Download DML Associates, LLC presentation - Association of International

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
AIBA Compliance Seminar
Terrorist Financing
June 13, 2013
Dennis M. Lormel
President & CEO
DML Associates, LLC
Terrorist Financing
• Introduction
• Current Events
• Facilitation Tools
• Countermeasures
• Case study: Lebanese
Canadian Bank
• Conclusion
AIBA Compliance Seminar
Dennis M. Lormel | June 13, 2013
2
Introduction
Lessons Learned From Boston
Bombing
• We, as a society, continue
to be vulnerable
▫ Simplicity of bombings
likely to inspire similar
attacks
• Jihadism continues to attract
new adherents
• Critical importance of public
/ private relationships
• Vulnerabilities of terrorists
▫ Finance
▫ Communications
• Social media
▫ Videos
• Chaos vs. communication and
coordination
• Media
▫ Good and bad
• The blame game
▫ Easier to criticize than to
distinguish
▫ Assess before judging
• Systemic v. one off problem
• Lost statistic
▫ 204 arrests of would be
jihadist attackers since 9/11
4
Importance of Financial Information
• As criminals and our financial system continue to become more
sophisticated, financial transactional information becomes more
relevant as a critically important investigative mechanism
▫ Finance and communication are biggest vulnerabilities to bad
guys
• An investigator’s ability to collect and use financial information
can be devastating to terrorists and criminals
• Without money, terrorist and criminal organizations cannot
adequately function
• Financial investigations should be integral part of investigative
strategies
• Knowing what financial information is relevant, where to collect it
from, and how to use it are facts all investigators can benefit from
AIBA Compliance Seminar
Dennis M. Lormel | June 13, 2013
5
Law Enforcement / Financial
Institution FININT Comparison
• Law enforcement
▫ Conduct financially focused investigations to disrupt and / or prevent
the flow of funds to terrorists
• Conducted to support the broader counterterrorism mission
▫ Collector and producer of actionable financial intelligence
• Direct beneficiary of Bank Secrecy Act (BSA) data (SARs, CTRs, etc.)
▫ Perspective  the “why”
▫ Personnel (agents, intelligence analysts, forensic accountants)
• Financial institution anti-money laundering (AML) compliance
▫ Required by BSA to maintain robust AML program to safeguard
system from money laundering and terrorist financing
• Compliance (cost center) v. business (revenue center) mentality or
culture
▫ Repository of financial intelligence
• Originator of BSA reports (SARs, CTRs, etc)
▫ Perspective  the “how”
▫ Personnel (compliance officers, analysts, investigators)
6
Disruption of Funding Flows
• Back to origin / forward to strike teams
▫ Funding to networks / organizations from point of origin
• Ranging from hundreds to millions of dollars
▫ Funding to operations
• Ranging from thousands to hundreds of thousands of dollars
▫ Funding to individuals, cells, or groups
• Ranging from hundreds to thousands of dollars
KSM
Mohamed Atta
7
The Players…Looking Back
• Individuals or groups engaged in fraud
• Gangs
• Drug dealers, organizations or cartels
• Ethnic organized crime groups
• Terrorists or terrorist groups
AIBA Compliance Seminar
Dennis M. Lormel | June 13, 2013
8
The Players…Going Forward
• Who are we dealing with?
▫ Individuals or groups engaged in fraud
▫ Domestic criminal organizations
▫ Transnational criminal organizations
▫ Terrorists or terrorist groups
▫ State sponsors
• Commonalities
▫ Use of facilitation tools
▫ Convergence
▫ Diversification
▫ Must have ready access to money
AIBA Compliance Seminar
Dennis M. Lormel | June 13, 2013
9
Threat Finance
• Threat finance is an umbrella term used to encompass various
types of financing that support activities harmful to U.S.
National Security
▫ Driven by Department of Defense
• No singular accepted definition
▫ Prosecution v. regulatory concern
▫ Encompasses:
• Terrorist financing
• Transnational criminal organizations
• Drug cartels
• Proliferation and weapons of mass destruction
AIBA Compliance Seminar
Dennis M. Lormel | June 13, 2013
10
Intersection of Crime & Conflict
• Criminal organizations and terrorist groups have
increasingly found common ground of mutual benefit
▫ Each have learned how to benefit from conflict
▫ Each have benefited from convergence and diversification
• Convergence: the intersection where criminals and
terrorists work together to support each other with the goal
to maximize the benefit to their individual causes
▫ Mutual and individual benefit
• Diversification: as organizations mature in operations and
sophistication, they diversify into different activities and
thereby grow and strengthen their operations
▫ Rely on legitimate and illegitimate fronts
AIBA Compliance Seminar
Dennis M. Lormel | June 13, 2013
11
Current Developments
• Growing recognition of importance of financial intelligence
▫ (Financial) intelligence drives operations
• Challenges of international terrorism more complex and diversified
• Ongoing Arab spring
▫ Changing balance of power
▫ Terrorist groups taking advantage of unrest
• Evolving international terrorist landscape
▫ Al-Qaeda core greatly diminished (drone missile attacks)
▫ Continued emergence of al-Qaeda affiliate groups
▫ Potential volatility of Hizballah if Iran attacked
• Growing nexus between transnational criminal and terrorist
organizations
▫ Convergence
▫ Diversification
• Growing emphasis on “threat finance” driven by DoD
13
Current Terrorist Threat in the U.S.
• Homegrown violent extremists
▫ …homegrown extremists are increasingly more savvy, harder to detect, and
able to connect with other extremists overseas
• Current threat
▫ Al-Qaeda
▫ Groups affiliated with al-Qaeda
• Al-Qaeda in the Arabian Peninsula
• al Shabaab
• Lashkar-e-Taiba (LeT) (Mumbai style attack)
▫ Iran and Iranian proxies
▫ Hizballah
▫ Hamas
• The internet has expanded as a platform for spreading extremist
propaganda, a tool for online recruiting, and a medium for social
networking with like-minded violent extremists, all of which may be
contributing to the pronounced state of radicalization inside the U.S.
14
• Adaptability/flexibility/anonymity/vulnerability
Jihadist Movement
• Jihadist movement divided into three basic elements
▫ Al-Qaeda core organization
▫ Regional jihadist franchises
▫ Grassroots operatives
• Two distinct types of operatives
▫ Professionals
▫ Amateurs
• Al-Qaeda and regional groups
▫ For the most part, highly trained professional terrorists
• Grassroots operatives
▫ Amateurs
▫ Continuum ranging from untrained lone wolves to one who
received varying levels of training
▫ Never joined al-Qaeda or other formal militant groups
15
Transnational Criminal Organizations
• Represent increasing threat to U.S. security and interests,
both domestically and internationally
• Organizations that carry out criminal operations across
international borders
• Their interest in “bottom line” makes them more dangerous
• Located in countries with weak rule of law
• Present greater threat to regional security
• Willingness to work and provide material support to terrorists
Los Zetas
▫ Mexican drug cartels
MS 13
▫ Violent street gangs
▫ International criminal organizations
D-Company
(Pakistan)
AIBA Compliance Seminar
Dennis M. Lormel | June 13, 2013
16
Transnational Criminal Organization
Activities
• Drug trafficking, one of the most common criminal activities
▫ Most profitable
• Increases levels of corruption
• Leads to regional violence and instability in many regions
• Causes health and social issues
•
•
•
•
•
•
Arms trafficking
Human smuggling and trafficking
Product counterfeiting
Trafficking in contraband
Sea Piracy
Money laundering
▫ Hawala
▫ Trade based
▫ Black Market Peso Exchange (BMPE)
17
Threats Posed by Illicit Networks
• Violence and intimidation
▫ Threat to national security
• Criminal activity
▫ Threat to economy
• Corruption
▫ Acts as an enabler (like a disease)
• Cyber security
▫ Increasingly significant threat
AIBA Compliance Seminar
Dennis M. Lormel | June 13, 2013
18
Facilitation Tools
Facilitation Tools
• Wire transfer
▫ Electronic funds transfer (fast channel for moving money
between countries and accounts)
• Correspondent banking
▫ Financial institution that provides services on behalf of another
(relies on correspondent to conduct due diligence)
• Illegal money remitters
▫ Not licensed and / or registered (most significant vulnerability)
• Shell companies
▫ Operates without active business operations or significant assets
• Electronic mechanisms
▫ Finance and communications
• What is the common thread or vulnerability between the
above facilitation tools?
20
Beneficial Ownership
• The term “beneficial ownership” when used to refer to
beneficial ownership of an account in AML context is
conventionally understood as equating to ultimate control over
funds in such account, whether through ownership or other
means. “Control” in this sense is to be distinguished from
mere signature authority or legal title.
▫ The ability to conceal beneficial ownership is extremely
attractive to bad guys
▫ The ability to conceal beneficial ownership is a detriment to
law enforcement
AIBA Compliance Seminar
Dennis M. Lormel | June 13, 2013
21
Bulk Cash Smuggling
• Evading of currency reporting requirements
▫ Concealing more than $10,000 in currency or monetary
instruments
▫ Into or out of the United States
• Criminal organizations smuggle bulk cash to keep their
proceeds and related activities away from the scrutiny of
financial regulators and law enforcement
• Bulk cash smuggling is extremely harmful
▫ Removes billions of dollars from commerce
▫ Diminishes integrity of financial system
▫ Fuels criminal enterprises
AIBA Compliance Seminar
Dennis M. Lormel | June 13, 2013
22
Trade Based Money Laundering
• The use of international trade to move money, undetected, from
one country to another is one of the oldest techniques used to
circumvent government scrutiny
• The international trade system is clearly subject to a wide range
of risks and vulnerabilities exploited by criminal organizations
and terrorists
▫ Trade based money laundering represents an important channel of
criminal activity
▫ Growth of world trade enhances vulnerability
• As standards applied to other money laundering techniques
become increasingly effective, the use of trade based money
laundering will increase
AIBA Compliance Seminar
Dennis M. Lormel | June 13, 2013
23
Free Trade Zones (FTZs)
• Two fold benefits of FTZs
• Created within jurisdictions to
promote trade, support new business
▫ Legitimate
formation and encourage foreign
• Boosts economic
direct investment
opportunity
• Have proliferated in recent years
▫ Approx. 3,000 FTZs in 135 countries
• Incentives offered to support
development of exports, foreign direct
investment and local employment
▫ Exemptions from duty & taxes
▫ Simplified administrative procedures
▫ Duty free importation of raw
materials, machinery, parts and
equipment
▫ Illegitimate
• Can result in reduction in
finance and trade controls
and enforcement
• Creates opportunity for
money laundering and the
financing of terror
AIBA Compliance Seminar
Dennis M. Lormel | June 13, 2013
24
Countermeasures
Understanding Geographic Risk
• Geographic
▫
▫
▫
▫
Global
Regional
Country specific
Local
• Cultural vulnerabilities
▫ Bribery/corruption
• Accepted business practice
▫ Regulatory and law enforcement capacity and will
▫ Free trade zones
▫ Level of criminal and/or terrorist threat
• Business activity
▫ Reasonableness
▫ Red flags
26
KYC: Due Diligence
• Know your customer
program
▫ Sound process
▫ Verification
▫ Documentation
• Identify beneficial
ownership
▫ FATF recommendations
▫ FinCEN guidance
• Address customer risk
▫
▫
▫
▫
Recognition
Mitigation
Adaptability factor
Living process
• Assess reasonableness
of business activity
• Consider enhanced due
diligence
• Both stress importance of
identification and
consequence of risk
AIBA Compliance Seminar
Dennis M. Lormel | June 13, 2013
27
Deconstructing Ownership & Risk
Customer Due Diligence
Verification
Process
Documentation
Identify Beneficial Ownership
Adequate
Accurate
Timely
Conduct Ongoing Due Diligence
Vigilance
Assess Customer Risk
Consider Enhanced Due Diligence
Assess Reasonableness of Business Activity
Consider Enhanced Due Diligence
28
Lebanese Canadian Bank
Case Study:
Anatomy of a Global NarcoTerrorist Organization
Anatomy of a Global Narco-Terrorist
Operation
• Case study demonstrating how criminal, drug trafficking and terrorist
organizations collaborated in a multi-billion dollar worldwide narcoterrorist drug trafficking and money laundering enterprise
▫ Mutually beneficial operation involving:
• Joumma drug trafficking/criminal organization
• Hizballah
• Los Zetas Mexican drug cartel
• Colombian and Venezuelan drug suppliers
▫ Exploitation of financial institutions
▫ Exploitation of facilitation tools and financial mechanisms
▫ Exploitation of systemic vulnerabilities
▫ Exploitation of Lebanon’s financial system
AIBA Compliance Seminar
Dennis M. Lormel | June 13, 2013
30
Factors Facilitating DTO Operations
• Lebanese Canadian Bank
▫
Management complicity and support for Hizballah
▫
Ineffective due diligence
▫
Ineffective internal controls
• Money exchange houses / hawalas
• Bulk cash shipment / smuggling
• Cross border wire transfers
• Correspondent banking
• Payable through accounts
• Shell companies / front companies
• Corruption
• Structuring
• Money laundering
• Trade based money laundering
• Black market peso exchange
31
Drug & Laundering Flow Involving U.S.
Europe
United States
Lebanon
Middle East
West Africa
Colombia
Drug & Laundering Flow Involving Asia
Europe
United States
Lebanon
Middle East
West Africa
Colombia
Asia
Joumaa – Los Zetas Trafficking Flow
United States
Joumaa collects 8% to 14%
Los Zetas
Mexico City
Venezuela
Colombia
Conclusion Case Study
• This case demonstrates how criminals and terrorists can
benefit financially by collaborating together
• Drug trafficking remains the most prolific funding
mechanism for criminals and terrorists
• Money laundering essential to successful operations
• The exploitation of systemic vulnerabilities facilitated
operations
AIBA Compliance Seminar
Dennis M. Lormel | June 13, 2013
35
Conclusion
Conclusion
• Growing nexus between criminal organizations and terrorist groups
▫ Convergence
▫ Diversification
• Organizational vulnerabilities of bad guys
▫ Communications
▫ Finance
• Partnerships and perspectives
▫ Law enforcement  “why”
▫ Financial institutions  “how”
• Importance of financial intelligence
• Be proactive and unpredictable
▫
Exploit vulnerabilities of bad guys
37
Dennis M. Lormel
President & CEO
DML Associates, LLC
19309 Winmeade Drive
Lansdowne, VA 20176
571-333-0300
[email protected]
www.dmlassociatesllc.com
AIBA Compliance Seminar
Dennis M. Lormel | June 13, 2013
38