FRAUD AND ELECTRONIC MONEY LAUNDERING

Slides:



Advertisements
Similar presentations
Prevention of Money Laundering Training session. Overview What is Money laundering? Requirements under the Act Arcadias policy Relevance to your routine.
Advertisements

© Dr. Michael Levi Professor Of Criminology Cardiff University, CF10 3WT, Wales Responsible Gaming Day European Parliament, 2009 Internet.
1 2 Note: The following slides represent suggestions to enhance the writing of a SAR narrative. This information should be used in conjunction with the.
Security Classification Practical Issues in dealing with different types of cybercrime.
Understanding the Defendants’ Takeover of AIG In support of Plaintiff’s Motion to Compel Defendant Geithner’s Deposition Testimony © Law Offices of David.
Available from BankersOnline.com
Anti Money Laundering (AML) An Overview for Staff Prepared by MSM Compliance Services Pty Ltd.
Chapter 8 Crimes Twomey, Business Law and the Regulatory Environment (14th Ed.)
Anti-Money Laundering and OFAC Compliance for Transfer Agents SSA Annual Conference July 25, 2008.
07-08Available from BankersOnline.com Bank Secrecy Act (BSA) For New Hires.
Anti-Money Laundering (AML)
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking Funded by a grant from Take Charge America, Inc.
Chapter 10 White-Collar and Organized Crime. Introduction ► White-collar crimes – criminal offenses committed by people in upper socioeconomic strata.
1 CSI COMPLIANCE AWARENESS TRAINING ANTI MONEY LAUNDERING July 2004 This is confidential proprietary and trade secret information of American Express Travel.
This tool can be found in the Banker Tools section of BankersOnline.com. 1 Bank Secrecy, Anti-Money Laundering & OFAC Director Education.
Current Topics. Trends in Banking G & K Chps. 16, 17 & 18 G & K Chps. 16, 17 & 18 Financial Services Financial Services Electronic Banking Electronic.
Regulating and Prosecuting Global Money Laundering
Financial intelligence centre REPUBLIC OF SOUTH AFRICA Presentation to the Portfolio Committee on Trade and Industry on the Report prepared by the Gambling.
Source: Section 2 General Code of Conduct A n t i m o n e y l a u n d e r i n g ( A M L ) i s a t e r m m a i n l y u s e d i n t h e f i n a n c i a.
1 Raymond Doray Conflicts between the new Canadian Money Laundering Act and the rules of professional conduct and ethics September 13, 2002.
EPS (Electronic payment system) is an online business process used for fund transfer using electronic means, i.e  Personal computers  services  Mobile.
Electronic Payment Systems
Cyber Crimes.
Digital Citizenship By: Miranda Scorver.
Copyright © 2004 by Nelson, a division of Thomson Canada Limited CANADIAN BUSINESS AND THE LAW Second Edition by Dorothy Duplessis Steven Enman Shannon.
E_COMMERCE E_Payment. Credit Card  is a small plastic card issued to users as a system of payment. It allows its holder to buy goods and services based.
Combating Terrorism Financing 1 National Accountants Conference 2004, Kuala Lumpur “Combating Terrorism Financing” 13 October 2004 by Koid Swee Lian Financial.
Quick! What is a crime?. So, just how much has to be proven in court to find someone guilty of a crime? Burden of Proof The prosecution has the burden.
CYBER CRIME.
SSA, Todd Petrie The AMLA Presentation: 3/18/2009.
Legal Framework and Regulatory Regime Required for an effective AML/CFT System Richard Pratt 29 March 2005.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
Western Union Confidential ©2009 Western Union Holdings, Inc. All Rights Reserved. Document Number FAC001 The Government Sanctions List.
Bank Secrecy Act. Many Laws Make Up “BSA” Bank Secrecy Act Money Laundering Control Act Currency and Foreign Transactions Reporting USA PATRIOT Act.
FINANCIAL INTELLIGENCE CENTRE
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
2-1 Copyright © 2014 McGraw-Hill Education (Australia) Pty Ltd PPTs to accompany Barron, Fundamentals of Business Law 7Rev This is the prescribed textbook.
Suspicious Transactions James Wright. Cash Transactions  1. Cash deposits or withdraws for considerable, unusual amounts of money, made by natural persons.
Presented by: Hany Faidy Senior Vice President, Head of Compliance Division March 2009 Procedures followed by FI’s when reporting Suspicious Transaction.
Cybercrime What is it, what does it cost, & how is it regulated?
World Bank International Standards and Action to Combat Money Laundering - Legal Aspects Mark Butler Financial Sector Specialist, Financial Market Integrity,
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Chapter 10 – Crimes Against Property. Arson The willful and malicious burning of a person’s property Intentionally burning a building to defraud the insurance.
Chapter 5 Criminal Law.  What two elements must exist before a person can be convicted of a crime?  Can a corporation be liable for a crime?  What.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
بسم الله الرحمن الرحیم How to identify the suspiciousness about your customer Some special indicators and red-flags to identify the suspicious act of a.
Business Law and the Regulation of Business Chapter 28: Bank Deposits, Collections, and Fund Transfers By Richard A. Mann & Barry S. Roberts.
Legal Considerations Members in Practice (MIP) Members in Business (MIB)
Legal Considerations Members in Practice (MIP) Members in Business (MIB)
Felicity Banks Head of Business Law Institute of Chartered Accountants in England & Wales The Role of Accountants in the Fight against Money Laundering.
Canadian Money Laundering Concerns December 2012.
LITHUANIAN CRIMINAL POLICE BUREAU Crimes in Cyberspace – Relevant Issues and Investigation Challenges ID Thefts – Issues, Legal Regulation, International.
Cyber laws and white collar CRIME, a ura perspective ; is uganda ready for the challenge? BY The Commissioner tax investigations department UGANDA REVENUE.
Corporate & Business Law ( ENG). 2 Section H: Governance & Ethical Issues Relating To Business Designed to give you knowledge and application of: H1.
CRIMINAL LAW 1. Ahmed T. Ghandour.. CRIMES OF POWERFUL.
Anti Money Laundering (AML)
Melissa McBee Anderson Ethan Via Federal Bureau of Investigations
FINANCIAL INTELLIGENCE CENTRE
USA PATRIOT ACT WHAT DOES IT STAND FOR?.
REDUCING CRIME AND THE FEAR OF CRIME BY MAKING SURE CRIME DOES NOT PAY
Mr. Roeshink – Financial Operations
Anti-Money Laundering Guidelines
Proof of Concept Samples and Techniques
Leaders Credit Union Board Presentation
FIU - STR Red Flags.
Financial Intelligence Unit of Aruba MOT
Presentation transcript:

FRAUD AND ELECTRONIC MONEY LAUNDERING Presented by: ATTY. RICHARD DAVID C. FUNK II

WHAT IS MONEY LAUNDERING Under the AMLA, money laundering is “ a crime whereby the proceeds of an unlawful activity are transacted, thereby making them appear to have originated from legitimate sources.” Money Laundering as a crime is committed in three (3) different ways under the AMLA

HOW COMMITTED “Any person knowing that any monetary instrument or property represents, involves, or relates to, the proceeds of any unlawful activity, transacts or attempts to transact said monetary instrument or property.” Imprisonment of 7 to 14 years and a fine of not less than P 3 Million but not more than twice the value of the monetary instrument or property involved in the transaction.

HOW COMMITTED “Any person knowing that any monetary instrument or property involves the proceeds of an unlawful activity, performs or fails to perform any act as a result of which he facilitates the offense of money laundering referred to in paragraph (a) above.” Imprisonment of 4 to 7 years and a fine of not less than P 1 Million but not more than P 3 Million.

HOW COMMITTED Any person knowing that any monetary instrument or property is required under this Act to be disclosed and filed with the Anti- Money Laundering Council (AMLC), fails to do so.” Imprisonment of 6 months to 4 years or a fine of not less than P100,000 or P 500, 000 or both.

UNLAWFUL ACTIVITIES OR PREDICATE CRIMES “Unlawful Activity” refers to any act or omission or series or combination thereof involving or having DIRECT relation to any of the following: Kidnapping for ransom Drug related offenses, e.g., trafficking Graft and corrupt practices/acts Robbery and extortion “

UNLAWFUL ACTIVITIES OR PREDICATE CRIMES Jueteng and Masiao Piracy on the high seas Qualified Theft Swindling Offenses punishable under the E-Commerce Act Hijacking, destructive arson, murder, even when committed against non-combatant persons

UNLAWFUL ACTIVITIES OR PREDICATE CRIMES Violation of the Securities Regulation Code Felonies or offenses of a similar nature under penal laws of other countries

WHY ELECTRONICALLY MONEY LAUNDER

ELECTRONIC MONEY Electronic money (also known as e- currency, e-money, electronic cash, electronic currency, digital money, digital cash or digital currency) refers to money or scrip which is only exchanged electronically.

ELECTRONICALLY LAUNDERING MONEY Typically, this involves the use of computer networks, the internet and digital stored value systems. Electronic Funds Transfer (EFT) and direct deposit are all examples of electronic money. Also, it is a collective term for financial cryptography and technologies enabling it Ecash- when abused/misused for criminal purposes

SUSPICIOUS ACTIVITY INDICATORS IN GENERAL Suspicious transactions are transactions with covered institutions, regardless of the amounts involved, where any of the following circumstances exist: 1. There is no underlying legal or trade obligation, purpose or economic justification 2. The client is not properly identified

SUSPICIOUS ACTIVITY INDICATORS IN GENERAL 3. The amount involved is not commensurate with the business or financial capacity of the client 4. Taking into account all known circumstances, it may be perceived that the client’s transaction is structured in order to avoid being the subject of reporting requirements

SUSPICIOUS ACTIVITY INDICATORS IN GENERAL 5. Any circumstance relating to the transaction which is observed to deviate from the profile of the client and/or the client’s past transactions from the covered institution 6. The transaction is in any way related to an unlawful activity or offense under this Act that is about to be, is being or has been committed

SUSPICIOUS ACTIVITY INDICATORS IN GENERAL 7. Any transaction that is similar or analogous to any of the foregoing

Suspicious Activity Indicators related to Financing of Terrorism AMLC RESOLUTION NO.59 s. 2005 Wire transfers between accounts, without visible economic or business purpose, especially if the wire transfers are effected through countries which are identified or connected with terrorist activities. 

Sources and/or beneficiaries or wire transfers are citizens of countries which are identified or connected with terrorist activities. Repetitive deposits or withdrawals that cannot be explained or do not make sense.   Value of the transaction is over and above what the client is capable of earning. Client is conducting a transaction that is out of the ordinary for his known business interest. Deposits being made by individuals who have no known connection or relation with the account holder.

An individual receiving remittances, but has no family members working in the country from which the remittance is made.   Client was reported and/or mentioned in the news to be involved in terrorist activities. Client is under investigation by law enforcement agencies for possible involvement in terrorist activities.

Transactions of individuals, companies, or non-governmental organizations (NGOs) that are affiliated or related to people suspected of being connected to a terrorist group or a group that advocates violent overthrow of a government.   Transactions of individuals, companies, or NGOs that are suspected as being used to pay or receive funds from revolutionary taxes.

The NGO does not appear to have expenses normally related to relief or humanitarian efforts. The absence of contributions from donors located within the country of origin of the NGO. A mismatch between the pattern and size of financial transactions on the one hand and the stated purpose and activity of the NGO on the other.  

Incongruities between apparent sources and amount of funds raised or moved by the NGO   Any other transaction that is similar, identical or analogous to any of the foregoing.

OPERATION PEP AND FAMILY CASE STUDY OPERATION PEP AND FAMILY

CASE STUDY OUTLINE BRIEF OVERVIEW INTERNATIONAL COOPERATION REPORTS BY FINANCIAL INSTITUTIONS (38STRs/169CTRs) ENFORCEMENT ACTION- PROSECUTION FOR PLUNDER

OTHER CURRENT AND EMERGING ML/FT TYPOLOGIES FRAUD- dishonestly obtaining a benefit usually by deception/use of insidious words and machinations Phishing- type of fraud to gain personal information for the purpose of identity theft using deceptive email messages that appear to come from legitimate businesses

Smishing- rather than the victim being contacted by email ( Phishing ) the victim is contacted via SMS ( text ) on a mobile phone Vishing-a new method like phishing but using the telephone to defraud the person and collect information about their identity ATM/Credit Card Skimming-illegal copying of information from the magnetic strip of an ATM/credit/debit card

????????????????? ????????????????? ??????