Documente Academic
Documente Profesional
Documente Cultură
Ajith S
Aviraj
Pawan
Raina
Rajkumar
Rajnish
MONEY LAUNDERING
Agenda
1 INTRODUCTION
2 IMPACT
3 SCANDALS
4 KYC NORMS
6 TRENDS
2
Money Laundering
Money laundering is the process by which the
proceeds of the crime, and the true ownership
of those proceeds, are concealed or made
opaque so that the proceeds appear to come
from a legitimate source
Appears to
Illegally obtained
originate from
money
legitimate source
3
Cont..
Money laundering generally refers to
washing of the proceeds or profits generated
from:
Drug trafficking
People smuggling
Arms, antique, gold smuggling
Financial frauds
Corruption, or
Illegal sale of wild life products and other
specified predicate offences
4
Steps in money laundering
PLACEMENT
Getting Currency into the financial system so as to convert
illicit funds from cash straight into a financial instrument or
bank account
Immersion / Soaking
LAYERING
Separation of proceeds from illegal source through the use of
complex transactions designed to obscure the audit trail and
hide the proceeds. The criminals frequently use shell
corporations, offshore banks with loose regulation and
secrecy laws for this purpose.
Soaping / Scrubbing
INTEGRATION
It represents the conversion of
illegal proceeds into apparently
legitimate business earnings
through normal financial or
commercial operations. For e.g.
false invoices for goods exported,
domestic loan against a foreign
deposit, purchasing of property
6
Money laundering cycle
7
Money laundering techniques
8
Smurfing
It is the practice of executing financial transactions
(such as the making of bank deposits) in a specific
pattern calculated to avoid the creation of certain
records and reports required by law.
11
Undermining the Integrity of Financi
Markets
Challenge for financial institutions to manage
their assets liabilities and operations
Sudden disappearance of money through
Wire transfers in response to non-market
factors
Liquidity problem & bank collapses
Loss of Control of Economic
Policy
Money laundering is between 2 - 5
% of world gross domestic product
Errors in economic policy resulting
from artificially inflated financial
sectors
False demand
Inexplicable changes in money
demand and increased volatility of
international capital flows, interest,
and exchange rates
Economic Distortion and Instability
Terrorist financing
Specialized
in preparing
forged
South Submit
documents
documents
Indian showing goods
Remitted to Bank imported to India
foreign bank
Money transfer
without money
movement developed
in India
Informal
Formal money
money transfer
transfer system
system
Layering Layering
process is process is
involved eliminated
Conversion of Conversion of
black money to white money
white money to black money
Other Banking scams & Penalties
Jan. 2006 ABM AMRO US$ 80 mio
Aug. 2005 Arab Bank US$ 24 mio
Feb. 2005 City National Bank US$750,000
Jan. 2005 Riggs Bank US$ 41 mio
Oct. 2004 AmSouth Bank US$ 50 mio
Sep. 2004 City Bank Japan Licence cancelled
May. 2004 Riggs Bank US$ 25 mio
25
KYC Norms
KYC norms, what is it?
RBI directed all banks and financial institutions to
put in place a policy framework to know their
customers before opening any account
Mandatory details required under KYC norms are
proof of identity and proof of address
Banks may even ask for verification by an existing
account holder
Standard documents which are accepted as proof of
identity and residence remain the same across
various banks, some deviations are permitted
KYC, what are the features
Features
Making
reasonable
efforts to What
Who your
determine Nature of constitutes
Sources of customers
the true customers reasonable
funds customer
identity and business account
are?
beneficial activity?
ownership
of accounts
KYC, Objectives
Enable Banks to understand their customers and their
financial dealings better
Risk Management
It is about managing internal work to reduce the risk of any unwanted activity.
Managing responsibilities, duties and various audits plus regular employee
training for KYC procedures
Regular review and updating of the parameters or criteria used to generate
monitoring reports or issue alerts
IPO scam 2005-06
Initial public offering of IDFC
Few investors opened 14000 dematerialized accounts
Purpose was to corner large number of shares of the
company
The Reserve Bank of India on Monday 27th Feb 2006 fined
HDFC Bank, IDBI and ING Vysya Bank for violation of
Know Your Customer norms
PMLA ACT & FEMA
Mid 1980s - Growing concern of international
community to deprive criminal elements of
the proceeds of their crimes.
Suspicious Transactions
Deposits
Exchange or
transfer of
Withdrawals
funds in any
currency
Background of client
Multiple accounts
Activity in accounts
Nature of transactions
Value of transactions
Reasons for Suspicion
Identity of client
False identification documents
Identification documents which could not be
verified within reasonable time
Accounts opened with names very close to
other established business entities
Reasons for Suspicion
Background of client
Suspicious background or links with known
criminals
Reasons for Suspicion
Multiple accounts
Large number of accounts having a common
account holder, introducer or authorized
signatory with no rationale
Unexplained transfers between multiple
accounts with no rationale
Reasons for Suspicion
Activity in accounts
Unusual activity compared with past
transactions
Sudden activity in dormant accounts
Activity inconsistent with what would be
expected from declared business
Reasons for Suspicion
Nature of transactions
Unusual or unjustified complexity
No economic rationale or bonafide purpose
Frequent purchases of drafts or other
negotiable instruments with cash
Nature of transactions inconsistent with what
would be expected from declared business
Reasons for Suspicion
Value of transactions
Value just under the reporting threshold amount
in an apparent attempt to avoid reporting
Value inconsistent with the clients apparent
financial standing
Other features
In case of conflict between PMLA and FEMA or other
acts/laws, the provisions of PMLA have over riding effect
1997
Wire transfers 2011
Internet-based and e-money systems Wire transfers
Remittance services and money New electronic payment systems
exchange services
Remittance services and money
Assistance from lawyers exchange services
Hawala, hundi or other underground Assistance from Gatekeepers
banking systems
Hawala, hundi or other
Bank-centered techniques: collection underground banking systems
accounts, loan back arrangements
bank drafts, money orders and Terrorist financing through non-
cashiers cheques smurfing profit organizations
Cash smuggling Insurance industry, particularly
through independent insurance agents
Accounts in relatives names, shell
companies Politically Exposed Persons (PEPs)
52
Affect of Regulations in
US and UK Money Laundering by region
Totally Funds Laundered Worldwide
$1,200
$1,100
$1,000
Asia UAE
34% 15% America
$900
24%
$800
2004 2005 2006 2007 2008 2009 Africa Europe
20% 13%
53
Activities involved
Terrorist
The usual suspects drugs, smuggling, 1%
organized crimeaccount for over
of all money laundering Other
Drugs
Crimes
Terrorist financing is a drop in the 26%
23%
bucket in real terms
Nevertheless it is driving todays AML
and KYC regulations
White collar crime, including Embezz Smuggli
embezzlement and internal fraud, is a elment ng
significant (and growing) problem 21% 29%
54
Spending trends Global AML Software Spending
US$ millions
100 81.4
80 71.0
60.7
60 38.7
40 28.4
20
0
2004 2005 2006 2007 2008 2009
55
Recent Methods
56
Third party funding
Typologies
accounts can be funded
Development of new payment
anonymously where the
methods
specific business model
prepaid cards
permits
mobile payment services
internet payment services (IPS)
Exploitation of the non-
face-to-face nature of NPM
accounts
stolen or fake identities
Minimal face-to-face
contact
57
Typology 1
Internet Payment Mobile Payment
Prepaid- cards
) Services Services:
Third Party Funding
Illegal online Move funds
Sale of stolen
steroid sales related to
goods on a
fraud
commercial
Gambling website
proceeds
Telemarketing
fraud
Payment for
drugs Cash vouchers
to collect
extortion Selling stolen
Terrorist
money phone credits
financing
58
Typology 2 Prepaid- cards
59
Typology 3 Prepaid- cards
Complicit NPM
providers or their
Use of open-loop cards for Embezzlement activities and
employees drug proceeds money laundering
Digital Digital
currency and Fraud Illegal online precious
prepaid scheme gambling metals
cards provider
60
References
www.fiuindia.gov.in
www.moneylaundering.com
www.sebi.gov.in
www.rbi.org.in
www.irdaindia.org
www.finmin.nic.in
www.infrasoftech.com
www.mantas.com
FATF Annual Report Oct 2010
Www.imf.org
61
Questions?
We are happy to help you!
62