Comparing Terrorist Financing and Resourcing: Indicators for Analyzing Value Transferred to Terrorist Organizations Professor Christian Leuprecht (Queen’s.

Slides:



Advertisements
Similar presentations
United Nations Counter-Terrorism Committee Executive Directorate (CTED) Thematic Discussion of the Counter-Terrorism Committee on Cash Couriers New York,
Advertisements

Role of National Parliaments
1 2 Note: The following slides represent suggestions to enhance the writing of a SAR narrative. This information should be used in conjunction with the.
At Hyderabad December 29, 2010 Kunnel Prem. ICP 27 on Insurance Frauds and ICP 28 on AML/CFT.
THE END? BEGINNING! The Polish Team looks forward to working
The Revised FATF Standards and FATF Methodology: Some Highlights and Impact on Global AML/CFT Efforts AMLA’s 3rd Full Day BSA/AML Conference Rosemont,
Building A Financial Intelligence Unit In a Bank Secrecy Environment Lebanon’s Experience Presented by A. Mansour Secretary Special Investigation Commission.
1 Supplement to the Guideline on Prevention of Money Laundering Hong Kong Monetary Authority 8 June 2004.
THE CFATF MUTUAL EVALUATION PROCESS (IN A (SMALL) NUTSHELL) Robin Sykes Financial Investigations Division.
Regulating and Prosecuting Global Money Laundering
Geneva, Switzerland, 4 December 2014 AML/CFT & Financial Inclusion Timothy Goodrick, Policy Analyst, Financial Action Task Force (FATF)
Code of Conduct for Mobile Money Providers 6 November 2014 All material © GSMA The policy advocacy and regulatory work of the GSMA Mobile Money team.
Anti-Money Laundering
MBA (Finance specialisation) & MBA – Banking and Finance (Trimester)
Financial intelligence centre REPUBLIC OF SOUTH AFRICA Presentation to the Portfolio Committee on Trade and Industry on Online Gambling 2 March 2012 Presentation.
1 Jersey Funds Association Educational training session – 22 June 2010.
Source: Section 2 General Code of Conduct A n t i m o n e y l a u n d e r i n g ( A M L ) i s a t e r m m a i n l y u s e d i n t h e f i n a n c i a.
CONTENTS First: Main Points of National Risk Assessment Second: FIs Risk assessment and CDD.
International Standards Simon Goddard 31 August 2012 MOLI Serbia.
The Role of the World Bank in the Global Effort Against Money Laundering and Terrorist Financing Arusha, Tanzania September 21, 2006 Latifah Merican Cheong.
Heba Shams (World Bank) & Nadim Kyriakos –Saad (IMF) World Bank
Combating Terrorism Financing 1 National Accountants Conference 2004, Kuala Lumpur “Combating Terrorism Financing” 13 October 2004 by Koid Swee Lian Financial.
Legal Framework and Regulatory Regime Required for an effective AML/CFT System Richard Pratt 29 March 2005.
Certificate for Introduction to Securities & Investment (Cert.ISI)
FINANCIAL INTELLIGENCE CENTRE
The World Bank Supervision of Banking Sector on AML/CFT - Introduction to the Workshop - SB Koh Sr. Financial Sector Specialist Financial Market Integrity.
The Fight Against Money Laundering. Why is the fight against money laundering so important? Size and scope of money laundering Motivation for laundering.
World Bank International Standards and Action to Combat Money Laundering - Legal Aspects Mark Butler Financial Sector Specialist, Financial Market Integrity,
The Fight Against Money Laundering. Why is the fight against money laundering so important? Size and scope of money laundering Motivation for laundering.
Mobilizing Anti-Money Laundering regimes to Combat Wildlife Crime Marilyne Pereira Goncalves, World Bank.
© Grant Thornton International Consortium on Governmental Financial Management Jennifer Fiddian-Green Investigative Forensic Accountant Stopping Money.
Workshop on Privacy of Public Figures and Freedom of Information - Skopje, 9-10 October 2012.
Felicity Banks Head of Business Law Institute of Chartered Accountants in England & Wales The Role of Accountants in the Fight against Money Laundering.
Canadian Money Laundering Concerns December 2012.
P7: Advanced Audit & Assurance (INT). 2 Syllabus AAA (P7) CR (P2) AA (F8)
GAMING REGULATORS AFRICA FORUM 12 th Annual Conference Accra, Ghana: July 2016 Anti Money Laundering, Counter Financing of Terrorism and Human Trafficking.
Explain the nature of decision support system.(DSS)
Beneficial Ownership and Source of Wealth
IMPLEMENTATION STRUCTURE & EXPECTED OUTCOMES FOR RECOMMENDATION 16, 17, 18, 19 & 20 Oladele Adeoye.
AML/CFT Compliance in the eu
DATA COLLECTION METHODS IN NURSING RESEARCH
Anti Money Laundering (AML)
What Constitutes a “Triggering Event?”
FINANCIAL INTELLIGENCE CENTRE
The ISSAIs for Financial Audit ISSAIs
Technology & Analytics
MODULE 2 INTRODUCTION TO GOVERNANCE AUDIT
Anti-Money Laundering Guidelines
FATF and MONEYVAL The soft law approach.
MALAWI GAMING BOARD Anti-Money Laundering Compliance in the gaming industry Presented by: Master Maliro.
COST-BENEFIT ANALYSIS OF ANTI MONEY LAUNDERING REGULATION IN THE EU: AN EXAMPLE OF DATA COLLECTION ON MONEY LAUNDERING by Barbara Vettori A presentation.
Institutional Framework, Resources and Management
Evaluation of non-criminal data
Policy developments in the area of anti-money laundering and countering financing of terrorism, and related data needs I will speak today about the needs.
FATF/GIABA Mutual Evaluation Process and the Role of the NGOs in the Successful Conduct of the Mutual Evaluation Review (MER) Abdul Rahman Mustapha Head,
Management Verifications & Sampling Methods
Protecting Your Voluntary Organisation from Abuse
Anti-Money Laundering and Counter Financing of Terrorism
FIU - STR Red Flags.
Understanding Global Best Practices
Understanding Global Best Practices
Anti-Money Laundering and Counter Financing of Terrorism
Protecting Your Voluntary Organisation from Abuse
USE OF MODERN TECHNOLOGY TO IDENTIFY SUSPICIOUS/SUBJECT TO MANDATORY CONTROL TRANSACTIONS X-COMPLIANCE project.
1. Mission of EGR and legal framework
Conference On Improving Domestic Resource Mobilization (DRM) and Stemming Illicit Financial Flows (IFFs) 12th-15th March 2019, Nairobi Kenya Presented.
Cashless: help or hindrance to anti-money laundering policies and Financial Intelligence Units? Philippe de Koster, Director CTIF-CFI, Advocate General.
CF Canada Financial Group
CRYPTO ASSETS AND REGULATORY INSTRUMENTS
Financial Intelligence Unit of Aruba MOT
Presentation transcript:

Comparing Terrorist Financing and Resourcing: Indicators for Analyzing Value Transferred to Terrorist Organizations Professor Christian Leuprecht (Queen’s University), Professor Arthur Cockfield (Queen’s University) and Pamela Simpson, MA (Queen’s University)

Roadmap 1. Purpose of the study 2. Previous Research 3. Methodology 4. Observations 5. Comparison 6. Analysis 7. Implications 8. Conclusion

Purpose of the Study Comparing Terrorist Financing indicators in Gordon, UN, FATF reports with the TRM: Richard Gordon (2012), Terrorism Financing Indicators for Financial Institutions in the United States Leuprecht, Cockfield, Simpson, Haseeb (2019), Tracking Transnational Terrorist Resourcing Nodes and Networks” Compared using the open-source legal cases presented in Gordon’s piece with previous legal cases using the Terrorist Resourcing Model (TRM)

Previous Research “Tracking Transnational Terrorist Resourcing Nodes And Networks” (Leuprecht et al, 2019): most cases involved all steps of the TRM, maintaining that the TRM is useful in displaying the value chain of goods transferred from investor to terrorist organization recipient. pattern of resourcing emerged differs only by scale: the more funds that are transferred, the more financial institutions and intermediaries are involved financial hubs, financial institutions, and recipients of resources are not randomly distributed: New York, London, Beirut reoccurring nodes from mostly US legal cases

Method Gordon identified 266 US court cases that involved charges of terrorism, material support to terrorist organizations, or a terrorist-related matter - 30 involved a financial institution These 30 cases were then presented as a case study in the appendix of Gordon’s paper, and broad trends extracted for the paper The cases were then coded according to the TRM to find converging and diverging patterns based on the same data set with two different methods (subsequent data from the cases was needed) Needed to triangulate data with open-source legal cases

Observations Comparisons between Gordon Methodology and TRM: documents presented in Gordon’s case, found that resources raised and transferred were not presented in the paper, as well as initial investors and specific transfer locations Gordon Leuprecht et al (TRM) Number of Cases 30 32 Investors 37 40 Financial Intermediaries 60 59

Comparisons Gordon Method vs. TRM: Gordon: Used FATF 40 recommendations to extrapolate information on traditional ML methods including suspicious activity reports and identifying methods of transferring funds    Concludes: Traditional ML sufficient to identify TF TRM: deviates from traditional TF methods by expanding the necessary steps to provide more information on locational nodes, actors involved, and resources transferred    Finding: Gordon’s cases presented missed vital information pertaining to the international impact of TF and resources transferred aside from funds

Analysis Gordon method vs. TRM Methods of transfer: Gordon specifically focused on type of transaction, suspicious transactions, and proceeds of crime TRM condenses this into one variable ‘financial intermediary mechanism type’ - but yielded same number of results, and was able to attach the transfer to a financial node Gordon’s method did not consider resources transferred, or investors (only on the financial intermediary step of the TRM) Ex. US v. Mohammad Anvari-Hamedani

Implications TF is becoming more accessible, transnational through unconventional means. However, banks are still a large shortcoming in AML/CFT regulations Traditional ML did not identify >10 of Gordon’s initial cases, and failed to identify any resources providing value to terrorist orgs Is TF legislation grafted to ML sufficient to combat terrorist financing, or does it fail to identify key locational nodes that inform broader TF patterns? The TRM is sufficient in identifying traditional ML transfers, as well as resourcing Do traditional AML/CFT regulations and methods fail with regard to ML cases as well? Explicitly creates a divide between TF and ML, showing that grafting TF legislation onto ML legislation is a problem

Conclusions AML/CFT have clear differences between them, brings into question the grafting of TF onto ML Traditional ML does not capture essential investors, locations, or resources for TF Overlooks value added for the terrorist orgs to conduct operations New methods of transfer will continue to complicate the relationship between AML/CFT, venturing into unregulated territory Need to find strong indicators for both ML and TF

Purpose of the Study Comparing Terrorist Financing indicators in Gordon, UN, FATF reports with the TRM: Richard Gordon (2012), Terrorism Financing Indicators for Financial Institutions in the United States UNODC (Vienna, 2018) Guidance manual for Member States on Terrorist Financing Risk Assessments FATF (2016) Consolidated Strategy On Combatting Terrorist Financing FATF (2008) TERRORIST FINANCING World Bank (2015) Introduction To The National Risk Assessment Tool

Purpose of the Study Comparing Terrorist Financing indicators in Gordon, UN, FATF reports with the TRM: Extracted the methodologies, terminologies, and indicators for identifying terrorist financing Reports also included recommendations for reporting procedures for individual countries, regions, and international cooperative action

Previous Research “Tracking Transnational Terrorist Resourcing Nodes And Networks” (Leuprecht et al, 2019): Terrorist Resourcing Model - Five Steps: Acquisition and Exchange, Aggregation of Resources, Movement of Resources, Transmission to a Terrorist Organization, Purpose o the Resources Coded 33 legal cases according to the TRM to identify broader trends and patterns Also analyzed international and domestic organizations combatting AML/CFT: UN, FATF, EU, FinCEN, FINTRAC, and AUSTRAC. Organizations called for collective-action against ML/TF through: FATF 40 recommendations, the UN CTITF, UNCCT, UNODC, and CTED, and domestic financial intelligence units (FIUs).

Previous Research “Tracking Transnational Terrorist Resourcing Nodes And Networks”: Conclusions: Nearly half of all the cases used a legitimate financial institution to transfer resources transnationally Financial intermediaries and investors consisted of a mix of financial institutions/individuals Money was not the only value transferred and through a variety of methods – a diverse range of resources funded and transferred as well Prosecution against banks may not be effective due to number of legitimate financial institutions used in the cases Showed the strength of the TRM in determining the multiple channels, methods, and locations resources could be transferred through

Method Coding 30 Terrorist Financing Cases According to the TRM: Gordon’s methodology - 5 steps for identifying TF indicators: 1. Successfully persecuted terrorism cases were selected. 2. “Examined those cases to determine which involved a transaction though a regulated financial institution, and we collected the relevant client identification, profiling, and transaction data” (789). 3. “examine the data to identify any possible indicators of terrorism financing” (789). 4. “determined if any SARs were filed by financial institutions with respect to those transactions. Reviewed the SARs to see why they were filed, including by examining the SAR narrative to determine what, if any, additional information the reporting institution had uncovered” (789). 5. “determined if FinCEN had referred the SAR for further investigation” (789)

Method Coding 30 Terrorist Financing Cases According to the TRM: The Terrorist Resourcing Model (TRM) - 5 steps for identifying terrorist resourcing: “acquisition of free or stolen funds and exchange and end-use goods” (35) – coded as ‘investor’ aggregation, which “consists of pooling resources, either in a few financial institutions (for money) or in a few physical locations (for goods)” (35). – coded as ‘bank location’/’investor’ (location) “transmission to a terrorist organization” (35). – coded as ‘financial intermediary’ “transmission to a terrorist or operational cell” – coded as ‘financial intermediary’/’terrorist agent’ conversion which “consists of exchanging funds or goods for end-use goods” and includes end-use goods to “carry out any of the terrorist organization’s activities” including a terrorist act (35). - coded as ‘cash transferred’/’cash raised’ and ‘non-cash goods transferred’/’non-cash goods raised’

Observations Observations on the comparison between Gordon Methodology and TRM: Gordon: 30 Cases (US Case Jurisdiction), 40 investors, 60 Financial Intermediaries Leuprecht et al: 32 Cases (US-23, Canada-7, UK-1, EU-1), 37 Investors, 59 FIs

Observations Observations on the comparison between Gordon Methodology and TRM: Gordon Locational Hubs: New York (4 Investors, 5 Financial Intermediaries, 3 Terrorist organizations identified), Ohio (4 Investors, 2 Financial Intermediaries, No terrorist group identified), Virginia (4 Investors, 3 Financial Intermediaries, 2 terrorist groups identified), Leuprecht et al Locational Hubs: New York (2 Investors, 8 Financial Intermediaries, 4 Terrorist groups identified), London (2 Investors, 7 Financial Intermediaries, 4 Terrorist Groups identified), Beirut (2 Investors, 11 Financial intermediaries, 2 Terrorist groups identified)

Observations Observations on the comparison between Gordon Methodology and TRM: Gordon Re-occuring Banks: Western Union (2 locations in 3 cases, 2 terrorist groups identified), Fleet Bank (1 location in 2 cases, 3 terrorist groups identified), Bank of America (1 location in 2 locations, 2 terrorist groups identified), Leuprecht et al Re-occurring Banks: Arab Bank PLC (2 locations in 3 cases, 1 terrorist group identified), UBS AG (1 location in 2 cases, 2 terrorist groups identified), HSBC Group PLC (3 locations in 2 cases, 2 terrorist groups)

Observations Observations on the comparison between Gordon Methodology and TRM: Gordon Methods of Transfer: Wire Transfer (14), Cheque (3), Total Methods (29), Leuprecht et al Methods of Transfer: Bank Transfer (17), Hawala (3), Total Methods (30)

Analysis Analysis on comparison between Gordon’s method and TRM Gordon conclusion: ML framework sufficient for TF TRM: ML is not sufficient due to failure of financial institutions to comply, and the divergence between ML and TF Specifically – origins of funds, and resources transferred Locational nodes for Gordon: more general and US-centric (whenever other countries were mentioned, it was not clear how the money transferred through them) Locational nodes from TRM: very diverse, found a surprising number of nodes in Beirut.