Professional Documents
Culture Documents
MARK PIETH
University of Basel, Switzerland
Partly reprinted from European Journal of Law Reform Vol. 4, No. 2, 2002
No part of this eBook may be reproduced or transmitted in any form or by any means, electronic,
mechanical, recording, or otherwise, without written consent from the Publisher
Articles
Globalization, Terrorist Finance, and Global Conflict – Time for a
White List?
Jonathan M. Winer 5
How Can Sound Customer Due Diligence Rules Help Prevent the
Misuse of Financial Institutions in the Financing of Terrorism?
Charles Freeland 41
Terrorist Finance, Money Laundering and the Rise and Rise of Mutual
Evaluation: A New Paradigm for Crime Control?
Michael Levi and William Gilmore 87
Documentation
FATF Cracks Down on Terrorist Financing 129
1. The first shock of 11 September, the disbelief and the emotional turmoil, led
many politicians and experts to conceptualize the events of that day as
something totally new, different from anything experienced thus far. Accord-
ingly, reactions had to be phrased in superlatives. The use of the imagery of an
all-out ‘War against Terrorism’ did not immediately generate the sceptical
reactions that the much abused formula of ‘War on Drugs’ is currently
provoking – especially amongst Europeans. And at least for a month or so after
the event, one even accepted a drastic step-up in security measures. Many
legislators hastily enacted new laws, some of which have primarily symbolic
value; others, however, will seriously restrict civil rights, especially those of
foreigners. Gradually over time, once things had settled down and ‘normality’
had been restored, it became evident that politics and political interest groups
took over the discourse on terrorism as they tend to do on all issues. It appeared
logical at first to fight terrorism with all available means including controlling
and blocking access to the financial markets and institutions. Eventually, it
became evident that fighting terrorism was to be set apart in a different category
from other topics of equal gravity. This became particularly apparent when the
US and some US-inspired international fora requested international support to
combat terrorism whilst, at the same time, the former attempted to block serious
efforts to create a standing International Criminal Court for war crimes and
crimes against humanity. Of course, all the issues at stake are much more
complex, yet the public discussion in the media does beg the question why one
should be tough on terrorism and rather less than consistent on genocide.
Returning to our topic concerning the financing of terrorism, the cracks in the
coalition against terrorism have become more and more visible over the last few
months. First, the states leading the fight against terrorism refused to give an
abstract definition of terrorism, instead they preferred to blacklist individuals
and organizations in an ad hoc fashion and solely on the basis of information
supplied by intelligence agencies, thereby by-passing any democratic discussion.
National financial supervisors mirrored this abstention by refusing to give
financial institutions appropriate guidance on what they regarded as terrorism:
1
2 Mark Pieth
the banks have been required to carry the risks and distinguish between freedom
fighters and terrorists. To illustrate this with a complicated example, how – for
instance – should the banks deal with a charity fund for family members of
jailed IRA members? Is such a fund now to be considered support for a terrorist
cause or a legitimate charity? Refusing to give clear guidance and then to
criticize financial institutions for not having taken precautions seems unfair. The
Financial Action Task Force against Money Laundering (FATF), the UN, the
EU and other organizations have recently enacted binding instruments and
recommendations to combat the financing of terrorism; however, professional
bankers in particular are doubtful whether the ‘red flag’-lists are of any real
practical assistance.
Even if it is clear that money laundering and the financing of terrorism should
not be confused, one post-September 11 outcome has been the political
compulsion finally to enact legislation against financial crime and money
laundering even in countries and territories that have so far fallen short of
international standards. And here I am not only talking about the so-called ‘non
co-operative countries and territories’ defined by the FATF, but also the rather
reluctant countries within the FATF, like the US, who are now using the so-
called ‘Patriot Act’ to fill the gaps in their ‘KYC’-policy.
2. It is therefore no coincidence that this volume, in the context of the financing of
terrorism, addresses some of the traditional core issues established in 1990 to
combat money laundering with the emergence of the first set of rules by the
FATF. Just how far are the existing rules against money laundering helpful in
preventing the financing of terrorism?
Armand Kersten, Senior Compliance Officer of a bank that is active
worldwide, warns us that it would be unwise to mix the issues of the
financing of terrorism and money laundering. However, he does not doubt
the logic of identifying funds related to terrorism, and rightly points out the
difficulties of so doing when examining transactions.
Charles Freeland, Deputy Secretary General of the Basel Committee on
Banking Supervision and co-author of the new Customer Due Diligence
guidelines of the BCBS, rightly indicates that ‘CDD’ and ‘KYC’ procedures
are a key component in preventing the misuse of the financial sector by
terrorists. The package offered by the BCBS – a long outstanding supplement
to the AML standards – is an antidote to a broad array of risks confronting
the commercial banker.
Ernesto Savona, Professor at the University of Trento (Italy), founder and
director of Transcrime, focuses on another issue that for an astonishingly long
time was left on the back-burner: the use of ‘corporate vehicles’ (including IBC’s
and trusts) as a much-used means to evade identification of beneficial
ownership and a handy tool for money launderers to frustrate legal and
administrative co-operation in anti-money laundering investigations.
Michael Levi, Professor at the University of Cardiff (UK) and expert on
Editorial 3
Mark Pieth
This page intentionally left blank
Globalization, Terrorist Finance,
and Global Conflict:
Time for a White List?
Jonathan M. Winer*
When the terrorists trained by Osama bin Laden destroyed the two World Trade
Center towers, their actions revealed both the globalization of terrorist finance, and
the potentially Herculean task facing governments seeking to combat both it and
other serious trans-border problems involving flows of money from illicit sources or
for illicit purposes. Relying on a mere 500,000 USD in total expenditures, nineteen
terrorists were able to enter the United States repeatedly, train as commercial pilots,
engage in intercontinental air travel, rent cars, establish personal bank accounts,
obtain ATM cards, and generally live adequately funded lives in the months prior to
the attack. After 11 September, some of the funds involved were traced to an account
in Dubai, a country that houses not only its own banks, but major US and European
banks, banks from throughout the Islamic world, purely Islamic banks, alternative
or underground remittance systems (hawalas), gold dealers, and myriad financial
institutions handling transactions to such States as Iran and Iraq.
While little had been done to implement the standards at the time, Dubai was
actually one of the very few countries in the Middle East (the others being Cyprus
and Israel) to have even basic money laundering legislation in place. In theory, since
the previous year, financial institutions in Dubai had been prohibited from taking
anonymous funds for anonymous accounts, which previously had been lawful. By
contrast, if one wanted to place funds for a terrorist from Saudi Arabia, for example,
or from Bahrain, Yemen, Malaysia, Indonesia, the People’s Republic of China, the
* The author was US Deputy Assistant Secretary of State for International Law
Enforcement from 1994 through 1999. He currently practices international financial
services law at the firm of Alston & Bird LLP in Washington, DC and can be contacted at
jwiner@alston.com. An earlier version of this paper was undertaken in late 2001 and early
2002 with the support of the Norwegian FAFO Institute in Oslo, Norway.
5
6 Jonathan M. Winer
1
See, e.g., Statement of the G-7, 18 June 1999; ‘Strengthening the International Financial
Architecture’, Report of the G7 Finance Ministers, 18–20 June 1999; ‘Financial Havens,
Banking Secrecy and Money-Laundering’, UN ODCCP, New York, May 1998; and
numerous recent analytic documents of the Basel Committee available on the website of the
Bureau of International Settlements (BIS).
8 Jonathan M. Winer
tions to take at least their home regulators very seriously. In turn, these home
regulators are increasingly subject to a common set of standards, such as those
established by the Basel Group of Bank Supervisors (Basel Group). Over time, these
standards have come to promote global financial stability by promoting good
practices for banks in their lending and investment practices. However, the same
system has to date demonstrably failed to do much to protect the world from money
laundering or terrorist finance.
Can governments that stop at borders regulate financial activity that crosses borders
at the speed of light amid billions of electronic ones and noughts? Even if one does
not consider the special problems posed by terrorist finance and the inadequacy of
financial transparency regimes in the Middle East, there is mounting evidence to
justify questioning whether global banks, operating transnationally to move money
instantaneously across national borders, can be readily regulated or supervised by
any one country. While such financial institutions may have their headquarters
nominally based in a single country – typically one of the G–7 countries, the EU, or
Switzerland – they generate profits and carry out activities at a global level involving
dozens of UN Member States. As a result, they are for many purposes beyond the
capacity of any single state to police. The current ‘name and shame’ exercises have
had the salutary effect of forcing some of the world’s least-adequately regulated
jurisdictions to abandon traditional notions of bank secrecy, and to begin insisting
that their financial institutions carry out due diligence and know their customers.
But these exercises have not and cannot create any capacity at a national level to
assess the meaning and integrity of cross-border financial transactions. It is not
reasonable to expect a small jurisdiction that houses a subsidiary of a major
international financial institution to fully understand the cross-border transactions
engaged in by the subsidiary, let alone by its affiliates or far-away parent. In practice,
even the most sophisticated and best regulated financial centres, including those of
the G–7, European Union, and Switzerland, are similarly incapable of exercising
adequate oversight over the global enterprises they license.
In recent years, the proposed solution has been a mixture of public sector
regulation and private sector self-regulation. Self-regulation has been advocated
as a means by which private institutions subject to market forces will, as a matter
of good business, avoid transactions that are exposed on that institution or its
reputation to undue risk. However, it is not clear that this approach has been
effective. Indeed, the combination of both government regulation and self-
regulation has not to date effectively discouraged abuse of international financial
institutions by drug traffickers, terrorists, major financial criminals, corrupt
officials, arms smugglers, or sanctioned regimes, not to mention those engaged in
10 Jonathan M. Winer
local civil conflict, timber theft, or other criminal activity. Today, there is no list
that evaluates whether international financial institutions have complied with
basic rules of transparency or integrity. On the ‘name and shame’ side, there is no
compilation ranking major international institutions according to their involve-
ment in the laundering of proceeds from drug trafficking, corruption, terrorist
finance, illegal logging, toxic waste, human trafficking, or corporate fraud,
although such a ranking might be compiled from court documents, public
investigations and press reports. Nor has there been a list involving a ‘seal’ or
‘certificate’ system by which an institution can be endorsed as having put into
place a series of best practices to promote transparency.
Every year, many billions of dollars flow from international organizations and
international financial institutions through the world’s major international banks.
These public funds are deposited and held in these private-sector institutions without
considering if these institutions have put into place excellent transparency policies
and procedures, or minimal ones. Indeed, such funds are deposited and held in
private sector institutions that have had no due diligence or knowledge of a
customer’s principles, if they happen to be located in jurisdictions where such
principles are either not required or are minimally enforced. The value of such
deposits to the private sector financial institutions is substantial, generating not only
substantial fees but the ability to engage in further lending activities of their own,
due to the multiplier effect of bank deposits. To date, the only limitations placed on
those holding or benefiting from such international funds has been the obligation of
the institutions to account for the uses of those funds adequately. Broader
obligations, such as a requirement that a particular bank implement strong
guarantees of financial transparency or protective measures against money
laundering, have not been demanded of private sector banks by the international
organizations and international financial institutions that deposit their funds in such
institutions. Rewarding private sector institutions who agree to meet high standards
of transparency for the funds they process on a global basis could create a significant
incentive for banks, providing additional weight to existing national efforts.
At the same time, access to the international financial services infrastructure by
regions and institutions that have no controls on placement increases the world’s
vulnerability to terrorism. The post–11 September co-operation of Middle Eastern
and other Islamic countries in tracing the funds of particular terrorists represents an
important development in responding to the threat posed by terrorism in the
financial context. However, ‘back-end’ reconstruction of particular terrorist events
after they have taken place is vastly insufficient, so long as the front-door remains
wide open. Controls on placement, including rigorous ‘know your customer’
standards, are as essential as they are culturally unlikely in many countries.
Thus, carrots and sticks need to be developed to ensure that private sector
institutions in those regions have just as many incentives as do private sector
institutions in countries such as Switzerland where, despite a history of bank secrecy,
the need for financial transparency is now accepted. There is an obvious opportunity
in this for world policy makers. The question is whether they can accept the fact that
Globalization, Terrorist Finance, and Global Conflict 11
globalized money requires not only globalized standards, but also an agreement on
globalized incentives for the private sector not merely to adopt but to enforce these
standards as a means to ensure their own survival.
Prior to Globalization
Money was local. Prior to globalization and since the days when money based on
something real, like shells or gold, was replaced by state-created ‘fiat money’, money
in circulation in most countries has generally been issued by sovereign states.
Alternatively, it has been issued by private sector financial institutions regulated by
the sovereign state in which the institution was based. The stored value that money
represents has been a value determined locally by the people within the jurisdiction
that issued the currency in relation to the value of other commodities traded in that
individual economy. Money was trusted locally to the extent that others would
accept it in the society. To the extent that the national currency was valued at a
distance by other countries, that currency would tend to be discounted, given that its
principal value for the purchase of goods and services was local.
Banks were local. Although international finance is certainly not a new
phenomenon, with international lending a substantial and familiar activity by the
third quarter of the 19th century, most banking prior to the era of globalization
and securitization was done at a local level by local banks. These local banks were
largely dependent on their local community, and vice-versa, with the respective
fates of the local banks and the local communities at least moderately
interdependent. To go beyond the community was potentially dangerous for a
bank, because of the substantial impediments to enforcing a financial obligation
at a distance.
Cross-border transactions were costly and slow. Prior to the establishment of
comprehensive electronic-payment systems in the last two decades, cross-border
financial transactions were largely conducted on paper that required physical
transport. For most transactions, the efficiencies of conducting such transactions
locally would outweigh the benefits of obtaining a broader market of buyers or
sellers, depositors or borrowers beyond the particular jurisdiction. In particular, uses
of the offshore sector, such as the Caribbean or the Channel Islands, were limited to
very large financial institutions for tax structuring and trade finance, or alternatively
to small-time operators specializing in tax and creditor avoidance schemes. Access to
the offshore sector was not something available to the ordinary business or citizen.
12 Jonathan M. Winer
For corrupt heads of state, money moving abroad was typically hand-carried to
Switzerland.
Regulators could monitor local financial services. In an environment in which most
money was generated and spent locally, and not readily substituted for by other
currencies in other jurisdictions, regulators were free to develop local regulatory
regimes for local purposes. Some of these regimes were minimalist, others were
comprehensive, and few would have met what, today, constitute the basic standards
for safety and soundness. However, subject to local politics and the corruption
factor, the regulatory regimes were inherently enforceable as an expression of
national sovereignty. A financial institution definitively found to have engaged in
unacceptable misbehaviour could be fined, lose its license, and be closed. While bank
runs, bank frauds, and bank collapses remained an enduring part of the economic
life of any free-market jurisdiction, enforcement at a local level was possible, and a
recognized fact likely to have a substantial impact on market behaviour within the
regulated institutions.
Taxes were collected at borders. Prior to globalization, the preponderant
mechanism for governments to collect revenues was not by taxing income, but by
tariffs, levied on goods at point of sale and, especially, when crossing borders. In
such a tax regime, strong controls at the borders, including currency controls, were
vital to the survival of the state, as revenue collection required the border to be a
barrier before it could be a crossing. In this environment, barriers at the border,
including barriers to unregulated cross-border finance, were an essential element of
preserving and protecting national sovereignty.
After Globalization
Money is a global commodity. Although a government can give its currency a name
and a putative value, the actual value of a currency in a globalized world is
determined by global markets, private sector assessments of its value in comparison
with other forms of stored value. Similar valuation is given to any particular
currency the world over, regardless of location, making money a commodity whose
value can be affected by the actions of the government that issued it, but not
controlled by it. The loss of local control over money has meant that the valuations
given to it locally may be less relevant to its strength as a durable commodity – an
object that stores value – than the valuations given to it by those who have no
particular stake in that currency. Being a global commodity, money may also be less
susceptible to local control and regulation. As Alan Greenspan, chairman of the
United States’ Central Bank, the Federal Reserve, has observed: ‘In the international
arena [...] no overarching sovereign exists to decree what is money. Instead, a
myriad of private agents must somehow reach agreement.’ 2
2
‘The euro as an international currency’, speech given by Alan Greenspan before the Euro
50 Group Roundtable, Washington, DC, 30 November 2001.
Globalization, Terrorist Finance, and Global Conflict 13
Banks are international. Where local banks were once dependent on local
economies, international banks invest their capital wherever opportunities may
present themselves, whether they are in New York, Jakarta, or Moscow. Home
regulators cannot confine them, and indeed, neither can home regulation. If a local
regulation appears inconvenient, it can be avoided by structuring some of the
elements of the financial activity offshore. In many instances, transacting financial
services offshore is more efficient and less expensive than conducting similar services
on-shore. The offshore sector’s minimal regulation reduces transaction costs.3
Regulators cannot monitor international financial institutions. The principle of
home-country consolidated supervision notwithstanding, home-country regulators
do not in practice audit international financial institutions internationally. They
more largely rely on self-regulation and reporting by the institutions they regulate. A
financial institution that does not tell the truth to its regulator about its offshore
activities runs the risk of eventual exposure and punishment. In the meantime,
however, there is little effective supervision. As a consequence, there has been the
opportunity (and perhaps the market imperative) for financial institutions with
cross-border operations to behave with relative impunity, especially in the operations
they carry out in smaller, less fully regulated jurisdictions.
Borders do not block transactions. With tariffs largely gone and electronic money
able to move across the planet at the speed of light, control of money at the border is
largely anachronistic. Electronic currency is essentially incapable of cross-border
monitoring. Cross-border movements of currency can be monitored, and countries
can impose cross-border currency declaration requirements, but these requirements
can be readily circumvented through alternative remittance systems that substitute
netting for cross-border currency movements. To the extent that domestic
regulations impose burdens involving obligations to maintain certain levels of
liquidity, transparency, or payment of taxes, those with money may circumvent
domestic regulations entirely through capital flight. The ineffectiveness of borders
means flight capital need not truly flee. Russian oligarchs have vividly demonstrated
that after illicit proceeds have been laundered elsewhere, they can be readily brought
back into the home jurisdiction for reinvestment with no practical impediments to its
integration into the formal financial system.
3
For a detailed treatment of the development of globalized finance through the 20th
century, see Michael D. Bordo, Barry Eichengreen, and Doulas A. Irwin, ‘Is Globalization
Today Really Different Than Globalization a Hundred Years Ago?’ in Brookings Trade
Forum, vol. 2 (Susan M. Collins and Robert Z. Lawrence, eds.) (Washington, DC,
Brookings Institution Press, 1999), pp. 1–50; the short answer to the question in the study’s
title is ‘yes’.
14 Jonathan M. Winer
4
Handled proceeds of money laundering for a suspect Antiguan financial institution.
5
Handled funds of Benex, which laundered billions of dollars from Russia, including some
for Russian organized crime.
6
Handled terrorist funds for Al-Qaeda.
7
Handled proceeds of Colombian cocaine trafficking.
8
Handled proceeds of Colombian cocaine trafficking, and drug-related funds from Mexico’s
Raul Salinas.
9
Involved in massive financial frauds in connection with French political scandal.
10
Involved in handling stolen funds from Philippines of Ferdinand Marcos; reportedly
indicted by the Swiss government in connection with its handling of the funds of Sani
Abacha of Nigeria 6 December 2000. See ‘CS to be indicted in Abacha inquiry’, Financial
Times, 7 December 2000.
11
Laundered funds in the Caribbean to cover trading losses.
12
Handling terrorist funds for Al-Qaeda.
13
Handling stolen funds from Philippines of Ferdinand Marcos.
14
Involved in handling stolen funds from Philippines of Ferdinand Marcos.
Globalization, Terrorist Finance, and Global Conflict 15
frameworks. The fault lay not in the institutions, but rather in a system of
international regulation that created neither legal norms nor regulatory mechanisms
to prevent abuse.
The infrastructure for non-transparent international finance has nodes that have
specialized in particular kinds of services. For example, until recently, the Bahamas
and the Virgin Islands have been among the world’s principal creators of anonymous
international business companies (IBCs). The Channel Islands, Gibraltar, and the
Dutch Antilles have been world-class centres for the establishment of trusts to hide
the true ownership of funds. A single firm in Liechtenstein laundered political slush
funds for ruling political parties in France and Germany; arms purchases for civil
wars in Liberia and Sierra Leone; drug money for Ecuadorian cocaine trafficker Jose
Reyes-Torres, and stolen funds for various West African dictators. 15 The
Liechtenstein example is not unique. Financial nodes that initially provide services
for one purpose, such as tax evasion, over time attract more sinister illicit purposes.
Case Study: Cyprus. Since World War II, Cyprus has provided trade finance and
related services for a variety of cross-border trade and commercial activities
throughout the Middle East and the Mediterranean. Many operating in this region
have had practical reasons to avoid regulations in their home jurisdictions, as well as
high taxes, bribes, the risk of nationalization, and political instability. Accordingly,
Cyprus developed a strong financial secrecy regime, available through banking
services, company formation, trusts, and related mechanisms. By the 1970s, this
system had come to be used by terrorist organizations, arms dealers. Middle Eastern
drug traffickers, Italian mafias, the Communist Party of the Soviet Union, and
Israeli criminals, among many others. By the mid–1990s, as Cyprus sought to put
into place a more transparent financial regime to prepare for entry into the
European Union, many of the traditional illicit interests left the jurisdiction. Even
then, elements of Al-Qaeda and much of the illicit finance that sustained Slobodan
Milosevic’s control of Yugoslavia and his sustained war in Bosnia and Kosovo
remained embedded in Cyprus’ financial institutions. Systems for transporting illicit
funds, once established, become difficult to close even for a jurisdiction with strong
incentives to do so.
Import and Export Fraud: Key Elements of the Financing of Illicit Timber and
Conflict Diamonds. Illicit exploitation of a country’s natural resources is a common
feature of jurisdictions experiencing serious failures of governance. Such cases
typically involve both failures of legitimacy and of capacity. The complex political
question of who has the right to control a country’s natural resources devolves into
the simpler question of who has the capacity to exercise such control in practice. The
power to gain access to natural resources, to strip them, to transport them out of the
country, and to reap the financial benefits becomes the major practical requirements
15
See, e.g., extensive material on money laundering allegations involving Liechtenstein,
including excerpts from a German government report, on website: < http://www.marcos-
billions.com >.
16 Jonathan M. Winer
for those seeking to exploit them. The financial benefits are the major point of the
asset stripping. Given the weakness of national currencies in such jurisdictions,
obtaining money from beyond the jurisdiction, is the sine qua non of the entire
enterprise. Much of the money may, in turn, remain outside the jurisdiction,
functioning as a political slush or retirement fund, or returned to the jurisdiction to
pay for weapons, bribes, or luxury cars.
One of the most widespread mechanisms for laundering money is the use of false
import and export documentation. Through the technique of under-invoicing,
corrupt exporters declare a smaller quantity of the exported good, and then typically
share the proceeds of the additional ‘invisible’ export with their partner, usually
either the importer or the shipper. Through over-invoicing, a corrupt exporter can
pretend to ship goods that do not exist, as a cover for reimporting and legitimizing
previously earned profits from other illicit activities. Both techniques provide
effective mechanisms for facilitating trafficking in illicit commodities, such as
conflict or stolen diamonds and timber. The corrupt payments, false documentation,
theft of resources and evasion of controls, domestic and international, are an
integrated set of criminal activities. For example, in the logging of Burma’s frontier
forests, the chainsaws and woodsmen would have no business without the
simultaneous participation in the trade of corrupt officials and transnational logging
companies, who make substantial payments through financial institutions to pay for
the illicit timber.16 Similarly, money laundering is an integrated component of all
other major cross-border environmental crimes, such as CFC smuggling and toxic
waste dumping.17 Each component of the activities is essential to the success and
continuation of the overall enterprise. Thus, disruption of any element of the total
activity, including the ability to move funds in and out of the jurisdictions involved,
becomes a substantial impediment to its viability.
Case Study: Sierra Leone. It has been said that the point of civil conflict in
African countries such as Sierra Leone is not to win the war, but to ‘engage in
profitable crime under cover of warfare’, with the major opportunities involving
16
See, e.g., Bangkok Post, 26 March 1999, ‘Massive Kickbacks Alleged;’ ‘Business
Indonesia’, ‘Two Sawmills owned by General Assembly Member buys Illegal Logs’, 2
February 2000.
17
Within the US for example, smuggling of CFCs from outside the US into the US was
estimated by a US government study to amount to 60 million pounds of CFCs between
1994 and 1997 from such countries as Mexico, Russia and Venezuela. In a series of cases,
the US indicted the smugglers for money laundering violations, as well as environmental
crimes. See EPA Enforcement Actions Under Title VI of the Clean Air Act, ‘Texas Man
Arrested For Smuggling Freon Into US – Arrest Underscores Federal Crackdown on
Black Market in Ozone-Depleting Chemicals’, 24 June 1999. Currently, China and India,
both countries with essentially no money laundering laws, are the world’s major source of
illicit CFCs, especially to countries in the European Union, in violation of the Montreal
Protocol. Detailed information on the illicit CFC trade has been brought together by the
London-based NGO, the Environmental Investigation Agency.
Globalization, Terrorist Finance, and Global Conflict 17
18
Ian Smillie, Lansana Gberie and Ralph Hazelton, ‘The Heart of the Matter: Sierra Leone,
Diamonds and Human Security’, Partnership Africa Canada, January 2000.
19
There is no authoritative estimate of Taylor’s illicit wealth, although it is widely understood
to come from the sale of iron ore and timber within Liberia, and diamonds obtained from
Sierra Leone. See, e.g., ‘Liberia stokes African gem war’, Financial Times, 10 July 2000.
The Sierrra Leone UN Expert Panel Report of 2000 describes Taylor’s use of diamonds
from Liberia as a source of personal revenue.
18 Jonathan M. Winer
with the revenues being used to sustain control of the country by former dictator
Samuel Doe, and currently, by Taylor. Liberia’s commercial laws allow businesses
from anywhere in the world to register in Liberia, with no requirement they have any
physical presence in the country. Liberia’s financial regime included corporations
with no capital requirement, issuance of shares that need not be reported or recorded
in Liberia, companies with no obligation to file annual reports, tax forms, or audit
statements, bearer shares, and similar freedoms that in effect make the creation of an
entity in Liberia a guarantee of worldwide anonymity and non-accountability. The
US dollar is legal currency in Liberia. For years, Liberian diplomatic passports have
been advertised (and actually made available) on the Internet, reflecting a regime
that protects criminals outside of Liberia as well as within the jurisdiction.20 Liberia’s
connections with the international payments system broke down during its civil war
from 1991 through 1997. The most prominent non-Liberian financial institution,
Citibank, left the country. Settlements among Liberian banks, and movements of
funds from Liberia to other countries, were handled on an ad hoc basis. Yet
throughout this period, Liberia’s armies have been able to generate and use funds
from beyond the country, with President Charles Taylor accumulating substantial
personal wealth in the process. This phenomenon has continued to the present. For
example, in November 2001, the government of Singapore sought information from
the UN regarding financial and weapons transactions involving payments for
weapons deliveries that used the Chase Manhattan Bank in New York to transfer
some 500,000 USD to a Singapore arms trafficking company. Significantly, the firms
involved in the arms transfer have also been alleged to be involved in illegal
timbering in Liberia and Malaysia.21 Separately, in looking at the impact of Taylor’s
involvement in prolonging Sierra Leone’s civil war, the UN Panel of Experts
discovered that Liberia secured weapons and made payments for weapons destined
for Sierra Leone through accounts at the Standard Chartered Bank in Sharjah in the
United Arab Emirates.22
Case Study: Cambodia. Corruption in Cambodia is pervasive and systemic,
extending from low-level policemen to the top of the government. Important
criminals have close links to Cambodia’s government. For example, Theng Bun Ma,
Chairman of the Phnom Penh Chamber of Commerce and a major financial
supporter of Prime Minister Hun Sen, has been identified by the US as a major drug
trafficker. A second important criminal figure associated with the Prime Minister,
Yeay Phu, is chairperson of the Phea Pimech Company, Cambodia’s biggest salt
producer and most destructive logger.23 Cambodia’s own financial services sector is
20
Personal inquiry by the author in 1997, during his service in the US Department of State.
21
‘Singapore to probe alleged involvement of company in arms smuggling in Liberia’,
Singapore Business Times, 6 November 2001.
22
Sierra Leone UN Export Report, December 2000.
23
‘Cambodia’s Hun Sen embracing new tycoons’, Phnom Penh Moneakseka Khmer, 21
September 2001, pp. 1, 2 (Report by Chan Chamnan).
Globalization, Terrorist Finance, and Global Conflict 19
24
‘Paper: Banks in Cambodia involved in money laundering’, Phnom Penh Samleng
Yuveakchon Khmer, 30 March 2000, pp. 1,3 (Report by Sophal).
25
For example, the Cambodia bank Canadia, Ltd., has correspondent banking relationships
with the Bank of America, Republic National Bank, Standard Chartered Bank, and
Banque Nationale de Paris; the First Overseas Bank of Cambodia has correspondent
banking relationships with HSBC, which in turn has branches and subsidiaries around the
world. Given the absence of any controls on money laundering in Cambodia, it would be
difficult to imagine how such correspondent banking accounts could be protected against
laundering the proceeds of narcotics, illegal logging, and other criminal activities.
20 Jonathan M. Winer
Case Study: Burma. In Burma, opium has perpetuated the rule of an entirely non-
democratic junta, while providing the means for ethnic warlords to arm their local
soldiers. At the same time, Burmese officials have used opium profits to invest in
partnerships in legitimate businesses in neighbouring countries, such as Burma,
Malaysia, Singapore and Thailand, reducing regional pressure for more democratic
governance. Burma’s repressive government has continued to generate international
sanctions and impede foreign investment. Yet Burmese banks are thriving and
experiencing rapid growth, fuelled primarily by funds generated from the opium
trade. Prominent among Burma’s 21 domestic banks are the Asia Wealth Bank,
whose chairman and vice chairman are alleged to be former drug lords; the
Mayflower Bank, established by Kyaw Win, a partner of the drug warlord Khun Sa;
and the Kanbawza Bank, closely tied to the ruling junta and alleged to launder the
proceeds of ruling party corruption. 26 Thus, the drug economy and the political
control exercised by Burma’s unelected leadership have proved mutually reinforcing.
In turn, this economy has been sustained by Burma’s ability to readily move funds to
and from the rest of the world. Despite the allegations of its ownership by drug lords
and its involvement in money laundering, the Mayflower Bank apparently maintains
correspondent relationships with the Marine Midland Bank and American Express
Bank in New York. 27 It is difficult to imagine that any US institution is not well
enough situated to assess the provenance of funds from the Mayflower Bank. 28 EU
sanctions against Burma were toughened in 2000, theoretically freezing the funds
belonging to members of the junta and those associated with them. However, the
state-owned Myanmar Foreign Trade Bank currently reports a network of over 120
correspondent banking relationships in 58 countries, so that ‘banking transactions
can be made with almost any country in the world’.29 Burma’s repressive government
retains access to international financial institutions, irrespective of the sources of
Burmese assets or international sanctions.
Case Study: Afghanistan. In Afghanistan, decades of tribal conflict have been
fuelled by opium funds, with each of the major forces, including the Northern
Alliance and the Taliban, taking drug money to finance their military campaigns.
Opium’s impact in acting as a regional destabilizer extends beyond Afghanistan.
Drug-related corruption has been an ongoing problem within the Pakistan military.
According to a recent French analysis, from approximately 1983 through 1998,
Pakistan’s military intelligence agency used heroin trafficking from Afghanistan to
26
‘Above it all, Burmese banks are thriving even as the country’s economy suffers its worst
slump in years’, Maung Maung Oo, the Irrawaddy, 2 February 2001.
27
For example, Hamsa Travels and Tours of Yanon, Myanmar, which offers tourist services
for Burma, currently specifies on its web-pages the use of these institutions to make
payment to its account at the Mayflower Bank from the US.
28
Existing US sanctions against Burma prohibit new investment but do not prevent financial
transactions for such purposes as tourism.
29
Myanmar Financial Structure and Exchange Arrangements, published by the Government
of Myanmar, < http:/www.myanmar.com/gov/trade/fin.html > .
Globalization, Terrorist Finance, and Global Conflict 21
30
1998–1999 Report on Drug Trafficking in Asia published by the Observatoire Geopolitique
de Drogues or OGD, a French academic institute. Separately, former Pakistani Prime
Minister Nawaz Sharif told the Washington Post in 1994 that Pakistan’s army chief and the
head of its intelligence agency had proposed a detailed blue-print for selling heroin to pay
for the country’s covert military operations in early 1991. See ‘Heroin Plan by Top
Pakistanis Alleged’, Washington Post, 12 September 1994.
31
This phenomenon has been labelled ‘indigenous spoilation’ by N. Kofele-Kale, who defines
this act as an ‘illegal act of depredation which is committed for private ends by
constitutionally responsible rulers, public officials or private individuals’, in the International
Law of Responsibility for Economic Crimes (Kluwer Law International 1995) at p. 10.
22 Jonathan M. Winer
government treasuries has involved funds or resources residing within these countries
being moved from the countries to other jurisdictions through the world’s major
international banks. In some cases, the theft of national treasuries has been
accompanied by other harmful activities, whose proceeds have been laundered by the
same mechanisms. These include costly or illegal arms deals (Angola, Colombia,
Liberia, Sierra Leone, Somalia, Sudan), the smuggling of diamonds used to purchase
arms deals in civil wars (Angola, Liberia, and Sierra Leone), grand-scale theft of oil
and timber (Burma, Cambodia, Nigeria, Russia, Thailand), illegal dumping of
environmental toxics (Guyana, Suriname), and embezzlement or other abuses of
funds lent by international financial institutions such as the World Bank (endemic).
Countries that during the 1990s saw their national wealth disappear to other
jurisdictions at the direction of ruling kleptocrats include (from A to Z):
Albania, decapitalized by a pyramid scheme that moved its funds to Italy and
Western Europe;
Angola, whose immense national resources vanished amid the ongoing civil
war between President Dos Santos and Jonas Savimbi;
Burma, where funds generated by narcotics, jewels, and illicit timber were
exported for covert reinvestment in more business friendly environments, such
as Singapore and Hong Kong, by people working with the junta;
Cambodia, which featured similar characteristics of first generating illicit funds
and then having them become flight capital under Hung Sen;
Estonia, which found substantial amounts of its national wealth apparently
transferred to Russia in the mid-1990s in a pyramid scheme arranged by a
prominent banker with close ties to Latvia’s then government;
Gabon, whose oil revenues were sent offshore and handled by US financial
institutions on behalf of the senior leaders who had stolen the proceeds;
Indonesia, where billions of dollars disappeared offshore in connection with
grand corruption under former dictator Suharto, with some 9 billion USD
ending up in a nominee account maintained at an Austrian bank;
Kazakhstan, where funds from oil revenues were laundered offshore for the
benefit of senior leaders;
Mexico, where the brother of president Carlos Salinas, Raul Salinas, was found
to have moved hundreds of millions of dollars, representing either stolen
government funds, bribes, or the proceeds of narcotics trafficking, to Switzerland;
Nigeria, where General Sani Abacha stole billions that were then stored in
major banks in Luxembourg, the U.K., Liechtenstein, Switzerland and the
Channel Islands, among other locations;32
32
See, e.g., ‘Swiss banks criticised over Nigerian funds’, Associated Press, 5 September 2000,
describing findings of the Swiss Federal Banking Commission regarding the handling of
some 670 million USD of funds stolen by Sani Abacha and his ‘entourage’ from Nigeria
and held by 19 Swiss banks. According to the article, the Government of Nigeria says the
total funds stolen by Abacha amounted to some 3 billion USD, some of which remained in
other accounts in Belgium, Germany and France.
Globalization, Terrorist Finance, and Global Conflict 23
Pakistan, where military rule replaced democratic civilian rule after hundreds
of millions of the proceeds of corruption were found in Swiss banks,
discrediting the elected Prime Minister and her family;
Russia, whose financial system collapsed in 1999 amid massive money
laundering overseas through the Caribbean, the South Pacific, New York,
and London;
Serbia, whose wealth was converted to the control of Slobodan Milosevic and
his wife through such jurisdictions as Cyprus and Lebanon, while Serbia was
subject to global sanctions by the United Nations;
Ukraine, where substantial stolen assets of the state under the control of a
former prime minister were found to have been laundered to the United States,
after being handled by a number of Swiss banks; 33
Zaire (Congo), whose national wealth was exported by the late dictator
Mobuto to Swiss banks.
Thus, a wide variety of serious problems of governance have been facilitated by illicit
finance, which in turn leads back to the problem of the 11 September terrorist
attacks, where money from apparently legitimate sources, such as wealthy Muslims
in the Persian Gulf seeking to support Islamic charities, was turned to horrific ends
after passing invisibly through the pipes of the world’s global financial service
infrastructure.
33
See US v. Lazarenko, Northern District of California, superceding indictment, 23 July
2001, describing Lazarenko’s use of SCS Alliance, Banque Populaire Suisse, Crédit Suisse,
Crédit Lyonnais (suisse), and European Federal Credit Bank in Antigua to launder 21
million USD stolen from Ukraine.
24 Jonathan M. Winer
Lanka, Sudan, and Turkey. Although the terrorist organizations based in each of
these countries have some level of minority popular support, their power and
effectiveness have been leveraged by their ability to hide, invest, and transport their
funds through the world’s international financial institutions. A summary of the
nations whose banks have been used to handle funds for Al-Qaeda’s attacks on the
US is instructive in this regard. Available public sources show Al Qaeda and related
groups to have been able to move funds to institutions in the following countries:
Albania, Australia, Austria, the Bahamas, Belgium, Canada, the Caymans, Cyprus,
France, Germany, Greece, Hong Kong, Indonesia, Iraq, Italy, Kosovo, Kuwait,
Libya, Macao, Malaysia, Malta, Mauritius, the Netherlands, Nigeria, Panama,
Pakistan, the Philippines, Poland, Qatar, Saudi Arabia, the Seychelles, Singapore,
Somalia, South Africa, Sudan, Switzerland, the United Arab Emirates, the United
Kingdom, the United States, and Yemen. Significantly, where these jurisdictions are
used by Al Qaeda, they also tend to be used by other criminals and corrupt officials,
as the case of the United Arab Emirates demonstrates.
Case Study: United Arab Emirates. The UAE houses the Middle East’s most
sophisticated financial services sector, which is intensely competitive and lightly
regulated. It is also a cash-intensive society, with Dubai constituting the regional
gold centre. Cash transactions at restaurants, hotels, nightclubs, money-exchange
houses, and investment firms remain common and effective mechanisms to launder
money throughout the world from the UAE.34 Trading in precious metals, especially
gold, has been simultaneously implicated in tax frauds, money laundering, organized
crime, and the smuggling of stolen cargo from the UAE. 35 Islamic banks, once a
conservative mechanism for relative low-cost entry into the international financial
system, have expanded rapidly, remaining little regulated beyond the requirements of
Islamic shari’a. Alternative remittance houses, such as hawalas, have been abundant,
and scarcely regulated. The results for global security were evident in the 11
September terrorist attacks. One hawala based in Somalia, Al Barakaat, with major
offices in the UAE, was found to have been heavily involved in funding Al Qaeda’s
global operations. Another unnamed money changer was found to have transferred
funds to Marwan Al-Shehhi, a UAE citizen who was the suspected pilot of United
Airlines Flight 175, the second plane to hit the World Trade Center on 11
September.36 In addition, funds were allegedly wired between three of the terrorist
attackers and one of Bin Laden’s financial chiefs, Shaykh Said, also known as
Mustafah Muhammad Ahmed, who resided in Dubai until 11 September, according
to numerous press accounts.37 Subsequent press accounts traced the funds to the Al
34
‘Dubai Police Study on Money Laundering’, Khalij Times, December 10, 1999.
35
‘Duped banks get wise to crime’ Lloyd’s List, January 8, 2001.
36
‘UAE Central Bank Withdraws License of Money Changer’, Wall Street Journal, 2
November 2001.
37
See, e.g., ‘In Emirates, An Effort to Examine Bank System’, New York Times, 15 October
2001; ‘$100,000 trail links hijackers to Al-Qaeda, sleuths say’, Dubai Gulf News, 12 October
2001.
Globalization, Terrorist Finance, and Global Conflict 25
38
‘UAE Central Bank Withdraws License of Money Changer’, Wall Street Journal, 31
October 2001.
39
‘United Arab Emirates emerges as key link in money trail that led to attacks’, Knight
Ridder Washington Bureau, 2 October 2001.
40
‘UAE Bank Sources Deny Knowledge of Bin-Ladin Dealings’, London Al-Sharq al-Awsat
(in Arabic), 9 July 1999, p. 5.
41
‘Malta’s Central Bank Asked to Investigate Possible Bin-Ladin Financial Assets’, London
Al-Sharq Awsat, 16 November 2000.
42
Financial Times, 24 February 2001.
43
‘Capital Flight, Money Laundering Eyed’, Moscow Noryye Izvestiya (in Russian), 5 March
1999.
44
‘The Great Small-Arms Bazaar’, Cox News Service, 6 July 2001; ‘UN Report: Former
Russian KB Officer Arming African Rebels’, London Guardian, 23 December 2000.
45
‘Al Qaeda’s Road Paved With Gold, Secret Shipments Traced Through a Lax System in
United Arab Emirates’, Washington Post, 17 February 2002 (Douglas Farah), citing US
and European intelligence sources and investigators.
26 Jonathan M. Winer
The world’s networks of non-transparent financial services not only commingle licit
with illicit funds, thus rendering the illicit funds more difficult to detect, but also
provide vessels for the intermingling of different forms of illicit activity, which have
the common element of being both destabilizing and involving similar persons and
institutions. The ubiquity of offshore havens such as the Caymans, Channel Islands
and Liechtenstein for common use by drug, arms, and people traffickers as well as
kleptocrats is reasonably well understood. The interconnections between Al Qaeda’s
terrorist finance and the illicit sale of diamonds mined by rebels in Sierra Leone is
less obvious, although increasingly well-documented and tied to other terrorist
finance of groups such as Hezbollah. Within the region, the diamonds are
transferred to the terrorists in return for weapons or for cash. The terrorists then
transport the diamonds to diamond processing centres such as Belgium, and thereby
launder their funds anew for further terrorist activity. 46 Neither the diamond dealers
of Antwerp nor the financial institutions that serve them currently have in place any
trip-wires that would alert them to the possibility that either the diamonds, or their
owners, were involved in funding destabilizing conflict in western Africa or global
terrorism.
The problem is not necessarily one of witting intention on the part of the parties
who populate the vast infrastructure supporting many of the world’s most
destabilizing illicit activities. Rather, the global money-laundering problem is a
structural consequence of globalization, putting bankers, banks, and banking
accounts in constant contact with people and businesses that they do not know.
46
‘Al Qaeda Cash Tied to Diamond Trade’, Washington Post, 2 November 2001 (Douglas
Farah), citing US and European intelligence officials.
Globalization, Terrorist Finance, and Global Conflict 27
Instead of having relationships with people they trust, these institutions have
accepted the notion that they should trust only in the money itself, with no further
obligation.
Twenty years ago, the risks posed by ‘no-questions asked’ banking practices were
not universally evident. Now the need for greater transparency, accountability, and
traceability of financial transactions, regardless of their provenance, destination, or
the mechanics of their movement, is widely accepted. Within the past two years
many countries, in some cases threatened with possible loss of access to major
financial centres, have enacted comprehensive measures to combat money
laundering and to promote financial transparency. These countries have included
Antigua, Austria, the Bahamas, the Channel Islands, Israel, Japan, Liechtenstein,
Panama, Russia, and the United Arab Emirates. The 11 September terrorist attacks
on the United States have led to a further wave of legislation and regulation. The
result has been closer financial scrutiny of many Gulf States, a number of countries
in Southeast Asia, and of the placement of funds in jurisdictions in the Americas and
Europe. This new scrutiny has included the first comprehensive efforts to
understand, register, and regulate alternative remittance systems or hawalas.
Yet, governments whose jurisdictions begin and end at their own borders may be
poorly placed to exercise effective oversight of private sector financial institutions
whose activities may extend through many dozens of jurisdictions. If individual
nations are incapable of exercising authority over the global operations of the
financial institutions they license, there is an obvious question as to who is in a
position to exercise such authority. One answer – the market shall rule – is clearly
incompatible with other important social, economic and political goals. A second
answer, that the institutions will regulate themselves, has to date not proven very
effective. Soft standards (typically guidelines), imposed by self-regulatory organiza-
tions such as the BCBS, IOSCO, and the IAIS, have given national regulators
responsibility to decide on sanctioning cases of institutional misbehaviour, and this
too has not proven very effective.
Each of the many exercises seeking to improve international financial regulation
and to oppose illicit finance has adopted one core principle, a principle of particular
import in an age of globalization. This principle, sometimes summarized as ‘know
your customer’, suggests merely that the obligation of knowing with whom you are
doing business, a matter of prudence in a local economy, becomes even more essential
in a global economy. There is no disagreement on this core standard, only a clear
failure to date to impose it on a universal basis. Assessing the existing and potential
mechanisms for implementing this principle take up the remainder of this paper.
28 Jonathan M. Winer
47
Litan, id, p. 197.
Globalization, Terrorist Finance, and Global Conflict 29
Against Illicit and Psychotropic Drugs, the 2000 United Nations Convention
Against Transnational Organized Crime, the 1998 OECD Convention Against Illicit
Payments (covering bribery), and numerous instruments enacted by the Council of
Europe, the Organization of American States, and other regional groupings. Over
time, these international instruments have come to create a body of international
standards, embedded in the increasing number of mutual assessment mechanisms.
The first and most successful of these remains that undertaken by the FATF and its
progeny. In recent years, failures to meet these standards have even come to have
consequences, as specific jurisdictions have been named, shamed, and in effect forced
to change their laws in order to avoid risks to their economies, political regimes and
reputations. However, in many countries, governments simply do not control the
private sector, and globalization has made cross-border control inherently
impossible even for the most powerful governments. International regimes that
direct governments to regulate private sector institutions that may be more
sophisticated, more international, wealthier, and larger than the governments
purporting to regulate them have inherent practical limits.
The nature of these limits is already visible, as the name and shame exercises have
taken hold. While individual jurisdictions have been forced to change their rules,
individual institutions have been able to continue to engage in regulatory arbitrage,
pushing their riskiest and least attractive transactions to jurisdictions that require the
least transparency. For example, during the last half of 2001, the tiny Channel Island
of Jersey was found to house millions of dollars stolen from investors in the Gulf
States by a Hong Kong-based investment company;48 200 million USD allegedly
looted from Brazil in a major political scandal, deposited in a branch of Citibank; 49
and some 300 million USD in accounts belonging to the late Sani Abacha, his family
and entourage. Jersey was in compliance with all of the FATF anti-money
laundering criteria, and most of the obligations required by the OECD tax haven
exercise. Yet the persistence of Jersey’s use to conceal financial crime reflected the
reality that anyone who deliberately structured their transactions across multiple
jurisdictions was still able to protect their illicit activities from scrutiny for a very
long time. The problem may not in fact be with Jersey’s ability to enforce its anti-
money laundering regime, but with the inadequacies of regulators and law
enforcement agencies the world over to keep track of the transnational activities
of the private sector entities that they purport to oversee.
Just as globalization has caused even the smallest, local financial jurisdiction, such
as that of Jersey or Liechtenstein, to be accessible for use by any and all of the
world’s businesses, legitimate and illegitimate, the same phenomenon has required
the extension, bit by bit, of regulation from its initial application to limited problems
in limited sectors to universal problems in all sectors, as the evolution of the FATF
and the OECD Harmful Tax Practices initiatives have demonstrated.
48
‘UAE: Investment Firms Defraud Investors’, Dubai Khalej Times, 21 August 2001.
49
‘Brazil scandal hits Citibank’, The Observer,9 September 2001.
30 Jonathan M. Winer
The Financial Action Task Force. The FATF was established during the French
presidency of the G-7 in 1989 in response to the G-7’s recognition of the threat posed
to banking and financial systems by drug money laundering. At the time, drug
money laundering in the Americas emanating from Colombia were fresh in the
minds of policy-makers, following the crisis between the US and Panama that ended
with the removal and arrest of General Manuel Noriega. The FATF’s initial
mandate was to examine the methods used to launder criminal proceeds and to
develop recommendations for combating them. These 40 Recommendations,
developed during the FATF’s first year, in turn, became the basis for what was
then an innovative system for implementation. The FATF, which had a tiny
secretariat and was not a chartered international organization but only a voluntary
association, initiated a system for self- and mutual assessment. Under this system,
each member of the FATF would first assess its own compliance with the FATF’s 40
recommendations. Then, other FATF members would visit the jurisdiction, question
authorities from the assessed jurisdiction, and reach their independent determination
of where the jurisdiction was failing to meet the standards of the 40 recommenda-
tions. This approach had several ground-breaking aspects. First was the notion that
technical experts could develop standards which over time would bind their countries
in practice even in the absence of their entering into a formally binding international
agreement. Second was the concept of mutual evaluation, in which a country would
submit to peer review as a means of improving its domestic capabilities. Each of
these developments faced potentially substantial risks. For example, the withdrawal
of any FATF member from consensus on the standards could have had the impact of
undermining both the legitimacy and effectiveness of the entire initiative. Similarly,
the politicization of the mutual assessment process, either to exculpate unfairly or to
criticize unfairly any jurisdiction, could also have fatally impaired the FATF’s
legitimacy. Both risks were avoided largely because of the technocratic nature of the
staffing of the FATF by member governments. The FATF process was driven by
technocrats from finance ministries, regulators, and law enforcement, not by foreign
ministries or political figures. Its standards were neutral, and its judgments, initially
confidential, were recognized to be fair. Moreover, the FATF proceeded slowly, first
evaluating jurisdictions with robust regulatory and enforcement regimes, criticizing
them, and only then moving to jurisdictions that diverged further from the 40
recommendations.
The FATF moved forward steadily but slowly during the 1990s, in the process
taking on two major changes to its original mandate. In 1996, under the US
Presidency of the FATF, the organization expanded its mission beyond reviewing
capacities against narcotics money laundering to cover all money laundering
involving all serious crimes. It also agreed to take on new developments in money
laundering trends, especially those involved with electronic fund transfers. Secondly,
the FATF decided that the ability of its member jurisdictions to protect themselves
against money laundering would be undermined if non-member jurisdictions did not
adopt and implement its 40 recommendations as well. Accordingly, it chose to move
beyond its initial mandate to assess its own members to develop a ‘black list’ of other
Globalization, Terrorist Finance, and Global Conflict 31
countries whose practices were deemed to facilitate money laundering and therefore
be ‘non-cooperative’ with the objectives of the FATF. The development of a black
list reflected a dramatic change in approach by the FATF, necessitated by the
growing recognition of the interdependence of the global financial infrastructure,
and the inability of any jurisdiction to protect itself in the face of bad practices in
other jurisdictions.
Both the FATF’s standards and its selection of non-cooperative jurisdictions
illustrate the nature of transnational money laundering and the practices most likely
to facilitate it. Core FATF standards include:
1. Criminalizing the laundering of the proceeds of serious crimes and enacting
laws to seize and confiscate them.
2. Obliging financial institutions to identify all clients, including all beneficial
owners of financial property, and to keep appropriate records.
3. Requiring financial institutions to report suspicious transactions to
competent national authorities and to implement a comprehensive range of
internal control measures.
4. Putting into place adequate systems for the control and supervision of
financial institutions.
5. Entering into agreements to permit each jurisdiction to provide prompt and
effective international co-operation at all levels, especially with regard to
exchanging financial information and other evidence in cases involving
financial crime.50
In general, these standards have been little changed since their development in 1990.
Nevertheless, they remain incompletely implemented internationally, prompting the
FATF to develop in 2000 its list of ‘Non-Cooperative Countries and Territories’.
Four of the countries on the original list, Bahamas, Cayman Islands, Liechtenstein,
and Panama, enacted comprehensive money laundering regimes rather than face the
risk of possible loss of market access to FATF Member States if they failed to take
action. Others, such as Israel and Russia, enacted legislation, but failed to put in
place an anti-money laundering system sufficient to meet FATF standards. To date,
the FATF has threatened a number of jurisdictions with the sanctions of facing
enhanced scrutiny or greater regulatory barriers, but has imposed them on none. The
simple threat has been enough to cause any country targeted with immediate action
to change its laws, as Austria, the Seychelles, and Turkey demonstrated even prior to
the Non-Cooperative Countries and Territories initiative.
Currently, 19 countries and territories are on the FATF black list, facing the risk
of potential sanctions, termed ‘countermeasures’ by the FATF in the near future.
The list of these jurisdictions, with annotations by the author about the type of
money laundering involved, is as follows:
50
The full text of the FATF’s 40 Recommendations is available at the FATF’s website online
at <http:/www.oecd.org/fatf>.
32 Jonathan M. Winer
51
‘Introductory Remarks of the Honourable Donald J. Johnston, Secretary-General of the
OECD, High Level Symposium on Harmful Tax Competition’, 29 June 2000.
34 Jonathan M. Winer
52
The participating banks, known as the Wolfsberg Group, consist of ABN Amro N.V.,
Banco Santander Central Hispano, S.A., Bank of Tokyo-Mitsubishi, Ltd., Barclays Bank,
Citigroup, Crédit Suisse Group, Deutsche Bank AG, Goldman Sachs, HSBC, J.P. Morgan
Chase, Société Générale, and UBS, A.G.
Globalization, Terrorist Finance, and Global Conflict 35
53
Opening Statement, Dr. Peter Eigen, Chairman, Transparency International, 30 October
2000, available at < http://www.transparency.org > .
36 Jonathan M. Winer
The universal adoption of each of the above principles, with the exception of
number 10, would contribute to making it harder for corrupt officials or drug
traffickers to establish accounts with funds of unknown provenance. Yet in
specifying their agreement to adopt these principles, the signatory international
banks are necessarily implying that, previously, such principles may not have been
adopted by them on a universal basis, although each has already been either
expressly or implicitly required by the 40 recommendations of the FATF.
Notably, the banks subscribing to the Wolfsberg Principles did not commit to
applying them to all of their accounts, but only to their private banking departments.
Moreover, principle number 10, exceptions and deviations, contemplates the
possibility that such principles as knowing the customer, reporting suspicious
transactions, or maintaining records might not be followed if the bank decided there
was an appropriate reason for ignoring the rule. Left outside the parameters of the
Wolfsberg Principles entirely are such other areas as correspondent banking
involving high-risk jurisdictions. Also left outside the parameters of the Wolfsberg
Principles are the hundreds of large international banks that have yet to endorse
them, as well as the thousands of mid-sized financial institutions with multi-
jurisdictional operations. Important components of the world’s financial services
sector are also missing from the members of Wolfsberg Group, which does not
include a single institution based in China, Russia, Latin America, Africa or the
Middle East. The absence of outside assessment or oversight for the Wolfsberg
Principles and its members, illustrates the limits of this initiative, and the distance yet
to be traveled before there is general acceptance of universal anti-money laundering
standards among the world’s interlinked financial institutions. 54
Nevertheless, the Wolfsberg Principles remain an important development: lacking
the mutual assessment mechanism and the comprehensiveness of the FATF
mechanism. They demonstrate that, in the absence of globally-applicable agreements
by private sector institutions, even widely accepted principles such as those of the
FATF may remain incompletely adopted. So long as regulatory arbitrage remains
available on an international basis, general agreement among most countries to
adopt standards does not prevent private institutions from adhering to the standards
54
See, e.g., editorial of the Financial Times, 30 October 2000, ‘Banks Clean Up’, stating that
‘it may be surprising that 11 of the world’s biggest banks should find it necessary to declare
that they are opposed to the use of their networks for criminal purposes. Yet a series of
scandals has shown how corrupt politicians and other criminals have found it easy to
launder their loot through the international banking system[. . .]The bad publicity
stemming from such disclosures has persuaded the 11 signatories that the damage to
their reputations of becoming involved, however inadvertently, in money-laundering is
greater than any financial benefit[. . .]but ending the flows needs the involvement of the
whole financial services industry including the host of other institutions whose transactions
can help hide criminal plunder. The next step is for the financial regulators to adopt the
Wolfsberg principles for the organizations they supervise and closely monitor their
enforcement’.
Globalization, Terrorist Finance, and Global Conflict 37
only in those jurisdictions that require them. Broader, global adoption of the
standards requires commitments from the private sector institutions that these
standards apply everywhere, not merely where there is a good local regulator.
A set of mandatory rather than optional principles, adopted by the world’s major
financial institutions on a global basis, would have the potential of transcending the
limits of individual national regulators, especially were it to become applicable to all
financial service sector operations, rather than only to private banking, and to
become subject to assessment and oversight mechanisms by outsiders on a global
basis. Indeed, the UN already relies on the principal of private sector implementa-
tion and co-operation in its handling of sanctions. 55
55
The Targeted Financial Sanctions Project of the Watson Institute for International Studies
at Brown University, < http://www.WatsonInstitute.org/tfs > contains extensive evidence
for this proposition, as a member of the research team on the project, Professor Sue Eckert,
has observed.
38 Jonathan M. Winer
The foregoing initiatives have been innovative and recent. The question remains
whether they will be sufficient, or whether additional mechanisms should be
developed that combine their best features into a regime which further attenuates
regulatory and enforcement arbitrage, holds the private sector financial services
infrastructure accountable, and provides incentives to institutions that adopt best
practices.
The World Bank, and the other International Financial Institutions (IFLs) are
each among the most important international institutions operating in the world
today, controlling many billions of dollars in resources that are, in turn, allocated for
lending around the world. These institutions each have a large number of
correspondent banking relationships and deposit funds for use in recipient countries,
not only in central banks but in commercial ones. Similarly, the United Nations and
its constituent elements direct substantial sums in development assistance, which also
are necessarily deposited in banks in the countries where the activities are carried
out. Trade finance activities undertaken by government-sponsored entities such as
export/import banks also rely on private sector banks to handle the funds. National
and international development programmes place their funds in private banks. And
government and international organizations alike, when they borrow and issue
notes, also select international banks to act as agents and issuers.
Today, financial transparency is not a criterion for the selection of one financial
institution over another to be the holder, processor, or handler of the funds of
governments, development organizations, international financial organizations, or
the United Nations. An international bank that is involved in numerous money
laundering scandals or terrorist financial transactions has approximately the same
chance of obtaining a lucrative source of government resources as does an
international bank that has imposed the highest standards of transparency and
anti-money laundering policies and procedures. Despite the existence of the FATF,
OECD, and Wolfsberg models, there is no ‘white list’ to which governments,
international organizations, or non-governmental organizations that wish to foster
transparency can turn as a principled means of selecting a bank to handle their
funds.
The lack of such a white list may constitute a missed opportunity. As Robert
Litan has observed, these institutions, especially the IFIs, have ‘accumulated power
akin to a domestic sovereign government’, and have the means to enforce terms of
their agreements with other countries.56 With such power in relationship to sovereign
states, these institutions surely have equal power should they care to exercise it in
relation to private sector institutions. Creating an additional incentive for financial
institutions to adhere to a comprehensive, global code of conduct to combat money
laundering and protect against illicit finance would seem to be a logical goal for an
international community increasingly focused on the risks created by financial
56
Litan, id, at 199.
Globalization, Terrorist Finance, and Global Conflict 39
secrecy. It would supplement the work of nations by asking institutions that operate
in many jurisdictions to adhere to the same standards in all of them, even in cases
where the governments themselves have little ability directly to regulate or enforce
these standards.
To make a white list system work, the United Nations could, for example, take
the recommendations previously made by the FATF, OECD and Wolfsberg Group
and ask financial institutions to agree to adopt them on a global basis throughout
their institutions. Such institutions could further agree to be assessed by a
multinational team of experts who would make reports on the implementation of
the principles by those institutions they assess. An institution that has agreed to an
assessment and passed it would be credentialed and rewarded with a preference for
selection in processing the funds controlled by the UN and by other international
organizations. Other, non-white listed institutions would not be denied the
opportunity to handle the funds of international organizations. However, they
might well be limited to handling such funds in areas where there is no ‘white list’
institution available. To insure the integrity of the system, the white list would need
to be updated regularly, with periodic inspections and reviews of any institution
placed on such a list.
Such a system would retain the mutual assessment and oversight elements of the
FATF and OECD exercises, while adding the universality promised by the
Wolfsberg Principles, and combating the problem of regulatory arbitrage. Each
white-listed institution would be required to agree to maintain its know-your-
customer and other anti-money laundering policies and procedures regardless of
whether it was located in a well-regulated jurisdiction or one with a lax regime. It
would accept the principle of having others conduct period external assessments of
its compliance with the standards and the publication of comprehensive reports
describing how it had met the standards. To ensure fairness and the opportunity to
improve anti-money laundering programmes over time, white-listed institutions
would be given a period allowing them to correct following each evaluation before
being placed at risk of losing white-list status. Other institutions, not white listed,
would be given the ability to sign up to the white list at any time by providing a
public specification of their methods of complying with the standards, and
agreement to submit to an outside assessment at the earliest convenience of the
multilateral experts group.
Given the magnitude of the potential commercial benefit to white-listed financial
institutions, it would be important to have the standards appropriately tailored by
sector, size of operation, and nature of risk. This approach would be similar to that
currently undertaken by the Basel Group in the area of risk-based capital standards
for financial institutions. To be effective, anti-money laundering regimes need to be
structured so as to account for the actual mechanisms by which failures of
transparency are most likely to be exploited. Effective tailoring of a white list would
require further development of money laundering typologies by the FATF and other
organizations. However, even a base-line set of standards, based on those already
adopted by the FATF, the OECD, and reflected in the Wolfsberg Principles, might
40 Jonathan M. Winer
provide a suitable place to begin. A white-listed institution might still find itself being
used to transport terrorist funds. But it would have powerful incentives for
preventing such use in the first instance and for swiftly responding to abuses upon
discovery incentives that today, with all of the name and shame exercises and the
terrible costs of financial crime (including the financing of terrorism) to civilization,
nevertheless remain largely absent.
How Can Sound Customer Due Diligence Rules
Help Prevent the Misuse of Financial
Institutions in the Financing of Terrorism?
Charles Freeland*
When the author first joined the Basel Committee Secretariat in 1978, the idea that
bank supervisors had a role to play in the prevention of money-laundering would
have been greeted with astonishment. Some ten years later, when Basel first
discussed the topic in earnest, there was still a body of opinion that this was a matter
for law enforcement and supervisors should stick to the core tasks they were charged
with. Nonetheless, the Basel Committee (BCBS) agreed, principally at the insistence
of the United States, to issue a statement alerting banks to their ethical
responsibilities in the prevention of the criminal use of the banking system. At
that time the principal concern was to make it more difficult and costly for drug
gangs to launder the proceeds of their crimes. That statement, 1 relatively short by
today’s standards, laid down four principles that banks should follow:
Identify their customers
Refuse suspicious transactions
Co-operate with law-enforcement agencies
Train their staff and introduce compliance procedures.
This statement exerted quite wide influence at the national level in the major
industrialized countries and was additionally one of the triggers for the formation of
the Financial Action Task Force (FATF). With the creation of the FATF, the BCBS
took the view that the baton could be passed over to a body with the necessary wider
competencies. Although invited to participate in the FATF, the BCBS declined on
the grounds that its views could be adequately represented by the individual bank
supervisors who became members.
But times change. In 2000, one of the BCBS’s specialist task forces, the working
41
42 Charles Freeland
the Wolfsberg Group‘s first document was being prepared. In each case, the
principal trigger was the Abacha affair. The BCBS’s consultative paper2 did not
address money-laundering or suspicious transaction reporting directly. Rather its
focus was on risk management for banks in their customer relationships. The paper
focused on four specific risks; reputation risk, legal risk, operational risk and
concentration risk (essentially liquidity/funding risk). Plainly, the most sensitive of
these is reputation risk. A key distinction was drawn between initial identification of
each new customer and ongoing monitoring of existing account activity.
The reaction of the supervisory community to the BCBS’s draft was wholly
supportive, including enthusiasm from some countries that one would not have put
high on the list of those interested in probity. The FATF was also supportive and the
Wolfsberg Group provided constructive comments. But some banks and banking
associations were less enthusiastic. They raised two principal concerns that we
sought to address in the final version of the paper that was issued in October 2001.
One was the regulatory burden issue – and that is a very justifiable concern. We tried
to respond to that by introducing a risk-based approach – identifying higher-risk
customers or customer activities that merit heightened due diligence, and reducing
the burden of monitoring the identities and activities of ‘ordinary’ retail clients.
Indeed, the paper makes clear that while customer identification procedures are
needed, they should not be so restrictive as to deny banking services to people who
are financially or socially disadvantaged – and the same for ongoing monitoring. A
second concern related to the clause requiring banks to backdate their customer
identification procedures to existing clients. This could be very burdensome for
banks serving small retail customers. Although there is still in the final version a
requirement to undertake regular reviews of existing records and to monitor the
activities of long-standing clients, there is now no obligation for banks to demand
customer identity documentation from existing customers.
So what has all this to do with the fight against terrorist financing? Well, first, the
bank needs to know who its customers are if it is to be able to respond to requests
from law-enforcement or intelligence authorities concerning accounts in the names
of known terrorists or terrorist organizations. By definition, however, terrorists may
be reluctant (and that reluctance is likely to be greater in the future) to open an
account under their true names. They will thus try to hide behind anonymous
accounts or ‘fronts’ making use of trusts, charities, nominees, corporate vehicles,
profession intermediaries, and so on. The CDD paper gives clear guidance to banks
on how to prevent such fronts from being used by criminals, including of course
terrorists. This is a complex area in practice, but the principle itself is clear: the bank
must make every effort to establish the beneficial owner(s) of all accounts and
persons who conduct regular business with it.
2
Customer Due Diligence for Banks, January 2001. Although the document was targeted at
banks, it expresses the view that similar guidance needs to be developed for all non-bank
financial institutions.
44 Charles Freeland
The key to preventing terrorists from using banks has to be in the initial customer
identification process. Once an account is open, it will rarely be feasible for a bank to
identify unusual account activity by a terrorist. The patterns of account activity by
the Al-Qaeda perpetrators of the 11 September tragedy are by no means abnormal
for a person with an irregular source of income such as a consultant, or a student
with occasional parental support. Account profiling is therefore unlikely to identify a
terrorist customer. What would of course help would be a tip-off from another
source, maybe an intelligence source, or the observation by an alert staff member
that the customer's behaviour is suspicious. Another pointer could be that the origin
or destination of funds is a terrorist organization. However, one cannot expect banks
to monitor every transaction of what would likely be classified as a low-risk
customer. What one can do, and what the BCBS’s CDD paper does, is to insist that
banks maintain account and transaction records for at least five years so that the
audit trail can be followed and the origins or source of funds followed if required.
The BCBS paper lays down clear guidelines for customer acceptance and
customer identification procedures to be followed by banks in the opening of new
customer accounts. It advises individual supervisors to establish strict standards for
the documentation that should be required – and prohibits the use of anonymous
accounts. It does not specifically list the categories of documents that banks should
demand to see. There was an annex attached to the January consultative paper that
gave examples of the types of documentation that could be admitted. However, the
working group excluded this from the final October version because it felt that more
attention was needed to the issue. It is now planning to provide more detailed
guidance on customer identification procedures in due course, and to use that
opportunity to update the October paper with any further guidance on CDD that
has emerged from consultations in other bodies. To take one example, the FATF
and the Wolfsberg Group have made certain proposals for the completion of the
field for the originator‘s name in the transmission of wire transfers. The BCBS will
probably want to establish a best practice guideline for that issue in due course.
Nobody should be under any illusions that conducting customer due diligence is a
simple task – it is one that is full of contradictions. The culture of banking is
engrained in the desire to attract customers and profit from providing banking
services. As with retailers selling products that are not suitable for all, there needs to
be a highly-developed social conscience to prevent banking services falling into the
wrong hands. Ex post, it can be relatively easy to judge that a customer should not
have been accepted – ex ante, with the pressure on to welcome and even reward new
customers, the task is more challenging. There are behavioural differences to respect,
for example, in relation to well-heeled customers from other countries. The
compliance officer or risk manager in charge of customer due diligence will be in
constant conflict with the incentives provided to customer service units dedicated to
personal, private or offshore banking. There may also be conflicts of culture with
regard to what may or may not be regarded as acceptable behaviour by foreign
customers. This may go way beyond the bank – for example the UK is currently
grappling with the diplomatic ramifications of the freezing of an account linked to a
Misuse of Financial Institutions in the Financing of Terrorism 45
Qatari Minister who received ‘facilitation payments’ for a UK defence deal. The
UK’s Treasury and Home Offices are apparently in favour of the freeze, while the
Defence and Foreign Ministers oppose it. One can only sympathize with a bank that
gets involved in such a tug of war.
Fortunately, conflicts of this kind are not likely to arise with regard to terrorist
financing. However, there are other aspects that complicate the issue for the financial
sector. One of the difficulties in providing guidance to banks in the fight against
terrorism is to define what is a terrorist or a terrorist organization. There is often a
thin line between terrorists and freedom fighters and a good number of current and
recent Heads of State were once regarded as terrorists. The EU definition is more
subtle ‘persons who finance, plan, facilitate or commit terrorist acts’, and it goes on
to define a terrorist act. Nonetheless, it is a difficult issue on which the private sector
needs guidance from the authorities, and it is not guidance that the supervisors can
easily provide. Rather, the financial sector needs to receive information from police
and intelligence as to the terrorists and terrorist organizations on the ‘black list’. This
is even more true in the case of charities and foundations. Many innocent-sounding
organizations that may raise money from legitimate sympathizers who believe they
are contributing to a humanitarian cause have, in the past, been channelling at least
a portion of the funds they have raised to terrorist uses.
Much has been made by the media and by professional writers of the fact that
terrorism is different from money-laundering because it is the use of the funds that is
criminal not their source. However, it may be wrong to place too much emphasis on
this factor to explain why banks are unable to identify customers engaged in
terrorism. There has not, to the author’s knowledge, been a significant terrorist
organization to date that has funded itself wholly from legitimate means. Al-Qaeda
has been heavily involved in the marketing of drugs as well as other lesser crimes
such as credit card fraud. Terrorist organizations are certainly not beyond robberies,
kidnapping, extortion, and so on as a means of financing their illegal activities.
Building and maintaining an effective terrorist organization costs a great deal of
money – in the case of Al-Qaeda hundreds of millions. Hence, successfully denying
all criminals access to the financial system will hit the terrorists too. What may be
more challenging will be the identification of charities and other fund-raising
organizations that support terrorism. Many of the contributors to what are usually
set up with innocent sounding titles may not be aware that their money is being
channelled into a terrorist organization.
One concern that arises in the present hunt for Al-Qaeda money is that the terrorists
will turn increasingly to parallel underground banking systems. Attention has been
focused on the Hawala system – but it is by no means the only one for money
transmission. Western Union type transfer systems, travellers cheques, even credit cards
can be an effective means of financing individual terrorists if not whole terrorist cells.
Much has also been made of the need to crack down on correspondent banking
relations. Effectively, a respondent bank is relying on its correspondent to have
conducted due diligence of each of its customers, because there is no way the
respondent bank can monitor the probity of all transactions originating from sources
46 Charles Freeland
that it does not know. The principles enacted in the USA PATRIOT Act prohibiting a
bank from maintaining a correspondent relationship with a bank located in a ‘non-
cooperative’ jurisdiction appears to be a sound – if not necessarily watertight –
precaution. But there is a risk that countries without developed banking systems, whose
banks need their correspondent relationships to link with the principal world markets
or whose (innocent) citizens are active users of Hawala to transmit funds abroad, may
be harshly penalized through no fault of their own. Indeed, there are countries, such as
Somalia, that have no banking infrastructure and whose banking system is based
entirely on Hawala-type relationships. The BCBS paper does not go so far as to ban
correspondent banking relationships (except with so-called ‘shell banks’). But it says
that banks must decide whether they can rely on a correspondent to conduct adequate
due diligence of its customers in the same manner as an introducer3 – and hence it must
apply the criteria that are laid down for eligible introducers in determining whether to
enter into or to sustain a correspondent relationship.
It is a legitimate question to ask what the BCBS itself has been doing since 11
September to support the anti-terrorism efforts of the US government and others.
First, it accelerated the issue of its CDD paper and, in doing so, took pains to ensure
that it represents a response to the newly-identified threat (though, in truth, few
changes were made to the document). Second, the BCBS’s Secretariat has been
assisting the authorities in the transmission of the US ‘Control List’ of suspected
terrorists to banks in the major countries. It has not been creating the list directly,
but has acted as a conduit in taking the initial US list, adding additional names
identified by non-US authorities and circulating a consolidated list to the authorities
that make up its members. Those authorities have then passed on the list at their
discretion to the financial institutions within their jurisdictions. The lists were also
made available via the European Central Bank to countries in the European Union
that are not members of the Basel Committee. Not all supervisors have been
enthusiastic about this process – some have expressed doubt about the accuracy and
comprehensiveness of the list, and have voiced fears that circulating lists will create
complacency among banks about customers that do not appear on the list.
An important issue in this context and one that is of considerable interest to the
working group on cross-border banking is the extent to which the monitoring of
customer due diligence needs to be applied on a global basis. The four risks identified
in the CDD paper apply to a bank wherever it is operating – certainly to its overseas
branches and very probably to subsidiaries under its effective control. There is a
section in the paper that addresses the need for banks to be able to implement the
CDD standards imposed by their home-country regulator on a global basis, and for
home-country supervisors to be able to ensure that the standards are being adequately
applied through on-site examination on equivalent verification procedures.
3
An introducer is an entity that channels suitable customers to a bank. In some countries,
this is a regular and frequent source of new customers. The BCBS paper sets out strict
criteria for the acceptability of introducers.
Misuse of Financial Institutions in the Financing of Terrorism 47
Since the Control Lists began to circulate, this debate has become more pertinent
because it has raised questions about a bank’s ability to respond on behalf not only
of its head office and domestic banking network, but also of its offices abroad. Some
banks seek to ensure that they maintain a centralized customer database – if only to
save on IT costs – and hence are in a position to ‘search’ for identified customer
names across their global customer base. Some do not make that attempt – and, even
if they do, there will be individual units which for various reasons may not wish their
own customer base to be accessible from the head office. Others may use a numbered
account system to disguise the names of, say, their private banking clients in offshore
centres or their high net-worth clients in a private banking centre such as
Switzerland. It is clear, however, if a CDD principle is to be effective, that a bank
should be in a position to respond to an official request as to whether it has the
account of a named customer in any of the locations in which it operates. This means
that its offices abroad must be capable of responding to enquiries from head office
about named account holders. In the specific case of the Control List, many banks
have circulated the List to their offices abroad and asked for notification of any
matches. This means that the Lists have reached some outlying countries whose
supervisors/central banks have not received them.
Another issue relates to the ‘search’ capability. One of the lessons learnt since the
Control Lists have been circulating is that, while all banks would normally have their
account-holders in an electronically searchable form, relatively few banks have the
beneficial owners so recorded. It seems that many banks have the supporting
documentation to identify the recorded beneficial owner separately from their
principal customer base. Hence a search of the Control List can be extremely time-
consuming if banks are to search, as they should do, the beneficial owners of
accounts that they hold.
There is also a question about the means by which banks should react with respect
to matches with the Control Lists. This involves the legal area, because in most cases
some form of confidentiality legislation will apply and any exchange of information
will be subject to treaties or Memoranda of Understanding (MOUs). Where there
are suspicious transaction reporting rules and Financial Intelligence Units (FIUs) to
which suspicions can be reported, the gateway would seem to be clear-cut. However,
some FIUs may not have the powers to communicate directly with FIUs in other
countries, such as FINCEN in the United States. It may, in such cases, be more
efficient if the banks respond to their own supervisor, who can communicate
suspicions to the Federal Reserve Bank of New York. This channel may also be
required in the case of countries which have not yet established FIUs (though these
are becoming fewer). However, as a general rule, the supervisory information
channel is not well suited to suspicious transaction reporting, since it is designed for
the communication of problems concerning the bank’s own activities and is often
subject to a series of criteria designed to protect the confidentiality of any
information transmitted concerning individual customers and accounts. As often in
the case of information-sharing, the most sensitive issue, as mentioned earlier, is the
matter of tax confidentiality and the need to protect information about customer
48 Charles Freeland
accounts from being passed to home-country authorities. But that protection can, at
the same time, inhibit the bank supervisor from passing information to other official
bodies, such as the FIU.
The author’s view on the prospects for success in the fight against terrorist financing
is that co-operation is needed on an unprecedented scale, not only between the private
and public sectors, but within the public sector too. It is no secret that different official
entities within the United States had information which, if pooled, would have alerted
them to the 11 September terrorist attacks. Such information was not shared with
others who could have added to it, partly for reasons of professional jealousy between
the different agencies. Now, in the United States and elsewhere there is unprecedented
collaboration at the official level with at least two major US inter-agency task forces.
This effort is leading to intelligence successes, which have thankfully, at the time of
writing at least, contributed to the absence of further terrorist events, though there have
been some close calls. But, at the financial level, it seems that success has been more
limited. While some quite substantial sums have apparently been frozen, many of the
audit trails have petered out in impenetrable areas in the Middle East or in financial
centres, often at a high political level. It is not surprising that the financial trail is not a
simple one – Osama bin Laden reputedly went to Afghanistan originally to advise the
Taliban on the best means of marketing and laundering the proceeds of their opium
crops. He is known to operate a sophisticated financial machine and to have associates
well versed in underground banking methods.
In the future, it is going to be even more difficult to identify or to track the
financing of terrorism, for the perpetrators have now been warned. Only so much
can be done by the private sector – it needs to develop closer links with and receive
tip-offs from the public sector on an ongoing basis. It has been said that customer
privacy will not be the same again after 11 September, and this trend is being
reinforced by initiatives by the OECD and others to increase fiscal transparency and
force offshore financial centres to adopt stricter prudential and disclosure standards.
Banks must certainly remain alert to terrorism – just as they must remain alert to all
forms of criminal activity by their customers – but they can only supplement the
efforts being made by the intelligence and police authorities, and not substitute for
them. If there is to be real coordination, the public sector needs to share information
more readily with the private sector than it has traditionally been willing to so. It has
in the past been very much a one-way information flow and banks making
Suspicious Transaction Reports (STRs) to FIUs have often wondered whether they
have ever been investigated. The sharing of Control Lists with the financial
institutions is an encouraging sign that the public sector is willing to be more open,
and appreciates that it needs assistance from the banks and other financial
institutions if it is to defend properly its people against these terrible threats.
It is necessary, though, to close on a sombre note. Banks and bank supervisors
have rarely faced a responsibility as grave as they do now. Failing to conduct due
diligence in present circumstances could have deadly consequences, putting
thousands or conceivably hundreds of thousands of lives at risk. There is no place
to hide on this issue.
Financing of Terrorism –
A Predicate Offence to Money Laundering?
Armand Kersten
1. Introduction
1
FATF news release of 31 October 2001, FATF cracks down on Terrorist Financing
(available on the web at <http://wwwl.oecd.org/fatf/TerFinance_en.htm)>.
2
See the news release mentioned in ibid.
3
Two of the highest profile laws in this category being the Uniting and Strengthening
America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism
Act of 2001 (‘the USA PATRIOT ACT’) and the UK Anti-Terrorism, Crime and Security
Act 2001.
49
50 Armand Kersten
2. Money laundering
Whilst the United Nations Convention against illicit traffic in narcotic drugs and
psychotropic substances of 19 December 1988 (‘the Vienna Convention’) created
momentum for the attention to money laundering as a global phenomenon,4 it only
required the prohibition of the ‘laundering’ of drug proceeds.5 Note that the FATF,
in its initial 40 Recommendations of 19906 took the‘definition’ of money laundering
from the Vienna Convention.
The Council of Europe7 Convention on Laundering, Search, Seizure and
Confiscation of the Proceeds from Crime of 8 November 1990 (the Strasbourg
Convention), takes this a step further, by giving its Article 6 the title: ‘Laundering
offences’. Whilst repeating constituent elements already contained in the Vienna
Convention, it widens the circle of ‘predicate offences’ beyond drug trafficking. In so
far as is relevant for the purposes of this article, it provides that the parties must
establish as offences under their domestic laws:
a. the conversion or transfer of property, knowing that such property is
proceeds, for the purpose of concealing or disguising the illicit origin of the
property or of assisting any person who is involved in the commission of the
predicate offence to evade the legal consequences of his actions;
b. the concealment or disguise of the true nature, source, location, disposition,
movement, rights with respect to or ownership of property, knowing that
such property is proceeds and subject to its constitutional principles and the
basic concepts of its legal system;
c. the acquisition, possession or use of property, knowing, at the time of receipt,
that such property was proceeds. (emphasis added)
4
The term ‘money laundering’ as such seems to have been introduced in the US Money
Laundering Control Act of 1986.
5
It is noted that the Vienna Convention does not explicitly refer to (the term) money
laundering.
6
Later in this article, it will be seen that the 1996 revision aimed at widening the scope.
7
The Council of Europe should not be mistaken with the European Council. The Council of
Europe is an international institutional organization, whereas the European Council is an
organ of the European Union.
8
Available on the web at <http://conventions.coe.int/treaty/en/Treaties/Html/141.htm> .
Financing of Terrorism – A Predicate Offence to Money Laundering? 51
The Strasbourg Convention defines ‘proceeds’ as: any economic advantage from
criminal offences.9 It goes on to define ‘predicate offence’ as: any criminal offence
as a result of which proceeds were generated that may become the subject of an
offence as defined in the ‘laundering article’.10 This yields an entirely open-ended
range of predicate offences, hinging on the definition of ‘proceeds’ as any
economic advantage from criminal offences. Perhaps the only limitation is hidden in
the fact that it is left to the Member States to incorporate the convention’s
requirements in their domestic criminal laws, which leaves them discretion to draw
the circle themselves.
The Commission of the European Communities labelled the methodology of the
Strasbourg Convention: ‘an approach to combating the laundering of the proceeds of a
wider range of criminal offences than required by the Vienna Convention’ (emphasis
added).11
I now turn to the European Union (and the European Communities) itself. The
Council of the European Communities Directive of 10 June 1991 on prevention of
the financial system for the purpose of money laundering 12 provides:
‘Whereas for the purposes of this Directive the definition of money laundering is
taken from that adopted in the Vienna Convention; whereas, however, since
money laundering occurs not only in relation to the proceeds of drug-related
offences but also in relation to the proceeds of other criminal activities (such as
organized crime and terrorism), the Member States should, within the meaning of
their legislation, extend the effects of the Directive to include the proceeds of such
activities, to the extent that they are likely to result in laundering operations
justifying sanctions on that basis.’ (emphasis added)
The 1991 Convention thus envisages and recognizes that terrorism is a criminal
activity potentially resulting in proceeds in relation to which money laundering may
occur. From a logical perspective, however, it seems that this approach presumes the
criminal activity preceding the laundering of the proceeds.
In 1996, the FATF strengthened its 4th Recommendation to state that ‘each
country should extend the offence of drug money laundering to one based on serious
offences’, done so as to extend the ambit of the predicate offences beyond that of the
Vienna Convention.
9
Article 1, sub a.
10
Article 1, sub e.
11
Commission of the European Communities, Proposal for a European Parliament and
Council Directive, amending Council Directive 91/308/EEC of 10 June 1991 on prevention
of the use of the financial system for the purpose of money laundering, Brussels, 14 July
1999, COM (1999) 352 final, explanatory memorandum.
12
OJ 1991 L 166, p 77 et seq.
52 Armand Kersten
In 1998, under the auspices of the UN Office for Drug Control and Crime
Prevention,13 the report Financial Havens, Banking Secrecy and Money Laundering 14
was published. Under the header ‘issues for consideration’, this report addresses
‘predicate offences’15:
‘The time may have come to end the artificial division of criminal money into
categories depending on the nature of the crime. . . . One possible approach would
be to have member countries agree that any funds that are derived through
criminal activity are funds that can give rise to a charge of money-laundering.’
From the context of the report, it can be inferred that the term ‘artificial division’ is
used to point to distinctions sometimes made between criminal tax offences and tax
offences classified otherwise.
On 9 December 1999 the General Assembly of the UN adopted the International
Convention for the Suppression of the Financing of Terrorism. 16 Article 2 provides,
in so far as is relevant here:
‘1 Any person commits an offence within the meaning of this Convention if that
person by any means, directly or indirectly, unlawfully and wilfully, provides
or collects funds with the intention that they should be used or in the
knowledge that they are to be used, in full or in part, in order to carry out:
[...]
(b) Any other act [subparagraph (a) refers to acts constituting offences
under a list of treaties] intended to cause death or serious bodily injury
to a civilian, or to any other person not taking an active part in the
hostilities in a situation of armed conflict, when the purpose of such act,
by its nature or context, is to intimidate a population, or to compel a
government or an international organization to do so or to abstain from
doing any act.
[...]
3. For an act to constitute an offence set forth in paragraph 1, it shall not be
necessary that the funds were actually used to carry out an offence referred to
in paragraph 1, subparagraphs (a) or (b).
4. Any person also commits an offence if that person attempts to commit an
offence as set forth in paragraph 1 of this article.’ (parentheses added)
Article 1 paragraph 3 defines ‘proceeds’ as: any funds derived from or obtained,
directly or indirectly, through the commission of an offence set forth in Article 2.
13
Based in Vienna, this office created the UN Global Programme against Money Laundering
(GPML) and the GPML Forum. See the website mentioned in footnote 14.
14
Available on the web at <http://odccp.org/publications.html> .
15
At pages 73 and 74
16
Available on the web at <http://untreaty.un.org/English/Terrorism/Conv12pdf> – entry
into force was 10 April 2002.
Financing of Terrorism – A Predicate Offence to Money Laundering? 53
17
Available on the web at <http://www.odccp.org/palermo/convmain >.
54 Armand Kersten
The Convention contains definitions of a wide range of terms. Thus, for instance,
it defines ‘serious crime’ as: ‘conduct constituting an offence punishable by a
maximum deprivation of liberty of at least four years or a more serious penalty.’ 18
Article 6 of the new Convention addresses the ‘Criminalization of the laundering
of proceeds of crime’.19 The ‘definition’ of money laundering itself is extended quite a
bit further than that in the Vienna Convention of 1988. Notably, in this Article 6, the
new Convention provides:
‘Each State Party shall seek to apply its definition of money laundering to the
widest range of predicate offences;
Each State Party shall include as predicate offences all serious crime as defined in
article 2 of this Convention . . . ’ (parentheses and emphasis added).
It should be added that the new Convention explicitly provides for a so-called dual
criminality test.20
Hence, the UN seeks to use and define ‘serious crime’, as well as ‘organized
crime’. We are approaching the point of an ‘all crimes’ ambit of predicate offences.
This brings one back to the EU.
On 4 December 2001, the European Parliament and the Council of the European
Union adopted the second money laundering prevention directive. 21
Both the EU Council of Ministers and the European Parliament had called for
additional measures to enhance the 1991 EU anti-money laundering Directive. 22 On
14 July 1999, the EU Commission presented its proposal23 (the Proposal). The main
changes to the 1991 Directive are a widening of the prohibition of money laundering
to embrace not only drugs trafficking but also all organized crime, and an extension
of the obligations of the Directive to certain non-financial activities and professions.
It is this ‘widening’ of the prohibition of money laundering that shall now be the
focus of the rest of this paper. The explanatory memorandum expresses it thus:
18
Art. 2(b).
19
Thus, this Convention makes an explicit reference to the term ‘money laundering’; contrast
the absence of such reference in the Vienna Convention of 1988, as was noted supra.
20
Thus, offences committed outside the jurisdiction of a party constitute predicate offences
only when the relevant conduct is a criminal offence under the domestic law of the country
where it is committed and would be a criminal offence under the domestic law of the party
applying the Convention, had it been committed in that party’s jurisdiction, viz. Art.
6(2)(c).
21
Directive 2001/97/EC of the European Parliament and of the Council of 4 December 2001
amending Council Directive 91/308/EEC on prevention of the use of the financial system
for the purpose of money laundering, OJ 2001 L 344, p 76 et seq, available on the web at
<http://europa.eu.int/eur-lex/pri/en>.
22
See, supra, note 12
23
Commission of the European Communities, Proposal for a European Parliament and
Council Directive, amending Council Directive 91/308/EEC of 10 June 1991 on prevention
of the use of the financial system for the purpose of money laundering, Brussels, 14 July
1999, COM (1999) 352 final.
Financing of Terrorism – A Predicate Offence to Money Laundering? 55
‘The 1991 Directive only requires the prohibition of the laundering of drugs
proceeds, as required by the Vienna Convention, but encourages Member States
to apply the approach of the Strasbourg Convention,24 namely of combating the
laundering of the proceeds of a wider range of criminal offences (often referred to
as ‘predicate offences’).
The FATF strengthened its relevant recommendation in 1996 to state that ‘each
country should extend the offence of drug money laundering to one based on
serious offences’. This corresponds to a growing trend based on the dramatic
increase in non-drugs based organised crime and on the realisation that having a
wide range of predicate offences should improve suspicious transaction reporting
and above all facilitate international co-operation between judicial and police
authorities in different countries.’ [parentheses and emphasis added]
As to the concrete question whether it would also be appropriate to base the
prohibition of money laundering contained in the (updated) Directive on the same
concept of ‘serious offences’ as in the Strasbourg Convention, 25 the Commission
interestingly distinguishes between, on the one hand, the criminal law treatment of
money laundering (i.e., the definition of the crime of money laundering) and, on the
other hand, the specific obligation to report suspicions of money laundering as
imposed upon the financial sector. It stresses that the Directive addresses the
obligations of reporting.
The Commission then writes:
‘The anti-money laundering defences thus depend to a large extent on the
goodwill and efforts of, in particular, the financial sector. The financial sector has
expressed considerable reticence concerning any reporting requirement that would
extend to an excessively wide range of offences, even including relatively minor
ones.’
Which leads the Commission to conclude:
‘The Commission has concluded that for the purposes of the Directive, and its
extension to certain non-financial activities, a reporting obligation based on
serious offences might be too broad. The Commission is therefore proposing that
the reporting obligation under the Directive should be based on activities linked
to organised crime or damaging the European Communities financial interests.’
(emphasis added)
Concretely then, the Proposal now defines ‘criminal activity’ as encompassing
‘participation in activities linked to organised crime’, and ‘fraud, corruption or any
other illegal activity damaging or likely to damage the European Communities’
financial interests’.26
24
See, supra, note 8.
25
See, supra, note 8.
26
Proposal, Article 1(E).
56 Armand Kersten
For the Directive, the Commission has knowingly thrown out ‘serious offences’,
and opted instead for: ‘organised crime’. In the Proposal, ‘organised crime’ means
exactly what it says: ‘involvement of an organised crime group’.27 This clear choice
was made in the face of the noticeable ‘trend’ among the EU Member States to
extend their domestic legislation to outlaw the laundering of the proceeds from a
wide range of ‘serious crime’.28
Conclusion
Where does all this lead? One thing is clear: Money laundering and financing of
terrorism are two completely different concepts. As is implied by the term
‘laundering’, its intent and purpose are to have moneys, derived from crime, assume
an apparent legal role in the financial system without this being known to the bona
fide participants in the financial system. Logically, this presumes the criminal offence
preceding the laundering. Ultimately, if the laundering succeeds, it is instrumental in
having those taking an interest in the crime enjoy its financial benefits.
Money launderers will seek to hide the funds and their origin from detection.
Surely, those contemplating to finance terrorism will strive to hide the funds and
their origin devoted to their cause from detection, too. This may well mean that they
resort to similar techniques to those used by money launderers. It is precisely here
that the strongest analogy between the two phenomena can be seen.
Where financing of terrorism is concerned, possibly no criminal offence preceded
the introduction of the funds in the financial system. Of course, there will be criminal
intent, but it makes no sense to construe the funds used to promote the cause as the
‘proceeds’ of that criminal intent.
Arguably, money laundering, to some extent, engenders the predicate offences.
Clearly, few would commit predicate offences if they did not perceive an opportunity
to ultimately derive the monetary benefit therefrom. Money laundering, however,
does not occur so as to bring about, or facilitate the criminal offence itself (although,
of course, some proceeds may be used to finance criminal operations).
It is suggested that it makes no sense to designate the financing of terrorism as a
money laundering predicate offence. Rather, it should be recognized and
distinguished as a separate category. This is not to say that, in legislating for the
consequences of cases involving the financing of terrorism, one should not draw
upon inferences taken and developed from the classical money laundering apparatus.
27
Proposal, explanatory memorandum, p. 7.
28
See European Commission, Second Commission Report to the European Parliament and the
Council on the implementation of the Money Laundering Directive, XV/1116/97-rev.2 – En,
III, 2
Obstacles in Company Law to Anti-Money
Laundering International Co-Operation in
European Union Member States
Ernesto U. Savona
1. Introduction
1
‘Euroshore – Protecting the EU Financial System from the exploitation of Financial
Centres and Off-shore facilities by Organised Crime’ (Trento Transcrime-University of
Trento 2000) at p. 16 (Final Report prepared for the European Commission, Falcone
Programme 1998).
2
The first case is dealt with in the ‘OECD Report on the Misuse of Corporate Vehicles for
Illicit Purposes, which covers offshore and onshore jurisdictions’ 9 May 2001; the second
case dealt with in this Report initiated in 2001 (contract JHA b/2000/B2 of 25 January
57
58 Ernesto U. Savona
Cont
2001) the main aim of which is to highlight, in EU Member States, those regulations and or
implementations thereof that – in the banking/financial and corporate/company fields –
constitute obstacles to anti-money laundering co-operation.
3
The research carried for the production of the main report was directed by the author, co-
ordinated by Sabrina Adamoli with the co-operation of Andrea Di Nicola and Alessandro
Scartezzini, all researchers at Transcrime-University of Trento. Eddy Wymeersch professor
in Ghent (Belgium) acted as general consultant
4
The first part of the report refers to the banking/financial field. This part has been excluded
from this article.
5
The term ‘patrimonial’ is intended as meaning ‘relating to somebody’s estate’.
Obstacles in Company Law to Anti-Money Laundering 59
2. Main assumption
The main assumption is that the less regulation there is at a national level in the
corporate/company regulative field, and the lower the implementation of the
regulation under consideration, where it exists, the greater the obstacles to anti-
money laundering international co-operation. That means that in order to remove
these obstacles, countries should be called upon to change their regulation in the
field.
Following this assumption, this article intends to answer the following questions:
1. What regulation and/or implementation thereof, in the corporate/company
regulative field, create obstacles to international co-operation between EU
Member States to prevent money-laundering?
2. What is the dimension of the obstacles in these fields?
The following steps have been followed:
analysis of the regulation in order to identify which of the specified transparency
variables involved in international co-operation for the prevention of money
laundering are lacking;
analysis of the implementation of regulation in the corporate/company regulative
fields in order to identify which of the transparency variables involved in
international co-operation for the prevention of money laundering specified
in 1) are lacking;
evaluation of the results of the two analyses of 1) and 2) in order to identify,
60 Ernesto U. Savona
6
Given the complexity of the identified transparency variables, and the necessity to gather
information regarding the implementation of regulation in EU Member States, in
collecting information, preference was given to the answers of the experts to the
questionnaires submitted to them. The criteria used for the choice in case of differing
answers by experts of the same country to the same question is explained on page 144 of the
methodological appendix to the report.
7
The list of experts contacted can be found in the acknowledgements at the beginning of the
main report. As the results are based on their answers to the submitted questionnaires,
some degree of error is due to the opinions expressed by the experts on single transparency
variables. The criteria used for the choice in case of differing answers by experts of the same
country to the same question is explained in the methodological appendix.
8
‘Report on the Misuse of Corporate Vehicles for Illicit Purposes’ (Paris OECD Steering
Group on Corporate Governance 2001); R. Thomas, Company Law in Europe (London
Butterworths 2001); Company Law in Europe: Recent Developments (mimeo) (Manchester
CLAB University of Manchester 1999); M.J. Oltmanns, European Company Structures
(London-The Hague-Boston Kluwer Law International 1998); ‘Prevention of Organised
Crime: The registration of legal persons and the international exchange of information’
final report (T.M.C. Asser Instituut 2000); Modern Company Law for a Competitive
Economy (mimeo) (London DTI London 1998); A.J. Oakley, The Modern Law of Trusts
(London Sweet and Maxwell 1998); A. Sydenham, Trusts (London Sweet and Maxwell
1997); M. Lupoi, Trusts (Milan Giuffrè Editore 1997); D.J. Hayton, Law Relating to Trusts
Obstacles in Company Law to Anti-Money Laundering 61
This section describes the model utilized to analyze data collected for the
corporate/company regulative field, and sets out the conclusions. The assumption
made here was that obstacles to international co-operation in response to money
laundering depend either on a lack of regulation in the regulative field considered,
or in the incomplete/absent implementation of the regulation where it exists. The
purpose of the model is to show where these obstacles are (in which EU Member
State, in which thematic area and at which level), to assess the dimensions of these
obstacles in order to cross-compare them at an EU level, and to propose remedies
that might remove them.
The following steps were taken in developing the model for identifying obstacles
to anti-money laundering international co-operation and assessing their dimen-
sions:
STEP 1: selection of the legal and non-legal structures susceptible to being
used in money laundering operations;
STEP 2: Identification of thematic areas and relative transparency variables;
STEP 3: Analysis of the regulation at the national level;
STEP 4: Analysis of the implementation of the regulation at the national
level;
STEP 5: Cross-comparative analysis of the results;
Cont.
and Trustees (London Butterworths 1995); F. Galgano, Diritto commerciale: le società
(Milano Zanichelli 1999/2000 ed.); The Opacity Index (Price Waterhouse-Coopers 2001)
available on the Internet at <http://www.opacityindex.com>, last visited on 1 June 2001.
9
‘Transparence des structures utilisées à des fins économiques et/ou patrimoniales:
Présentation succinte de la situation actuelle dans les Etats Membres, document de travail
des services de la Commission’ of 5 October 2000 EC DOC. 12088/00. The list was
comprised of the public limited company, the private limited company, the société de droit
civil and its equivalents in other EU Member States, the trust, the società fiduciaria, the
limited partnership on shares, the ordinary partnership, the limited partnership, the co-
operation, the association, the foundation, the association momentanée, the private limited
company with one shareholder, the unlimited company, the European Economic Interest
Grouping, the etablissement public, the association internationale, the groupement
complementaire d’entreprises, and the association en participation.
62 Ernesto U. Savona
units and Financial Intelligence Units in the fifteen EU Member States. With the co-
operation of Europol, the experts were chosen from units which specifically deal with
economic crimes on the basis of their experience and knowledge of money laundering
investigations. The experts acted as a virtual panel to whom responsibility was given
for the selection of the structures susceptible to being used in money laundering
operations. 10
According to the results of this survey, the structures selected for further analysis
were divided into three groups.
Three structures were selected as most susceptible to being used in money
laundering operations by at least 30 per cent of the EU Member States. The
regulation and its implementation in relation to these structures were, therefore,
analyzed in all the EU Member States where they exist. They are:
the public limited company (reported as susceptible to being used in money
laundering operations in 40 per cent of EU Member States and existing in all
of them);
the private limited company (reported as susceptible to being used in money
laundering operations in 67 per cent of EU Member States and existing in all
of them);
the société de droit civil and its equivalent in other Member States (reported
as susceptible to being used in money laundering operations in 37.5 per cent
of the EU Member States where it exists).11
This article covers only the first two company structures, leaving the third to the
main report. Furthermore, the analysis covers the regulation of trusts, selected as
susceptible to being used in money-laundering operations by Ireland, and also
analyzed in the United Kingdom.
10
On the basis of their experience and knowledge of money laundering, experts were asked to
select which legal and non-legal structures are susceptible to being used in money-
laundering operations in their countries and to weigh up their involvement in such activities
using a scale. The structure was selected according to the evaluation of this panel.
11
For the remaining structures in the list, the regulation and its implementation were only
analyzed in the single countries where they were reported as susceptible to being used in
money-laundering operations. The following structures are not part of this article but are
analyzed in the main report:
trusts in Ireland and United Kingdom;
the società fiduciaria was analyzed in Italy, the only country where it exists;
the limited partnership on shares was analyzed in Belgium and Italy;
the ordinary partnership was analyzed in Ireland, the Netherlands and Sweden;
the limited partnership was analyzed in Sweden;
the co-operative was analyzed in Belgium;
the association was analyzed in Ireland and Sweden;
the foundation was analyzed in Austria and the Netherlands;
the association momentanée (unión temporal de empresas) was analyzed in Spain;
the single member private limited company was analyzed in the Netherlands, Spain and
United Kingdom.
Obstacles in Company Law to Anti-Money Laundering 63
12
Their relevance for anti-money laundering international co-operation is explained in
sections from 4.2.1 to 4.2.3 of the main report.
13
Transcrime – University of Trento, in co-operation with CERTI – Bocconi University
(Milan, Italy) and Erasmus University of Rotterdam (The Netherlands), Euroshore;
‘Protecting the EU Financial System from the Exploitation of Financial Centres and Off-
Shore Facilities by Organised Crime, Final Report Prepared for the European
Commission’ (Trento Falcone Programme 1998, January 2000) at pp. 75–77.
14
The most relevant in this context are: First Council Directive 68/151/EEC of 9 March 1968
on co-ordination of safeguards which, for the protection of the interests of members and
others, are required by Member States of companies within the meaning of the second
paragraph of Article 58 of the Treaty, with a view to making such safeguards equivalent
throughout the Community, OJ 1968 L 65/8; Second Council Directive 77/91/EEC of 13
December 1976 on co-ordination of safeguards which, for the protection of the interests of
members and others, are required by Member States of companies within the meaning of
the second paragraph of Article 58 of the Treaty, in respect of the formation of public
limited liability companies and the maintenance and alteration of their capital, with a view
to making such safeguards equivalent, OJ 1977 L 26/1; Fourth Council Directive
64 Ernesto U. Savona
cont.
78/660/EEC of 25 July 1978 based on Article 54 (3) (g) of the Treaty on the annual
accounts of certain types of companies, OJ 1978 L 222/11; Eighth Council Directive 84/
253/EEC of 10 April 1984 based on Article 54 (3) (g) of the Treaty on the approval of
persons responsible for carrying out the statutory audits of accounting documents, OJ 1984
L 126/20.
15
The researchers drafted the variables, subsequently turned into questions and sent in the
questionnaire, keeping in mind the features of legal structures. The same variables, for
analogy, were extended to non-legal structures.
16
FATF, ‘Report on Non-cooperative Countries and Territories’ (Paris FATF 2000) at p. 4.
Obstacles in Company Law to Anti-Money Laundering 65
17
FATF, ‘Report on Money Laundering Typologies 1999–2000’ (Paris FATF 2000) at p. 10
(available on the Internet at <http://www.oecd.org/fatf/pdf/NCCT_en.pdf>).
18
Ibid, at p. 8.
19
Ibid, at p. 9.
20
Specifically, the ‘Report of the Working Group on Offshore Centres’ highlighted how the
integrity of financial systems is hampered by the presence, in offshore financial centres, of
opaque regulation concerning the incorporation and activity of legal entities and of
insufficient control of them. A ‘light and flexible incorporation and licensing regime’
resulting in ‘inadequate due diligence in incorporation and licensing of new financial
institutions and shell companies’ creates the risk that legal entities are incorporated with
illicit proceeds and are subsequently used in money laundering operations. See ‘Report of
the Working Group on Offshore Centres’ (Financial Stability Forum 5 April 2000) p. 12,
available on the Internet at <http://www.fsforum.org/Reports/RepOFC.pdf>.
21
‘Report on the misuse of corporate vehicles for illicit purposes’ (Paris OECD Steering group
on Corporate Governance 2001) at p. 13, available online at <http://www.oecd.org> .
22
According to the International Narcotics Control Strategy Report 1999, a shelf company is
‘a company that has already been incorporated with a standard memorandum and articles of
association and has inactive shareholders, directors, and secretary. When a shelf company is
subsequently purchased, the inactive shareholders transfer their shares to the purchaser and
the directors and secretary submit their resignations. Typically, the authorities need not be
notified when a shelf company is sold’. The end result is that there are companies whose real
beneficial owners and directors are unknown and not checked on by the authorities.
66 Ernesto U. Savona
23
Available online at <http://www.iosco.org/iosco.html> .
24
IOSCO, Objectives and principles of securities regulation, p. 4.
25
‘OECD Principles of Corporate Governance’ (OECD Ad Hoc Task Force on Corporate
Governance 1999) at pp. 19–22, available online at <http://www.oecd.org/daf/govern-
ance/principles.pdf>, visited on 25 July 2001.
68 Ernesto U. Savona
26
OECD Steering Group on Corporate Governance, op. cit., p. 2.
27
OECD Steering Group on Corporate Governance, op. cit., p. 7.
28
‘Actions against abuse of the global financial system’ (Okinawa G-7 Financial Ministers 21
July 2000) available online at <http://www.g7–2001.org/en/okinawaabuse.htm>.
70 Ernesto U. Savona
A policy aimed at reducing opacity in this area should, therefore, include a set of
elements which in this study are identified as the transparency variables of
regulation:
Transparency variable 23 (existence of legal provisions prohibiting the issuance of
bearer shares) is aimed at making it possible to identify the physical persons who
hold shares in the structure itself and possibly in control of it, thus preventing
criminals from controlling structures without disclosing their identities.
Transparency variable 24 (existence of legal provisions requiring that participa-
tion in a company is communicated if a certain (share) threshold is exceeded) is
aimed at making it possible to identify the physical persons with significant
shareholdings in a structure and at increasing the transparency of its ownership.
Transparency variable 25 (existence of legal provisions prohibiting nominee
shareholders) is aimed at preventing a physical person from controlling a structure
by means of nominees (e.g. stockbrokers) who appear in the shareholder register but
make it difficult to establish the identity of the real beneficial owner of the shares.
Transparency variable 26 (existence of legal provisions prohibiting nominee
directors) is aimed at making it possible to establish a connection between a
structure and the physical person running it by avoiding that the real beneficial
owner uses a director for its formal management.
Transparency variable 27 (in case a legal entity is a shareholder, existence of legal
provisions requiring that complete information is supplied, so as to identify the real
beneficial owner) is aimed at making the ownership of a structure more transparent.
When a legal entity holds shares in another legal entity, the chain of corporations
thus generated makes it difficult to ascertain the identity of the real beneficial owner.
Transparency variable 28 (existence of legal provisions prohibiting legal entities
from acting as directors) is aimed at making it easier to understand who holds control
of a legal structure. When a legal structure is a director of another legal structure, the
chain of corporations thus generated makes it difficult to ascertain the identity of the
real and final power-holder.
Transparency variable 29 (existence of legal provisions requiring the disclosure of
the identity of the real beneficial owner of a structure to the authorities) is aimed at
obtaining the identity of the real beneficial owner of a structure on request, by the
public authorities. This makes the ownership of a structure more transparent and
harder to hide behind a corporate shield.
29
‘Annual Report 2000–2001’ (Paris 2001) at p. 16.
Obstacles in Company Law to Anti-Money Laundering 71
seemingly impenetrable anonymity which a trust may provide to the true owner or
beneficiary. This anonymity is enhanced by the fact that documentation of trusts is not
public information. [. . .]possible solutions range from establishing a strict regulatory
regime for trust formation agents (i.e., subject them to licensing, customer
identification, record keeping and reporting requirements) to imposing some sort of
public or semi-public registration requirement on trust creation’.
The reasons why trusts could be used in the money laundering process was
highlighted in the typologies report of February 2001.30
In Ireland and the United Kingdom, where trusts exist,31 the more trust law is
transparent, the more it is possible to establish the identity of the parties of the trust
and to scrutinize the activity of the trustees. Law enforcement authorities can avert
the use of trusts as shields for illegal transactions and exchange significant
information at a transnational level.
Given the diversity between trusts and other legal and non-legal structures,
appropriate indicators of transparency were selected for the analysis of the
regulation of trusts. They were identified by studying the available literature on
their regulation.32 A policy aimed at reducing opacity in the regulation of trusts
should contain a set of elements which, in this Study, are identified as indicators of
transparency in regulation:
Existence of legal provisions requiring written constitution of the trust. This
indicator of transparency has the aim of ensuring the existence of written
30
‘It should be pointed out that a trust is not the same as a company or other form of corporate
entity. When a company is established, it has its own “legal personality” that is separate and
distinct from the natural persons that serve as directors or shareholders. Property held by a
company is owned by the company as a legal person and not individually by the company
directors or shareholders. Property held in trust, on the other hand, is legally owned by the
trustee and no longer by the settlor nor by the beneficiary. Therefore, when dealing with
certain trusts, the work of an investigator may be further complicated by the fact that the
trustee may be a legal person (a trust company for example), and the beneficiary or
beneficiaries may also be trusts (or corporate entities). Establishing whether there are real
persons behind the legal arrangement and that the trust is a sham is a difficult if not impossible
task. Furthermore, trusts differ from corporate entities in that they generally have no
registration requirement or central registry, and there is usually no authority responsible for
oversight of such legal arrangements’. ‘Report on Money Laundering Typologies 2000–
2001’ (Paris FATF 2001) at p. 10.
31
As already mentioned, in the other EU Member States, trusts are not recognized as a
separate legal form, but are recognized if incorporated in accordance with the law of the
‘home’ country, such as Ireland or the United Kingdom.
32
A.J. Oakley: The Modern Law of Trusts, (London Sweet and Maxwell 1998); A. Sydenham,
Trusts (London Sweet and Maxwell 1997); M. Lupoi, Trusts, (Milan Giuffrè Editore 1997);
D.J. Hayton, Law Relating to Trusts and Trustees, (London Butterworths 1995); M.R.
Sancilio, ‘La disciplina del trust’, in Ricerca sul riciclaggio nel contesto dei rapporti tra
economia criminale edeconomia legale. Rapporto sull’attivita’ di ricerca 1 June 1998–31 May
1999 (Rome Ufficio Italiano dei Cambi 2000); S. Gardner, An Introduction to The Law of
Trusts Oxford Clarendon Law Series Clarendon Press 1990).
72 Ernesto U. Savona
evidence that a trust has been set up, granting law enforcement authorities
the possibility to obtain information on trusts and their specific features.
Existence of legal provisions requiring registration of the trust deed in a public
register. This indicator of transparency requires that data regarding the main
features of a trust be centrally registered and publicly accessible. This would
make information about the trust easier to access by the general public and
law enforcement, judiciary and financial authorities, and easier to exchange
at a transnational level.
Existence of legal provisions requiring that the personal particulars of the
settler be included in a public document. This indicator of transparency is
aimed at avoiding the possibility that the settler remains anonymous, by
supplying the general public and law enforcement, judiciary and financial
authorities with information regarding the identity of the original owner of
the capital held in trust. Consequently, this diminishes the anonymity
surrounding the trust.
Existence of legal provisions requiring that the personal particulars of the
beneficiary be included in a public document. This indicator of transparency is
aimed at avoiding the possibility that the beneficiary remains anonymous by
supplying the general public and law enforcement agencies with information
regarding the identity of the person entitled to the benefits derived from the
investments of the trust fund. Consequently, this diminishes the anonymity
surrounding the trust.
Existence of legal provisions prohibiting the settler from also being the
beneficiary of the same trust. This indicator of transparency is aimed at
preventing criminals from exploiting the possibility of formally separating
themselves from the ownership of the proceeds of crime by conferring the
goods to a trust, and receiving the profits thereof by nominating themselves
as the beneficiaries of the same trust.
Existence of legal provisions prohibiting the beneficiary of a trust from being
another trust. This indicator of transparency is aimed at prohibiting the
beneficiary of a trust from being another trust, thus preventing a
supplementary layer of secrecy from being added to the trust and enhancing
the possibility of detecting the identity of the beneficiary.
Existence of legal provisions requiring a public register of trustees. This
indicator of transparency requires that data regarding the identity of trustees
be registered and publicly accessible, thereby making trustee information
available to both the general public and law enforcement agencies.
Existence of legal provisions requiring an authority to supervise the activity of
trustees. This indicator of transparency grants the possibility of scrutinizing
the activities of the persons and companies managing the trust fund and so
making it easier to detect any criminal misuse.
Obstacles in Company Law to Anti-Money Laundering 73
The aim of the data analysis is to understand what are the obstacles to international
co-operation for the prevention of money laundering, where these obstacles are to be
found and at what level (regulation and/or implementation), and what are their
dimensions.
Separate analysis was carried out for each of the structures in EU Member States
identified as being susceptible to use as money laundering operations.
The analyzed regulation and its implementation are summarized in a series of
synoptic tables available in annex B of this report. The tables outline the obstacles to
international co-operation for the prevention of money laundering present in each
EU Member State.33
For each of the structures selected for further analysis and for each variable of
transparency, an index of obstacles to regulation and the implementation of
regulation was calculated, with a view to understanding in which thematic area
obstacles to international co-operation on anti-money-laundering activity are to be
found.34 These indexes represent, on a scale from 0 to 100, the dimensions of the
obstacles created by the absence of regulation and by their incomplete or absent
implementation where the regulation under consideration exists. The higher this
index, the higher the obstacles to international co-operation for the prevention of money
laundering. For each thematic area, these indexes have been subsequently aggregated
in a ‘General index of Obstacles to Regulation’ (GOR index) and in a ‘General index of
Obstacles to the Implementation of Regulation’ (GOI index). They are a quantitative
expression of the obstacles created, in each thematic area and in each EU Member
State, by the absence of regulation and the incomplete or absent implementation of
the regulation under consideration, where it exists.
5.1 Results of the analysis: the regulation and its implementation for the
legal and non-legal structures analyzed in all countries where they
exist
33
The answers given by the experts used for the analysis have not been systematically
crosschecked.
34
For an explanation of the process of calculating these indexes, see section B of the
methodological appendix (step 6).
74 Ernesto U. Savona
The EU average Indexes of Obstacles to regulation and to its implementation set out
in Table 1 are graphically represented in Figure 1.
As can be seen from this figure, the greatest obstacles to international co-
operation for the prevention of money laundering seem to be found in the lack of
regulation in the three identified thematic areas rather than in its implementation.
Where regulation exists, it seems to show a high implementation level. The thematic
area ‘Identification of the true beneficial owner’ is where obstacles to regulation are
the most significant (GOR 62.2). The second area where obstacles to regulation are
to be found is ‘Incorporation’ (GOR 43.8). The analysis conducted by applying the
model shows which of the single transparency variables, in each thematic area, are
the most problematic in terms of obstacles to international co-operation for the
prevention of money laundering.
Obstacles in Company Law to Anti-Money Laundering 75
Main obstacles in the thematic area ‘Identification of the real beneficial owner’
Transparency variable 23 (Existence of legal provisions prohibiting the
issuance of bearer shares) – index of obstacles to regulation 80.0;
Transparency variable 27 (In case a legal entity is a shareholder, existence of
legal provisions requiring that complete information is supplied in order to
identify the true beneficial owner) – index of obstacles to regulation 78.6;
Transparency variable 25 (Existence of legal provisions prohibiting nominee
shareholders) – index of obstacles to regulation 71.4;
78 Ernesto U. Savona
The EU average indexes of obstacles to regulation and its implementation set out in
Table 15 are graphically represented in Figure 5.
As in the case of the public limited company, the greatest obstacles to international
co-operation for the prevention of money laundering seem to be found in the lack of
regulation in the three identified thematic areas rather than in its implementation.
Where the regulation exists, it seems to show a high implementation level. The
thematic area ‘Identification of the real beneficial owner’ is where obstacles to
regulation are the most significant (GOR 56.5), while the second area where
obstacles to regulation are to be found is ‘Incorporation’ (GOR 44.4).
The analysis conducted applying the model shows which of the single
transparency variables in each thematic area are the most problematic in terms of
obstacles to international co-operation for the prevention of money laundering.
Main obstacles in the thematic area ‘Identification of the real beneficial owner’
Transparency variable 27 (In case a legal entity is a shareholder, existence of
legal provisions requiring that complete information is supplied, so as to
identify the real beneficial owner) – index of obstacles to regulation 85.7;
Transparency variable 24 (Existence of legal provisions requiring that
participation in a company is communicated, if a certain (share) threshold is
exceeded) – index of obstacles to regulation 76.9;
Transparency variable 29 (Existence of legal provisions requiring the
disclosure of the identity of the real beneficial owner of a company to the
authorities) – index of obstacles to regulation 64.3;
Transparency variable 26 (Existence of legal provisions prohibiting nominee
directors) – index of obstacles to regulation 61.5;
Transparency variable 25 (Existence of legal provisions prohibiting nominee
shareholders) – index of obstacles to regulation 57.1.
5.1.3 Trust
The regulation of trusts was analyzed in Ireland (which mentioned them as
susceptible to being used in money laundering operations) and the United Kingdom.
In order to analyze the regulation of trusts, which differ from all the forms studied in
this report, appropriate indicators of transparency were selected. Their relevance for
international co-operation for the prevention of money laundering is explained in
section 8.2.4.
The following table highlights the results of the analysis in relation to the
existence of legal provisions, which should ensure transparency of trusts.
Obstacles in Company Law to Anti-Money Laundering 83
As can be seen in this table, the regulation of trusts allows for a high level of opacity.
The basic rule is that no formalities are required, and so a trust can be constituted
orally. The decision depends on the importance that the parties attribute to having
written evidence of the transaction, and what is entailed. Even though the possibility
of constituting trusts orally attributes flexibility to the instrument (allowing the
creation of a trust whenever two subjects – the settlor and the trustee – voluntarily
agree to create one), this might obstruct investigations into money laundering by the
authorities. Official trust registers for registering trust deeds do not exist, even where
trusts are incorporated in writing and the identities of the parties, therefore, remain
unclear. Furthermore, there are no restrictions on who can be a trustee nor is there a
register of the details of the identity of the trustees, and this makes tracing them very
difficult. The same obstacles to identification appear to apply to the settlor, whose
identity does not need to appear on any document. The beneficiary of a trust may be
a company or another trust, not only a physical person or several persons. In the
former case, there is an additional layer of confidentiality regarding the beneficiary.
There is some opacity in the management of the trust as well. There is no
authority that supervises the activity of trustees. The latter only have general
limitations as regards the administration of the trust fund, but there is no actual
examination of single investments by any person or authority.
This difficulty in detecting the existence of a trust and the identity of its parties,
together with the absence of supervision of the trustees and the possibility that the
settlor or another trust might be the beneficiary, can be misused by criminals. In fact,
money launderers can invest the proceeds from crime in a trust thereby formally
separating themselves from the ownership of the money and assets, and exploit the
confidentiality surrounding the trust to reduce the risk of being identified. Where a
criminal is both the settlor and the beneficiary, he will formally separate himself
from the ownership of the dirty proceeds by attributing them to a trustee, but
actually obtain the benefits from the investment himself.
6. Conclusions
The results illustrate that, as far as the public and private limited companies are
concerned, the greatest obstacles to international co-operation for the prevention of
money laundering are to be found in the thematic area ‘Identification of the real
beneficial owner’.35 The main obstacle is a lack of regulation requiring full
information regarding the real beneficial owner of a public or private limited
company, especially when a legal entity is a shareholder or director, or the issuance
35
The relevance of this area for anti-money laundering international co-operation is outlined
at section 9.2.3 of the report.
84 Ernesto U. Savona
of bearer shares is permitted. Furthermore, some problems seem to arise from the
fact that, in some EU countries, the regulation allows for nominee shareholders and
directors.
The thematic area ‘Incorporation’ also presents obstacles to international co-
operation for the prevention of money laundering, even though to a lesser degree
than the former. Lack of regulation in this area makes it more difficult to acquire
information about the physical persons party to the creation of legal structures and
increases the possibility that these might be used for criminal purposes. Scrutiny in
this area would raise the costs incurred by criminals when using legal structures for
money laundering and increase the amount of information available to law
enforcement, judicial and financial authorities, thereby facilitating national and
international investigation of the operations of those companies. Some EU Member
States permit shelf companies, that is, previously incorporated companies with a
standard memorandum and articles of association with inactive shareholders,
directors and secretary. Often, authorities do not need to be informed when such
companies are sold and their secretary, directors or shareholders are replaced. This
makes it more difficult to thoroughly investigate the real beneficial owner, given that
shelf companies are incorporated with a very flexible procedure. Furthermore, many
EU Member States do not investigate the founders of a company or ascertain the
legal origin of the incorporation capital.
The European Commission might, therefore, consider taking action to define
more specific and stringent guidelines for EU Member States in the thematic areas
mentioned above, relevant to anti-money laundering international co-operation.
This would increase transparency of the whole corporate/company regulative field
and make information available to law enforcement, judiciary and financial
authorities dealing with national money laundering cases, thus facilitating
international co-operation for the prevention of money laundering.
The analysis of regulation covering trusts has shown it as being characterized by
great opacity and absence of all those provisions relevant for international co-
operation for the prevention of money laundering. Their regulation and the
confidentiality of their constitution hinder the gathering of information about the
people setting them up and their management structure. This opacity creates
obstacles to international co-operation for the prevention of money laundering
because of the lengthy process in getting information.
Corporate and/or company regulation, which today is undergoing extensive
reforms in the area of corporate governance in the EU Member States, should pay
more attention to the benefits that transparency would bring to international co-
operation for the prevention of money laundering. The Euroshore report highlighted
the strategic importance of this area for international co-operation for the
prevention of money laundering and this article illustrates the associated obstacles
and their dimensions. Until now, questions relating to corporate governance have
mainly been restricted to the national level. It appears however that the European
Commission launched a study in December 2000 on codes of corporate governance
in the EU. A final report is expected by the end of 2001. In addition, the Commission
Obstacles in Company Law to Anti-Money Laundering 85
has announced the setting up of a high level group of experts in corporate law who
will produce a report by June 2002. There may be scope within these initiatives to
tackle the issue of transparency as defined in the main report and in this article.
Having a European Directive on banking and financial regulation, without a set of
European standards on key issues in corporate governance, makes the whole anti-
money laundering regime unbalanced and weak.
This page intentionally left blank
Terrorist Finance, Money Laundering and the
Rise and Rise of Mutual Evaluation:
A New Paradigm for Crime Control?
Michael Levi* and William Gilmore**
Introduction
The discourse of risk and globalization has become a very popular one, both among
social analysts and within the business and intelligence ‘communities’. Implicit and/
or explicit risk judgments have long been central to the financial world and its
policing: the key question is which risks are being considered and whether we have
the knowledge and operational models to incorporate them. Bankers, lawyers and
law enforcement personnel are forced by pressure of circumstances to live so much in
the present that it is difficult to see how far we have travelled in the era beginning
approximately in the mid–1980s since money laundering first became a term with
which bankers and lawyers were expected to be acquainted. The authors crave the
readers’ indulgence therefore for some historical development of the paradigm of
banking and law enforcement to set alongside the other contributions to this volume.
In making such a contribution, the authors want to clarify how far the risk paradigm
has entered the general world of ‘law and order’, at least in the UK. 1
The allocation of scarce policing and surveillance (including private sector)
resources inevitably entails the conscious or taken-for-granted allocation of
priorities. Goal displacement is commonplace, as interest groups seek (consciously
or not) to further their own objectives at the expense of the proclaimed objective.
Nevertheless, resource allocators have to decide which are the most serious – in
87
88 Michael Levi and William Gilmore
terms of both ‘objective’ harm 2 and media-constructed harm that turn into political
and organizational priorities – current and future events with which they wish to deal
in relation to the resources that they have available. This relationship is a naturally
dynamic one, in the sense that left to themselves, organizations tend to focus on the
short-term politically (with small or large ‘p’) pressed priorities and to neglect the
longer term structural issues: in this human process, stated goals are often eroded
except when organizations insist on the pursuit of their operational plans. The latter
style is often condemned by pragmatists as ‘inflexible’ (and is one of the features of
totalitarian centrally planned economies), despite the consistency that such
adherence to policy brings compared with the legal dictum of ‘taking each case on
its merits’, which latter can amount to little more than a justification for
unselfconsciously erratic policy-making. In contemporary policing, for example, in
making decisions about how much surveillance particular released sex offenders
‘need’, explicit risk assessments are made, though there may not be the resources to
accommodate all those who need high supervision and therefore actual time devoted
to each high-risk person may be scaled down.3 Public order policing similarly is risk-
based, though not normally on the basis of clinical judgments about the risks from
individual people.
By contrast with modern banking, 4 the discourses of international bodies such as
the Financial Action Task Force are primarily oriented not so much towards risk-
management as towards national and institutional obligations to reduce crime
facilitation. In this sense, though intended to be applied within the context of
globalization, they sit securely within the absolutist ‘law and order’ control mode
rather than with some other risk optimization mode. Despite the rhetoric of
‘financial crime risk management’, this is based on modest scientific foundations in
many areas: despite typologies exercises, there is insufficient hard, systematically
collected evidence of the extent and forms of fraud and, especially, of money
laundering5 to enable sensible universally agreed judgments to be made. One should
have sympathy for the inherent difficulty about the publication of advice on modi
operandi of terrorism finance and on the laundering of other forms of crime, since the
availability of information of this kind to financial institutions around the globe
2
Some readers may not believe in the concept of objective harm but, by analogy with Bishop
Berkeley’s refutation of the solipsistic fallacy, there are self-evident effects of terrorist
attacks that are physically objective. This is so even though some might not define
martyrdom as a ‘harm’ and the slaughter of enemies as not harming the innocent or even
(as in genocide) not harming persons of the same human status as the perpetrators.
3
M. Maguire, ‘Policing by risks and targets: Some dimensions and implications of
intelligence-led crime control’ in (2000) 9 Policing and Society 1
4
See Charles Freeland, ‘How Can Sound Customer Due Diligence Rules Help Prevent the
Misuse of Financial Institutions in the Financing of Terrorism’ in (2002) 4 European
Journal of Law Reform 2, and the standard setting of most bank regulators
5
See, for example, the current advice given to financial institutions by FATF on profiles of
terrorism for anti-laundering detection purposes.
A New Paradigm for Crime Control 89
inevitably gives rise to leakage to some offenders and thus serves as counter-
intelligence.6 Conversely, regulators and policing agencies should understand that if
they cannot specify and/or are unwilling to specify the plausible forms of laundering
– often on the expressed grounds that they do not want to constrain the
identification and reporting behaviour of regulated persons – it may be unfair to
expect financial institutions to do so. As money-laundering legislation shifts from
criminal penalties for ‘failing’ to report crimes one did actually suspect to those for
‘failing’ to report crimes one ‘objectively’(?) ought to have suspected,7 this tension
about reasonable expectations will become progressively greater.
But these are not the only difficulties. For example, there are resource constraints
that arise in relation to the ‘War on Terrorism’. Governments for whom terrorism
risks against domestic targets are modest may be reluctant to divert resources away
from local crime concerns (or non-policing needs such as health and education) to
help to reduce terrorism risks in other countries; while Western countries such as the
UK (since ‘the Troubles’ in Northern Ireland in the late 1960s) and, more recently,
the US, more willingly divert resources from domestic crime issues which do concern
the public8 to dealing with terrorist threats. A key motivator for this transnational
transformation of defences against terrorism is the global reach of threats not just to
embassies and other governance institutions overseas but also to corporate interests
worldwide. Again, there is nothing new about this risk from globalization to the
national economic interests of superpowers: as their role in defending the British
East India Company and West Indian plantations illustrates, 18th and 19th century
policing in colonies was usually directed towards the preservation of overseas assets,
and such threats often contained a cultural or ideological component as well as any
desire to take property for resale and economic gain.9
6
This is so a fortiori if the information is placed on websites. The UK National Criminal
Intelligence Service and some other European FIUs such as the Netherlands are developing
limited access extranets, but counter-intelligence risks still remain.
7
For such shifts towards ‘objective’ obligations, see the Second Directive on Money
Laundering agreed by the EC and the European Parliament at the end of 2001, and the
Proceeds of Crime Act 2002 in the UK.
8
Rates of street and household crime have been falling since 1998 to the time of writing, but
fear of those crimes has not been falling. Whether Enron employees and ex-employees in
Texas (as opposed to New York and Washington) would be (now and in the past, with the
benefit of hindsight) rational to fear terrorism more than to fear the collapse of their own
pension funds and employment is a more complex issue that lies outside the scope of this
article.
9
Indeed, the tradition of the police serving (and/or being perceived as serving) the interests
of the state rather than those of the local population and crime victims is one of the more
unfortunate legacies of colonialism that community policing strategies have had great
difficulty in overcoming. The fact that no-one then called these ‘anti-globalization’
protests (for the term had not been invented) does not make that any less accurate as an
ascription.
90 Michael Levi and William Gilmore
10
It is not suggested that this is simple game theory. Through ideological hegemony, the
marshalling of political support and party and/or personal financing, corporate actors can
wield enormous influence.
11
The authors have avoided the tempting term ‘collectivity’ because it can be argued that this
implies harmonious purposes among states: the extent to which the collaboration of all
states is required differs by type of crime: fewer states need to co-operate to deal with
maritime piracy than with money laundering or intellectual property violations, since
technology makes the latter sites very portable with low capital costs.
12
The authors are not positing an optimal or ‘rational’ model here. Every launderer has his or
her own information set and contacts, and in an imperfect market of knowledge
asymmetries, there is no one model that fits all.
13
W. Wechsler, ‘Follow the Money’ in (July/August 2001) 80(4) Foreign Affairs 40.
A New Paradigm for Crime Control 91
New York and Washington in September 2001 (and, for that matter, before the
collapse of Enron in December 2001), there was widespread official fear of ‘the dark
side of globalization’. The latter brings together a variety of themes and a variety of
political positions from financial regulators concerned about unmonitored ‘off-the-
books’ (though often legal) transactions conducted by vast commodity hedging
funds held in offshore finance centres; through law enforcement agencies bothered
about ‘the’ Mafia and international terrorist networks; to aid agencies troubled by
the ‘export’ (that is, theft) of funds by Third World potentates into covert individual
and corporate accounts held in offshore finance centres. Terrorist finance generates a
threat to the security of international capital and the lives of financial services
employees as well; so (to a greater extent than with drug trafficking or tax evasion,
for example) self-interest may reasonably temper profit maximization if institutions
believe that the identification of terrorist finance can protect them or activities in
which they have a stake.14
The ideological and value threat of terrorism thus constitutes a distinction from
organized crime and other ‘threats to society’. One of the special features of terrorist
fund laundering is that it explicitly aims to examine the proceeds of legitimate-source
activity actually used or intended to be used for (rather than deriving from) a
criminal purpose; in that sense, its closest analogues are (1) the corporate and
political ‘slush funds’ used for transnational corruption and political finance, and (2)
tax evasion on non-criminal activities. This broad approach is crucial if anything
approximating a plausible effort is to be made in restricting terrorists’ access to
funds; though on a harm reduction model, it may make some sense to restrict flows
to particular terrorist groups from particular sources without necessarily having a
major impact on the totality of terrorist finance.15
This article shall review how the international ‘community’ strives to counter the
anomic, crime-facilitative effects of globalization by rowing against the tide of
economic liberalization in the name of global crime control and financial stability. 16
Thus, there is a sometimes faltering attempt to create a new world anti-crime order
(of which measures against terrorism are a part) as a component of, or supplement
to, the New World Economic Order. There will be a review of the growth of ‘soft
law’ instruments and cascading peer group pressures and their gradual transforma-
14
This stake might include businesses or governments to which they have loaned money,
whose security as well as whose business plans may be disrupted both by actual and fear of
terrorism. Contrariwise, the reporting of suspected terrorist finance also can bring physical
risks to staff should they be identified – directly or by logical deduction – as the source of
the information.
15
To avoid accusations of naivety, it is necessary to recognize that terrorist funding can come
from the West as well as from the ‘rogue states’ defined by the US.
16
A cynic might suggest that these controls are taken in the interests of Western capitalist
security, but given the number of Third World countries devastated by the looting of both
overseas aid and domestic assets by their corrupt potentates, the authors regard this as a
very partial analysis.
92 Michael Levi and William Gilmore
The regulation of the money trail relates to any crimes that require and/or generate
significant crime proceeds requiring more than short-term storage. Drug trafficking
was the precursor for international policing expansion by US agencies such as the
DEA17 and by the military and intelligence agencies in the post-Communist era, but
though proactive ‘special investigative methods’ have expanded everywhere, none of
them can plausibly prevent all drugs, people, or contraband smuggling. Therefore
the attempt to monitor financial transactions and confiscate crime proceeds beyond
the borders of individual governments was the obvious next key strategy in the
transnational ‘organized crime’ containment programme.18 Though it was never
clear whether such monitoring and confiscation constituted a sufficient as well as
necessary condition for success (nor how it would be identified if and when ‘success’
had been attained), success was believed to require a major global infrastructure of
compatible legislation and mutual legal assistance both for financial investigation
and for proceeds of crime restraint and confiscation. The US, supported from the
start by Australia, France and the UK, was the principal enthusiast for anti-
laundering measures to attack kingpins of the drugs trade but, as Gilmore has
observed,19 the extraordinary rapidity (less than two years) with which the 1988 UN
Vienna Convention came into force is testimony to the power of drug issues in the
political culture of nations around the world. Despite such political consensus,
however, the G–7 took an early decision in 1989 to create a new (temporary) body,
the Financial Action Task Force, rather than leaving it to the UN to serve as the
efficient instrument of these anti-laundering measures. Since that date, measures to
control the money trail have proceeded along two axes:
1. The increased drawing of financial institutions into playing public functions,
via the imposition of requirements (a) to report suspicions and – just as
17
E. Nadelmann Cops Across Borders (University Park Pennsylvania State University Press
1993).
18
See for recent developed notions of this, e.g., Office of National Drug Control, National
Drug Control Strategy (Washington DC Office of national Drug Control Policy 2002);
State, Money-Laundering and Financial Crimes (Washington DC US State Department
2001); Treasury, The 2001 Money Laundering Strategy (Washington DC US Treasury
Department in consultation with the US Justice Department).
19
W. Gilmore, Dirty Money: The Evolution of Money Laundering Counter-Measures
(Strasbourg Council of Europe Publishing 1999, 2nd ed.).
A New Paradigm for Crime Control 93
20
Of the many other lists, perhaps the most significant are those issued under the authority of
the UN Security Council requiring the immediate (and indefinite) freezing of the assets of
stipulated natural and legal persons. See in particular the ‘Taliban’ lists made under the
authority of Resolution 1267 of 15 October 1999 and the ‘Al-Qaeda’ list mandated by
Resolution 1333 of 19 December 2000. As explained elsewhere in this article, these lists are
legally binding on all member States because they are measures taken under Chapter VII of
the UN Charter.
21
Prior to 11 September 2001, the money-laundering nexus had only intermittently sought to
bridge crimes for economic gain with terrorism. The UK Prevention of Terrorism
(Temporary Provisions) Act 1989 included several measures intended to clamp down on
terrorist finance (and Northern Ireland legislation gave greater powers in the province), but
the most explicit link came in June 1995 when President Clinton wrapped up terrorist
threats with international organized crime when he told the UN that ‘the threat to our
security is not in an enemy silo, but in the briefcase or the car bomb of a terrorist. Our
enemies are also international criminals and drug traffickers who threaten the stability of
new democracies and the future of our children’. (President Clinton, Address at the United
Nations Fiftieth Anniversary Charter Ceremony, San Francisco, 26 June 1995. Text
available at <www.defenselink.mil/1995/s19950626-clinton.html>)
In Presidential Decision Directive [PDD] 42, dated 21 October 1995, President Clinton
asserted that ‘ international organised criminal enterprises [. . .] are not only a law
enforcement problem, they are a threat to national security’. In Executive Order 12,978 [21
October 1995, 1995 USCCAN B106], effective the same day and never rescinded, he
declared a ‘national emergency to deal with that threat’. Federal agencies were directed to
take ‘all appropriate actions within their authority to carry out this order’. The primary
and over-riding common purpose of the Directive and the Executive Order was ‘to protect
the welfare, safety and security of the United States and its citizens’, though there was some
recognition of obligations to others.
22
Prior to the 11 September terrorist attacks in the United States, the issue of terrorist
financing had not assumed a position of prominence in the activities of the FATF, though
it had in some individual jurisdictions such as Northern Ireland (see Levi and Osofsky,
1995). On 24 September the Ecofin Ministers of the 15 EU members called for the mandate
of the FATF to be broadened so as to cover the terrorist issue. On 6 October 2001, G-7
finance ministers called upon the FATF to include specific treatment of terrorist funds in
94 Michael Levi and William Gilmore
cont.
the current revision of the 40 Recommendations; to issue special guidance on the subject to
financial institutions; and to develop a process to identify countries that facilitate terrorist
financing and to propose a course of action to achieve co-operation from such
jurisdictions. An emergency plenary meeting of the FATF was held in Washington DC
on 29–30 October 2001. It agreed on eight special recommendations on terrorist financing
and a plan of action ‘to secure the swift and effective implementation of these new
standards’. A declaration by the EU heads of state and the commission of 19 October 2001
called for ‘effective measures to combat the funding of terrorism by formal adoption of the
Directive on money laundering and the speedy ratification by all Member States of the
United Nations Convention for the Suppression of the Financing of Terrorism. Moreover,
the commitments made in the FATF, the mandate of which must be broadened, must be
turned into legislative instruments by the end of the year’, i.e., 2002.
23
M. Levi, ‘Pecunia non olet: cleansing the money launderers from the Temple’, in (1991) 16
Crime, Law, and Social Change 217.
24
M. Gold and M. Levi, Money-Laundering in the UK: an Appraisal of Suspicion-Based
Reporting (London Police Foundation 1994).
25
The 1999 FATF interpretative note tries to find an intermediate position and to get
financial and other regulated bodies to report suspicions even when a ‘tax’ explanation is
given, at least where it is not obvious that tax evasion actually is involved. This stales:
‘In implementing Recommendation 15, suspicious transactions should be reported by
financial institutions regardless of whether they are also thought to involve lax matters.
Countries should take into account that, in order to deter financial institutions from
reporting a suspicious transaction, money launderers may seek to state inter alia that
their transactions relate to tax matters.’
A New Paradigm for Crime Control 95
26
See Gilmore supra note 19, and M. Pieth, Die Bekämpfung der Geldwäscherei – Modellfall
Schweiz?, (Basel and Frankfurt am Main 1992).
96 Michael Levi and William Gilmore
27
W. Gilmore (ed.) International Efforts to Combat Money Laudering, (Cambridge Grotius
1992) at p. 24.
28
A third but little used device is known as a cross-country review. This is intended to provide
an analysis of the implementation of specific recommendations by the membership as a
whole.
29
‘FATF Annual Report 1999–2000’ (Paris FATF 2000) at p. 20.
30
See, e.g., ‘FATF Annual Report 2000–2001’ (Paris FATF 2001) at pp. 13–14. The FATF
has decided to complete an early self-assessment exercise to ascertain the degree of
compliance by its members with the new recommendations on the financing of terrorist
activities.
31
See ‘FATF Annual Report: 1996–1997’ (Paris FATF1997) at p. 10. Although there were
only 26 members in the relevant period, a total of 28 evaluations were undertaken; this
A New Paradigm for Crime Control 97
cont.
included assessments of Aruba and the Netherlands Antilles, which are separate
constituent parts of the Netherlands which is a member of the FATF.
32
‘FATF Annual Report: 1997–1998 (Paris FATF 1998) at p. 8
33
For this reason (among others), the Multilateral Evaluation Mechanism (MEM) being
operated by the Inter-American Drug Abuse Control Commission of the OAS to monitor
compliance with the anti-drug strategy of the hemisphere cannot be regarded as a system of
mutual evaluation as that term is used in this paper. In the CICAD process, each evaluated
country provides data in response to a standard questionnaire as well as a paper on its drug
problem on the basis of which a governmental expert’s group, representing all 34 Member
States, drafts jurisdiction specific reports including recommendations for improvement.
There is no on-site visit element to the process (which also excludes sanctions of any kind).
However, the process does include detailed coverage of the issue of money laundering and
extends to the monitoring of the implementation of country specific recommendations.
34
P. Moulette, ‘The Mutual Evaluation Process of the Financial Action Task Force on
Money Laundering’ (PC-R-EV(98)1, 29 January 98) (Strasbourg Council of Europe 1998)
at p. 25.
35
‘Review of FATF Anti-Money Laundering Systems and Mutual Evaluation Procedures
1992–1999’ (Paris FATF 2001) at p. 37.
36
Ibid. at pp. 37–38.
98 Michael Levi and William Gilmore
during which time it meets those ministries and institutions (public and private) with
a mandate or substantial practical involvement in the anti-money laundering sphere.
The team then prepares a detailed report, including the identification of deficiencies
and suggestions for improvement, which is discussed in and adopted by a plenary
meeting of the Task Force. Although each such report is and remains confidential,
agreement was reached to make executive summaries public. These are contained in
the annual reports of the work of the FATF, which can now be accessed by the
general public on the Internet.
Detailed procedures, rules and expectations have been developed to govern all of
the stages of this innovative and intrusive process,37 the comprehensive exposition of
which lies beyond the scope of this article. However, while the system has evolved
over time, a significant effort has been made from the outset to ensure equality and
consistency of treatment of evaluated jurisdictions and a recent internal review has
concluded that, by and large, these goals have been met.38
Although the self assessment and mutual evaluation procedures were developed
with existing Member States and territories in mind, they have been used in two
situations which were not fully envisaged at the outset; in relation to institutional
members and in the context of the recent limited programme of geographic
expansion of membership. The European Commission and the GCC are full
participants within the FATF, but – perhaps significantly for anti-terrorism
purposes – while all fifteen European Union States are members, none of the six
members of the GCC (Bahrain, Kuwait, Oman, Qatar, Saudi Arabia and the United
Arab Emirates) are Task Force participants in their own right.
Over time the absence of regular monitoring procedures for these countries
emerged as a source of concern, connected at least in part to terrorism and the fear
thereof. In May 1997 agreement was reached on how to carry out an evaluation of
the measures taken by them. The first step was to distribute self-assessment
questionnaires. Unfortunately the partial and incomplete nature of the subsequent
returns made it impossible to form a view as to the state of compliance.
Consequently, it was agreed that a high level FATF mission would be despatched
to the Council Secretariat to seek further information and ‘to discuss how to
improve the implementation of effective anti-money laundering systems in the Gulf
region’.39 This mission eventually took place in January 1999 and resulted in a
commitment to provide all outstanding information required for the self-
assessment exercise. In addition, the discussions set in train a process which was
to result in all GCC members save Saudi Arabia agreeing to undergo mutual
evaluation.40 However, ‘given the unique position of the GCC[. . .]it was decided
37
Ibid, at 35–42; R. Sansonetti, The Mutual Evaluation Process: A Methodology of
Increasing Importance at International Level’ in (2000) 7(3) Journal of Financial Crime 218
at 219–220.
38
See FATF supra note at p. 13.
39
See FATF supra note at p. 11.
40
‘FATF Annual Report: 1998–1999’ (Paris FATF 1999) at p. 30.
A New Paradigm for Crime Control 99
41
See FATF supra note at p. 24.
42
See FATF supra note at pp. 14–15; Saudi Arabia has since submitted a self-assessment to
the Secretariat of the GCC.
43
See FATF supra note at p. 8.
44
See FATF supra note at p. 7.
45
Potential new members include Russia, India, China and South Africa. A curious feature of
this list is that Russia, as will be seen below, is presently on the FATF blacklist of NCCTs.
46
D. Griffiths, ‘International Efforts to Combat Money Laundering: Developments and
Prospects’, in Action Against Transnational Criminality: Papers from the 1993 Oxford
Conference on International and White Collar Crime (London Commonwealth Secretariat
1994) p. 11 at p. 13.
100 Michael Levi and William Gilmore
check on the measures adopted in response to the deficiencies identified in the earlier
report.47
While these periodic reviews have been sufficient to secure substantial
improvements in many FATF members, compliance with the forty recommenda-
tions is incomplete. For this reason, the Task Force has formulated a policy
(unchanged since 1994) which reflects a graduated approach. At its most basic and
frequently invoked level, this takes the form of a requirement for the country
concerned to make periodic reports. As one insider has noted: ‘when a country fails
to comply with a large number of FATF recommendations, we initiate a follow-up
procedure, a major feature of which is the obligation to submit regular progress
reports on the implementation of the recommendations. There would be no point in
completing an evaluation and then ignoring the result.’ 48
When this tactic for increasing peer pressure fails, additional steps may be taken,
as happened with Turkey in 1995—96. Its failure, inter alia, even to enact basic anti-
money laundering legislation had placed it in a position of serious non-compliance
with the recommendations. Accordingly, the FATF president first wrote to relevant
ministers in that member country expressing concern. Subsequently, a high level
mission was sent to Ankara to encourage the government to take urgent action or
face the possibility of having more serious steps taken against it. Finally, on 19
September 1996, the FATF issued a public statement in which it invoked its so-called
Recommendation 21 procedure against a member for the first time.49
This prospect of financial near-paralysis seems to have had the effect of
stimulating the attention of policy makers and others in Ankara, and in November
1996 Turkey enacted and brought into force the Law on the Prevention of Money
Laundering. The Recommendation 21 measures were then lifted.
Concerns over partial non-compliance by other FATF members have been
frequently expressed. Of these, the most serious to date related to Austria, which had
declined to abolish anonymous passbooks for Austrian residents in spite of the fact
that this was regarded as a clear breach of the requirements of Recommendation 10.
As a result, the FATF policy was triggered. The president first wrote to the Austrian
Government about this matter, but when this did not lead to change, a high level
47
A recent FATF internal review reveals significant differences in the level of positive
responses to such recommendations from the first round: ‘When averaged out across all the
members[...], approximately the same number of suggestions were implemented as those
that were not’ (see FATF supra note at p. 34).
48
See Moulette supra note at p. 27)
49
Recommendation 21 of the FATF states: ‘Financial institutions should give special
attention to business relations and transactions with persons, including companies and
financial institutions, from countries which do not or insufficiently apply these
Recommendations. Whenever these transactions have no apparent economic or visible
lawful purpose, their background and purpose should, as far as possible, be examined, the
findings established in writing, and be available to help supervisors, auditors and law
enforcement agencies.’
A New Paradigm for Crime Control 101
mission was dispatched to Vienna without success. The Task Force invoked
Recommendation 21 and called on financial institutions to give special attention ‘to
transactions with bank cheques issued by Austrian banks and denominated in
Austrian schillings, as these funds might be the result of the closing of anonymous
passbook savings accounts’. In the news release of 11 February 1999 which announced
this measure, the FATF indicated that it would continue to monitor the situation.
When even this robust (in international relations terms) stance failed to bring
about the desired change in policy the Task Force, at its February 2000 meeting,
took the unprecedented step of agreeing – and agreeing publicly – to suspend Austria
from membership unless, by 20 May:
‘1. The Austrian government issues a clear political statement that it will take
all necessary steps to eliminate the system of anonymous passbooks in
accordance with the 40 FATF Recommendations by the end of June 2002.
2. The Austrian government introduces and supports a Bill into Parliament
to prohibit the opening of new anonymous passbooks and to eliminate
existing anonymous passbooks in accordance with the above paragraph.’50
Whether to mitigate public shaming or from fear of economic consequences, the
Austrian government soon took the required steps, leading to the lifting of the threat
of suspension.51
However, questions have been raised about the willingness of FATF to apply
consistent principles to more powerful nations than Turkey or Austria: the prime
candidate here is the US, whose 1997 and subsequent evaluations might appear to
merit more severe treatment than it has received.52 The operation of the non-
compliance policy ‘relies on a combination of the compliance findings under mutual
evaluation reports and the self-assessment exercise’,53 though both the non-
compliance strategy and mutual evaluation have had the original 1990 recommenda-
tions as the frame of reference whilst self assessment relates to the recommendations
as amended in 1996. These should however be brought into alignment in the course
of the third round (although as noted earlier, the next round will also be out of ‘sync’
with the new recommendations).54
50
OECD News Release, Paris, 3 February 2000.
51
See FATF supra note at pp. 20–22; K. Alexander, ‘The International Anti-Money
Laundering Regime: The Role of the financial Action Task force’ in (2000) 1(1) Financial
Crime Review 9 at 19.
52
The Economist, 23 June 2001, at p. 801.
53
See FATF supra note at p. 43.
54
See FATF supra note at pp. 17–18
102 Michael Levi and William Gilmore
that the process had ‘proven to be, by and large, an effective and efficient one, which
utilises relatively few resources to obtain significant results’.55 A broadly similar view
has been taken in the literature. 56 Sansonetti noted that the process ‘is one of the
cornerstones of the FATF and has proven to be the most successful element of its
activities’.57 The Task Force has created an ever-growing number of regional anti-
money laundering bodies, most recently in Africa and South America. These
regional structures differ in practice, procedure and emphasis in response to regional
needs, practical local realities and political sensitivities. Similarly, the nature and
intensity of the relationship with the FATF itself differs from case to case, but there
is always some involvement with the FATF secretariat, and such bodies as the
Offshore Group of Banking Supervisors conduct joint OGBS/FATF evaluations.
The rather awkwardly entitled Select Committee of Experts on the Evaluation of
Anti-Money Laundering Measures (PC-R-EV) is supported by the Secretariat of the
Council of Europe in Strasbourg, and its processes of self assessment and mutual
evaluation are undertaken against a more extensive set of anti-laundering standards
than those applied to FATF members. Thus, in addition to the Forty
Recommendations, participating countries are assessed in relation to their
compliance with the 1988 UN and 1990 Council of Europe conventions, and the
1991 EC Directive.58 All members report back to a plenary meeting one year after
being subject to mutual evaluation on their own progress made towards
implementation of the recommendations contained therein.59 Members cannot be
suspended, though the Recommendation 21 procedure for ‘special attention to
transactions’ may be applied.60 At its January 2001 plenary, it was agreed that in
principle the second round of evaluations, which has now commenced, should
include at least one FATF evaluator in each team.61 Clearly, the political principle is
to get Member States to ‘buy in’ to the legitimacy of the process and to the outcomes
generated by that process under the watchful eye of FATF.
The June 1996 annual report noted that ‘where a non-member has successfully
gone through a mutual evaluation by an international organisation, using a
methodology in line with FATF standards, and is in compliance with the FATF
forty recommendations according to this evaluation, that non-member should not
fall under the policy outlined in Recommendation 21’.62 Conversely, a mutual
55
See FATF supra note at p. 49.
56
S. Morris, ‘Mutual Evaluation: An Approach to Achieving Fairness and Progress in
Implementing International Agreements’ in (1999) 15(7) International Enforcement
Reporter 285; S. Morris, ‘Mutual Evaluation Systems’ in (2000) 15(4) American University
International Law Review 792.
57
See R. Sansonetti (2000) at p. 218.
58
‘PC-R-EV: Annual Report 2000’ (Strasbourg Council of Europe 2000) at p. 41.
59
Ibid, at pp. 5, 8.
60
‘PC-R-EV: Examiners Guide’ (Strasbourg Council of Europe 2000) at pp. 12–13.
61
See Council of Europe supra note at p. 6.
62
‘FATF Annual Report: 1995–1996’, (Paris FATF 1996) at p. 17.
A New Paradigm for Crime Control 103
63
See FATF supra note at pp. 18–19.
64
‘Review to Identify Non-Cooperative Countries or Territories: Increasing the Worldwide
Effectiveness of Anti-Money Laundering Measures’ (Paris FATF 2000).
65
Statement of the G-7.
66
See FATF supra note 35; and FATF, ‘Review to Identify Non-Cooperative Countries or
Territories: Increasing the Worldwide Effectiveness of Anti-Money Laundering Measures’
(Paris FATF 2001).
67
At the joint Ecofin and Justice and Home Affairs (JHA) Council held in Luxembourg on
16 October 2001, all EU members agreed to apply countermeasures ‘in concert and
concomitantly’. All undertook to ensure that they had the necessary legal powers in place
by 1 January 2002.
104 Michael Levi and William Gilmore
68
Cf. Council of Europe supra note 58 at pp. 5–7.
69
The FATF decided in September 2001 to conduct a self-assessment exercise to gauge the
extent to which its own membership complies with the NCCT criteria. No decision has yet
been taken to integrate this equivalence into the next round of mutual evaluations.
70
See FATF XII supra note at p. 11.
71
See Council of Europe supra note 58 at pp. 6–7; see FATF supra note at p. 5.
A New Paradigm for Crime Control 105
72
Council action plan to combat organized crime of 15 August 1997, OJ 1997 C251/1 at p. 11.
73
See FATF supra note at p. 42.
74
Technically, a country can object to having its report published but to date (Spring 2002)
this has not happened, as a culture has developed of making them open.
75
‘Note from the Presidency: Final report on the first mutual evaluation exercise – mutual
legal assistance in criminal matters’ (CRIMORG 12/EJN5) (Brussels Council of the
European Union 2001) at p. 30.
76
Ibid.
77
The Prevention and Control of Organised Crime: A European Union Strategy for the
Beginning of the New Millennium, of 3 May 2000, OJ 2000 C 124/1 at pp. 12–13.
106 Michael Levi and William Gilmore
view of Europe, these measures arise within the context of fairly equal countries:
post-enlargement, far greater heterogeneity of culture, income and state capacity will
exist.
78
OECD: Revised Recommendation of the Council on Combating Bribery in International
Business Transactions, adopted on 23 May 1997, Convention on Combating Bribery of
Foreign Public Officials in International Business Transactions, adopted by the
Negotiating Conference on 21 November 1997, signed on 17 December 1997.
79
Council of Europe: Criminal Law Convention on Corruption, ETS No 173, 27 January
1999, Civil Law Convention on Corruption, ETS No 174, 4 November 1999.
80
ABA (ed.), The Foreign Corrupt Practices Act: How to Comply Under the New Amendments
and the OECD Convention, (California 19 February 1999).
81
An early attempt of the UN to co-ordinate the efforts of the Convention was abandoned in
1979 after there was a failure to agree.
82
Cf. the amendments to the FCPA of 1988.
A New Paradigm for Crime Control 107
approach in the years between 1989 and 1994, with the drafting of an openly worded
recommendation. The process of toughening up the language in the years up to 1997
demonstrates the ambiguous nature of such collegial participant groups: the
intergovernmental process leaves national governments totally outside until they are
suddenly confronted with a fairly concrete text and asked to take legal action. The
text is only politically, not legally, binding, but its implementation will be forced
along by a very strong lobby of peers. In May 1997, some European countries
(especially France and Germany) sought to slow down or derail the initiative by
substituting for the collegial ‘soft law’ procedures the more formal negotiated rules
required for a legally binding convention. The OECD, an institution hitherto
unaccustomed to drafting conventions let alone criminal law treaties, countered by
rewriting part of the recommendation into a binding text and negotiated the final
treaty in a matter of six months. Whereas, as was noted above, the FATF integrated
its members’ standards into regional and national texts to be applied both inside and
outside the organization, the OECD’s peer group amalgamated soft law and
convention texts and appended an evaluation process to enforce the implementation
of this mix, but only on its members.83 Shortly afterwards, the Council of Europe
followed suit by pursuing an equally mixed agenda of guiding principles and criminal
and civil law conventions among its GRECO members.84
Different from the FATF and also from most international organizations dealing
with corruption, the OECD is totally focused on a very specific goal: to create a level
playing field for exporters and investors worldwide85 by collectively-unilaterally86
banning the bribery of foreign public officials and related accounting offences as well
as money laundering by natural and corporate persons domiciled in industrialized
states. Caught in a kind of ‘prisoner’s dilemma’, states had to choose whether to go
ahead and expose industries domiciled in their territories to the risk of severe
criminal or administrative action, or to risk public stigma and marginalization as
states tolerant of corruption. Such pressure has taken on formidable forms and – to a
greater extent than the FATF NCCT initiative, for example – has been directed
towards changing the legislation and behaviour of the core members of the Club.
83
Article 12 of the bribery convention specifically provides for monitoring and follow-up to
be undertaken in the framework of the OECD Working Group on Bribery (WGB). The
terms of reference of the WGB in turn make provision for systems of both self- and mutual
evaluation.
84
The 1998 agreement establishing GRECO contains detailed provisions on the mutual
evaluation procedures that were to be utilized, so these are less flexible than the OECD
arrangements.
85
The OECD Member States represent 70 per cent of world exports and 90 per cent of
foreign direct investment. The US trade representative estimated the value of the OECD
convention to the US at 30 billion USD per annum in potential trade gained from the
prevention of transnational bribery by its competitors.
86
Cf. for this approach M. Pieth, ‘The Harmonization of Law against Economic Crime’ in
(1998/99) European Journal of Law Reform 527 at 535 et seq.
108 Michael Levi and William Gilmore
Targets for such high-visibility pressure have included France, Germany, Japan and
the UK.87
Under this high-profile media and political reputational spotlight, it is not
surprising that the OECD convention was implemented even more quickly than the
UN drugs convention: it entered into force barely a year after its signature and two
years later, all signatories have ratified, and thirty out of thirty-five members have
implemented the standard in national law. This rapid development may suggest a
sense of the pressure applied amongst Member States, a pressure intensified after the
key G–7 countries had decided to change their own legislation.
The significance of the rise and rise of mutual evaluation processes of the FATF type
at the international level should not be underestimated. The notion that, to join a
quasi-club within the international community and to be considered acceptable to
responsible international society, one had to submit to periodic on-site inspection by
one’s peers, constituted a radical departure from the orthodoxy of international
affairs, where considerations of autonomy and sensitivities about territorial
sovereignty have traditionally dominated governmental thinking. Intrusive verifica-
tion procedures are, of course, not unknown. Of these, perhaps the most
comprehensive are to be found in the sphere of arms control and disarmament;
the ultimate form of which to date was provided for in the text of the 1993 UN
Convention on the Prohibition of the Development, Production, Stockpiling and use
of Chemical Weapons and on their Destruction.
However, even in the sphere of the monitoring of the implementation of legal
obligations enshrined in international treaties, on-site procedures are very much the
exceptions which prove the rule. More commonly, multilateral treaties will contain
either no or relatively formal monitoring procedures allied with weak dispute
settlement procedures: an approach well illustrated by the 1988 UN drug trafficking
convention.88 In the case of the FATF’s efforts to monitor compliance and
87
The then German minister of economy was exposed in the international media as
condoning international corruption for delaying the agreement to the new text. The UK
has been officially and publicly criticized for its unwillingness to legislate in time and
representatives have gone as far as to discuss economic sanctions against British
companies. Japan has been asked to redraft its new law due to serious ‘misunderstandings’,
and in late 2001, the diet was in the process of adopting new additional legislation to
complement the first version of three years ago. In the case of France, the WGB intervened
during the primary legislative process itself and asked for changes to be made between the
first and second reading. After some serious political haggling, essential changes were
made.
88
W. Gilmore (1993) at pp. 38–41.
A New Paradigm for Crime Control 109
implementation of its 40 Recommendations, they take the form of ‘soft law’ and are
not formally binding as a matter of international law. As noted earlier, its package of
counter measures is not contained in a treaty text to which its members have
subscribed (though some of the required or suggested measures are embodied, at
least in part, in other treaty texts). While some recommendations may have
crystallized into rules of customary international law, many must continue to be
regarded as lacking any obligatory legal effect, whatever may be the political and
economic effects of non-compliance.
The importance of the international precedent set by the FATF (and, at least on
paper, by certain of the regional anti-money laundering groupings) is further
underlined by the fact that the membership agreed to a practical graduated
procedure (of which the imposition of Recommendation 21 measures89 and the
threat of expulsion are particularly noteworthy) through which their own
compliance with the agreed strategy can be encouraged if not enforced. It is rare
for countries to accept the concept of the imposition of quasi-sanctions for failure to
implement non-legally binding standards, and this indicates the power of ‘soft law’
when combined with heavyweight political push.
The Security Council has the power to impose sanctions under Chapter VII of the
UN charter in order to maintain or restore international peace and security. In the
aftermath of the terrorist attacks on the US on 11 September 2001, such powers were
used to prevent and suppress the financing of terrorist acts and to require the
freezing, without delay, of terrorist funds (Security Council Resolution 1373 (2001)).
Notwithstanding the view of the Council that there is a close connection between
international terrorism and, inter alia, drugs, money laundering and organized
crime,90 the opportunity to utilize its powers against other criminal suspects in the
absence of such a demonstrable terrorism nexus is severely restricted by both
technical legal and political considerations.
In large measure because of the positive demonstration effect of the FATF
precedent, the making of provision for mutual evaluation of the implementation of
international commitments in the area of financial crime has become commonplace.
Indeed, in certain institutional contexts it has become the new orthodoxy. This is, in
turn, well illustrated in the practice of the Council of Europe, where the firm
expectation has emerged that international legal instruments adopted in pursuance
of its programme against corruption will make specific provision for the monitoring
of implementation through GRECO.91
Though some few communist ideological insurgents remain (e.g. FARC in
Colombia) and the G–7 may reasonably fear Islamic anti-capitalist as well as anti-
globalization campaigners, anti-communism may no longer be as necessary because
89
See supra note 13.
90
This is too large an issue to be dealt with here, but some groups fund terrorist activities
from crime, while others may do so wholly or partially from legitimate business activities.
91
See, e.g., Article 24 of the Council of Europe Criminal Law Convention on Corruption.
110 Michael Levi and William Gilmore
92
See Pieth supra note at pp. 540–5.
93
J. Blum et al., Financial Havens, Banking Secrecy and Money-Laundering (New York
United Nations 1998); M. Levi and M. Maguire, ‘The Identification, Development and
Exchange of Good Practice for Reducing Organised Crime’ (Report for Falcone
Programme, European Commission, 2001 unpublished).
94
It can become a slippery slope on which any obstructions to smooth co-operation are
deemed to justify intervention and sanctions.
A New Paradigm for Crime Control 111
95
See the FATF website, especially the press releases following the Washington DC meeting
October 2001, the Hong Kong meeting at the end of January 2002, and the Paris meeting
June 2002.
112 Michael Levi and William Gilmore
References
Council Action plan to combat organized crime of 15 August 1997, OJ 1997 C251/1.
K. Alexander, ‘The International Anti-Money Laundering Regime: The Role of the
Financial Action Task Force’ in (2000) 1(1) Financial Crime Review 9.
I. Ayres and J. Braithwaite, Responsive Regulation (Oxford: Oxford University Press
1992).
U. Beck, ‘From Industrial Society to the Risk Society : Questions of Survival, Social
Structure and Ecological Enlightenment’ in (1992) 9 Theory, Culture and Society
97.
J. Blum, M. Levi, T. Naylor, and P. Williams Financial Havens, Banking Secrecy and
Money-Laundering (New York United Nations 1998).
J. Braithwaite, and P. Drahos Global Business Regulation (Cambridge Cambridge
UP 2000).
B. Bullington and A. Block ‘A Trojan horse: anti-Communism and the War on
Drugs’, in (1990) 14(1) Contemporary Crises 39.
‘PC-R-EV: Annual Report 2000’ (Strasbourg Council of Europe 2000).
PC-R-EV: Examiners Guide (Strasbourg Council of Europe 2000).
P. van Duyne ‘Pavlov’s dog: beyond money laundering’ in (1998) 37(4) Howard
Journal of Criminal Justice 359.
‘FATF Annual Report: 1995–1996’ (Paris FATF 1996).
‘FATF Annual Report: 1996–1997’ (Paris FATF 1997).
‘FATF Annual Report 1997–1998’ (Paris FATF 1998).
‘FATF Annual Report: 1998–1999’ (Paris FATF 1999).
‘FATF Annual Report 1999–2000’ (Paris FATF 2000).
‘FATF Annual Report 2000–2001’ (Paris FATF 2001).
‘Analysis of the 1999–2000 Self-Assessment Exercise: Note by the Secretariat’ (Paris
FATF 2000) PLEN/46.REV1.
‘Report on Non-Cooperative Countries and Territories’ (Paris FATF 14 February
2000).
‘Review to Identify Non-Cooperative Countries or Territories: Increasing the
Worldwide Effectiveness of Anti-Money Laundering Measures’ (Paris FATF 22
June 2000).
‘Review of FATF Anti-Money Laundering Systems and Mutual Evaluation
Procedures 1992–1999’ (Paris FATF 16 February 2001).
‘Review to Identify Non-Cooperative Countries or Territories: Increasing the
Worldwide Effectiveness of Anti-Money Laundering Measures’ (Paris FATF 22
June 2001).
‘Developments in Non-Cooperative Countries and Territories’ (Press Release of
7.9.2001) (Paris FATF 2001) (Press Release of 7 September 2001).
‘G–7 Statement’ Okinawa G–7 (21 July 2000).
D. Garland, ‘The limits of the sovereign state’ in (1996) 36(4) British Journal of
Criminology 445.
A New Paradigm for Crime Control 113
1. Introduction
Combating money laundering or, to borrow a phrase, ‘following the money’, has
developed into one of the most dynamic concepts in financial regulation and
criminal law over the past decade. The paradigm has turned out to be extremely
flexible; first applied in a limited field to describe the accumulation of capital
generated on illegal markets, it is now used as a catch-all phrase for the management
of ill-gotten gains from all possible sources. It is hardly surprising then that once the
first shock after the 11 September terrorist attacks had subsided, governments,1
financial institutions 2 and later also international organizations 3 started to develop
the concept of a coordinated fight against terrorism. In fact, one might ask why
existing policies had not been more rigorously implemented before that date. 4 As
early as 1980, the first document in Europe conceptualizing the term ‘money
laundering’5 did not focus on drug trafficking, rather it sought a means of tracking
the ill-gotten gains of hijacking and robbery by left-wing terrorists, especially in Italy
and Germany (‘Red Brigades’ and ‘Red Army Faction’). Furthermore, the UN had
already negotiated a series of instruments against terrorism 6 before 11 September,
some of which were only ratified by the majority of member states after the attacks
of last fall.
The question why the anti-money-laundering-concept was not applied more
rigorously to terrorist groups, such as the IRA, ETA and others, that have long been
in existence is certainly a valid one. The suspicion arises that political difficulties in
115
116 Mark Pieth
drawing a clear line between ‘freedom fighters’ and ‘terrorists’ blocked the necessary
consensus. After 11 September, everything seems quite different: the UN, the
Financial Action Task Force (FATF) and others are now focusing their efforts on
controlling the ‘financing of terrorism’ and have immediately attempted to apply the
concept commonly used for the control of money laundering for this purpose.7
International agendas come about through pragmatic reactions to events. The
problem, however, demands a more fundamental discussion of the wider context of
the development of the paradigm. Going back in time to the mid 1980s, when ‘money
laundering’ became a household word throughout the world, the aim at that time
and subsequently focused mainly on impeding the financing and re-financing of
illicit drug-trafficking. Within the field of criminal law, international standards
promoted three major changes: the criminalization of the management of funds
derived from the drugs trade, forfeiture of ill-gotten gains, and reciprocal mutual
legal assistance.8
However, a closer look reveals that in the early discussions leading up to the Forty
Recommendations of the Financial Action Task Force on Money Laundering
(FATF),9 a second goal had already been defined, which aimed at a more rigorous
control of routine transactions. This was, of course, the primary concern of countries
with large drug-user markets. However, it was evident that the ambitions, especially
those of the US delegation to the FATF, went even further; beyond the registration
of cash transactions, the suggested measures were intended to reduce drastically the
use of cash globally in order to establish a paper trail wherever possible. It is in
keeping with the logic of this strategy that one of the major suggestions made by the
US delegation in the early days of the FATF was to maintain meaningful statistics
on aggregate financial flows in OECD countries.10 Clearly, the international minimal
standards developed concurrently on ‘customer-due-diligence’ (CDD) for banks,
especially the ‘KYC’-principle (know-your-customer), codified first in the Basel
Statement of Principles 11 and integrated into the common standards of the FATF
1990,12 indicate that the initiative against money laundering was from the outset
multi-focused. Beyond tracking criminals and their assets, broader risk management
strategies and international regulations for financial markets were anticipated. This
motivation comes out even more clearly in later initiatives, most notably the
Financial Stability Forum and its report in 2001 13 as well as the current work of the
7
Cf. note 3,‘… financing of terrorism, terrorist acts and terrorist organisations as predicate
offences to money laundering’!
8
Pieth, Tracking Down the Dirty Money, Financial Times, 25 October 2001, p. 23.
9
FATF, Forty Recommendations, report of 6 February 1990.
10
Cf. ibid, Documentation Legal and Regulatory Subgroups FATF I.
11
Basel Statement of Principles of 12 December 1988.
12
Cf. supra note 9, FATF Rec. 12–14.
13
Financial Stability Forum, International Standards and Codes to Strengthen Financial
Systems, April 2001.
Financing of Terrorism: Following the Money 117
IMF14 that addresses the problems associated with the destabilizing potential of
offshore financial centres and the services they offer.
14
Developing an IMF-ROSC-Module on money laundering, cf. Neue Zürcher Zeitung, 12
March 2002, p. 27.
15
Target 23, p. 63 f: ‘Forfeiture of the Instruments and Proceeds of Illegal Drug Trafficking’;
the issue of criminalizing money laundering, however, was introduced in Art. 3 of the 1988
Convention and the political declaration of the General Assembly in the GA Res. S-17/2 of
15 March 1990.
16
UN Convention against Illicit Traffic in Narcotic Drugs and Psychotropic Substances
(‘Vienna Convention’) of 20 December 1988.
118 Mark Pieth
by a non-legitimate state with the aim of subjugating and dispossessing them in order
to enrich the ruler. Beccaria (Dei delitti e delle bene, 1766, XXV.), for instance, one of
the most articulate contemporary protagonists of criminal policy in the 18th century,
deplored the irrational aspects of confiscation, which included pushing the innocent
(i.e. family members of the dispossessed) into crime.
Confiscation viewed from this angle clearly posed a risk to investment and an
infringement on the inviolability of private property. It is no coincidence that some
modern constitutions, which are still extensively influenced by the bourgeois
revolutions of the late 18th and early 19th centuries and to be found in some Latin
American constitutions (see Mexico), squarely declare ‘confiscation’ as unconstitu-
tional. It is noteworthy that ‘confiscation’ remained a political ‘four-letter-word’ for
nearly two hundred years until it was reinvented in the 1970s. Certainly up until
then, the general confiscation of all assets of a convicted person was outlawed
because it was considered disproportionate and had far reaching effects on the family
of the dispossessed. However, many legal systems retained a certain power to forfeit,
although this was generally limited to dangerous objects (‘instrumenta sceleris’, such
as the instruments or weapons used to perpetrate a crime or the products of crime,
for instance pornographic paintings) in order to destroy them. Increasingly, it must
be added, an effect similar to that of confiscation was achieved by raising the level of
fines to siphon off ill-gotten gains. Even nowadays, some legal systems prefer
confiscatory fines to the actual confiscation of ill-gotten gains.17
Nevertheless, this historical development still does not explain how it was possible
to reintroduce confiscation towards the end of the 20th century, including some
broad, sweeping forms of forfeiture of all assets18 and even the occasional reversal of
the burden of proof of legal origin imposed on the owner. 19 Furthermore, there is the
need to clarify why this historical shift back to an old and discredited concept could
have been engineered without provoking major intellectual debate. A change of
conceptual terminology is discernible in the early 1970s, when it was increasingly
stated that it was inadequate to punish individuals, whilst at the same time allowing
them to enjoy the fruits of their illegal behaviour. The issue did not really develop,
however, as long as criminal law concentrated on crimes with clearly defined victims
who could be granted compensation out of the profits of crime. With the expansion
of victimless crimes or crimes against the public interest, especially the criminaliza-
tion of trafficking in narcotic substances, the issue became increasingly important.
Whereas in Europe in the 18th century during the age of absolutist regimes,
confiscation was used to dispossess well-to-do citizens who were claiming their share
in political power, the new concepts were far more easily legitimized, as they largely
17
So, for instance, the US FCPA does not contain special provisions for criminal forfeiture,
similar results could, however, be achieved either by civil forfeiture or a confiscatory fine.
18
Cf. the German ‘Vermögensstrafe’ and ‘Erweiterter Verfall’.
19
Cf. Rider, ‘The Crusade against Money Laundering – Time to Think!’ (1998) Vol. 1 Issue 4
European Journal of Law Reform at p. 518.
Financing of Terrorism: Following the Money 119
Forfeiting the gains derived from illegal drug trafficking and, at a later stage,
criminalizing those who helped obscure the origins of those gains, was introduced as
a narrowly focused tactical concept that pinpointed taking away the profits and
thereby reducing the attractiveness of becoming a trafficker. Already at that time, a
macroeconomic rationale was put forward in support of the new tactics. The
argument was advanced that siphoning off the illegal profits would lead to a rise in
the price of the illegal goods and consequently to a reduction in their demand.20 This
was rather short-sighted reasoning in an area where demand is bound to be highly
elastic due to the dependency of a large segment of drug-users who are prepared to
procure the necessary funds to finance their habit by all available means. In fact, the
effect of the strategy was that it most likely even made the problem all the more acute
by boosting the market volume. It raised the attraction of illegal activity since the
profits were bound to rise concurrently with the prices, probably even disproportio-
nately so.
The impact of anti-money laundering policies on the drug problem worldwide
thus remained very limited. Huge efforts, at immense expense in money and
personnel, in both the public and the private sectors were made, yet the number of
criminal cases brought 21 and the amount of profit forfeited 22 remained small in
relation to the estimated funds generated by illegal markets.23 The size of the drug
problem has, if at all, been affected to a much greater degree by alternative policies
than by the military/police approach. 24 Nevertheless, the production of laws and
regulations has not diminished and the regional reach of anti-money laundering
concepts has continued to expand.
The discourse shifted and increasingly all funds in the hands of organized crime
operators, (whether legally or illegally obtained25) were declared dangerous, just as
‘instrumenta sceleris’ had been earlier on, since they increased the ability of such
organizations to engage in illegal activities and to come into conflict with the
20
Meier/Dessecker/Smettan (eds.), Gewinnabschöpfung bei Betäubungmitteln (Wiesbaden
1989) at p. 539.
21
Kilchling (ed.), Die Praxis der Gewinnabschöpfung in Europa (Freiburg 2002) at p. 441.
22
Ibid., at p. 444.
23
Cf. the figures published by the UN and their critique in Pieth, Bekämpfung der
Geldwäscherei (Basel/Frankfurt 1992) at p. 12.
24
Cf. Pieth, ‘Gefährliche Strategiespiele’ in: Plädoyer (1992) at p. 38.
25
Cf. for the more recent of forfeiture of assets under the control of organized crime: UN
Model Legislation on Money Laundering 1995 (UNDP) or Art. 59 s. 3 Swiss Penal Code.
120 Mark Pieth
authorities (or, alternatively, bribe them for protection). In a relatively short period
of time the international organizations, pushed on by a small group of countries
(especially the US, France and the UK), managed to broaden the discussion on
money laundering from a limited effort to reduce drug-trafficking to a generalized
concept to tackle serious crime. The political mechanisms used for the expansion of
the paradigm can be illustrated by the image of concentric circles created by a stone
thrown into a pond. The core countries mentioned above convinced the G–7 States.
The G–7 States in turn created a specialized body to combat money laundering (the
FATF26) in 1989, which then included the wider framework of OECD countries (and
a few non-members), and ultimately formed regional satellites.27 The implementa-
tion of the strategy was promoted by soft law and peer pressure (monitoring28 ), it
was only at a later stage that some areas were integrated into binding international
law.29 Most recently, the UN went over the same terrain again with the largest
constituency.30
The fact that the effect of anti-money laundering policies probably amounts to
little more than a relatively low ‘tax’ on illegal trade has not impeded the continued
production of yet more rules. Instead the focus of the discourse shifted entirely.
26
Cf. supra note 9, revised Recommendation of 1996 N. 4.
27
As, for example, the Caribbean Financial Action Task Force, created with the Kingston
Declaration of 6 November 1992.
28
Gilmore, Dirty Money: The Evolution of Money Laundering Counter-Measures (Strasbourg
1999, 2nd ed.); for monitoring procedures in general: Pieth, ‘From Ideal to Reality: Making
the New Global Standards Stick’ in No Longer Business as Usual, Fighting Bribery and
Corruption (Paris OECD 2000).
29
Cf. the Council of Europe Convention of 8 November 1990 on Laundering, Search, Seizure
and Confiscation of the Proceeds from Crime, Strasbourg.
30
UN Convention against Transnational Organised Crime, cf. GA 55/383.
31
Cf. supra note 26.
Financing of Terrorism: Following the Money 121
32
This figure has repeatedly been quoted by the media as a World Bank estimate. It has,
however, not been possible to track down the original source. Nevertheless, it can be
assumed that the dimensions of funds generated both by bribes and the profits of bribery
are huge.
33
Pieth, Working paper presented at the 10th UN Congress on the Prevention of Crime and
the Treatment of Offenders, Vienna, 10–17 April 2000, plenary meeting on international
co-operation in combating transnational crime: New challenges in the 21st century.
34
‘Paradis financier, secret bancaire et blanchissement d’argent’ United Nations, New York
1999.
122 Mark Pieth
Jonathan Winer has in this volume 35 pointed out that there is an inherent risk of
the banking community being used for these purposes and that part of the problem is
the organization of banking supervision at the national level when financial
institutions operate globally. This takes us back to the regulatory concepts that have
developed in parallel to criminal law over the last decade.
In 1988, when the Basel Committee on Banking Supervision (BCBS) wrote the Basel
Statement of Principles36 and introduced the concept of ‘KYC’ (know-your-
customer) as a fundamental principle in banking supervision, the aim was far
broader than ‘catching criminals’. The principle sought first to facilitate credible risk
management by financial institutions, and secondly to reduce the risks of
uncontrolled money flows worldwide. If this last point had not yet clearly emerged,
it certainly was part of the motivation for upgrading these principles in a
fundamentally new code, the BCBS’s new code of ‘Customer-Due-Diligence for
Banks’ of October 2001, discussed in greater detail by Charles Freeland in this
volume. 37 These efforts are closely linked to the work of the Financial Stability
Forum 38 and its successors in the IMF. 39 Beyond combating money laundering,
these obligations on customer acceptance and their continuous monitoring are part
of an attempt at harmonizing standards in banking supervision as a reaction to the
demise of national control by using elements of global governance for financial
centres. Of course, more detailed rules on CDD are only one aspect within a wider
framework, and the next steps due in this development are still quite undefined.
It is, however, significant that the FATF was not really in the position to give
more detailed guidance between 1990 and about 1999 on customer due diligence. All
the excitement about the Non Co-operative Countries and Territories process, the
blacklisting and partial de-listing of so-called ‘NCCTs’, has overshadowed the fact
that many FATF core-members were not ready to implement even basic customer
due diligence standards at the levels already defined in the 1990 recommendations. 40
35
See J. Winer, ‘Globalization, Terrorist Finance, and Global Conflict – Time for a White
List?’ in (2002) 4 European Journal of Law Reform (in this issue).
36
Cf. supra note 11.
37
C. Freeland, ‘How Can Sound Customer Due Diligence Rules Help Prevent the Misuse of
Financial Institutions in the Financing of Terrorism?’ in (2002) 4 European Journal of Law
Reform (in this issue).
38
Cf. supra note 13.
39
Cf. supra note 14.
40
Cf as an example: Financial Action Task Force on Money Laundering, Second Mutual
Evaluation Report on the United States, FATF VIII, 21 March 1997.
Financing of Terrorism: Following the Money 123
The foregoing is a description of the state of affairs prevailing when the events of 11
September occurred and completely changed perceptions of terrorism worldwide.
During the period immediately following the attacks, governments and international
organizations working on this subject grappled mainly with the differences between
money laundering and the financing of crime.44 It was maintained correctly that
much of the money used to finance terrorist operations could have legal sources, and
that therefore different concepts should be applied. The FATF tried to short-circuit
this by a daring, if intellectually untenable, assertion: by calling the financing of
terrorism ‘money laundering’, the tedious discussions and new concepts seemed to
become unnecessary. Armand Kersten rightly criticizes this approach in this
volume.45 Nevertheless, concepts need to be in place to criminalize the intentional
acceptance and the management of such funds which are to be subject to forfeiture
and must also be included in the anti-money laundering notification schemes.46 It
41
OECD: Convention on Combating Bribery of Foreign Public Officials in International
Business Transactions, 21 November 1997.
42
Cf. Pieth, ‘Korruptionsgeldwäsche’, in FS Niklaus Schmid (Zürich 2001) at p. 437.
43
Cf. < www.wolfsberg-principles.com > .
44
Cf. supra note 3, FATF Special Recommendations on Terrorist Financing.
45
A. Kersten, ‘Financing Terrorism – a Predicate Offence to Money Laundering?’ in (2002) 4
European Journal of Law Reform (in this issue).
46
Cf. supra note 8.
124 Mark Pieth
will almost certainly be more difficult for banks to identify such funds compared to
those of other high risk clients because the red flags pointing to the criminal origin
will have to be re-assigned. In this context, financial institutions are even more
dependant on official lists of names than they would be, for instance, in the case of
drug-traffickers. 47 One might therefore say that the awareness concepts used to
detect the monies of terrorists have far more in common with the formal approach
used in embargo cases than with the usual increase in diligence with respect to
unusual circumstances or critical client segments.
With the passage of time since the attacks, however, what emerges is that at a
technical level risk management in connection with the financing of terrorism is not
all that different from managing other, more traditional, risks. The principal lesson
we can draw from 11 September is that it would be a good idea to finally implement
the basic concepts against money laundering. The section of the US PATRIOT Act 48
referring to new rules for financial institutions to a large extent covers traditional
ground, and issues which could not be implemented previously on account of
political opposition under the former US administration49 have now passed into law.
The events of 11 September have certainly shocked legislators into action. Some of
the laws against terrorism enacted quickly all over the world, have little more than
symbolic value, much of what has been addressed in the financial field was already in
the pipeline well before the attacks. Legislation on KYC that was formerly
considered impossible is suddenly acceptable.50 Furthermore, it is now possible to
speed up legislation and regulation in previously targeted areas like correspondent
banking.51 This could also be the moment to re-evaluate more thoroughly the
question which of the recommendations of the FATF remains too unspecific. To
some extent the Wolfsberg principles or, even more apposite in connection with this
issue, the BCBS’s CDD-Recommendations address the question of thorough
identification of ‘beneficial owners’, including beneficiaries of trusts and corporate
47
Cf. supra note 2.
48
Cf. supra note 1, US PATRIOT Act, Sec. 301 ss.
49
Cf. the difficulties of the previous administration in passing more stringent anti-money-
laundering rules under the Chairmanship of Senator Levin; the last minute agreement of
the New York Clearing House Association under the Chairmanship of Undersecretary
Eizenstat and the initial reluctance of the new administration (Spokesperson: Secretary of
the Treasury Paul Henry O’Neill) on introducing tougher anti-money-laundering
legislation.
50
Cf. supra notes 48 and 49.
51
Cf. already the New York Clearing House Association Guidelines and the Patriot Act.
Financing of Terrorism: Following the Money 125
52
Basel Committee on Banking Supervision, Customer Due Diligence for Banks, October
200l, § 32 ss. (p. 8).
53
Cf. supra, note 35 at p. xx.
126 Mark Pieth
money flows worldwide – as if this were even feasible – then the idea of using it to
track down any political opponent would make the concept at risk of being regarded
as an oppressive tool. It is unfortunate that there is almost no intellectual debate
currently as to what constitutes ‘terrorism’. This makes it even easier for politicians
to fill the gap – for example by the EU Council in its Common Positionf54 adopted at
the end of 2001. This document defines a ‘terrorist act’ in terms of the sort of crimes
one would expect, but then goes on to include intentional acts; ‘causing extensive
destruction to an information system, [or] a fixed platform located on the continental
shelf … resulting in major economic loss’. If terrorism is to encompass hackers and
organizations that protest in the North Sea then – to put it somewhat bluntly – the
efforts to fight money laundering become part of the problem as well. They are at
risk of being perceived as instruments of repression and terror and not only nurture
the anger of those who are already disaffected with society but also alienate the
average citizen as well. There is still time however, to re-define the goals of anti-
money laundering initiatives and give their instrumentation the necessary contours.
54
Council Common Position 2001/931/CFSP on the application of specific measures to
combat terrorism OJ 2001 L 344/93.#
Documentation
This page intentionally left blank
FATF Cracks Down on Terrorist Financing
1
Attended by representatives of the 31 FATF members and 18 FATF-style regional bodies
and observer organizations. Regional bodies and observer organizations included the Asia/
Pacific Group on Money Laundering, the Caribbean Financial Action Task Force, the
Easterna dn Southern Africa Anti-Money Laundering Group, the Select Committee of
Experts on the Evaluation of Anti-Money Laundering Measures of the Council of Europe,
the Asian Development Bank, the Commonwealth Secretariat, the European Central Bank,
Europol, the Inter-American Development Bank, the International Monetrary Fund, the
International Organisation of Securities Commissions, Interpol, the Offshore Group of
Banking Supervisors, OAS/CICAD, the United Nations Office on Drug Control and
Crime Prevention, the World Bank, and the World Customs Organisation.
2
See the text of the Special Recommendations in Annex.
129
130 Documentation
In order to secure the swift and effective implementation of these new standards,
FATF agreed to the following comprehensive Plan of Action:
By 31 December 2001, self-assessment by all FATF members against the
Special Recommendations. This will include a commitment to come into
compliance with the Special Recommendations by June 2002 and action plans
addressing the implementation of Recommendations not already in place. All
countries around the world will be invited to participate on the same terms as
FATF members.
By February 2002, the development of additional guidance for financial
institutions on the techniques and mechanisms used in the financing of
terrorism.
In June 2002, the initiation of a process to identify jurisdictions that lack
appropriate measures to combat terrorist financing and discussion of next
steps. including the possibility of counter-measures, for jurisdictions that do
not counter terrorist financing.
Regular publication by its members of the amount of suspected terrorist assets
frozen, in accordance with the appropriate United Nations Security Council
Resolutions.
The provision by FATF members of technical assistance to non-members, as
necessary, to assist them in complying with the Special Recommendations.
In taking forward its Plan of Action against terrorist financing, the FATF will
intensify its co-operation with the FATF–style regional bodies and international
organizations and bodies such as the United Nations, the Egmont Group of
Financial Intelligence Units, the G-20, and International Financial Institutions, that
support and contribute to the international effort against money laundering and
terrorist financing.
FATF also agreed to take into account the Special Recommendations as it revises
the FATF 40 Recommendations on Money Laundering and to intensify its work
with respect to corporate vehicles, correspondent banking, identification of
beneficial owners of accounts, and regulation of non-bank financial institutions.
The FATF is an independent international body whose Secretariat is housed at
the OECD. The twenty-nine member countries and governments of the FATF are:
Argentina; Australia; Austria; Belgium; Brazil; Canada; Denmark; Finland; France;
Germany; Greece; Hong Kong; China; Iceland; Ireland; Italy; Japan; Luxembourg;
Mexico; the Kingdom of the Netherlands; New Zealand; Norway; Portugal;
Singapore; Spain; Sweden; Switzerland; Turkey; the United Kingdom; and the
United States. Two international organizations are also members of the FATF: the
European Commission and the Gulf Co-operation Council.
For further information, please contact Helen Fisher, OECD Media Relations
Division (Tel: 33 1 45 24 80 94 or helen.fisher@oecd.org) or the FATF Secretariat
(Tel: 33 1 45 24 79 45 or contact@fatf-gafi.org)
FATF Special Recommendations on
Terrorist Financing
Each country should take immediate steps to ratify and to implement fully the 1999
United Nations International Convention for the Suppression of the Financing of
Terrorism. Countries should also immediately implement the United Nations
resolutions relating to the prevention and suppression of the financing of terrorist
acts, particularly United Nations Security Council Resolution 1373.
Each country should criminalize the financing of terrorism, terrorist acts and
terrorist organizations. Countries should ensure that such offences are designated as
money laundering predicate offences.
131
132 Documentation
Each country should implement measures to freeze without delay funds or other
assets of terrorists, those who finance terrorism and terrorist organizations in
accordance with the United Nations resolutions relating to the prevention and
suppression of the financing of terrorist acts.
Each country should also adopt and implement measures, including legislative
ones, which would enable the competent authorities to seize and confiscate property
that is the proceeds of, or used in, or intended or allocated for use in, the financing of
terrorism, terrorist acts or terrorist organizations.
E. International Co-operation
Each country should afford another country, on the basis of a treaty, arrangement or
other mechanism for mutual legal assistance or information exchange, the greatest
possible measure of assistance in connection with criminal, civil enforcement, and
administrative investigations, inquiries and proceedings relating to the financing of
terrorism, terrorist acts and terrorist organizations.
Countries should also take all possible measures to ensure that they do not
provide safe havens for individuals charged with the financing of terrorism, terrorist
acts or terrorist organizations, and should have procedures in place to extradite,
where possible, such individuals.
F. Alternative Remittance
Each country should take measures to ensure that persons or legal entities, including
agents, that provide a service for the transmission of money or value, including
FATF Special Recommendations on Terrorist Financing 133
G. Wire Transfers
H. Non-profit Organizations
Countries should review the adequacy of laws and regulations that relate to entities
that can be abused for the financing of terrorism. Non-profit organizations are
particularly vulnerable, and countries should ensure that they cannot be misused:
a. by terrorist organizations posing as legitimate entities;
b. to exploit legitimate entities as conduits for terrorist financing, including for
the purpose of escaping asset freezing measures; and
c. to conceal or obscure the clandestine diversion of funds intended for
legitimate purposes to terrorist organizations.
134 Documentation
Annex 1
(on the report of the Sixth Committee (A/54/615)) 54/109.
Annex
International Convention for the Suppression of the Financing of Terrorism
Preamble
The States Parties to this Convention,
Bearing in mind the purposes and principles of the Charter of the United Nations concerning
the maintenance of international peace and security and the promotion of good-
neighbourliness and friendly relations and cooperation among States,
Deeply concerned about the worldwide escalation of acts of terrorism in all its forms and
manifestations,
Recalling the Declaration on the Occasion of the Fiftieth Anniversary of the United Nations,
contained in General Assembly resolution 50/6 of 24 October 1995,
Recalling also all the relevant General Assembly resolutions on the matter, including
resolution 49/60 of 9 December 1994 and the annex thereto on the Declaration on Measures to
Eliminate International Terrorism, in which the States Members of the United Nations
solemnly reaffirmed their unequivocal condemnation of all acts, methods and practices of
terrorism as criminal and unjustifiable, wherever and by whomever committed, including
those which jeopardize the friendly relations among States and peoples and threaten the
territorial integrity and security of States,
FATF Special Recommendations on Terrorist Financing 135
Article 1
For the purposes of this Convention:
1. ‘Funds’ means assets of every kind, whether tangible or intangible, movable or immovable,
however acquired, and legal documents or instruments in any form, including electronic or
digital, evidencing title to, or interest in, such assets, including, but not limited to, bank
credits, travellers cheques, bank cheques, money orders, shares, securities, bonds, drafts and
letters of credit.
2. ‘State or government facility’ means any permanent or temporary facility or conveyance
that is used or occupied by representatives of a State, members of Government, the legislature
136 Documentation
or the judiciary or by officials or employees of a State or any other public authority or entity
or by employees or officials of an intergovernmental organization in connection with their
official duties.
3. ‘Proceeds’ means any funds derived from or obtained, directly or indirectly, through the
commission of an offence set forth in article 2.
Article 2
1. Any person commits an offence within the meaning of this Convention if that person by any
means, directly or indirectly, unlawfully and wilfully, provides or collects funds with the
intention that they should be used or in the knowledge that they are to be used, in full or in
part, in order to carry out:
(a) An act which constitutes an offence within the scope of and as defined in one of the
treaties listed in the annex; or
(b) Any other act intended to cause death or serious bodily injury to a civilian, or to any other
person not taking an active part in the hostilities in a situation of armed conflict, when the
purpose of such act, by its nature or context, is to intimidate a population, or to compel a
Government or an international organization to do or to abstain from doing any act.
2.(a) On depositing its instrument of ratification, acceptance, approval or accession, a State
Party which is not a party to a treaty listed in the annex may declare that, in the
application of this Convention to the State Party, the treaty shall be deemed not to be
included in the annex referred to in paragraph 1, subparagraph (a). The declaration shall
cease to have effect as soon as the treaty enters into force for the State Party, which shall
notify the depositary of this fact;
(b) When a State Party ceases to be a party to a treaty listed in the annex, it may make a
declaration as provided for in this article, with respect to that treaty.
3. For an act to constitute an offence set forth in paragraph 1, it shall not be necessary that the
funds were actually used to carry out an offence referred to in paragraph 1, subparagraph (a)
or (b).
4. Any person also commits an offence if that person attempts to commit an offence as set
forth in paragraph 1 of this article.
5. Any person also commits an offence if that person:
(a) Participates as an accomplice in an offence as set forth in paragraph 1 or 4 of this article;
(b) Organizes or directs others to commit an offence as set forth in paragraph 1 or 4 of this
article;
(c) Contributes to the commission of one or more offences as set forth in paragraph 1 or 4 of
this article by a group of persons acting with a common purpose. Such contribution shall
be intentional and shall either:
(i) Be made with the aim of furthering the criminal activity or criminal purpose of the
group, where such activity or purpose involves the commission of an offence as set
forth in paragraph 1 of this article; or
(ii) Be made in the knowledge of the intention of the group to commit an offence as set
forth in paragraph 1 of this article.
Article 3
This Convention shall not apply where the offence is committed within a single State, the
alleged offender is a national of that State and is present in the territory of that State and no
FATF Special Recommendations on Terrorist Financing 137
other State has a basis under article 7, paragraph 1 or 2, to exercise jurisdiction, except that the
provisions of articles 12 to 18 shall, as appropriate, apply in those cases.
Article 4
Each State Party shall adopt such measures as may be necessary:
(a) To establish as criminal offences under its domestic law the offences as set forth in article 2;
(b) To make those offences punishable by appropriate penalties which take into account the
grave nature of the offences.
Article 5
1. Each State Party, in accordance with its domestic legal principles, shall take the necessary
measures to enable a legal entity located in its territory or organized under its laws to be held
liable when a person responsible for the management or control of that legal entity has, in that
capacity, committed an offence as set forth in article 2. Such liability may be criminal, civil or
administrative.
2. Such liability is incurred without prejudice to the criminal liability of individuals who have
committed the offences.
3. Each State Party shall ensure, in particular, that legal entities liable in accordance with
paragraph 1 above are subject to effective, proportionate and dissuasive criminal, civil or
administrative sanctions. Such sanctions may include monetary sanctions.
Article 6
Each State Party shall adopt such measures as may be necessary, including, where
appropriate, domestic legislation, to ensure that criminal acts within the scope of this
Convention are under no circumstances justifiable by considerations of a political,
philosophical, ideological, racial, ethnic, religious or other similar nature.
Article 7
1. Each State Party shall take such measures as may be necessary to establish its jurisdiction
over the offences set forth in article 2 when:
(a) The offence is committed in the territory of that State;
(b) The offence is committed on board a vessel flying the flag of that State or an aircraft
registered under the laws of that State at the time the offence is committed;
(c) The offence is committed by a national of that State.
2. A State Party may also establish its jurisdiction over any such offence when:
(a) The offence was directed towards or resulted in the carrying out of an offence referred to
in article 2, paragraph 1, subparagraph (a) or (b), in the territory of or against a national
of that State;
(b) The offence was directed towards or resulted in the carrying out of an offence referred to
in article 2, paragraph 1, subparagraph (a) or (b), against a State or government facility
of that State abroad, including diplomatic or consular premises of that State;
(c) The offence was directed towards or resulted in an offence referred to in article 2,
paragraph 1, subparagraph (a) or (b), committed in an attempt to compel that State to do
or abstain from doing any act;
138 Documentation
(d) The offence is committed by a stateless person who has his or her habitual residence in
the territory of that State;
(e) The offence is committed on board an aircraft which is operated by the Government of
that State.
3. Upon ratifying, accepting, approving or acceding to this Convention, each State Party shall
notify the Secretary-General of the United Nations of the jurisdiction it has established in
accordance with paragraph 2. Should any change take place, the State Party concerned shall
immediately notify the Secretary-General.
4. Each State Party shall likewise take such measures as may be necessary to establish its
jurisdiction over the offences set forth in article 2 in cases where the alleged offender is present
in its territory and it does not extradite that person to any of the States Parties that have
established their jurisdiction in accordance with paragraphs 1 or 2.
5. When more than one State Party claims jurisdiction over the offences set forth in article 2,
the relevant States Parties shall strive to coordinate their actions appropriately, in particular
concerning the conditions for prosecution and the modalities for mutual legal assistance.
6. Without prejudice to the norms of general international law, this Convention does not
exclude the exercise of any criminal jurisdiction established by a State Party in accordance
with its domestic law.
Article 8
1. Each State Party shall take appropriate measures, in accordance with its domestic legal
principles, for the identification, detection and freezing or seizure of any funds used or
allocated for the purpose of committing the offences set forth in article 2 as well as the
proceeds derived from such offences, for purposes of possible forfeiture.
2. Each State Party shall take appropriate measures, in accordance with its domestic legal
principles, for the forfeiture of funds used or allocated for the purpose of committing the
offences set forth in article 2 and the proceeds derived from such offences.
3. Each State Party concerned may give consideration to concluding agreements on the
sharing with other States Parties, on a regular or case-by-case basis, of the funds derived from
the forfeitures referred to in this article.
4. Each State Party shall consider establishing mechanisms whereby the funds derived from the
forfeitures referred to in this article are utilized to compensate the victims of offences referred
to in article 2, paragraph 1, subparagraph (a) or (b), or their families.
5. The provisions of this article shall be implemented without prejudice to the rights of third
parties acting in good faith.
Article 9
1. Upon receiving information that a person who has committed or who is alleged to have
committed an offence set forth in article 2 may be present in its territory, the State Party
concerned shall take such measures as may be necessary under its domestic law to investigate
the facts contained in the information.
2. Upon being satisfied that the circumstances so warrant, the State Party in whose territory the
offender or alleged offender is present shall take the appropriate measures under its domestic law
so as to ensure that person’s presence for the purpose of prosecution or extradition.
3. Any person regarding whom the measures referred to in paragraph 2 are being taken shall
be entitled:
FATF Special Recommendations on Terrorist Financing 139
(a) To communicate without delay with the nearest appropriate representative of the State of
which that person is a national or which is otherwise entitled to protect that person’s
rights or, if that person is a stateless person, the State in the territory of which that person
habitually resides;
(b) To be visited by a representative of that State;
(c) To be informed of that person’s rights under subparagraphs (a) and (b).
4. The rights referred to in paragraph 3 shall be exercised in conformity with the laws and
regulations of the State in the territory of which the offender or alleged offender is present,
subject to the provision that the said laws and regulations must enable full effect to be given to
the purposes for which the rights accorded under paragraph 3 are intended.
5. The provisions of paragraphs 3 and 4 shall be without prejudice to the right of any State
Party having a claim to jurisdiction in accordance with article 7, paragraph 1, subparagraph
(b), or paragraph 2, subparagraph (b), to invite the International Committee of the Red Cross
to communicate with and visit the alleged offender.
6. When a State Party, pursuant to the present article, has taken a person into custody, it shall
immediately notify, directly or through the Secretary-General of the United Nations, the
States Parties which have established jurisdiction in accordance with article 7, paragraph 1 or
2, and, if it considers it advisable, any other interested States Parties, of the fact that such
person is in custody and of the circumstances which warrant that person’s detention. The State
which makes the investigation contemplated in paragraph 1 shall promptly inform the said
States Parties of its findings and shall indicate whether it intends to exercise jurisdiction.
Article 10
1. The State Party in the territory of which the alleged offender is present shall, in cases to
which article 7 applies, if it does not extradite that person, be obliged, without exception
whatsoever and whether or not the offence was committed in its territory, to submit the case
without undue delay to its competent authorities for the purpose of prosecution, through
proceedings in accordance with the laws of that State. Those authorities shall take their
decision in the same manner as in the case of any other offence of a grave nature under the law
of that State.
2. Whenever a State Party is permitted under its domestic law to extradite or otherwise
surrender one of its nationals only upon the condition that the person will be returned to that
State to serve the sentence imposed as a result of the trial or proceeding for which the
extradition or surrender of the person was sought, and this State and the State seeking the
extradition of the person agree with this option and other terms they may deem appropriate,
such a conditional extradition or surrender shall be sufficient to discharge the obligation set
forth in paragraph 1.
Article 11
1. The offences set forth in article 2 shall be deemed to be included as extraditable offences in
any extradition treaty existing between any of the States Parties before the entry into force of
this Convention. States Parties undertake to include such offences as extraditable offences in
every extradition treaty to be subsequently concluded between them.
2. When a State Party which makes extradition conditional on the existence of a treaty receives
a request for extradition from another State Party with which it has no extradition treaty, the
requested State Party may, at its option, consider this Convention as a legal basis for
140 Documentation
extradition in respect of the offences set forth in article 2. Extradition shall be subject to the
other conditions provided by the law of the requested State.
3. States Parties which do not make extradition conditional on the existence of a treaty shall
recognize the offences set forth in article 2 as extraditable offences between themselves, subject
to the conditions provided by the law of the requested State.
4. If necessary, the offences set forth in article 2 shall be treated, for the purposes of extradition
between States Parties, as if they had been committed not only in the place in which they
occurred but also in the territory of the States that have established jurisdiction in accordance
with article 7, paragraphs 1 and 2.
5. The provisions of all extradition treaties and arrangements between States Parties with
regard to offences set forth in article 2 shall be deemed to be modified as between States
Parties to the extent that they are incompatible with this Convention.
Article 12
1. States Parties shall afford one another the greatest measure of assistance in connection with
criminal investigations or criminal or extradition proceedings in respect of the offences set
forth in article 2, including assistance in obtaining evidence in their possession necessary for
the proceedings.
2. States Parties may not refuse a request for mutual legal assistance on the ground of bank
secrecy.
3. The requesting Party shall not transmit or use information or evidence furnished by the
requested Party for investigations, prosecutions or proceedings other than those stated in the
request without the prior consent of the requested Party.
4. Each State Party may give consideration to establishing mechanisms to share with other
States Parties information or evidence needed to establish criminal, civil or administrative
liability pursuant to article 5.
5. States Parties shall carry out their obligations under paragraphs 1 and 2 in conformity with
any treaties or other arrangements on mutual legal assistance or information exchange that
may exist between them. In the absence of such treaties or arrangements, States Parties shall
afford one another assistance in accordance with their domestic law.
Article 13
None of the offences set forth in article 2 shall be regarded, for the purposes of extradition or
mutual legal assistance, as a fiscal offence. Accordingly, States Parties may not refuse a request
for extradition or for mutual legal assistance on the sole ground that it concerns a fiscal offence.
Article 14
None of the offences set forth in article 2 shall be regarded for the purposes of extradition or
mutual legal assistance as a political offence or as an offence connected with a political offence
or as an offence inspired by political motives. Accordingly, a request for extradition or for
mutual legal assistance based on such an offence may not be refused on the sole ground that it
concerns a political offence or an offence connected with a political offence or an offence
inspired by political motives.
FATF Special Recommendations on Terrorist Financing 141
Article 15
Nothing in this Convention shall be interpreted as imposing an obligation to extradite or to
afford mutual legal assistance, if the requested State Party has substantial grounds for
believing that the request for extradition for offences set forth in article 2 or for mutual legal
assistance with respect to such offences has been made for the purpose of prosecuting or
punishing a person on account of that person’s race, religion, nationality, ethnic origin or
political opinion or that compliance with the request would cause prejudice to that person’s
position for any of these reasons.
Article 16
1. A person who is being detained or is serving a sentence in the territory of one State Party
whose presence in another State Party is requested for purposes of identification, testimony or
otherwise providing assistance in obtaining evidence for the investigation or prosecution of
offences set forth in article 2 may be transferred if the following conditions are met:
(a) The person freely gives his or her informed consent;
(b) The competent authorities of both States agree, subject to such conditions as those States
may deem appropriate.
2. For the purposes of the present article:
(a) The State to which the person is transferred shall have the authority and obligation to
keep the person transferred in custody, unless otherwise requested or authorized by the
State from which the person was transferred;
(b) The State to which the person is transferred shall without delay implement its obligation
to return the person to the custody of the State from which the person was transferred as
agreed beforehand, or as otherwise agreed, by the competent authorities of both States;
(c) The State to which the person is transferred shall not require the State from which the
person was transferred to initiate extradition proceedings for the return of the person;
(d) The person transferred shall receive credit for service of the sentence being served in the
State from which he or she was transferred for time spent in the custody of the State to
which he or she was transferred.
3. Unless the State Party from which a person is to be transferred in accordance with the
present article so agrees, that person, whatever his or her nationality, shall not be prosecuted
or detained or subjected to any other restriction of his or her personal liberty in the territory of
the State to which that person is transferred in respect of acts or convictions anterior to his or
her departure from the territory of the State from which such person was transferred.
Article 17
Any person who is taken into custody or regarding whom any other measures are taken or
proceedings are carried out pursuant to this Convention shall be guaranteed fair treatment,
including enjoyment of all rights and guarantees in conformity with the law of the State in the
territory of which that person is present and applicable provisions of international law,
including international human rights law.
Article 18
1. States Parties shall cooperate in the prevention of the offences set forth in article 2 by taking
all practicable measures, inter alia, by adapting their domestic legislation, if necessary, to
142 Documentation
prevent and counter preparations in their respective territories for the commission of those
offences within or outside their territories, including:
(a) Measures to prohibit in their territories illegal activities of persons and organizations that
knowingly encourage, instigate, organize or engage in the commission of offences set
forth in article 2;
(b) Measures requiring financial institutions and other professions involved in financial
transactions to utilize the most efficient measures available for the identification of their
usual or occasional customers, as well as customers in whose interest accounts are
opened, and to pay special attention to unusual or suspicious transactions and report
transactions suspected of stemming from a criminal activity. For this purpose, States
Parties shall consider:
(i) Adopting regulations prohibiting the opening of accounts, the holders or beneficiaries of
which are unidentified or unidentifiable, and measures to ensure that such
institutions verify the identity of the real owners of such transactions;
(ii) With respect to the identification of legal entities, requiring financial institutions, when
necessary, to take measures to verify the legal existence and the structure of the
customer by obtaining, either from a public register or from the customer or both,
proof of incorporation, including information concerning the customer’s name, legal
form, address, directors and provisions regulating the power to bind the entity;
(iii) Adopting regulations imposing on financial institutions the obligation to report promptly
to the competent authorities all complex, unusual large transactions and unusual
patterns of transactions, which have no apparent economic or obviously lawful
purpose, without fear of assuming criminal or civil liability for breach of any
restriction on disclosure of information if they report their suspicions in good faith;
(iv) Requiring financial institutions to maintain, for at least five years, all necessary records on
transactions, both domestic and international.
2. States Parties shall further cooperate in the prevention of offences set forth in article 2 by
considering:
(a) Measures for the supervision, including, for example, the licensing, of all money-
transmission agencies;
(b) Feasible measures to detect or monitor the physical cross-border transportation of cash
and bearer negotiable instruments, subject to strict safeguards to ensure proper use of
information and without impeding in any way the freedom of capital movements.
3. States Parties shall further cooperate in the prevention of the offences set forth in article 2
by exchanging accurate and verified information in accordance with their domestic law and
coordinating administrative and other measures taken, as appropriate, to prevent the
commission of offences set forth in article 2, in particular by:
(a) Establishing and maintaining channels of communication between their competent
agencies and services to facilitate the secure and rapid exchange of information
concerning all aspects of offences set forth in article 2;
(b) Cooperating with one another in conducting inquiries, with respect to the offences set
forth in article 2, concerning:
(i) The identity, whereabouts and activities of persons in respect of whom reasonable
suspicion exists that they are involved in such offences;
(ii) The movement of funds relating to the commission of such offences.
4. States Parties may exchange information through the International Criminal Police
Organization (Interpol).
FATF Special Recommendations on Terrorist Financing 143
Article 19
The State Party where the alleged offender is prosecuted shall, in accordance with its domestic
law or applicable procedures, communicate the final outcome of the proceedings to the
Secretary-General of the United Nations, who shall transmit the information to the other
States Parties.
Article 20
The States Parties shall carry out their obligations under this Convention in a manner
consistent with the principles of sovereign equality and territorial integrity of States and that
of non-intervention in the domestic affairs of other States.
Article 21
Nothing in this Convention shall affect other rights, obligations and responsibilities of States
and individuals under international law, in particular the purposes of the Charter of the
United Nations, international humanitarian law and other relevant conventions.
Article 22
Nothing in this Convention entitles a State Party to undertake in the territory of another State
Party the exercise of jurisdiction or performance of functions which are exclusively reserved
for the authorities of that other State Party by its domestic law.
Article 23
1. The annex may be amended by the addition of relevant treaties:
(a) That are open to the participation of all States;
(b) That have entered into force;
(c) That have been ratified, accepted, approved or acceded to by at least twenty-two States
Parties to the present Convention.
2. After the entry into force of this Convention, any State Party may propose such an
amendment. Any proposal for an amendment shall be communicated to the depositary in
written form. The depositary shall notify proposals that meet the requirements of paragraph 1
to all States Parties and seek their views on whether the proposed amendment should be
adopted.
3. The proposed amendment shall be deemed adopted unless one third of the States Parties
object to it by a written notification not later than 180 days after its circulation.
4. The adopted amendment to the annex shall enter into force 30 days after the deposit of the
twenty-second instrument of ratification, acceptance or approval of such amendment for all
those States Parties that have deposited such an instrument. For each State Party ratifying,
accepting or approving the amendment after the deposit of the twenty-second instrument, the
amendment shall enter into force on the thirtieth day after deposit by such State Party of its
instrument of ratification, acceptance or approval.
Article 24
1. Any dispute between two or more States Parties concerning the interpretation or application
144 Documentation
of this Convention which cannot be settled through negotiation within a reasonable time shall,
at the request of one of them, be submitted to arbitration. If, within six months from the date
of the request for arbitration, the parties are unable to agree on the organization of the
arbitration, any one of those parties may refer the dispute to the International Court of
Justice, by application, in conformity with the Statute of the Court.
2. Each State may at the time of signature, ratification, acceptance or approval of this
Convention or accession thereto declare that it does not consider itself bound by paragraph 1.
The other States Parties shall not be bound by paragraph 1 with respect to any State Party
which has made such a reservation.
3. Any State which has made a reservation in accordance with paragraph 2 may at any time
withdraw that reservation by notification to the Secretary-General of the United Nations.
Article 25
1. This Convention shall be open for signature by all States from 10 January 2000 to 31
December 2001 at United Nations Headquarters in New York.
2. This Convention is subject to ratification, acceptance or approval. The instruments of
ratification, acceptance or approval shall be deposited with the Secretary-General of the
United Nations.
3. This Convention shall be open to accession by any State. The instruments of accession shall
be deposited with the Secretary-General of the United Nations.
Article 26
1. This Convention shall enter into force on the thirtieth day following the date of the deposit
of the twenty-second instrument of ratification, acceptance, approval or accession with the
Secretary-General of the United Nations.
2. For each State ratifying, accepting, approving or acceding to the Convention after the
deposit of the twenty-second instrument of ratification, acceptance, approval or accession, the
Convention shall enter into force on the thirtieth day after deposit by such State of its
instrument of ratification, acceptance, approval or accession.
Article 27
1. Any State Party may denounce this Convention by written notification to the Secretary-
General of the United Nations.
2. Denunciation shall take effect one year following the date on which notification is received
by the Secretary-General of the United Nations.
Article 28
The original of this Convention, of which the Arabic, Chinese, English, French, Russian and
Spanish texts are equally authentic, shall be deposited with the Secretary-General of the
United Nations who shall send certified copies thereof to all States.
IN WITNESS WHEREOF, the undersigned, being duly authorized thereto by their respective
Governments, have signed this Convention, opened for signature at United Nations
Headquarters in New York on 10 January 2000.
FATF Special Recommendations on Terrorist Financing 145
Annex 2
1. Convention for the Suppression of Unlawful Seizure of Aircraft, done at The Hague on
16 December 1970.
2. Convention for the Suppression of Unlawful Acts against the Safety of Civil Aviation,
done at Montreal on 23 September 1971.
3. Convention on the Prevention and Punishment of Crimes against Internationally
Protected Persons, including Diplomatic Agents, adopted by the General Assembly of the
United Nations on 14 December 1973.
4. International Convention against the Taking of Hostages, adopted by the General
Assembly of the United Nations on 17 December 1979.
5. Convention on the Physical Protection of Nuclear Material, adopted at Vienna on 3
March 1980.
6. Protocol for the Suppression of Unlawful Acts of Violence at Airports Serving
International Civil Aviation, supplementary to the Convention for the Suppression of
Unlawful Acts against the Safety of Civil Aviation, done at Montreal on 24 February
1988.
7. Convention for the Suppression of Unlawful Acts against the Safety of Maritime
Navigation, done at Rome on 10 March 1988.
8. Protocol for the Suppression of Unlawful Acts against the Safety of Fixed Platforms
located on the Continental Shelf, done at Rome on 10 March 1988.
9. International Convention for the Suppression of Terrorist Bombings, adopted by the
General Assembly of the United Nations on 15 December 1997.
This page intentionally left blank
Financial Action Task Force Guidance for
Financial Institutions in Detecting Terrorism*
A. Introduction
At its extraordinary Plenary meeting on 29–30 October 2001, the Financial Action
Task Force on Money Laundering (FATF) agreed to develop special guidance for
financial institutions to help them detect the techniques and mechanisms used in the
financing of terrorism. The FATF subsequently brought together experts from its
member countries to gather information on and study the issue of terrorist financing
as part of its annual exercise on money laundering methods and trends. One goal of
this exercise was to begin establishing such guidance for financial institutions that
could be issued along with the annual FATF Report on Money Laundering
Methods and Trends. Material derived from the exercise, along with contributions
from the Egmont Group and other international bodies, was used in developing the
present document. The information contained in it represents a first attempt at
providing necessary guidance for financial institutions in this area.
The goal in providing this guidance is to ensure that financial institutions do not
unwittingly hide or move terrorist funds. Financial institutions will thus be better
able to protect themselves from being used as a conduit for such activity. To help
build awareness of how terrorists, their associates or those who support terrorism
may use the financial system, this document describes the general characteristics of
terrorist financing. The accompanying case studies illustrate the manner in which
competent law enforcement authorities or financial intelligence units (FIUs) are able
to establish a terrorist-financing link based on information reported by financial
institutions. Annex 1 contains a series of characteristics of financial transactions that
have been linked to terrorist activity in the past. When one or several of these
potentially suspicious or unusual factors is present as regards a specific financial
transaction – especially when the individual or entity may appear on one of the lists
of suspected terrorists, terrorist organizations or associated individuals and entities
(see Annex 2: Sources of Information) – then a financial institution would have cause
* 24 April 2002.
147
148 Documentation
to increase its scrutiny of the transaction and any associated individuals or entities.
In certain instances, this scrutiny could result in reporting the transaction to
authorities under applicable suspicious or unusual transaction reporting systems.
A financial institution that carries out a transaction, knowing that the funds or
property involved are owned or controlled by terrorists or terrorist organizations, or
that the transaction is linked to, or likely to be used in, terrorist activity, may be
committing a criminal offence under the laws of many jurisdictions. Such an offence
may exist regardless of whether the assets involved in the transaction were the
proceeds of criminal activity or were derived from lawful activity but intended for
use in support of terrorism.
Regardless of whether the funds in a transaction are related to terrorists for the
purposes of national criminal legislation, business relationships with such individuals
or other closely associated persons or entities could, under certain circumstances,
expose a financial institution to significant reputational, operational, and legal risk.
This risk is even more serious if the person or entity involved is later shown to have
benefited from the lack of effective monitoring or wilful blindness of a particular
institution and thus was to carry out terrorist acts.
may be subject in their particular jurisdiction. It should be noted however that this
guidance does not replace or supersede any obligations under the current national
laws or regulations. In particular, implementing the measures proposed by this
guidance should not be construed as necessarily protecting a financial institution
from any action that a jurisdiction might choose to take against it. Furthermore, this
guidance does not supersede or modify requirements imposed by national or
regional authorities, which call for the freezing of assets of individuals and entities
suspected of being terrorists or terrorist related, as part of implementing relevant
United Nations Security Council Resolutions (see Annex 2: Sources of Information).
Financial institutions are encouraged to develop practices and procedures that will
help to detect and deter those transactions that may involve funds used in terrorist
financing. The increased scrutiny that may be warranted for some transactions
should be seen as a further application of the institution’s due diligence and anti-
money laundering policies and procedures and should lead, when appropriate, to
reporting of such financial activity as suspicious or unusual under applicable
transaction reporting regimes for a particular jurisdiction. To ensure that the
practical steps are taken to increase scrutiny of certain transactions when necessary,
it may be useful for a financial institution to review its practices in this area as part of
its general internal and external audit processes.
vary depending on the extent of the risk determined to exist by each institution as a
general matter, given its normal business operations. It will also vary according to the
individual factors of each case as it occurs. Financial institutions should exercise
reasonable judgement in modifying and implementing policies and procedures in this
area. This Guidance should not be interpreted as discouraging or prohibiting financial
institutions from doing business with any legitimate customer. Indeed, it has been
designed solely as a means of assisting financial institutions in determining whether a
transaction merits additional scrutiny so that the institution is thus better able to
identify, report (when appropriate) and ultimately avoid transactions involving the
funds supporting or associated with the financing of terrorism.
1
Art. 2, International Convention for the Suppression of the Financing of Terrorism, 9
December 1999.
152 Documentation
banks concerning two persons and a diamond trading company. The individuals and
the company in question were account holders at the various banks. In the space of a
few months, a large number of fund transfers to and from overseas were made from
the accounts of the two individuals. Moreover, soon after the account was opened,
one of the individuals received several USD cheques for large amounts. According to
information obtained by the FIU, one of the accounts held by the company
appeared to have received large US dollar deposit originating from companies active
in the diamond industry. One of the directors of the company, a citizen of Country C
but residing in Africa, maintained an account at another bank in Country C. Several
transfers had been carried out to and from overseas using this account. The transfers
from foreign countries were mainly in US dollars. They were converted into the local
currency and were then transferred to foreign countries and to accounts in Country
C belonging to one of the two subjects of the suspicious transaction report. Police
information obtained by the FIU revealed that an investigation had already been
initiated relating to these individuals and the trafficking of diamonds originating
from Africa. The large funds transfers by the diamond trading company were mainly
sent to the same person residing in another region. Police sources revealed that this
person and the individual that had cashed the cheques were suspected of buying
diamonds from the rebel army of an African country and then smuggling them into
Country C on behalf of a terrorist organization. Further research by the FIU also
revealed links between the subjects of the suspicious transaction report and
individuals and companies already tied to the laundering of funds for organized
crime. This case is currently under investigation.
The second major source of funds for terrorist organizations is income derived
directly from various ‘revenue-generating’ activities. As with criminal organizations,
a terrorist group’s income may be derived from crime or other unlawful activities. A
terrorist group in a particular region may support itself through kidnapping and
extortion. In this scenario, ransoms paid to retrieve hostages, along with a special
‘revolutionary tax’ (in reality a euphemism for protection money) demanded of
businesses, provide needed financial resources but also play a secondary role as one
other means of intimidating the target population. Besides kidnapping and
extortion, terrorist groups may engage in large-scale smuggling, various types of
fraud (for example, through credit cards or charities), thefts and robbery, and
narcotics trafficking.
Funding for terrorist groups, unlike for criminal organizations, however, may
also include income derived from legitimate sources or from a combination of lawful
and unlawful sources. Indeed, this funding from legal sources is a key difference
between terrorist groups and traditional criminal organizations. How much of a role
legal money plays in the support of terrorism varies according to the terrorist group
and whether the source of funds is in the same geographic location as the terrorist
acts the group commits.
Community solicitation and fundraising appeals are one very effective means of
raising funds to support terrorism. Often such fundraising is carried out in the name
of organizations having the status of a charitable or relief organization, and it may
Financial Action Task Force Guidance for Financial Institutions 153
2
For more information on the hawala system of alternate remittance/underground banking,
see the 1999-2000 FATF Report on Money Laundering Typologies, 3 February 2001, at
pp. 4–8.
154 Documentation
different foreign currencies. According to the customer, these funds were intended to
finance companies in the media sector. The FIU requested information from several
financial institutions. Through these enquiries, it learned that the managers of the
offshore investment company were residing in Country L and a bordering country.
They had opened accounts at various banks in Country L under the names of media
companies and a non-profit organization involved in the promotion of cultural
activities. According to the analysis by the FIU, the managers of the offshore
investment company and several other clients had made cash deposits to the
accounts. These funds were ostensibly intended for the financing of media-based
projects. The analysis further revealed that the account held by the non-profit
organization was receiving almost daily deposits in small amounts by third parties.
The manager of this organization stated that the money deposited in this account
was coming from its members for the funding of cultural activities. Police
information obtained by the FIU revealed that the managers of offshore investment
company were known to have been involved in money laundering and that an
investigation was already underway into their activities. The managers appeared to
be members of a terrorist group, which was financed by extortion and narcotics
trafficking. Funds were collected through the non-profit organization from the
different suspects involved in this case. This case is currently under investigation.
The difference between legally and illegally obtained proceeds raises an important
legal problem as far as applying anti-money laundering measures to terrorist
financing. Money laundering has generally been defined as a process whereby funds
obtained through or generated by criminal activity are moved or concealed in order
to obscure the link between the crime and generated funds. The terrorist’s ultimate
aim on the other hand is not to generate profit from his or her fundraising
mechanisms but to obtain resources to support his or her operations. In a number of
countries, terrorist financing thus may not yet be included as a predicate offence for
money laundering, and it may be impossible therefore to apply preventive and
repressive measures specifically targeting this terrorist activity.
When terrorists or terrorist organizations obtain their financial support from legal
sources (donations, sales of publications, etc.), there are certain factors that make
detecting and tracing these funds more difficult. For example, charities or non-profit
organizations and other legal entities have been cited as playing an important role in
the financing of some terrorist groups. The apparent legal source of this funding may
mean that there are few, if any, indicators that would make an individual financial
transaction or series of transactions stand out as linked to terrorist activities.
Other important aspects of terrorist financing that make its detection more
difficult are the size and nature of the transactions involved. Several FATF experts
have mentioned that the funding needed to mount a terrorist attack does not always
call for large sums of money, and the associated transactions are usually not
complex. For example, an examination of the financial connections among the 11
September hijackers showed that most of the individual transactions were small
sums, that is, below the usual cash transaction reporting thresholds, and in most
cases the operations consisted of only wire transfers. The individuals were ostensibly
Financial Action Task Force Guidance for Financial Institutions 155
foreign students who appeared to be receiving money from their parents or in the
form of grants for their studies, thus the transactions would not have been identified
as needing additional scrutiny by the financial institutions involved.
A. Accounts
(1) Accounts that receive relevant periodical deposits and are dormant at other periods. These
accounts are then used in creating an apparently legitimate financial background through
which additional fraudulent activities may be carried out.
(2) A dormant account containing a minimal sum suddenly receives a deposit or series of
deposits followed by daily cash withdrawals that continue until the transferred sum has been
removed.
(3) When opening an account, the customer refuses to provide information required by the
financial institution, attempts to reduce the level of information provided to the minimum or
provides information that is misleading or difficult to verify.
(4) An account for which several persons have signature authority, yet these persons appear to
have no relation among each other (either family ties or business relationship).
(5) An account opened by a legal entity or an organization that has the same address as other
legal entities or organizations but for which the same person or persons have signature
authority, when there is no apparent economic or legal reason for such an arrangement (for
example, individuals serving as company directors for multiple companies headquartered at
the same location, etc.).
(6) An account opened in the name of a recently formed legal entity and in which a higher than
expected level of deposits are made in comparison with the income of the founders of the
entity.
(7) The opening by the same person of multiple accounts into which numerous small deposits
are made that in aggregate are not commensurate with the expected income of the customer.
(8) An account opened in the name of a legal entity that is involved in the activities of an
association or foundation whose aims are related to the claims or demands of a terrorist
organization.
(9) An account opened in the name of a legal entity, a foundation or an association, which
3
This guidance does not supersede or modify requirements imposed by national or regional
authorities, which call for the freezing of assets of individuals and entities suspected of
being terrorists or terrorist related, as part of implementing relevant United Nations
Security Council Resolutions.
Financial Action Task Force Guidance for Financial Institutions 157
may be linked to a terrorist organization and that shows movements of funds above the
expected level of income.
C. Wire transfers
(1) Wire transfers ordered in small amounts in an apparent effort to avoid triggering
identification or reporting requirements.
(2) Wire transfers to or for an individual where information on the originator, or the person on
whose behalf the transaction is conducted, is not provided with the wire transfer, when the
inclusion of such information would be expected.
(3) Use of multiple personal and business accounts or the accounts of non-profit organizations
or charities to collect and then funnel funds immediately or after a short time to a small
number of foreign beneficiaries.
(4) Foreign exchange transactions that are performed on behalf of a customer by a third party
followed by wire transfers of the funds to locations having no apparent business connection
with the customer or to countries of specific concern.
is also a business location and/or does not seem to correspond to the stated occupation (for
example student, unemployed, self-employed, etc.).
(3) Stated occupation of the transactor is not commensurate with the level or type of activity
(for example, a student or an unemployed individual who receives or sends large numbers of
wire transfers, or who makes daily maximum cash withdrawals at multiple locations over a
wide geographic area).
(4) Regarding non-profit or charitable organizations, financial transactions for which there
appears to be no logical economic purpose or in which there appears to be no link between the
stated activity of the organization and the other parties in the transaction.
(5) A safe deposit box is opened on behalf of a commercial entity when the business activity of
the customer is unknown or such activity does not appear to justify the use of a safe deposit
box.
(6) Unexplained inconsistencies arising from the process of identifying or verifying the
customer (for example, regarding previous or current country of residence, country of issue of
the passport, countries visited according to the passport, and documents furnished to confirm
name, address and date of birth).
B. Other lists
C. Standards
Preamble
* /A/C.6/54/L.2, annex I.
161
162 Documentation
Deeply concerned about the worldwide escalation of acts of terrorism in all its forms
and manifestations,
Recalling the Declaration on the Occasion of the Fiftieth Anniversary of the United
Nations, contained in General Assembly resolution 50/6 of 24 October 1995,
Recalling also all the relevant General Assembly resolutions on the matter, including
resolution 49/60 of 9 December 1994 and the annex thereto on the Declaration on
Measures to Eliminate International Terrorism, in which the States Members of the
United Nations solemnly reaffirmed their unequivocal condemnation of all acts,
methods and practices of terrorism as criminal and unjustifiable, wherever and by
whomever committed, including those which jeopardize the friendly relations among
States and peoples and threaten the territorial integrity and security of States,
Noting that the Declaration on Measures to Eliminate International Terrorism also
encouraged States to review urgently the scope of the existing international legal
provisions on the prevention, repression and elimination of terrorism in all its forms
and manifestations, with the aim of ensuring that there is a comprehensive legal
framework covering all aspects of the matter,
Recalling paragraph 3 (f) of General Assembly resolution 51/210 of 17 December
1996, in which the Assembly called upon all States to take steps to prevent and
counteract, through appropriate domestic measures, the financing of terrorists and
terrorist organizations, whether such financing is direct or indirect through
organizations which also have or claim to have charitable, social or cultural goals
or which are also engaged in unlawful activities such as illicit arms trafficking, drug
dealing and racketeering, including the exploitation of persons for purposes of
funding terrorist activities, and in particular to consider, where appropriate,
adopting regulatory measures to prevent and counteract movements of funds
suspected to be intended for terrorist purposes without impeding in any way the
freedom of legitimate capital movements and to intensify the exchange of
information concerning international movements of such funds,
Recalling also General Assembly resolution 52/165 of 15 December 1997, in which
the Assembly called upon States to consider, in particular, the implementation of the
measures set out in paragraphs 3 (a) to (f) of its resolution 51/210,
Recalling further General Assembly resolution 53/108 of 8 December 1998, in which
the Assembly decided that the Ad Hoc Committee established by General Assembly
resolution 51/210 of 17 December 1996 should elaborate a draft international
convention for the suppression of terrorist financing to supplement related existing
international instruments,
Considering that the financing of terrorism is a matter of grave concern to the
international community as a whole,
Noting that the number and seriousness of acts of international terrorism depend on
the financing that terrorists may obtain,
International Convention for the Suppression of the Financing of Terrorism 163
Noting also that existing multilateral legal instruments do not expressly address such
financing,
Being convinced of the urgent need to enhance international cooperation among
States in devising and adopting effective measures for the prevention of the financing
of terrorism, as well as for its suppression through the prosecution and punishment
of its perpetrators,
Have agreed as follows:
Article 1
For the purposes of this Convention:
1. ‘Funds’ means assets of every kind, whether tangible or intangible, movable
or immovable, however acquired, and legal documents or instruments in
any form, including electronic or digital, evidencing title to, or interest in,
such assets, including, but not limited to, bank credits, travellers cheques,
bank cheques, money orders, shares, securities, bonds, drafts and letters of
credit.
2. ‘State or government facility’ means any permanent or temporary facility or
conveyance that is used or occupied by representatives of a State, members of
Government, the legislature or the judiciary or by officials or employees of a
State or any other public authority or entity or by employees or officials of an
intergovernmental organization in connection with their official duties.
3. ‘Proceeds’ means any funds derived from or obtained, directly or indirectly,
through the commission of an offence set forth in article 2.
Article 2
1. Any person commits an offence within the meaning of this Convention if that
person by any means, directly or indirectly, unlawfully and wilfully, provides
or collects funds with the intention that they should be used or in the
knowledge that they are to be used, in full or in part, in order to carry out:
(a) An act which constitutes an offence within the scope of and as defined
in one of the treaties listed in the annex; or
(b) Any other act intended to cause death or serious bodily injury to a civilian,
or to any other person not taking an active part in the hostilities in a
situation of armed conflict, when the purpose of such act, by its nature or
context, is to intimidate a population, or to compel a Government or an
international organization to do or to abstain from doing any act.
2. (a) On depositing its instrument of ratification, acceptance, approval or
accession, a State Party which is not a party to a treaty listed in the
annex may declare that, in the application of this Convention to the
State Party, the treaty shall be deemed not to be included in the annex
referred to in paragraph 1, subparagraph (a). The declaration shall cease
164 Documentation
to have effect as soon as the treaty enters into force for the State Party,
which shall notify the depositary of this fact;
(b) When a State Party ceases to be a party to a treaty listed in the annex, it
may make a declaration as provided for in this article, with respect to
that treaty.
3. For an act to constitute an offence set forth in paragraph 1, it shall not be
necessary that the funds were actually used to carry out an offence referred to
in paragraph 1, subparagraph (a) or (b).
4. Any person also commits an offence if that person attempts to commit an
offence as set forth in paragraph 1 of this article.
5. Any person also commits an offence if that person:
(a) Participates as an accomplice in an offence as set forth in paragraph 1 or
4 of this article;
(b) Organizes or directs others to commit an offence as set forth in
paragraph 1 or 4 of this article;
(c) Contributes to the commission of one or more offences as set forth in
paragraph 1 or 4 of this article by a group of persons acting with a
common purpose. Such contribution shall be intentional and shall either:
(i) Be made with the aim of furthering the criminal activity or criminal
purpose of the group, where such activity or purpose involves the
commission of an offence as set forth in paragraph 1 of this article;
or
(ii) Be made in the knowledge of the intention of the group to commit
an offence as set forth in paragraph 1 of this article.
Article 3
This Convention shall not apply where the offence is committed within a single State,
the alleged offender is a national of that State and is present in the territory of that
State and no other State has a basis under article 7, paragraph 1 or 2, to exercise
jurisdiction, except that the provisions of articles 12 to 18 shall, as appropriate, apply
in those cases.
Article 4
Each State Party shall adopt such measures as may be necessary:
(a) To establish as criminal offences under its domestic law the offences as
set forth in article 2;
(b) To make those offences punishable by appropriate penalties which take
into account the grave nature of the offences.
Article 5
1. Each State Party, in accordance with its domestic legal principles, shall take
International Convention for the Suppression of the Financing of Terrorism 165
Article 6
Each State Party shall adopt such measures as may be necessary, including, where
appropriate, domestic legislation, to ensure that criminal acts within the scope of this
Convention are under no circumstances justifiable by considerations of a political,
philosophical, ideological, racial, ethnic, religious or other similar nature.
Article 7
1. Each State Party shall take such measures as may be necessary to establish its
jurisdiction over the offences set forth in article 2 when:
(a) The offence is committed in the territory of that State;
(b) The offence is committed on board a vessel flying the flag of that State
or an aircraft registered under the laws of that State at the time the
offence is committed;
(c) The offence is committed by a national of that State.
2. A State Party may also establish its jurisdiction over any such offence when:
(a) The offence was directed towards or resulted in the carrying out of an
offence referred to in article 2, paragraph 1, subparagraph (a) or (b), in
the territory of or against a national of that State;
(b) The offence was directed towards or resulted in the carrying out of an
offence referred to in article 2, paragraph 1, subparagraph (a) or (b),
against a State or government facility of that State abroad, including
diplomatic or consular premises of that State;
(c) The offence was directed towards or resulted in an offence referred to in
article 2, paragraph 1, subparagraph (a) or (b), committed in an attempt
to compel that State to do or abstain from doing any act;
(d) The offence is committed by a stateless person who has his or her
habitual residence in the territory of that State;
(e) The offence is committed on board an aircraft which is operated by the
Government of that State.
3. Upon ratifying, accepting, approving or acceding to this Convention, each
166 Documentation
State Party shall notify the Secretary-General of the United Nations of the
jurisdiction it has established in accordance with paragraph 2. Should any
change take place, the State Party concerned shall immediately notify the
Secretary-General.
4. Each State Party shall likewise take such measures as may be necessary to
establish its jurisdiction over the offences set forth in article 2 in cases where
the alleged offender is present in its territory and it does not extradite that
person to any of the States Parties that have established their jurisdiction in
accordance with paragraphs 1 or 2.
5. When more than one State Party claims jurisdiction over the offences set
forth in article 2, the relevant States Parties shall strive to coordinate their
actions appropriately, in particular concerning the conditions for prosecution
and the modalities for mutual legal assistance.
6. Without prejudice to the norms of general international law, this Convention
does not exclude the exercise of any criminal jurisdiction established by a
State Party in accordance with its domestic law.
Article 8
l. Each State Party shall take appropriate measures, in accordance with its
domestic legal principles, for the identification, detection and freezing or
seizure of any funds used or allocated for the purpose of committing the
offences set forth in article 2 as well as the proceeds derived from such
offences, for purposes of possible forfeiture.
2. Each State Party shall take appropriate measures, in accordance with its
domestic legal principles, for the forfeiture of funds used or allocated for the
purpose of committing the offences set forth in article 2 and the proceeds
derived from such offences.
3. Each State Party concerned may give consideration to concluding agreements
on the sharing with other States Parties, on a regular or case-by-case basis, of
the funds derived from the forfeitures referred to in this article.
4. Each State Party shall consider establishing mechanisms whereby the funds
derived from the forfeitures referred to in this article are utilized to
compensate the victims of offences referred to in article 2, paragraph 1,
subparagraph (a) or (b), or their families.
5. The provisions of this article shall be implemented without prejudice to the
rights of third parties acting in good faith.
Article 9
1. Upon receiving information that a person who has committed or who is alleged
to have committed an offence set forth in article 2 may be present in its territory,
the State Party concerned shall take such measures as may be necessary under
its domestic law to investigate the facts contained in the information.
International Convention for the Suppression of the Financing of Terrorism 167
2. Upon being satisfied that the circumstances so warrant, the State Party in
whose territory the offender or alleged offender is present shall take the
appropriate measures under its domestic law so as to ensure that person’s
presence for the purpose of prosecution or extradition.
3. Any person regarding whom the measures referred to in paragraph 2 are
being taken shall be entitled:
(a) To communicate without delay with the nearest appropriate represen-
tative of the State of which that person is a national or which is
otherwise entitled to protect that person’s rights or, if that person is a
stateless person, the State in the territory of which that person
habitually resides;
(b) To be visited by a representative of that State;
(c) To be informed of that person’s rights under subparagraphs (a) and (b).
4. The rights referred to in paragraph 3 shall be exercised in conformity with the
laws and regulations of the State in the territory of which the offender or
alleged offender is present, subject to the provision that the said laws and
regulations must enable full effect to be given to the purposes for which the
rights accorded under paragraph 3 are intended.
5. The provisions of paragraphs 3 and 4 shall be without prejudice to the right
of any State Party having a claim to jurisdiction in accordance with article 7,
paragraph 1, subparagraph (b), or paragraph 2, subparagraph (b), to invite
the International Committee of the Red Cross to communicate with and visit
the alleged offender.
6. When a State Party, pursuant to the present article, has taken a person into
custody, it shall immediately notify, directly or through the Secretary-
General of the United Nations, the States Parties which have established
jurisdiction in accordance with article 7, paragraph 1 or 2, and, if it considers
it advisable, any other interested States Parties, of the fact that such person is
in custody and of the circumstances which warrant that person’s detention.
The State which makes the investigation contemplated in paragraph 1 shall
promptly inform the said States Parties of its findings and shall indicate
whether it intends to exercise jurisdiction.
Article 10
1. The State Party in the territory of which the alleged offender is present shall,
in cases to which article 7 applies, if it does not extradite that person, be
obliged, without exception whatsoever and whether or not the offence was
committed in its territory, to submit the case without undue delay to its
competent authorities for the purpose of prosecution, through proceedings in
accordance with the laws of that State. Those authorities shall take their
decision in the same manner as in the case of any other offence of a grave
nature under the law of that State.
2. Whenever a State Party is permitted under its domestic law to extradite or
168 Documentation
otherwise surrender one of its nationals only upon the condition that the
person will be returned to that State to serve the sentence imposed as a result
of the trial or proceeding for which the extradition or surrender of the person
was sought, and this State and the State seeking the extradition of the person
agree with this option and other terms they may deem appropriate, such a
conditional extradition or surrender shall be sufficient to discharge the
obligation set forth in paragraph 1.
Article 11
1. The offences set forth in article 2 shall be deemed to be included as
extraditable offences in any extradition treaty existing between any of the
States Parties before the entry into force of this Convention. States Parties
undertake to include such offences as extraditable offences in every
extradition treaty to be subsequently concluded between them.
2. When a State Party which makes extradition conditional on the existence of a
treaty receives a request for extradition from another State Party with which
it has no extradition treaty, the requested State Party may, at its option,
consider this Convention as a legal basis for extradition in respect of the
offences set forth in article 2. Extradition shall be subject to the other
conditions provided by the law of the requested State.
3. States Parties which do not make extradition conditional on the existence of a
treaty shall recognize the offences set forth in article 2 as extraditable offences
between themselves, subject to the conditions provided by the law of the
requested State.
4. If necessary, the offences set forth in article 2 shall be treated, for the
purposes of extradition between States Parties, as if they had been committed
not only in the place in which they occurred but also in the territory of the
States that have established jurisdiction in accordance with article 7,
paragraphs 1 and 2.
5. The provisions of all extradition treaties and arrangements between States
Parties with regard to offences set forth in article 2 shall be deemed to be
modified as between States Parties to the extent that they are incompatible
with this Convention.
Article 12
1. States Parties shall afford one another the greatest measure of assistance in
connection with criminal investigations or criminal or extradition proceed-
ings in respect of the offences set forth in article 2, including assistance in
obtaining evidence in their possession necessary for the proceedings.
2. States Parties may not refuse a request for mutual legal assistance on the
ground of bank secrecy.
3. The requesting Party shall not transmit or use information or evidence
International Convention for the Suppression of the Financing of Terrorism 169
Article 13
None of the offences set forth in article 2 shall be regarded, for the purposes of
extradition or mutual legal assistance, as a fiscal offence. Accordingly, States Parties
may not refuse a request for extradition or for mutual legal assistance on the sole
ground that it concerns a fiscal offence.
Article 14
None of the offences set forth in article 2 shall be regarded for the purposes of
extradition or mutual legal assistance as a political offence or as an offence connected
with a political offence or as an offence inspired by political motives. Accordingly, a
request for extradition or for mutual legal assistance based on such an offence may not
be refused on the sole ground that it concerns a political offence or an offence
connected with a political offence or an offence inspired by political motives.
Article 15
Nothing in this Convention shall be interpreted as imposing an obligation to extradite
or to afford mutual legal assistance, if the requested State Party has substantial grounds
for believing that the request for extradition for offences set forth in article 2 or for
mutual legal assistance with respect to such offences has been made for the purpose of
prosecuting or punishing a person on account of that person’s race, religion,
nationality, ethnic origin or political opinion or that compliance with the request
would cause prejudice to that person’s position for any of these reasons.
Article 16
l. A person who is being detained or is serving a sentence in the territory of one
State Party whose presence in another State Party is requested for purposes
of identification, testimony or otherwise providing assistance in obtaining
evidence for the investigation or prosecution of offences set forth in article 2
may be transferred if the following conditions are met:
170 Documentation
Article 17
Any person who is taken into custody or regarding whom any other measures are
taken or proceedings are carried out pursuant to this Convention shall be guaranteed
fair treatment, including enjoyment of all rights and guarantees in conformity with
the law of the State in the territory of which that person is present and applicable
provisions of international law, including international human rights law.
Article 18
1. States Parties shall cooperate in the prevention of the offences set forth in
article 2 by taking all practicable measures, inter alia, by adapting their
domestic legislation, if necessary, to prevent and counter preparations in their
respective territories for the commission of those offences within or outside
their territories, including:
(a) Measures to prohibit in their territories illegal activities of persons and
organizations that knowingly encourage, instigate, organize or engage
in the commission of offences set forth in article 2;
International Convention for the Suppression of the Financing of Terrorism 171
Article 19
The State Party where the alleged offender is prosecuted shall, in accordance with its
domestic law or applicable procedures, communicate the final outcome of the
proceedings to the Secretary-General of the United Nations, who shall transmit the
information to the other States Parties.
Article 20
The States Parties shall carry out their obligations under this Convention in a
manner consistent with the principles of sovereign equality and territorial integrity of
States and that of non-intervention in the domestic affairs of other States.
Article 21
Nothing in this Convention shall affect other rights, obligations and responsibilities
of States and individuals under international law, in particular the purposes of the
Charter of the United Nations, international humanitarian law and other relevant
conventions.
Article 22
Nothing in this Convention entitles a State Party to undertake in the territory of
another State Party the exercise of jurisdiction or performance of functions which
are exclusively reserved for the authorities of that other State Party by its domestic
law.
Article 23
1. The annex may be amended by the addition of relevant treaties:
(a) That are open to the participation of all States;
(b) That have entered into force;
(c) That have been ratified, accepted, approved or acceded to by at least
twenty-two States Parties to the present Convention.
2. After the entry into force of this Convention, any State Party may propose
such an amendment. Any proposal for an amendment shall be communicated
International Convention for the Suppression of the Financing of Terrorism 173
to the depositary in written form. The depositary shall notify proposals that
meet the requirements of paragraph 1 to all States Parties and seek their
views on whether the proposed amendment should be adopted.
3. The proposed amendment shall be deemed adopted unless one third of the
States Parties object to it by a written notification not later than 180 days
after its circulation.
4. The adopted amendment to the annex shall enter into force 30 days after the
deposit of the twenty-second instrument of ratification, acceptance or
approval of such amendment for all those States Parties that have deposited
such an instrument. For each State Party ratifying, accepting or approving
the amendment after the deposit of the twenty-second instrument, the
amendment shall enter into force on the thirtieth day after deposit by such
State Party of its instrument of ratification, acceptance or approval.
Article 24
1. Any dispute between two or more States Parties concerning the interpretation
or application of this Convention which cannot be settled through
negotiation within a reasonable time shall, at the request of one of them,
be submitted to arbitration. If, within six months from the date of the request
for arbitration, the parties are unable to agree on the organization of the
arbitration, any one of those parties may refer the dispute to the
International Court of Justice, by application, in conformity with the Statute
of the Court.
2. Each State may at the time of signature, ratification, acceptance or approval
of this Convention or accession thereto declare that it does not consider itself
bound by paragraph 1. The other States Parties shall not be bound by
paragraph 1 with respect to any State Party which has made such a
reservation.
3. Any State which has made a reservation in accordance with paragraph 2 may
at any time withdraw that reservation by notification to the Secretary-
General of the United Nations.
Article 25
1. This Convention shall be open for signature by all States from 10 January
2000 to 31 December 2001 at United Nations Headquarters in New York.
2. This Convention is subject to ratification, acceptance or approval. The
instruments of ratification, acceptance or approval shall be deposited with
the Secretary-General of the United Nations.
3. This Convention shall be open to accession by any State. The instruments of
accession shall be deposited with the Secretary-General of the United
Nations.
174 Documentation
Article 26
1. This Convention shall enter into force on the thirtieth day following the date
of the deposit of the twenty-second instrument of ratification, acceptance,
approval or accession with the Secretary-General of the United Nations.
2. For each State ratifying, accepting, approving or acceding to the Convention
after the deposit of the twenty-second instrument of ratification, acceptance,
approval or accession, the Convention shall enter into force on the thirtieth
day after deposit by such State of its instrument of ratification, acceptance,
approval or accession.
Article 27
1. Any State Party may denounce this Convention by written notification to the
Secretary-General of the United Nations.
2. Denunciation shall take effect one year following the date on which
notification is received by the Secretary-General of the United Nations.
Article 28
The original of this Convention, of which the Arabic, Chinese, English, French,
Russian and Spanish texts are equally authentic, shall be deposited with the Secretary-
General of the United Nations who shall send certified copies thereof to all States.
IN WITNESS WHEREOF, the undersigned, being duly authorized thereto by their
respective Governments, have signed this Convention, opened for signature at
United Nations Headquarters in New York on 10 January 2000.
Annex
1. Convention for the Suppression of Unlawful Seizure of Aircraft, done at The Hague on 16
December 1970.
2. Convention for the Suppression of Unlawful Acts against the Safety of Civil Aviation, done
at Montreal on 23 September 1971.
3. Convention on the Prevention and Punishment of Crimes against Internationally Protected
Persons, including Diplomatic Agents, adopted by the General Assembly of the United
Nations on 14 December 1973.
4. International Convention against the Taking of Hostages, adopted by the General
Assembly of the United Nations on 17 December 1979.
5. Convention on the Physical Protection of Nuclear Material, adopted at Vienna on 3 March
1980.
6. Protocol for the Suppression of Unlawful Acts of Violence at Airports Serving International
Civil Aviation, supplementary to the Convention for the Suppression of Unlawful Acts
against the Safety of Civil Aviation, done at Montreal on 24 February 1988.
7. Convention for the Suppression of Unlawful Acts against the Safety of Maritime
Navigation, done at Rome on 10 March 1988.
International Convention for the Suppression of the Financing of Terrorism 175
8. Protocol for the Suppression of Unlawful Acts against the Safety of Fixed Platforms located
on the Continental Shelf, done at Rome on 10 March 1988.
9. International Convention for the Suppression of Terrorist Bombings, adopted by the
General Assembly of the United Nations on 15 December 1997.
This page intentionally left blank
Council Common Position of 27 December 2001
on the Application of Specific Measures to
Combat Terrorism
(2001/931/CFSP)
177
178 Documentation
Article 1
1. This Common Position applies in accordance with the provisions of the
following Articles to persons, groups and entities involved in terrorist acts
and listed in the Annex.
2. For the purposes of this Common Position, ‘persons, groups and entities
involved in terrorist acts’ shall mean:
persons who commit, or attempt to commit, terrorist acts or who
participate in, or facilitate, the commission of terrorist acts,
groups and entities owned or controlled directly or indirectly by such
persons; and persons, groups and entities acting on behalf of, or under the
direction of, such persons, groups and entities, including funds derived or
generated from property owned or controlled directly or indirectly by such
persons and associated persons, groups and entities.
3. For the purposes of this Common Position, ‘terrorist act’ shall mean one of
the following intentional acts, which, given its nature or its context, may
seriously damage a country or an international organisation, as defined as an
offence under national law, where committed with the aim of:
(i) seriously intimidating a population, or
(ii) unduly compelling a Government or an international organisation to
perform or abstain from performing any act, or
(iii) seriously destabilising or destroying the fundamental political, constitu-
tional, economic or social structures of a country or an international
organisation:
(a) attacks upon a person’s life which may cause death;
(b) attacks upon the physical integrity of a person;
(c) kidnapping or hostage taking;
(d) causing extensive destruction to a Government or public facility, a
transport system, an infrastructure facility, including an informa-
tion system, a fixed platform located on the continental shelf, a
public place or private property, likely to endanger human life or
result in major economic loss;
(e) seizure of aircraft, ships or other means of public or goods
transport;
(f) manufacture, possession, acquisition, transport, supply or use of
weapons, explosives or of nuclear, biological or chemical weapons,
as well as research into, and development of, biological and
chemical weapons;
(g) release of dangerous substances, or causing fires, explosions or
floods the effect of which is to endanger human life;
(h) interfering with or disrupting the supply of water, power or any
other fundamental natural resource, the effect of which is to
endanger human life; (i) threatening to commit any of the acts
listed under (a) to (h);
Council Common Position of 27 December 2001 179
Article 2
The European Community, acting within the limits of the powers conferred on it by
the Treaty establishing the European Community, shall order the freezing of the
funds and other financial assets or economic resources of persons, groups and
entities listed in the Annex.
Article 3
The European Community, acting within the limits of the powers conferred on it by
the Treaty establishing the European Community, shall ensure that funds, financial
180 Documentation
assets or economic resources or financial or other related services will not be made
available, directly or indirectly, for the benefit of persons, groups and entities listed
in the Annex.
Article 4
Member States shall, through police and judicial cooperation in criminal matters
within the framework of Title VI of the Treaty on European Union, afford each
other the widest possible assistance in preventing and combating terrorist acts. To
that end they shall, with respect to enquiries and proceedings conducted by their
authorities in respect of any of the persons, groups and entities listed in the Annex,
fully exploit, upon request, their existing powers in accordance with acts of the
European Union and other international agreements, arrangements and conventions
which are binding upon Member States.
Article 5
This Common Position shall take effect on the date of its adoption.
Article 6
This Common Position shall be kept under constant review.
Article 7
This Common Position shall be published in the Official Journal.
Done at Brussels, 27 December 2001.
For the Council
The President
L. MICHEL
Annex
First list of persons, groups and entities referred to in Article 11
1. Persons
*— ABAUNZA MARTINEZ, Javier (E.T.A. Activist) born 1.1.1965 in Guernica (Biscay),
identity card No 78.865.882,
*— ALBERDI URANGA, Itziar (E.T.A. Activist) born 7.10.1963 in Durango (Biscay),
identity card No 78.865.693,
1
Persons marked with an * shall be the subject of Article 4 only.
Council Common Position of 27 December 2001 181
(2001/930/CFSP)
THE COUNCIL OFTHE EUROPEAN UNION
Having regard to the Treaty on European Union, and in particular Articles 15 and
34 thereof,
Whereas:
(1) At its extraordinary meeting on 21 September 2001, the European Council
declared that terrorism is a real challenge to the world and to Europe and that
the fight against terrorism will be a priority objective of the European Union.
(2) On 28 September 2001, the United Nations Security Council adopted
resolution 1373(2001), reaffirming that terrorist acts constitute a threat to
peace and security and setting out measures aimed at combating terrorism
and in particular the fight against the financing of terrorism and the
provision of safe havens for terrorists.
(3) On 8 October 2001, the Council reaffirmed the determination of the EU and
its Member States to play their full part, in a coordinated manner, in the
global coalition against terrorism, under the aegis of the United Nations. The
Council also reiterated the Union’s determination to attack the sources which
fund terrorism, in close cooperation with the United States.
(4) On 19 October 2001, the European Council declared that it is determined to
combat terrorism in every form throughout the world and that it will continue
its efforts to strengthen the coalition of the international community to combat
terrorism in every shape and form, for example by the increased cooperation
between the operational services responsible for combating terrorism: Europol,
Eurojust, the intelligence services, police forces and judicial authorities.
(5) Action has already been taken to implement some of the measures listed below.
(6) Under these extraordinary circumstances, action by the Community is
needed in order to implement some of the measures listed below,
HAS ADOPTED THIS COMMON POSITION:
183
184 Documentation
Article 1
The wilful provision or collection, by any means, directly or indirectly, of funds by
citizens or within the territory of each of the Member States of the European Union
with the intention that the funds should be used, or in the knowledge that they are to
be used, in order to carry out terrorist acts shall be criminalized.
Article 2
Funds and other financial assets or economic resources of:
persons who commit, or attempt to commit, terrorist acts or participate in or
facilitate the commission of terrorist acts;
entities owned or controlled, directly or indirectly, by such persons; and
persons and entities acting on behalf of or under the direction of such persons
and entities, including funds derived or generated from property owned or
controlled directly or indirectly by such persons and associated persons and
entities, shall be frozen.
Article 3
Funds, financial assets or economic resources or financial or other related services
shall not be made available, directly or indirectly, for the benefit of:
persons who commit or attempt to commit or facilitate or participate in the
commission of terrorist acts;
entities owned or controlled, directly or indirectly, by such persons; and
persons and entities acting on behalf of or under the direction of such persons.
Article 4
Measures shall be taken to suppress any form of support, active or passive, to
entities or persons involved in terrorist acts, including measures aimed at suppressing
the recruitment of members of terrorist groups and eliminating the supply of
weapons to terrorists.
Article 5
Steps shall be taken to prevent the commission of terrorist acts, including by the
provision of early warning among Member States or between Member States and
third States by exchange of information.
Article 6
Safe haven shall be denied to those who finance, plan, support, or commit terrorist
acts, or provide safe havens.
Council Common Position of 27 December 2001 185
Article 7
Persons who finance, plan, facilitate or commit terrorist acts shall be prevented from
using the territories of the Member States of the European Union for those purposes
against Member States or third States or their citizens.
Article 8
Persons who participate in the financing, planning, preparation or perpetration of
terrorist acts or in supporting terrorist acts shall be brought to justice; such terrorist
acts shall be established as serious criminal offences in laws and regulations of
Member States and the punishment shall duly reflect the seriousness of such terrorist
acts.
Article 9
Member States shall afford one another, as well as third States, the greatest measure
of assistance in connection with criminal investigations or criminal proceedings
relating to the financing or support of terrorist acts in accordance with international
and domestic law, including assistance in obtaining evidence in the possession of a
Member State or a third State which is necessary for the proceedings.
Article 10
The movement of terrorists or terrorist groups shall be prevented by effective border
controls and controls on the issuing of identity papers and travel documents, and
through measures for preventing counterfeiting, forgery or fraudulent use of identity
papers and travel documents. The Council notes the Commission’s intention to put
forward proposals in this area, where appropriate.
Article 11
Steps shall be taken to intensify and accelerate the exchange of operational
information, especially regarding actions or movements of terrorist persons or
networks; forged or falsified travel documents; traffic in arms, explosives or sensitive
materials; use of communication technologies by terrorist groups; and the threat
posed by the possession of weapons of mass destruction by terrorist groups.
Article 12
Information shall be exchanged among Member States or between Member States
and third States in accordance with international and national law, and cooperation
shall be enhanced among Member States or between Member States and third
States on administrative and judicial matters to prevent the commission of terrorist
acts.
186 Documentation
Article 13
Cooperation among Member States or between Member States and third States,
particularly through bilateral and multilateral arrangements and agreements, to
prevent and suppress terrorist attacks and take action against perpetrators of
terrorist acts shall be enhanced.
Article 14
Member States shall become parties as soon as possible to the relevant international
conventions and protocols relating to terrorism listed in the Annex.
Article 15
Member States shall increase cooperation and fully implement the relevant
international conventions and protocols relating to terrorism and United Nations
Security Council Resolutions 1269(1999) and 1368(2001).
Article 16
Appropriate measures shall be taken in accordance with the relevant provisions of
national and international law, including international standards of human rights,
before granting refugee status, for the purpose of ensuring that the asylumseeker has
not planned, facilitated or participated in the commission of terrorist acts. The
Council notes the Commission’s intention to put forward proposals in this area,
where appropriate.
Article 17
Steps shall be taken in accordance with international law to ensure that refugee
status is not abused by the perpetrators, organisers or facilitators of terrorist acts
and that claims of political motivation are not recognised as grounds for refusing
requests for the extradition of alleged terrorists. The Council notes the Commission’s
intention to put forward proposals in this area, where appropriate.
Article 18
This Common Position shall take effect on the date of its adoption.
Article 19
This Common Position shall be published in the Official Journal.
Done at Brussels, 27 December 2001.
For the Council
The President
L. MICHEL
Council Common Position of 27 December 2001 187
Annex
List of international conventions and protocols relating to terrorism referred to in Article 14
1. Convention on Offenses and Certain Other Offenses Committed on Board Aircraft –
Tokyo 14.9.1963
2. Convention for the Unlawful Seizure of Aircraft – The Hague 16.12.1970
3. Convention for the Suppression of Unlawful Acts Against the Safety of Aircraft –
Montreal 23.9.1971
4. Convention on the Prevention and Punishment of Crimes Against Internationally
Protected Persons, Including Diplomatic Personnel – New York 14.12.1973
5. European Convention for the Suppression of Terrorism – Strasbourg 27.1.1977
6. Convention Against the Taking of Hostages – New York 17.12.1979
7. Convention on the Physical Protection of Nuclear Materials – Vienna 3.3.1980
8. Protocol for the Suppression of Unlawful Acts of Violence at Airports Serving
International Aviation, complementary to the Convention for the Suppression of
Unlawful Acts Against the Safety of Aircraft – Montreal 24.2.1988
9. Convention for the Suppression of unlawful Acts Against the Safety of Maritime
Navigation – Rome 10.3.1988
10. Protocol for the Suppression of Unlawful Acts Against the Safety of Fixed Platforms on
the Continental Shelf – Rome 10.3.1988
11. Convention on the Marking of Plastic Explosives for the Purpose of Detection –
Montreal 1.3.1991
12. UN Convention for the Suppression of Terrorist Bombings – New York 15.12.1997
13. UN Convention for the Suppression of Financing of Terrorism – New York, 9.12.1999
This page intentionally left blank
Customer Due Diligence for Banks*
A. Introduction
* Bank for International Settlements, Basel Committee on Banking Supervision, October 2001.
1
This is a joint group consisting of members of the Basel Committee and of the Offshore
Group of Banking Supervisors.
2
The FATF is an inter-governmental body which develops and promotes policies, both
nationally and internationally, to combat money laundering. It has 29 member countries
and two regional organisations. It works in close cooperation with other international
189
190 Documentation
cont.
Prevention, the Council of Europe, the Asia-Pacific Group on Money Laundering and the
Caribbean Financial Action Task Force. The FATF defines money laundering as the
processing of criminal proceeds in order to disguise their illegal origin.
Customer Due Diligence for Banks 191
The Basel Committee believes similar guidance needs to be developed for all non-
bank financial institutions and professional intermediaries of financial services such
as lawyers and accountants.
The FATF and other international groupings have worked intensively on KYC
issues, and the FATF’s 40 Recommendations on combating money-laundering 3 have
international recognition and application. It is not the intention of this paper to
duplicate that work.
At the same time, sound KYC procedures have particular relevance to the safety
and soundness of banks, in that:
they help to protect banks’ reputation and the integrity of banking systems by
reducing the likelihood of banks becoming a vehicle for or a victim of financial
crime and suffering consequential reputational damage;
they constitute an essential part of sound risk management (e.g., by providing
the basis for identifying, limiting and controlling risk exposures in assets and
liabilities, including assets under management).
The inadequacy or absence of KYC standards can subject banks to serious
customer and counterparty risks, especially reputational, operational, legal and
concentration risks. It is worth noting that all these risks are interrelated. However,
any one of them can result in significant financial cost to banks (e.g., through the
withdrawal of funds by depositors, the termination of inter-bank facilities, claims
against the bank, investigation costs, asset seizures and freezes, and loan losses), as
well as the need to divert considerable management time and energy to resolving
problems that arise.
Reputational risk poses a major threat to banks, since the nature of their business
requires maintaining the confidence of depositors, creditors and the general
marketplace. Reputational risk is defined as the potential that adverse publicity
regarding a bank’s business practices and associations, whether accurate or not, will
cause a loss of confidence in the integrity of the institution. Banks are especially
vulnerable to reputational risk because they can so easily become a vehicle for or a
victim of illegal activities perpetrated by their customers. They need to protect
themselves by means of continuous vigilance through an effective KYC programme.
Assets under management, or held on a fiduciary basis, can pose particular
reputational dangers.
Operational risk can be defined as the risk of direct or indirect loss resulting
3
See FATF recommendations 10 to 19 which are reproduced in Annex 2.
192 Documentation
from inadequate or failed internal processes, people and systems or from external
events. Most operational risk in the KYC context relates to weaknesses in the
implementation of banks’ programmes, ineffective control procedures and failure
to practise due diligence. A public perception that a bank is not able to manage its
operational risk effectively can disrupt or adversely affect the business of the
bank.
Legal risk is the possibility that lawsuits, adverse judgements or contracts that
turn out to be unenforceable can disrupt or adversely affect the operations or
condition of a bank. Banks may become subject to lawsuits resulting from the
failure to observe mandatory KYC standards or from the failure to practise due
diligence. Consequently, banks can, for example, suffer fines, criminal liabilities
and special penalties imposed by supervisors. Indeed, a court case involving a bank
may have far greater cost implications for its business than just the legal costs.
Banks will be unable to protect themselves effectively from such legal risks if they
do not engage in due diligence in identifying their customers and understanding
their business.
Supervisory concern about concentration risk mostly applies on the assets side of
the balance sheet. As a common practice, supervisors not only require banks to have
information systems to identify credit concentrations but most also set prudential
limits to restrict banks’ exposures to single borrowers or groups of related borrowers.
Without knowing precisely who the customers are, and their relationship with other
customers, it will not be possible for a bank to measure its concentration risk. This is
particularly relevant in the context of related counterparties and connected lending.
On the liabilities side, concentration risk is closely associated with funding risk,
particularly the risk of early and sudden withdrawal of funds by large depositors,
with potentially damaging consequences for the bank’s liquidity. Funding risk is
more likely to be higher in the case of small banks and those that are less active in the
wholesale markets than large banks. Analyzing deposit concentrations requires
banks to understand the characteristics of their depositors, including not only their
identities but also the extent to which their actions may be linked with those of other
depositors. It is essential that liabilities managers in small banks not only know but
maintain a close relationship with large depositors, or they will run the risk of losing
their funds at critical times.
Customers frequently have multiple accounts with the same bank, but in offices
located in different countries. To effectively manage the reputational, compliance
and legal risk arising from such accounts, banks should be able to aggregate and
monitor significant balances and activity in these accounts on a fully consolidated
worldwide basis, regardless of whether the accounts are held on balance sheet, off
balance sheet, as assets under management, or on a fiduciary basis.
Both the Basel Committee and the Offshore Group of Banking Supervisors are
fully convinced that effective KYC practices should be part of the risk
management and internal control systems in all banks worldwide. National
supervisors are responsible for ensuring that banks have minimum standards and
internal controls that allow them to adequately know their customers. Voluntary
Customer Due Diligence for Banks 193
The Basel Committee’s guidance on KYC has been contained in the following three
papers and they reflect the evolution of the supervisory thinking over time. The
Prevention of Criminal Use of the Banking System for the Purpose of Money-
Laundering issued in 1988 stipulates the basic ethical principles and encourages
banks to put in place effective procedures to identify customers, decline suspicious
transactions and cooperate with law enforcement agencies. The 1997 Core Principles
for Effective Banking Supervision states, in a broader discussion of internal controls,
that banks should have adequate policies, practices and procedures in place,
including strict ‘know-your-customer’ rules; specifically, supervisors should en-
courage the adoption of the relevant recommendations of the FATF. These relate to
customer identification and record-keeping, increased diligence by financial
institutions in detecting and reporting suspicious transactions, and measures to deal
with countries with inadequate anti-money laundering measures. The 1999 Core
Principles Methodology further elaborates the Core Principles by listing a number of
essential and additional criteria. (Annex 1 sets out the relevant extracts from the
Core Principles and the Methodology.)
All banks should be required to ‘have in place adequate policies, practices and
procedures that promote high ethical and professional standards and prevent the bank
from being used, intentionally or unintentionally, by criminal elements’.5 Certain key
elements should be included by banks in the design of KYC programmes. Such
essential elements should start from the banks’ risk management and control
procedures and should include (1) customer acceptance policy, (2) customer
identification, (3) on-going monitoring of high risk accounts and (4) risk management.
Banks should not only establish the identity of their customers, but should also monitor
account activity to determine those transactions that do not conform with the normal
or expected transactions for that customer or type of account. KYC should be a core
feature of banks’ risk management and control procedures, and be complemented by
regular compliance reviews and internal audit. The intensity of KYC programmes
beyond these essential elements should be tailored to the degree of risk.
4
An example of an industry code is the ‘Global anti-money-laundering guidelines for Private
Banking’ (also called the Wolfsberg Principles) that was drawn up in October 2000 by
twelve major banks with significant involvement in private banking.
5
Core Principles Methodology, Essential Criterion 1.
194 Documentation
6
Core Principles Methodology, Essential Criterion 2.
7
The application of new KYC standards to existing accounts is currently subject to FATF
review.
Customer Due Diligence for Banks 195
8
Core Principles Methodology, Essential Criterion 2.
9
Subject to any national legislation concerning handling of suspicious transactions.
196 Documentation
While the transfer of an opening balance from an account in the customer’s name
in another bank subject to the same KYC standard may provide some comfort,
banks should nevertheless consider the possibility that the previous account manager
may have asked for the account to be removed because of a concern about dubious
activities. Naturally, customers have the right to move their business from one bank
to another. However, if a bank has any reason to believe that an applicant is being
refused banking facilities by another bank, it should apply enhanced diligence
procedures to the customer.
Banks should never agree to open an account or conduct ongoing business with a
customer who insists on anonymity or who gives a fictitious name. Nor should
confidential numbered10 accounts function as anonymous accounts but they should
be subject to exactly the same KYC procedures as all other customer accounts, even
if the test is carried out by selected staff. Whereas a numbered account can offer
additional protection for the identity of the account-holder, the identity must be
known to a sufficient number of staff to operate proper due diligence. Such accounts
should in no circumstances be used to hide the customer identity from a bank’s
compliance function or from the supervisors.
10
In a numbered account, the name of the beneficial owner is known to the bank but is
substituted by an account number or code name in subsequent documentation.
11
Beneficiaries should be identified as far as possible when defined. It is recognized that it
may not be possible to identify the beneficiaries of trusts precisely at the outset. For
example, some beneficiaries may be unborn children and some may be conditional on the
Customer Due Diligence for Banks 197
cont.
occurrence of specific events. In addition, beneficiaries being specific classes of individuals
(e.g., employee pension funds) may be appropriately dealt with as pooled accounts as
referred to in paragraphs 38–9.
12
The FATF is currently engaged in a review of the appropriateness of eligible introducers.
198 Documentation
the bank must satisfy itself as to the reliability of the systems put in place by the
introducer to verify the identity of the customer;
the bank must reach agreement with the introducer that it will be permitted to
verify the due diligence undertaken by the introducer at any stage; and
all relevant identification data and other documentation pertaining to the
customer’s identity should be immediately submitted by the introducer to the
bank, who must carefully review the documentation provided. Such informa-
tion must be available for review by the supervisor and the financial
intelligence unit or equivalent enforcement agency, where appropriate legal
authority has been obtained.
In addition, banks should conduct periodic reviews to ensure that introducers on
which they rely continue to conform to the criteria set out above.
13
The FATF is currently engaged in a review of KYC procedures governing accounts opened
by lawyers on behalf of clients.
Customer Due Diligence for Banks 199
14
See OECD Convention on Combating Bribery of Foreign Public Officials in International
Business Transactions, adopted by the Negotiating Conference on 21 November 1997.
200 Documentation
Banks should gather sufficient information from a new customer, and check
publicly available information, in order to establish whether or not the customer is
a PEP. Banks should investigate the source of funds before accepting a PEP. The
decision to open an account for a PEP should be taken at a senior management
level.
15
The Electronic Banking Group of the Basel Committee issued a paper on risk management
principles for electronic banking in May 2001.
Customer Due Diligence for Banks 201
only effectively control and reduce their risk if they have an understanding of normal
and reasonable account activity of their customers so that they have a means of
identifying transactions which fall outside the regular pattern of an account’s
activity. Without such knowledge, they are likely to fail in their duty to report
suspicious transactions to the appropriate authorities in cases where they are
required to do so. The extent of the monitoring needs to be risk-sensitive. For all
accounts, banks should have systems in place to detect unusual or suspicious
patterns of activity. This can be done by establishing limits for a particular class or
category of accounts. Particular attention should be paid to transactions that exceed
these limits. Certain types of transactions should alert banks to the possibility that
the customer is conducting unusual or suspicious activities. They may include
transactions that do not appear to make economic or commercial sense, or that
involve large amounts of cash deposits that are not consistent with the normal and
expected transactions of the customer. Very high account turnover, inconsistent with
the size of the balance, may indicate that funds are being ‘washed’ through the
account. Examples of suspicious activities can be very helpful to banks and should be
included as part of a jurisdiction’s anti-money laundering procedures and/or
guidance.
There should be intensified monitoring for higher risk accounts. Every bank
should set key indicators for such accounts, taking note of the background of the
customer, such as the country of origin and source of funds, the type of transactions
involved, and other risk factors. For higher risk accounts:
Banks should ensure that they have adequate management information
systems to provide managers and compliance officers with timely information
needed to identify, analyze and effectively monitor higher risk customer
accounts. The types of reports that may be needed include reports of
missing account opening documentation, transactions made through a
customer account that are unusual, and aggregations of a customer’s total
relationship with the bank.
Senior management in charge of private banking business should know the
personal circumstances of the bank’s high risk customers and be alert to
sources of third-party information. Significant transactions by these customers
should be approved by a senior manager.
Banks should develop a clear policy and internal guidelines, procedures and
controls and remain especially vigilant regarding business relationships with
PEPs and high profile individuals or with persons and companies that are
clearly related to or associated with them. 16 As all PEPs may not be identified
16
It is unrealistic to expect the bank to know or investigate every distant family, political or
business connection of a foreign customer. The need to pursue suspicions will depend on
the size of the assets or turnover, pattern of transactions, economic background, reputation
of the country, plausibility of the customer’s explanations, etc. It should however be noted
that PEPs (or rather their family members and friends) would not necessarily present
Customer Due Diligence for Banks 203
initially and since existing customers may subsequently acquire PEP status,
regular reviews of at least the more important customers should be undertaken.
cont.
themselves in that capacity, but rather as ordinary (albeit wealthy) business people,
masking the fact they owe their high position in a legitimate business corporation only to
their privileged relation with the holder of the public office.
204 Documentation
17
Many supervisors also have a duty to report any suspicious, unusual or illegal transactions
that they detect, for example, during onsite examinations.
Customer Due Diligence for Banks 205
Supervisors around the world should seek, using their best efforts, to develop and
implement their national KYC standards fully in line with international standards so
as to avoid potential regulatory arbitrage and safeguard the integrity of domestic
and international banking systems. The implementation and assessment of such
standards put to the test the willingness of supervisors to cooperate with each other
in a very practical way, as well as the ability of banks to control risks on a groupwide
basis. This is a challenging task for banks and supervisors alike.
Supervisors expect banking groups to apply an accepted minimum standard of
KYC policies and procedures to both their local and overseas operations. The
supervision of international banking can only be effectively carried out on a
consolidated basis, and reputational risk as well as other banking risks are not
limited to national boundaries. Parent banks must communicate their policies and
procedures to their overseas branches and subsidiaries, including non-banking
entities such as trust companies, and have a routine for testing compliance against
both home- and host-country KYC standards in order for their programmes to
operate effectively globally. Such compliance tests will also be tested by external
auditors and supervisors. Therefore, it is important that KYC documentation is
properly filed and available for their inspection. As far as compliance checks are
concerned, supervisors and external auditors should in most cases examine systems
and controls and look at customer accounts and transactions monitoring as part of a
sampling process.
However small an overseas establishment is, a senior officer should be designated
to be directly responsible for ensuring that all relevant staff are trained in, and
observe, KYC procedures that meet both home and host standards. While this
officer will bear primary responsibility, he should be supported by internal auditors
and compliance officers from both local and head offices as appropriate.
Where the minimum KYC standards of the home and host countries differ,
branches and subsidiaries in the host jurisdictions should apply the higher standard
of the two. In general, there should be no impediment to prevent a bank from
adopting standards that are higher than the minima required locally. If, however,
local laws and regulations (especially secrecy provisions) prohibit the implementa-
tion of home-country KYC standards, where the latter are more stringent, host
country supervisors should use their best endeavours to have the law and regulations
changed. In the meantime, overseas branches and subsidiaries would have to comply
with host country standards, but they should make sure the head office or parent
bank and its home-country supervisor are fully informed of the nature of the
difference.
Criminal elements are likely to be drawn toward jurisdictions with such
impediments. Hence, banks should be aware of the high reputational risk of
conducting business in these jurisdictions. Parent banks should have a procedure for
206 Documentation
18
See the Basel Committee paper Essential elements of a statement of cooperation between
banking supervisors (May 2001).
Customer Due Diligence for Banks 207
2. The supervisor determines that bank staff is adequately trained on money laundering
detection and prevention.
3. The supervisor has the legal obligation to inform the relevant criminal authorities of any
suspicious transactions.
4. The supervisor is able, directly or indirectly, to share with relevant judicial authorities
information related to suspected or actual criminal activities.
5. If not performed by another agency, the supervisor has in-house resources with specialist
expertise on financial fraud and anti-money laundering obligations.
or similar documents), account files and business correspondence for at least five years
after the account is closed.
These documents should be available to domestic competent authorities in the context
of relevant criminal prosecutions and investigations.
13. Countries should pay special attention to money laundering threats inherent in new or
developing technologies that might favour anonymity, and take measures, if needed, to
prevent their use in money laundering schemes.
Increased Diligence of Financial Institutions
14. Financial institutions should pay special attention to all complex, unusual large
transactions, and all unusual patterns of transactions, which have no apparent economic
or visible lawful purpose. The background and purpose of such transactions should, as
far as possible, be examined, the findings established in writing, and be available to help
supervisors, auditors and law enforcement agencies.
15. If financial institutions suspect that funds stem from a criminal activity, they should be
required to report promptly their suspicions to the competent authorities.
16. Financial institutions, their directors, officers and employees should be protected by legal
provisions from criminal or civil liability for breach of any restriction on disclosure of
information imposed by contract or by any legislative, regulatory or administrative
provision, if they report their suspicions in good faith to the competent authorities, even
if they did not know precisely what the underlying criminal activity was, and regardless of
whether illegal activity actually occurred.
17. Financial institutions, their directors, officers and employees, should not, or, where
appropriate, should not be allowed to, warn their customers when information relating to
them is being reported to the competent authorities.
18. Financial institutions reporting their suspicions should comply with instructions from the
competent authorities.
19. Financial institutions should develop programs against money laundering. These
programs should include, as a minimum:
i) the development of internal policies, procedures and controls, including the
designation of compliance officers at management level, and adequate screening
procedures to ensure high standards when hiring employees;
ii) an ongoing employee training programme;
iii) an audit function to test the system.
Zurich, October 5, 2001 – In view of the recent events in the United States the
Wolfsberg Group of International Private Banks1 together with Transparency
International 2 and their advisers3 have agreed on the following private sector
initiative to promote the international fight against terrorism:
All member banks of the Wolfsberg Group in their global businesses are fully
committed to supporting all local and international authorities in their tracing
of terrorists as well as their associates and flow of funds. For this the banks
have set up appropriate internal structures.
The Wolfsberg Principles already cover all kinds of serious crime which include
terrorism. Nevertheless, the banks will review the Principles by the end of this
month to explicitly include terrorism as one of the serious offences under the
policy and all the relevant paragraphs.
Last spring the banks started an initiative for closer co-operation between
regulators, law enforcement agencies, international police organizations and
the private sector. Both sides agreed that there is room for closer co-operation
211
212 Documentation
in the fight against serious crime which could also include the mutual sharing
of more information.
To bring this dialogue forward the banks will schedule a follow-up meeting
which will focus especially on common ground for intensified fight against
international terrorism which may lead to joint initiatives and actions between
the private and public sector.
The banks welcome the idea that the Financial Action Task Force on Money
Laundering (FATF) should extend their anti-money laundering principles to
the fight against international terrorism and offer their support as industry
advisors.
The Suppression of the Financing of Terrorism –
Wolfsberg Statement
A. Preamble
Financial institutions can assist governments and their agencies in the fight against
terrorism. They can help this effort through prevention, detection and information
sharing. They should seek to prevent terrorist organizations from accessing their
financial services, assist governments in their efforts to detect suspected terrorist
financing and promptly respond to governmental enquiries.
1
The Wolfsberg Group consists of the following leading international banks ABN Amro
N.V., Banco Santander Central Hispano, S.A., Bank of Tokyo-Mitsubishi, Ltd., Barclays
Bank, Citigroup, Credit Suisse Group, Deutsche Bank AG, Goldman Sachs, HSBC, J.P.
Morgan Chase, Société Générale, UBS AG and became known when they, together with
Transparency International and Mark Pieth, agreed to a set of global anti-money-
laundering guidelines for international private banks in October 2000. Wolfsberg is the
location in Switzerland where an important working session to formulate the guidelines
was held.
213
214 Documentation
The Wolfsberg Group recognises that adherence to existing ‘Know Your Customer’
policies and procedures is important to the fight against terrorism. Specifically the
proper identification of customers by financial institutions can improve the efficacy
of searches against lists of known or suspected terrorists issued by competent
authorities having jurisdiction over the relevant financial institution (‘applicable
lists’).
In addition to the continued application of existing customer identification,
acceptance and due diligence procedures, the Wolfsberg Group is committed to:
Implementing procedures for consulting applicable lists and taking reasonable
and practicable steps to determine whether a person involved in a prospective
or existing business relationship appears on such a list.
Reporting to the relevant authorities matches from lists of known or suspected
terrorists or terrorist organisations consistent with applicable laws and
regulations regarding the disclosure of customer information.
Exploring with governmental agencies ways of improving information
exchange within and between jurisdictions.
Exploring ways of improving the maintenance of customer information to
facilitate the timely retrieval of such information.
de change and money transfer agents to those which are subject to appropriate
regulation aimed at preventing such activities and businesses from being used as a
conduit to launder the proceeds of crime and/or finance terrorism.
The Wolfsberg Group recognises that many jurisdictions are currently in the
process of developing and implementing regulations with regard to these businesses
and that appropriate time needs to be given for these regulations to take effect.
F. Monitoring