- •ABBREVIATIONS AND ACRONYMS
- •INTRODUCTION
- •1. The evolution of money laundering and AML/CFT measures
- •1.1. A brief history of money laundering
- •1.2. The first stage of ML evolution: Al Capone tax evasion charges
- •1.3. The subsequent stages of ML evolution: better hiding techniques
- •1.4. The appearance of “money laundering” expression in the legal context
- •1.5. Further development of the international AML/CFT standards
- •2. An overview of money laundering and AML regime goals
- •2.1. Basic concept of money laundering
- •2.2. Predicate offences: the scope and methods of AML/CFT description
- •2.3. Definition of money laundering in the narrow sense
- •2.4. Definition of money laundering in the broad sense
- •2.5. Anti-money laundering measures of combating organized crime
- •2.6. The process of money laundering and modeling of its phases
- •3. Applying a risk-based approach to a model AML/CFT regime
- •3.1. Key institutions of a national AML/CFT regime
- •3.2. Methodology bases of a risk-based approach and national AML/CFT coordination
- •3.3. Financial institutions: definition for AML/CFT purposes through activities and operations related to managing clients’ assets
- •3.4. Definition of financial institutions for AML/CFT purposes through activities and operations other then managing clients’ assets
- •3.5. AML/CFT definition of designated non-financial businesses and professions
- •3.6. AML/CFT risk-assessment obligations and decisions for countries
- •4. Legal requirements for a national AML/CFT regime
- •4.1. An extension of liability for money laundering to the predicate offence perpetrator: the adverse implications for the economy
- •4.2. Dual criminality for money laundering offences committed internationally
- •4.3. “State of mind” connected with a money laundering offence
- •4.4. Confiscation and provisional measures related to AML/CFT
- •4.5. Non-conviction based confiscation and corporate liability for money laundering
- •5. Explanations of terrorism and the financing of terrorism
- •5.1. Social and economic origins of terrorism
- •5.2. Basic concept of terrorist financing
- •5.3. Legal definition of terrorism and terrorist financing
- •5.4. Characteristics of the terrorist financing offence and legal capacity to prosecute persons that finance terrorism
- •5.5. Targeted financial sanctions related to terrorism, terrorist financing and proliferation
- •6. Institutional bases of the international AML/CFT framework
- •6.1. The United Nations bodies of the international AML/CFT framework
- •6.2. The United Nations organizations of the international AML/CFT framework
- •6.3. Main functions of the Financial Action Taskforce
- •6.4. The Financial Action Task Force associate members and observers
- •6.5. The Egmont Group of financial intelligence units and international AML/CFT standard setters in banking, securities and insurance sectors
- •6.6. The Wolfsberg Group of banks and its AML/CFT documents
- •7. Customer due diligence measures undertaken by financial institutions
- •7.1. General requirements for AML/CFT programs of financial institutions and groups of financial institutions
- •7.2. Methodology approach to customer due diligence
- •7.3. Additional features of customer due diligence
- •7.4. Customer due diligence measures for legal persons and their arrangements
- •7.5. Actions of financial institutions in case of inability to comply with customer due diligence requirements
- •7.6. AML/CFT-related record-keeping requirements for financial institutions
- •8. Risk-based approach pursued by financial institutions in customer due diligence
- •8.1. Reliance on customer due diligence information received from third parties
- •8.2. Potentially higher-risk situations for enhanced customer due diligence measures
- •8.3. Lower-risk situations for simplified customer due diligence measures
- •8.4. Enhanced customer due diligence measures
- •8.5. Simplified customer due diligence measures
- •9. Additional AML/CFT measures for specific activities of financial institutions
- •9.1. AML/CFT requirements for cross-border correspondent banking relationships
- •9.2. Definition of wire transfers and activities of involved parties
- •9.3. The scope of applying AML/CFT measures to wire transfers
- •9.4. AML/CFT measures of information gathering related to wire transfers
- •9.6. AML/CFT obligations for persons that provide money or value transfer services
- •10. Additional AML/CFT measures for specific customers, entities and professions
- •10.1. Definition of politically exposed persons and the scope of applying AML/CFT measures
- •10.2. Additional AML/CFT measures for politically exposed persons
- •10.3. AML/CFT requirements for financial institutions with foreign operations
- •10.4. Customer due diligence and record-keeping requirements for designated non-financial businesses and professions
- •10.5. Other AML/CFT requirements for designated non-financial businesses and professions
- •11. Competent authorities of a national AML/CFT system
- •11.1. General requirements for government agencies with an AML/CFT function
- •11.2. Approaches to AML/CFT-related regulation and supervision
- •11.3. Financial intelligence unit and its core functions
- •11.4. AML/CFT responsibilities of law enforcement and investigative authorities
- •11.5. Detecting and countering activities of cash couriers for the AML/CFT purposes
- •12. Additional requirements for a national AML/CFT regime and issues of international cooperation
- •12.1. Transparency and beneficial ownership of legal persons and their arrangements
- •12.2. Prevention of using non-profit organizations for the purpose of terrorist financing
- •12.3. General principles of AML/CFT mutual legal assistance
- •12.4. Mutual legal assistance: freezing and confiscation of assets related to money laundering and terrorist financing
- •12.5. Extradition in relation to money laundering and terrorist financing
- •12.6. International exchange of information between government agencies with an AML/CFT function
2. An overview of money laundering and AML regime goals
|
|
|
KEY WORDS |
|
|
• |
abetting |
• |
embezzlement |
• |
offshore financial |
• |
abuse |
• |
facilitating |
|
center (OFC) |
• |
bribery |
• |
ill-gotten |
• |
predicate offence |
• |
conspiracy to com- |
• |
illicit |
• |
proceeds |
|
mit |
• |
illicit trafficking (in |
• |
remuneration |
• |
conversion |
|
something) |
• |
shell company |
• |
counseling |
• |
intermediary |
• |
to conceal |
• |
criminal activity |
• |
legitimized |
• |
to disguise |
• |
disbursement |
|
|
• |
transfer |
KEY QUESTIONS
•Why would somebody desire to sponsor a criminal activity?
•List the different types of yield from the commissioning of a crime.
•What kind of intangible utility can someone derive from a crime?
•How can currency be reinvested into criminal activity?
•Why is it necessary to conceal an illicit origin of proceeds?
•What kind of techniques do criminals use when trying to disguise the origin of proceeds from crime?
•What is the difference between the terms “legalized” and “legitimized”?
•Why is it important to mask multiple financial transactions in the course of money laundering?
•What is a predicate offence? Why is it called designated?
•Which methods are used to describe predicate offences?
•Name international conventions that cover specific predicate offences.
•How can tax evasion be defined as a predicate offence to money laundering?
•List major designated categories of offences covered by the General Glossary.
•List the articles of the Merida Convention which cover specific predicate offences.
17
•What does a criminal do when he launders money in the narrow sense?
•Describe the differences between money laundering definitions in part (a) of Article 6 of the Palermo Convention.
•Which three actions, with proceeds from crime, will be qualified as money laundering in the broad sense?
•Define the term “basic concepts of a country’s legal system”.
•What is the difference between conversion and transfer of property?
•Compare different characteristics of criminal proceeds: nature, source, location, disposition and ownership rights.
•Is it fair to convict a person on money laundering charges for possession of proceeds from crime? Why?
•Why is it necessary, for competent authorities, to keep in mind that a perpetrator had to know at the time of receipt, that property was proceeds of crime?
•List eight activities that constitute money laundering in the broad sense.
•Describe the hierarchy of an organized criminal group and list the main activities of its actors.
•Why is it necessary to break large amounts of cash into smaller amounts during the “placement” phase of money laundering?
•Which activities will be performed during the “layering” phase of money laundering?
•What will a criminal do during the integration of proceeds from crime (based upon the three phase model)?
•Why are AML measures so important? Is it easy to convict criminals of commissioning predicate offences?
•Why do money launderers eventually seek to purchase real estate and stakes in legitimate companies?
18
2.1. Basic concept of money laundering
Sponsorship, e.g. |
|
Criminal activity |
|
|
based upon ideologi- |
|
|
|
|
|
|
|
||
cal grounds |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Proceeds and the yield of a criminal activity |
|
|
|
|
|
|
|
Goods and currency of insignif- |
Currency, goods |
|
|
|
Reinvestments |
||
icant value designated for per- |
and services of |
|
|
sonal consumption by criminals, |
monetary value |
|
|
|
|
||
e.g.: |
|
|
|
|
|
|
•purchasing clothes, food and personal items;
•keeping stolen household Criminals desire to use proceeds from a
goods. |
|
|
criminal activity in legal economy, e.g. |
|||
Satisfaction derived by mentally |
acquire real estate, transportation or in- |
|||||
inadequate criminals from vio- |
vest in companies which obey the law |
|||||
lence |
inflicted upon |
victims, |
|
|
|
|
|
|
|
||||
e.g. rape, molestation. |
|
|
|
|
|
|
Public |
disturbances caused by |
|
|
|
|
|
|
A necessity to |
|
Government |
|||
extremist or terrorist |
actions |
|
|
|||
|
conceal an illicit |
|
enforced AML |
|||
sanctioned by sponsors. |
|
|
|
|||
|
|
origin of proceeds |
|
measures |
||
|
|
|
|
|
||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Trying to disguise the origin of proceeds, criminals send them through legal channels:
•use different financial institutions, make multiple financial transactions
•transfer funds to, through and from different countries, especially offshore financial centers (OFCs)
•establish shell companies
•use different financial instruments and value-storing assets
•use other intermediaries, such as financial advisers, realtors, accountants and service providers
When money is laundered and its illegal origin is disguised, the origins of illicit proceeds appear to look like a legitimate business. The ill-gotten gains of crime have been “legitimized”.
19
2.2. Predicate offences: the scope and methods of AML/CFT description
Methods of describing predicate offences:
1.All offenses.
2.A threshold approach:
a.All offences that are designated “serious offences”, for example, indictable offences, felonies and crimes as opposed to misdemeanors.
b.All offences punishable by a minimum penalty of more than six months imprisonment.
c.All offences punishable by a maximum penalty of more than one
year imprisonment. |
The threshold must cover all these categories |
3. A list of predicate offenses. |
The 21 designated categories of offences (General Glossary):
1.Participation in an organized criminal
group and racketeering. Art. 5 of Palermo Convention
2.Terrorism, including terrorism financing.
3. |
Trafficking in human beings and migrant |
|
|
|
|
|
|
|
|
||||||
|
|
|
Vienna Convention |
|
|||||||||||
|
smuggling. |
|
|
|
|
|
|
|
|
|
|||||
|
|
|
|
|
|
|
|
|
|
||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||
4. |
Sexual exploitation, including sexual ex- |
|
|
|
|
|
|
|
|
||||||
|
ploitation of children. |
|
|
|
|
|
|
|
|
|
|
|
|
||
|
|
|
|
|
|
|
|
Articles of the Merida Con- |
|||||||
5. |
Illicit |
trafficking |
in |
narcotic |
drugs and |
|
|
|
|||||||
|
|
|
vention: |
|
|
|
|
||||||||
|
psychotropic substances. |
|
|
|
|
|
|
|
|
|
|||||
|
|
|
|
|
|
15. Bribery of national pub- |
|||||||||
|
|
|
|
|
|
||||||||||
6. |
Illicit arms trafficking. |
|
|
|
|
||||||||||
|
|
|
|
lic officials. |
|
|
|
||||||||
7. |
Illicit |
trafficking |
in |
stolen |
and other |
|
|
|
|
|
|
||||
|
|
|
16. Bribery of foreign public |
||||||||||||
|
goods. |
|
|
|
|
|
|
|
|
|
|||||
|
|
|
|
|
|
|
|
|
|
officials |
and |
officials |
of |
||
8. |
Corruption and bribery. |
|
|
|
|
|
|
||||||||
|
|
|
|
|
public international |
or- |
|||||||||
9. |
Fraud. |
|
|
|
|
|
|
|
|
|
|||||
|
|
|
|
|
|
|
|
|
ganizations. |
|
|
|
|||
10. |
Counterfeiting currency. |
|
|
|
|
|
|
|
|||||||
|
|
|
|
17. Embezzlement, |
misap- |
||||||||||
11. |
Counterfeiting and piracy of products. |
|
|
|
|||||||||||
|
|
|
propriation or other di- |
||||||||||||
12. |
Environmental crime. |
|
|
|
|
|
|
|
|||||||
13. |
Murder, grievous bodily injury. |
|
|
|
version of property by a |
||||||||||
14. |
Kidnapping, illegal restraint and hostage |
|
|
|
public official. |
|
|
||||||||
|
taking. |
|
|
|
|
|
|
|
|
18. Trading in influence. |
|
||||
15. |
Robbery or theft. |
|
|
|
|
|
|
|
|
19. Abuse of functions. |
|
||||
16. |
Smuggling (including in relation to |
|
|
|
21. Bribery |
in |
the |
private |
|||||||
|
customs and excise duties and taxes). |
|
|
|
sector. |
|
|
|
|
||||||
17. |
Tax crimes (related to direct taxes and |
|
|
|
22. Embezzlement of |
prop- |
|||||||||
|
indirect taxes). |
|
|
|
|
|
|
|
|
erty in the private sector. |
|||||
18. |
Extortion. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|||
19. |
Forgery. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
20. |
Piracy. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
21. |
Insider trading and market manipulation. |
|
Art. 8 of Palermo Convention |
|
|||||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
20