropriate trading activity.
Transaction of very large dollar size.
Client is willing to deposit or invest at rates that are not advantageous or competitive.
All principals of client are located outside of Own jurisdictions.
Client attempts to purchase investments with instruments in the name of a third party.
Payments made by way of third party cheques are payable to, or endorsed over to, the client.
Transactions made by your employees, or that you know are made by a relative of your employee, to benefit unknown parties.
Third-party purchases of shares in other names (i.e., nominee accounts).
Transactions in which clients make settlements with cheques drawn by or remittances from, third parties.
Unusually large amounts of securities or stock certificates in the names of individuals other than the client.
Client maintains bank accounts and custodian or brokerage accounts at offshore banking centres with no explanation by client as to the purpose for such relationships.
Proposed transactions are to be funded by international wire payments, particularly if from countries where there is no effective anti-money-laundering system.
Client requests a transaction at a foreign exchange rate that exceeds the posted rate.
Client wants to pay transaction fees that exceed the posted fees.
Client exchanges currency and requests the largest possible denomination bills in a foreign currency.
Client knows little about address and contact details for payee, is reluctant to disclose this information, or requests a bearer instrument.
Client wants a cheque issued in the same currency to replace the one being cashed.
Client wants cash converted to a cheque and you are not normally involved in issuing cheques.
Client wants to exchange cash for numerous postal money orders in small amounts for numerous other parties.
Client enters into transactions with counter parties in locations that are unusual for the client.
Client instructs that, funds are to be picked up by a third party on behalf of the payee.
Client makes large purchases of traveller's cheques not consistent with known travel plans.
Client makes purchases of money orders in large volumes.
Client requests numerous cheques in small amounts and various names, which total the amount of the exchange.
Client requests that a cheque or money order be made out to the bearer.
Client requests that a large amount of foreign currency be exchanged to another foreign currency.
Client appears to be living beyond his or her means.
Client has cheques inconsistent with sales (i.e., unusual payments from unlikely sources).
Client has a history of changing bookkeepers or accountants yearly.
Client is uncertain about location of company records.
Company carries non-existent or satisfied debt that is continually shown as current on financial statements.
Company has no employees, which is unusual for the type of business.
Company is paying unusual consultant fees to offshore companies.
Company records consistently reflect sales at less than cost, thus putting the company into a loss position, but the company continues without reasonable explanation of the continued loss.
Company shareholder loans are not consistent with business activity.
Examination of source documents shows misstatements of business activity that cannot be readily traced through the company books.
Company makes large payments to subsidiaries or similarly controlled companies that are not within the normal course of business.
Company acquires large personal and consumer assets (i.e., boats, luxury automobiles, personal residences and cottages) when this type of transaction is inconsistent with the ordinary business practice of the client or the practice of that particular industry.
Company is invoiced by organizations located in a country that does not have adequate money laundering laws and is known as a highly secretive banking and corporate tax haven.
Client purchases property in someone else's name such as an associate or a relative (other than a spouse).
Client does not want to put his or her name on any document that would connect him or her with the property or uses different names on Offers to Purchase, closing documents and deposit receipts.
Client inadequately explains the last minute substitution of the purchasing party's name.
Client negotiates a purchase for the market value or above the asked price, but requests that a lower value be recorded on documents, paying the difference “under the table”.
Client pays initial deposit with a cheque from a third party, other than a spouse or a parent.
Client pays substantial down payment in cash and balance is financed by an unusual source (for example a third party or private lender) or offshore bank.
Client purchases personal use property through his or her company when this type of transaction is inconsistent with the ordinary business practice of the client.
Client purchases multiple properties in a short time period, and seems to have few concerns about the location, condition, and anticipated repair costs, etc. of each property.
Client insists on providing signature on documents by fax only.
Client over justifies or over explains the purchase.
Client's home or business telephone number has been disconnected or there is no such number.
Client uses a post office box or General Delivery address where other options are available.
Client wants to build a luxury house in non-prime locations.
Client exhibits unusual concerns regarding the firm's compliance with government reporting requirements and the firm's anti-money laundering policies.
Client exhibits a lack of concern regarding risks, commissions, or other transaction costs.
Client persists in representing his financial situation in a way that is unrealistic or that could not be supported by documents.
Transactions carried out on behalf of minors, incapacitated persons or other persons who, although not included in these categories, appear to lack the economic capacity to make such purchases.
A transaction involving legal entities, when there does not seem to be any relationship between the transaction and the activity carried out by the buying company, or when the company has no business activity.
Transactions in which the parties show a strong interest in completing the transaction quickly, without there being good cause.
Transactions in which the parties are foreign or non-resident for tax purposes and their only purpose is a capital investment (that is, they do not show any interest in living at the property they are buying).
Transactions involving payments in cash or in negotiable instruments which do not state the true payer (for example, bank drafts), where the accumulated amount is considered to be significant in relation to the total amount of the transaction.
Transactions in which the party asks for the payment to be divided in to smaller parts with a short interval between them.
Transactions in which payment is made in cash, bank notes, bearer cheques or other anonymous instruments.
Transactions which are not completed in seeming disregard of a contract clause penalizing the buyer with loss of the deposit if the sale does not go ahead.
Recording of the sale of a building plot followed by the recording of the declaration of a completely finished new building at the location at an interval less than the minimum time needed to complete the construction, bearing in mind its characteristics.
Transaction is completely anonymous–transaction conducted by lawyer–all deposit cheques drawn on lawyer's trust account.
Client sells property below market value with an additional “under the table” payment.
Client purchases property without inspecting it.
Client is known to have paid large remodelling or home improvement invoices with cash, on a property for which property management services are provided.
Client buys back a property that he or she recently sold.
Frequent change of ownership of same property, particularly between related or acquainted parties.
If a property is re-sold shortly after purchase at a significantly different purchase price, without corresponding changes in market values in the same area.
Client requests a winnings cheque in a third party's name.
Acquaintances bet against each other in even-money games and it appears that they are intentionally losing to one of the parties.
Client attempts to avoid the filing of a report for cash by breaking up the transaction.
Client requests cheques that are not for gaming winnings.
Client enquires about opening an account with the casino and the ability to transfer the funds to other locations when you do not know the client as a regular, frequent or large volume player.
Client purchases large volume of chips with cash, participates in limited gambling activity with the intention of creating a perception of significant gambling, and then cashes the chips for a casino cheque.
Client puts money into slot machines and claims accumulated credits as a jackpot win.
Client exchanges small denomination bank notes for large denomination bank notes, chip purchase vouchers or cheques.
Client is known to use multiple names.
Client requests the transfer of winnings to the bank account of a third party or a known drug source country or to a country where there is no effective anti-money-laundering system.
Client indiscriminately purchases merchandise without regard for value, size, or colour.
Purchases or sales that is unusual for client or supplier.
Unusual payment methods, such as large amounts of cash, multiple or sequentially numbered money orders, traveller’s checks, or cashier's cheques, or payment from third-parties.
Attempts by client or supplier to maintain high degree of secrecy with respect to the transaction, such as request that normal business records not be kept.
Client is reluctant to provide adequate identification information when making a purchase.
Transactions that appear to be structured to avoid reporting requirements.
A client orders item, pays for them in cash, cancels the order and then receives a large refund.
A client asking about the possibility of returning goods and obtaining a cheque (especially if the client requests that cheque be written to a third party).
A client paying for high-priced jewellery or precious metal with cash only.
A client not asking for the reduced price or haggling over the list price.
Purchase appears to be beyond the means of the client based on his stated or known occupation or income.
Client may attempt to use a third-party cheque or a third party credit card.
Funds come from an offshore financial centre rather than a local bank.
Large or frequent payments made in funds other than Canadian dollars.
Transaction lacks business sense.
Purchases or sales that are not in conformity with standard industry practice.
Over or under-invoicing, structured, complex, or multiple invoice requests, and high-dollar shipments that are over or underinsured.
Unwillingness by a supplier to provide complete or accurate contact information, financial references or business affiliations.
Counterpart presence, such as an affiliated store or branch or associate, in countries with weak AML/CFT policies.
Client uses an unknown intermediary to approach notary.
Client wants to use foreign companies but does not seem to have a legitimate, legal or commercial reason for doing so.
Client wishes to form or purchase a company with a corporate objective that is irrelevant to the client's normal profession or activities without a reasonable explanation.
Client performs activities that are irrelevant to his or her normal activities or profession and cannot provide a reasonable explanation.
Client repeatedly changes notaries within a short period of time without any reasonable explanation.
Client often transfers funds or securities to a third party.
Client is reluctant to discuss his or her financial affairs regarding behaviour that is inconsistent with his or her ordinary business practices.
Client has a history of changing bookkeepers or accountants yearly.
Client is uncertain about location of company records.
Client is invoiced by organizations located in a country that does not have adequate money laundering laws and is known for high secretive banking and as a corporate tax haven.
Third party is present for all transactions but does not participate in the actual transaction.
Client uses gatekeepers to structure deposits and purchase real estate.
Client does not want to put his or her name on any document that would connect him or her with the property or uses different names on Offers to Purchase, closing documents and deposit receipts.
Client negotiates a purchase for market value or above asking price, but records a lower value on documents, paying the difference “under the table”.
Client purchases personal use property under corporate veil when this type of transaction is inconsistent with the ordinary business practice of the client.
Client purchases property in the name of a nominee such as an associate or a relative (other than a spouse).
Client purchases multiple properties in a short time period and seem to have few concerns about the location, condition, and anticipated repair costs, etc. of each property.
Client insists on providing signature on documents by fax only.
Client frequently makes large investments in stocks, bonds, investment trusts or other securities in cash or by cheque within a short time period, which is inconsistent with the normal practice of the client.
The entry of matching buying and selling of particular securities or futures contracts (called match trading), creating the illusion of trading.
Client is willing to deposit or invest at rates that are not advantageous or competitive.
Client's documentation to ascertain identification, support income or verify employment is provided by an intermediary who has no apparent reason to be involved.
Client seems unconcerned with terms of credit or costs associated with completion of a loan transaction.
Client frequently uses trust accounts for transactions where it may not make business sense to do so.
Items shipped that are inconsistent with the nature of the customer’s business (e.g., a steel company that starts dealing in paper products, or an information technology company that starts dealing in bulk pharmaceuticals).
Customers conducting business in higher-risk jurisdictions.
Customers shipping items through higher-risk jurisdictions.
Customers involved in potentially higher-risk activities, including activities that may be subject to export/import restrictions (e.g., equipment for military or police organizations of foreign governments, weapons, ammunition, chemical mixtures, classified defence articles, sensitive technical data, nuclear materials, precious gems, or certain natural resources such as metals, ore, and crude oil).
Obvious over- or under-pricing of goods and services.
Obvious misrepresentation of quantity or type of goods imported or exported.
Transaction structure appears unnecessarily complex and designed to obscure the true nature of the transaction.
Customer requests payment of proceeds to an unrelated third party.
Shipment locations or description of goods not consistent with letter of credit.
Significantly amended letters of credit without reasonable justification or changes to the beneficiary or location of payment.
Official embassy business is conducted through personal accounts.
Account activity is not consistent with the purpose of the account, such as pouch activity or payable upon proper identification transactions.
Accounts are funded through substantial currency transactions.
Accounts directly fund personal expenses of foreign nationals without appropriate controls, including, but not limited to, expenses for college students.
Employee exhibits a lavish lifestyle that cannot be supported by his or her salary.
Employee fails to conform to recognized policies, procedures, and processes, particularly in private banking.
Employee is reluctant to take a vacation.
Employee overrides a hold placed on an account identified as suspicious so that transactions can occur in the account.
A bank is unable to obtain sufficient information or information is unavailable to positively identify originators or beneficiaries of accounts or other banking activity (using Internet, commercial database searches, or direct inquiries to a respondent bank).
Payments to or from the company have no stated purpose, do not reference goods or services, or identify only a contract or invoice number.
Goods or services, if identified, do not match profile of company provided by respondent bank or character of the financial activity; a company references remarkably dissimilar goods and services in related funds transfers; explanation given by foreign respondent bank is inconsistent with observed funds transfer activity.
Transacting businesses share the same address, provide only a registered agent’s address, or have other address inconsistencies.
Unusually large number and variety of beneficiaries are receiving funds transfers from one company.
Frequent involvement of multiple jurisdictions or beneficiaries located in higher-risk offshore financial centres.
A foreign correspondent bank exceeds the expected volume in its client profile for funds transfers, or an individual company exhibits a high volume and pattern of funds transfers that is inconsistent with its normal business activity.
Multiple high-value payments or transfers between shell companies with no apparent legitimate business purpose.
Purpose of the company is unknown or unclear.
A customer refuses to provide identification or explain the purpose of a transaction.
A customer is ignorant of basic facts regarding the transaction or is unconcerned about rates, taxes, etc.
A customer is controlled by another person, particularly where the customer appears unaware or elderly and is accompanied by a non-relative.
A customer conducts cash transactions when his/her employment or business does not ordinarily generate or require such amounts of cash.
A customer repeatedly sends or receives wire transfers when his/her business does not normally require or originate such wires.
A customer has no apparent source of income, yet conducts repeated transactions.
A customer trying to offer staff a gift, gratuity or bribe to complete a transaction.
A customer divides transactions into smaller amounts to avoid identification or reporting requirements.
Customer has an unusual or excessively nervous demeanour.
Customer discusses your record keeping or reporting duties with the apparent intention of avoiding them.
Customer is reluctant to proceed with a transaction after being told it must be reported.
Customer suggests payment of a gratuity to an employee of the financial institution.
Customer appears to have a hidden agenda or behaves abnormally, such as bypassing the chance to obtain a higher interest rate on a large account balance.
Customer who is a public official opens account in the name of a family member who begins making large deposits not consistent with the known legitimate sources of income of the family.
Customer makes a large cash deposit without counting the cash.
Customer frequently exchanges small bills for large bills.
Customer’s cash deposits often contain counterfeit bills or musty or extremely dirty bills.
Customer who is a student uncharacteristically transfers or exchanges large sums of money.
Account shows high velocity in the movement of funds but maintains low beginning and ending daily balances.
Transaction includes correspondence received that is a copy rather than original letterhead.
Transaction involves offshore institutions whose names resemble those of well-known legitimate financial institutions.
Transaction involves unfamiliar countries or islands that cannot be found in an atlas or map.
Agent, attorney or financial advisor acts for another person without proper documentation such as a power of attorney.
Customer furnishes unusual or suspicious identification documents and is unwilling to provide personal background data.
Customer is unwilling to provide personal background information when opening an account.
Customer opens an account without identification, references or a local address.
Customer’s permanent address is outside the bank’s service area or outside the country.
Customer’s home or business telephone is disconnected.
A business customer is reluctant to reveal details about the business activities or to provide financial statements or documents about a related business entity.
Customer provides no record of past or present employment on a loan application.
Customer claims to be a law enforcement agent conducting an undercover operation, when there are no valid indications to support that.
Customer’s activity increases in the safe deposit box area, possibly indicating the safekeeping of large amounts of cash.
Customer often visits the safe deposit box area immediately before making cash deposits of sums less than $10,000.
Customer rents multiple safe deposit boxes.
Customer comes in with another customer and they go to different tellers to conduct currency transactions of less than reportable threshold.
Customer conducts unusual cash transactions through night deposit boxes, especially large sums that are not consistent with the customer’s business.
Customer makes frequent deposits or withdrawals of large amounts of currency for no apparent business reason, or for a business that generally does not generate large amounts of cash.
Customer conducts several large cash transactions at different branches on the same day, or orchestrates persons to do so on his behalf.
Customer deposits cash into several accounts in amounts below reportable thresholds and then consolidates the funds into one account and wire transfers them outside of the country.
Customer attempts to take back a portion of a cash deposit that exceeds reportable amount after learning that a currency transaction report will be filed on the transaction.
Customer conducts several cash deposits below reportable levels at automated teller machines.
Corporate account has deposits or withdrawals primarily in cash rather than cheques.
Customer frequently deposits large sums of cash wrapped in currency straps, stamped by other banks.
Customer makes frequent purchases of monetary instruments for cash, in amounts less than the reportable levels.
Customer conducts an unusual number of foreign currency exchange transactions.
Customer frequently uses foreign currency to purchase bank cheques.
Customer deposits a large number of traveller’s cheques often in the same denomination and in sequence.
Customer deposits money orders bearing unusual markings.
Non-accountholder sends wire transfer with funds that include numerous monetary instruments of less than reportable levels.
An incoming wire transfer has instructions to convert the funds to bank cheques and mail them to a non-accountholder.
A wire transfer that moves large sums to secrecy havens such as the Cayman Islands, Hong Kong, Luxembourg, Panama or Switzerland.
An incoming wire transfer followed by an immediate purchase by the beneficiary of monetary instruments for payment to another party.
An increase in international wire transfer activity, in an account with no history of such activity or where the stated business of the customer does not warrant it.
Customer frequently shifts purported international profits by wire transfer out of their home country.
Customer receives many small incoming wire transfers and then orders a large outgoing wire transfer to another country.
Customer deposits bearer instruments followed by instructions to wire the funds to a third party.
A customer’s financial statement makes representations that do not conform to Generally Accepted Accounting Principles.
A transaction is made to appear more complicated than it needs to be by use of impressive but nonsensical terms such as "emission rate," "prime bank notes," "standby commitment," "arbitrage" or "hedge contracts."
Customer requests loans to offshore companies or secured by obligations of offshore banks.
Customer suddenly pays off a large problem loan with no plausible explanation for the source of funds.
Customer purchases certificates of deposit and uses them as collateral for a loan.
Customer collateralises a loan with cash deposits.
Customer uses cash collateral located offshore to obtain a loan.
Customer’s loan proceeds are unexpectedly transferred offshore.
Business customer presents financial statements noticeably different from those of similar businesses.
A large business presents financial statements that are not prepared by an accountant.
Retail business that provides cheque cashing service does not make large withdrawals of cash against cheque deposits, possibly indicating that it has another source of cash.
Customer maintains an inordinately large number of accounts for the type of business purportedly being conducted.
Corporate account shows little or no regular, periodic activity.
A transaction includes circumstances that would cause a banker to reject a loan application because of doubts about the collateral’s validity.
Customer seeks trade financing on the export or import of commodities whose stated prices are substantially more or less than those in a similar market situation.
Customer makes changes to a letter of credit beneficiary just before payment is to be made.
Customer changes the place of payment in a letter of credit to an account in a country, other than the beneficiary’s stated location.
Customer’s standby letter of credit is used as a bid or performance bond without the normal reference to an underlying project or contract, or in favor of unusual beneficiaries.
Customer uses an investment account as a pass-through vehicle to wire funds, particularly to off-shore locations.
Investor seems unconcerned about the usual decisions to be made about an investment account such as fees or suitable investment vehicles.
Customer wants to liquidate a large position through a series of small transactions.
Customer deposits cash, money orders, traveller’s cheques or bank cheques in amounts under reportable levels to fund an investment account.
Customer cashes out of annuities during the "free look" period or surrenders early.
Almost all global Banks must have paid penalties or fines for regulatory violations. But, the important question is whether they all have done breaches deliberately? Well! the answer is yes and no both. Some banking employees have dared to defraud their own bank, have dared to violate rules for personal benefit. But, always this is not the case. There are other reasons like fraudsters and money launderers have taken advantages of loopholes in the banking system, some banks lacked internal controls, some of them lacked "One Global Procedure" for their branches, some banks lacked governance, some banks have taken regulations lightly and did not work to upgrade their systems and some other banks have not trained their employees properly.
Let us check on few violations.
In December 2012, multinational banking institution HSBC was penalized a record $1.92 billion by the United States for violating laws designed to prevent money laundering and other illegal financial activity. HSBC was under consistent suspicion and twice given warnings and orders to strengthen its anti-money laundering programs by the U.S. between 2003 and 2010 but failed to make the proper adjustments. The $1.92 billion penalty, issued under the Bank Secrecy Act, was handed down after a report and subsequent investigation that confirmed the bank had set up offshore accounts for drug cartels and suspected criminals in Jersey. HSBC banking executives admitted to laundering as much as $881 billion dollars.
Events: From 2003-2006, HSBC Bank USA was under heavy suspicion by United States regulators and operated under a written agreement to correct the deficiencies of their operational practices. HSBC Bank USA specifically agreed to enhance its anti-money laundering program to achieve adequate compliance with the Bank Secrecy Act.
Between 2006 and 2010, HSBC Bank USA violated several components of the BSA: Money laundering risks associated with doing business with certain Mexican customers were ignored, compliance issues at HSBC Mexico were overlooked, and a BSA-adequate anti-money laundering program was not implemented. The Court notes four significant HSBC Bank USA failures:
HSBC failed to obtain and maintain due diligence on HSBC Group Affiliates.
HSBC failed to adequately monitor over $200 trillion in wire transfers between 2006 and 2009 from customers in nations classified as “standard” or “medium” risk ($670 billion in wire transfers specifically from HSBC Mexico).
HSBC Bank USA failed to adequately monitor billions of dollars in U.S. banknote purchases.
HSBC Bank USA failed to provide proper staffing and resources necessary to maintain an effective anti-money laundering program.
As part of the Deferred Prosecution Agreement, HSBC Bank USA admitted to gross violations of the Bank Secrecy Act, including failure to establish and maintain an effective anti-money laundering program, failure to establish due diligence, and involvement in the laundering of over $881 billion.
The Penalty: The record-setting fine, comprised of $1.256 billion in forfeiture and $665 million in civil penalties, allows HSBC to temporarily thwart criminal prosecution pending a probationary period of compliance with anti-money laundering standards. The probationary period consists of a five-year agreement with the U.S. Department of Justice that includes an independent monitor of HSBC’s internal anti-money laundering programs, bonus deference by the bank’s top executives, and retraction of bonuses from some current and former executives who had particular involvement in the wilful breach of U.S. regulations.
The Bank of Credit and Commerce International (BCCI) was a major international bank founded in 1972 by Agha Hasan Abedi, a Pakistani financier. The Bank was registered in Luxembourg with head offices in Karachi and London and within a decade, of starting operations, BCCI touched its peak. It operated in 78 countries, had over 400 branches, and had assets in excess of US$20 billion, making it the 7th largest private bank in the world by assets.
BCCI’s rapid growth alarmed the financial community, as well as regulators. When a bank grows rapidly, it is lending more and more money each year. BCCI contended that its growth was fuelled by the increasingly large number of deposits by oil-rich states who owned stock in the bank as well as by sovereign developing nations. However, this claim failed to mollify the regulators.
The bank it finally came out was being used to fund criminals and dictators; the CIA of USA was using it to fund the Afghan Mujahedeen and Contras. It was laundering proceeds from trafficking heroin grown in Pakistan-Afghanistan, boosting the flow of narcotics to European and U.S markets.
The Bank which was supposed to be trusted with one’s hard earned money had become the infested nest of terrorist activities and money laundering. After intensive investigation by the US and the UK, the Bank shut its doors in 1991. The claims to the amount of damage caused by the BCCI are disputed but certainly amount to hundreds of billions of dollars.
New York State’s banking regulator hit Standard Chartered Bank with a $300 million fine and restrictions on its dollar-clearing business on Tuesday for not detecting possible money laundering.
The New York Department of Financial Services (DFS) said the British bank's internal compliance systems had failed to detect or act on a large number of "potentially high-risk transactions" mostly originating from Hong Kong and the United Arab Emirates. The new punishment came two years after the bank paid US regulators $667 million to settle charges it violated US sanctions by handling thousands of money transactions involving Iran, Myanmar, Libya and Sudan.
Barclays PLC went to great lengths to protect the secrecy of some well-heeled clients. U.K. regulators said the British bank went too far. The Financial Conduct Authority fined Barclays £72 million ($109 million) for failings in its anti-money-laundering controls linked to a secretive £1.88 billion deal it arranged for a number of rich clients.
The deal didn’t involve any financial crimes, but the regulator accused Barclays of “failing to minimize risk” as it structured a product for those clients between 2011 and 2012.
The deal in question was never logged on a Barclay’s computer, the FCA said. It included a clause that offered to pay the clients up to £37.7 million if their names were disclosed. Documents were locked in a specially bought safe that few staff knew existed.
“Barclays applied a lower level of due diligence than its policies required for other business relationships of a lower risk profile,” the FCA said. The clients were politically exposed people and should have been subject to higher levels of due diligence, the regulator said.
JPMorgan Chase has been fined more than $2 billion for violations of the Bank Secrecy Act tied to failure to report suspicious activity related to Bernie Madoff's decades-long, multi-billion dollar Ponzi scheme. Madoff was sentence in 2009 to 150 years in prison for his deception. The fines against Chase were the result of three settlements. A settlement with the U.S. Attorney's Office for the Southern District of New York included a $1.7 billion penalty; a separate settlement with the Office of the Comptroller of the Currency included a $350 million penalty. Additionally, the Treasury Department's Financial Crimes Enforcement Network fined Chase $461 million for BSA-related violations. But FinCEN determined that its fine was satisfied by Chase's payment to the U.S. Attorney of New York.
In January 2013, the OCC issued a cease and desist order, directing Chase's three affiliated banks JPMorgan Chase, JPMorgan Bank and Trust Company and Chase Bank - to correct deficiencies in their compliance programs.
Since issuing the January 2013 cease and desist order, the OCC continues to monitor progress that JPMorgan Chase has made to correct weaknesses identified by the agency as well as their ongoing work and commitment to remedy the remaining deficiencies.
In June 2015, Federal and state banking regulators ordered State Street Corp. to improve its compliance systems after they found deficiencies in its internal controls during a bank examination. Under the agreement, State Street’s board of directors has 60 days to submit a written plan to strengthen its oversight of firmwide compliance risk management. Among other things, the report must take into account “personnel, systems, and other resources as are needed to operate a compliance risk management program that is commensurate with the compliance risk profile of the organization and that fully addresses the organization’s compliance risks on a timely and effective basis.’’ The agreement with the Federal Reserve Bank and the Massachusetts Banking Division is meant to ensure that Boston-based State Street is complying with anti-money laundering regulations and the Bank Secrecy Act. State Street owns the State Street Bank and Trust Co. but does little standard banking; it predominantly handles investments and record-keeping for pension funds and large investment accounts around the world.
State Street must submit a revised program for conducting customer due diligence, ensuring that it’s obtaining proper identification and information like the source of the customer’s money. It must also assign risk ratings to customers based on their location and the services they are buying, and provide enhanced due diligence where necessary. In addition, the bank must have policies for conducting periodic reviews of all account holders, and must document those reviews. The regulators also are requiring State Street to write a plan for reporting any known or suspected violations of law or suspicious transactions to law enforcement and regulators. The company also must install an automated transaction monitoring system.
In June 2013, The Reserve Bank imposed a fine of Rs 5 Crore on Axis Bank, Rs 4.5 Crore on HDFC Bank and Rs 1 Crore on ICICI Bank for violation of KYC norms and anti-money laundering guidelines after inquiring into charges levelled by an online portal Cobrapost.
"After considering the facts of each case ... Reserve Bank came to conclusion that some of the violations were substantiated and warranted imposition of monetary penalty..." the central bank said in a statement RBI imposed a penalty of Rs 5 Crore on Axis Bank, Rs 4.5 Crore on HDFC Bank and Rs 1 Crore on ICICI Bank.
It further said that a similar scrutiny was being conducted at corporate offices of 36 other banks and "the process of follow up action in respect of these banks is at different stages of its completion."
The penalty follows scrutiny carried out by RBI of books of accounts, internal control, compliance systems and processes of these three banks at their corporate offices and some branches during March/April 2013.
The scrutiny was conducted to investigate into the allegations of contravention of Know Your Customer (KYC)/ anti-money laundering guidelines against them. RBI launched the probe after Cobrapost (an online portal), in March, alleged that ICICI Bank, HDFC Bank and Axis Bank are involved in money laundering by accepting black money from customers to convert them into white money as a standard practice.
The Australian drug dealers have a vast sum of cash from the sale of drugs such as methamphetamine, cocaine etc., on the streets of Perth, Sydney, Melbourne etc. They need to keep the cash safe there are other criminals who would be happy to steal it from them. Equally if they stockpile it and the Police find it, the cash itself will be highly incriminating. Of course they also want to be able to use the cash to buy more drugs and to enjoy the profits. In short they want to get it out of reach of Australian Police and get it where they can use and enjoy it.
A corrupt alternative remitter in a country with lower levels of financial regulation has innocent legitimate clients who want to send money to Australia (like Australian expats, or more often people who reside in that country and want to invest in Australia or send money to their children who may be studying in Australia). These clients know that Western banks charge substantially higher exchange rates and that they can often get a better rate (perhaps 1-2% better by using alternative remittance).
The innocent person offshore (example, parent sending money to a child studying in Australia) pays the foreign equivalent of AU$100,000 to a licenced (but corrupted) alternative remitter in that country. This could be by domestic bank transfer to the remitter or in cash. In many countries cash is not uncommon in large legitimate transactions.
Low level agents of the cuckoo smurfing syndicate employ ‘smurfs’ to meet up with drug dealers on the streets of large Australian cities, collect $100,000 in cash (in Australian bank notes) and then deposit it into the student’s Australian bank account (the student is expecting $100,000 as the parents have said it is coming).
The syndicate knows and the smurfs (who may be backpackers only in Australia for a short time) are told, that if they walk into an Australian bank with $100,000 in a backpack they will likely be arrested immediately (the bank will literally call the Police on the spot) on suspicion of having possession of money unlawfully obtained. The smurfs are also told that Australian banks must report cash deposits of more than $10,000 into any account to a central authority, AUSTRAC. This obligation arises under s 43 of the AMLCTF Act.
The smurfs are told to deposit no more than about $9,900 cash at a time. They must go to multiple branches of the same bank across the city (usually on the same day) and make multiple deposits. To deposit $100,000 would require at least 11 deposits at 11 different branches. This is where the smurfs get their name like the characters in the TV show they busily run around. The activities of smurfs are sometimes called ‘smurfing’. In Australia the term ‘structuring’ is often used in lieu of smurfing. Regardless of terminology, the payments are made in a way so to avoid the bank making a report of the deposits.
The student checks the balance of their Australian bank account and sees the amount expected has arrived.
The student in Australia will tell their parents the money has arrived. The remitter offshore will likely check with the parents and be assured it has arrived. The student may or may not notice the odd deposit pattern. If they do notice it, they may mention it to their parents. If their parents ask about it, the remitter offshore will likely say ‘that’s how it is done in Australia’ or similar’.
The remitter offshore now makes the foreign currency received from the parents available to the Australian drug syndicate, either in the foreign country or in another safe haven.
A Perfect example of Cuckoo Smurfing.
The Serious Fraud Investigation Office (SFIO), 23 a multi-disciplinary investigating arm of the Ministry of Corporate Affairs, set up in 2003 with officials from various law enforcement agencies, was asked to investigate the fudging of accounts as admitted by B. Ramalinga Raju. It submitted its preliminary report on April 13, 2009 that runs into 29 volumes contained in 14 thousand pages. On November 30, it filed case24 against Satyam promoter B Ramalinga Raju, his brother B Rama Raju, ex-CFO Vadlamani Srinivas, senior finance manager D. Venkatapathy Raju and finance manager C. Srisailan, along-with company’s former statutory auditors S Gopalakrishna and Srinivas Talluri under various provisions of the Indian Penal Code, Companies Act and IT Act. The SFIO report believed the confession was not out of Raju’s call of conscience; rather it was deliberately painting a distressing face to keep the legal and public dealings with a light hand. According to SFIO report, Satyam founders B Ramalinga Raju, B Rama Raju and ex-CFO Vadlamani Srinivas, and ex-Vice President (finance) G Ramakrishna, together hatched a conspiracy to artificially increase the revenues and profits in the books. The report highlights that the falsification was done by deliberately leaving loopholes in the Computerized Accounting System which uses ERP modules. The high-level application landscape of Satyam internal applications has many links between various systems where either there was no integration or there was weak integration. These loopholes were deliberately left to insert fictitious invoices and fictitious bank statements to balance them without being detected. Very smartly fictitious invoices were created in the invoice management system using regular login ids, falsely intimating that any of the employees could be involved in this. In order to cover up these fictitious entries, the receipts were first accounted with Bank of Baroda, New York branch, (account no- 120559) and they then were relocated as fixed deposits in other accounts.
With such artificial entries started giving a blooming picture of the company, the management decided to put the surging profits in better investments. Unfortunately, Raju was now forced to make investments from the non-existing investments. But fate had something else in store. After raising money, Raju disembarked them in losing propositions. As the company was constantly losing money, Raju decided to venture into brand building to avoid bad circumstances. It was then the promoter-directors of the company started commissioning on these inflated profits, which is again an offence under IPC. The SFIO probe also takes a call on the account statements of the company with the Bank of Baroda highlighting jacking up of the books ever since 2001-02. The report also clarifies that the company had booked false fixed deposits and interests in five banks namely, ICICI, HSBC, HDFC, BNP Paribas and Citi Bank. On the reconciliation of these statements the company books showed major gaps with the actual existing deposits. The SFIO has also booked this offence under various sections of IPC and the Companies Act. The investigation also throws light on the company's paying excess taxes on the non-existing assets and also indulging in forging current account balance statements. This helped the company forge quarterly details of outstanding balances of fixed deposits and interest earned on them. The report says that by showing a rosy picture of the company, the promoters were jacking up the share price and simultaneously selling off their holdings raking in handsome money. The company, apart from this, is also believed to have issued American Depository Shares worth $ 15.2 crore out of which only $ 5.25 crore were brought in to the country.
After detailed investigation, the company was unable to convince the SFIO on the false amount. The allocation of this amount is now considered to be under the Enforcement Directorate. Thus, the report unveils the entire scam with proofs of all false claims.The SFIO investigations also throws light on the company's desperate attempt to acquire Maytas Infrastructure (MIL) and Maytas Properties (MPL), an act done under the pressure from external investors who were pressing for better use of liquid asset shown in the balance sheet. The report states that the promoters Ramalinga Raju, Rama Raju and the CFO Srinivas Vadlamani were fully aware of the precarious financial position of the company and the large number of fake fixed deposit and fake bank balances created in the books since 2000-2001 onwards. “A facade was created in the form of proposed acquisition of MIL and MPL to replace fictitious assets of Satyam with real assets with intent to deceive the shareholders of MIL and MPL and to fraudulently induce them to deliver their shares to Satyam,” the SFIO report states. The Report further states “in the meeting that took place on December 16, 2008 to discuss the acquisition of MIL and MPL, B Ramalinga Raju was present, but abstained from discussion and voting of these proposals. V Srinivasan, ex-CFO informed the members that the evaluation of Maytas Infra was based on SEBI (Substantial Acquisition and Takeovers) Regulations, 1997 and for Maytas Properties, based on evaluation done by Ernst & Young. Further, the consent of the board was unanimously accorded after which Raju proposed the merger of MIL and MPL to the shareholders, which came in for stiff resistant, and issue of corporate governance was raised.” A couple of weeks later, Ramalinga Raju dropped a bombshell by sending a letter of admission to SEBI and the board of directors that he had fudged the accounts of Satyam and that the balance sheet as on September 30, 2008 carried an inflated (non-existent) cash and bank balances of Rs 5040 crore, non-existent interest of Rs 376 crore and understated liability of Rs 1230 crore.
This is a perfect case of inflation of Balance Sheet.
Up to €55.2bn has been lost to tax fraud by the European Union’s top banks. Styled as “the biggest tax robbery in European history”, it included some of the European Union’s largest banks. The fraud was executed via the “cum-ex” purchases of bonds and shares, a method by which banks can hide the identities of their clients. The clients are then able to claim multiple, tax breaks on the trades. It is estimated to have costs taxpayers in Germany alone €31.8bn between 2001 and 2016. German authorities have been investigating hundreds of the tax fraud cases, where banks and stockbrokers rapidly traded shares with ("cum") and without ("ex") dividend rights, with the aim of being able to conceal the identity of the actual owner and allow both parties to claim tax rebates on capital gains tax that had only been paid once. The scandal came to light in 2016 when it emerged that several German banks had exploited a legal loophole which allowed two parties simultaneously to claim ownership of the same shares.
This contrived "dual ownership" allowed both parties to then claim tax rebates even though both were not entitled to it. With the process having gone undetected for years, billions in tax went uncollected by the German state, mostly in the form of rebates which should never have been paid out at all. "A bank would agree to sell a company stock, for example to a pension fund, before the dividend payout but delivered it after it had been paid. The bank and the fund would both reclaim withholding tax. "Sometimes banks sold shares they did not own and agreed to buy them later in a practice known as short selling. The stock was traded rapidly around a syndicate of banks, investors and hedge funds to create the impression of numerous owners. The profits from the deals were shared. “According to the research on the more than 180,000 pages of confidential files provided to 19 media organizations from a total of 12 countries, as much as €55.2 billion was lost to state treasuries through the tax evasion practices. Although Germany was hit the most, the coffers of France, Spain, Italy, the Netherlands, Denmark, Belgium, Austria, Finland, Norway and Switzerland have also been adversely affected.
This case is perfect example of tax evasion using CUM-EX.
Over the weekend of February 2016, a group of hackers attempted to steal $951 million from the Bangladesh Central Bank or (BCB) in Dhaka. Much of this was eventually recovered, but the thieves still managed to get away with $81 million. The attempt is considered one of the biggest computer frauds of all time. The thieves were organized, well networked and well-funded. But their success was, more than anything else; down to weaknesses in the institutions they robbed. Understanding exactly what went wrong in the BCB hack which has been suggested by some to be linked to the WannaCry Ransomware attack of May 2017 can provide banking businesses with invaluable lessons in how to improve their security strategies. The hack was highly complex, and took place over several lines of attack. The sequence is as given below.
The theft involved manipulating the SWIFT system which is a digital messaging platform that manages many of the world’s interbank financial transfers, to fool the New York branch of the U.S. Federal Reserve (which holds many international banking assets) into transferring funds to accounts owned by the thieves.
Pretending to be the BCB, the thieves sent fake instructions over SWIFT to the New York Fed, asking for some funds to be transferred to bank accounts in Southeast Asia. SWIFT usually notifies banks of transfers by sending the order to a bank’s printers. But in this case, the attackers disabled the BCB’s printers with a piece of malware. This meant the bank’s employees in Bangladesh were not aware that the heist was going on. By the time the BCB reactivated its printer and received the notifications of the transfers, and requests from the New York Fed for clarification, it was already too late and the money had been sent.
While a series of spelling and formatting errors in the thieves’ SWIFT instructions halted the vast majority of the transactions, a total of $81 million was transferred to banks in Southeast Asia and quickly laundered through, among other places, the Manila casino system.
This is perfect example of Bank Heist.
Barings was one of the most reputable financial institutions in all of the United Kingdom. Founded in 1762 by the Dutch Johann Baring, who had immigrated to England, Barings formed part of the country’s history. Even the Queen of England was among its clients. Barings, one of the most prestigious banks in the United Kingdom is bankrupt following losses caused by its trader. Now, who was he? It was Nick Leeson, one of the traders in Barings Bank in 1995, was the reason behind shaken up financial markets then. Coming from a relatively modest background (his father is a plasterer), Nick Leeson did not follow higher education, but this is not a requirement needed to find a job in a bank. His adolescence was spent at Watford where he attended high school, where after he began to work at Coutts & Company and then spent two years at Morgan Stanley. Here he took up a position as an operations assistant, allowing him to become familiar with the financial markets which were gaining more significance towards the end of the 1980s.
Leeson then joined Barings; here he quickly made a good impression within the respectable establishment. He was promoted on the trading floor and in 1990, was appointed manager in Singapore where he had to operate on the “futures” of SIMEX (Singapore International Monetary Exchange). A relentless worker, Nick Leeson quickly became a renowned operator of the derivative products market on the SIMEX, and is considered as one of those who “move” the market. From 1992, Leeson made unauthorized speculative trades that at first made huge contributions for Barings “up to 10% of the bank's profits at the end of 1993”. He became a star within the organization, earning unlimited trust from his London bosses who considered him nearly infallible. However, his unauthorized speculative trades lost money in his operations. Leeson hid the losses in an error account. He claimed that the account had been opened in order to correct an error made by an inexperienced member of the team. At the same time, Leeson hid documents from statutory auditors of the bank. At the end of 1994, his total losses amounted to more than 208 million pounds, almost half of the capital of Barings.
In the month of January 1995, with the aim of "recovering" his losses, Leeson placed a short straddle on Singapore Stock Exchange and on Nikkei Stock Exchange, betting that Nikkei would drop below 19000 points. But the next day, the unexpected earthquake of Kobé shattered his strategy. Nikkei lost 7 % in the week. Nick Leeson took a 7 billion dollar value futures position in Japanese equities and interest rates, linked to the variation of Nikkei. He was "long" on Nikkei. In the three days following the earthquake of Kobé, Leeson bought more than 20000 futures, each worth 180000 dollars. He tried to recoup his losses by taking even more risky positions, betting that the Nikkei Stock Exchange would make a rapid recovery; he believed he could move the market but he lost his bet, worsening his losses. Feeling that his losses had become too great and seeing that the bank was on the verge of a crisis, Leeson decided to flee, leaving a note which read “I’m sorry”. He went to Malaysia, Thailand and finally Germany. Here he was arrested upon landing and extradited back to Singapore on 2 March 1995. He was condemned to six and a half years in prison but was released in 1999 after a diagnosis of colon cancer.
In 1996 he published an autobiography “Rogue Trader” in which he detailed his acts leading to the collapse of Barings. The book was later made into a film starring Ewan McGregor as Leeson.
The fall of Barings caused an unprecedented crisis within the city. Nine senior managers were accused of having badly managed the situation and in March 1995 the bank (only the parent company) was bought by Dutch group ING. It was the less than glorious disappearance of a bank founded in the 18th century after 223 years of existence. The bankruptcy of Barings had a world-wide impact, affecting even those who were not among the financial circles. The public expressed concern about the use of by-products and about the "madness of financial markets" where young "golden boys" of less than 30 years can cause the demise of financial institutions which nevertheless had experienced a dozen crises during two hundred years.
This is the perfect example of lack of Governance.
This is a story of a veteran diplomat posted in an enemy country, Vanitha, aged around 60. Vanitha, had a stellar career of nearly three decades behind her when she was posted at the Indian High Commission in Pakistan nearly 10 years ago. It was a tense time then for bilateral ties, with 26/11 bringing the nuclear-armed neighbors on the cusp of war. This story has all the makings of a commercial Bollywood or Hollywood potboiler. Vanitha was the right choice then as she was very fluent in Urdu and she had worked in other Islam countries too like Iraq and Malaysia. Her main job was handling press and information at the Indian High Commission, to scan the Pakistani media and prepare reports. While she was in the Pakistani Embassy, she met a charming boy young Jimmy around 26 years. Jimmy was also fluent in Urdu too and through his shero-shayariya (Poems in Urdu) soon they became very close. Vanitha never realized her age as she was in love. In love, she did not understand what she was doing. She subsequently began to pass on sensitive information about India to Jimmy. When word reached Delhi, she was put under surveillance. Once Delhi was confirmed with their fears, the government called Vanitha back to India. She came to India, spent a night at home, and was ultimately arrested by Delhi Police the next morning. In their charge-sheet, Delhi Police accused Vanitha of leaking sensitive information to Pakistani officials and remaining in touch with two ISI officials Jimmy and Mubbashir. Vanitha was having concerns over Jimmy who restricted her interactions with other Pakistanis posed strong objection to her socializing with any Pakistanis. In the conviction of her spying, the court said Vanitha's actions had created a “severe security threat” and “tarnished the country’s image”. The court issued request to the US Court authorities to provide details of the emails exchanged between disgraced diplomat Vanitha and her handlers in Pakistan in the spying case in which she allegedly passed sensitive information to ISI agents.
This request by Indian courts to US authorities is called letter of rogatory.
Sandeep was a KYC Officer, a maker in a bank and Ramesh was a Sr. KYC Officer, a checker in the same bank. They were both working on onboarding Sun Huang INC. Let us see the conversation between them.
Ramesh asked: Sandeep, why you did not collect the personal documents of Sun Huang's signatories?
Sandeep said: Well! US contracted products do not require collection of personal documents for authorized signatory list.
Ramesh asked: But you have this product contracted to Singapore, correct?
Sandeep said: Yes correct, but Ramesh, it may take time, we have 10 authorized signatories. As we have 10 products contracted to US and only, one product is contracted to Singapore, Suresh sir said to go ahead and approve the case.
Ramesh: Why did you contact Suresh, he overseas Quality Assurance which is post our checking.
Sandeep: The relationship manager Ria connected Suresh and asked him to expedite this case, he contacted me for the missing details in this case.
I explained that Singapore uplifts require personal documents for authorized signatories hence, the case was pending due to non-availability of these personal documents. Suresh suggested me to submit the case as there were 10 US products against only 1 Singapore product.
Ramesh: Did you take this confirmation in writing.
Sandeep: How can I ask him; he is a Managing director of the firm.
Ramesh: You should have at least sent him a mail stating "As discussed, we are not collecting the personal documents as there are 10 US products against only 1 Singapore product."
Sandeep: I asked him whether I can send such a mail to him post our conversation. He strictly said no. He said, do as is said, no more arguments, we may lose 100 million Dollars in a deal.
Ramesh: Well, let me talk to him.
Ramesh called up Suresh.
Hi Suresh, Good morning. Have you asked Sandeep to submit the case without personal documents of authorized signatories?
Suresh said: Yes! I had a call with Ria and she says all the authorized signatories are working from home and it is not possible to collect their personal documents at this point of time.
Ramesh: But Suresh you are aware that even if there is one single product in Singapore, we should and must follow local laws of Singapore, which says to collect personal documents for authorized signatories.
Suresh: Yes, I know, but this is urgent case. Didn't Sandeep told you that this is 100 million Dollars deal.
Ramesh: Yes, he did. But your people only will only ask for it during quality check.
Suresh: You don't worry about that. I will take care of observations at our end on this case.
Ramesh: Why not put this in a mail?
Suresh: I am telling you right! I will take care during Quality assurance check. I will see that no observations are made for this particular case.
Ramesh: Somehow, I am not really comfortable.
Suresh: You have applied for manager position with Quality assurance team, correct?
Ramesh: Ok sir, I am approving this case. This was a great call. Have a nice day ahead sir.
Suresh: That's my boy, I will tell Harika to take care of you during interview.
Ramesh: Ok Sir! it’s now approved in the KYC system.
Suresh: Excellent, I am recommending your name for "Star of the Month" award with your boss Rehan.
This is a perfect example of Wilful Blindness.
Emmanuel Nwude, he was the former director of the Union Bank of Nigeria. He was a professional and adept Banker. Nwude was privy to confidential information being in the director's position to some links, information and documentation that others wouldn't have. It happened between 1995 and 1998. Then, Nelson Sakaguchi was a Director at Brazil's Banco Noroeste based in São Paulo. Emmanuel Nwude impersonated Paul Ogwuma, then Governor of the Central Bank of Nigeria, and successfully convinced Sakaguchi to "invest" in a new airport in the nation's capital, Abuja, in exchange for a $10 million commission. Nwude convinced Sakaguchi and the bank to pay him $191 million in cash and the remainder $51in the form of outstanding interest, between 1995 and 1998 as investment for the airport that would be built at Abuja.
Sakaguchi waited and waited but airport was never built. In August 1997, the Spanish Banco Santander wanted to take over the Banco Noroeste Brazil. A joint board meeting was held in December 1997, in which officials from Santander inquired about a large sum of money, two-fifths of Noroeste's total value and half of their capital, was sitting in the Cayman Islands unmonitored. This led to criminal investigations in Brazil, Britain, Nigeria, Switzerland, and the United States. To guarantee the sale to Santander, the Simonsen and Cochrane families, the owners of Banco Noroeste, paid the $242 million bill themselves.
This is a perfect example of advance fee fraud.
Lehman's business began as a humble dry goods store founded by German immigrant Henry Lehman in 1844 in Montgomery, Alabama. After Henry’s brothers Emanuel and Mayer joined him in 1850, the business became known as Lehman Brothers. The company grew from selling dry-goods to the cotton trade. Lehman became a member of the Coffee Exchange as early as 1883 and finally the New York Stock Exchange in 1887. In 1899, it underwrote its first public offering, the preferred and common stock of the International Steam Pump Company. In 1929, Lehman Brothers forms the Lehman Corporation, a closed-end investment company. The stock market crashes in late October 1929 contributing to the Great Depression and global economic collapse. Following Philip Lehman's retirement in 1925, his son Robert "Bobbie" Lehman took over as head of the firm. During Bobbie's tenure, the company weathered the capital crisis of the Great Depression by focusing on venture capital while the equities market recovered. In 1930 Lehman underwrites the IPO of DuMont, the first television manufacturer. In 1950, Lehman underwrites the IPOs of Digital Equipment and Hertz Rent-a-Car.
Robert Lehman died in 1969 after 44 years in a leadership position for the firm, leaving no member of the Lehman family actively involved with the partnership. By 1972, the firm was facing hard times still becomes one of the first investment banks to open an office in London to take advantage of the booming bond market in Europe. In 1973, Pete Peterson, chairman and chief executive officer of the Bell & Howell Corporation, was brought in to save the firm. Under Peterson's leadership as chairman and CEO, the firm acquired Abraham & Co. in 1975, and two years later merged with Kuhn, Loeb & Co., to form Lehman Brothers, Kuhn, Loeb Inc., the country's fourth-largest investment bank, behind Salomon Brothers, Goldman Sachs and First Boston. In 1984, American Express acquires Lehman Brothers and merges it with Shearson. From 1983 to 1990, Peter A. Cohen was CEO and chairman of Shearson Lehman Brothers, where he led the one-billion-dollar purchase of E.F. Hutton to form Shearson Lehman Hutton. In 1993, American Express divests Shearson, and the independent firm once again becomes known as Lehman Brothers.
Robert Lehman died in 1969 after 44 years in a leadership position for the firm, leaving no member of the Lehman family actively involved with the partnership. By 1972, the firm was facing hard times still becomes one of the first investment banks to open an office in London to take advantage of the booming bond market in Europe. In 1973, Pete Peterson, chairman and chief executive officer of the Bell & Howell Corporation, was brought in to save the firm. Under Peterson's leadership as chairman and CEO, the firm acquired Abraham & Co. in 1975, and two years later merged with Kuhn, Loeb & Co., to form Lehman Brothers, Kuhn, Loeb Inc., the country's fourth-largest investment bank, behind Salomon Brothers, Goldman Sachs and First Boston. In 1984, American Express acquires Lehman Brothers and merges it with Shearson. From 1983 to 1990, Peter A. Cohen was CEO and chairman of Shearson Lehman Brothers, where he led the one-billion-dollar purchase of E.F. Hutton to form Shearson Lehman Hutton. In 1993, American Express divests Shearson, and the independent firm once again becomes known as Lehman Brothers.
In 2007, Lehman posts record-high net revenues, net income and earnings per common share (diluted) for a fourth consecutive year and the highest volume of trade on the London Stock Exchange for a third year in a row. On March 16, 2008, after rival Bear Stearns was taken over by JP Morgan Chase in a fire sale, market analysts suggested that Lehman would be the next major investment bank to fall. In 2008, Lehman faced an unprecedented loss to the continuing subprime mortgage crisis. Lehman's loss was a result of having held on to large positions in subprime and other lower-rated mortgage tranches when securitizing the underlying mortgages. In any event, huge losses accrued in lower-rated mortgage-backed securities throughout 2008. In the second fiscal quarter, Lehman reported losses of $2.8 billion and was forced to sell off $6 billion in assets. On June 9, 2008, Lehman Brothers announced US$2.8 billion second-quarter loss. In August 2008, Lehman reported that it intended to release 6% of its work force. On September 9, 2008, Lehman's shares plunged 45% to $7.79, after it was reported that the state-run South Korean firm had put talks on hold.
The U.S. government did not announce any plans to assist Lehman. On Saturday, September 13, 2008, Timothy F. Geithner, then the president of the Federal Reserve Bank of New York, called a meeting on the future of Lehman, which included the possibility of an emergency liquidation of its assets. Despite concerns about the consequences a Lehman Brothers collapse would bring, the federal government and representatives of the administration of President George W. Bush ultimately refused to bail out another investment bank. Hopes of a sale to another bank fell short as well: One prospective buyer, Bank of America, decided to buy Merrill Lynch instead, while British regulators blocked a last-ditch deal to sell Lehman to Barclays of London. Out of options, Lehman Brothers declared bankruptcy early on the morning of September 15, 2008. The firm declared $639 billion in assets and $613 billion in debts, making it the largest bankruptcy filing in U.S. history.
Perfect example of Too Big to Fail.
John is leading the Liberty Health.
John, through Liberty Health took advantage of a new feature of the Medicare Advantage Program.
This feature, scores Medicare patients by the severity of diagnoses.
The more the score, the more the Medicare funds to support the treatment of those patients.
Liberty Health submitted false patient scores in order to receive additional funding.
John, even though, he did not have any support in other states, neither did he had the required networks, convinced the Medicare health program officials to set up Liberty health in other states.
Dr. Robins once worked at Liberty Health as
Chief medical officer and was retired.
Dr. Robins after retirement, filed a lawsuit against Liberty health, after learning about Liberty Health scams for gathering more and more money from Medicare.
Dr. Robins acted as a whistle blower and said Liberty Healthcare convinced the Medicare program to allow Liberty health to expand in other states even though they did not had a sufficient network to support such an expansion.
After its in-depth investigation, the government found that the allegations against Liberty Health were true.
What should happen here?
Well! Liberty Health should be prosecuted and fined.
Yes Correct!
But, what about the person who orchestrated all this. What should be done to John?
This was exactly what Sally Yates asked also called Yates Memo (What about individual accountability in a corporate misconduct?)
John is leading the Liberty Health.
John, through Liberty Health took advantage of a new feature of the Medicare Advantage Program.
This feature, scores Medicare patients by the severity of diagnoses.
The more the score, the more the Medicare funds to support the treatment of those patients.
Liberty Health submitted false patient scores in order to receive additional funding.
John, even though, he did not have any support in other states, neither did he had the required networks, convinced the Medicare health program officials to set up Liberty health in other states.
Dr. Robins once worked at Liberty Health as
Chief medical officer and was retired.
Dr. Robins after retirement, filed a lawsuit against Liberty health, after learning about Liberty Health scams for gathering more and more money from Medicare.
Dr. Robins acted as a whistle blower and said Liberty Healthcare convinced the Medicare program to allow Liberty health to expand in other states even though they did not had a sufficient network to support such an expansion.
After its in-depth investigation, the government found that the allegations against Liberty Health were true.
What should happen here?
Well! Liberty Health should be prosecuted and fined.
Yes Correct!
But, what about the person who orchestrated all this. What should be done to John?
This was exactly what Sally Yates asked also called Yates Memo (What about individual accountability in a corporate misconduct?)
A.
Alternative Remittance Systems: Also referred as underground or parallel banking. It typically involves transfer of values between countries, outside the legitimate banking system and does not involve a physical movement of currency. ARS can be defined as means of transferring funds and sometimes gold through traditional "underground" banking networks by which trading companies accept money at one location and make it available in another. These systems are also known as Hawala, Hundi, Chiti Banking, chop chop banking etc.
Anti-Money Laundering: Anti-money laundering (AML) is a term mainly used in the financial and legal industries to describe the legal controls that require financial institutions and other regulated entities to prevent, detect, and report money laundering activities.
Association: An organization of people with a common purpose and having a formal structure.
AUSTRAC: The Australian Transaction Report and Analysis Centre (AUSTRAC) is Australia's Anti-money laundering and counter-terrorism financing (AML/CTF) regulator and is specialist financial intelligence unit (FIU).
Asset Protection Trust (APT): Trust established in an offshore haven which has enacted laws to protect legitimately earned (clean) money deposited there. The principal purpose of an APT is to safeguard an asset from claims against it in the home country of the depositor. It is a special form of irrevocable trust in which the title to the asset (deposit) is transferred to a trustee who manages the asset on behalf of named beneficiaries.
B.
Bank Secrecy Act: The Currency and Foreign Transactions Reporting Act of 1970 (which legislative framework is commonly referred to as the "Bank Secrecy Act" or "BSA") requires U.S. financial institutions to assist U.S. government agencies to detect and prevent money laundering. Specifically, the act requires financial institutions to keep records of cash purchases of negotiable instruments, file reports of cash transactions exceeding $10,000 (daily aggregate amount), and to report suspicious activity that might signify money laundering, tax evasion, or other criminal activities.
Beneficial Owner: Beneficial owner is the real owner of funds held by a nominee bank or for stocks held in the name of a brokerage firm.
BMPE: Black Market Peso Exchange. It refers to the principal money laundering system of the Columbian drug cartels.
Bureau de Change: A bureau de change is a business where people can exchange one currency for another.
Broker Dealer: A person or firm in the business of buying and selling securities, operating as both a broker and a dealer, depending on the transaction. The term broker-dealer is used in U.S. securities regulation parlance to describe stock brokerages, because most of them act as both agents and principals. A brokerage acts as a broker (or agent) when it executes orders on behalf of clients, whereas it acts as a dealer (or principal) when it trades for its own account.
BIS (Bank of International Settlements): Established on 17 May 1930, the Bank for International Settlements (BIS) is the world's oldest international financial organisation. The BIS has 60-member central banks, representing countries from around the world that together make up about 95% of world GDP. The mission of the BIS is to serve central banks in their pursuit of monetary and financial stability, to foster international cooperation in those areas and to act as a bank for central banks.
Batch Processing: Batch processing is the execution of a series of programs ("jobs") on a computer without manual intervention. Jobs are set up so they can be run to completion without human interaction. All input parameters are predefined through scripts, command-line arguments, control files, or job control language.
BIC Codes: A SWIFT code/Bank Identifier Code is an international bank code that identifies particular banks worldwide.
Bust out frauds: Also known as sleeper fraud is primarily a first party fraud scheme. During the process, the fraudster builds up a history of good behaviour with timely payments and low utilization. Overtime, the fraudster obtains additional lines of credit and requests higher credit limits. Eventually, the fraudster uses all available credit and stops making payments. Overpayments with bad cheques are often made in the final stage of bust-out, temporarily inflating the credit limit and causing losses greater than the account credit limit.
Bookmaker: A bookmaker or a bookie is an organization or a person that takes bets on sporting and other events at agreed upon odds. Bookmakers usually focus betting on professional sports, especially horse racing or association football however, a wider range of bets, including on political elections, awards ceremonies such as “The Oscars”, and novelty bets can also be placed. By adjusting the odds in their favour or by having a point spread, bookmakers will aim to guarantee a profit by achieving a 'balanced book', either by getting an equal number of bets for each outcome or (when they are offering odds) by getting the amounts wagered on each outcome to reflect the odds. When a large bet comes in, a bookmaker may also try to lay off the risk by buying bets from other bookmakers. Bookmakers do not generally attempt to make money from the bets themselves but rather by acting as market makers and profiting from the event regardless of the outcome. Their working methods are similar to that of an actuary, who does a similar balancing of financial outcomes of events for the assurance and insurance industries.
Blank Check Company: A blank check company is a development stage company that has no specific business plan or purpose or has indicated its business plan is to engage in a merger or acquisition with an unidentified company or companies, other entity, or person. These companies typically involve speculative investments and often fall within the definition of "penny stocks" or are considered "microcap stocks" (that trade for fewer than $5 per share).
C.
Customer Identification Program: The CIP is intended to enable the bank to form a reasonable belief that it knows the true identity of each customer.
Countering Financing of Terrorism (CFT): The financing of terrorism is the financial support, in any form, of terrorism or those who encourage, plan or engage in terrorism. Terrorist financing differs from money laundering in that the source of funds can be legitimate. The Banks ways and means to counter terrorism by determining and detecting such activities through manual or software using logical intelligence is the process of countering financing of terrorism.
Cuckoo Smurfing: Cuckoo smurfing is a new laundering technique employing functionaries, or "smurfs", to deposit black money into the bank accounts of unsuspecting individuals or companies.
Concentration Account: A concentration account is an account that a bank uses to aggregate funds from different customers accounts. Concentration accounts are also known as collection, intraday, omnibus, settlement, special-use or sweep accounts.
Correspondent Banking: A financial institution that provides services on behalf of another, equal or unequal, financial institution. A correspondent bank can conduct business transactions, accept deposits and gather documents on behalf of the other financial institution. Correspondent banks are more likely to be used to conduct business in foreign countries, and act as a domestic bank's agent abroad.
Custodian Bank: A custodian bank, or simply custodian, is a specialized financial institution responsible for safeguarding a firm's or individual's financial assets.
Customer due diligence: CDD enable banks to know/understand their customers and their financial dealings better to manage their risks prudently.
Cash Intensive Business: A cash intensive business is one that receives a significant amount of receipts in cash. This can be a business such as a restaurant, grocery or convenience store that handles a high volume of small dollar transactions. It can also be an industry that practices cash payments for services, such as construction or trucking, where independent contract workers are generally paid in cash.
Clearing Account: A Clearing account is usually a temporary account containing costs or amounts that are to be transferred to another account. An example is the income summary account containing revenue and expense amounts to be transferred to retained earnings at the close of a fiscal period.
Chit Fund: It is a kind of savings scheme practiced in India. Chit means a transaction whether called chit, chit fund, chitty, kuree or by any other name by or under which a person enters into an agreement with a specified number of persons that every one of them shall subscribe a certain sum of money (or a certain quantity of grain instead) by way of periodical installments over a definite period and that each such subscriber shall, in his turn, as determined by lot or by auction or by tender or in such other manner as may be specified in the chit agreement, be entitled to the prize amount.
Clearing House: A clearing house is a financial institution that provides clearing and settlement services for financial and commodities derivatives and securities transactions.
Counter-Terrorism Committee: The Counter-Terrorism Committee is a subsidiary body of the United Nations Security Council. In the wake of the 11 September 2001 terrorist attacks in the United States, the United Nations Security Council unanimously adopted resolution 1373, which, among its provisions, obliges all States to criminalize assistance for terrorist activities, deny financial support and safe haven to terrorists and share information about groups planning terrorist attacks.
Currency Transaction Report: A currency transaction report (CTR) is a report that U.S. financial institutions are required to file with FinCEN for each deposit, withdrawal, exchange of currency, or other payment or transfer, “by through or” to the financial institution which involves a transaction in currency of more than $10,000.
Confiscation: Confiscation is seizure and expropriation of private property by a government or its agency as a punishment for breach of a law. In confiscation, a property is expropriated without the consent of its owner and usually without any compensation.
D.
Downstream Correspondent Clearer: A correspondent banking client who receives banking services from an institution and itself provides correspondent banking services to other financial institutions in the same currency as the account it maintains with the institution.
Designated Categories of Offences: As per FATF designated categories of offences mean the following:
Participation in an organised criminal group and racketeering;
Terrorism, including terrorist financing;
Trafficking in human beings and migrant smuggling;
Sexual exploitation, including sexual exploitation of children;
Illicit trafficking in narcotic drugs and psychotropic substances;
Illicit arms trafficking;
Illicit trafficking in stolen and other goods;
Corruption and bribery;
Fraud;
Counterfeiting currency;
Counterfeiting and piracy of products;
Environmental crime;
Murder, grievous bodily injury;
Kidnapping, illegal restraint and hostage-taking;
Robbery or theft;
Smuggling;
Extortion;
Forgery;
Piracy; and
Insider trading and market manipulation
Depository Institution: A depository institution is a financial institution (such as a savings bank, commercial bank, savings and loan associations, or credit unions) that is legally allowed to accept monetary deposits from consumers.
Depository Participant (DP): A Depository Participant (DP) in India is an agent appointed by the Depository i.e. —National Securities Depository Ltd (NSDL) and/or Central Depository Services Ltd (CDSL) and is authorized to offer depository services to all investors. An investor has to open his account through a DP only. Thus, the DP is basically the interface between the investor and the Depository.
Designated Threshold: As per FATF the designated thresholds for transactions (under Recommendations 5 and 12) are as follows:
Financial institutions (for occasional customers under Recommendation 5) - USD/EUR 15,000.
Casinos, including internet casinos (under Recommendation 12) - USD/EUR 3000.
For dealers in precious metals and dealers in precious stones when engaged in any cash transaction (under Recommendations 12 and 16) - USD/EUR 15,000.
Financial transactions above a designated threshold include situations where the transaction is carried out in a single operation or in several operations that appear to be linked
Designated Non-financial Businesses and Professions: Designated non-financial businesses and professions means:
Casinos.
Real estate agents.
Dealers in precious metals.
Dealers in precious stones.
Lawyers, notaries, other independent legal professionals and accountants – this refers to sole practitioners, partners or employed professionals within professional firms. It is not meant to refer to ‘internal’ professionals that are employees of other types of businesses, nor to professionals working for government agencies, who may already be subject to AML/CFT measures.
Trust and Company Service Providers refers to all persons or businesses that are not covered elsewhere under these Recommendations, and which as a business, provide any of the following services to third parties:
Acting as a formation agent of legal persons;
Acting as (or arranging for another person to act as) a director or
Secretary of a company, a partner of a partnership, or a similar
Position in relation to other legal persons;
Providing a registered office; business address or accommodation,
Correspondence or administrative address for a company, a
Partnership or any other legal person or arrangement;
Acting as (or arranging for another person to act as) a trustee of an
Express trust or performing the equivalent function for another
Form of legal arrangement;
Acting as (or arranging for another person to act as) a nominee
Shareholder for another person.
E.
Egmont Group: Recognizing the importance of international cooperation in the fight against money laundering and financing of terrorism, a group of Financial Intelligence Units (FIUs) met at the Egmont Arenberg Palace in Brussels, Belgium, and decided to establish an informal network of FIUs for the stimulation of international co-operation. Now known as the Egmont Group of Financial Intelligence Units, Egmont Group FIUs meet regularly to find ways to promote the development of FIUs and to cooperate, especially in the areas of information exchange, training and the sharing of expertise.
Enhanced Due Diligence (EDD): EDD is done for higher-risk customers i.e., Customers those who pose higher money laundering or terrorist financing risks present increased exposure to banks; due diligence policies, procedures, and processes should be enhanced as a result.
Electronic Funds Transfer (EFT): EFT is the electronic transfer of money from one bank account to another, either within a single financial institution or across multiple institutions, through computer-based systems and without the direct intervention of bank staff.
E-Cash: The primary function of e-cash is to facilitate transactions on the Internet. Many of these transactions may be small in size and would not be cost efficient through other payment mediums such as credit cards.
Extradition: Extradition means sending someone back to the country or state where they've been accused of a crime.
Ex-parte: It refers to those proceedings where one of the parties has not received notice and, therefore, is neither present nor represented. If a person received notice of a hearing and chose not to attend, then the hearing would not be called ex parte.
Express Trust: Express trust refers to a trust clearly created by the settlor, usually in the form of a document e.g., a written deed of trust. They are to be contrasted with trusts which come into being through the operation of the law and which do not result from the clear intent or decision of a settlor to create a trust or similar legal arrangements.
Europol: Europol is the EU law enforcement agency facilitating the exchange of criminal intelligence between police, customs and security services. Europol is coordinating an effective response to international serious crime and terrorism in Europe.
Exempt Account: In some countries, a distinction is granted to certain customers of a financial institution permitting the institution to waive its responsibility to report certain transactions that are otherwise required. Exempt accounts must be documented and the financial institutions that secure the exemptions must still monitor their transactions.
F.
Financial Group: Financial group means a group that consists of a parent company or of any other type of legal person exercising control and coordinating functions over the rest of the group for the application of group supervision under the Core Principles, together with branches and/or subsidiaries that are subject to AML/CFT policies and procedures at the group level.
Foreign Counterparts: Foreign counterparts refers to foreign competent authorities that exercise similar responsibilities and functions in relation to the cooperation which is sought, even where such foreign competent authorities have a different nature or status (e.g. depending on the country, AML/CFT supervision of certain financial sectors may be performed by a supervisor that also has prudential supervisory responsibilities or by a supervisory unit of the FIU).
Freeze: The term freeze means to prohibit the transfer, conversion, disposition or movement of any property, equipment or other instrumentalities on the basis of, and for the duration of the validity of, an action initiated by a competent authority or a court under a freezing mechanism, or until a forfeiture or confiscation determination is made by a competent authority.
FATF: The Financial Action Task Force (FATF) is an inter-governmental body established in 1989 by the Ministers of its Member jurisdictions. The objectives of the FATF are to set standards and promote effective implementation of legal, regulatory and operational measures for combating money laundering, terrorist financing and other related threats to the integrity of the international financial system. The FATF is therefore a “policy-making body” which works to generate the necessary political will to bring about national legislative and regulatory reforms in these areas.
Financial Action Task Force-Style Regional Body (FSRB): Nine FATF-Style Regional Bodies have been established. The FATF-style regional bodies are:
Asia Pacific Group on Money Laundering (APG) based in Sydney, Australia;
Caribbean Financial Action Task Force (CFATF) based in Port of Spain, Trinidad and Tobago;
Eurasian Group (EAG) based in Moscow, Russia;
Eastern & Southern Africa Anti-Money Laundering Group (ESAAMLG) based in Dar es Salaam, Tanzania;
Task Force on Money Laundering in Central Africa (GABAC) based in Libreville, Gabon;
Latin America Anti-Money Laundering Group (GAFILAT) based in Buenos Aires, Argentina;
West Africa Money Laundering Group (GIABA) based in Dakar, Senegal;
Middle East and North Africa Financial Action Task Force (MENAFATF) based in Manama, Bahrain;
Council of Europe Anti-Money Laundering Group (MONEYVAL) based in Strasbourg, France (Council of Europe).
Funds: The term funds refer to assets of every kind, whether corporeal or incorporeal, tangible or intangible, movable or immovable, however acquired, and legal documents or instruments in any form, including electronic or digital, evidencing title to, or interest in, such assets.
Financial Intelligence Units (FIUs): Countries should establish a financial intelligence unit (FIU) that serves as a national centre for the receipt and analysis of: (a) suspicious transaction reports; and (b) other information relevant to money laundering, associated predicate offences and financing of terrorism, and for the dissemination of the results of that analysis. The FIU should be able to obtain additional information from reporting entities, and should have access on a timely basis to the financial, administrative and law enforcement information that it requires to undertake its functions properly. A few major considerations shape the creation of the FIUs: anti-money laundering and counter terrorism financing laws, existing law enforcement, and the need for an authority that will receive, assess and share financial information.
Forfeiture: Automatic loss of ownership right (title) to personal or real property for not complying with a legal provision, or as a court ordered compensation for loss or damage to a plaintiff. Forfeiture clause in a lease gives the lessor the right to cancel the lease and re-enter the property on non-payment of rent.
Front Company: It is the company used by the money launderer for the purpose of concealing the true identity of the owner.
FINCEN: FinCEN's mission is to safeguard the financial system from illicit use and combat money laundering and promote national security through the collection, analysis, and dissemination of financial intelligence and strategic use of financial authorities.
Fiduciary: A fiduciary is a person who acts, holds assets, or maintains accounts on behalf of (and for the benefit of), another person. A fiduciary has an obligation to take such action or manage such assets or accounts in the best interests of the other person.
Fei Chien: 'Fei Chien' (or 'flying money') is a term used to describe many of the alternative remittance systems in China, as well as the economies of East and South-East Asia with substantial Chinese business networks. The systems involve extensive networks of money dealers in these regions, who transfer money on behalf of clients. The dealers often have clan or family relationships or regional affiliations and typically effect transfers with minimal or no documentation. Like many other alternative remittance systems, fei chien systems are unregulated.
Felony: The federal government defines a felony as a crime punishable by death or imprisonment in excess of one year. If punishable by exactly one year or less, it is classified as a misdemeanor.
G.
Gate Keepers: Gate Keepers is a term that is being applied to qualified professionals such as lawyers, accountants etc that can facilitate the laundering of money or assets to enable the conversion and ultimate inclusion of the assents in legitimate financial circles.
G-7: The Group of Seven industrialized nations: U.S, Japan, Germany, France, Italy, the U.K and Canada.
GAFI: Grupo de Accion Financiera Internacional, Spanish term for Financial Action Task Force.
Grantor: The grantor is the person who creates the trust.
GPML: Through the Global Programme against Money-Laundering, Proceeds of Crime and the Financing of Terrorism, UNODC assists Governments in confronting criminals who launder the proceeds of crime through the international financial system. It also provides Governments, law enforcement authorities and financial intelligence units with strategies to counter money-laundering, advises on improved banking and financial policies and assists national financial investigation services.
Gulf Cooperation Council (GCC): GCC is a political and economic alliance of six Middle Eastern countries—Saudi Arabia, Kuwait, the United Arab Emirates, Qatar, Bahrain, and Oman. The GCC was established in Riyadh, Saudia Arabia, in May 1981. The purpose of the GCC is to achieve unity among its members based on their common objectives and their similar political and cultural identities, which are rooted in Islamic beliefs. Presidency of the council rotates annually.
Gambling: Gambling is used to launder money by trading illegal funds to gamble chips at a casino, which are cashed in again as the proceeds of gambling 'winnings'.
H.
Hawala: 'Hawala' is a term used to describe many of the alternative remittance systems prevalent in the Middle East and South Asia. These systems involve extensive networks of 'hawaladars' or hawala dealers who transfer money on behalf of clients. The hawala dealers often have clan or family relationships or regional affiliations and typically effect transfers with minimal or no documentation. Like many other alternative remittance systems, hawala systems are unregulated. Hawala systems are extensively used to transfer legitimate funds (for example, by workers in the Middle East Gulf states to transfer wage income to family members in South Asia or Africa). These systems are vulnerable to money laundering and terrorist financing.
High-Risk Reviews: High - risk customers are regularly reviewed every year.
Holding Company: A holding company is a corporation whose principal assets are shares in other companies. Holding company structures are often used in legitimate businesses for many reasons, such as separation of different lines of business, tax efficiency, financial structuring and managing cross - border operations.
Hedge Fund: An offshore investment fund, typically formed as a private limited partnership, that engages in speculation using credit or borrowed capital.
Hundi: 'Hundi' is a term used to describe many of the alternative remittance systems prevalent in South Asia (e.g. India, Pakistan) and the Middle East Gulf states. These systems involve extensive networks of money dealers who transfer funds on behalf of clients. The dealers often have clan or family relationships or regional affiliations and typically effect transfers with minimal or no documentation. Like many other alternative remittance systems, hundi systems are unregulated.
Hire Purchase (HP): Hire Purchase or leasing is a type of asset finance that allows firms or individuals to possess and control an asset during an agreed term, while paying rent or instalments covering depreciation of the asset, and interest to cover capital cost.
I.
International Organisations/Transnational Organisations: International organisations are entities established by formal political agreements between their member States that have the status of international treaties; their existence is recognised by law in their member countries; and they are not treated as resident institutional units of the countries in which they are located. Examples of international organisations include the United Nations and affiliated international organisations such as the International Maritime Organisation; regional international organisations such as the Council of Europe, institutions of the European Union, the Organization for Security and Cooperation in Europe and the Organization of American States; military international organisations such as the North Atlantic Treaty Organization, and economic organisations such as the World Trade Organisation or the Association of Southeast Asian Nations, etc.
Integration Stage: The final stage of the money laundering process is termed the integration stage. It is at the integration stage where the money is returned to the criminal from what seem to be legitimate sources. Having been placed initially as cash and layered through a number of financial transactions, the criminal proceeds are now fully integrated into the financial system and can be used for any purpose.
Identity Theft: Identity theft is the deliberate use of someone else's identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person's name.
Introductory Account: An introductory account is an account established for a new customer who has been introduced or referred by an existing customer.
International Business Company: An international business company or international business corporation (IBC) is an offshore company formed under the laws of some jurisdictions as a tax neutral company which is usually limited in terms of the activities it may conduct in, but not necessarily from, the jurisdiction in which it is incorporated.
International Monetary Fund (IMF): The International Monetary Fund (IMF) is an international organization headquartered in Washington, D.C., of "188 countries working to foster global monetary cooperation, secure financial stability, facilitate international trade, promote high employment and sustainable economic growth, and reduce poverty around the Globe.
International Finance Corporation (IFC): IFC, a member of the World Bank Group, is the largest global development institution focused exclusively on the private sector in developing countries. Clients view IFC as a provider and mobilizer of scarce capital, knowledge, and long-term partnerships that can help address critical constraints in areas such as finance, infrastructure, employee skills, and the regulatory environment. IFC is also a leading mobilizer of third-party resources for its projects.
INTERPOL: The word 'INTERPOL' is radio-telegraph code for the International Criminal Police Organization which consists of 188 member countries who have agreed to "ensure and promote the widest possible assistance between all criminal police authorities in the prevention and suppression of ordinary law crimes". The Organization's headquarters is in Lyon, France.
International Bank for Reconstruction and Development (IBRD): The International Bank for Reconstruction and Development (IBRD) is an international financial institution that offers loans to middle-income developing countries. The IBRD is the first of five member institutions that compose the World Bank Group and is headquartered in Washington, D.C., United States. It was established in 1944 with the mission of financing the reconstruction of European nations devastated by World War II. The IBRD and its concessional lending arm, the International Development Association, are collectively known as the World Bank as they share the same leadership and staff.
International organisations/Transnational Organisations: International organisations are entities established by formal political agreements between their member States that have the status of international treaties; their existence is recognised by law in their member countries; and they are not treated as resident institutional units of the countries in which they are located. Examples of international organisations include the United Nations and affiliated international organisations such as the International Maritime Organisation; regional international organisations such as the Council of Europe, institutions of the European Union, the Organization for Security and Cooperation in Europe and the Organization of American States; military international organisations such as the North Atlantic Treaty Organization, and economic organisations such as the World Trade Organisation or the Association of Southeast Asian Nations, etc.
J.
JMLSG: The Joint Money Laundering Steering Group is made up of the leading UK Trade Associations in the Financial Services Industry. Its aim is to promulgate good practice in countering money laundering and to give practical assistance in interpreting the UK Money Laundering Regulations. This is primarily achieved by the publication of industry guidance.
Juvenile Court: A juvenile court (or young offender's court) is a tribunal having special authority to pass judgments for crimes that are committed by children or adolescents who have not attained the age of majority.
Joint Venture: An agreement between two or more firms to undertake the same business strategy and plan of action.
Joint Stock Company: A form of business organization that falls between a corporation and a partnership. The company sells stock, and its shareholders are free to sell their stock, but shareholders are liable for all debts of the company.
Junk Bond: A high-yielding high-risk security, typically issued by a company seeking to raise capital quickly in order to finance a takeover.
K.
KYC: Know your customer (KYC) is the process of a business verifying the identity of its clients. The term is also used to refer to the bank regulation which governs these activities.
Know Your Employee (KYE): To avoid the threat of fraudulent action, effective measures must be accompanied by an effective know your employee (KYE) policy as well.
Kickback: A kickback is a form of negotiated bribery in which a commission is paid to the bribe-taker as a quid pro quo ("something for something") for services rendered.
Kaffirs: South African gold mining shares that trade on the London Stock Exchange.
Kangaroos: Australian Stocks are called Kangaroos.
L.
Letter of Credit: A letter of credit is a document from a bank guaranteeing that a seller will receive payment in full as long as certain delivery conditions have been met. In the event that the buyer is unable to make payment on the purchase, the bank will cover the outstanding amount.
Layering: The process of distancing the placed funds from their illegal origins is known as layering. Money launderers use different techniques to layer funds. These include using multiple banks and accounts, professional intermediaries, corporations and trusts. Funds may be shuttled through a web of many accounts, companies and countries to disguise their origins.
Legal Risks: If financial institutions are used as vehicles for illegal activities by customers, the institutions face the risk of fines, penalties, injunctions and even forced discontinuance of operations.
Legal Persons: Legal persons refers to any entities other than natural persons that can establish
a permanent customer relationship with a financial institution or otherwise own property. This can include companies, bodies corporate, foundations, partnerships, or associations and other relevantly similar entities.
Lock Box: In banking, a lock box is a service offered by commercial banks to organizations that simplifies collection and processing of account receivables by having those organizations' customers' payments mailed directly to a location accessible by the bank.
Letter Rogatory: A letter rogatory or letter of request is a formal request from a court to a foreign court for some type of judicial assistance. The most common remedies sought by letters rogatory are service of process and taking of evidence.
Lead Arranger: The lead arranger is the investment bank or underwriter firm that facilitates and leads a group of investors in a syndicated loan for major financing.
Lead bank: A bank that oversees the arrangement of loan syndication. The lead bank is paid an additional fee for this service, which involves recruiting the members and negotiating the financing terms.
Lead Manager: The lead manager negotiates with the borrower or issuer, assesses market conditions and puts together the syndicate, which lends the money or underwrites the issue. Also called syndicate manager, managing underwriter or lead underwriter.
Loan Back Scheme: One of the most common is the "loan-back" scheme, in which the launderer essentially borrows money from himself. First, he sets up a lending company in a country with few financial regulations. Then he fills its coffers with illegal profits, layered through multiple accounts. When the launderer wants to make a purchase in his home country, he simply "borrows" the money from the overseas lender. This money, once illegal, now appears to be a legitimate loan.
Lock Box: In banking, a lock box is a service offered by commercial banks to organizations that simplifies collection and processing of account receivables by having those organizations' customers' payments mailed directly to a location accessible by the bank.
M.
Money Services Business (MSB): An MSB has specific meanings in different jurisdictions, but generally includes any business that transmits money or representatives of money, provides foreign currency exchange such as Bureau de changes, or cashes cheques or other money related instruments.
MLRO’s: Money Laundering Reporting Officers (MLROs) have a pivotal role to play in ensuring that a firm is compliant with anti-money laundering obligations. They also ensure that the firm has appropriately considered its exposure to anti-money laundering risks and can respond effectively to those risks in a way which minimises the likelihood of criminal, civil or disciplinary sanctions.
Money Market: Part of the capital market established to buy and sell short-term financial obligations. These include federal government treasury bills, short-term Government bonds, commercial paper, bankers’ acceptances and guaranteed investment certificates. Longer-term securities are also traded in the money market when their term shortens to three years.
Mutual Legal Assistance Treaty: A Mutual Legal Assistance Treaty (MLAT) is an agreement between two or more countries for the purpose of gathering and exchanging information in an effort to enforce public laws or criminal laws.
MONEYVAL: was established in September 1997 by the Committee of Ministers of the Council of Europe to conduct self and mutual assessment exercises of the anti-money laundering measures in place in Council of Europe member states, which are not members of the Financial Action Task Force.
Mock Trial on Money Laundering: The UN Office on Drugs and Crime (UNODC) wants to increase the pressure on money launderers. UNODC’s Legal Advisory Programme, in partnership with the Inter-American Drug Abuse Control Commission, launched the initiative, ‘Mock Trial on Money Laundering’, which, in the words of one of its architects, is “designed to make the threat of conviction and confiscation felt”. The objective is to equip criminal justice professionals with the know-how and working tools necessary to crack complex money laundering cases. Front-line investigators, prosecutors and judges are tasked with acting out their respective roles during a simulation trial based on real life events. Guided from A to Z by proven practitioners, the mock trial allows them to measure their case management and courtroom skills against international best practices.
N.
Not for Profit Organisations: A not for profit organization is a type of organization that does not earn profits for its owners. All of the money earned by or donated to a not-for-profit organization is used in pursuing the organization's objectives. Typically, not for profit organizations are charities or other types of public service organizations. Generally, not for profit organizations can apply for a tax-exempt status so that the organization is not subject to most forms of taxation. Donations made to a tax exempt not for profit organization may also be tax-deductible for the donor.
Non-Financial Businesses and Professionals (NFBP): These include casinos, real estate agents, dealers in precious metals, precious stones, lawyers, notaries and other legal professionals, accountants, trust and company service providers.
Non-Cooperative Countries and Territories (NCCT): The principal objective of the Non-Cooperative Countries and Territories (NCCT) Initiative was to reduce the vulnerability of the financial system to money laundering by ensuring that all financial centres adopt and implement measures for the prevention, detection and punishment of money laundering according to internationally recognised standards. The February 2000 NCCTs report laid out the basic procedure for reviewing countries and territories as part of this initiative. The FATF established at that time four regional review groups (Americas, Asia/Pacific, Europe, Africa/Middle East) consisting of representatives from the FATF member governments that served as the main points of contact with the reviewed country or territory. Countries were selected for review based on FATF members’ experience on a priority basis. The jurisdictions to be reviewed were informed of the work to be carried out by the FATF. The review groups gathered relevant laws, regulations and other relevant information, analysed this information against the 25 NCCT criteria, and drafted a report that was sent to the jurisdictions for comment. Each reviewed jurisdiction provided their comments on their respective draft reports. These comments and the draft reports themselves were discussed between the FATF and the jurisdictions concerned during a series of face-to-face meetings. Subsequently, the draft reports were discussed and adopted by the FATF Plenaries.
Nesting: The practice that involves the use of a foreign correspondent bank account by another foreign bank to conduct its own transactions.
Nostro Account: A bank account held in a foreign country by a domestic bank, denominated in the currency of that country. Nostro accounts are used to facilitate settlement of foreign exchange and trade transactions. The term is derived from the Latin word for "ours."
Non-Governmental Organisation: A Non-Governmental Organization (NGO) is an organization that is neither a part of a government nor a conventional for-profit business. Usually set up by ordinary citizens, NGOs may be funded by governments, foundations, businesses, or private persons. Some avoid formal funding altogether and are run primarily by volunteers. NGOs are highly diverse groups of organizations engaged in a wide range of activities, and take different forms in different parts of the world. Some may have charitable status, while others may be registered for tax exemption based on recognition of social purposes. Others may be fronts for political, religious, or other interests.
O.
OFAC: The Office of Foreign Assets Control (OFAC) of the US Department of the Treasury administers and enforces economic and trade sanctions based on US foreign policy and national security goals against targeted foreign countries and regimes, terrorists, international narcotics traffickers, those engaged in activities related to the proliferation of weapons of mass destruction, and other threats to the national security, foreign policy or economy of the United States. OFAC acts under Presidential national emergency powers, as well as authority granted by specific legislation, to impose controls on transactions and freeze assets under US jurisdiction.
Offshore Financial Centre: An offshore financial centre (OFC), though not precisely defined, is usually a small, low-tax jurisdiction specializing in providing corporate and commercial services to non-resident offshore companies, and for the investment of offshore funds.
Offshore Group of Banking Supervisors: The Offshore Group of Banking Supervisors (OGBS) was formed in October 1980, at the instigation of the Basel Committee on Banking Supervision, as an association of the relevant authorities in jurisdictions identified at that time as “offshore finance centers”. The objects of the Group are to cooperate with relevant international organizations in setting and promoting the implementation of international standards for cross-border banking supervision, and for combating money laundering and terrorist financing, to encourage members to apply high standards of supervision based on internationally accepted principles, to conduct mutual evaluations, to participate in the work of FATF and other international organizations, to improve international standards on combating money laundering and financing of terrorism, to continue an active work on implementation of FATF Recommendations and other relevant international standards.
Omnibus Account: An omnibus account is a specific kind of stock holding account that involves multiple investors. In this type of account, the account holder is a “futures merchant” also called a stock broker or money manager, who is holding the investments of various clients in one account which he or she trades on behalf of his or her client base. This way, each of the individual investors does not have his or her name attached to the account, but they are still actual stock holders.
OECD: The Organisation for Economic Co-operation and Development (OECD) is an international economic organisation of 34 countries, founded in 1961 to stimulate economic progress and world trade. It is a forum of countries describing themselves as committed to democracy and the market economy, providing a platform to compare policy experiences, seeking answers to common problems, identify good practices and coordinate domestic and international policies of its members.
Overdrawn Account: Overdrawn Account is a credit account that has exceeded its credit limit or a bank account that has had more than the remaining balance withdrawn.
Over-the-counter (OTC): Over-the-counter (OTC) is a security traded in some context other than on a formal exchange such as the NYSE, TSX, AMEX, etc. The phrase "over-the-counter" can be used to refer to stocks that trade via a dealer network as opposed to on a centralized exchange. It also refers to debt securities and other financial instruments such as derivatives, which are traded through a dealer network. In general, the reason for which a stock is traded over-the-counter is usually because the company is small, making it unable to meet exchange listing requirements. Also known as "unlisted stock", these securities are traded by broker-dealers who negotiate directly with one another over computer networks and by phone. Although Nasdaq operates as a dealer network, Nasdaq stocks are generally not classified as OTC because the Nasdaq is considered a stock exchange. As such, OTC stocks are generally unlisted stocks which trade on the Over-the-Counter Bulletin Board (OTCBB) or on the pink sheets.
P.
Palermo Convention: The United Nations Convention against Transnational Organized Crime, adopted by General Assembly resolution 55/25 of 15 November 2000, is the main international instrument in the fight against transnational organized crime. It opened for signature by Member States at a High-level Political Conference convened for that purpose in Palermo, Italy, on 12-15 December 2000 and entered into force on 29 September 2003. The Convention is further supplemented by three Protocols, which target specific areas and manifestations of organized crime: the Protocol to Prevent, Suppress and Punish Trafficking in Persons, Especially Women and Children; the Protocol against the Smuggling of Migrants by Land, Sea and Air; and the Protocol against the Illicit Manufacturing of and Trafficking in Firearms, their Parts and Components and Ammunition. Countries must become parties to the Convention itself before they can become parties to any of the Protocols.
Politically Exposed Persons (PEP): "Politically Exposed Person" (PEP) is a term describing someone who has been entrusted with a prominent public function, or a relative or known associate of that person. A PEP generally presents a higher risk for potential involvement in bribery and corruption by virtue of their position and the influence that they may hold.
Predicate Offences: Crimes underlying money laundering or terrorist financing activity. These may include drug trafficking, gambling and prostitution rings, arms trade, smuggling, and even embezzlement, insider trading, bribery etc.
Placement Stage of Money Laundering: The placement stage represents the initial entry of the "dirty" cash or proceeds of crime into the financial system. Generally, this stage serves two purposes: (a) it relieves the criminal of holding and guarding large amounts of bulky of cash; and (b) it places the money into the legitimate financial system. It is during the placement stage that money launderers are the most vulnerable to being caught. This is due to the fact that placing large amounts of money (cash) into the legitimate financial system may raise suspicions of officials.
Passive Trust: Passive trust is a trust in which the trustee has no active duties to perform. In a passive trust the trustee has no duty other than to transfer the property to the beneficiary. The retention of legal title is not essential to the performance of any duty imposed upon the trustee. Passive trust is also termed as dry trust or nominal trust or simple trust.
"Payable Through" Accounts: Also called "pass through" accounts or "pass by" accounts, these generally are checking accounts marketed to foreign banks that otherwise would not have the ability to offer their customers access to the U.S. banking system. Some U.S. banking entities process thousands of checks on accounts where signature cards have been completed abroad and submitted in bulk. These U.S. banking entities may have undertaken little or no effort to independently obtain or verify information about the individuals and businesses that use the accounts. Federal regulators are concerned that the use of "payable through" accounts may contribute to unsafe and unsound banking practices and other misconduct, including money laundering and related criminal activities.
Poey Kuan: The Alternative Remittance System (ARS) used in Thailand.
Private Investment Company: A Private Investment Company (PIC), also known as an Offshore Company, is a corporation established to hold investment assets. A PIC is typically incorporated in a tax-neutral offshore jurisdiction such as the British Virgin Islands (BVI) and Cayman Islands.
Private Banking: Private banking is banking, investment and other financial services provided by banks to high-net-worth individuals who enjoy high levels of income or invest sizable assets.
Pyramid/Ponzy Scheme: Pyramid Schemes and Ponzi Schemes share many similar characteristics in which unsuspecting individuals are fooled by unscrupulous investors who promise extraordinary returns. However, in contrast to a regular investment, these types of schemes can offer consistent "profits" only as long as the number of investors continues to increase. Ponzi and pyramid schemes are self-sustaining as long as cash outflows can be matched by monetary inflows. The basic difference arises in the type of products that schemers offer their clients and the structure of the two ploys.
R.
Reports on the Observance of Standards and Codes (ROSCs): ROSCs summarize the extent to which countries observe certain internationally recognized standards and codes. The IMF has recognized 12 areas and associated standards as useful for the operational work of the Fund and the World Bank. These comprise accounting; auditing; anti-money laundering and countering the financing of terrorism (AML/CFT); banking supervision; corporate governance; data dissemination; fiscal transparency; insolvency and creditor rights; insurance supervision; monetary and financial policy transparency; payments systems; and securities regulation; AML/CFT was added in November 2002. Reports summarizing countries' observance of these standards are prepared and published at the request of the member country. They are used to help sharpen the institutions' policy discussions with national authorities, and in the private sector (including by rating agencies) for risk assessment. Short updates are produced regularly and new reports are produced every few years.
Risk Based Approach: A risk-based approach is a process that allows you to identify potential high risks of money laundering and terrorist financing and develop strategies to mitigate them.
Risk Matrix: Risk Matrix is a tool used to identify potential risks of money laundering and terrorist financing of a customer profile based on the following information available with the banks:
Geographical Area
Products offered
Type of Customer
Channels of Distribution
Respondent Bank: The bank which maintains account with correspondent bank.
Red Flag: A potentially suspicious or money laundering situation raises a Red Flag or a warning signal.
S.
Shell Bank: A shell bank is a term that describes a financial institution that does not have a physical presence in any country.
Smurfing: Smurfing is the practice of executing financial transactions (such as the making of bank deposits) in a specific pattern calculated to avoid the creation of certain records and reports required by law, such as the United States' Bank Secrecy Act (BSA).
SAR: A Suspicious Activity Report (SAR) is a document that financial institutions must file with the FIU's following a suspected incident of money laundering or fraud.
SWIFT: The Society for Worldwide Interbank Financial Telecommunication (SWIFT) provides a network that enables financial institutions worldwide to send and receive information about financial transactions in a secure, standardized and reliable environment.
Stored Value Card (SVC): A Stored Value Card (SVC) is a card-based electronic alternative to cash. It uses a "smart card" that contains a microprocessor computer chip that both stores electronic currency and processes financial transactions.
Structuring: It is illegal act of splitting cash deposits or withdrawals into smaller amounts, or purchasing monetary instruments, to stay under a currency reporting threshold.
Subpoena: A subpoena (pronounced "suh-pee-nuh") is a request for the production of documents, or a request to appear in court or other legal proceeding.
Self-Regulatory Organization (SRO): A not-for-profit or non-profit organization that is authorized to develop and enforce regulations for an industry is called a Self-Regulatory Organization. Financial Accounting Standards Board or (FASB), International Accounting Standards Board or (IASB) and the National Futures Association or (NFA) are all examples of self-regulatory organizations. Since the SRO has some regulatory influence over an industry or profession, it can often serve as a watchdog to guard against fraud or unprofessional practices.
Settlor: Settlor is a person who makes a settlement, especially of property in establishing a trust.
Smart Card: A smart card is a device that includes an embedded integrated circuit chip (ICC) that can be either a secure microcontroller or equivalent intelligence with internal memory or a memory chip alone. Smart cards can provide personal identification, authentication, data storage, and application processing.
Safe Deposit Box: A safe deposit box, otherwise known as safety deposit box, is an individually-secured container, usually held within a larger safe or bank vault. Safe deposit boxes are generally located in banks, post offices or other institutions. Safe deposit boxes are used to store valuable possessions, such as gemstones, precious metals, currency, marketable securities, important documents such as wills, property deeds, and birth certificates, or computer data storage that need protection from theft, fire, flood, tampering, or other perils.
T.
Tax Haven: A tax haven is a state, country, or territory where, on a national level, certain taxes are levied at a very low rate or not at all. It also refers to countries which have a system of financial secrecy in place.
Testimony: In the law, testimony is a form of evidence that is obtained from a witness who makes a solemn statement or declaration of fact. Testimony may be oral or written, and it is usually made by oath or affirmation under penalty of perjury.
Tipping off: Tipping off is where a person knowing or suspecting that a disclosure has been made to the FIU, or a compliance officer, then discloses to any other person any matter that is likely to prejudice an investigation which might be conducted as a result. Tipping off is a criminal offence.
Transparency International: Transparency International (TI) is a non-governmental organization that monitors and publicizes corporate and political corruption in international development. Originally founded in Germany in May 1993 as a not-for-profit organization, Transparency International is now an international non-governmental organization. It publishes an annual Global Corruption Barometer and Corruption Perceptions Index, a comparative listing of corruption worldwide. The headquarters are located in Berlin, Germany.
Terrorism Financing: Terrorism financing is an activity that provides financial support to designated terrorist groups. Laws attempt thwarting the financing of terrorism (CFT) and anti-money laundering (AML). Initially the focus of CFT efforts was on non-profit organizations, unregistered money services businessess (MSBs) (including so called underground banking or ‘Hawalas’) and the criminalisation of the act itself. The Financial Action Task Force on Money Laundering (FATF) made nine special recommendations for CFT (first eight then a year later added a ninth). These nine recommendations have become the global standard for CFT and their effectiveness is assessed almost always in conjunction with anti-money laundering.
Tax Evasion: Tax evasion or tax fraud is the purposeful illegal attempt of a taxpayer to evade payment of a tax imposed by the government. Conviction of tax evasion may result in fines and imprisonment.
Tax Avoidance: Tax avoidance is the legal usage of the tax regime in a single territory to one's own advantage to reduce the amount of tax that is payable by means that are within the law.
Trade Finance: Trade finance signifies financing for trade, and it concerns both domestic and international trade transactions. A trade transaction requires a seller of goods and services as well as a buyer. Various intermediaries such as banks and financial institutions can facilitate these transactions by financing the trade.
U.
United Nations Office on Drugs and Crime: UNODC regularly provides global statistical series on crime, criminal justice, drug trafficking and prices, drug production, and drug use. Data produced by UNODC have multiple sources. Member States regularly submit to UNODC statistics on drugs (through the Annual Report Questionnaire) and crime and criminal justice (through the Crime Trend Survey). Other data are collected through national surveys implemented by UNODC in cooperation with national governments or are compiled from scientific literature. UNODC also applies scientific methods to maximize the comparability of the data and estimate regional and global statistics.
Underground Banking: Underground banking is a generic term used to describe any informal banking arrangements which run parallel to, but generally independent of, the formal banking system.
USA PATRIOT Act: The USA PATRIOT Act is an Act of Congress that was signed into law by President George W. Bush on October 26, 2001. Its title is a ten-letter backronym (U.S.A. P.A.T.R.I.O.T.) that stands for "Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001".
Underwriting Process: Process used to analyze the financial condition of the organization and its project (where applicable) in conjunction with the terms and conditions of a loan and the ability of a loan applicant to meet those terms and conditions See credit analysis.
Under pricing: Under pricing is issue of securities below their market value.
Unit: Just as shares represent the extent of equity ownership in a company, units represent extent of ownership in a mutual fund.
V.
Venture Capital Funds: Firms invest in small start-up companies or in the expansion of existing private, unlisted companies. Their investments are high risk; the returns can be high but so can the failure rate. Venture capital firms obtain their funding from private investors or institutional investors. Profits are often taken when the company is floated in an initial public offering (IPO).
Vienna Convention: The Convention against Illicit Traffic in Narcotic Drugs and Psychotropic Substances ("the Vienna Convention") was signed in 1988 under the auspices of the United Nations and became effective in November 1990. The signatories, which included the G7 and European Union countries, agreed to join together to combat the laundering of the proceeds of drug trafficking. The measures included the criminalisation of money laundering and enhanced international cooperation together with the commitment of signatories to procure that the laws of their jurisdictions should be amended to bring this about. In addition, an international body was established to oversee the implementation of the principles of the Vienna Convention. This organisation is known as the Financial Action Task Force (FATF) and is based in Paris. Later, what began as an international effort to combat the laundering of proceeds of drug crime was formally extended to the laundering of proceeds of other serious offences at the meeting of FATF in June 1996.
Vostro Account: A Vostro Account is one in which the domestic bank (from the point of view of the currency in which the account is held) acts as custodian or manages the account of a foreign counterpart.
Volcker Rule: A federal regulation that prohibits banks from conducting certain investment activities with their own accounts, and limits their ownership of and relationship with hedge funds and private equity funds, also called covered funds.
W
Wash Sale: A transaction where an investor sells a losing security to claim a capital loss, only to repurchase it again for a bargain. Wash sales are a method investors employ to try and recognize a tax loss without actually changing their position.
Wash-Sale Rule: An Internal Revenue Service (IRS) rule that prohibits a taxpayer from claiming a loss on the sale or trade of a security in a wash sale. The rule defines a wash sale as one that occurs when an individual sells or trades a security at a loss, and within 30 days before or after this sale, buys a “substantially identical” stock or security, or acquires a contract or option to do so. A wash sale also results if an individual sells a security, and the spouse or a company controlled by the individual buys a substantially equivalent security.
White-Collar Crime: White-collar crime refers to financially motivated nonviolent crime committed by business and government professionals. Within criminology, it was first defined by sociologist Edwin Sutherland in 1939 as "a crime committed by a person of respectability and high social status in the course of his occupation".
Wash Trade: A wash trade (not to be confused with a wash sale) is a form of market manipulation in which an investor simultaneously sells and buys the same financial instruments. Claiming tax deductions for losses resulting from wash trading is illegal.
Warrants: A warrant is like an option. It gives the holder the right but not the obligation to buy an underlying security at a certain price, quantity and future time. Companies will often include warrants as part of a new-issue offering to entice investors into buying the new security. A warrant can also increase a shareholder's confidence in a stock, provided the underlying value of the security actually does increase over time.
Wilful Blindness: Wilful blindness is the "deliberate avoidance of knowledge of a crime
Wolfsberg Group: The Wolfsberg Group is an association of thirteen global banks which aims to develop frameworks and guidance for the management of financial crime risks, particularly with respect to Know Your Customer, Anti-Money Laundering and Counter Terrorist Financing policies.
World Bank: The World Bank is an international financial institution that provides loans to developing countries for capital programs. It comprises two institutions: the International Bank for Reconstruction and Development (IBRD), and the International Development Association (IDA). The World Bank is a component of the World Bank Group, which is part of the United Nations system.
X.
Xetra: An all-electronic trading system based in Frankfurt, Germany. Launched in 1997 and operated by the Deutsche Börse, the Xetra platform offers increased flexibility for seeing order depth within the markets and offers trading in stocks, funds, bonds, warrants and commodities contracts. The Xetra system was originally created for use on the Frankfurt Stock Exchange, but has expanded to be used by various stock exchanges throughout Europe.
Y
Yo-Yo: Slang for a very volatile market. A yo-yo market will have no distinguishing features of either an up or down market, taking on characterstics of both. Security prices in a yo-yo market will swing very high to low over a given period of time, making it difficult for buy and hold investors to profit.
Yield: The income return on an investment. This refers to the interest or a dividend received from a security and is usually expressed annually as a percentage based on the investment's cost, its current market value or its face value.
Year To Date: The period beginning January 1st of the current year up until today's date.
Z:
Zombie Bank: A bank or financial institution with negative net worth. Although zombie banks typically have a net worth below zero, they continue to operate as a result of government backings or bailouts that allow these banks to meet debt obligations and avoid bankruptcy. Zombie banks often have a large amount of nonperforming assets on their balance sheets, which make future earnings very unpredictable.
ZMK (Zambian Kwacha): The currency abbreviation for the Zambian kwacha (ZMK), the currency for Zambia. The Zambian kwacha is made up of 100 ngwee and is often presented with the symbol ZK. The name kwacha is based on the word "dawn" in the Nyanja language.