Economic Crime Institute Conference Find the Fraudster/Money Launderer Anti Money Laundering Basics Presentation by: Christopher L. King, CFE, CAMS My comments and opinions offered during this conference are my own and do not represent in any way those of my employer or other affiliations I have with other organizations. 21st Annual ECI Conference Session Agenda • Discuss Anti-Money Laundering (AML ) terms. • Review red flags of potential suspicious activity related to money laundering. • Summarize related laws, regulations, sanctions and penalties. • Identify the minimum requirements for an AML Program. • Discuss case studies. 21st Annual ECI Conference Money Laundering and Terrorist Financing Overview Money Laundering Overview What is Money Laundering? Money laundering is defined as the criminal practice of making funds from illegal activity appear legitimate. Money launderers attempt to do this by disguising the sources, converting cash to other forms, or moving money to places where it is less likely to attract attention. Although money laundering is a diverse and often complex process, it generally involves three stages: placement, layering, and/or integration. Placement Layering Integration Money Laundering and Terrorist Financing Overview Three Money Laundering: Basic Terminology Stages of Through these stages, funds appear to be proceeds from legal activities. Three stages: Placement Layering Integration Placement is the introduction of unlawful proceeds into the financial system. Structuring, which is considered a type of placement activity, is any attempt to evade legal reporting requirements for cash/currency transactions conducted with a financial institution. Examples of structuring may include, but are not limited to: • Cashing checks for amounts just below reporting or recordkeeping thresholds. • Dividing large amounts of cash/currency into smaller sums that fall below reporting or recordkeeping thresholds and then depositing the funds directly into a bank account on one or more days, in any manner. Money Laundering and Terrorist Financing Overview Three Stages of Money Laundering Money Laundering: Basic Terminology (continued) Through these stages, funds appear to be proceeds from legal activities. Three stages: Placement Layering Integration Layering involves moving funds around in the financial system in order to conceal the origin of the funds. Examples include, but are not limited to: • Exchanging monetary instruments for larger or smaller amounts. • Wiring or transferring funds. • Buying or selling securities through numerous accounts. • Obtaining a loan in one or more financial institutions. Integration is the ultimate goal of the money laundering process. In this stage, the illicit funds may appear legitimate and are often used to purchase other assets, for example: • Real estate or other assets • Securities investments • Cash Intensive Businesses Money Laundering and Terrorist Financing Overview Case Study: Placement, Layering, and Integration Money Laundering: Basic Terminology (continued) The following case study details how four university students involved in an international money laundering ring, moved millions of dollars of illicit drug proceeds through financial institutions. Placement The initial account was opened by a NJ university student who stated that he was unemployed. Days after establishing the account, wire transfers were received from two travel agencies, “Trav-L Bound” in Greece, and “Vizit the World” in Portugal. Both fictitious travel agencies were created by the students as front companies to launder illicit drug proceeds. In the following months, the account continued to receive multiple high-dollar wire transfers from Greece and Portugal. Layering Once the wires were received, the student transferred the funds to three other students who held accounts at other financial institutions. Using the funds, the students wrote small-dollar checks payable to the travel agencies, purchased multiple traveler’s checks and pre-paid debit cards, and mailed them to the travel agencies. The students also deliberately over paid their tuition/ books to receive refund checks issued by the university. Integration The university refund checks were then comingled with the wired funds. The combined funds were used to pay for the students living expenses, luxury items, investments, and advertising to make the travel agencies look legitimate. Money Laundering and Terrorist Financing Overview Case Study:ofPlacement, and Integration Comparison Organized Layering, Crime to Terrorist Financing Organized Crime Terrorist Groups • • • • • • • • • • • • • Motivated by profit/greed Seek economic ends Engage in corruption Network and cell based structure Requires safe-havens Needs to recruit new members Requires specialists Group identity important Threat of violence Select targets that pose threat to the group Avoid public attention Money laundering essential operating tool • • • • • • • • • • • Motivated by ideology Seek political ends Engage in corruption Network and cell based structure Requires safe-havens Needs to recruit new members Requires specialists Group identity important Threat of violence Select symbolic targets Seek public attention Money laundering essential operating tool Money Laundering and Terrorist Financing Overview The BasicsTerrorist of Terrorist Financing Terrorist financing is the financial support of terrorism or of those who encourage, plan, or engage in terrorism. The intent of terrorism is to intimidate people, governments, or international organizations to do, or refrain from doing, any act through the threat of violence. Examples of Legitimate Funding Sources: • Business ownership • Personal employment • Government, charitable or relief funds Funding Sources Used by Terrorists Examples of Unlawful Funding Sources: • Extortion • Fraud • Kidnapping • Theft • Smuggling • Robbery • ID Theft • Narcotics Trafficking Terrorist groups seek to develop and utilize legitimate and unlawful sources of funding that are relatively mobile to ensure that funds can be used to obtain material and other logistical items needed to commit terrorist acts. Money Laundering and Terrorist Financing Overview Learning Check Let’s Review Which statement is true about money laundering? Laundered funds are always derived from legitimate sources, such as charities. Layering is the way money launderers withdraw funds from the financial system. Money laundering is an economic problem only impacting financial institutions within the U.S. Structuring is a crime that involves dividing large amounts of cash/currency into smaller sums that fall below reporting or recordkeeping thresholds and then depositing the funds directly into a bank account on one or more days, in any manner. Money Laundering and Terrorist Financing Overview Learning Check Let’s Review From the examples below, select three schemes that could be used by money launderers to move illegal funds. Smuggling bulk currency out of the U.S. to evade currency reporting requirements Falsifying the value or quantity of shipments Requesting a payment to be made to a company’s head office located in the same country Moving illicit funds between countries through wire transfers Detecting and Escalating Suspicious Activity Detecting and Escalating Suspicious Activity Red flags are signals of potentially unusual or suspicious transactions or other activities that should raise the level of suspicion and may call for further escalation. The mere presence of a red flag is not necessarily evidence of money laundering or terrorist financing activity. However, it does indicate that further review should be performed before proceeding to determine if the activity in question has a reasonable or legitimate purpose. It is important to know the customer because what might be a red flag for one customer, may be normal business for another. If a reasonable explanation is not determined, the suspicious transactions or other activities should be escalated for further investigation Detecting and Escalating Suspicious Activity Red F Detecting and Escalating Suspicious Activity lags for Suspicious Activity These examples may help to recognize money laundering schemes. Examples of Potentially Suspicious Activities Examples of Potentially Suspicious Transactions • Activity inconsistent with customer’s business • Automated Clearing House (“ACH”) • Customer provides insufficient or suspicious information • Excessive Cash • Efforts to avoid reporting or recordkeeping requirements • Irregular Lending activity • Other suspicious activity • Funds Transfers • Shell Company • Trade Finance Red F Suspicious Activity Reporting (SAR) Filing Triggers lags for Suspicious Activity A timely and accurate SAR must be filed with FinCEN when any of the following circumstances are discovered: Insider abuse involving any dollar amount (regardless of whether there is a loss to the institution). Violations aggregating $5,000 or more where a suspect can be identified. Violations aggregating $25,000 or more regardless of a potential suspect. Transactions aggregating $5,000 or more that involve potential money laundering or violations of the BSA. The Money Services Business threshold is $2,000). Understand differences between 30 days and 60 day filing requirement (suspect and no suspect identified). Laws and Penalties Red F Money Laundering AML and Regulations Terrorist Financing Laws lags for Suspicious Activity Money laundering and terrorist financing laws help safeguard the U.S. financial system from these and other illicit financial crimes. These acts provide law enforcement officials with more tools to investigate, prosecute, and penalize money launderers and terrorist financiers. Bank Secrecy Act USA PATRIOT ACT* • Financial institutions must identify the source, volume, and movement of currency and other monetary instruments deposited into financial institutions or transmitted into or out of the U.S. • Financial institutions must file currency transaction reports for transactions over designated thresholds. Currency transaction reports are used to identify individuals or entities conducting cash transactions and to maintain a paper trail. • Financial institutions must report suspicious activity that involves money laundering or other criminal activity. • Enhanced the criminalization of terrorist financing. • Established requirements for a customer identification program. • Required financial institutions to have due diligence procedures, and in some cases, enhanced due diligence procedures for certain accounts. • Improved information sharing between financial institutions and the U.S. government. *Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Laws and Penalties Red F AML Penalties and Enforcement Actions Federal banking agencies, securities regulators, the Department of Justice, and FinCEN can bring criminal and civil money penalties against financial institutions and individuals for violations of the Bank Secrecy Act (“BSA”). U.S. penalties may include, but are not limited to: • Financial institutions can lose their charters. • Financial institution employees can be removed and barred from banking. • Individuals convicted of money laundering or terrorist financing can face up to 20 years in prison and a fine of up to $500,000 per count. • Property involved in money laundering or terrorist financing may be subject to forfeiture.* • Criminal penalties may apply for willful blindness violations, failure to implement regulations, and for structuring transactions to evade BSA reporting requirements. *Asset forfeiture has proved to be an important tool in the fight against money laundering by removing the profits of illegal activities from criminals. In some cases, funds have been returned to the victims of fraud. Laws and Penalties Office of Foreign Assets Control (OFAC) As of July 2010, the following list of countries and territories have economic sanctions and prohibitions against them: • Balkans* • Belarus* • Burma • Cote d’lvoire (Ivory Coast*) • Cuba • Democratic Republic of the Congo* • Iran • Iraq* • Liberia* • North Korea • Somalia • Sudan • Syria • Zimbabwe* *The sanction programs for these OFAC countries and territories target specific named entities or persons on OFAC's Specially Designated Nationals list. Know Your Customer Section 326 of the USA PATRIOT Act The Customer Identification Program (“CIP”) is intended to enable financial institutions to form a reasonable belief that they know the true identity of their customers. Financial institutions are held accountable for the effectiveness of their CIP, ongoing customer due diligence efforts, and their ability to record the steps taken to verify customers’ identities. At a minimum, the USA PATRIOT Act requires financial institutions to implement procedures for the following: Obtain Customer identification information, such as name, physical street address, date of birth, government –issued ID number. Verify The identity of each customer to the extent reasonable and practicable , and Maintain records of the information used to verify the customer’s identity. Click here for additional information. Summary of BSA/AML Program Elements • • • • • • • • • • Risk-based policies, procedures and controls reasonably designed to prevent, detect and report money laundering. Periodic (formal) risk assessment, which considers geography, customer type, products, services and transactions. The policies, procedures and controls noted above are designed and implemented to address the risks identified in the risk assessment. Regulatory examinations include a review of the risk assessment. A Customer Identification Program (Section 326 of the USA PATRIOT Act), to ensure that the institution can reach a reasonable determination that it knows the true identity of its customer. Transaction monitoring, including applicable record-keeping requirements and reporting of Suspicious Activity (and other reports required by the BSA, e.g., Currency Transaction Reports). Policies, procedures and controls designed to ensure compliance with requirements of the Office of Foreign Assets Control and related laws and regulations. The designation of an AML Compliance Officer. An appropriate AML training program. Independent testing of the program. Appropriate infrastructure to allow for and facilitate escalation of important issues, supervision, consequence management, communication with law enforcement. Case Studies • Note: there are three case study examples for this portion of the session. • Place the case studies in order, based on the number of red flags present. • We will discuss each of the three cases in small break-out groups. 21st Annual ECI Conference Case Studies (1) • A wire transfer from an account in the Middle Eastern Geographic area is being sent from another bank to a customer. 21st Annual ECI Conference Case Studies (2) • Activity is noted on a bank account as follows: • Deposits Tuesday, August 03, 2010 $10,000.00 Branch # 1Modesto CA Tuesday, August 03, 2010 $7,000.00 Branch #2Modesto CA Tuesday, August 03, 2010 $9,000.00 Branch #3Modesto CA Monday, August 09, 2010 $10,000.00 Branch #1Modesto CA Wednesday, August 11, 2010 $9,000.00 Branch #4Modesto CA Friday, August 13, 2010 $10,000.00 Branch #4Modesto CA Wednesday, August 18, 2010 $9,000.00 Branch #1Modesto CA Friday, August 20, 2010 $10,000.00 Branch #4Modesto CA • Withdrawals 8/04/2010 for $6,500 Branch # 5 and # 6 Sun City, AZ 8/04/2010 for $5,000 Branch #5 Sun City, AZ 8/04/2010 for $5,000 Branch #5 Sun City, AZ 8/04/2010 for $900 Branch #5 Sun City, AZ 8/04/2010 for $500 Branch #5Sun City, AZ 8/05/2010 for $4,600 Branch #5 & #6 Sun City, AZ 21st Annual ECI Conference Case Studies (3) • A report is received that a customer brought in some currency that smelled funny. Besides the customers’ pedigree and account information, there are no additional details listed in the referral. 21st Annual ECI Conference Links to Additional Resources • Bank Secrecy Act Regulations – FFIEC/BSA Info Base – 31 CFR 103 BSA Reporting Requirements • A Selection of AML Groups/Organizations: – ACAMS (Association of Certified Anti-Money Laundering Specialists) – FATF (Financial Action Task Force) – FinCEN (Financial Crimes Enforcement Network) – OFAC (Office of Foreign Assets Control) – Wolfsburg Group 21st Annual ECI Conference