2021 APG Yearly Typologies Report

Total Page:16

File Type:pdf, Size:1020Kb

2021 APG Yearly Typologies Report APG Yearly Typologies Report 2021 Methods and Trends of Money Laundering and Terrorism Financing Asia/Pacific Group on Money Laundering July 2021 Applications for permission to reproduce all or part of this publication should be made to: DISCLAIMER: APG Secretariat Locked Bag A3000 Under Article 1 of the APG Terms of Reference 2012, the APG is a Sydney South non-political, technical body, whose members are committed to the effective implementation and enforcement of the New South Wales 1232 internationally accepted standards against money laundering, AUSTRALIA financing of terrorism and proliferation financing set by the Financial Action Task Force. This document, any expression Tel: +61 2 5126 9100 herein, and/or any map included herein, are without prejudice to Email: [email protected] the status of, or sovereignty over, any territory, to the delimitation of international frontiers and boundaries and to the name of any Web: www.apgml.org territory, city or area. © July 2021/All rights reserved 2 CONTENTS CONTENTS .................................................................................................................................... 3 INTRODUCTION .......................................................................................................................... 5 1. PROLIFERATION FINANCING RISK .............................................................................. 6 1.1 Risk Assessments and Proliferation Financing ..................................................................................................... 6 1.2 Amendments to the Standards ........................................................................................................................... 7 1.3 UN Panel of Experts Reports ............................................................................................................................... 7 1.4 PF Risk Assessments in the Asia Pacific ............................................................................................................. 10 1.5 Guidance and training provided to FIs and DNFBPs .......................................................................................... 14 2. UPDATE ON COVID-19 IMPACT ON ML/TF TYPOLOGIES ..................................... 16 3. APG WORKSHOPS AND PROJECTS 2020 - 2021 ............................................................ 17 3.1 Typologies Projects ............................................................................................................................................ 17 3.2 22nd Typologies and Capacity Building Workshop ............................................................................................ 18 4. FATF, FSRBS AND OBSERVERS’ PROJECTS ................................................................ 19 4.1 FATF Typology Projects ...................................................................................................................................... 19 4.2 Middle East and North Africa Financial Action Task Force ................................................................................ 24 4.3 Eurasian Group on combating money laundering and financing of terrorism .................................................. 25 4.4 Committee of Experts on the Evaluation of Anti-Money Laundering Measures and the Financing of Terrorism ........................................................................................................................................................................... 26 4.5 Egmont Group ................................................................................................................................................... 27 4.6 Inter-Governmental Action Group against Money Laundering in West Africa ................................................. 29 5. MONEY LAUNDERING AND TERRORISM FINANCING METHODS ..................... 30 5.1 Use of offshore banks, international business companies, and offshore trusts, including trust company service providers............................................................................................................................................................ 30 5.2 Use of virtual assets (cryptocurrencies). ........................................................................................................... 32 5.3 Use of professional services (lawyers, notaries, accountants). ........................................................................ 36 5.4 Trade-based money laundering and transfer pricing. ...................................................................................... 37 5.5 Underground banking / alternative remittance services / hawala. .................................................................. 40 5.6 Use of the internet (encryption, access to IDs, international banking etc). ..................................................... 43 5.7 Use of new payment methods / systems. ........................................................................................................ 43 5.8 Laundering of proceeds from tax offences. ...................................................................................................... 45 5.9 Real estate, including roles of real estate agents. ............................................................................................ 47 5.10 Trade in gems and precious metals. ................................................................................................................. 49 5.11 Association with human trafficking and people smuggling. ............................................................................. 50 5.12 Use of nominees, trusts, family members or third parties etc. ........................................................................ 50 5.13 Gambling activities (horse racing, internet gambling, etc). .............................................................................. 52 5.14 Purchase of valuable assets (art works, antiquities, race horses, vehicles, etc)............................................... 54 5.15 Investment in capital markets, use of brokers. ................................................................................................ 54 5.16 Mingling (business investment). ....................................................................................................................... 56 5.17 Use of shell companies/corporations. .............................................................................................................. 56 5.18 Association with environmental crimes (illegal logging, extraction, wildlife trafficking, etc.). ........................ 59 5.19 Currency exchanges / cash conversion. ............................................................................................................ 61 5.20 Use of credit facilities, credit cards, cheques, promissory notes etc. ............................................................... 62 5.21 Wire transfers / Use of foreign bank accounts. ................................................................................................ 64 5.22 Use of false identification. ................................................................................................................................ 65 5.23 Association with corruption/bribery ................................................................................................................ 67 5.24 Abuse of non-profit organisations (NPOs). ....................................................................................................... 72 6. PROLIFERATION FINANCING METHODS & TRENDS ............................................ 73 6.1 Case studies of breaches, non-implementation or evasion of targeted financial sanctions related to proliferation financing. ...................................................................................................................................... 73 7. MONEY LAUNDERING & TERRORISM FINANCING TRENDS .............................. 76 7.1 Recent research or studies on ML/TF methods and trends. ............................................................................. 76 7.2 Association of types of ML or TF with particular predicate activities (eg terrorist organisations, terrorist training, corruption, drugs, fraud, smuggling, etc). ........................................................................................... 82 3 7.3 Emerging trends; declining trends; continuing trends. ..................................................................................... 92 8. EFFECTS OF AML/CFT COUNTER-MEASURES ........................................................ 96 8.1 The impact of legislative or regulatory developments on detecting and/or preventing particular methods (eg tracing proceeds of crime, asset forfeiture etc). ............................................................................................... 96 8.2 Cases developed directly from suspicious or cash/threshold transaction reports. ......................................... 102 9. COVID-19 RELATED ML & TF TRENDS ..................................................................... 106 9.1 Association of types of ML or TF with particular predicate activities linked to COVID-19 (e.g. welfare fraud, scams, counterfeit medicines, corruption, drugs, smuggling, etc). ................................................................. 106 9.2 Displacement of ML or TF methodologies to established typologies (e.g. increase in reporting of the internet for ML/TF as use of cash decreases,
Recommended publications
  • Office of the Attorney -General
    OFFICE- OF THE,, ATTORNEY- - ---- -GENERAL I -- ' . Department of Law , . - I - Fi~cal ,Year 1993 Annual Report Grant Woods - -A!torney Genera_} Grant Woods Attorney General Robert B. Carey J.M. Howard First Assistant Attorney General Special Counsel Civil Division · Criminal Division H. Leslie Hall Michael C. Cudahy Chief Counsel Chief Counsel Human Services Division Management Services Cecil B. Patterson Thomas G. Augherton Chief Counsel Chief of Administration TRANSMITTAL LETTER STATE OF ARIZONA OFFICE OF THE ATTORNEY GENERAL GRANT WOODS MAIN PHONE: 542-5025 ATTORNEY GENERAL 1275 WEST WASHINGTON, PHOENIX 85007-2926 TELECOPIER : 542-4085 November 5, 1993 The Honorable J. Fife Symington Governor of Arizona State Capitol, Executive Tower 1700 W. Washington Phoenix, Arizona 85007 Dear Governor Symington: I am pleased to submit to you the annual report of the Office of the Attorney General, as required by ARS § 41-194(B). During the past fiscal . year, this administration continued its focus of protecting Arizona's citizens through aggressive enforcement of state laws and providing quality legal representation to state agencies. We have vigorously defended Arizona's environment by prosecuting those that destroy our natural resources, pursued dozens of companies and individuals who prey on unsuspecting consumers, and convicted many notorious criminals for the heinous crimes they perpetrated. We concentrated our administrative efforts into implementing cost-saving measures that allow us to prioritize our resources into retaining and compensating top-quality \egal staff. Loss of well-trained, experienced attorneys from the Attorney General's Office to higher paying private and public sector positions continues to be a problem that requires close scrutiny by the Legislature.
    [Show full text]
  • Pizzagate / Pedogate, a No-Nonsense Fact-Filled Reader
    Pizzagate / Pedogate A No-nonsense Fact-filled reader Preface I therefore determine that serious human rights abuse and corruption around the world constitute an unusual and extraordinary threat to the national security, foreign policy, and economy of the United States, and I hereby declare a national emergency to deal with that threat. —Trump Executive Order 13818, Dec. 20, 2017 Pizzagate means many things to many people, the angle of the lens may be different, but the focus zeros in on a common body of incontestable facts. The fruit of top researchers collected in this reader allows you to compare, correlate and derive a flexible synthesis to suit your needs. An era of wild contradiction is upon us in the press. The psychopathic rumblings that pass for political discourse bring the artform of infotainment to a golden blossoming. A bookstore display table featuring The Fixers; The Bottom-Feeders, Crooked Lawyers, Gossipmongers, and Porn Stars Who Created the 45th President versus Witch Hunt; The Story of the Greatest Mass Delusion in American Political History are both talking about the same man, someone who paid for his campaign out of his own pocket. There were no big donors from China and the traditional bank of puppeteers. This created a HUGE problem, one whose solution threatened the money holders and influence peddlers. New leadership and a presidential order that threw down the gauntlet, a state of emergency, seeded the storm clouds. The starting gun was fired, all systems were go, the race had begun. FISAs and covert operations sprang into action. The envelopes are being delivered, the career decisions are being made, should I move on or stay the course.
    [Show full text]
  • Office of the Attorney General
    OFFICE OF THE ATTORNEY GENERAL Department of La,w Fiscal Year 1992 Annual Report Grant Woods Attorney General Grant Woods Attorney General Robert B. Carey First Assistant Attorney General Civil Division Crimin al Divi sion J M. Howard Michael C. Cudahy Chi ef Counsel Chief Counsel Human Services Division Management Services Cecil B. Patterson, Jr. Thomas G. Augherton Chief Counsel Chief of Administration Transmittal Letter OFFICE OF THE ATTORNEY GENERAL GRANT WOOD S MAIN PHONE : 542-5025 ATTORNEY GENERAL 1275 WEST WASHINGTON, PHOENIX 85007 TELECOPIER : 542-4085 October 15, 1992 The Honorable J. Fife Symington Governor of Arizona State Capitol, Executive Tower 1700 W. Washington Phoenix, Arizona 85007 Dear Governor Symington: I am pleased to submit to you the annual report of the Office of the Arizona Attorney General, as required by ARS § 41-194.B. These are difficult financial times for Arizona Government, and I appreciate the support offered by your office and members of the Arizona Legislature to ensure thoughtful funding decisions regarding the Law Department's budget. · I can assure you the men and women of the Attorney General's Office, attorneys and support staff alike, are committed to serving the continuing needs of our state client agencies as well as the needs of all Arizonans. During the past fiscal year, this administration continued to focus on increased civil rights protection for the citizens of our state and continued aggressive education and protection of consumers. The Arizona Legislature's passage of the equivalent legislation to the federal Americans With Disabilities Act, following the previous session's passage of the federally equivalent Fair Housing Act, has proven Arizona to be a leader in enacting in1portant civil rights protections for its citizens.
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • An Investigation of Fraud in Nonprofit Organizations: Occurrences and Deterrents
    An Investigation of Fraud in Nonprofit Organizations: Occurrences and Deterrents by Janet Greenlee, Mary Fischer Teresa Gordon,* and Elizabeth Keating The Hauser Center for Nonprofit Organizations Harvard University December 2006 Working Paper No. 35 * Corresponding author – Teresa Gordon, Professor of Accounting, University of Idaho, College of Business & Economics, P O Box 443161, Moscow, ID 83844-3161, Tel: (208) 885-8960, Fax: (208) 885-6296, E-mail: [email protected] Acknowledgements: We would like to thank the Association of Certified Fraud Examiners for permitting the use of their proprietary data in this paper. Brief Biographies for Authors (As of June 28, 2006 and subject to revision/up-dating: one author is out of country) Janet Greenlee, CPA, is Associate Professor of Accounting at the University of Dayton in Ohio. She received her PhD in Accounting from the University of Kentucky, her MBA from UCLA and her MSW from West Virginia University. Mary Fischer, CGFM, is professor of accounting at the University of Texas at Tyler. She received her PhD from the University of Connecticut. She is past-president of the Government and Nonprofit Section of the American Accounting Association. Teresa P. Gordon, CPA, is professor of accounting at the University of Idaho. She received her PhD from University of Houston. She is currently a member of the Accounting Principles Council of the National Association of College and University Business Officers. Elizabeth K. Keating, CPA, is the Eli Goldston Lecturer on Law at Harvard Law School and a Senior Research Fellow Assistant at the Hauser Center for Nonprofit Organizations. She received her PhD in management from the Sloan School of Management at MIT and her MBA from the Stern School of Business at New York University.
    [Show full text]
  • Tackling Fraud in the Charity Sector a Summary of Conference Proceedings
    Tackling fraud in the charity sector A summary of conference proceedings Making your money count SUPPORTED BY This guide is for trustees and senior managers of charities in England and Wales as well as their professional advisors. It highlights the main learning points from the first national conference on charity fraud held in late 2015, and provides signposts to extra sources of information, support and best practice. It concludes with a summary of top tips for preventing, detecting and responding to fraud. ABOUT THE ORGANISERS Charity Commission The Charity Commission registers and regulates charities in England and Wales. It ensures that charities meet their legal requirements and provides guidance to help them run themselves as effectively as possible while preventing abuse (including fraud). gov.uk/government/organisations/charity-commission Fraud Advisory Panel The Fraud Advisory Panel is an independent voice of the anti- fraud community. It champions anti-fraud best practice and works to improve fraud awareness, understanding and resilience. fraudadvisorypanel.org Published February 2016 © Fraud Advisory Panel 2016 All rights reserved. If you want to reproduce or redistribute any of the material in this publication you should first get the Fraud Advisory Panel’s permission in writing. Laws and regulations referred to in this Fraud Advisory Panel publication are stated as at 1 February 2016. Every effort has been made to make sure the information it contains is accurate at the time of creation. The Fraud Advisory Panel cannot guarantee the completeness or accuracy of the information in this publication and shall not be responsible for errors or inaccuracies.
    [Show full text]
  • Editor in Chief: Nikos Passas
    VOL 67 Issue 1, 2017 ISSN 0925-4994 Editor in Chief: Nikos Passas Table of Contents Assessing the trends, scale and nature of economic cybercrimes: overview and Issues................................................................... 3 A typology of cybercriminal networks: from low-tech all-rounders to high-tech specialists................................................................ 21 Origin, growth and criminal capabilities of cyber criminal networks. An international empirical analysis................................................. 39 Do police crackdowns disrupt drug cryptomarkets? A longitudinal analysis of the effects of Operation Onymous........................................................................................................... 55 Cyberfraud and the implications for effective risk-based responses: themes from UK research................................................................ 77 Crime Law Soc Change (2017) 67:3–20 DOI 10.1007/s10611-016-9645-3 Assessing the trends, scale and nature of economic cybercrimes: overview and Issues In Cybercrimes, Cybercriminals and Their Policing, in Crime, Law and Social Change Michael Levi1 Published online: 11 October 2016 # Springer Science+Business Media Dordrecht 2016 Abstract Trends in police-recorded and (where they exist) household survey- measured cybercrimes for economic gain are reviewed in a range of developed countries – Australia, Canada, Germany, Hong Kong, the Netherlands, Sweden, the UK and the US - and their implications for criminal policy are considered.
    [Show full text]
  • Fraud and Financial Crime
    COMPLIANCE TOOLKIT: PROTECTING CHARITIES FROM HARM Chapter 3: Fraud and financial crime APRIL 2011 (REVISED OCTOBER 2017) Contents A Introduction 2 B Fraud and financial crime in the charitable sector 6 C What financial crimes do trustees need to be aware of? 13 D What are the various types of fraud, and how can trustees prevent them happening? 17 E What are the Warning Signs for Fraud? 31 F What practical steps can trustees take to deal with fraud? 33 G Practical advice on dealing with money laundering 38 H Fraud action and response plan 40 J Reporting fraud and money laundering 45 K What else do trustees need to do if the charity has lost money as a result of a crime? 53 L Other connected legislation 54 M Bribery and corruption 55 Chapter 3: Fraud and financial crime 1 A Introduction A1 What is the purpose of this Chapter? This guidance aims to highlight some of the types of fraud and financial crime to which charities are vulnerable and provide practical advice for trustees on how to tackle it. If trustees have an awareness of fraud and financial crime risks they will be better equipped to recognise them. This guidance will also help trustees to devise and implement measures to manage the risks. The guidance is aimed at the trustees and managers of all charities, though it will also be of interest to employees and volunteers. We recognise that smaller charities will not usually have access to the sort of resources and capabilities for managing risks that large organisations enjoy.
    [Show full text]
  • Guide to Preventing Mail Fraud
    U.S. Postal Inspection Service Guide to Preventing Mail Fraud Contents 2 What Is Mail Fraud? 3 Sweepstakes and ‘Free’ Prizes 4 ‘Free’ Vacations 5 Government Look-Alike Mail 6 Solicitations Disguised as Invoices 7 Foreign Lotteries 8 Chain Letters 9 Charity Fraud 10 Insurance Fraud 11 Medical Fraud 12 Internet Fraud 13 Phony Inheritance Schemes 14 Home Improvement and Home Repair Fraud 15 Investment Fraud 16 Fees Charged for Normally Free Services 17 Advance-Fee Loans 18 Credit Repair and Credit Card Schemes 19 Work-at-Home Offers 20 Distributorship and Franchise Fraud 21 Phony Job Opportunities 22 Unsolicited Merchandise 23 Reshipping Fraud 24 Fake Check Scams 25 How to Contact the Postal Inspection Service Guide To Preventing Mail Fraud 1 What Is Mail Fraud? It’s a scheme to get money or something of value from you by offering a product, service, or investment opportunity that does not live up to its claims. Prosecutors must prove the claims were intentionally misrepresented and that the mail was used to carry out the scheme. Although most mail-order companies are honest and stand behind their products and services, unfortunately there are a few rotten apples who give direct mail advertisers a bad name. They cheat people by peddling worthless products, medical quackery, and get-rich-quick schemes. Some fly-by-nights take your money and send you nothing. Unscrupulous businesses don’t mind taking advantage of an unwary customer. “Let the buyer beware” is their motto — and you might be the buyer. Mail fraudsters frequently rely on the same old tricks.
    [Show full text]
  • Senior Fraud
    Preventing Senior Fraud Nebraska Senior Anti-Fraud Education Program NEBRASKA DEPARTMENT OF JUSTICE ATTORNEY GENERAL DOUGLAS J. PETERSON Table of Contents 1 Letter from Attorney General Peterson 2 Foreign Lottery & Sweepstakes Scams 4 Telemarketing Scams 6 Charity Fraud 9 Identity Theft 12 Investment Fraud 15 Bogus Business and Job Opportunities 18 Internet Scams 21 Home Repair Scams 23 Reduce Junk Mail and Unwanted Telemarketing Calls 26 Top Consumer Tips 28 Important Phone Numbers 29 Important Websites and Email Addresses Our Mission Nebraska Senior Anti-Fraud Education (SAFE) Program To prevent the victimization of Nebraska’s seniors by arming them with tools to guard against consumer fraud. A letter from Attorney General Douglas J. Peterson Dear Fellow Nebraskans, Unfortunately, there are scam artists across the country and around the world attempting to defraud Nebraskans every day. This is especially true within our state’s senior population. Nationally, one out of every four fraud complaints is submitted by a senior (age 60+). But seniors are the least likely to report exploitation and abuse. Estimates suggest less than 15% of elder abuse cases ever come to the attention of authorities. Our seniors are under attack and suffering because of it. DOUGLAS J. PETERSON These attacks take their toll. According to a long-term ATTORNEY GENERAL, STATE OF NEBRASKA study reported in the Journal of the American Medical Association, “elder finan- cial abuse is associated with shorter survival in older adults.” Elder fraud and abuse is more than a frustration and nuisance, it is a real threat and one that is impacting not only quality of life but length of life as well.
    [Show full text]
  • Cyberfraud and the Implications for Effective Risk-Based Responses: Themes from UK Research
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by University of Liverpool Repository Cyberfraud and the Implications for Effective Risk-Based Responses: Themes from UK Research Michael Levi, Professor of Criminology, School of Social Sciences, Cardiff University, Wales, UK. CF10 3WT1 Alan Doig, Visiting Professor, Northumbria University. Rajeev Gundur, Lecturer in in Sociology, Social Policy and Criminology, University of Liverpool in Singapore David Wall, Professor of Criminology, Centre for Criminal Justice Studies, Leeds University Matthew Williams, Professor of Criminology, School of Social Sciences, Cardiff University. We are grateful to the City of London Corporation for funding this research and to the City of London Police and Steve Strickland for their substantial assistance with the project. Crime, Law and Social Change, DOI: 10.1007/s10611-016-9648-0. Abstract The nature of the risk or threat posed by ‘cyberfraud’ - fraud with a cyber dimension – is examined empirically based on data reported by the public and business to Action Fraud. These are used to examine the implications for a more effective risk-based response, both by category of fraud and also responding to cyberfraud generally, not just in the UK. A key characteristics of cyberfraud is that it can be globalised, unless there are major national differences in attractiveness of targets or in the organisation of control. This does not mean that all cyberfraud is international, however: not only do some involve face to face interactions at some stage of the crime cycle, but in online auction selling frauds, it appears to be common for the perpetrators and victims to reside in the same country.
    [Show full text]
  • Protecting Older Consumers Report 2018-2019
    PROTECTING OLDER CONSUMERS --2018-2019 -- A Report of the Federal Trade Commission Federal Trade Commission I Report to Congress October 18, 2 019 PROTECTING OLDER CONSUMERS 2018-2019 A Report of the Federal Trade Commission to Congress October 18, 2019 FEDERAL TRADE COMMISSION Joseph J. Simons, Chairman Noah Joshua Phillips, Commissioner Rohit Chopra, Commissioner Rebecca Kelly Slaughter, Commissioner Christine S. Wilson, Commissioner Contents I. Introduction ........................................................................................................................1 II. Developing Effective Strategies to Protect Older Consumers .......................................2 A. Research and Data Analysis .................................................................................................2 1. Consumer Sentinel Reports from Older Adults ....................................................................2 2. Alerting the Public About Shifting Trends and Tactics ........................................................9 3. Hearing Directly from Older Consumers About FTC Imposters .........................................10 B. Coordinated Efforts to Protect Older Consumers ................................................................11 III. FTC Enforcement Activities Affecting Older Consumers ............................................. 12 A. Fake Medical Insurance Plans .............................................................................................13 B. Tech Support .........................................................................................................................13
    [Show full text]