Are Your LinkedIn Postings Increasing Your Personal Risks?

There are many articles posted on LinkedIn and other social media sites advising of the risks to members who use LinkedIn.  Most address criminal threats including the risk of members being defrauded, having their identity stolen, or vulnerability to other cybercrimes (e.g. malware, hacking).  The threat of foreign intelligence agencies cultivating LinkedIn users or harnessing their information has also been identified to members.  But absent from discussion is risk that arises from certain posts and comments made by members in LinkedIn.

The personal details about a member and the information they post on LinkedIn is of value to government and private sector organisations when undertaking personal vetting of job applicants and screening of current employees to ensure compliance with internal social media policies or for security purposes.  To protect themselves and family members, LinkedIn members need to be very careful about what they post on that site and the tone and language they use.

LinkedIn is a business and employment focused online professional platform that is primarily used for professional networking and career development. Users on LinkedIn tend to share industry news, career insights, thought leadership articles, and job postings. Revenue for LinkedIn is derived from selling access to information abouts its members, which includes their posts and comments.  Purchasers of that information vary but include criminal groups masking behind a business to commit crime or launder money or both.  For example, fake job advertisements designed to trap people into human trafficking.  In relation to Human trafficking, EUROPOL recently advised: “criminal networks increasingly exploit online platforms for recruitment, facilitation, advertisement, payment and victim control.

But recently and perhaps has been occurring for some time, many users of LinkedIn have forgotten the purpose of LinkedIn and are using it to post articles and information unrelated to business networking or employment. In recent times, many of the postings have centred around political issues, for example the election and appointment of President Donald Trump and the policies of various political parties to name a few.  While people are free to express their opinion, some should exercise restraint and refrain from posting or making the comments that they do.  Because some comments are inaccurate; baseless, highly inflammatory (particularly when directed at people with religious beliefs), and unbalanced.  They do not cast a positive light on the person posting. Not only is the information not relevant to the purpose of LinkedIn, what a member releases on that site could identify themselves as a potential target of organised crime or a foreign intelligence organisation and/or have adverse consequences for their career and their family.

Information posted on LinkedIn can (and in fact is) harvested by foreign intelligence agencies and criminal organisations and examined by public and private sector organisations.  The last two use the information to screen potential candidates for vacant positions or to do background checks on current employees to determine if they are suitable for a vacant position, promotion, or are using social media sites in compliance with their internal policies.  Local intelligence and law enforcement agencies also view LinkedIn data and use it to assess if that person is a threat to their country.

So how is the information disclosed by a LinkedIn user of value to the entities referred to earlier?

Indicators Of Behaviour

Language is a core component of a persons’ identity.  It reflects values and beliefs.  A posting and comments by people contain indicators of the type of person they are. The words and tone provide a glimpse into the internal workings of a persons’ mind.  Postings and comments that are inaccurate, unbalanced, and/or emotional are like gold for criminal organisations and foreign intelligence agencies because they identify people who might be easy to cultivate.  For example; some members using LinkedIn make derogatory, disrespectful, or factually incorrect comments about religion, political beliefs, and policies. 

Criminal elements and foreign intelligence agencies use a variety of techniques to identify people they consider vulnerable due to their communication practices.  The process is made easier by data mining techniques and information technology. And with the adoption of artificial intelligence, the extraction of information will be more widespread and quicker.  All aided by the assistance of psychologists who provide valuable input into building personal profiles of people.  And it starts with using tools to identify various words which then identify a potential target.  People who are vain, arrogant or narcissistic are natural recruiting targets.

Once a target has been identified in LinkedIn, grooming techniques are then used to cultivate that person.  Grooming is a technique that involves building a social relation with a person who been identified as a grooming target.  A person who makes a post or comment in LinkedIn might be easy to groom because all a groomer must do to commence the social relationship is agree with that person.  No matter how inaccurate, emotional, or ridiculous a post or comment is.   Once a person who has posted information sees that a person is on their side and responds to that person, a door has been opened to a groomer. The groomer (representing a criminal organisation or intelligence agency) then to build the relationships, follows each information post that person makes either on LinkedIn or elsewhere, supporting the opinion expressed by the target with their own commentary.  The door is opened wider when the target accepts a request from the groomer to connect in LinkedIn and engages in conversation.  It does not mean that a person who expresses their free will in a way that others feel is inappropriate would fall victim to grooming.  The language and tone are merely indicators and used to identify potential targets.

Once a person of interest has been identified as a target as evidenced from what they have recorded on LinkedIn and the grooming process has commenced, the next steps might involve identifying other vulnerable people connected to the target who can be exploited; for example: work colleagues, associates, and friends.  Criminal organisations and intelligence agencies know that like minded people often congregate, so pursing those persons might expose other persons of interest, sometimes of greater value.  The initial target might not be the main objective.  It might be  someone closer to them for example their manager, or head of information technology or a procurement manager.  In the human cultivation game, criminal organisations and intelligence agencies know that often the “longest way round is the shortest way home.”

Why LinkedIn Is More Valuable 

Criminal organisations and foreign intelligence agencies also scan social media such as Facebook, Instagram etc for exploitable indicators of a person’s character, but LinkedIn is particularly valuable for them.  That is due to the neatly assembled information that is posted.  A person’s LinkedIn profile will normally list where a person works, their employment history, the position they occupy and have occupied, and where they have worked. And they can download it for free or buy it from LinkedIn.

Data from LinkedIn about a target is then consolidated with data obtained or stolen from other sources including social media to gain a full picture of the target.  The techniques used by criminal organisations and foreign intelligence agencies mirror profiling techniques used by law enforcement and intelligence agencies.   Even a simple hand draw association matrix would significantly benefit criminals and intelligence operatives. And in the intelligence game “all the pieces matter”.

As the data is collected, collated, and analysed a clearer picture of a target is obtained.  This includes not only where they work but details of friends, associates, and family members particularly any partner and children.  Additional targeting strategies are then developed, or the information is sold to another group to exploit for example: criminal groups who specialise in human trafficking including child sex trafficking.

Close family members could therefore end up being identified and exposed to criminals who want to scam or cause a victim psychological, reputational, or physical harm all started because of an inappropriate comment or post on a business and networking site.

Value For Public Sector & Private Sector Organisations

For public sector and private sector organisations conducting vetting checks on applicants or current employees (and in many cases on suppliers and contractors) LinkedIn profiles, posts and comments are an essential tool in determining whether a person they are considering employing or currently employ or a contractor or supplier; represent a risk to the organisation.  Risks assessed are many but include the risk of fraud, corruption, reputational damage and health and safety.

Organisations using various search tools and/or purchase data can easily identify a person who posts inflammatory, inaccurate, offensive, biased information on LinkedIn. Such persons are a potential risk to any organisation.  Therefore, a public or private sector organisation is unlikely to engage with that person because why would they onboard a potential risk if they did not have to?   Smart and responsible organisations ask themselves: Why engage with a person or business that does not reflect our values?

And rejection of a person might extend to family members.  A son or a daughter of a person who posts inappropriate material on LinkedIn might be rejected for a job based on what a parent has written.  In their early years, children inherit most of their values from their parents.  Therefore, if a parent has openly expressed an opinion about a person, organisation, religion, or activity that is not in keeping with normal ethical values and community standards, then there is a high probability their children share the same view.  Why would a school that is vetting children for limited academic places accept a child of a person who does not reflect the values of the school?  It makes no sense to onboard a potential problem child who could be a risk to other children and staff if they do not have to.

Impact on Other Aspects of Life

Comments and postings on social media sites including LinkedIn can have a negative impact on other aspects of a person’s life, for example:

·        A person arrives in a foreign country with a visa or seeks a visa on arrival where that is possible. only to be denied entry and turned around.  No reason is given.  And if one is it is usually an explanation that the person did not meet that country’s character test.  But behind the scenes, authorities have identified that the person made a derogatory comment on social media about that country, or government or religion that is popular in that country.  Many authorities now obtain information from international airlines about the people on each flight and undertake pre-screening prior to their arrival.

·        A firm tendering for a contract with a public sector organisation continually fails to be selected. The firm is rejected because a senior manager/s or employee has posted comments that are seen as presenting a risk to the organisation. For example, biased, inaccurate, or offensive comments about government employees or government programmes generally.  The comments might also be an indicator of the quality of the work that can be expected from people who work for the firm.  Why take a risk with that firm, if it has allowed a manager or an employee to post something that is untrue?  And if that public sector organisation is a school, then it might be more risk adverse than a government department or agency.

·        A person or a parent of a child applying for a scholarship is rejected based on comments and posts made by the person or parent that were not in line with the values of the scholarship provider.  Or child’s application to attend a particular school is rejected on the same grounds.  The reason for rejection might not be provided and if one were required, it would suffice to advise that there were many highly qualified applicants and positions were limited.

·        A person or firm applies for a government grant that has been offered to specific people and organisations within a particular industry, commerce, or profession.  Government authorities are required to adhere to standards including core values.  Funds are limited and the grant process is overwhelmed with applications.  The person or firm applying for a grant has a very compelling case.  But their application is rejected because of support that person or firm has made to a post that was not very flattering of people of a certain religion, race, lifestyle or country.  [I recall being advised by a university lecturer who used to work for a Government Minister of that minister denying funding to a community group who supported blind children.  He told the group that his portfolio did not have the available funds.  It was a lie.  The ministry concerned had more that sufficient funds to assist that group and it fell well within the realm of his portfolio.  The minister did not want to help them because he thought that they were not politically aligned with his party].

Comments Damage a Country’s Reputation

A person posting or making comments on LinkedIn should also take into consideration the impact they might have on their country’s reputation.  While their comments might not have negative blowback to them, it might have an impact on organisations that engage in trade. 

LinkedIn is a service that connects organisations and people with the outside world. It is personal networks that connect countries and drive trade.  It takes a lot of time and expense to build those networks.  And they can easily be destroyed with one word or one line.  Especially if those words are communicated by a senior figure in government or the private sector.  Like it or not, when a person comments on the values, way of life, religion etc of a person from another country or a country itself, it reflects on every person and organisation in that country where the person commenting lives.  Everyone gets tarred with the same brush.

Try and remember that words are bullets.

Glencore and the patronising disposition of unaccountable power

The recent P&I article by Chris Douglas featuring Glencore and the Great Artesian Basin raised many genuine concerns, especially regarding the sophism of corporate social responsibility. These included Glencore’s predatory culture and rapacious deeds and the egregious conduct of many other extractive mining brigands across Australia and elsewhere around the globe.

Glencore and the patronising disposition of unaccountable power - Pearls and Irritations (johnmenadue.com)

Can Australia trust Glencore with the Great Artesian Basin?

If you watch a TV channel that airs commercial advertising (my preference is SBS) no doubt you would have seen the recent advertisement by Glencore. The ad advises the viewing public: “The world needs natural resources to power our future. For 25 years Glencore has responsibly mined for metal and minerals that advance our everyday life that power our homes and businesses and are used to create almost everything around us from smart phones to electric cars to renewal energy for a low carbon future while becoming one of the world’s largest mining companies you probably never heard of. Glencore advancing everyday life.”

Can Australia trust Glencore with the Great Artesian Basin? - Pearls and Irritations (johnmenadue.com)

Defence procurement is rotten to the core: It’s time for a Royal Commission

While the Robodebt fiasco is important and warrants a full scale inquiry, it is minor compared to the shocking report outlined by the Government on defence projects. The question therefore begs: are there similar or worst stories hiding in the Department of Defence?

Defence procurement is rotten to the core: It’s time for a Royal Commission - Pearls and Irritations (johnmenadue.com)

Paying a Ransom could be an Australian Money Laundering Offence

The use of ransomware by criminals is a significant and growing threat to all organisations, particularly businesses.  Recent attacks on the Colonial Pipeline company in the United States which shut off a major US fuel pipeline significantly disrupting supplies and on JBS Foods, the world’s largest meat producer, have highlighted the danger the crime type poses.  While those attacks were carried out on US companies, Australia has not been immune.  Ransomware attacks have been perpetrated on four major Queensland hospitals, UnitingCare Queensland, Nine Entertainment and the Lion Beverage Company to name a few. 

So, what is a ransomware attack?  According to the Australian Cyber Security Centre (ACSC), “ransomware is a type of malicious software (malware). When it gets into your device, it makes your computer or its files unusable. Cybercriminals use ransomware to deny you access to your files or devices. They then demand you pay them to get back your access”. This is reportedly what happened in the Colonial Pipeline incident. And in Australia, research has shown that where Australian companies have been the victim of a ransomware attack, some have paid the ransom to the hackers to regain access to their computer systems or to retrieve stolen data or both.

The ACSC offers advice to organisations on how to protect themselves from such attacks including: “We recommend you do not pay the ransom. There is no guarantee paying the ransom will fix your devices. It can also make you vulnerable to future attacks”. I agree with that advice but would advise readers, if they are an Australian citizen, Australian resident, or an Australian company, to not pay the ransom because paying it could amount to an offence against Australian money laundering law.

Now this might surprise some people.  What has money laundering law got to do with paying criminals to get your own property back or to get access to a computer system they own?  Well, in brief, the payment of a ransom could amount to money laundering because under Division 400 of the Criminal Code Act, a law of the Commonwealth of Australia, the payment would amount to an instrument of crime.  Division 400 of the Criminal Code Act (Cth) defines an instrument of crime as:  “money or other property is an instrument of crime if it is used in the commission of, or used to facilitate the commission of, an offence against a law of the Commonwealth, a State, a Territory or a foreign country that may be dealt with as an indictable offence (even if it may, in some circumstances, be dealt with as a summary offence).   It is not the intention of this article to fully discuss Commonwealth money laundering law as it would not be practical here.  But payments to the criminals, to regain access to blocked files or to secure their return if stolen, would amount to being used in the commission of the crime or to facilitate it.  When received by the cybercriminals the money becomes the proceeds of a crime. Commonwealth money laundering law applies to the instruments of crime for all indictable offences against Commonwealth, Territory, or foreign law.  It applies to instruments of crime in relation to State indictable offences in limited circumstances and these primarily involve where the money or property is moved or transferred during or for the purposes of the importation or exportation of goods to or from Australia; or via the use of a postal, telegraphic, telephonic, or other like service within the Commonwealth’s constitutional authority; or outside Australia. 

Other instruments of crime involved in ransomware incidents that could snare an individual or an organisation in a money laundering offence include any phones, computers and other communication devices or systems used to communicate with any of the criminals involved in the attack to discuss the ransom and/or return of any data or used to make any payment to the criminals. It does not only involve the method of payment.

A person can be convicted of money laundering where they have full knowledge of the intended use of any funds or property or are reckless or negligent as to the intended use of the funds.  And depending on the value of any money or property involved and the level of knowledge held, the penalties can be severe. Up to life imprisonment if the payer has intention to pay the ransom and the money or property involved is worth $10 million or more.  And whether a person or an organisation is convicted or not of money laundering, their involvement in paying a ransom could trigger the powerful non-conviction based forfeiture provisions of Commonwealth law, potentially rendering all assets they control liable to forfeiture.

The defence of duress is available under Commonwealth law for victims of ransomware who make payments to the cybercriminals.  However, that defence is subject to conditions as prescribed in Section 10.2 Criminal Code Act 1995.  A person or organisation making any payment must reasonably believe that a threat has been made and that it will be carried out unless an offence is committed (the payment of the ransom); there is no reasonable way that the threat can be rendered ineffective; and the conduct is a reasonable response to the threat.  While it is court that decides whether a person or an organisation met those tests, any victim would need to demonstrate that they took steps to render the threat ineffective and those steps were reasonable.  This would include for example contacting the ACSC and seeking its advice and reporting the crime to the Australian Federal Police (AFP) and seeking its assistance. 

When reporting a ransom demand to the AFP, the person or organisation should request that the AFP undertake or consider undertaking a controlled operation involving the payment of funds or any property to the criminals under Part IAB Crimes Act 1914 (Cth).  Where that occurs, any civilian participant authorised to take part in the controlled operation, is deemed not to be criminally responsible for the offence.  Involvement by a civilian participant in a controlled operation to pay the ransom, provides greater protection than the duress provisions.  Any controlled operation is at the discretion of the AFP and where it decides not to conduct one, the victim of the ransomware demand should get its reasons for not doing so in writing.  Whether or not the AFP undertakes a controlled operation, a request from the person or organisation would be strong evidence that it did everything reasonable before being compelled to make any payment.  The engagement of a solicitor or barrister with extensive experience in handling AFP matters would be a distinct advantage.

And it is not just the direct victims of the ransomware attack that are at risk of being implicated in money laundering.  Any bank or remittance business (in relation to money) or virtual currency exchange (in relation to virtual currency) risk being charged with money laundering, if they knowingly or a reckless or negligent in transferring a ransom to cybercriminals.  Any controlled operation, if undertaken, would need to capture those entities as well.

It is probably unlikely that any Australian authority would pursue a money laundering case against a victim of ransomware if the victim paid a ransom to secure the release of their computer systems and or return of their stolen data.  But a victim in those circumstances needs to be careful. A money laundering action can be undertaken using the criminal law provisions in Division 400 or by using the powerful Commonwealth civil forfeiture laws, which do not require any person to be convicted of a crime.  Readers should note that the AFP has pursued and continues to pursue victims of “cuckoo smurfing” which is a money laundering technique perpetrated by international crime syndicates.  Using that method, criminal’s highjack legal funds sent by remittance agents and substitute it with the proceeds of crime.  The people sending and receiving the money have no knowledge that the criminals are doing it.  The AFP then seeks the forfeiture of any criminal funds that have been deposited into the accounts held by innocent victims.  The AFP is pursuing that action against victims because it believes, mistakenly, that it will stop the criminals from using that technique.  It is not.  But given the AFP action in relation to victims of cuckoo smurfing, it is highly plausible that the AFP could act against victims of ransomware for the same illogical reason.  For example, if a ransom was paid and partially or fully recovered, the AFP might seek to restrain and forfeit the funds.

Australian money laundering law would also apply to other circumstances where a ransom is paid by an Australian citizen, resident, or Australian company.  For example, a ransom paid to secure the release of a person kidnapped either in Australia or offshore.

The advice offered by the ACSC would be enhanced if organisations stopped treating criminal risk in silos.  Far too often, as a consultant, when I am examining various compliance programmes, for example, anti-money laundering & counter-terrorism financing programmes, I see that they have been developed in isolation from other programmes, such as anti-bribery & corruption, anti-slavery, and cybercrime programmes.  That approach ignores the risk posed by polycriminal groups, is ineffective as gaps between programmes are ignored and is inefficient as many programmes have common elements which are often re-examined leading to time and money being wasted.  All criminal risk should be assessed at the same time, and mitigation measures developed to prevent, identify, and report crimes.  Without a comprehensive approach to criminal risk, individuals and organisations will not only become a victim of crime, but also fall foul of Australian money laundering and forfeiture law.

Please note this article expresses an opinion only.  It does not constitute legal or financial advice and does not take into account individual circumstances. It is highly recommended to seek specialist advice before taking any action in relation to the issues raised in this article.

Chris Douglas is the owner of Malkara Consulting, a consultancy firm that specialises in the provision of training and advice in relation to financial crime including money laundering, terrorist financing, corruption and bribery, financial investigations, and proceeds of crime law. He is a former Australian police officer with the elite Australian Federal Police (AFP) for 31 years where he was involved in drug trafficking, people smuggling, human trafficking, corruption, organised crime, and fraud investigations.

He may be contacted at Chris.douglas@malkaraconsulting.com.

Comments on the Currency (Restrictions on the Use of Cash) Bill 2019 (Australia)

“Banks are to the economy what the heart is to the human body. They cycle necessary capital through the whole, and they are barely noticed until pressure, necessity, or crises.”

― Hendrith Smith, Essays on the Banking Industry”.

1.       Background

1.1     In the 2018/19 Budget, as a result of recommendations by the Black Economy Task Force, the Commonwealth Government announced it would introduce a cash payment limit of $10,000 for payments made or accepted by businesses for goods and services. Transactions equal to, or in excess of $10,000 would need to be made using the electronic payment system or by cheque. The need to tackle tax evasion and other criminal activities were the reasons given by the taskforce.

1.2     The Government has released for public consultation draft legislation known as the Currency (Restrictions on the Use of Cash) Bill 2019 [Provisions] (“the Bill”) and accompanying explanatory material which it intends to implement from 1 January 2020.  However, it is intended that the new measure will apply for some AUSTRAC reporting entities from 1 January 2021[1].

1.3     Following passage of the Bill through the House of Representatives, the Senate referred the provisions to the Economics Legislation Committee for inquiry.  The committee has been tasked by the Senate to inquire and report on provisions of the Bill. That committee is due to report by 7 February 2020[2]

2.       Response to Public Comments

2.1     There have been many submissions made in relation to the proposed legislation.  Some of them oppose the legislation but fail to provide cogent evidence to support their arguments.  Some comments are emotional and not supported by facts.  With any discussion on public policy the final position should be grounded on solid evidence and nothing else.  In this paper, statements made by several members of parliament have been commented on.  They have been singled out because as politicians they should be showing appropriate and honest leadership on public policy issues.  And in relation to the Bill, some have not done so.  They have sided with only one segment of the community and have ignored the rights and the impact on those members of the public who do not directly benefit from or engage directly in the black economy.

2.2     It has been claimed that the “cash ban bill” as some have referred to it; could breach people’s privacy.  However, what those claimants fail to mention is that the greatest threat to privacy or security of a person’s data, does not originate from Government but from the private sector.  Many people who primarily deal in cash already have deposit accounts and credit card accounts with banks and/or are members of store and airline loyalty programmes.  These facilities enable the location and spending habits of a person to be tracked, analysed, used in research and marketing and sold to other users for a profit.  The proposed restriction on the use of cash by the Federal Government is insignificant compared to the already extensive use of private information collected and held by non-government entities.  At least there are and will continue to be stringent restrictions on the use of any data collected by the Government, which are largely absent in the private sector.  Those who argue that the bill is a breach of privacy, including federal members of parliament, fail to enquire with those who complain to them about the loss of privacy, if they already engage with a bank or fail to mention the greater intrusion into a person’s privacy by other methods and organisations. 

2.3     Another claim made is that the restriction on the use of cash is designed to push people into the clutches of the banks so that they must engage in the banking system.  This claim implies that the Australian banking system is something to be avoided at all costs[3].  And while there were serious forms of misbehaviour identified during the banking royal commission, the Australian banking system is still one of the most reliable, efficient and safest systems in the world.

2.4     The push by the Australian Government and most world governments to get people using the banking system is not new.  In Australia, the process gained significant momentum about 30 years ago when the Australian Government introduced direct credit payments to bank accounts for all welfare recipients.  Thousands of people who did not have a bank account had to open one.  The author recalls that there was push back from the banks at that time who argued that maintaining accounts for people whose only means of support was a welfare payment from the Government, would cost them money.  Australian banks initially claimed they would lose money if they didn’t charge fees to recover the cost incurred by those people who simply received a payment and withdrew most of it, leaving only a minimal amount in their account.  This concerned various welfare advocacy groups who feared that the money paid to welfare recipients would be reduced by bank fees.  The situation was resolved by the Commonwealth Government directing all Australian banks to provide a bank account to Australian welfare recipients without any fees or a low fee being applied.  The Australian Government made it clear that the provision of a low fee/no fee account for welfare recipients was a condition of their banking licence.  This action by the Australian Government to introduce direct electronic payments and to impose conditions on the banks, probably brought into the Australian banking system tens of thousands of unbanked people.  Primarily designed to reduce fraud and the cost in providing payments to welfare recipients, the move increased the participation rate or financial inclusion, of Australians in the formal banking sector. It was a sensible policy initiative at the time and continues to this day.  Contrast the actions by the Australian Government with the situation in the USA, where there are millions of unbanked citizens still being paid welfare benefits and salary by cheque and incur significant fees and charges by having to have those cheques cashed at cheque cashing establishments.  Having Australians engage with the banking sector produces benefits to them and to society as the above example demonstrates.

2.5     Globally there is a push by the World Bank and other institutions to increase financial inclusion by having millions of unbanked people use the formal financial system.  The World Bank defines financial inclusion as:

“Financial inclusion means that individuals and businesses have access to useful and affordable financial products and services that meet their needs – transactions, payments, savings, credit and insurance – delivered in a responsible and sustainable way.

Being able to have access to a transaction account is a first step toward broader financial inclusion since a transaction account allows people to store money, and send and receive payments”[4].

The low rate of financial inclusion around the world, including in countries regarded as being developed, is not a problem in Australia.  Smart Government policy decades ago eliminated that issue here.  The global push to include unbanked people in the formal financial sector is recognition of the numerous benefits of having a bank account.  In Australia, our banking system is perhaps the one of the safest in the world.  And while, it is correct to sound out a bank when it operates illegally or unethically, the fact is, banks are the pillar of our economy and millions of Australians trust their wealth with them.  Holding a bank account has many benefits. One of those benefits has been highlighted above.  Other benefits are the security for funds that banks provide and the ease and speed of transferring money to pay for goods and services in Australia and offshore.  Cash offers none of those benefits.  And having evidence of a savings history in the form of bank statements, assists when the time comes for the person to obtain finance.  Or to obtain a visa and travel as many countries require evidence of an ability to support oneself when overseas.   Increasing the flow and amount of cash into the banking sector; benefits all Australians.  It results in more local funds being available for lending and investment and reduces Australia’s reliance on foreign capital and decreases the amount of interest payments sent offshore.  Casting banks in Australia in a manner indicating that they are high risk to customers, as some politicians have attempted to do, is not only foolish, it is irresponsible.  Many Australians do not know how well off they are in relation to our financial system.  There are millions of people in the world who would be grateful to have access to the services, security and quality of Australian banks. If all Australians stopped using the Australian banking system and held onto their cash, the Australian economy would collapse with a detrimental impact on all of us.   

2.6     Mr Andrew Wilkie the Federal member for Clark has stated that his biggest concern was that "this bill is simply not necessary". And that "there's already a requirement to report transactions over $10,000”[5].  With respect to Mr Wilkie he is wrong.  Referring to his second point first.  In relation to the requirement to report transactions of $10,000 or more, Mr Wilkie is referring to the requirement for reporting entities in Australia to report to AUSTRAC, transactions of not less than $10,000 involving physical currency or digital currency[6].  Many of the entities that will be captured by the Bill if they are involved in a cash payment of $10,000 or more are not reporting entities under the auspices of the Anti-Money-Laundering & Counter-Terrorism Financing Act 2006 as they do not provide any of the services listed in section 6 of that Act.  In relation to his first point that it is not necessary, the Black Economy Task Force has already assessed the issue and determined that it is. And there are numerous Australian law enforcement intelligence reports and operations that support the Black Economy Task Force.  If Mr Wilkie, MP has at his disposal other information that can rebut the findings of the task force; he should present it to the committee. 

2.7     The Australian Chamber of Commerce and Industry has argued that cash was not the cause of the black economy[7].  The ACC is right. The cause of the black economy is not cash.  The major cause of Australia’s black economy is the poor compliance by organisations in many different industries with not only Australian taxation law but also employment law and immigration law.  Often those three areas of non-compliance are linked or interrelated.  But a major instrument that enables the black economy to thrive is the use of cash.  It is the authors experience that the extensive use of cash in the building & construction, fishing, horticultural, tourism and hospitality and agricultural industries enable:

2.7.1   Receipt of cash by employees and sub-contractors which is not declared for taxation purposes, and related purposes for example assessing their determination to pay Medicare and/or child maintenance

2.7.2   People to receive welfare support from the Federal Government, particularly unemployment and invalid pension benefits that they would not otherwise be entitled to if their true earnings were known

2.7.3   Foreign citizens who have entered Australia by any means, to remain anonymous and hidden while working either illegally in the country or in excess of the number of hours specified under the terms of their visa

2.7.4   Increases the risk of human trafficking in Australia particularly in the sex industry, including in those states where prostitution is legal.

  2.8.   Ms Rebekha Sharkie, the Federal Member for Mayo has reportedly advised that the legislation “exemplifies the nanny state that this Government pretends it has not become”.  And “restricting people’s ability to purchase products with cash and forcing them to use banks or other financial intermediaries for purchases over $10,000 is an unreasonable restriction on their personal freedom”.   Reference to the “nanny state” in relation to the proposed legislation is irrelevant.  It makes no sense.  Given that welfare payments constitute 36% of total Federal Government spending or over $500 billion, is Ms Sharkie suggesting that Australia is already a nanny state and that welfare expenditure on the nanny state should be curtailed?  Perhaps she should come out and make that clear to her constituents that she wants to cut unemployment benefits, age pensions, invalid pensions and benefits for war veterans to prevent or wind back the ‘nanny state” provisions.  The Committee is advised to ignore emotional unintelligent statements that contribute nothing to the discussion about the Bill. 

2.9     Ms Sharkie, Mr Wilkie and others including various lobby groups, need to understand that the services provided by the Government have to be paid for. And other than borrowing the money, the services are paid for by taxation.  Those individual taxpayers who are paid electronically by their employer or by a business are subsidising the services used by those Australians who deal in the black economy. And when those people who deal in the black economy claim government benefits to which they are not entitled, they are stealing from the majority of law abiding citizens who declare their income to the Government. All Federal members of parliament, including Mr Wilkie and Ms Sharkie should understand that.  Their position would clearly change if the bulk of their constituents who are paid electronically ceased being silent and decided that they would not vote for them at the next election due to those members supporting a minority who want to receive the benefits of our society but are not prepared to pay for them.  Those voicing their opposition to the Bill on the grounds that it breaches their right to use cash and that it is not necessary, are seeking to preserve a status quo that supports their privileged position.

2.10    In relation Ms Sharkie’s comment that the bill is an unreasonable restriction which forces people to use banks.  As outlined above, the Australian Government in directing the development of Australia’s payment system by moving from using cheques to direct credit transfer, drove the increase in bank accounts by Australians.  It was a positive and beneficial move.  It was real leadership.  Restricting the use of cash is not impacting on anyone’s personal freedom.  People will still be able to use cash in Australia.  Though there are no benefits from using large amounts of cash, other than to avoid taxation.  Using cash is risky and inconvenient[8].  Whereas electronic payment methods carry vastly less risk, are more convenient and are limited only by the funds the person has access to, either in the form of savings or credit or both.  And while banks and other institutions charge fees for the use of payment services, those fees are the cost of doing business just like any other business expense.  Financial transaction costs are minor compared to the other costs of operating a business such as rent, power, transport, wages and salary etc.  Financial transaction costs should be incorporated into the selling price of any product or service.

2.11    Reference has been made by members of parliament, other individuals and interest groups that the Bill will force people to use banks and if interest rates shift into negative territory people will lose money.  That is a hollow argument. Cash does not grow in value and left in the form of cash it loses value due to inflation. If the cash is deposited into a bank account and interest rates fall to negative values, investors have options other than bank accounts to invest their money either in Australia or offshore. And if the Bill becomes law, there will be no restriction on the amount and volume of money a person can hold and/or store.  People who insist on keeping large amounts of money at home can continue to do so.

2.12    According to CPA Australia “some businesses have high cash takings such as laundromats, market stalls or personal services providers and may, either in single or multiple transactions, pay for their expenses in cash for convenience or to avoid bank transaction costs. The cash is deposited at some point in the supply chain and transactions can be traced through invoices and accounts. There is no intent to avoid detection, nor is the cash used to facilitate criminal activity[9].  Paragraph 2.10 above addressed the issue of bank transaction costs.  With respect to CPA Australia it cannot make a broad brushed claim that ALL businesses record all cash they receive and that all of it can be traced through invoices and accounts.  Many members of CPA Australia, other accounting bodies, ATO auditors and police officers engaged in money laundering and civil forfeiture investigations would disagree with that statement. And claiming that the cash is not used to facilitate crime is naïve. One of the oldest money laundering methods is the co-mingling of funds technique[10]. It involves mixing the proceeds of crime with the cash takings from legitimate business activity.  Though in some cases, all the recorded revenue is the proceeds of crime as the business is a front and not trading or not trading successfully.    In Australia, the co-mingling of funds technique is used extensively by criminals in various industries including the agricultural sector, scrap metal businesses, second hand vehicle and car part sales, car rental businesses, money remittance, laundromats, carparks, hotels, clubs and pubs, construction sector, service industries, restaurants and fast food outlets.  In relation to the capture of revenue by cash based businesses in Australia and their use by criminals to launder money, the claim by CPA Australia is not supported by evidence.

3.       Advice on the Draft Legislation

3.1     Generally, the measures outlined in the Currency (Restrictions on the Use of Cash) Bill 2019 are sound, subject to the proposed amendments in paragraph 3.2.  The move by the Commonwealth Government is consistent with measures implemented by other countries to combat tax evasion, corruption, money laundering and terrorism financing. 

3.2     Though in support of the objective of the bill, other options that should be implemented in the future are briefly outlined below.

3.2     In relation to the bill, the following amendments are recommended:

3.2.1   Persons who attempt to defeat the cash limit requirements of the Bill by undertaking a series of transactions of less than $10,000 engage in similar activity to what is known as “structuring”.  The AML/CTF Act provides an offence for those who structure transactions to defeat the reporting provisions[11].  Any new offences in the bill relating to similar activity should to the extent where relevant mirror section 142.

3.2.2   Cash is untraceable.  And it is a myth that following the money will lead to a crime[12]. Implementation of the Bill will drive criminals including tax avoiders to use different methods to achieve the same results that they currently obtain using only cash.  In relation to transactions of $10,000 or more, the simplest methods involve combining the use of cash with other payment instruments when undertaking a transaction or a series of transactions for the same supply. The combining of cash with other payment instruments are common money laundering and tax evasion techniques. Usual assets acquired using a combination of cash and bank cheques have included cars, houses and boats.  To be successful, all that criminals needs to do is to acquire payment instruments under the cash reporting limit of $10,000.  That would prevent a reporting entity from sending a Threshold Transaction Report to AUSTRAC.  Typical payment instruments include a bank cheque, money order, credit card or a prepaid debit card. Bank cheques and money orders can easily be obtained from multiple locations thereby reducing the risk of detection and reporting as a suspicious matter by a reporting entity.  And to further reduce the risk of detection; all payment instruments can be obtained using third parties or nominees.  Welfare recipients; new immigrants; tourists; refugees; local and foreign students; family and friends; employees and business associates are common third parties used to acquire non-cash payment instruments.  As cash is untraceable, the Senate should consider examining and recommending the introduction of a mandatory reporting scheme similar perhaps to the cash reporting or form 8300 reporting as is it known in the United States; where a business is required to report to the Internal Revenue Service any transaction involving the use of cash and cheques in a transaction that equals or exceeds $10,000 in value.

3.2.3   Referring to 3.2.2 above, an alternative measure would be to expand the current Anti-Money Laundering & Counter-Terrorism Financing framework in Australia. This would require the inclusion not only of the entities that are not currently captured by the scheme as required by international standards[13] which Australia claims to have adopted; but also, major activities of high risk for money laundering, terrorism financing and tax evasion.  The latter are already captured by several countries which have more expansive AML/CTF frameworks than Australia[14].  Implementing the recommendation outlined will negate the need to develop a new reporting framework outlined in 3.2.2 above.

4.       Rebutting the Low Regulatory Cost Myth

4.1     The explanatory memorandum (EM) states that the regulatory costs are estimated to be minor.  And then refers to the cost implications for business. What the EM is referring to in relation to business is compliance cost not regulatory cost which must be borne by Government authorities.  As is frequently the case, the Federal Government introduces new laws and fails to equip the agencies responsible for enforcing them with the necessary resources.  And where it does provide the resources, the application of efficiency dividends renders the programme/s inefficient and ineffective.

4.2     The Senate should recommend that the Federal Government provides the resources to the responsible agency, namely the Australian Taxation Office to enable it to educate the public in relation to the new measures and to implement the new laws effectively.  And that the resources allocated are exempt from any current or future efficiency dividend/s.

5.       Future Directions

5.1     The proposed bill is an important and appropriate step in the right direction to combat illegal activity and tax evasion.  However, the Senate should also consider in the near future, the abolition of cash in Australia.  With Australia’s current banking and payment systems, and the technology that is available there is no reason why any person or business has a need to use cash. Even in Australia’s remotest areas, payment could be and is made electronically. 

5.2     Australia was an early leader in payment system development but that has now declined as a result of poor political leadership.  The type of poor political leadership which is on display in relation to the Bill.  For example: The Octopus mass transit card which is used in Hong Kong on buses, ferries, trains and trams.  The system was designed by Australia-based company ERG Ltd[15].  The Octopus card is a e-usable contactless stored value smart card for making electronic payments in online or offline systems. ERG Ltd was selected in 1994 to develop and install the Octopus system. The card is one of the most advanced store value card payment systems in the world and in addition to being used on public transport it is used in fast food restaurants; supermarkets; vending machines; convenience stores; parking metres; car parks and other retail businesses where frequent small payments are made. 

5.3     Unfortunately, no Australian state or territory government chose the Octopus card when each of them upgraded their fare payment system[16].  If all Governments had chosen Octopus, then in Australia we would have had a national store value card upon which a national non-cash payment system could have been built[17].  Now Hong Kong promotes the Octopus as being “its payment card” when it was an Australian invention.

5.4     Opponents will argue that older and poorer people and those living in remote areas will not be able to use it.  Those arguments are too broad, should be dismissed as a result and give those Australians little credit for ability.  Many of those Australians already use electronic cards and/or grew up during the “Bankcard era”. And the technology is easy to use.   

5.5     In the near future, there will be moves by the Australian Government to abolish the 5 cent piece or perhaps all coins below $1 in value.  Let’s not have another senseless time consuming discussion about it.  It is a minor issue.  All coins and notes can be and should be replaced.   Australia has the technical ability to go cashless.  It just needs political leaders with the courage to drive it. 

6.       Conclusion

6.1     The measures contained in the Bill are an appropriate response to the loss of revenue in the black economy.  However, additional measures as outlined above should be implemented to prevent criminals including tax evaders from achieving the same objectives but by using different payment methods in association with cash.

Chris Douglas, APM

Director

Malkara Consulting Pty Ltd

Perth, Western Australia

 

15 November 2019


[1] https://www.treasury.gov.au/consultation/c2019-t395788

[2] https://www.aph.gov.au/Parliamentary_Business/Committees/Senate/Economics/CurrencyCashBill2019

[3] Though if a person is seeking to avoid their taxation obligations, which the bill is trying to prevent, then avoidance of the banking system is a necessary component of tax evasion.

[4] https://www.worldbank.org/en/topic/financialinclusion

[5] https://www.abc.net.au/news/2019-10-25/cash-ban-law-under-inqury-post-mp-concerns-on-freedom-breach/11640124

[6] Section 43 of the Anti-Money Laundering & Counter-Terrorism Financing Act 2006 refers.

[7] https://www.bankingday.com/nl06_news_selected.php?selkey=25416

[8] Banks in some countries charge customers a fee for cash deposits.  It is recognition of the cost involved by a bank in having to handle and store cash.

[9] https://www.cpaaustralia.com.au/-/media/corporate/allfiles/document/media/submissions/taxation/restrictions-cash-bill.pdf?la=en&rev=cf7c6e5e1b5742309726ca6620447cf3

[10] Also known as Blending.  The term money laundering is derived from the 1920s in the USA where the proceeds of gambling, prostitution and sale of alcohol during the Prohibition era were mixed or hidden in revenue derived from laundromats. 

[11] Section 142 refers.

[12] There is probably only one case in modern criminal history where following cash found in possession of criminals lead to the commission of other offences and that was the Watergate Scandal.  In that case, the men caught breaking into the Watergate Building were each found in possession of brand new $100 notes.  At that time in the USA, banks recorded the serial numbers and names of customers who were issued with $100 bank notes. Authorities were able to trace the notes to the bank who issued them, which identified the relevant customer, who provided evidence that he had obtained the money and given it to the committee to re-elect President Nixon. Today when law enforcement authorities refer to following the money, they are referring to the use of indirect methods of proof to establish that a person has benefited from crime for example Net Worth Analysis (also known as the Asset Betterment Method or Unexplained Wealth).  NWA was first used during the investigations by Treasury agents into Al Capone and others in the late 1920s.

[13] Lawyers, accountants, real estate agents and jewellers.  The Senate should note that some bodies representing these entities have already commented on the current Bill and expressed their opposition to it and have expressed opposition to being captured by the AML/CFT Act 2006.

[14] Australia is a member of the Financial Action Task Force and as a member it is required to show leadership.  It is failed and continues to fail by not implementing international AML/CTF standards.

[15] ERG Ltd no longer exists but sold all operating assets to Vix Technology https://vixtechnology.com/

[16] Though the NSW Opal system is similar to it.

[17] In Australia there are no stored value cards issued by financial institutions.  Cards that are referred to as store value cards contain no value.  They are prepaid cards.  Referring to those cards as stored value or references to “topping them up” etc are marketing techniques.

Australian Journalists Risk Money Laundering Charge

Raids by the Australian Federal Police (AFP) on the Canberra home of Ms Annika Smethurst and the Sydney Headquarters of the Australian Broadcasting Corporation (ABC) have sparked an outcry from journalists, the organisations impacted upon and politicians.  In both cases, which the AFP has stated are not connected, concern the investigation into the leaking of information from the Commonwealth.  Concerns have been expressed about the AFP searching a private home and workplaces occupied by journalists and the need for their sources to be protected.  I wonder, if the AFP was searching for the source of a leak involving the unlawful disclosure of private tax records, social security information or Medicare data pertaining to those journalists and politicians, would their outcry and demand for answers be as strong?  I highly doubt it.

Information held by the Commonwealth Government is owned by the Government and it has an obligation to protect it from unlawful disclosure and misuse. Journalists and politicians cannot have it both ways.  There cannot be two investigative approaches and two standards pertaining to the unlawful release of information.  The person/s involved in the leaks must be found.  From a national security perspective, those involved in the leaking would be potential targets for foreign espionage and criminal cultivation.  If a vigorous pursuit of those involved in not undertaken then other potential leakers would be motivated to unlawfully release information.  And what will be the next leak?  The characteristics and capability of our new Attack class submarines? And if that occurred, would senator Rex Patrick from the Centre Alliance claim that any journalist involved in publishing the classified information, was simply performing their public duty?

In relation to the AFP raid on Annika Smethurst's home, the police were seeking the source of a leak of national security information pertaining to a story she wrote in April 2018. According to media reports, the story written by Ms Smethurst included photographs of government documents. While the ABC raid relates to a series of stories known as the Afghan Files which were broadcast in 2017.  The stories revealed allegations of unlawful killings and misconduct by Australian special forces in Afghanistan and were reportedly based on hundreds of pages of secret Department of Defence documents leaked to the ABC.

Commentary has revolved around the right of journalists to protect their sources.  This article does not address that issue.  Missing from the arguments is the potential criminal liability that could arise to the journalists themselves, their managers and their respective media organisations by their direct or indirect handling of stolen or unlawfully obtained Commonwealth information. Mr David Anderson, managing director of the ABC has been quoted as saying the broadcaster will stand by its journalists and will protect its sources.  Well, if he had knowledge of the nature of the information, as opposed to the source, then a question might arise as to who is going to protect him and the ABC? Because as I will outline below, the issue could easily be about the journalists and their managers and not entirely about the sources involved.

 According to the ABC, Mr Porter the Commonwealth Attorney-General has stated that: "The investigation is not about the journalist per se. It's about the disclosure of information." But potentially it could be.  Under Commonwealth Law an employee of the Commonwealth Government can be convicted of an indictable offence if he or she unlawfully discloses information.  And any person can be convicted of stealing intangible property, which includes information, belonging to the Commonwealth.  There is a Commonwealth offence for receiving stolen property and that offence could be applied to any person receiving intangible property stolen from the Commonwealth.  But no similar offence applies to a person who receives information that has been unlawfully provided by a Commonwealth officer or former Commonwealth officer.  In relation to the offence of stealing Commonwealth property, namely the information, any journalist who received it or handled it, would be in no different position to any person who receives stolen tangible goods.

A little known provision in Commonwealth Criminal Law that is relevant in this argument is the money laundering provisions contained Division 400 of the Criminal Code Act.  The provisions are very broad and have extra territorial reach.  While referred to as money laundering, a more accurate description would be property laundering.

A person commits money laundering if he or she directly or indirectly, deals with money or other property that is either proceeds of crime or an instrument of crime.  Proceeds of crime means any money or other property that is wholly or partly derived or realised, directly or indirectly, by any person from the commission of an indictable offence against a law of the Commonwealth, a State, a Territory or a foreign country.  The Commonwealth offence of receiving stolen property and the unlawful release of Commonwealth information by a serving or former Commonwealth employee would be captured by the term Commonwealth indictable offence. Property under the money laundering provision includes intangible property.  Information held by the Commonwealth, regardless of its security classification, would be intangible property.  This would include the classified documents received and held allegedly by Ms Smethurst and ABC journalists Mr Dan Oakes and Mr Sam Clark.  And it does not have to have been communicated or given to them directly by the person who stole the information or who released it unlawfully.  The act would apply if it was conveyed somehow to them by a third party, no matter where in the world they are located. 

Dealing in money or other property can be undertaken many ways, but for the purposes of this issue, it includes receiving, possessing or concealing of property.  It is a matter for a court to decide if the provision has been satisfied by a course of action.  However, the handling of an envelope or storage device containing classified documents or receipt of an email etc might constitute receiving.  Uploading of the material to another device, computer or the cloud would amount to possessing the items and if the information was later encrypted or password protected or both by a journalist, then those actions might amount to an act of concealment. 

Commonwealth money laundering law has three levels of mental complicity. To satisfy the mental element, a person must have had full knowledge of the facts or was reckless or negligent at the time they were involved in the dealing.  All of these elements would be easy to prove if the documents in question contained security classifications.  The presence of which would alert any prudent journalist that the person releasing the information to them, would not be entitled to do so.  And it is important to note, that the prosecution does not have to prove that the journalist knew if the stolen or unlawfully released information related to a Commonwealth, State, Territory or foreign indictable offence.  The crown only needs to prove that the act of releasing the information was a crime.

There also exists in the money laundering provisions two offences where the prosecution does not have to prove a mental element.  A journalist could be convicted of dealing in property that is “reasonably suspected of being the proceeds of crime”.  Reasonable suspicion would be established by the presence of a security classification supported by other marks for example: name of the department involved.

To ground a money laundering charge, a value for the property must be established, including the provision dealing with reasonable suspicion.  However, Commonwealth money laundering law enables a charge to be laid where the property in question is “any value”.  That section does not apply to the reasonable suspicion provision.  Even a hard copy of a photograph or a printed report has extrinsic value, albeit if it is minor.  Though the prosecutor might argue that the intrinsic value of the documents was far greater and attempt to assign a higher value which would result in a person being charged with a money laundering offence that carries a higher penalty. 

But where assigning a value to proceeds of crime was not possible, an instrument of crime includes any money or property used in the commission of an indictable offence or used to facilitate an indictable offence.  Mobile telephones, laptops, computers, storage devices, etc used by journalists and media organisations to receive, store, communicate and publish stolen or unlawfully obtained Commonwealth information would be instruments of crime.  Any vehicle used by a journalist to meet with any person considering communicating information obtained unlawfully or to receive such information would be an instrument of crime.  A journalist could be prosecuted for money laundering if any of the equipment was used by them to possess or to receive or conceal information stolen or unlawfully obtained from the Commonwealth.

While managers and chief executive officers of media organisations, who are not directly involved in the dealing of proceeds of crime or an instrument of crime could not be charged with money laundering.  They could be liable for aiding and abetting the receiving of stolen property or aiding and abetting money laundering if they had knowledge of the facts or were reckless or negligent, and provided assistance in relation to the dealing in the property.  While not suggesting in any way that Mr Gaven Morris, the ABC’s director of News, was involved in any criminal activity, it is worth noting that the AFP chose to name him in the search warrant.              

Any decision to prosecute any person for money laundering vests in the Office of the Commonwealth Director of Public Prosecutions.  And it is probably unlikely the AFP would consider pursuing any journalist for money laundering or for receiving stolen Commonwealth property.  However, journalists and their managers need to be aware that the Commonwealth has many options available to it, to pursue matters involving the theft or unlawful disclosure of Commonwealth information.  A major function of the AFP is to “safeguard Commonwealth interests”.  It would be a mistake to under estimate the extent the AFP would go to lawfully, to protect those interests.

Chris Douglas is a Director at Malkara Consulting Pty Ltd in Australia. He is a former member of the Australian Federal Police (AFP) for 31 years. Whilst there, he was involved in drug trafficking, people smuggling, human trafficking, corruption, organised crime and fraud investigations. His extensive experience in the investigation of money laundering and in the conduct of conviction based and civil forfeiture based investigations. His experience with investigating money laundering schemes pre-dates the introduction of AML/CTF legislation in Australia.

Australia’s Submarine Program: A Failure in Anti-Corruption Due Diligence?

Australia is embarking on a naval building program, the largest undertaken since the Second World War. A significant aspect of that building program is the replacement of the current Collins class submarines, known as the Future Submarine Program (or Project SEA1000). The estimated cost of building 12 new diesel electric submarines is $50 billion, not including the combat system.

On 20 February 2015, the Australian Government announced that a competitive evaluation process (CEP) would be undertaken involving design concepts submitted by 3 submarine manufacturers namely; Direction de Constructions Navales Services (DCNS) of France; ThyssenKrupp Marine Systems GmbH (TKMS) of Germany and Mitsubishi of Japan. On 26 April 2016, the Australian Government announced that DCNS had been selected as the preferred partner to build the submarines.

DCNS is now known as the Naval Group. It was previously DCN. Since 1997, DCNS has been involved in 5 major corruption scandals. Three of these events were known before the company was selected to design Australia’s submarines and two have come to notice since it was selected. Four of the incidents involve the supply of submarines or frigates to Taiwan, Pakistan, Malaysia and Brazil and the loss of information pertaining to the submarines the company is building in India. DCNS has denied any wrongdoing, but too many incidents have occurred to be ignored, and further information should be sought by the Australian Government about them and appropriate anti-corruption measures applied. But have they?

 

A Call for a Senate Enquiry into the Australian Federal Police Cuckoo Smurfing Strategy.

The Australian Federal Police (AFP) has been investigating a money laundering technique known as Cuckoo Smurfing for almost 20 years. It is a technique which involves criminal groups intercepting the transfer of lawful funds to Australia and substituting that money in Australia, with money derived from crime, mainly drug trafficking. 

Valuable intelligence has been collected over the years from investigating syndicates using the cuckoo smurfing technique. Significant drug busts were made as a result. But in 2014, the AFP changed its strategy. The agency shifted its focus away from targeting organised criminal activity and towards innocent victims of cuckoo smurfing. This action by the AFP continues to this day. This civil forfeiture action by the AFP has resulted in innocent people having to explain the source of their funds in court. 

There are currently at least 20 cases that is before the Australian courts involving innocent people from various backgrounds, such as those sending money to their children studying here. 

This issue should not be left to the courts to determine as the principal legislation involved, the Proceeds of Crime Act contains inadequate third-party protection mechanisms. Parliament intended that agencies involved in the enforcement of the Proceeds of Crime Act discharge their duties responsibly. This is not happening. Malkara Consulting calls for an inquiry by the Australian Senate into AFP forfeiture operations generally, including its handling of cuckoo smurfing cases and strategy to combat organised crime using civil forfeiture legislation. Holding a Senate inquiry will enable all interested and affected parties to make submissions and be heard on this important issue relating to human rights in Australia.

 

What Does the UK Bribery Act Mean to You?

Globalisation has created enormous opportunities for businesses and people to trade in goods and services on a scale previously unknown in human history.  The development and growth of transport, logistics and payment systems enable firms to reach customers anywhere in the world and receive payment securely and easily. Technology enables organisations to reach markets without having to have a physical footprint in them.

British firms have driven the growth of globalisation since the invention of the steam engine.  And today, UK commercial organisations compete successfully in many global industries, including banking and finance, insurance, manufacturing, mining, aerospace and defence, shipping and logistics.  British companies and citizens can be found in every country.  And they are not just engaging in commercial activities.  The UK plays a major role in providing humanitarian aid particularly in Africa either alone or in conjunction with other international bodies for example, the United Nations and European Union. 

And if the citizens of the UK are not working for home grown firms and organisations, they will be employed by foreign entities in a variety of roles.  In Singapore, UK citizens can be found working in all sectors of the economy.  While the British empire no longer exists, British influence around the globe is perhaps stronger than it has ever been.    

The environment in which British firms and UK citizens operate is very competitive.  And unfortunately, it is not a level playing field.  When competitors cannot compete equally on quality and price, some of them resort to bribery and corruption to win contracts.  Denying profits and growth opportunities to UK firms that comply with the law and do not resort to criminal acts to succeed.

The actions of foreign firms who engage in bribery to secure a commercial advantage, places pressure on UK firms to follow suit.  And unfortunately, several British firms have been caught committing bribery to win contracts. 

Many unscrupulous companies know that most developing countries and authoritarian regimes have weak or poor systems of governance compared to advanced countries.  And they take advantage of them.  Organisations and individuals who engage in foreign bribery and corruption contribute to the theft of funds from Governments and their people who can least afford it. Bribe payments made by an organisation are often recovered by increasing the price of the goods or services it provides. Every dollar paid by a foreign government for over priced goods and service is one less dollar available to be spent on the health care, education and public safety.  Any organisation or person who engages in foreign bribery is responsible for the growth in human misery and suffering it causes, particularly amongst the poor and children. 

Preventing bribery and corruption is not just the responsibility of Governments and organisations.  Governments can only do so much.  And there is a limit to the measures that a company or organisation can implement to prevent itself from engaging in bribery and from becoming a victim itself from corruption.  Everyone has a responsibility to combat corruption.  It is the decent and right thing to do.  And all members of humanity are impacted in some way by corruption.  We all want clean air.  Clean water.  Clean Food.  And a safe and secure environment to live in and raise our families.  Corruption has denied these essential rights to billions of people on the planet and left unchecked will also impact on developed countries as well.  It already is in many parts of the developed world.  The migration of people from Africa, the Middle East and Asia is not due entirely to war.  Corruption resulting in the deterioration of essential services and a loss of opportunities has forced people to seek opportunities in developed countries.  These people must move to survive.  They have no other alternative.  It is the visible human cost of corruption.

The risk to any organisation of being caught in a corruption scandal is ever present regardless of the local and foreign environment they operate or interact with, or the ABC risk management plan that is in place. Corruption does not discriminate, it can affect anyone anywhere, including in jurisdictions which are considered to have low corruption.

Within organisations, preventing bribery and corruption is not just the responsibility of the board and the Chief Executive Officer.  While they ultimately are accountable for the actions of their company, it is the duty of every person at every level in an organisation to prevent bribery and corruption. It does not fall solely on the shoulders of staff working in an anti-bribery & corruption role. They can only advise, assist and monitor compliance against existing guidelines of an anti-bribery corruption management plan.  But they cannot do it alone and it cannot be done effectively without everyone having ownership and every person in the organisation playing their part.  Every person needs to be a manager and a leader in combating corruption regardless of their role in an organisation.

And it should not stop there.  Organisations no tolerance for bribery and corruption need to extend to contractors and all third parties engaged by it.  Illegal acts involving corruption by contractors and third parties can and do bind a company particularly in relation to foreign bribery.   

But it’s not just the risk of corruption occurring by staff and contractors of an organisation.  An organisation itself can be a target of corruption. Organised crime and competitors will seek to steal trade data and client information by bribing staff and contractors engaged to service or operate a company’s services or equipment.

Corrupt staff and contractors have caused significant loss and reputational damage to organisations via the theft of data and trade secrets.  Having greater knowledge in preventing corruption that goes beyond mere awareness is an attribute being demanded by organisations today. 

While, those firms operating in the defence, financial and telecommunications industries face the threat from foreign intelligence services who are sanctioned by their governments to undertake bribery and corruption to obtain sensitive information of value to their defence.  Foreign intelligence agencies that employ corruption techniques (particularly grooming), to identify vulnerable staff and contractors so as to corrupt them and obtain information.  In other words, no amount of due diligence conducted on staff, third parties and organisations can completely safeguard an organisation from the threat of organised crime, competitors or foreign governments.

In response to international criticism of UK handling of foreign bribery cases, the UK Government passed the UK Bribery Act on 1 July 2010.  The Act modernised the law on bribery in the UK.  And today, the UK Bribery Act is regarded as setting the gold standard in preventing foreign bribery and corruption.  So, what does the UK Bribery Act mean to you?  Other than containing several offences to prosecute those who commit bribery, it represents a clear statement from the UK Government that it will not tolerate bribery being committed by UK companies, firms or citizens.  It is in a way a statutory code of conduct which has a wide reach beyond the UK.

The Bribery Act has near global jurisdiction applying to a body which is incorporated under the law of any part of the United Kingdom and which carries on a business there or elsewhere. The Act is unique amongst global anti-foreign bribery law in that it does not distinguish between bribery and facilitation payments large or small.

However, the most important aspect of the Bribery Act which is designed to prevent UK firms from engaging in foreign corruption is the offence of bribing a foreign government official and the offence of failure by a commercial organisation to prevent bribery.  The Act establishes liability for UK companies for acts of corruption committed by persons acting on behalf of the company, for example by an employee, agent or subsidiary. This means that a UK firm could be held liable for the offence of bribing a foreign government official where the act of bribery is committed by a subsidiary, an agent of the organisation or an employee.  This could have very serious consequences for any UK commercial organisation operating in countries with weak governance. 

However, with modern day communication systems, payment methods and logistic networks, a UK commercial organisation could engage in acts of foreign bribery from anywhere in the world including in the UK or in Singapore for example.  The organisation does not have to be operating in a weak foreign jurisdiction to commit the act of bribery.  Inducements could be communicated by email to a foreign government official, accepted by text message and the bribe paid into an account held by a company controlled by a related third party in a secrecy jurisdiction. 

Knowing that it is almost impossible for any organisation to completely prevent bribery being committed “in its name”, the Act has on offer a defence for commercial organisations who have been charged with the offence of failing to prevent bribery.  Under the Bribery Act, a commercial organisation has a defence available to it if it can prove it had ‘adequate procedures’ to prevent a bribe being paid on its behalf.

The Act requires the UK Secretary of State to publish guidance about procedures that is relevant to the offence.  Advice on what might constitute an adequate procedure can be found on the Ministry for Justice webpage.  But in the end, what constitutes an adequate procedure/s is a matter for a UK court.  A commercial organisation operating offshore either directly, with a physical presence in a country or indirectly using e-commerce systems, cannot afford to be complacent about the procedures it has put in place to prevent foreign bribery.  Prevention of bribery, like any crime requires ongoing monitoring and due diligence.  And when it comes mounting a legal defence to a charge of failing to prevent bribery, how many adequate procedures are enough to prevent a jury reaching a verdict of GUILTY?

A commercial organisation could target harden itself from being both a perpetrator and a victim of bribery, by implementing measures that go beyond what is recommended by the UK Ministry of Justice.  Training staff in how to recognise a bribe, particularly a bribe concealed in a complex web of transactions routed through various international business companies and in grooming techniques used by criminals and foreign intelligence agencies would be just some additional measures it could implement.  Another important measure would be to implement International Standard ISO37001 Anti-Bribery Management Systems.  The introduction of ISO37001 in 2016 was an important milestone in the prevention of corruption globally and should be considered by all UK commercial organisations building adequate procedures into their anti-bribery and corruption risk management plans.

Malkara Consulting will be delivering a workshop designed to meet the needs of UK companies, who are covered by the UK Bribery Act.  The prime focus of the workshop is the defence provision of “adequate procedures” available under the UK Bribery Act to the offence by commercial organisations of failing to prevent bribery.  The workshop will outline advice published by the UK Government on what is meant by adequate procedures but supplement that information with practical recommendations on bribery prevention gained from extensive experience operating in high risk situations and high-risk markets. The Act will be briefly explained and its provisions mapped against the adequate procedures advice issued by the UK Government to identify where they can enhance an organisation’s anti-bribery & corruption risk management plan.   

 

 

Singapore Must Embrace Asia Africa Growth Corridor

It has been almost a year since the joint declaration by Prime Minister Narendra Modi of India and Prime Minister Shinzo Abe of Japan of the Asia Africa Growth Corridor (AAGC) initiative.  The AAGC is still only a concept and the vision statement underpinning the initiative advises that it will evolve in time as various stakeholders in Asia and Africa are consulted.  But does that mean that Singapore businesses should wait to be consulted on opportunities in Africa?  Clearly not, unless they want to be left behind.

The AAGC will be based on the four pillars of:

1.    Development and Cooperation Projects

2.    Quality Infrastructure and Institutional Connectivity

3.    Enhancing Capacities and Skills

4.    People-to-People partnership, with this pillar being unique amongst the others.

In each of these categories Singapore could be a significant contributing player and a substantial benefactor from two-way trade between the city state and African countries.

Areas where Singapore enjoys a global competitive advantage include health and medical, logistics and transport management and infrastructure development; air and sea transport, manufacturing, electronics, banking and finance, commodity trading and education.  Yet during my travels in parts of Africa, I have struggled to find a solitary footprint of Singapore’s presence on the continent.  And question is why is that the case?

Research by Malkara Consulting Singapore has revealed a reluctance by Singapore business to invest in Africa, or even consider undertaking an investment mission to any part of the continent.  Common grounds expressed by Singapore businesses surveyed include high levels of corruption, poor governance and the weak rule of law.  And while many countries in Africa have some if not all those issues to tackle, it would be wrong to conclude that they are all the same or that they are insurmountable.  And it would be equally incorrect to assume that investment opportunities in some industries cannot be found.

The performance of African countries varies significantly.  They can range from low corruption and well governed small Botswana located in Southern Africa to Nigeria, the largest economy in Africa, which has governance issues at a Federal and State level and weak infrastructure.  Both countries despite the variance in governance and economic size offer investment opportunities.  Botswana is land locked and is positioning itself as a southern transport and logistics hub.  While Nigeria derives substantial wealth from international trade and has a requirement for new and improved ports. Both have a legal system similar to Singapore, which is grounded on English common law.  Botswana’s story is almost the same as Singapore’s.  It has had a stable democratically elected government since becoming independent in 1966.  At that time, the country had only one sealed road and was not expected to survive economically.  But its leaders and people proved the critics wrong.  Now it is thriving with evidence of sound economic management being found in the new CBD and nearby major shopping centres. Both Nigeria and Botswana would benefit from greater engagement with Singapore and the island state would benefit from trade with them.

African countries have a growing middle class, low by Asian standards, and a very young tech savvy population.  While some international companies have not performed well in Africa, this has primarily been due to an overestimation of the size and spending habits of the consumer class and a poor understanding of local markets.    Poor results obtained by some international companies in boutique market segments should not deter investors in others.  

There is money in Africa.  African pension funds alone have over $700 billion invested in Western banks, while African central governments have invested over $600 billion in foreign reserves offshore.  To tap those markets, Singapore banks, insurance firms and investment and advisory companies need a presence on the continent. And the physical evidence of wealth is not hard to find either.  Earlier this year, I was driving from Francistown to Gaborone, the Capital of Botswana.  On the way, I was overtaken by one hundred plus white colour top of the range Mercedes, Audi’s and BMWs.

Large Singapore companies with an international focus, that are competing in saturated markets with reducing margins, perhaps should consider newer markets in emerging economies. Land travel within Africa is difficult and in places dangerous and consequently most people and freight move by air.  Singapore Airlines and its low-cost airline Scoot should explore the development of a hub in Africa that mirror its successful operations in Singapore.

But it is in shipping, transport and logistics where Singapore enjoys a significant advantage. Other foreign competitors are considering developing ports on the East coast of Africa.  Unless Singapore port operators move quickly they could be locked out.  Nigeria like many African countries needs new ports not just to move oil, but also general cargo. Singapore technology, management skill and development expertise would give it a competitive edge over other countries seeking to invest in Nigeria and other emerging markets such as Kenya and Ghana. While Nigeria has the largest economy in Africa now, it has not yet even started to reach its potential.  There is significant room for growth.  And Singapore companies would be unwise to ignore it.

But the AAGC initiative is not just available for large international companies.  Malkara Consulting encourages small to medium companies to consider exploring opportunities in Africa.  Young Singapore entrepreneurs building a new start up could test and hone their business skills by being in Africa.  Whether successful or not, young business people learn and develop more quickly operating in challenging multi-cultural markets that are different to where they were schooled and trained.

Business risk in Africa is higher than in Singapore but risks can be mitigated.  Malkara Consulting advises clients to start small and undertake appropriate due diligence.  In other words, do your homework.  But doing nothing is not a business strategy.  If Singapore businesses want to be part of the AAGC initiative then they need to start planning now.  And that starts with finding appropriate local and international partners who can assist in the business transition to the growing opportunities that await them on the African continent.

More information 

  • 2017 Japan commited USD$200 billion to the proposed growth corridor
  • 2017 Africa Economic Outlook, China consumed 27% of Africa total global export USD$327.7 billion
  • 2016 Africa export, contributed only 2.1% (USD$ 327.7 billion) of world export of USD$ 15.862 trillion
  • 2016 Africa GDP USD$ 6.027 trillion, at 1.138 billion population, export consist of 5.4% of total economic output at USD$288 per capita. 
  • 2014-2015, Africa contributed USD$71.65 billion (9.4%) of India's total trade USD$758 billion  

Reference
http://www.vifindia.org/article/2017/june/05/asia-africa-growth-corridor-can-it-be-a-game-changer

https://www.tralac.org/news/article/8371-africa-india-facts-and-figures-2015.html

https://www.tralac.org/images/docs/8371/africa-india-facts--figures-2015-uneca-cii.pdf

https://www.afdb.org/fileadmin/uploads/afdb/Documents/Publications/AEO_2017_Report_Full_English.pdf

http://www.worldstopexports.com/top-african-export-countries/

 

Corruption Threat: Foreign Intelligence

It is the experience of Malkara Consulting that when discussing corruption with clients or colleagues, they regard the crime as being solely committed by organisations or individuals against other organisations or governments.  They have never viewed it as being an act committed by Governments against organisations and other governments.  Government arms involved in state sanctioned corruption usually include police and intelligence agencies. 

When Malkara Consulting examined the anti-bribery and corruption program of a client recently, we were surprised and in some instances shocked, at their poor level of understanding about the threat posed by intelligence agencies. 

The ultimate target of an intelligence agency is information.  And in this information age, data is power. And the loss of it can have serious consequences for an organisation.  Private sector organisations are a treasure trove of information that competitors and governments strive to get their hands on.  Foreign intelligence services know that the political and military opponents of their country use private services to operate.  They shop, they travel and they use financial services.   And in doing so, provide important data about themselves, their family members and any business they operate in, to a private organisation. 

And it is not just personal data that a foreign intelligence agency seeks.  Industrial spying is carried out on a significant scale by governments against the private sector.  The theft of industrial, scientific and commercial information enables countries to grow and remain competitive.  Successful Government intelligence agencies who have stolen important information provide it to companies in their country to enable those organisations to retain or acquire a competitive edge.

Organisations use a variety of techniques to protect their information much of it is technology based.  But they ignore the single biggest weakness in any defences against corruption undertaken by any entity and that is people. 

Readers would recall the 2007 theft of client name information by Sina Lapour, from Credit Suisse, which he provided to the German tax office via a middle man.  Or Heinrich Kieber, who stole thousands of customer files from LGT Group, a Liechtenstein bank and sold it to the BND, Germany’s intelligence service.

While the banks involved and other financial institutions have tightened their staff selection and deployment processes, with only entrusting long serving employees with sensitive customer information, other financial and non-financial institutions have not. 

Outsourcing of services to third party providers increases the risk of penetration by foreign intelligence services.  The most common service outsourced is IT, security and in some instances the human resource portfolio.  The services are often provided by foreign companies.  When assessing the risk of one client, we were alarmed at how employees of a contractor who had responsibility for maintaining the IT system; were allowed free unrestricted unsupervised access to most areas. The IT firm involved had been linked to working with a foreign intelligence service. 

Every bit of data helps a foreign intelligence service advance its objectives.  All the pieces matter in the intelligence collection game.  Once they discover a vulnerability, it is exploited.  And if the vulnerability is a person, then they will use a variety of methods to cultivate that person, including grooming techniques.  All employees, contractors and third-party providers are vulnerable if they are not trained in how to identify if they are being groomed and the threat posed by foreign intelligence organisations.

Information gathering operations undertaken by an intelligence agency are sanctioned by the Government owning it and given legislative protection.  For example, the UK Bribery Act which is the international standard setter in anti-bribery and corruption law, contains a provision protecting its intelligence service and those who work for it.  Under Section 13 of that Act, it is a defence to a bribery offence if that person establishes that their conduct was necessary for the proper exercise of any function of an intelligence service.  The Act applies to any person or organisation that has a close connection with the UK. 

The question therefore, is how many UK citizens working in the banking, insurance, logistics and shipping industries in offshore jurisdictions such as Hong Kong, Dubai or Singapore are working for MI6?  The UK Bribery Act protects them from prosecution at least under UK law; while they undertake espionage on behalf of the UK Government.  And how many foreign citizens working around the world in commerce, trade, financial sector or education and research, work for a foreign intelligence service? If they are, they are engaging in corruption and violating local anti-bribery and corruption laws.

Recruiting expatriates in offshore jurisdictions to undertake spying activities, a form of internal corruption if used against their employer or client is easier to achieve than corrupting a local person.

Organisations employing foreign residents or foreign companies, whose loyalty lies with a foreign country, need to have enhanced know-your employee/contractor procedures in place, otherwise sensitive information is vulnerable to exploitation.   

Malkara Consulting is holding a 2 day workshop in Singapore on 16 and 17 of October 2017 to arm equip people and organisations and individuals on how to protect reduce their susceptibility vulnerability to bribery and corruption. The workshopis  will offer greater protection than any ABC program based on compliance with local and international law can. Go to our events page to find out more.

http://www.malkaraconsulting.com/upcoming-events/2017/8/30/anti-bribery-corruption-workshop-people-are-the-weakest-link

Corruption: It's All About People

Every Anti-Bribery and Corruption risk management plan Malkara has examined, ticks all the right boxes. The programs have been mapped against local and international law, particularly US and UK anti-bribery and corruption legislation.  Advisors who drafted the ABC plan and the managers, have gone to great lengths to ensure that the organisation, their client, does not breach the law. 

But missing from the plans, are measures designed to harden the organisation against corruption.  And while no organisation can totally be protected from corruption, the implementing of an ABC program based on compliance with the law, only provides limited protection.

ABC laws are not effective. ABC programs are often based around assessing the risk that bribery and corruption will occur.  Many ABC advisors are ill-equipped to offer advice to clients on external and internal risks because they have no experience in the investigation of bribery and corruption.  They have no firsthand knowledge or experience in the threat posed by organised crime groups, who use “grooming techniques” to cultivate employees, contractors or third-party providers.  Or techniques used by criminals to recruit from universities high preforming finance students and arrange for them to be placed into financial institutions where after they have been working for several years and become trusted, steal information and or funds.

Financial Crime advisors will design ABC plans for clients based around open source information, for example, quoting Transparency International country rating index.  Countries with a low rating are regarded as being of low risk.  But often forgotten is that the ratings are based on perceptions.  A country that has a robust corruption prosecution framework can be adversely viewed as being corrupt when in fact, its ABC law enforcement strategy is exposing corruption and dealing with it effectively.  While countries that are not even bothering to look, get a low rating.  A low rating of corruption does not mean that corruption does not exist.

An example is Singapore.  It has a low rating for corruption.  But it is masked.  Like almost every country, employees who are caught committing fraud are charged with fraud when their acts also amount to corruption.  And large firms, fearing embarrassment if illegal actions committed by managers and employees are exposed are often simply sacked and no charges are brought.  Meaning there is no public record of the issue occurring.  And therefore, no effective way to assess corruption risk.

It is not uncommon in countries with a low corruption rating, to “recycle” corrupt managers and employees.  Most internal fraud is committed by middle to senior managers.  And if they are dismissed rather than charged criminally with a crime, poor vetting procedures by executive and non-executive recruitment firms, often results in those managers being re-employed in similar or higher roles in other organisations.

Malkara Consulting recently advertised an ABC Workshop to be held in Singapore on 16 and 17 October 2017.  The focus of the workshop is people.  Interestingly was the vast majority of emails received requesting they be unsubscribed from future emails, came from executive hire firms.  And why?  Because they make money on successful placements.  And undertaking vetting of a candidate to expose past corrupt behaviour takes time and costs money. Resulting in less profit for the firm.

Corruption is a major risk even in countries with a low rating of corruption.  Organisations with money and data to protect need to take the risk of corruption seriously and not wait until an incident happens to them. By then it’s too late.  

Corruption undermines internal controls. It is important that employees, contractors and third parties undergo intensive training to ensure that they understand how criminals use grooming techniques, how bribes are paid and how organized crime operates. This will offer greater protection than any ABC program based on compliance with local and international law can.

Malkara Consulting is holding a 2 day workshop in Singapore on 16 and 17 of October 2017 to equip organisations and individuals in identifying and protecting their susceptibility to bribery and corruption. Go to our events page to find out more.

http://www.malkaraconsulting.com/upcoming-events/2017/8/30/anti-bribery-corruption-workshop-people-are-the-weakest-link

Flying with the Enemy: Know Your Passenger

Introduction

This concept paper identifies a significant weakness in security relating to domestic airline travel which could be exploited by terrorists.  And proposes changes to the way in which domestic airline travel is booked and how passengers board domestic aircraft.  The proposals bring domestic travel almost in line with international air travel requirements.

Background

Islamic State and those who support or are aligned with that terrorist organisation, both in Australia and abroad, are becoming more creative in the methods they use and the targets they attack.  Trucks, mini vans and knifes are their simple and effective weapons of choice.  And when deployed by those who are determined to inflict maximum injury and death upon innocent people, they create and spread fear and panic in our community.

And after every attack, our Government and law enforcement leaders assure us that everything that can be done is being done to protect us from a terror attack in Australia.  But it is not. Australia has not to the extent possible identified all potential risks and all examined options to prevent a future terrorist attack.

Risk management models used to identify and assess the risk of a terrorist attack no longer apply.  It is impossible to assess the likelihood of an attack by a group of terrorists or a lone wolf attacker.  And while attacking soft targets such as people walking on a bridge causes fear and destroys life; it does not result in substantial physical damage and economic loss. It does not cause extensive inconvenience to the lives of thousands of people, nor force authorities and private sector companies to commit substantial resources to prevent future attacks.  All of which are primary objectives of terrorist organisations.

Security Weakness in Our Domestic Air Travel        

Terrorist attacks on soft targets should not cause us to become complacent and ignore high risk targets such as airports and air travel. An attack in an airport or aircraft would cause significant harm, damage and alarm within our community.   

Domestic air travel in Australia is vulnerable to the use and exploitation by terrorists.  Suspect terrorists use air travel to meet supporters, attend training and plan an attack.  And if given an opportunity, to commit a terrorist attack on a domestic flight. 

It is an offence in Australia to acquire an air passenger ticket using false identification information and to undertake a domestic flight using an air passenger ticket acquired using false identification information.  However, currently, any person who books a domestic or international flight in Australia is not required to identify themselves at the time of making a booking. 

While an international traveller is required to identify themselves at the time of check in and again prior to boarding a flight by presenting their passport; a person checking in and boarding a domestic flight is not.  And the person, in whose name the ticket has been booked, is not required to identify themselves prior to boarding any aircraft engaged on a domestic flight.  These are significant weaknesses in Australia’s domestic air travel system.  Even many motels and hotels in Australia ask for photo identification when a customer checks in. 

A terrorist could book a flight in a name, including a false name and any person could use that ticket to undertake the flight.  The offences that render that activity illegal are only minor offences and do not present a deterrent.  And a terrorist intending on travelling on the flight for any reason would not be deterred by the offences anyway, regardless of how serious they were.

Lack of Intelligence

There is a large number of people in Australia who support Islamic State and Al Qaeda.  ASIO, the Australian Federal Police and State and Territory police forces do not have the resources to monitor them all using physical and/or electronic surveillance.  And those measures can be easily defeated.  Resulting at times in the location of the suspect being unknown to authorities.  If recent attacks in the UK are any guide; the attackers were known to authorities but they did not have the resources to monitor them.  Intelligence was lacking.  And in countering the actions of terrorists three things must be known by the intelligence and law enforcement authorities at all times.  They are location, location and location.  Where has the suspect been previously?  Where is he/she now?  And from the information obtained from answering those questions; where is he/she likely to go next?  Only the receipt of timely intelligence provides those answers.   

Screening Does Not Identify High Risk People

Counter terrorism measures at Australian airports are designed to identify a potential terrorist by detecting anything a person might be carrying that could cause harm to people, the airport or to an aircraft. The screening is not designed to alert authorities to the movement of a person who might pose a risk to the airport, people or to aircraft. And even with current measures in place, it is possible for a potential attacker to arm themselves at an Australian airport; once they have cleared security screening; by obtaining metal knives and forks from an airport lounge or from a supporter who works in any of the cafes located at Australian airports.  Other than presentation of a credit card to pay for membership, a person is not required to identify themselves when applying to become a member of an airline operated lounge.  While the implements available in lounges and cafes are relatively blunt; they can still inflict significant injury or death if used with sufficient force on a person’s head, neck and other soft tissue of a person’s body.  Terrorists armed with implements obtained airside wouldn’t be able to get access to the cockpit, but that would not be their objective. Why would a terrorist/s attack people on the streets of an Australian city with knifes, when they could achieve better results, from their perspective, by hacking and attacking fellow passengers at 30,000 feet in a pressurised aircraft?

Travelling in small groups, they could cause significant harm to other passengers before they were stopped by other passengers and/or crew, if they are stopped at all. It is not hard to imagine a nightmare scenario of a domestic flight making an emergency return to an airport following an attack on board a plane, only for the authorities to discover that all or most of the passengers have been killed or seriously injured.  The one-hour delay, for well-conceived reasons, by Victoria Police to enter a Malaysian Airlines aircraft following as incident on board a flight out of Melbourne, only highlights the possibility of serious harm being done to passengers during the time it takes for authorities to assume control of a situation.

Target Hardening Domestic Travel

So how does Australia target harden our domestic airlines from being used by potential terrorists?  First, Australia needs to implement a “Know Your Passenger” system for our domestic airline system.  This could operate in a manner similar to the Know Your Customer framework currently in place to combat money laundering and terrorism financing.  Any person who books a flight would be required to submit various forms of identification to prove who they are.   Unlike other institutions such as a bank, an airline operating in Australia does not undertake electronic verification of a traveller. On line verification can occur by requiring a person who is booking a flight to quote one form of acceptable identification, similar to the primary identification documents required when opening a bank account. 

If a person is making a booking through a travel agent, the agent would be responsible for checking their identification and retaining a copy of it.  For example, an Australian passport or drivers licence. Those who do not have either document can quote in the case of an online booking or if booking through an agent, present a Medicare card number.  The information on any of those documents can easily be checked online by any airline that has acquired access to the information. Foreign travellers could be asked to quote a visa reference.  And if they do not have a visa at the time of making the booking, then it is to be quoted prior to any flight being undertaken or the booking is cancelled.  That reference could be checked against Commonwealth Government records.  For this process to occur the Australian and States Governments must share passport, Medicare and drivers licence identification data where relevant with all airlines and aircraft charter companies. 

New Zealand citizens would be required to quote similar identification documentation to Australian citizens and residents.  The New Zealand Government would be required to share primary identification data with Australia, as a condition of allowing its citizens to travel to our country visa free. 

Passengers would then be required to identify themselves again during the boarding process by presenting acceptable government issued photo identification only.  While requiring a passenger to present their identification when presenting their boarding pass might appear to delay the boarding process, the reality is it wouldn’t.  As anyone who has every travelled economy class will testify, often after presenting your boarding pass and heading to the aircraft, you are delayed in a long line waiting for others to board and take their seats.  But any potential delay can be avoided by the identification inspection being undertaken with airline staff checking the identity of travellers standing in line prior to presenting their boarding passes. This process is already undertaken by many airlines when passengers are cueing to board an international flight.

No one should be allowed to travel on a flight unless they have been identified. Know your passenger identification requirements would prevent any person seeking to travel on a name that is false or using someone else’s name.  While it would not deter a potential terror suspect from travelling, it would alert authorities to the presence of that suspect or suspects at an Australian airport, provided the data was linked to our intelligence and law enforcement networks. 

Monitoring the Movement of Terror Suspects

Currently, Australian intelligence and law enforcement agencies monitor the movement of people arriving and departing Australia by placing a person on “alert” using the PACE system. This system is maintained and monitored by Australian Border Force.  While it was designed to enhance our ability at the international border to detect persons of interest, it could be extended to the airline booking process for domestic flights.  Australian terror suspects could be uploaded into the extended domestic PACE and if linked to the booking system operated by domestic airlines, any known terror suspect would be detected when their details are entered at the time a booking is made and again when they check in and board their flight.  

Authorities would then have real time intelligence on the location of a terror suspect and their intended travel to another location in Australia.  A decision would then need to be made by ASIO and the police in conjunction with the airline on whether that suspect would be allowed to travel.  And if so, under what conditions.

Potential Response by Airlines

Like financial institutions, airlines would baulk at the cost involved in implementing the proposed Know Your Passenger system.  But it will result in a significant enhancement to the security of our domestic airline system and our intelligence monitoring of terror suspects.

And if an airline doesn’t want to implement the system or the Federal Government does not; they might find the insurance companies who ultimately cover much of the risk of air travel, institutional investors and large institutional shareholders in an airline, might impose it upon them anyway. Those institutions understand risk management better than most and would see it as a common sense move to protect their investment and financial interests.

  

Recommendations

Australia implement the following measures in relation to its domestic air travel system:

1.     A know your passenger system similar to the processes currently in use in Australia involving the know your customer electronic verification of potential customers by Australian banks be implemented.

2.     Passengers boarding a domestic flight in Australia be required to identify themselves using an acceptable government issued photo identification.

3.     The Australian Government in conjunction with the State and Territory Governments should expand “PACE” the current system used to identify persons of interest entering or leaving Australia, to include persons booked to travel and about to travel on an Australian domestic flight. 

Conclusion   

No system is totally effective and the system proposed would only detect known suspected terrorists and supporters. But as a traveller, I would more assured of my safety, if the intelligence and law enforcement community were aware of a potential terror suspect boarding my flight and was prevented from doing so.  And all Australians would support any inconvenience caused by the implementation of new measures.

Chris Douglas, APM

Malkara Consulting

 18 July 2017

Money Laundering Workshop Held for Nigerian Judges & Prosecutors

Money Laundering Workshop

 

Judges & Prosecutors in Nigeria

 

8 to 12 May 2017

 Chris Douglas, APM

Between 8 to 12 May 2017, a 5 day workshop was delivered to Nigerian Judges and Prosecutors in Nigeria.  The workshop was organised by the UNODC Lagos and funded by the European Union.  And delivered by Chris Douglas, consultant to the UNODC.

During the 5 day Workshop the following subjects were delivered by Malkara Consulting:

Subject Description

1.               Asset Freezing, Forfeiture and Related Issues. The freezing and forfeiture of assets can involve complex issues particularly in relation to property ownership.  A range of entities can claim an interest in property that is subject to restraint and potential forfeiture.  For example, the rights of a lending institution or other third party that holds security over the property will need to be recognised and dealt with.  Unregistered lenders or creditors and family members, particularly those living in and/or using frozen property create particular problems when it comes to forfeiture.  Undiscovered family trusts further complicate forfeiture issues.  This unit will explore those issues with participants being afforded an opportunity through group discussion to identify solutions guided by the course coordinator. 

2.               Business & Property Concealment Techniques.  In this unit participants will gain an understanding of various techniques used to conceal illegal funds in a business or real property or how criminals conceal their ownership of a business or property to prevent discovery and seizure. Particular emphasis will be placed upon the study of how real estate and businesses or front companies (using cash swaps, co-mingling technique) are used to conceal and move money including using legal and fake loans.

3.               International Standards in Asset Tracing & Financial Investigations.  This unit briefly examines relevant international financial investigation standards; particularly standards prescribed by the Financial Action Task Force and the European Commission (Directorate-General Justice, Freedom and Security) as prescribed in the European Financial Investigation Manual.  Particular emphasis will be placed on ensuring participants understand key concepts for example, the difference between money laundering and proceeds of crime investigations, the meaning of effective control and the distinction between ownership and registration.

4.               International Cooperation in Funds Tracing. International inquiries pose legal and operational difficulties.  This unit will explain the informal and formal law enforcement cooperation schemes that exist to enable funds to be traced offshore.  Political, legal and logistical issues will also be canvassed to ensure that investigators have a realistic expectation of what can be achieved in the pursuit of the proceeds of crime and money laundering cases.  The unit will conclude with a discussion amongst participants on any potential issues involved in obtaining and presenting foreign evidence in a Nigerian court.

5.               International Funds Concealment.  This unit explains the basic techniques used by criminals to hide funds offshore.  Concepts of bank secrecy, secrecy jurisdictions and the services they offer including corporate structures (international business corporations, trusts and foundations) and their use in asset protection schemes will be explained.  A key aspect that participants should learn from this unit is an understanding of the key differences between where a company is formed, where it is sold, where it is ultimately managed and the assets it holds.

6.               International Responses to Money Laundering. In this unit, major responses to combat money laundering will be introduced including an overview of the role and function of the Financial Action Task Force, regional anti-money laundering bodies, the Egmont Group of Financial Intelligence Units and international conventions designed to combat money laundering, transnational crime and corruption.

7.               Introduction to Money Laundering. This unit is a foundation unit for money laundering.  The meaning of money laundering is explained and participants are introduced to the money laundering cycle and the type of predicate crimes that are often linked to money laundering.  The unit will also briefing explain the international organisations involved in combating money laundering.

8.               Investigating Money Laundering.  This subject canvasses the various covert and overt techniques and tools used to investigate money laundering, taking into consideration the investigative tools available in Nigeria.  The importance of circumstantial evidence will highlighted and the types of evidence that have been used to secure convictions for money laundering.  A group discussion on the use of circumstantial evidence in Nigerian money laundering cases will follow.

9.               Money Laundering & Financial Institutions. Financial institutions are defined and explained in this unit together with the common techniques used to move funds through them.  The unit will canvas structuring and smurfing techniques, threshold transactions and various financial instruments namely telegraphic transfers, bank drafts, debit and credit cards and loan arrangements to launder money.  The use of formal money remitters, including mobile phone remittance systems, to launder illegal money will also be highlighted.

10.           Moving Value Using Commodities. The unit will explain that not all illegal money is moved using currency.  Brief examples will be provided on how illegal funds are moved or concealed in valuable assets or commodities. The operation of trade based laundering schemes will be demonstrated and discussed.

11.           Nominees and Beneficial Owners. This subject explains the meaning of a nominee and beneficial owner and outlines how they are used in money laundering schemes and asset protection/concealment schemes frequently encountered in proceeds of crime and money laundering investigations.

12.           Prosecuting Money Laundering. During this session, the training coordinator will facilitate discussion amongst participants on issues relating to the prosecution of money laundering in Nigeria including legislation, the Courts understanding of money laundering, standard of prosecution briefs of evidence, and any areas for improvement in processes and the law.

13.           Quality Assurance Review.  A quality assurance review will be conducted during the course to assess the acquisition of knowledge by participants.  Part 1 will involve an assessment of knowledge currently held by participants.  While Part 2 will assess the increase in knowledge gained by participants during the workshop.

In the photo Chris Douglas (Consultant to the UNODC and owner of Malkara Consulting) meets with Justice Olayinka Faji (centre) a Judge of the Federal High Court of Nigeria and Mr Joseph Sunday (right), Director Prosecutions and Legal Services, National Drug Law Enforcement Agency of Nigeria.