Documente Academic
Documente Profesional
Documente Cultură
Tata Blue 50% Tata Blue 25% Purple 50 % Purple 25 % Yellow 50 % Yellow 25 %
TCS Business Domain Academy
229 248 180 214 241 251
205 241 213 231 240 251
186 235 154 200 202 241
Agenda
Money Laundering
Regulations
Used for first time after Watergate scandal in 1970 and then was
recognized internationally
Money Laundering
Why? – Hide Wealth, Evade Taxes, Finance for illegal activities etc.,
The largest portion of laundered funds are processed through banks. This is
largely due to the fact that banks are often the first stop in a multi-tiered
laundering scheme
Stages Explained!
Placement:
Breaking up large amounts of cash into smaller sums and depositing them directly into bank account
Transporting cash across borders to deposit in Foreign FIs, or to buy high-value goods – artwork,
antiques, precious metals and stones etc., that can be resold later for payment by check or bank
transfer
Layering:
Sending wire transfers of funds from one account to another, sometimes to or from other institutions
or jurisdictions.
Converting deposited cash into monetary instruments (e.g. traveler’s checks).
Reselling high-value goods and prepaid access/stored value products.
Investing in real estate and legitimate businesses.
Placing money in investments such as stocks, bonds or life insurance
Using Shell Companies – to obscure the ownership of assets
Integration:
Re-entry of the funds into the economy in what appears to be normal business or personal
transactions.
Invest funds in real estate, financial ventures or luxury assets
Integration is difficult to spot
TCS Business Domain Academy
Anti Money Laundering
Contd..,
Issac Kattan (Travel Agent) and The Great American Bank of Dede -
Using “Structuring” - laundered an estimated $500 m per year in drug money
Contd5
Structuring:
Designing a transaction to evade triggering a reporting or
recordkeeping requirement is called “structuring.”
Most commonly known Money Laundering method
The individuals engaged in structuring are runners, hired by the
launderers
Examples:
A customer breaks a large transaction into two or more smaller ones
A large transaction is broken into two or more smaller transactions
conducted by two or more people
There is also an another form called “Micro Structuring”
Contd..,
The main objective of this program is to protect the institution from the
clutches of illegitimate activities and ensure the organization is
complying with relevant laws and regulations
Risk based approach
Approach based on size of an organization
Stringent
internal
policies and
controls
Geography
Compliance
Officer
Elements
Factors to of AML
Types of
determine
risk
Customers Program
Continuous
training
Products and
Services
offered Independent
audit function
for AML
Hawala System
• White Hawala
• Black Hawala
Al Qaeda moved much of its money by hawala before September 11, 2001. Al Qaeda
used about a dozen trusted hawaldars, who almost certainly knew of the source and
purpose of the money
TCS Business Domain Academy
Anti Money Laundering
Terrorist Financing
After the terrorist attacks of September 11, 2001, the finance ministers
of the Group of Seven (G-7) industrialized nations met on October 7,
2001, in Washington, D.C., and urged all nations to freeze the assets
of known terrorists
SDN List published by OFAC
Difference between Money Laundering & Terrorist Financing
In 2004 “Monograph on Terrorist Financing” the National Commission
on Terrorist Attacks commented about September 11 hijackers
Real-Life Case:
The September 11 hijackers used U.S. and foreign financial institutions to hold, move and retrieve
their money. They deposited money into U.S. accounts, primarily by wire transfers and deposits of
cash or travelers checks brought from overseas. Several of them kept funds in foreign accounts,
which they accessed in the United States through ATM and credit card transactions. The hijackers
received funds from facilitators in Germany and the United Arab Emirates as they transited Pakistan
before coming to the United States. The plot cost al Qaeda somewhere in the range of $400,000–
$500,000, of which approximately $300,000 passed through the hijackers’ bank accounts in the
United States. While in the United States, the hijackers spent money primarily for flight training,
travel and living expenses. TCS Business Domain Academy
Anti Money Laundering
Terrorist Financing
Customer
The sole objective of KYC norms is to identify bad customers and prevent
them from involving into various kinds of fraudulent activities and thereby
protecting the good/loyal customers which in turn reduces the reputational
risk of a bank/FI
TCS Business Domain Academy
Anti Money Laundering
Customer
Acceptance
Policy
Customer
Identification
Procedure
Elements
of KYC
Monitoring of
transactions in • CTRs
customer
accounts
• STRs
Risk
Management
Framework &
Information
Sharing
In 2000, Lucy Edwards and former vice president of BNY’s EE Division, and her
husband, Peter Berlin – ML because of “Bank Complicity”
Definition and acceptance of the customer in the context of specific products and services.
Assessment and grading of risks that the customer or the account present.
Documentation of findings.
TCS Business Domain Academy
Comprehensive AML Solution
•Generally written as
Transaction
Monitoring
SQL commands
Watch List Rules •Monitor
Filtering
Engine Transactions and
Group of
Transactions
Reporting
Transaction
Monitoring
Pattern •Profiling
Comprehensive AML Recognition
Solutions Technology •Peer group
•Neural Networks
Watch List
Filtering
Built in Custom
Hybrid
Lists Lists
False Positives – Rules Too Stringent or Too Loose?
Vendors
ACI Worldwide (ACI Proactive Risk Manager) – USA – Transaction Monitoring Solution
Nice / Actimize (AML Solution) – NY – Transaction Monitoring Solution
Americas Software (ASSIST) – Miami – Transaction Monitoring & Watch List Filtering
Solution
FircoSoft (OFAC-Agent) – Paris – Watch List Filtering
InfraSoft (OMNIEnterprise-AML) – Mumbai – Transaction Monitoring
Mantas (ML Monitor) – Fairfax, VA – Transaction Monitoring
Prime Associates (Compliance Manager) – NJ – Transaction Monitoring & Watch List
Filtering
SAS Institute (SAS AML Solution) – Cary, NC – Transaction Monitoring
Sybase (PATRIOTCompliance Solution) – Dublin, CA – Transaction Monitoring
TCS (finDNA) – Mumbai – Transaction Monitoring & Watch List Filtering
3i Infotech (AMLOCK) – Mumbai – Transaction Monitoring & Watch List Filtering
Regulations
Regulations in US:
USA PATRIOT ACT – Deter and Punish Terrorist Acts in US and around the world. Prevent,
Detect and Prosecute international ML and financing of terrorism
Bank Secrecy Act (BSA) – Passed by US congress in 1970. Prevent FIs from being
used as channels for various criminal activities. Banks to submit the reports to govt relating to
customers’ use of money and various other monetary instruments on a timely basis. CTRs and STRs
Regulations in UK:
Proceeds of Crime Act (1995), Criminal Justice Act (1995), Drug
Trafficking Offenses (1998), Criminal Justice Act (1998)
Regulations Contd.
Regulations in India:
PMLA 2002 – Imposes obligation on BFS institutions to verify identity of clients, maintain
records and furnish information to FIU-IND (apex body for coordinating India’s AML efforts. Banks have to
submit CTRs and STRs to FIU IND)
Regulations Contd.
Thank127
You
175
203
215
179
149
212
195
255
242
255
249
221 238 197 223 171 213
Tata Blue 50% Tata Blue 25% Purple 50 % Purple 25 % Yellow 50 % Yellow 25 %