When Compliance Is Not Enough

Introduction 

Since 11 September 2001, there has been a global increase in AML/CTF[1] regulations relating to money remitters, both formal affiliated members of large global networks and unaffiliated operators connected via informal channels.  These measures are designed to ensure that money remitters are bound by the AML/CTF regulations that other reporting entities have to comply with.

In Australia, money remitters are subject to the provisions of the Anti-Money Laundering & Counter Terrorism Financing Act 2006 (“AML/CTF Act”) and related rules.  Progress in ensuring compliance by money remitters with the AML/CTF Act is progressing, but there is still much more work to be done.  Both in Australia and in other jurisdictions.  But increasingly, money remitters in Australia are being targeted for investigation by law enforcement authorities for alleged money laundering.  Including for activities undertaken by them during officially sanctioned transition periods designed to enable them to adjust their business model to comply with new customer due diligence and know your customer obligations under the AML/CTF Act.

But as the following case example will demonstrate[2], being in compliance with AML/CTF obligations is not enough to prevent being charged with money laundering. This paper will outline the circumstances to the case and propose several issues that reporting entities in Australia and elsewhere should be mindful of when dealing with customers who might represent a beneficial owner.

Ramy[3] was charged with money laundering for engaging in 3 remittance services as instructed by 3 customers.  The prosecution alleged that Ramy had engaged in money laundering because he had provided a remittance service on the basis of a false customer name or customer anonymity.  In this case, it was alleged the real customer in the remittance process was a person referred to as “F”.  Ramy appeared before the District Court of Western Australia in November 2016 to answer the criminal charge. After almost 4 days of deliberation, the charge of money laundering against Ramy was dismissed by the court. 

Background

Ramy was a manager and director of an Australian company ITS Pty Ltd (“ITS”) which conducted a remittance business in Perth.  His father was also a director but he lived overseas.  The company was registered as a provider of designated remittance services with AUSTRAC, the Australian Financial Intelligence Unit and Anti-Money Laundering regulator.  The registration took effect in 2012. 

ITS had a AML/CTF Program as required under the AML/CTF Act 2006.  That internal policy limited the transfer of cash to no more than $50,000 per person per day.   The policy also prescribed in Part B, the identification process to be followed for all new customers.  The policy was clear, that all new customers would be identified in a face to face relationship.

ITS provided remittance services mainly to China and neighbouring countries.  It also provided some foreign exchange services. 

A person referred to here as “F” wanted to remit money from Australia and he asked “B” to arrange for other people to undertake the remittances.  B was a foreign student studying in Australia and earned some money driving people around Perth which included F. Prior to this occasion, F and B had sent money from Australia and had been previous customers of ITS.  Both men were known to Ramy as past customers of ITS. 

As instructed, B recruited three backpackers in Australia to remit money.  Each person was engaged to remit $50,000. In relation to the current circumstances, the remittance process commenced with B driving to F’s house and collecting him and the cash.  B was often engaged by F as a driver.  F provided to B on a piece of paper the numbers for the accounts held in China which were to receive the money to be remitted from Australia.  Both men then drove to the premises of ITS in Perth. 

On arrival, B took the money into the premises of ITS and gave it to Ramy who counted it.  B also provided Ramy with the Chinese account numbers.  While at the premises B contacted three backpackers, “X”, “Y” and “Z”.  Sometime later, they arrived to remit the money.  In response to questions from Ramy and in accordance with the customer identification policy of ITS, each person presented their passports to Ramy for identification and provided their telephone numbers and addresses in Perth.  Ramy scanned the front page of each document, capturing a facial image in colour of each customer.  The front page including the photograph together with transactional information were retained on record in a customer file, in accordance with AML/CTF policy of ITS. 

For each remittance, being $50,000 cash in each case, Ramy prepared a receipt recording the name of each person and the account details of where the money was to be sent, namely to China.  All of the backpackers then signed the receipt acknowledging that the details were true.  That receipt or remittance form as referred to by the court, contained the reference number for the transaction, the date of the transaction, the name of the person sending the money, the currency received, the amount received, the transfer fee of $10, the exchange rate being offered, the currency in which the transfer was to be paid, the amount in that currency to be paid and the beneficiary account to receive the funds.  But importantly, the document contained a declaration which was acknowledged by each backpacker signing the form stating that:

I confirm that all information I have provided is accurate and I understand relevant requirements of AUSTRAC under Australian law.  I declare this money remittance service is not used for any illegal purpose and the funds are from legitimate sources.  The information provided is in accordance with the regulations for the prevention of money laundering, terrorist financing and illegal activities”.

After completing the identification process and signing the receipt, the backpackers departed the premises where they were each paid $100 by B.  At all times the process was overseen by B, who was also paid around $200 to $400 by F for his services to him, including his taxi driving services.

Ramy then arranged for the money to be deposited into the Chinese accounts as instructed.

There was no information or suggestion put to the court by the prosecution that the identifying information provided by the three backpackers was not entirely genuine.  Each person, referred to as X,Y and Z, gave their real names, used genuine passports, real addresses and real telephone numbers.

The Money Laundering Offence

Australia has an extensive money laundering offence framework that is little understood or known by reporting entities.  The Commonwealth Criminal Code, Australia’s primary national criminal offence legislation, contains 38 money laundering offences.  Of those offences, one offence contained in Section 400.9 of the code is relevant.  Section 400.9 contains an offence that relates to the dealing of money or property that is of $100,00 or more.   This offence is not the most serious money laundering offence in Australia, providing a penalty on conviction of imprisonment for a maximum of 3 years.  But it can be effective in combating money laundering if applied in appropriate circumstances.  And a serious violation of a person’s rights if it is not. 

Two features of the Section 400.9 offence that makes it a significant legislative weapon, is the minimal requirement of establishing the source of funds are proceeds of crime on the basis of reasonable suspicion only.  And secondly, there is no requirement for the prosecution to establish the mental state of the accused person at the time they dealt with the money or property.  Any knowledge they held, if any, as to the source of the funds is irrelevant in determining guilt or innocence.  The impact of this provision, as will be seen in this case, is that a person not involved in the predicate crime and having no knowledge of the source of the funds or any suspicion as to the source of the funds that would require him or her to report it as a suspicious matter, could be convicted of money laundering.

Ramy was charged with an offence against Section 400.9 in that he dealt with money in which it was reasonable to suspect that the money (in this case more than $100,000) was proceeds of crime.

The prosecution can prove reasonable suspicion by either demonstrating by direct or circumstantial evidence or both, the grounds that a reasonable suspicion exists in relation to any money or property.  Or the prosecution can rely on what are known as the “deeming provisions” of Section 400.9 to establish reasonable suspicion. In the case involving Ramy, the prosecution decided to apply the latter.   

The deeming provisions are extensive and beyond the scope of discussion in this paper.  Most of the provisions involve proving the commission of another offence contained in the AML/CFT Act 2006, which is then used to satisfy the reasonable suspicion.  By proving that other offence, the reasonable suspicion is deemed to be proven.  The prosecution does not have to identify any other offence as being the source of the funds.

For the purposes of Ramy’s case, the prosecution relied upon establishing that his company, had committed an offence against Section 139 of the AML/CTF Act 2006.  If an offence against section 139 could be proven, then it is taken to be proved that it was reasonable to suspect that the money was the proceeds of crime.

A person commits an offence pursuant to section 139 AML/CTF Act 2006, if the person is a reporting entity (in this case a money remitter but applies to all reporting entities including a bank) and the person commences to provide a designated service (in this case, a remittance service) and the person does so using a false customer name or the person does so on the basis of customer anonymity and at least one provision of division 2, 3 or 4 of Part 2 (which relate to identification procedures) of the AML/CTF Act applies to the provision of the designated service.  The provision of one aspect of Part 2 was not an issue for the court to content with, as Ramy undertook an identification procedure for each backpacker in accordance with Australian AML/CTF legislation and the AML/CTF Program of ITS.

Source of the Funds

Ramy conducted three international funds transfers (remittances) in the names of X, Y and Z, with each transaction being $50,000.  Under Australian money laundering law, the prosecution can combine the three transactions into one criminal charge. Which means that Ramy was charged with the more serious of the section 400.9 provisions, dealing with money amounting to over $100,000, reasonably suspected of being the proceeds of crime. 

X, Y and Z were not the source of the money.  They had been contracted by B to help him remit the funds.  B was also not the source of the funds. 

The source of the funds was F, who at the time the remittance processes were being processed, remained in a vehicle outside the premises occupied by ITS.

Ramy was never informed about the source of the funds by any person.  But he had ensured that each backpacker had signed a declaration confirming that the money was not derived from crime or intended to be used in crime.

Court Finding

When the prosecution had finished delivering its case, the defence lodged an application pursuant to section 108 of the Criminal Procedure Act (WA) that Ramy had no case to answer. This is an application that is lodged prior to the defence tendering its evidence before the court to rebut the prosecution case.  The court accepted the defence submission and dismissed the prosecution case negating any need for the defence to respond further. 

In dismissing the case, the court accepted the arguments put before it by the defence:

·       Section 6 of the AML/CTF Act 2006 defines who is to be the subject of the customer identification procedure, and in relation to remittances, it is the person from whom an instruction is accepted for the transfer of money.  It is not the person who gives an instruction. 

·       A false customer name means a name other than a name by which the customer is commonly known. Customer anonymity is not defined in the AML/CTF Act and therefore recourse must be had to the meaning of the word anonymous which means nameless or of unknown name. The AML/CTF Act 2006 specifies who the customer is for any particular designated service. Item 31 of Section 6 of that act specifies that in relation to a remittance arrangement, the customer is the person from whom an instruction is accepted for the transfer of money.

·       If the customer in each transaction was X, Y and Z, then Ramy did not provide the designated service using a false customer name or alternatively did not provide it on the basis of customer anonymity.  The customer is not to be equated with the source of the money or the owner of the money or the person on whose behalf the money was remitted.  In this case, in relation to the last two points, it was F[4].

·       The mere provision of bank details did not amount to the instruction to remit funds.   They were incorporated into the instruction to remit money once it was received.  That instruction was not received from B.  He contracted X, Y and Z and assisted them on their arrival.  If they had not arrived, then the transactions would not have occurred.  B had no intention of remitting the money.  And ITS would not have been able to comply with its own customer identification procedures until they did arrive, which it is required to do before engaging in a remittance service.

·     There is no requirement for an instruction to a remitter to be in writing.  But how the instruction is given is not relevant. It is the acceptance by the remitter that binds the arrangement (the court mentioned that the remitter merely offers a service involving the remittance of money at various rates and commission.  This amounts to an “invitation to treat”[5].   

·     The AML/CTF Act does not specify the owner of money, the source of the money, or on whose behalf the money is remitted.  Australian law focuses on the person from whom an instruction is accepted. 

The court held that the prosecution could not prove that ITS committed an offence pursuant to section 139 and therefore was unable to prove the second element of the offence charged pursuant to section 400.9. Based on the above arguments, no properly instructed jury, acting reasonably, could find that ITS had accepted an instruction from F to transfer funds.  In relation to the receipt of the bank account information from B, the court held the view that it was only information received by Ramy in anticipation of receipt of the instructions from the backpackers.

Relevance to Reporting & Non-Reporting Entities

This case has several issues that should be of concern for all reporting entities, large and small.  And not just for money remitters. 

The two prime issues are understanding the beneficial owner and Australia’s money laundering laws making criminals out of innocent people.

Under FATF Standards and Australian AML/CTF law, a reporting entity is required to identify all and any beneficial owner behind a transaction or an account.  And while that sounds reasonable, it is an extremely difficult process to undertake in practice.  Often a beneficial owner is hidden behind a corporate entity or a third party.  And while X, Y and Z were the transferrers of funds in Ramy’s case, the potential real owner and therefore beneficial owner, noting that it was not established, was F.  He was not present when the transactions took place.  The question therefore is if a reporting entity is required to identify the beneficial owner of funds or an account or transaction, how can they do that when that person is masked by remaining outside of the premises?  How far should the reporting entity go?  Place camera’s outside their premises to identify other parties?  Record all car registrations in the vicinity?  Obviously both solutions would not be practical or effective to implement.  And given that under Australia law, a transferrer of funds is the person who actually communicates an instruction to a reporting entity, namely a remitter, what is the point in establishing the beneficial owner anyway? 

“…..a reporting entity is required to identify all and any beneficial owner behind a transaction or an account.  And while that sounds reasonable, it is an extremely difficult process to undertake in practice”

In regards to Australian money laundering law, it is beyond the scope of this paper to explain in full the Commonwealth provisions.  But all entities should note the wide reach of Section 400.9.  A person can be convicted of money laundering on establishment of “reasonable suspicion” that money or property they deal with, is the proceeds of crime. 

ITS had in place an AML/CTF Program containing both Part A and Part B that was a risk based assessment prepared in compliance with the AML/CTF Act.  If Ramy had acted, and it appears he did, in accordance with the AML/CTF program developed for GF, how was it that he was charged with money laundering?  What risks did the business fail to identify?

A risk based approach to combating money laundering pushes the onus from AUSTRAC (or any financial intelligence unit) onto the reporting entity.  And it is often misunderstood what is meant by a risk based approach.  RBA does not mean there will be “zero faults”.  RBA is not designed to guarantee absolute assurance that all money laundering risks will be identified, prevented and/or reported.  It is only designed to give “reasonable assurance”. When a risk based approach is implemented for anything, it means and does result in the system failing at times. And failure must be accepted, particularly in relation to money laundering, because that crime often involves deception, which is masked in documents and by people in what they do or don’t do or say or don’t say.  In money laundering things and people lie.  And while not their sole purpose, money laundering techniques can defeat AML/CTF controls.  Any control can be defeated by them.  This is not often understood by reporting entities, by AUSTRAC (and other financial intelligence units) and by investigative agencies such as police.

“RBA does not mean there will be “zero faults”.  RBA is not designed to guarantee absolute assurance that all money laundering risks will be identified, prevented and/or reported.  It is only designed to give reasonable assurance”.

Therefore, when a control fails, is it appropriate to charge an employee of the reporting entity involved, in this case Ramy with money laundering?  If the answer is yes, then Australia can expect a large number of people to be charged with money laundering as AML/CTF controls fail every day and fail often. 

And this could occur in relation to the Section 400.9 offences, because as reported in this case, the prosecution needs only to prove that there is reasonable suspicion the money is proceeds of crime.  Knowledge by the accused at the time they dealt with the money or property is irrelevant.  However, an accused person charged with Section 400.9 has a defence.  If they can establish that they had no reasonable grounds to suspect the money or property, as the case may be, was not derived from any unlawful activity, then they are entitled to be acquitted.  But unlawful activity includes both minor and serious offences.  Including offences against Australian law (Commonwealth, State and Territory) and foreign law.

Getting back to Ramy’s case.  How is a money remitter, or an employee of any reporting entity, including AML monitoring staff in a bank (and for that matter a non-reporting entity in Australia for example a real estate firm) expected to know the criminal law of every Australian jurisdiction and every foreign country? For example, how are staff of a reporting entity, particularly a small money remitter, expected to know the offences contained in the Primary Produce Safety (Egg) Regulations 2014 of Tasmania?  Namely, supplying any egg, or egg product, that has not been lawfully produced for human consumption. Or offences relating to the unlawful dealing in precious stones in Botswana?

Given Australia’s ethnic diversity, it is expected that a money remitter would be involved directly or indirectly in sending or receiving funds around the world.  And it would therefore be highly probable that they would handle money that could be the proceeds of crime being sent from Australia or received from overseas.  They cannot be expected to make an accurate assessment on whether every transaction they are involved in, is reasonably suspected of being the proceeds of crime on every single occasion.  A RBA approach to money laundering will not ensure that they can.  But in Australia, if they don’t and the transaction is detected by the authorities and they hold the view there is reasonable suspicion that the money is proceeds of crime, they face the prospect of being charged with money laundering.  The criminal money laundering laws in Australia are therefore inconsistent with and clash with the risk based approach adopted in anti-money laundering frameworks. RBA might identify the risks that a firm or a person might handle the proceeds of crime and assist in the activity being reported to AUSTRAC, but it offers no protection to the staff of a reporting entity from being charged with money laundering, if not suspicion matter report is filed.

“The criminal money laundering laws in Australia are therefore inconsistent with and clash with the risk based approach adopted in anti-money laundering frameworks”

 Recommendations

Like any business risk, money laundering risk needs to be mitigated.  Being charged with money laundering can destroy or damage a business. Therefore, prosecution risk and reputational risk need to be mitigated as well. These risks need to be captured in the risk management plan or AML/CTF program of reporting entities.  And steps taken to mitigate against them to the extent possible.  But planning to reduce the risk of inappropriate action by an FIU or law enforcement agency is an extremely difficult task, if not an impossible task, with the consequences for an employee of a reporting entity and the entity itself being severe.

Taking into consideration the issues raised in this case, reporting entities, should consider adopting the following practices:

1.    Risk indicators in AML/CTF risk plans should incorporate foreign students and foreign travellers as a risk. 

2.    In relation to foreign customers, reporting entities should demand proof of residence.  Are they in the country legally?  Is their given address accurate? (via Google check).

3.    Ask themselves the question, why is a foreign student or traveller sending a large amount of money offshore?  Or receiving a large amount of money onshore?  Or regularly sending smaller amounts offshore which in total amount to a large amount of money for their status and or age?

4.    Train staff to make an assessment on whether any money or property involved in a transaction is reasonably suspected of being the proceeds of crime.  If it is, report it as a suspicious matter.  And if in doubt, err on the side of caution and report it to AUSTRAC (or other FIU if offshore) anyway.  This might lead to over reporting and a rebuke received from AUSTRAC.  But it is not AUSTRAC that faces the risk of prosecution for money laundering.  It is the entity and its employees.  Any feedback from AUSTRAC to a reporting entity that it is “defensive reporting” should be ignored until the reporting entity has received legal advice from a lawyer or barrister who specialises in criminal money laundering law.

5.    Staff should be trained in the Criminal money laundering law of Australia, particularly Commonwealth money laundering law.

6.    AML/CTF programs should address the risks posed by the wide reach of Commonwealth money laundering law, particularly the fault of elements of knowledge, recklessness and negligence and the reasonable suspicion element and deeming provisions in Section 400.9 Criminal Code Act 1995.

7.    Insert into any application to remit or receive funds the following statements in an attempt to identify the beneficial owner:

a.    Q.1 Are the funds you are sending or receiving your money?

b.    Q. 2 Have you been asked to act on behalf of another party to send the money or to receive the money?

If the answer to question 1 is no and/or the answer to question 2 yes, then further due diligence should be applied.

Malkara Consulting is able to provide guidance to any reporting entity on lawyers and/or barristers who have experience with prosecuting and defending Commonwealth money laundering cases.

____________________________________________________________________

AML advice in this case was provided by Malkara Consulting.

[1] Internationally referred to as AML/CFT.

[2] Details withheld to protect the identity and reputation of the business and all persons involved in the management of the business.

[3] Not the defendant’s real name.  Changed to protect his identity.

[4]The prosecution argued that X, Y and Z were sham customers signing the remittance forms with the effect that F, achieved anonymity or was identified by a false name in that he was not known by their names.

[5] Similar to a retailer offering goods for sale.  The customer accepts the offer by paying a consideration usually money.  But in the case of a remitter it is the giving of an instruction which is accepted by the remitter that binds the contract.

Don't Become a Victim of Cuckoo Smurfing

Background

Recent actions by the Australian Federal Police involving the pursuit of victims of Cuckoo Smurfing[1], should send shivers down the spines of all Australian exporters; international migrants intending to come to Australia and foreign based families sending money to Australia to pay for their children’s education or cost of living.  Large exporters of services for example, education providers and migration agents are particularly vulnerable. 

Cuckoo Smurfing

Cuckoo Smurfing is not a legal term. It is a money laundering technique used by organised crime to pay for the importation of narcotics or to move the proceeds of crime offshore.  It involves criminals intercepting lawful international payments into Australia and substituting that money with the proceeds of crime.  And while this paper relates to Australia, Cuckoo Smurfing is a global problem.

The term Cuckoo Smurfing refers in part to the Cuckoo bird which lays its eggs in the nest of other bird species.  Those birds then raise the cuckoo bird chicks as their own (refers to the European Cuckoo bird as the Australian Cuckoo bird does not raise its young that way).  And smurfing is a reference to a group of criminals who move from bank to bank conducting transactions usually under threshold reporting levels[2].  In relation to money laundering, it involves criminals, without the knowledge or consent of an account holder, depositing money from crime in their account.  While legal or clean money, the customer was expecting to receive, usually from offshore, is hijacked and given to offshore based crime groups.

Other Descriptions

The Cuckoo Smurfing description is not particularly helpful.  It could be more usefully described as the “Matching Technique” or the “Lateral Transfer Technique”.  Matching would refer to the fact that the money deposited into an account in Australia by criminals, matches exactly the amount of money given offshore by a customer to a money remitter. Not a dollar more or a dollar less.  Australian based criminals ensure that no customer is left short changed as it would cause the customer to contact their bank and/or the person who sent the money.  That might generate a suspicion somewhere, which criminals seek to avoid.

While lateral transfer would refer to an offshore based customer wanting to send money to Australia giving money to the money remitter who gives it to crime group.  And a similar sum of money is deposited into the account nominated by the offshore party in Australia. One transfer occurs offshore and the other is transferred on shore.

Cuckoo Smurfing Process

AUSTRAC reports that Cuckoo Smurfing involves 4 simple steps.  But AUSTRAC is not an investigation agency and does not investigate money laundering.  The technique is more complex than that and involves:

1.     A customer living overseas wanting to send money to Australia, provides funds to a money remitter in a foreign country for transfer to an Australian bank account.  The money remitter may or may not be authorised or approved to operate in the jurisdiction it operates from.  The money could be sent by the customer as payment for goods or services bought from an Australian exporter, or income being sent home to family, or to themselves or as a gift for family and friends. The bank account receiving the money therefore, may not be in the name of the remitting customer.

2.     Without the knowledge of the remitting customer, the money remitter has been corrupted by organised crime.  He/she has been engaged to launder money for crime syndicates situated offshore from Australia.  To this end, the foreign remitter sends to a money laundering syndicate operating in Australia; remittance information provided by the customer; including the amount of money to be sent, the IBAN and account number and the name of the account the money is to be paid into.  The remitting customer does not consent to his/her information being used in this manner.

3.     The money laundering syndicate operating in Australia then collects bulk cash from criminal syndicates in Australia.  The money is either the proceeds of crime or funds to be used to pay for the importation of narcotics or both.

4.     The money laundering syndicate then divides the bulk money up into separate packets of cash.  These packets or bundles correspond exactly to the amount of money that has to be deposited into the Australian account nominated by the customer.  If the customer, sent $7,000 to Australia, then $7,000 would be selected from the bulk funds collected from the crime group and deposited into the account.

5.     If a number of customers located offshore each sent money to Australia under $10,000, then the money would be deposited into their account as per their instructions.  From an intelligence perspective, multiple customers each nominating an account to receive money would appear that the crime group is structuring the deposits.  But this is not correct.  Structuring is not a legal term, but a process to launder money by engaging in a transaction with a reporting entity (in this case a bank) under the reporting threshold. 

6.     However, if a customer sends funds equal to or greater than the reporting threshold via an offshore money remitter, then the money laundering syndicate has available to it two options to deposit the crime money into the nominated account/s. The group can either structure the funds into the account or deposit the total amount.  For example, if the offshore customer sends $16,000 to Australia to pay for university fees for their child or as a payment related to their immigration process, then the crime group could deposit the entire amount in cash or break up the amount and make each deposit under $10,000.

7.     For the Australian based money laundering syndicate, both approaches involve risk.  Structuring the deposits poses the greatest risk, as that action amounts to an offence against Section 142 of the Anti-Money Laundering & Counter-Terrorism Financing Act 2006.  It is on the basis that the funds have been structured and are therefore an instrument of crime, that the AFP has taken action to restrain the funds held in the account of people innocent of any crime (the receiver of the funds sent by the offshore based customer).

8.     Deposit of the cash by the money laundering group on or over the threshold amount (as per the overseas customer’s instructions) poses the least risk.  While it would be reported as a Threshold Transaction to AUSTRAC, it is unlikely to be singled out and selected for further analysis by the financial intelligence unit or a law enforcement agency.  The transaction would probably be drowned out in the “white noise” of other significant cash transactions being made that day either at a particular bank or in a busy business area (Cuckoo Smurfing money laundering syndicates prefer operating in the larger cities of Sydney and Melbourne for that reason).

9.     Once the money has been deposited, the money laundering syndicate notifies the offshore money remitter that the transaction has been undertaken.  The money remitter then pools each sum of money given to it by legitimate customers and later passes those funds in bulk to an organised crime group.  The money is either to be used to pay for the importation of narcotics into Australia or is to be laundered by the crime group that wanted to shift illegal funds offshore.   

 Money Mule Schemes

Cuckoo Smurfing is not to be confused with a money mule scheme, where account holders are recruited on line to receive into their accounts money which is not theirs to receive.  And who get paid a commission for their involvement.  Which they deduct from the funds they have received and forward the balance onto another account as instructed by the crime group who recruited them.

Cuckoo smurfing victims expect to receive the money sent to them.  It is payment for goods, services, or for other lawful purposes.  The money is not derived from crime.  It is sent by people who owe them money or who are giving or sending them money to be applied for a lawful purpose.  It is not stolen from people by way of a scam or fraud as is the case in money mule schemes.  Victims of Cuckoo Smurfing do not in any way benefit from the money laundering scheme and do not consent for their information or their accounts to be used in the process.

“Victims of Cuckoo Smurfing do not in any way benefit from the money laundering scheme and do not consent for their information or their accounts to be used in the process”

 Who Incurs the Risk?

With Cuckoo Smurfing, Australian based drug groups outsource their money laundering risk to professional money laundering syndicates.  By doing so, they reduce the risk to their operations should law enforcement decide to “follow the money”.  The crime money they dispose of, is concealed in the accounts of innocent people.  While they have access to or if paying for a drug shipment, have available to them, clean money which will be applied offshore. 

The Chinese say “If you put your ladder against the wrong wall, every step you take is in the wrong direction”.  The banks receiving the deposits, incur little if any risk.  If a bank forms a suspicion about a cuckoo smurfing deposit and raises a Suspicious Matter Report in relation to it, the bank will report their customer, usually not anyone involved in making the deposit!!  Once received by AUSTRAC and by a law enforcement agency, unless they know about the scheme, it will cause them to chase the wrong people.  As the AFP is currently now doing.  It is going after the victims of crime, instead of the real criminals.  The AFP has placed its ladder against the wrong wall.  And it is going in the wrong direction. 

“If you put your ladder against the wrong wall, every step you take is in the wrong direction”

 Who is At Risk from AFP Operations

Since the AFP commenced applying the civil forfeiture provisions of the Proceeds of Crime Act 2002 to the deposited funds that have been structured, then any and all funds of that nature are at risk of being restrained and subsequently forfeited.  The AFP claims that the funds are an instrument of crime.  Which is defined as any money or property used or intended to be used in the commission of an offence. The offence nominated by the AFP is structuring or more precisely, conducting a transaction with the sole or dominant purpose of avoiding a Threshold Report being made, a contravention of Section 142 of the Anti-Money Laundering and Counter-Terrorism Financing Act 2006.

Potential victims of AFP action include, if they are not already:

·       Mum’s and Dad’s sending money to their children in Australia for education and cost of living expenses.

·       People seeking to immigrate to Australia who send money to Australia to pay for fees, to buy a house etc

·       Foreign investors sending money to Australia to invest in Australian property, shares, or industry

·       Australian exporters who are paid by customers who purchased their goods or services.

How to Reduce the Risk of Becoming a Victim

Money that is targeted and intercepted by cuckoo Smurfing money laundering syndicates is linked to offshore money remitters.  Any person seeking to send money to Australia should engage a bank to send the money or a large international money remittance service.  While the charges are higher and the currency conversion rate (the spread between buying and selling) is not as attractive as on offer by smaller remitters, using a bank or large remittance service, eliminates the risk of misuse of any money by criminals.

Similarly, an Australian entity expecting funds from overseas, should insist that the offshore entity use a bank to remit the money or if they are an exporter, use a trade finance arrangement (e.g. a letter of credit). 

 What to do if you are a Victim

If you are expecting funds to be sent to you from overseas, they will be received into your account as a credit entry.  It will be recorded as an electronic transfer.  As in any international or domestic transfer between entities, no money actually moves.  Only value.  The easiest way to determine if your account or business account has become a target of Cuckoo Smurfing money laundering syndicates is to check the deposit made into the account.  If the credit entry was generated by a cash deposit either as a lump sum or several lump sums made in close proximity to each other in time and place, then it is highly likely your account has been compromised. 

Prior to the AFP changing strategy and pursuing the funds deposited into Australian bank accounts by Cuckoo Smurfing money laundering syndicates, holders of those accounts and the owners of the money, had nothing to fear.  The AFP pursued those behind the money laundering.  Advising the police, or AUSTRAC on what was happening was an appropriate response.  The AFP could be trusted.

But now, customers whose accounts have been compromised are advised NOT to contact the AFP or AUSTRAC.  When it comes to Cuckoo Smurfing, the AFP can no longer be trusted to act in the public interest and uphold and protect the rights of victims.  And victims are advised not to discuss the issue with their bank.  The bank if it suspects cuckoo smurfing will report the activity to AUSTRAC who will report it to the AFP.  The bank will not and have not protected its customers from Cuckoo Smurfing activity.

“When it comes to Cuckoo Smurfing, the AFP can no longer be trusted to act in the public interest and uphold and protect the rights of victims”

Any person who is suspected of being a Cuckoo Smurfing victim is advised to first seek LEGAL advice before doing anything.   Not only is the person a victim of cuckoo smurfing but also a victim involving the theft and misuse of their personal financial information. Dealing in identification information to commit an offence[3] and dishonestly obtaining or dealing in personal financial information,[4] are indictable offences under Commonwealth criminal law. 

Malkara Consulting can provide guidance on lawyers who have experience in handling Cuckoo Smurfing matters involving proceeds of crime action.  Malkara Consulting can also provide advice to any lawyer or law firm who has a client concerned that they have been a victim of Cuckoo Smurfing.

[1] See Commissioner of the Australian Federal Police v Kalimuthu [No 3] [2017] WASC 108. [on-line]. Available http://egreaves.com.au/wp/wp-content/uploads/2017/04/Commissioner-AFP-v-Ganesh-Kalimuthu-Anor-2017-WASC-108.pdf (2017, April 22).

[2] A US derived term which refers to the fictional small blue humanoids with a gnome like appearance that live in mushroom shaped houses.  The Chinese refer to them as ants and in other jurisdictions as money mules.

[3] Section 372.1 Criminal Code Act (Cth).

[4] Section 480.4 Criminal Code Act (Cth).

The Deadly Wind. An Alternative Platform for the Delivery of WMD

There were many reasons why terrorists were able to successfully attack the United States of America on September 11, 2001. But as the 911 Commission identified; the most important failure was one of imagination by US authorities.  There was an absence of creative thinking by intelligence, law enforcement and military agencies. The type of thinking that identifies all potential threat scenarios involving large scale terrorist attacks anywhere.  And while that might sound very critical of US agencies; I doubt any country in the western world at that time was focused on predicting the strategic thinking of al Qaeda.

The use by North Korean agents of sarin gas, a weapon of mass destruction, to kill the half-brother of North Korean President Kim Jong Un, raises international risk levels to a new high. Sarin gas is easy to produce.  For example, in 1993, the Japanese Aum Shinrikyo, a doomsday cult, developed and successfully tested sarin gas at a remote cattle station in Western Australia. On 20 March 1995, the sect released sarin gas into the Tokyo subway killing 12 people and injuring over 1,000.  That incident demonstrated the ease at which a terror group can develop a deadly weapon in a country’s backyard and use it.  Had the Aum Shinrikyo sect, combined the sarin gas with a better delivery system; they might have been more successful with their attack in Tokyo.  Development of or the use of poisonous gas by terrorists or by agents of rogue states, such as North Korea, in other countries such as the United States is not beyond possibility.    

One potential delivery system for weapons of mass destruction, particularly biological and chemical weapons are hot air balloons.   During World War 2, the Japanese were credited with developing the world’s first intercontinental missile threat.  In response to the US attack on Tokyo and other cities in Japan during what is known as the Doolittle Raids, the Japanese military and scientists identified that balloons could be launched from Japan and using Pacific wind currents, deliver bombs to the United States.   

US intelligence estimated that the Japanese launched over 9,000 balloon bombs during the war, of which only 290 were known to have successfully landed, including 73 in Canada.  Among the reasons for the poor success rate was the fragile construction of the balloons and the use of a weak anti-freeze solution that did not prevent their batteries from freezing. The balloons were made primarily of paper, but launched in the winter months when the jet stream is the strongest, they could travel at over 200 miles per hour at a height of between 20,000 to 40,000 feet.  The balloons could carry a thermite (incendiary) bombs and a high explosive anti-personnel bomb.

The balloon carrying bombs had two primary purposes:

1.     The incendiary devices they carried were designed to start fires in the vast North American forests; and

2.     Cause panic and casualties amongst the citizens of North America

Of real concern to US authorities at that time was the potential use of the balloons to disperse chemical or biological agents across the United States.  The Japanese were already experimenting in China with chemical weapons, but they were not deployed on the balloons. 

It is not beyond possibility that North Korea could already possess this simple means to deliver high explosive bombs, biological or chemical agents to the United States and its allies.  The recent assassination in Malaysia of Kim Jong-nam, the half-brother of the North Korean president, using sarin nerve agent suspected of being delivered by North Korean agents, confirms that the country has that weapon in its arsenal and is prepared to use it on foreign soil.

Balloon bombs if used by North Korea would have a number of tactical benefits to that country:

·       They are cheap and easy to acquire

·       Difficult to detect on radar and at night

·       Powered by the wind, they have a long endurance range and therefore the capacity to deliver weapons, particularly biological weapons over a wide area of a country as they travel

·       Can be launched from any location in North Korea or any ship particularly one positioned close to the United States

·       If they are bright and colourful they might not be seen as a potential threat by any person who observes them flying

·       Exponentially increases the number of systems available to deliver weapons of mass destruction.  The majority of balloons do not have to carry any weapons at all and merely act as decoys or dummies increasing the chances that the balloons actually carrying weapons make it to their intended targets.  If North Korea launched thousands of balloon bombs at North America in one massed attack; it would strain the resources of the US and Canadian military to track and destroy them all in time before some detonated or deployed their dangerous cargo.

And North America does not have to be and probably would not be the sole target of North Korea. Balloon bombs could be launched in a mass attack on Japan and South Korea, who would have less time to identify the threat and respond. 

In 2003, the Pong Su, a North Korean cargo ship delivered 125 kilograms of heroin onto a southern Australian beach, near the city of Melbourne.  It is not beyond the capability of the North Koreans to launch a balloon carrying a weapon from a boat sailing near the Australian coast or the remote coastline of any other country opposing it or allied to the United States.  An attack on any country including the United States could be part of a larger scale attack or counter-attack in response to US action involving multiple delivery systems. 

The potential use of balloons to deliver weapons does not have to be restricted to North Korea.  They are a potential delivery device of weapons of mass destruction by terrorists.  Balloons are easy to acquire in Western countries.  And many countries including the United States and Australia for example, have large numbers of commercial hot air balloon operators and host hot air balloon festivals in warmer months. In the United States, there are 15 hot air balloon festivals scheduled for April and May 2017 alone.   It would be easy for terrorists (or North Korean agents) to acquire a balloon or join a balloon flight either on a single flight or part of a large balloon flight festival and release biological agents or other weapons as they travelled.  Few, if any, people would suspect an attack was occurring and who was conducting it, until it was too late.

It is frightening to imagine, what might have happened if the Aum Shinrikyo Sect, having developed Sarin gas in remote Western Australia, had decided to test it in Perth or another Australian capital city, by flying over it and releasing the weapon from a balloon.  Thankfully, they tested it on sheep and killed hundreds with it.  Or delivered the weapon from a balloon flying above Tokyo, with the delivery mechanism and dangerous toxin carried only by the wind.

Al Qaeda’s capability to kill and destroy was underestimated which resulted in the death of thousands of people and billions of dollars being lost from the US and global economy.  It is imperative that the world remains vigilant and remembers the mistakes of the past by not suffering from a lack of imagination in identifying potential risks from terrorists and rogue states.

  

Chris Douglas, APM

Proprietor, Malkara Consulting

Perth, Western Australia

www.malkaraconsulting.com

 19 April 2017

 Bibliography

 

1.     Carroll, R. (2014).  How Japan’s fire balloons took the second world war to American soil. The Guardian [on-line]. Available  https://www.theguardian.com/us-news/2014/oct/30/japan-secret-weapon-balloon-bomb-world-war-oregon (2017, April 17).

2.     Gregory, P. (2006).  Pong Su Smuggler Jailed for 23 Years. The Age Newspaper. [on-line]. Available http://www.theage.com.au/news/national/pong-su-smuggler-jailed-for-23-years/2006/04/06/1143916634557.html (2017, April 17).

3.     Jolley, M. (2004).  North Korea.  Pong Su.  ABC Foreign Correspondent. [on-line]. Available http://www.abc.net.au/foreign/content/2004/s1162110.htm, (2017, April 17).

4.     Klein, C. (2015). Attack of Japan’s Killer WWII Balloons, 70 Years Ago. History.com. [on-line], Available http://www.history.com/news/attack-of-japans-killer-wwii-balloons-70-years-ago [2017, April 17].

5.     Morton, E. (2014).  The Tokyo Sarin Cult's Outback Australian Test Ranch. Slate. [on-line].  Available http://www.slate.com/blogs/atlas_obscura/2014/02/28/the_secret_sarin_test_ranch_in_outback_australia.html (2017, April 17).

6.     Rizzo, J. (2013). Japan’s Secret WWII Weapon: Balloon Bombs.  National Geographic. [on-line]. Available http://news.nationalgeographic.com/news/2013/05/130527-map-video-balloon-bomb-wwii-japanese-air-current-jet-stream/ 27 May 2013. (2017, April 17).

 

Terrorism Financing & Credit Card Fraud

Introduction

The current AML/CFT frameworks that exist to combat the financing of terrorism are based largely on an anti-money laundering and arrangement introduced in the 1980’s.  Those frameworks have been amended and expanded following various amendments to the Financial Action Task Force recommendations and subsequent implementation by national governments.

AML/CFT frameworks adopt a risk based approach to the detection, reporting and prevention of money laundering and terrorism financing. This risk based approach shifts responsibility from AML/CFT regulators to reporting entities.  It is a significant change from the previous framework with reporting entities now required to do more than just comply with relevant AML/CFT legislation.  The shift was a necessary adjustment because a focus by reporting entities on compliance and reporting alone did not necessarily identify and manage money laundering and terrorism financing risks.

The adoption of a risk based approach means that the level of understanding by reporting entities of the sources of terrorist financing in particular sources of funding derived from criminal activities is more onerous under the AML/CFT framework than under the previous compliance focused regulatory regimes. However, as will be identified later, there is a question as to whether reporting entities and for that matter by extension Financial Intelligence Units and law enforcement agencies understand the nature of the risk posed by the use by terrorists and foreign fighters of the proceeds of fraud.

Putting aside minor variations to various report titles, the AML/CFT reporting framework in most countries comprises:

  • Threshold Reports,
  • Cross Border Currency Reports, and
  • Suspicious Transaction Report/Suspicious Matter Reports (STR/SMR).

Other than a Suspicious Matter Report all report types are mandatory when certain conditions are satisfied.  While acknowledging that all of the AML/CFT reports are important, a criminal investigation including a terrorism investigation are more likely to be triggered when an STR/SMR is filed with an FIU.  This is due to the greater emphasis placed by law enforcement, revenue and intelligence agencies on “suspicions” communicated by reporting entities in particular by financial institutions.

AML/CFT reporting frameworks were established during an era when the risk of terror attack particularly a home grown terrorist attack was low.  They have not kept pace with recent international and domestic developments in terrorism or with developments in payment technology.  None of the reports are filed in real time by the reporting entities and FIU’s do not have access to any real time transactions.  As a consequence an FIU, police and intelligence agencies are not able to monitor and track in real time the movements and activities of a terror suspect using the financial foot print he or she leaves behind.  This is a major weakness in an AML/CFT framework.
 

Reporting of Suspicious Matters

The reporting of a suspicious matter report by a reporting entity requires the raising or forming of the requisite suspicion by that entity.  If no suspicion is raised in relation to any matter arising from the provision or delivery of a service by that reporting entity then no STR/SMR is raised and sent to an FIU.

 The forming of the suspicion by the reporting entity is subjective.  An STR/SMR only becomes a mandatory report when the level of suspicion in relation to the issues contained in relevant AML/CFT legislation is reached. 

What one reporting entity might regard as suspicious and therefore warrants being reported to an FIU, another reporting entity assessing similar information might not.  The time for reporting a suspicious transaction does not arise until the reporting entity forms the relevant suspicion.  In the case of an organisation this means when a responsible officer of the organisation forms the suspicion.  For example, if a bank teller thinks that a transaction is suspicious and reports it to the relevant Money Laundering Reporting Officer (MLRO) the bank time to report the transaction does not commence to run until the MLRO officer forms the suspicion.  There could be some delay in the identification of the behaviour by a front line officer and the reporting of that information to an FIU by the MLRO in the financial institution. 

If the MLRO does not agree with the suspicions raised by the officer who initially reported the behaviour then no suspicion is grounded and no STR/SMR is sent to the FIU.  The process is very subjective and when left to staff with little or no training or experience with investigating crime, particularly terrorism then the effectiveness of the system is brought into question.

And this is where a problem can arise from the perspective of law enforcement and intelligence agencies.  Information held by a reporting entity might not be suspicious when that organisation views it in isolation.  But if that information was combined with information filed by another reporting entity or with intelligence held by a law enforcement/intelligence agency it might form a strong suspicion or a higher level of proof that results in the generation of an active investigation into the reported activity.  But if no information is reported then nothing will happen.  An important piece of information could be lost which in relation to terrorism might have potential tragic consequences for our community.

“The process is very subjective and when left to staff with little or no training or experience with investigating crime, then the effectiveness of the system is brought into question”

 

Credit Card Fraud & Terrorism

In relation to the reporting of suspicious matters, the main area of concern is the reporting of suspicious activity relating to terrorism and terrorist financing.  By extension this includes the reporting of information that potentially relates to foreign fighters recruited to engage in terrorist activities abroad primarily in Syria, Iraq and Somalia. 

The commission of credit card fraud is a crime type that is misunderstood when it comes to the financing of terrorism.  Without any nexus to terrorism it is often only treated as a local crime problem to be solved by police.  And credit card fraud would only be considered a terrorist financing matter if the fraud was connected to terrorist activity or someone engaged or suspected of terrorist activity.  Or alternatively, the credit card fraud is reported as being suspicious and that suspicion relates to terrorism financing.  From the perspective of terrorist financing, the risk posed by credit card fraud is the least understood risk by reporting entities, FIU’s and police agencies.  It is difficult for financial institutions to assess and manage the risk because often they manage financial crime risks in separate crime silos.

“From the perspective of terrorist financing, the risk posed by credit card fraud is the least understood risk by reporting entities, FIU’s and police agencies”.

 

The problem that confronts a reporting entity (usually a financial institution) in relation to credit card fraud is establishing the requisite reasonable suspicion that the funds derived from credit card fraud relate to the financing of terrorism.  Financial crime and engaging in terrorist activity are clandestine activities which are planned and executed to prevent the identification and investigation of those involved in the crime.  Often the nexus between criminal activity and terrorism is not obvious to bank staff charged with identifying such activity. That issue is compounded by the lack of experience and training by staff of terrorist funding. It is also not always obvious to police investigators involved in the investigation of the offences.

From engagement with employees and managers in the AML/CFT environment it has become apparent that financial institutions do not or have not, either on every occasion or on many occasions submitted to an FIU, STR/SMR’s detailing credit card fraud activity where no person has been identified as the suspect involved in the crime. It is also not always certain that credit card fraud involving known offenders is reported to an FIU via the STR/SMR process as those fraud incidents are usually dealt with by the bank or not dealt with at all as the amounts involved are below the acceptable “risk appetite” of the bank. 

The identification and investigation of offenders is a function of the police.  Generally it is usually not the responsibility of an FIU.  While the responsibility of a reporting entity is to detect, report and monitor.  Police and intelligence agencies will use a range of sources including STR/SMR’s submitted by other reporting entities to identify those involved in the crime and the intended use of the funds.  But those actions and powers used by law enforcement agencies are only “triggered” by the receipt of financial intelligence such as an STR/SMR from a financial institution.

If that situation outlined above is occurring, then it is of serious concern from a terrorism financing perspective.  Credit card fraud is a major source of funding for groups planning a terrorist act.  The following examples highlight the issue:

  1. The convicted ‘‘Millennium bomber,’’ Ahmed Ressam, who took part in a plotted attack on Los Angeles International Airport, opened a store in Montreal, Canada, where he obtained credit card information and passed it on to Al-Qaeda associates.
     
  2. The 1998 US Embassy bombings in Africa and the first World Trade Centre bombing in 1993 were funded by criminal activities which included credit card fraud.
     
  3. An al-Qaeda cell in Milan, Italy stole credit card information that was remitted to a Frankfurt cell to procure chemicals for explosives.
     
  4.  Algerian Armed Islamic Group (GIA) cells in Europe provided the bulk of the organization’s funds through petty theft and credit card fraud.
     
  5. The Salafist Group for Prayer and Combat (GSPC)[1] based in Algeria and highly active in Western Europe (particularly in France) have also been involved in a range of crimes such as car theft, credit card fraud and document forgery.
     
  6. In 2005 a Melbourne based terrorist group engaged in systematic credit card fraud involving payment to taxi drivers to provide them with the credit card numbers of unsuspecting taxi passengers.
     
  7. In the UK two Liberation Tigers of Tamil Eelam (LTTE) members were arrested for obtaining credit and debit card information at over 200 petrol stations that used pumps through the use of skimming machines.
     
  8. Ali Al Marri was arrested in Illinois in December 2001 for having lied to FBI Agents about having contact with facilitators of the 9/11 terrorist attack. At the time of his arrest, Al Marri had 36 credit card numbers and account information in his possession. A subsequent search of his computer found he had compiled over 1,000 credit card numbers and other identifying information.
     
  9. Mohammed Belaziz, a Salafist, was arrested on 25 September 2001 in Spain.  Inquiries revealed that Belaziz and other members of his cell had been financing their operations through credit card fraud.
     
  10. The terrorists who bombed the trains in Madrid in March 2004 supported themselves through drug trafficking while another Al Qaeda cell in Spain supported itself over an extended period of time through credit card fraud.
     
  11. The Liberation Tigers of Tamil Eelam (LTTE) who established cells in as many as 38 countries in Europe, North America, the Middle East and Australia funded operations through extortion, narcotics trafficking, credit card fraud, social security fraud, counterfeit currency, piracy, people smuggling, and gun running.  Special cells operating within the LTTE focused on each criminal activity.
     
  12. Imran Samudra admitted prior to his execution for his role in the Bali nightclub bombings in 2002 that together with another JI member he encouraged jihadists to engage in hacking and online credit card fraud and money laundering.
     
  13. Younis Tsouli a British citizen and his partner, Tariq al-Daour, began acquiring stolen credit card numbers on the web, purchasing them through various online forums, such as Cardplanet.   When Tsouli and al-Daour were arrested, al-Daour had accumulated 37,000 stolen credit card numbers on his computer, which they had used to make more than $3.5 million in charges.  Tsouli used 72 credit cards to register 180 websites, hosted by 95 different companies which were used to launder the proceeds of the credit card fraud.

The examples above demonstrate that credit card fraud is an important source of revenue for terrorist groups or terrorist supporters. But from a terrorist financing perspective it is one of the most difficult financial crimes to detect and to investigate.  And as discussed above it is extremely difficult to draw the nexus between the funding and its intended purpose namely financing terrorism. 

However, the investigation by law enforcement agencies into the source of terrorist funding is frustrated if they do not know where to look.  Important leads are often identified via suspicious matter reports lodged by reporting entities.  And if reporting entities such as financial institutions do not submit STR/SMR’s reporting the commission of financial crime, law enforcement agencies are blind as to the activity. Whether an offender is identified by the reporting entity or not is totally irrelevant. Consequently all instances of credit card fraud should be reported in real time to an FIU whether or not an offender is identified.
 

Real Time Reporting

Under the current AML/CFT reporting frameworks operating in the world none of the reports submitted by reporting entities are received by an FIU in real time.  Consequently the information received by intelligence and law enforcement agencies is dated.  At best the transactions or events reported occurred at least 24 hours previously but in most cases several days previously, particularly where the responsible officer is assessing the information.  When it comes to preventing terrorist acts this time delay could have fatal consequences.

Credit card transactions are monitored by financial institutions in real time.  Often those organisations review transactions independently but when patterns of fraud develop the major financial institutions consult with each other and exchange intelligence on the activity leading to the identification of suspects and prevention of loss and on occasions to the apprehension of offenders.  If suspected terrorists or foreign fighters are using credit cards anywhere in the world they or the person using the card can be tracked live.

The same technology could be applied to the use of debit cards and to the identification of any device (computer, laptop, smart phone) used to access bank services and any IP address associated with it.  This live examination of financial data, IP addresses and hardware is very useful in combating fraud and in terrorist financing cases would be an extremely valuable tool.

Application of the technology by intelligence and law enforcement agencies would enable suspects to be tracked live with connections being made between people, places and transactions in real time.  This information is probably more effective than current intelligence that is sent to an FIU via the existing AML/CFT reporting frameworks which is often several days late.

“This live examination of financial data, IP addresses and hardware is very useful in combating fraud and in terrorist financing cases would be an extremely valuable tool”.

 

Reporting Credit Card Fraud

It appears that the involvement of terrorists in credit card fraud only becomes apparent after they have achieved their intended purpose which often results in their death and the death of innocent people.  That is clearly not an acceptable outcome.  And as referred to earlier unless a nexus between the terrorist or terrorist group and the credit card fraud is made, no STR/SMR alerting the authorities to the issue will be filed by the relevant reporting entity. Given the covert nature of terrorist financing and the difficulty of establishing the connection between credit card fraud and terrorist activity, in particular acts of preparation relating to a future terrorist attack, it might be prudent to report all fraudulent credit card activity to an FIU.

The issue for consideration is determining the best way to communicate information to the intelligence and law enforcement community about credit card fraud to determine if it might relate to terrorist financing?  There are possibly two solutions to the problem.

The first approach would involve financial institutions sending to an FIU reports of all credit card fraud activity involving both identified suspects and no known offenders.    There are however, two significant issues with this approach:

  1. The FIU would be OVERWHELMED with information and would not have the capacity or capability to analyse it.  The FIU would require assistance from Police and from people with experience in analysing credit card data to assess the material, and
     
  2. There is a risk that the information would be communicated using the current format and not be sent or processed in real time. 

The second approach involves the development of a specialised team to be situated in an FIU Headquarters.  The team would comprise specialists from the FIU, Police and each of the major banks.  The seconded police would be specialists in terrorism investigations with access to all relevant databases holding information on all known terrorist suspects or persons who are suspected of being associated with or recruited to be foreign fighters.  The bank officers would be specialists in credit card and bank fraud and have access to the databases of participating banks which detect and monitor credit card transactions and fraud.  This approach has a number of advantages:

  1. Credit card transactions including credit card fraud would be communicated in real time to the team.
     
  2.  Suspects identified by the bank would be passed to the police and cross matched against police and intelligence records to determine if they had come to notice as being suspected terrorists or foreign fighters.  All information received would be stored in police databases for future reference.
     
  3. Where no offender is identified the credit card fraud activity would be matched against other activity known to have occurred involving suspected terrorists or foreign fighters.  For example: mobile phone metadata of known suspects would be compared to credit card fraud transactions to identify potential connections between them (e.g. common locations and time of events).
     
  4. The FIU and police would provide the details of terror suspects and foreign fighters to the banks who would identify the credit card account details of those persons and continue to monitor their activity in real time.  The transactions and data would be fed back to the FIU and police for analysis with other data.  FIU and police would obtain the account data from the banks without the need to obtain a warrant or production order.  
     
  5. The team would operate on a mutual benefit basis.  Any information obtained by the FIU and police that identifies any person or group involved in credit card fraud that does not relate to terrorism would be communicated back to the banks to enable them to take appropriate action either alone or in conjunction with other police agencies.

Financial institution staff working with the FIU would be subject to the same security vetting processes undertaken by police and intelligence employees occupying similar positions of responsibility.  With this approach the skills of bank employees in analysing credit card fraud and the information derived from their activities are combined with the expertise and information held by the FIU and law enforcement representatives.  And the information being analysed is viewed in real time.

 

 

 

 

[1] Now known as the Organization of al-Qa’ida in the Land of the Islamic Maghreb.

Risk Management: Illicit Drug Use by Employees

She sat across from the interview table and it could be seen from her poor physical health that this young woman had committed the fraud upon the bank due to a drug habit.  The long sleeve top she was wearing hid the injection scars and her withered veins destroyed by the drug she was using.  It was not difficult to identify the new point of entry for her habit.  One of her eyes was blood shot and looked off centre.  With no more veins to pick in her arms, legs and feet she needed an entry point that would enable a successful and quick hit.     

Her personnel file recorded she was in her early twenties but she carried the wear and tear of someone twice her age.  According to her manager she was a great worker. She paid attention to detail, was extremely focused and never needed to take a break including lunch often relieving for other staff to enable them to eat during peak periods.  It was the amphetamine she was injecting that gave her the stamina to work harder, longer and with greater concentration than her colleagues.  Over a period of months as she relieved staff in key areas of the bank and learned the various processes, she was able to put in place her scheme that defeated all internal controls and resulted in the fraud.  But no one would believe she did it because she was such a nice person and so productive. Her co-workers were surprised to learn she was a drug addict.

That incident occurred over 30 years ago and while it is a good example of the threat posed by drug addicted employees it highlights two issues.  The difficulty in detecting an employee with a substance abuse problem without direct management intervention and how a drug addiction will drive a person to find ways to circumvent internal controls including the manipulation of the people around them. 

The loss in that case was money.  That incident occurred in an era when information was held by an organisation in manual form and in a non computerised records system, access to a large amount of sensitive data by any one individual was rare.  But today, business is different.  The evolution of the digital age has brought significant productively benefits and outreach for all organisations.  For local and global companies the world is now their market.  But it has also created different risks. Information and funds are more centrally controlled and have to be protected by new systems.  And while the barriers preventing unauthorised access to funds and information are significant, the weakest link is still the human factor.

Adding to changes in the business environment bought on by digitalisation have been changes to illegal business operations.  Organised crime has evolved too.  New and more sinister drugs are being marketed today in addition to the traditional hard drugs of heroin and amphetamine.  With the latest drug scourge being methamphetamine or “ice” which is a global problem.  And the threat from drugs while being discussed at national and international levels of government does not appear to have reached the boardrooms of many medium to large companies.  Few directors understand the threat posed to their business by organised crime.  And fewer still are asking themselves who is consuming the billions of dollars in drugs sold globally each year and do any of them work for their company?  Company directors are holding the mistaken view that drug consumption occurs somewhere else and is undertaken by other people but not by their employees.

Drug addicted employees are a major threat to any organisation but particularly to those that hold financial assets and information.  Information is shaping as being the biggest asset that many organisations possess today.  It comes in many forms, from national security data for those involved in defence contracts to valuable information about customers and customer behaviour which organisations are using to gain a competitive edge.  All information has a sale price. It is valuable not just for the organisation holding it but also for competitors, organised crime and national and foreign governments.

Putting aside the threat posed by drug addicts who need funds to feed their habit, they can and are subject to manipulation by any of those external interest groups, but particularly by criminal groups.  Employees who use narcotics easily come to the attention of crime gangs.   Organised crime lieutenants prey on unsuspecting victims who buy and or use narcotics in popular distribution centres such as night clubs.  Once targeted, employees are threatened or blackmailed into covertly working for criminals. Organised crime has a global reach and any large national and international company is a prime strategic target for criminal groups.  Infiltration of these companies can be achieved by corrupting current employees or recruiting corrupted graduates to work in targeted organisations.  But penetration is made easier if the employee has an illicit drug problem.

So what should an organisation do to protect itself?  One measure that it could introduce is mandatory random illicit drug testing of all potential new employees, current employees and all contractors who have access to a company’s premises, assets or information.  While a number of companies have adopted compulsory drug testing it has usually being introduced from a health and safety perspective, not from a security perspective.  Compulsory drug testing is common in the mining industry but not in other industries.  No one would want a drug addicted surgeon operating on them.  Or an addict addicted to amphetamine or methamphetamine managing a large investment portfolio, foreign currency trading transaction or a large commercial project. But Anecdotal evidence suggests that illicit drug use amongst high income or highly stressful occupations is common.

It is acknowledged that enhancement of any internal control measure comes at a cost.  And if it is not cost effective to drug test all employees and contractors then all workers who occupy high risk positions as deemed by a risk management plan, should be routinely randomly tested for the presence of illicit substances.

If illicit drug testing is implemented all board members should submit to a regular test and ensure that their participation receives wide publicity throughout the organisation.  It demonstrates commitment to the program and to the core values of the company.  And every time an employee undertakes a random drug test, the procedure reinforces in them, company values.

Drug testing together with an effective whistleblower program; employee declarations of past drug use and past and current affiliations with criminals and crime groups is recognition by senior managers that it understands all the risks facing the business and is taking action to mitigate them. 

While some company directors may be more concerned about privacy, a greater area of concern is the risk that illicit drug dependant employees pose to other employees, to customers and to the organisation.  Those needs far outweigh individual privacy issues.

Sophisticated investors, shareholders and customers are becoming more concerned about the safety of their investments and the information an organisation holds about them.  They would be unforgiving of any company director or manager who failed to properly assess all of the risks and take appropriate action to mitigate them.

Money Laundering and Foreign Property Ownership in Australia

On 2 May this year, the Australian Federal Treasurer the Honourable Joe Hockey MP announced a foreign investor moratorium for any person who illegally purchased Australian property without first obtaining prior approval from the Foreign Investment Review Board (FIRB).  Under the moratorium foreign investors will have until 30 November 2015 to “self report” by disclosing to the Australian Government their illegal real estate purchases or face potential prosecution.

Additional measures announced by the Treasurer include increasing penalties from the current 2 years to 3 years imprisonment or a fine of up to $127,500.  Those foreigners who self disclose will be forced to sell their properties but according to the Treasurer they will not be subject to criminal prosecution. The Australian Taxation Office will be tasked with administering the new regime when it is implemented.

The Treasurer also announced that third parties who knowingly assist a foreign investor to breach the rules will also be subject to civil and criminal penalties under the new arrangements.  Despite the assurance from the Treasurer, a foreign investor who self-reports under this scheme may expose themselves and involved third parties to criminal prosecution or other legal action. While not mentioned by the Treasurer third parties could include real estate agents, settlement agents, solicitors and bankers who have either in some way been involved in the movement of money relating to the sale or purchase of property or in the purchase or settlement of Australian property purchased illegally by a foreign person.  Australian citizens and permanent residents who are friends or family members of foreign investors who are often involved in the purchase of Australian property could also be captured by the changes. 

While legislation relating to the new measures is yet to be drafted, of concern is that the Treasurer made no reference to how the current foreign investment framework and the new policy will work in conjunction with other federal laws in particular the money laundering provisions in the Criminal Code Act 1995 and the forfeiture provisions of the Proceeds of Crime Act 2002.  

Australian federal money laundering laws are perhaps the most powerful criminal money laundering provisions in the world. The laws apply to all Commonwealth indictable offences, which is an offence that carries a penalty of imprisonment greater than 12 months.  Offences relating to the illegal purchase of real property (referred to as Australian Urban Land) in Australia by a foreign person carry penalties not exceeding 2 years imprisonment.  Federal money laundering law therefore applies to indictable offences in the Foreign Acquisitions and Takeovers Act 1975.

The money laundering laws apply to property (real and personal) as well as money. And the laws capture the proceeds of crime, which could include the sale of any property purchased illegally and to instruments of crime which include funds used to the purchase property illegally. If a foreign investor therefore has purchased property in contravention of the current foreign investment rules or under the new regime or sells property purchased illegally then there is a high chance they will also commit a money laundering offence.

“Australian federal money laundering laws capture instruments of crime (money used to purchase property illegally) and to proceeds of crime (which includes funds derived from the sale of property purchased illegally)”

Breaches of federal money laundering law carry penalties up to 25 years imprisonment and/or a fine of up to $255,000 if any property involved (either purchased or sold) is more than $1 million in value.  A summary of the penalty provisions relevant to federal money laundering law is attached. Many purchases by foreigners of Australian property would probably fall into the high value category and therefore attract the harshest penalty. This could have significant implications for any foreign investor.  They and any involved third party could potentially be charged with money laundering if they follow the Treasurer’s advice and disclose and sell their property.  And the Treasurer despite his announcement, he and FIRB cannot grant immunity from prosecution.  Only the Commonwealth Director of Public Prosecutions (CDPP), an Australian prosecution body, has the authority to do that.

Third parties such as real estate agents, family members and others who assist foreign investors may be charged with money laundering offences even if their conduct was reckless or only negligent. Full knowledge of the circumstances is not required. The Australian Federal Police investigate most money laundering matters in Australia and they are prosecuted by the CDPP.

Australia was one of the first countries to implement criminal money laundering laws.  They were initially implemented to combat the laundering of the proceeds of drug traffickers.  Australian federal money laundering laws were later extended to apply to all indictable offences.  Primarily the money laundering laws were expected to target organisers of human trafficking, people smuggling, illegal gun running and tax evasion.  But the extension to all indictable offences means that foreign nationals and third parties could be captured by and prosecuted on a similar scale to drug dealers who launder their illegal money.

Australian federal money laundering legislation has extended jurisdiction.  The law applies to Australian citizens and Australian companies operating offshore from Australia.  And to any other entity or person where the money or property is intended to become an instrument of crime or there is a risk the property could become an instrument of crime or the money is the proceeds of crime.  Consequently a third party operating offshore could be bound by Australian money laundering law if they are involved in the transmission of funds to Australia that will be used or there is a risk it could be used to illegally purchase property.

Similarly, if the offshore third party for example a bank, a lawyer or a corporate service provider receives funds from Australia that were derived from the sale of property purchased illegally then they could potentially face prosecution for money laundering.  Third parties (i.e. bank or lawyer) based in Australia who facilitate the movement of funds derived from the sale of an illegally purchased property to other offshore third parties could face a criminal charge of money laundering.

“a third party operating offshore could be bound by Australian money laundering law if they are involved in the transmission of funds to Australia that will be used or there is a risk it could be used to illegally purchase property”

But more confronting is that under the current foreign investment regime there is already a risk that the illegally purchased property or proceeds of the sale of any property could be seized as proceeds of crime. Seizure can occur whether or not someone is charged with or convicted of a criminal offence.  But the change in the penalty for breaching the foreign ownership rules to 3 years imprisonment increases the options available to seize the property or the proceeds of any sale under the Proceeds of Crime Act 2002.

Other than the indictable offences in the Foreign Acquisitions and Takeovers Act 1975 relating to the purchase of Australian property illegally, the AFP can allege a money laundering offence as a way of seizing property or the proceeds of the sale of illegally acquired property and applying for its confiscation.  They don’t need to lay a criminal charge to do this. “Reasonable suspicion” a very low legal standard is all that is needed to initiate court action.  This could also occur if the foreign investor has evaded Australian tax.  And as announced by the Treasurer, the Australian Taxation Office will use data matching with other agencies to identify violators.

“Reasonable suspicion a very low legal standard is all the AFP needs to establish to initiate civil forfeiture action in relation to property purchased illegally in Australia. The increase in the penalty to 3 years expands the options available to the AFP”

Foreign investors who have bought property illegally or have sold it could face the might of the AFP’s normal investigative powers (such as search warrants) as well as specific powers under the Proceeds of Crime Act. For instance, the federal police can also compulsorily question people in connection with the purchase and sale of the property. There is no right to silence.  It is very powerful legislation.

A foreign investor who follows the Treasurer’s advice and discloses their property may not only be forced to sell. They could find themselves facing serious criminal charges and loss of all their property. Third parties who are involved in property transactions with foreign nationals should also be cautious in their dealings. 

The policy changes in relation to foreign ownership of real property in Australia announced by the Treasurer have been put forward without due consideration to the wider issues that have been raised in this paper.  The serious criminal and financial implications makes it prudent for foreign investors and third parties to get specialist legal advice before making a self-report of any breach of Australia’s foreign investment rules. Advice should also be sought from a specialist in criminal money laundering legislation and Australian federal civil forfeiture investigations (as opposed to a specialist in Australian anti-money laundering legislation and framework).

The Australian Treasurer has no power to tell the AFP or the DPP what to do, they are independent agencies. It would be folly to place faith in assurances given by the Treasurer at least until the legislation implementing the new measures has been drafted.

Please note this publication expresses an opinion only.  It does not constitute legal or financial advice and does not take into account individual circumstances. It is highly recommended to seek specialist advice before taking any action in relation to the issues raised in this article.

 

__________________________________________________________________

 

Australian criminal money laundering laws and related offences contained in the Anti-Money Laundering & Counter-Terrorism Financing Act 2006 are complex.  Further complications arise when those offences are combined with any forfeiture action initiated under the Proceeds of Crime Act 2002.  Malkara Consulting is the only Australian consulting firm with extensive experience in the investigation of Australia’s criminal money laundering legislation and AML offences and in the application of the conviction and civil forfeiture provisions of the POC Act.  No other Australian consulting firm has the experience teaching money laundering and civil forfeiture in Australia and offshore.

Consequently Malkara Consulting is available for an initial consultation to examine individual cases and circumstances and discuss available options, including if necessary where to obtain legal advice.

Malkara Consulting is also available to deliver training sessions on Australian criminal money laundering provisions and the relevant forfeiture provisions contained in the Proceeds of Crime Act 2002.

 

Chris Douglas, APM

Malkara Consulting

Perth, Western Australia