Professional Documents
Culture Documents
If you’re unable to hear the webinar audio hover over the bottom of your Zoom meeting screen to make the meeting
toolbar visible.
By default, all attendees are muted on a webinar and can’t speak with panelists, other attendees.
If the far-left icon is a headset labeled Join Audio then you have not yet connected your audio.
Click the Join Audio headset icon and select either the Phone Call tab to join by phone or the Computer Audio tab to join by
computer. If joining by phone be sure to use the dial-in phone number, Meeting ID and Participant ID given on the Phone
Call tab.
THE WEBINAR HAS STARTED
When your audio has been connected by phone the far-left icon will change to a handset labeled Mute. If joining by
computer you can click the Test speaker and microphone link from the Computer Audio tab to run a helpful wizard to be
sure you are using the intended speaker and microphone devices on your computer. When your audio has been connected
by computer the far-left icon will change to a microphone labeled Mute. You can click the arrow next to the microphone
icon to re-test or change your computer audio settings.
ACAMS events are enhanced by your participation. Please submit questions by clicking on the Q&A button
SPEAKERS
Michelle Farr Doug McCalmont
MPA, MSMIT, CISM, CAMS, CGSS
GRCP BAE Systems: AML
BAE Systems: US Lead, Solutions Consultant,
Enterprise Security Blockchain SME
Michelle Farr is a senior security executive with Doug is a former AML Compliance Officer for
extensive industry, government and military a major Boston-based asset management
experience. firm and active in the cryptocurrency space
Former Senior Advisor to the Director of National since 2013
Intelligence (DNI) for HUMINT and Deputy In 2017 Doug established a blockchain
Assistant Administrator for Intelligence at TSA. consulting firm advising non-profit
Michelle has over 20 years experience working organizations on their adoption of blockchain
security, intelligence and risk activities. conventions to improve their global
efficiencies.
LEARNING OBJECTIVES
• How asymmetric warfare impacts AML in 2020
• How cybersecurity officials are becoming more involved in legacy AML
programs
• Understanding the Advanced Persistent Threat (APT) in Financial systems
• See the sophistication and the merging of cyber and cryptocurrency
conventions
• An understanding and appreciation of recent geopolitical cyber and
cryptocurrency initiatives and how they have an immediate impact on AML
programs worldwide
• Why OFACs decision to add crypto-wallet addresses was so revolutionary and
timely
AGENDA
• BAE Systems Applied Intelligence
• Recent Geopolitical Events
• Threat Actors: APT Groups
• Hackers: Banks and Crypto
• Adversary Tactics – Simple and Effective
• Learning from the mistakes of Venezuela
• Merging of Cyber and Crypto conventions
• OFAC/DoJ recognition
• Defensive Measures
• Preparation and Response
BAE SYSTEMS APPLIED INTELLIGENCE MISSION
Protect Nation States &
Citizens
Intelligence, analytics & national cyber
defence
Intelligence
mission
There are fears that Iran may yet target U.S or allies military installations, financial infrastructure, electrical
grid, and academic institutions through cyber attacks.
BAE Systems Threat Intelligence has seen Iranian threat group activity targeting U.S. organizations over the
last year, but no particular spike since the Soleimani attack.
THREAT ACTORS: APT GROUPS
• APT 33 (Magnallium, Refined Kitten, Elfin, Alibaba)
• APT 34 (OilRig, Helix Kitten)
• APT 35 (Magic Hound, Rocket Kitten)
• APT 39 (Remix Kitten, Chafer)
• Static Kitten (MuddyWater)
Source: Bitnodes.IO
MERGING OF CYBER AND CRYPTO CONVENTIONS
OFAC/DoJ RECOGNITION
• Ali Khorashadizadeh and Mohammad Ghorbaniyan
added by OFAC to the SDN List
• Since 2013 these two residents of Tehran, Iran used
two wallet addresses to process more than 7,000
bitcoin transactions with more than 40 exchanges
including some in the US totaling over 6,000 bitcoins
(currently trading at $8,795 USD per unit)
• Faramarz Shahi Savandi and Mohammad Mehdi Shah
Mansouri two Iranian nationals indicted by the US
DoJ for the deployment of the SamSam ransomware
designed to extort funds (via cryptocurrencies) from
hospitals, local governments and other public
institutions
DEFENSIVE MEASURES
PREPARATION AND RESPONSE
• Education and Awareness
• Ensure basic cyber hygiene:
– NIST CSF
– Patches, updates, encryption, email
protections, etc.
• Synch bank fraud operations with cyber
security and information technology plans
• Develop threat scenarios and test
• Exercise, exercise, exercise
Cross-business
initiative with
over 2,000 global
members
LEARNING OBJECTIVES
• How asymmetric warfare impacts AML in 2020
• How cybersecurity officials are becoming more involved in legacy AML
programs
• Understanding the Advanced Persistent Threat (APT) in Financial systems
• See the sophistication and the merging of cyber and cryptocurrency
conventions
• An understanding and appreciation of recent geopolitical cyber and
cryptocurrency initiatives and how they have an immediate impact on AML
programs worldwide
• Why OFACs decision to add crypto-wallet addresses was so revolutionary and
timely
THANK YOU FOR JOINING US TODAY
We’d love to know what you think about today’s webinar. Please respond
to the polling questions on your screen.
Virtual Currency
SAR/STR Writing AML Foundations Ethics
and Blockchain
Trade – Based
KYC CDD - Intermediate Cyber – Enabled Crime KYC CDD
Money Laundering
• 4 hours of learning spread across 4 weeks • Convenient blend of live and self-paced training
• Participants who successfully complete the courses: • Written and presented by SMEs from in practice around the world
- Earn a certificate of achievement
- Earn 4 CAMS credits
www.acams.org/certificates
MEASURE,
UNDERSTAND
AND EXPLAIN
YOUR MONEY
LAUNDERING
RISK.
For more information visit
www.acamsriskassessment.com