Prevention of Financial Crime in Digital Space: Role of Financial Institutions MD IKRAMUL HASAN Joint Director Bangladesh Financial Intelligence Unit 1. Theoretical concept A. Financial crime refers to illegal acts committed by an individual or a group of individuals to obtain a financial or professional advantage. The principal motive in such crimes is economic gain (Europol). Financial crimes can be different types, such as: Fraud Forgery Counterfeiting Identity theft Loan or Credit Fraud Breach of Trust Cheque Fraud Credit card & ATM Fraud Extortion/Kidnapping Ransomware Corruption and Bribery Embezzlement of public fund Embezzlement of Cooperative Fraud Abuse of NGO/NPO fund Money laundering Transaction laundering Trade based money laundering Evasion of tax, customs duty or VAT B. Cybercrime is perpetrated using of ICT to either target networks, systems, data, websites and/or technology or facilitate a crime (Goodman & Brenner, 2002). Cybercrime can generally be divided into two categories: crimes that targets networks or devices, e.g. virus, malware, DoS attacks crimes that uses networks or devices to commit other criminal activities, e.g. cyber-stalking, phishing email, identity theft The major categories of cyber crime include: Denial-of-service attack: make an online service unavailable and take the network down Botnets: networks of compromised computers that are controlled externally by remote hackers Social Engineering: make direct contact usually as a customer service agent to gain your confidence and Identity Theft: gain access to a user’s persona/confidential info Phishing: send malicious email attachments or URLs to gain access to accounts or computer Cyber-stalking: harass or intimidate a user and instill fear Prohibited/Illegal Content: share and distribute highly distressing and offensive content Online Scams: ads or spam emails that promises of rewards or offers of unrealistic amounts of money Exploit Kits: inject bug in the code of a software to gain control of a user’s computer Cyber-extortion: an attack or threat of an attack for money Cyber-espionage: hacks into systems or networks to gain access to confidential information Malicious software: viruses, worms, malware, ransomware, spyware Prevention of Financial Crime in Digital Space | Md. Ikramul Hasan, JD, BFIU 1 From the victim point of view, cybercrimes can be four types: Individual, Government, Organization and Property C. Financial Cybercrime is a combination of financial crime, hacking, and social engineering committed over cyberspace for the sole purpose of illegal economic gain (Nicholls et al., 2016). it affects a person or an organization or a nation's financial health. The recent typologies of financial cybercrime: Cyber heist by abusing SWIFT system Cyber Heist by abusing ATM, and Cyber heist by abusing credit and debit cards D. Cyber-laundering is the use of the internet to launder proceeds of crime or fund terrorist acts (APG). According to the APG Typology Report 2018, six most prevalent methods of Cyber-laundering in the AsiaPacific region are: Use of social media Identity theft Online gambling Int’l Wire Transfer Fraud (Money Mules) Business email compromise Online Lottery Scam 2. Extent & Vulnerability of Cybercrime The statistics published by different sources shows the alarming extent & risk of cybercrime in the financial sector. One cyber attack happens in every 14 seconds It takes 3 months on average to identify a cyber attack 70% of all cybercrime is committed in the financial sector 62% of the countries have no cyber security strategy in place $2 trillion potential damage from cyber attacks in the financial sector The average annual cost of cybercrime is the highest in the banking industry – $18.3 million. The financial institutions face two types of vulnerabilities of cybercrime: Technology vulnerabilities: Technology, hardware and software have flaws – financial institutions cannot always respond to fix these flaws as quickly as they should due to cost and resource constraints. Good governance processes is needed to mitigate this risks. Fleshware vulnerabilities: Attackers have found it is much easier to hack the humans (staff and clients). They exploit emotions, lack of knowledge, greed etc. ( Social Engineering) and use technology to trick humans (Phishing emails, malware, ATM card skimming, etc.). Improving security awareness is the key to making the situation better. Prevention of Financial Crime in Digital Space | Md. Ikramul Hasan, JD, BFIU 2 A study of BIBM published in June 2022 shows that banks in Bangladesh face 145-630 cyber attacks daily and 49% of these attacks come from three sources – China, North Korea and Russia; Cybersecurity risk is high in 52% banks. 3. Legal Instruments to Combat Cybercrime A. International Instruments — Budapest Convention on Cybercrime, 2001 (EU) — Int’l Convention on Countering the Use of ICT for Criminal Purposes (under formulation by United Nations; it can be adopted by the UN in 2024 ) B. Domestic Acts & Rules — Digital Security Act, 2018 — ICT Act 2006 (Amd. 2009 & 2013) — Penal Code 1860 — MLPA 2012 — MLAA 2013 C. Domestic Policy/Guidelines — National ICT Policy 2018 — Cyber Security Strategy — BNDA Directives — Guideline on ICT Security for Banks and NBFIs 2015 — Govt. Email Policy 2018 — Information Security Policy Guideline — Govt. Information Security Manual (GoISM) D. BFIU Circular 26/2020 Prevention of Financial Crime in Digital Space | Md. Ikramul Hasan, JD, BFIU 3 4. Preventive measures to combat Cybercrime A. Individual Level: — Be smart with password — Keep software updated — Keep some information private — Keep up to date on major security breaches — Strengthen home network and use VPN or security software — Encrypt and back up most important data — Enable multifactor authentication — Be vigilant when browsing websites and entering credentials — Be careful using public wi-fi — Deal smartly with phishing mail — Keep an eye on the kids — Know what to do if you become a victim B. Institutional Level: — Follow industry best practices and guidelines — Develop, implement and enforce security policies — Ensure a up-to-date IT infrastructure — Ensure robust security measures — Regularly assess and test systems — Educate employees and require compliance — Expand views of cyber risk to include real-world implications — Multi-factor and risk-based authentication C. National Level: — Legislate laws and policy — Ensure coordination and collaboration between agencies — Capacity building — Promote international cooperation 5. Role of financial institutions to combat financial cybercrime & cyber-laundering — — — — — Risk Assessment Customer due diligence Know Your Employee Transaction Monitoring Monitoring new/dormant accounts — — — — — Prevention of Financial Crime in Digital Space | Md. Ikramul Hasan, JD, BFIU Examine attempted/failed transaction Sanctions screening Adverse media screening Use of Red Flags Immediate Reporting 4