SlideShare ist ein Scribd-Unternehmen logo
1 von 41
Illegal /                        Legal /
Dirty             Conversion     white
Money                            Money



Definition: 'Money Laundering' is the process
    by which illegal     funds and assets are
    converted into legitimate funds and assets.
Money Laundering as per section 3 of the
Prevention Money Laundering Act:-

“Whosoever directly or indirectly attempts to
indulge or knowingly assists or knowingly is a party
or is actually involved in any process or activity
connected with the proceeds of crime and projecting
it as untainted property shall be guilty of offence of
money laundering.”

As per Sub - Committee on Narcotics and
Terrorism of US Senate Foreign Relations
Committee:-

“Money Laundering is the conversion of profits from
illegal activities into financial assets which appear to
have legitimate origins.”
Money Laundering                 generally           refers to
‘washing’ of the                 proceeds           or profits
generated from:
                          Kidnapping
     Prostitution                            Extortion



     Drug                                             Bribery
   Trafficking              Criminal                & Corruption
                            Activities


    Smuggling                                       Gambling,
  (arms, people,                                     Robbery,
     goods)                                          Cheating

                                   Counterfeiting
                 Terrorist Act       & Forgery
Money Laundering Cycle:
             1.                              2.
     Predicate Crimes                    PLACEMENT
   •Corruption and Bribery
   •Fraud                             • Initial introduction of
   •Organized crime                     criminal proceeds into
   •Drug and human trafficking          the stream of
   •Environmental crime                 commerce
   •Terrorism                         • Most vulnerable stage
   •Other serious crimes…               of money laundering
                                        process




             4.                                3.
      INTEGRATION                           LAYERING
  •The last stage in the
                                 • Involves distancing the money
   laundering process.             from its criminal source:
  •Occurs when the laundered         • movements of $ into
   proceeds are distributed            different accounts
   back to the criminal.             • movements of money to
  •Creates appearance of               different countries
   legitimate wealth.            • Increasingly difficult to detect.
HOW MONEY LAUNDERING WORKS:
Some of the Popular Places from where
 Money is laundered through…
 Stock Markets


 Agricultural Products (as there is no income tax and
  mostly the transactions are on cash basis)


 Property Market


 Creating Bogus Companies


 Showing Loans


 False Export Import Invoices
Typologies/ Techniques employed
 Deposit structuring or smurfing
 Connected Accounts
 Payable Through Accounts
 Loan back arrangements
 Forex Money Changers
 Credit/ Debit cards
 Investment Banking and the Securities Sector
 Insurance and Personal Investment Products
 Companies Trading and Business Activity
 Correspondent Banking
 Lawyers, Accountants & other Intermediaries
 Misuse of Non-Profit Organizations.
Financing of terrorism:
o   Money to fund terrorist activities moves through the global
    financial system via wire transfers and in and out of personal and
    business accounts. It can sit in the accounts of illegitimate
    charities and be laundered through buying and selling securities
    and other commodities, or purchasing and cashing out insurance
    policies.
o   Although terrorist financing is a form of money laundering, it
    doesn’t work the way conventional money laundering works. The
    money frequently starts out clean i.e. as a ‘charitable donation’
    before moving to terrorist accounts. It is highly time sensitive
    requiring quick response.
Financing of terrorism:
(i) State Sponsored
(ii) Other Activities- legal or non-legal


Legal Sources of terrorist financing
    Collection of membership dues
    Sale of publications
    Cultural of social events
    Door to door solicitation within community
    Appeal to wealthy members of the community
    Donation of a portion of personal savings
Financing of terrorism:

Illegal Sources
   Kidnap and extortion;
   Smuggling;
   Fraud including credit card fraud;
   Misuse of non-profit organizations and charities fraud;
   Thefts and robbery; and
   Drug trafficking
Money Laundering Risks:
What are the risks to banks?

 (i) Reputational risk
 (ii) Legal risk
(iii) Operational risk (failed internal processes,
      people and systems & technology)
(iv) Concentration risk (either side of balance
      sheet).

 All risks are inter-related and together have the
 potential of causing serious       threat to the
 survival of the bank
Reputational Risk:
   The potential that adverse publicity regarding a
    bank’s business practices, whether accurate or
    not, will cause a loss of confidence in the integrity
    of the institution.
   Reputational Risk : a major threat to banks as
    confidence of depositors, creditors and general
    market place to be maintained.
   Banks vulnerable to Reputational Risk as they can
    easily become a vehicle for or a victim of
    customers’ illegal activities.
Operational Risk:
   The risk of direct or indirect loss resulting
    from    inadequate        or   failed    internal
    processes, people and systems or from
    external events.
   Weaknesses in implementation of banks’
    programs,   ineffective    control   procedures
    and failure to practice due diligence.
Legal Risk:
   The possibility that lawsuits, adverse judgments
    or contracts that turn out to be unenforceable
    can disrupt or adversely affect the operations or
    condition of a bank.
   Banks may become subject to lawsuits resulting
    from the failure to observe mandatory KYC
    standards or from the failure to practice due
    diligence.
   Banks can suffer fines, criminal liabilities and
    special penalties imposed by supervisors.
Concentration Risk:
   Mostly applies on the assets side of the
    balance sheet: Information systems to
    identify credit concentrations; setting
    prudential limits to restrict banks’
    exposures to single borrowers or groups
    of related borrowers.
   On liabilities side: Risk of early and
    sudden withdrawal of funds by large
    depositors- damages to liquidity.
Punishment for Offence:
   Imprisonment up to seven years.

   The same is 10 years in case of Narcotics and
    Drugs, and

   Fine up to Rs 5 lacs.

   In addition, the tainted property        is   also
    confiscated by the Central Government.
What KYC means?
   Customer?
   One who maintains an account, establishes business
    relationship, on who’s behalf account is maintained,
    beneficiary of accounts maintained by intermediaries,
    and one who carries potential risk through one off
    transaction.
   Your? Who should know?
 Branch manager, audit officer, monitoring officials, PO.
 Know? What you should know?
 True identity and beneficial ownership of the accounts.
 Permanent address, registered & administrative address.
What KYC means?

   Making reasonable efforts to determine the true identity
    and beneficial ownership of accounts;
   Sources of funds.
   Nature of customers’ business.
   What constitutes reasonable account activity?
   Who your customer’s customer are?
KYC Does Not Mean:
   Denial of Service to the Common Person.
   Intrusive Behavior.
   Use of information for cross selling.
   Harassment of customers- threatening to close
    down the accounts arbitrarily.
Advantages of KYC norms:
    Sound KYC procedures      have particular
     relevance to the safety and soundness of
     banks, in that:

1.   They help to protect banks’ reputation and the
     integrity of banking systems by reducing the
     likelihood of banks becoming a vehicle for or a
     victim of financial crime and suffering
     consequential reputational damage;

2.   They provide an essential part of sound risk
     management system (basis for identifying,
     limiting and controlling risk exposures in assets
     & liabilities).
Core elements of KYC:
   Customer Acceptance Policy.
   Customer Identification Procedure- Customer
    Profile.
   Risk classification of accounts - risk based
    approach.
   Risk Management.
   Ongoing monitoring of account activity.
   Reporting of cash and suspicious transactions.
Measures to deter money
laundering:
   Board and management oversight of AML risks.
   Appointment a senior executive as principal officer with
    adequate authority and resources at his command.
   Systems and controls to identify, assess & manage the money
    laundering risks.
   Make a report to the Board on the operation and
    effectiveness of systems and control.
   Appropriate documentation of risk management policies,
    their application and risk profiles.
Measures to deter money
laundering:
   Appropriate measures to ensure that ML risks are taken
    into account in daily operations, development of new
    financial    products,   establishing    new       business
    relationships and changes in the customer profile.
   Screening of employees before hiring and of those who
    have access to sensitive information.
   Appropriate quality training to staff.
   Quick and timely reporting of suspicious transactions.
SUSPICIOUS TRANACTION:

   Suspicious transaction means a transaction
    whether or not made in cash which, to a person
    acting in good faith –
    • gives rise to a reasonable ground of suspicion
      that it may involve the proceeds of crime; or
    • appears to be made in circumstances         of
      unusual or unjustified complexity; or
    • appears to have no economic rationale or
      bonafide purpose;
SUSPICIOUS TRANACTION:

   Providing misleading information / information not
    easily verifiable while opening an Account.
   Large cash withdrawals from: a dormant or
    inactive account or account with unexpected large
    credit from abroad.
   Sudden increase in cash deposits of an individual
    with no justification.
   Employees leading lavish lifestyles that do not
    match their known income sources.
Suspicious Transaction:

   Large cash deposits into same account.
   Substantial increase in turnover in a dormant
    account.
   Receipt or payment of large cash sums with no
    obvious purpose or relationship to Account holder
    / his business.
   Reluctance to provide normal information when
    opening an Account or providing minimal or
    fictitious information.
Role of cash in money
laundering:
   Disguise the audit trail.
   Provide anonymity.
   Concealing true ownership and origin of money.
   Control over money.
   Changing the form of money.
Cash Transactions:

 All cash transactions of the value of more than
  rupees ten lakhs or its equivalent in foreign
  currency.


 All series of cash transactions integrally
  connected to each other which have been
  valued below rupees ten lakhs or its equivalent
  in foreign currency where such series of
  transactions have taken place within a month.
DUE DATES:
   Cash Transaction Report
    ◦ by 15th of the succeeding month.
      (individual transactions below rupees fifty
       thousand may not be included;)

   Suspicious Transaction Report
    ◦ within 7 days of arriving at a conclusion that
      any transaction is of suspicious nature.
IPO SCAM - INDIA
   Current account opened in the name of multiple
    companies on the same date in the same branch of a
    bank.
   Sole person authorized to operate all these accounts
    who was also a Director in all the companies.
   Identity disguised by using different spelling for the
    same name in different companies.
   Multiple accounts opened in different banks by the
    same group of joint account holders.
   Huge funds transferred from companies accounts to the
    individual’s account which was invested in IPO’s.
IPO SCAM - INDIA
   Loans/ overdrafts got sanctioned in multiple names to
    bypass limit imposed by RBI.
   Loans sanctioned to brokers violating guidelines.
   Multiple DP accounts opened to facilitate investment in
    IPO.
   Large number of cheques for the same value issued from
    a single account on the same day.
   Multiple large value credits received by way of transfer
    from other banks.
IPO SCAM - INDIA

   Several accounts opened for funding the IPO on the
    request of brokers, some were in fictitious names.
   Refunds received got credited in brokers a/cs.
   Margin money provided by brokers through single
    cheque.
   Nexus between merchant banker, brokers and banks
    suspected.
Operational deficiencies:
Factors that facilitated the scam
   Photographs not obtained.
   Proper introductions not obtained.
   Signatures not taken in the presence of bank official.
   Failure to independently verify the identity and address
    of all joint account holders.
   Directors identity/ address not verified.
   Customer Due Diligence done by a subsidiary.
SATYAM – Issue:
   The Enforcement Directorate has registered a case
    against Satyam Computer and its tainted founder-
    chairman B Ramalinga Raju for alleged money
    laundering.
   The ED sources alleged that Raju had diverted funds of
    Satyam into purchasing nearly 50 plots in Medchal and
    Qutbullahpur near Hyderabad.
   The ED alleged that several hundred crore rupees had
    been diverted from the Satyam Computer accounts and
    had been invested in purchasing land and other
    infrastructure for Maytas.
SATYAM – Issue:

    The Directorate will go through deals of the IT
     company and ascertain their genuineness including
     payments made to acquire companies abroad.
    The ED will also send a team to a few countries to
     investigate and get documents of bank accounts

     opened in violation of Indian laws.
Hasan Ali Khan – Issues:

   India's lone banking regulator, Reserve Bank of India,
    recently blocked the application of Swiss bank UBS
    for a banking license in India on the ground that it
    was involved in $8 billion money-laundering racket
   RBI said it put the UBS application on hold because
    the bank failed to cooperate in a money-laundering
    case in which controversial Bombay-based
    businessman Hasan Ali Khan was involved.
Hasan Ali Khan – Issues:

   Khan is charged with large-scale breaching of India's
    currency controls.
   RBI investigators found the link between UBS and
    Khan, as the businessman had deposited $8 billion at
    a Zurich branch of UBS.
   They cited it as direct evidence for blocking the
    license of the bank.
High risk areas of AML:
 High risk countries:
   Drug producing countries
   Countries with high levels of corruption
   Countries linked to terrorist financing

  High risk customers:
   Private money transmitters
   Money changers
   Real estate dealers
   Casinos, gambling outfits
   Non profit organizations –charities

 High risk services:
   Wire transfers
   Private banking
   Correspondent banking
   Electronic banking services-internet, debit/credit cards
Risk Factors:
 Vulnerabilities:
     Entities may not be regulated
     Customer anonymity(Secrecy)
     No face to face relationship
     Anonymous funding(Promissory notes)
     Cross border transfers
     access to cash globally through ATMs

 Possible risk mitigates:
     Verification of customer identity
     Limit funding options
     Limit card value
     Monitor transactions
     Reporting of suspicious activity
     No direct cash via ATM
Anti money laundering

Weitere ähnliche Inhalte

Was ist angesagt?

Money laundering
Money   launderingMoney   laundering
Money launderingsangamdesai
 
Money Laundering by Vivek Singh,Aryan College
Money Laundering  by Vivek Singh,Aryan CollegeMoney Laundering  by Vivek Singh,Aryan College
Money Laundering by Vivek Singh,Aryan CollegeAryan Ajmer
 
Basics of Anti-Money Laundering : A Really Quick Primer
Basics of Anti-Money Laundering : A Really Quick PrimerBasics of Anti-Money Laundering : A Really Quick Primer
Basics of Anti-Money Laundering : A Really Quick Primercomplianceonline123
 
Aml / anti money laundering
Aml / anti money launderingAml / anti money laundering
Aml / anti money launderingSAMBIT SWAIN
 
Anti Money Laundering
Anti Money LaunderingAnti Money Laundering
Anti Money LaunderingTaha Khan
 
ANTI MONEY LAUNDERING REGULATIONS, UAE
ANTI MONEY LAUNDERING REGULATIONS, UAEANTI MONEY LAUNDERING REGULATIONS, UAE
ANTI MONEY LAUNDERING REGULATIONS, UAEJino M Kurian
 
Chapter 6 anti-money laundering and counter-terrorist financing
Chapter 6   anti-money laundering and counter-terrorist financingChapter 6   anti-money laundering and counter-terrorist financing
Chapter 6 anti-money laundering and counter-terrorist financingQuan Risk
 
Money Laundering and Terrorist Financing in a Nutshell: Chapter One
Money Laundering and Terrorist Financing in a Nutshell: Chapter OneMoney Laundering and Terrorist Financing in a Nutshell: Chapter One
Money Laundering and Terrorist Financing in a Nutshell: Chapter OneMd. Moulude Hossain
 
Main presentation aml cft
Main presentation aml cftMain presentation aml cft
Main presentation aml cftAsad Hameed
 
Fraud in the Banking Sector
Fraud in the Banking Sector Fraud in the Banking Sector
Fraud in the Banking Sector Venktesh Venke
 

Was ist angesagt? (20)

Money laundering
Money laundering Money laundering
Money laundering
 
Money laundering
Money   launderingMoney   laundering
Money laundering
 
Aml cft training programme
Aml cft training programmeAml cft training programme
Aml cft training programme
 
Money Laundering by Vivek Singh,Aryan College
Money Laundering  by Vivek Singh,Aryan CollegeMoney Laundering  by Vivek Singh,Aryan College
Money Laundering by Vivek Singh,Aryan College
 
Basics of Anti-Money Laundering : A Really Quick Primer
Basics of Anti-Money Laundering : A Really Quick PrimerBasics of Anti-Money Laundering : A Really Quick Primer
Basics of Anti-Money Laundering : A Really Quick Primer
 
Money Laundering and Corruption
Money Laundering and CorruptionMoney Laundering and Corruption
Money Laundering and Corruption
 
Money laundering
Money launderingMoney laundering
Money laundering
 
Money Laundering Presentation
Money Laundering PresentationMoney Laundering Presentation
Money Laundering Presentation
 
Bank frauds
Bank fraudsBank frauds
Bank frauds
 
AML presentation
AML presentationAML presentation
AML presentation
 
Aml / anti money laundering
Aml / anti money launderingAml / anti money laundering
Aml / anti money laundering
 
Money laundering
Money launderingMoney laundering
Money laundering
 
Anti Money Laundering
Anti Money LaunderingAnti Money Laundering
Anti Money Laundering
 
ANTI MONEY LAUNDERING REGULATIONS, UAE
ANTI MONEY LAUNDERING REGULATIONS, UAEANTI MONEY LAUNDERING REGULATIONS, UAE
ANTI MONEY LAUNDERING REGULATIONS, UAE
 
Chapter 6 anti-money laundering and counter-terrorist financing
Chapter 6   anti-money laundering and counter-terrorist financingChapter 6   anti-money laundering and counter-terrorist financing
Chapter 6 anti-money laundering and counter-terrorist financing
 
Money Laundering and Terrorist Financing in a Nutshell: Chapter One
Money Laundering and Terrorist Financing in a Nutshell: Chapter OneMoney Laundering and Terrorist Financing in a Nutshell: Chapter One
Money Laundering and Terrorist Financing in a Nutshell: Chapter One
 
Main presentation aml cft
Main presentation aml cftMain presentation aml cft
Main presentation aml cft
 
Aml & kyc
Aml & kyc Aml & kyc
Aml & kyc
 
Frauds in banking
Frauds in banking Frauds in banking
Frauds in banking
 
Fraud in the Banking Sector
Fraud in the Banking Sector Fraud in the Banking Sector
Fraud in the Banking Sector
 

Andere mochten auch

Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Panama Papers( leaks) ? The Biggest Financial leaks in History.
Panama Papers( leaks) ? The Biggest Financial leaks in History.Panama Papers( leaks) ? The Biggest Financial leaks in History.
Panama Papers( leaks) ? The Biggest Financial leaks in History.Arslan Haider
 
Questioned Documents First Chapter
Questioned Documents First ChapterQuestioned Documents First Chapter
Questioned Documents First Chapterchapterhouseinc
 
Anti-money laundering presentation
Anti-money laundering presentationAnti-money laundering presentation
Anti-money laundering presentationElias Mose
 
Introduction to Careers in Anti-Money Laundering (AML)
Introduction to Careers in Anti-Money Laundering (AML)Introduction to Careers in Anti-Money Laundering (AML)
Introduction to Careers in Anti-Money Laundering (AML)AML Source
 
Prevention of money laundering act, 2002
Prevention of money laundering act, 2002Prevention of money laundering act, 2002
Prevention of money laundering act, 2002kotha priyanka
 
Panama Papers - The Biggest Financial Leak in History
Panama Papers - The Biggest Financial Leak in HistoryPanama Papers - The Biggest Financial Leak in History
Panama Papers - The Biggest Financial Leak in HistoryStinson
 
Anti-Money Laundering (AML) Risk Assessment Process
Anti-Money Laundering (AML) Risk Assessment ProcessAnti-Money Laundering (AML) Risk Assessment Process
Anti-Money Laundering (AML) Risk Assessment Processaccenture
 

Andere mochten auch (8)

Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Panama Papers( leaks) ? The Biggest Financial leaks in History.
Panama Papers( leaks) ? The Biggest Financial leaks in History.Panama Papers( leaks) ? The Biggest Financial leaks in History.
Panama Papers( leaks) ? The Biggest Financial leaks in History.
 
Questioned Documents First Chapter
Questioned Documents First ChapterQuestioned Documents First Chapter
Questioned Documents First Chapter
 
Anti-money laundering presentation
Anti-money laundering presentationAnti-money laundering presentation
Anti-money laundering presentation
 
Introduction to Careers in Anti-Money Laundering (AML)
Introduction to Careers in Anti-Money Laundering (AML)Introduction to Careers in Anti-Money Laundering (AML)
Introduction to Careers in Anti-Money Laundering (AML)
 
Prevention of money laundering act, 2002
Prevention of money laundering act, 2002Prevention of money laundering act, 2002
Prevention of money laundering act, 2002
 
Panama Papers - The Biggest Financial Leak in History
Panama Papers - The Biggest Financial Leak in HistoryPanama Papers - The Biggest Financial Leak in History
Panama Papers - The Biggest Financial Leak in History
 
Anti-Money Laundering (AML) Risk Assessment Process
Anti-Money Laundering (AML) Risk Assessment ProcessAnti-Money Laundering (AML) Risk Assessment Process
Anti-Money Laundering (AML) Risk Assessment Process
 

Ähnlich wie Anti money laundering

Lalit Srivastava-AML-IBA BANGALORE.ppt
Lalit Srivastava-AML-IBA BANGALORE.pptLalit Srivastava-AML-IBA BANGALORE.ppt
Lalit Srivastava-AML-IBA BANGALORE.pptGarimaVohra4
 
Knowyourcustomer
KnowyourcustomerKnowyourcustomer
KnowyourcustomerViral Jain
 
Skillwise Know your Customer & Money Laundering
Skillwise Know your Customer & Money LaunderingSkillwise Know your Customer & Money Laundering
Skillwise Know your Customer & Money LaunderingSkillwise Group
 
Money laundering.pptx
Money laundering.pptxMoney laundering.pptx
Money laundering.pptxRidwanAhmed40
 
Knowyourcustomer
KnowyourcustomerKnowyourcustomer
Knowyourcustomermohitronnie
 
Money laundering-ppt
Money laundering-pptMoney laundering-ppt
Money laundering-pptSamehSalah26
 
Presentation AML
Presentation AMLPresentation AML
Presentation AMLMirsazzad
 
Risks of money laudering
Risks of money lauderingRisks of money laudering
Risks of money lauderingestiaqur
 
Money Laundering (by BU AIS 2nd Batch)
Money Laundering (by BU AIS 2nd Batch)Money Laundering (by BU AIS 2nd Batch)
Money Laundering (by BU AIS 2nd Batch)Jessic Sharif
 
Understanding Anti-Money Laundering_ A Comprehensive Guide.pdf
Understanding Anti-Money Laundering_ A Comprehensive Guide.pdfUnderstanding Anti-Money Laundering_ A Comprehensive Guide.pdf
Understanding Anti-Money Laundering_ A Comprehensive Guide.pdftewhimanshu23
 
Fraud risk management in banks
Fraud risk management  in banksFraud risk management  in banks
Fraud risk management in bankssathyananda prabhu
 

Ähnlich wie Anti money laundering (20)

Lalit Srivastava-AML-IBA BANGALORE.ppt
Lalit Srivastava-AML-IBA BANGALORE.pptLalit Srivastava-AML-IBA BANGALORE.ppt
Lalit Srivastava-AML-IBA BANGALORE.ppt
 
Knowyourcustomer
KnowyourcustomerKnowyourcustomer
Knowyourcustomer
 
Skillwise Know your Customer & Money Laundering
Skillwise Know your Customer & Money LaunderingSkillwise Know your Customer & Money Laundering
Skillwise Know your Customer & Money Laundering
 
Money laundering.pptx
Money laundering.pptxMoney laundering.pptx
Money laundering.pptx
 
Knowyourcustomer
KnowyourcustomerKnowyourcustomer
Knowyourcustomer
 
Money laundering-ppt
Money laundering-pptMoney laundering-ppt
Money laundering-ppt
 
Money Laundering
Money Laundering Money Laundering
Money Laundering
 
Skillwise AML
Skillwise AMLSkillwise AML
Skillwise AML
 
Presentation AML
Presentation AMLPresentation AML
Presentation AML
 
AML Training uba capital
AML Training uba capitalAML Training uba capital
AML Training uba capital
 
Risks of money laudering
Risks of money lauderingRisks of money laudering
Risks of money laudering
 
AML Presentation 2.pptx
AML Presentation 2.pptxAML Presentation 2.pptx
AML Presentation 2.pptx
 
Aml presentation
Aml presentationAml presentation
Aml presentation
 
Money Laundering (by BU AIS 2nd Batch)
Money Laundering (by BU AIS 2nd Batch)Money Laundering (by BU AIS 2nd Batch)
Money Laundering (by BU AIS 2nd Batch)
 
Money laundering
Money launderingMoney laundering
Money laundering
 
AML Presentation 2 - Nigeria.pptx
AML Presentation 2 - Nigeria.pptxAML Presentation 2 - Nigeria.pptx
AML Presentation 2 - Nigeria.pptx
 
AML Presentation 2 - Nigeria.pptx
AML Presentation 2 - Nigeria.pptxAML Presentation 2 - Nigeria.pptx
AML Presentation 2 - Nigeria.pptx
 
Understanding Anti-Money Laundering_ A Comprehensive Guide.pdf
Understanding Anti-Money Laundering_ A Comprehensive Guide.pdfUnderstanding Anti-Money Laundering_ A Comprehensive Guide.pdf
Understanding Anti-Money Laundering_ A Comprehensive Guide.pdf
 
Bribery and corruption alm cft by prof oyedokun
Bribery and corruption alm cft by prof oyedokunBribery and corruption alm cft by prof oyedokun
Bribery and corruption alm cft by prof oyedokun
 
Fraud risk management in banks
Fraud risk management  in banksFraud risk management  in banks
Fraud risk management in banks
 

Kürzlich hochgeladen

Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptxJonalynLegaspi2
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Developmentchesterberbo7
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleCeline George
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 

Kürzlich hochgeladen (20)

Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptx
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Development
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP Module
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 

Anti money laundering

  • 1.
  • 2. Illegal / Legal / Dirty Conversion white Money Money Definition: 'Money Laundering' is the process by which illegal funds and assets are converted into legitimate funds and assets.
  • 3. Money Laundering as per section 3 of the Prevention Money Laundering Act:- “Whosoever directly or indirectly attempts to indulge or knowingly assists or knowingly is a party or is actually involved in any process or activity connected with the proceeds of crime and projecting it as untainted property shall be guilty of offence of money laundering.” As per Sub - Committee on Narcotics and Terrorism of US Senate Foreign Relations Committee:- “Money Laundering is the conversion of profits from illegal activities into financial assets which appear to have legitimate origins.”
  • 4. Money Laundering generally refers to ‘washing’ of the proceeds or profits generated from: Kidnapping Prostitution Extortion Drug Bribery Trafficking Criminal & Corruption Activities Smuggling Gambling, (arms, people, Robbery, goods) Cheating Counterfeiting Terrorist Act & Forgery
  • 5. Money Laundering Cycle: 1. 2. Predicate Crimes PLACEMENT •Corruption and Bribery •Fraud • Initial introduction of •Organized crime criminal proceeds into •Drug and human trafficking the stream of •Environmental crime commerce •Terrorism • Most vulnerable stage •Other serious crimes… of money laundering process 4. 3. INTEGRATION LAYERING •The last stage in the • Involves distancing the money laundering process. from its criminal source: •Occurs when the laundered • movements of $ into proceeds are distributed different accounts back to the criminal. • movements of money to •Creates appearance of different countries legitimate wealth. • Increasingly difficult to detect.
  • 7. Some of the Popular Places from where Money is laundered through…  Stock Markets  Agricultural Products (as there is no income tax and mostly the transactions are on cash basis)  Property Market  Creating Bogus Companies  Showing Loans  False Export Import Invoices
  • 8. Typologies/ Techniques employed  Deposit structuring or smurfing  Connected Accounts  Payable Through Accounts  Loan back arrangements  Forex Money Changers  Credit/ Debit cards  Investment Banking and the Securities Sector  Insurance and Personal Investment Products  Companies Trading and Business Activity  Correspondent Banking  Lawyers, Accountants & other Intermediaries  Misuse of Non-Profit Organizations.
  • 9. Financing of terrorism: o Money to fund terrorist activities moves through the global financial system via wire transfers and in and out of personal and business accounts. It can sit in the accounts of illegitimate charities and be laundered through buying and selling securities and other commodities, or purchasing and cashing out insurance policies. o Although terrorist financing is a form of money laundering, it doesn’t work the way conventional money laundering works. The money frequently starts out clean i.e. as a ‘charitable donation’ before moving to terrorist accounts. It is highly time sensitive requiring quick response.
  • 10. Financing of terrorism: (i) State Sponsored (ii) Other Activities- legal or non-legal Legal Sources of terrorist financing  Collection of membership dues  Sale of publications  Cultural of social events  Door to door solicitation within community  Appeal to wealthy members of the community  Donation of a portion of personal savings
  • 11. Financing of terrorism: Illegal Sources  Kidnap and extortion;  Smuggling;  Fraud including credit card fraud;  Misuse of non-profit organizations and charities fraud;  Thefts and robbery; and  Drug trafficking
  • 12. Money Laundering Risks: What are the risks to banks? (i) Reputational risk (ii) Legal risk (iii) Operational risk (failed internal processes, people and systems & technology) (iv) Concentration risk (either side of balance sheet). All risks are inter-related and together have the potential of causing serious threat to the survival of the bank
  • 13. Reputational Risk:  The potential that adverse publicity regarding a bank’s business practices, whether accurate or not, will cause a loss of confidence in the integrity of the institution.  Reputational Risk : a major threat to banks as confidence of depositors, creditors and general market place to be maintained.  Banks vulnerable to Reputational Risk as they can easily become a vehicle for or a victim of customers’ illegal activities.
  • 14. Operational Risk:  The risk of direct or indirect loss resulting from inadequate or failed internal processes, people and systems or from external events.  Weaknesses in implementation of banks’ programs, ineffective control procedures and failure to practice due diligence.
  • 15. Legal Risk:  The possibility that lawsuits, adverse judgments or contracts that turn out to be unenforceable can disrupt or adversely affect the operations or condition of a bank.  Banks may become subject to lawsuits resulting from the failure to observe mandatory KYC standards or from the failure to practice due diligence.  Banks can suffer fines, criminal liabilities and special penalties imposed by supervisors.
  • 16. Concentration Risk:  Mostly applies on the assets side of the balance sheet: Information systems to identify credit concentrations; setting prudential limits to restrict banks’ exposures to single borrowers or groups of related borrowers.  On liabilities side: Risk of early and sudden withdrawal of funds by large depositors- damages to liquidity.
  • 17. Punishment for Offence:  Imprisonment up to seven years.  The same is 10 years in case of Narcotics and Drugs, and  Fine up to Rs 5 lacs.  In addition, the tainted property is also confiscated by the Central Government.
  • 18. What KYC means?  Customer?  One who maintains an account, establishes business relationship, on who’s behalf account is maintained, beneficiary of accounts maintained by intermediaries, and one who carries potential risk through one off transaction.  Your? Who should know?  Branch manager, audit officer, monitoring officials, PO.  Know? What you should know?  True identity and beneficial ownership of the accounts.  Permanent address, registered & administrative address.
  • 19. What KYC means?  Making reasonable efforts to determine the true identity and beneficial ownership of accounts;  Sources of funds.  Nature of customers’ business.  What constitutes reasonable account activity?  Who your customer’s customer are?
  • 20. KYC Does Not Mean:  Denial of Service to the Common Person.  Intrusive Behavior.  Use of information for cross selling.  Harassment of customers- threatening to close down the accounts arbitrarily.
  • 21. Advantages of KYC norms:  Sound KYC procedures have particular relevance to the safety and soundness of banks, in that: 1. They help to protect banks’ reputation and the integrity of banking systems by reducing the likelihood of banks becoming a vehicle for or a victim of financial crime and suffering consequential reputational damage; 2. They provide an essential part of sound risk management system (basis for identifying, limiting and controlling risk exposures in assets & liabilities).
  • 22. Core elements of KYC:  Customer Acceptance Policy.  Customer Identification Procedure- Customer Profile.  Risk classification of accounts - risk based approach.  Risk Management.  Ongoing monitoring of account activity.  Reporting of cash and suspicious transactions.
  • 23. Measures to deter money laundering:  Board and management oversight of AML risks.  Appointment a senior executive as principal officer with adequate authority and resources at his command.  Systems and controls to identify, assess & manage the money laundering risks.  Make a report to the Board on the operation and effectiveness of systems and control.  Appropriate documentation of risk management policies, their application and risk profiles.
  • 24. Measures to deter money laundering:  Appropriate measures to ensure that ML risks are taken into account in daily operations, development of new financial products, establishing new business relationships and changes in the customer profile.  Screening of employees before hiring and of those who have access to sensitive information.  Appropriate quality training to staff.  Quick and timely reporting of suspicious transactions.
  • 25. SUSPICIOUS TRANACTION:  Suspicious transaction means a transaction whether or not made in cash which, to a person acting in good faith – • gives rise to a reasonable ground of suspicion that it may involve the proceeds of crime; or • appears to be made in circumstances of unusual or unjustified complexity; or • appears to have no economic rationale or bonafide purpose;
  • 26. SUSPICIOUS TRANACTION:  Providing misleading information / information not easily verifiable while opening an Account.  Large cash withdrawals from: a dormant or inactive account or account with unexpected large credit from abroad.  Sudden increase in cash deposits of an individual with no justification.  Employees leading lavish lifestyles that do not match their known income sources.
  • 27. Suspicious Transaction:  Large cash deposits into same account.  Substantial increase in turnover in a dormant account.  Receipt or payment of large cash sums with no obvious purpose or relationship to Account holder / his business.  Reluctance to provide normal information when opening an Account or providing minimal or fictitious information.
  • 28. Role of cash in money laundering:  Disguise the audit trail.  Provide anonymity.  Concealing true ownership and origin of money.  Control over money.  Changing the form of money.
  • 29. Cash Transactions:  All cash transactions of the value of more than rupees ten lakhs or its equivalent in foreign currency.  All series of cash transactions integrally connected to each other which have been valued below rupees ten lakhs or its equivalent in foreign currency where such series of transactions have taken place within a month.
  • 30. DUE DATES:  Cash Transaction Report ◦ by 15th of the succeeding month. (individual transactions below rupees fifty thousand may not be included;)  Suspicious Transaction Report ◦ within 7 days of arriving at a conclusion that any transaction is of suspicious nature.
  • 31. IPO SCAM - INDIA  Current account opened in the name of multiple companies on the same date in the same branch of a bank.  Sole person authorized to operate all these accounts who was also a Director in all the companies.  Identity disguised by using different spelling for the same name in different companies.  Multiple accounts opened in different banks by the same group of joint account holders.  Huge funds transferred from companies accounts to the individual’s account which was invested in IPO’s.
  • 32. IPO SCAM - INDIA  Loans/ overdrafts got sanctioned in multiple names to bypass limit imposed by RBI.  Loans sanctioned to brokers violating guidelines.  Multiple DP accounts opened to facilitate investment in IPO.  Large number of cheques for the same value issued from a single account on the same day.  Multiple large value credits received by way of transfer from other banks.
  • 33. IPO SCAM - INDIA  Several accounts opened for funding the IPO on the request of brokers, some were in fictitious names.  Refunds received got credited in brokers a/cs.  Margin money provided by brokers through single cheque.  Nexus between merchant banker, brokers and banks suspected.
  • 34. Operational deficiencies: Factors that facilitated the scam  Photographs not obtained.  Proper introductions not obtained.  Signatures not taken in the presence of bank official.  Failure to independently verify the identity and address of all joint account holders.  Directors identity/ address not verified.  Customer Due Diligence done by a subsidiary.
  • 35. SATYAM – Issue:  The Enforcement Directorate has registered a case against Satyam Computer and its tainted founder- chairman B Ramalinga Raju for alleged money laundering.  The ED sources alleged that Raju had diverted funds of Satyam into purchasing nearly 50 plots in Medchal and Qutbullahpur near Hyderabad.  The ED alleged that several hundred crore rupees had been diverted from the Satyam Computer accounts and had been invested in purchasing land and other infrastructure for Maytas.
  • 36. SATYAM – Issue:  The Directorate will go through deals of the IT company and ascertain their genuineness including payments made to acquire companies abroad.  The ED will also send a team to a few countries to investigate and get documents of bank accounts opened in violation of Indian laws.
  • 37. Hasan Ali Khan – Issues:  India's lone banking regulator, Reserve Bank of India, recently blocked the application of Swiss bank UBS for a banking license in India on the ground that it was involved in $8 billion money-laundering racket  RBI said it put the UBS application on hold because the bank failed to cooperate in a money-laundering case in which controversial Bombay-based businessman Hasan Ali Khan was involved.
  • 38. Hasan Ali Khan – Issues:  Khan is charged with large-scale breaching of India's currency controls.  RBI investigators found the link between UBS and Khan, as the businessman had deposited $8 billion at a Zurich branch of UBS.  They cited it as direct evidence for blocking the license of the bank.
  • 39. High risk areas of AML: High risk countries: Drug producing countries Countries with high levels of corruption Countries linked to terrorist financing High risk customers: Private money transmitters Money changers Real estate dealers Casinos, gambling outfits Non profit organizations –charities High risk services: Wire transfers Private banking Correspondent banking Electronic banking services-internet, debit/credit cards
  • 40. Risk Factors: Vulnerabilities: Entities may not be regulated Customer anonymity(Secrecy) No face to face relationship Anonymous funding(Promissory notes) Cross border transfers access to cash globally through ATMs Possible risk mitigates: Verification of customer identity Limit funding options Limit card value Monitor transactions Reporting of suspicious activity No direct cash via ATM