Beruflich Dokumente
Kultur Dokumente
Understanding M oney
Laundering and
Terrorist Financing
Module 1
Learning objectives
The purpose of this module is to:
Module 1
fraud
theft
Module 1
counterfeiting
drug dealing
corruption or bribery
breach of sanctions
people trafficking
tax evasion.
In Malaysia all serious crimes are predicate offences for this purpose. See Anti
Money Laundering and Terrorism Financing and Proceeds of Unlawful Activities
Act 2001 (AMLATFPUAA) discussed in detail in Module 2 and evidenced in
Appendix I.
The AMLATFPUAA provides for the offence of money laundering and terrorism
financing and the measures to be undertaken for the prevention of money
laundering and terrorism financing offence. The AMLATFPUAA provides wideranging investigation powers including powers for law enforcement agencies
and Public Prosecutor to freeze and seize properties that are involved or suspected
to be involved in money laundering or terrorism financing offences, and the power
of the court to forfeit properties derived from the proceeds of serious crimes.
Module 1
job, but also to imprisonment. Companies have been shut down because they were
not alive to the risks that they were being used to launder money.
It is vital that all people at risk understand that you do not have to be a mafia
accountant in a John Grisham novel to be guilty of a money-laundering
related offence.
If you set up or operate an arrangement (e.g. a trust) that enables a person to evade
tax, and to have access to the untaxed money without being caught, then it is very
likely that you are a money launderer! The Malaysia Anti Money Laundering laws
are discussed in greater details in Module 2.
Module 1
Traditionally the money laundering process has been analysed as having three
main stages:
i.
ii
iii.
Placement where cash derived from criminal activity is infused into the
financial system
Layering which usually involves a complex system of transactions
designed to hide the source and ownership of the funds, and
Integration which is the stage at which laundered funds are reintroduced
into the legitimate economy, appearing to have originated from a
legitimate source.
2.1 Placement
Persons involved in organised crime often acquire large amounts of money in the
form of cash that is often in small denomination bank notes. When criminals are
in physical possession of cash that can directly link them to predicate criminal
conduct, they are at their most vulnerable. Such criminals need to place the cash
into the financial system, usually through the use of bank accounts, in order to
commence the laundering process.
The most obvious way to place the proceeds of crime into the banking system is
simply to deposit cash into a bank account. To this day, in certain poorly regulated
jurisdictions desperate for stable currencies, money launderers are still able to
deposit large volumes of cash (sometimes in suitcases) directly into bank accounts.
In well-regulated jurisdictions with AML legislation this activity is now extinct.
In Malaysia, for example, all cash transactions over RMS 50,000 in a day are subject
to a mandatory reporting obligation by financial service providers. As a result, more
innovative and less obvious methods of placing cash into the financial system have
been developed, including those described in the following sections.
Cash (physical currency) is outside the financial system in the sense that it is
a universally accepted form of value owned or controlled by the person who
possesses it. Cash is a form of value which can be readily passed between people
without a record being made of the transaction. Cash is utterly transferrable. Cash
can only be detected through its physical presence.
Possession of the proceeds of crime in the form of cash in large quantities is risky
because it:
Module 1
When cash is placed with a business within the financial system (for example a
bank, authorised deposit-taking institution, credit union, building society or wealth
management business) then it is transformed from its physical form to data. The
data record then represents the value to which the payer is entitled as a result of
the placement of the cash.
If the payer is depositing the proceeds of crime into the financial system then
the first stage of money laundering has been achieved. The proceeds of crime
have been converted from cash, which was connected with the predicate crime
committed by the criminal, to data inside the financial system.
The following is a brief summary of some ways in which criminal property can be
placed. These methods will be discussed in more detail later in this Module.
2.1.3 Intermingling
Money launderers often attempt to conceal the origin of criminally derived cash
by mixing it with legitimately generated cash. They do so by using the services of
lawful business enterprises that they own or control.
Module 1
Money launderers will search for sellers of such assets who want cash for their own
reasons (for example tax evasion). Such sellers are involved in committing a second
predicate crime (tax evasion) and begin their own process of money laundering
with the cash involved in the tax evasion.
Other countries have similar reporting requirements. In the USA all businesses
are required to file an Internal Revenue Services form for all goods and services
purchased with cash of an amount in excess of USD10,000. In Australia a similar
requirement exists for transactions over AUD10,000.
Parts of Europe, including the UK are moving in a similar direction, albeit with a
different European approach. The Third EU Directive requires all member states
to incorporate purveyors of high value commodities within their national AML
strategies in respect of sales involving cash of more than 15,000. As a result, the
UK Money Laundering Regulations require dealers in high value goods to choose
either to decline all cash transactions over 15,000 or to register as money dealers
with HM Revenue & Customs and be subject to the full panoply of obligations
under the Regulations.
Module 1
Purchases made over the Internet, arranged through sites such as eBay and settled
in cash through face-to-face meetings, are obviously vulnerable to being used to
launder criminal property.
2.2 Layering
Once cash has been successfully placed in the financial system, launderers can
engage in an infinite number of complex transactions and transfers designed
to disguise the audit paper trail and thus the source of the property. One of the
primary objectives of the layering stage of the laundering process is to confuse any
criminal investigation and place as much distance as possible between the source
of the ill-gotten gains and their present status and appearance.
At a very early point in the layering process funds are often transferred to accounts
outside the jurisdiction where they were initially deposited. This puts the funds
beyond the reach of the law enforcement agencies of the jurisdiction in which
the original criminal conduct occurred and therefore requires international
co-operation between law enforcement agencies. Historically this was a simple
matter of instructing a bank to make a wire transfer to another account in the
other country. More recently, following enhanced banking due diligence, increased
ingenuity has been required. One example of such ingenuity is that the launderer
will now set up trading companies around the world which trade, or appear to
trade, one with the other. Some swiftly produced documentation from a laptop
and there is more than enough information to satisfy the bank that the transfer
is legitimate and justified. Thereafter the launderer may use any financial service
or product in an attempt to achieve as many layers as possible. The methods by
which a number of financial services products may be used for this purpose will be
examined in Module 5 later.
2.3 Integration
Integration is the final stage of the process, whereby criminally derived property
that has been placed and layered (and therefore cleaned) is returned to the
legitimate economy. It is perhaps better described as reintegration. At this stage
the funds appear to have a legitimate origin. Examples of reintegration methods
include the following.
Module 1
2.3.3 Inheritance
Funds held in one jurisdiction on behalf of the launderer may be transferred to
another jurisdiction and be purported to represent a gift or inheritance.
10
Module 1
Example
A is a fraudster.
A manages to defraud his employer of RM50,000, all of which is diverted to a
bank account held with W.
A divides the benefit into two tranches of RM20,000 and one tranche of RM10,000.
1.
https://www.unodc.org/unodc/en/money-laundering/laundrycycle.html.
11
Module 1
In general, if you walk two kilometres in any direction from the main
central railway station in any major city, you will pass within arm's length
of a property that is owned by, managed by, or is being constructed by
dirty money.
At some point in the past 30 days you probably did business, knowingly or
unknowingly, with a money launderer or otherwise came into contact with
dirty money.
Three out of four US bank notes in circulation are micro-tainted with an
illegal substance.
5. Use of Intermediaries
Where the proceeds of serious or organised crime are involved, an arsenal of
intermediaries and professionals are often used to assist in the laundering of the
proceeds of crime. These may include bankers, trustees, lawyers, accountants,
brokers, etc. Some professionals knowingly offer laundering assistance, while
others provide assistance and turn a blind eye to the obvious; and many assist in
the money laundering process innocently and inadvertently. The Financial Action
Task Force (FATF) recommendations 22 and 23 cover the requirements in terms of
guidelines for these professions. (See Appendix II.)
12
Module 1
The simple definition we will use in these materials is that terrorism financing (TF) is
the provision or collection of funds with the intention that they should be used
(or in the knowledge that they are to be used), in full or in part, in order to carry
out acts that are associated with the support of terrorists or terrorist organisations,
whether to further their causes or to commit acts of terrorism.
Even so, experience shows that some of the specific techniques employed by the
money launderer are drastically different from those involved in terrorist financing.
The objectives of the money launderer and those of the terrorist financier differ. Put
simply, while both need to achieve a disconnect between the source of funds and
their entry into the financial system, the money launderer seeking to achieve
2.
3.
The Taliban has financed its military efforts through the sale of opium.
The July 2005 bombings in London were funded almost entirely from wages earned by
the perpetrators.
13
Module 1
long-term benefits from his crime is prepared to obtain these in a wide variety
of forms, for example from the enjoyment of property assets through to the
long-term benefit from the income generated by a portfolio of securities. The
terrorist financier is not interested in these outcomes. Her or his objective is far
simpler to provide funds to those involved in supporting or committing acts
of terrorism.
As a result, money laundering involving significant sums tends to involve long-term
strategies, large amounts and the use of legal vehicles that break the audit trail
and that are interwoven with combinations of financial institutions forming various
parts of the money laundering process.
formal bank transfers using the Society for Worldwide Interbank Financial
Telecommunication (SWIFT) system for international funds transfers
formal, non-bank remittance service providers
informal, cultural-based remittance arrangements; these systems
predate formal banking systems and often provide a cheaper and faster
service with little or no paper trail involved; in some countries, informal
arrangements can also reach more remote areas than the formal bank
and non-bank systems
14
Module 1
4.
See Appendix 3 of the FATF Guidance for Financial Institutions in Detecting Terrorist
Financing Activities.
15
Module 1
In addition, the UNSC has established a terrorist asset freezing regime, by obliging
UN member states to apply the asset freezing measures to: persons who commit,
or attempt to commit, terrorist acts or participate in or facilitate the commission
of terrorist acts; entities owned or controlled directly or indirectly by such persons;
and persons and entities acting on behalf of, or at the direction of such persons
and entities. Unlike the UN sanctions regimes above, the UNSC does not designate
persons and entities for the purpose of the terrorist asset freezing regime.
Many countries publish a list of all persons covered by the above resolutions.
Financial institutions need to check their customers against such lists in order to
have a defence against criminal charges in the event that they have dealt in the
assets of any person on the list.
When discussing each of the international bodies we have ended each section with
comments on the relevance to Malaysian AML/CFT Compliance Officers.
8. The FATF
The FATF was established in 1988 by the G-7 countries to examine and develop
measures to combat money laundering. It is an intergovernmental body that
sets standards, and develops and promotes policies to combat money laundering
and terrorism financing. The current mandate of the FATF was extended in 2012
to 2020.
16
Module 1
5.
The full list and updates are available on the FATF website: http://www.fatf-gafi.org/pages/
aboutus/membersandobservers/.
17
Module 1
FATF Members
Argentina
Norway
Australia
Portugal
Austria
Iceland
Russian Federation
Belgium
India
Singapore
Brazil
Ireland
South Africa
Canada
Italy
Spain
China
Japan
Sweden
Denmark
Republic of Korea
Switzerland
European Commission
Luxembourg
Turkey
Finland
Malaysia
United Kingdom
France
Mexico
United States
Germany
Netherlands, Kingdom of
Greece
New Zealand
FATF Observer
Israel and Saudi Arabia have observer status at FATF.
FATF Associate Members
18
Module 1
The mandate of the FATF was renewed in 2012 for an eight-year period to 2020.
The current mandate
19
Module 1
The mutual evaluation exercises are searching and provide a more accurate
indication of a member states practical adherence to the 40 Recommendations.
The mutual evaluation reports are public documents released on the FATF website.
Through the mutual evaluation process the FATF has shown that it is prepared
to take meaningful action against member states that do not conform to the
principles contained within the 40 Recommendations.
In September 2015, the FATF and APG published the Mutual Evaluation Report of
Malaysia. Since then, Malaysia has worked to develop an action plan for addressing
key effectiveness issues identified during the evaluation. Based on the commitment
demonstrated by the action plan and the continuing progress in efforts to improve
its AML/CFT, the FATF Plenary agreed to grant membership to Malaysia and
continue to monitor progress through the enhanced follow-up process.
Malaysia underwent a National Risk Assessment in November 2014. The National
Risk Assessment (NRA) is an assessment of the countrys exposure to prevailing
crimes (domestic and foreign) and vulnerabilities of various sectors to money
laundering and terrorism financing risks. It is an initiative undertaken under the
ambit of the National Coordination Committee to Counter Money Laundering (NCC).
The assessment is based on sources such as statistics and reports from various
agencies, surveys conducted among law enforcement agencies and reporting
institutions and credible external report. The findings are validated by the NCC.
Results of the NRA will be communicated to the reporting institutions, supervisors,
regulators and law enforcement agencies to assist in prioritising the deployment of
resources to tackle high-impact risks in a more effective and targeted manner.
The initiative would assist Malaysia in:
i.
ii.
iii.
20
Module 1
Nauru, Niue, Panama, the Philippines, Russia, Samoa, St Kitts and Nevis, St Lucia, St
Vincent and the Grenadines.
Serious systemic problems were identified in the following jurisdictions, which were
then labelled as NCCTs by the FATF: the Bahamas, the Cayman Islands, the Cook
Islands, Dominica, Israel, Lebanon, Liechtenstein, the Marshall Islands, Nauru, Niue,
Panama, the Philippines, Russia, St Kitts and Nevis, St Vincent and the Grenadines.
As a result, the FATF applied its Recommendation 21 to each of the NCCTs. The
Recommendation states that:
Financial Institutions should give special attention to business relations and
transactions with persons, including companies and financial institutions, from
countries which do not, or insufficiently, apply these Recommendations.
The FATF monitored the progress of remedial action by the NCCTs on a quarterly
basis and published a series of progress reports.
The NCCT exercise proved to be a useful and efficient tool. Of the 23 jurisdictions
designated as NCCTs in 2000 and 2001, Myanmar (Burma), the last country
designated as an NCCT, was removed from the list in October 2006.
Since 2001 the FATF has not reviewed any new jurisdictions under the NCCT
process. Instead, in February 2010, it replaced this process with a new approach of
naming countries under one of the following categories. In the latest FATF Public
Statement in October 2014, FATF has identified and classified the following:
The effect of a FATF call for sanctions by its members against a country for failing to
make sufficient progress can be devastating to a developing country. Previously in
August 2006, the Nigerian Economic and Financial Crime Commission valued the
21
Module 1
investment lost by Nigeria during the period when it was designated as an NCCT,
under the old NCCT regime, as $60 billion.
The FATF no longer publishes an annual typologies report. Instead it has replaced
this with reports on emerging trends and technologies. All these reports can be
found on the FATF website.
publishes the 40 Recommendations, which form the basis for the AML/CFT
laws in Malaysia
publishes a methodology for examiners, which helps them to interpret the
40 Recommendations
publishes reports on money laundering in various sectors as well as, in the
past, publishing annual typology reports
publishes mutual evaluation reports on countries compliance with the 40
Recommendations; these reports are relevant to understanding the ML/TF
risk represented by these countries.
22
Module 1
A Secretariat has been established to serve as the focal point for APG activities.
It is located in Sydney, and its funding, as well as funding for all APG activities, is
provided by all APG members in accordance with a specific funding formula based
upon the individual GDP for each member.
23
Module 1
There are two supra-national bodies working in this area. The lead force is the
United Nations Security Council who issue enforcement measures to maintain or
restore international peace and security. UN states typically adopt UN Sanctions
by incorporating them into local legislation. Some examples of states targeted by
the UN are Afghanistan, Cote dIvoire, Democratic Republic of the Congo, Iran, Iraq,
North Korea, Lebanon, Liberia, Sierra Leone, Somalia and Sudan.
The European Union apply sanctions within the framework of the Common Foreign
and Security Policy. EU Sanctions can target governments, non-state entities or
individuals. They can consist of trade restrictions, financial restrictions or visa or
travel bans. Financial sanctions include prohibitions on investment, payments and
capital movements, the withdrawal of tariff preferences or bans on provision of
specific financial services. These sanctions apply to all persons and entities doing
business in the EU including nationals of non-EU countries and to EU nationals
and entities incorporated under laws of an EU Member State when doing business
outside the EU. Rules on infringement are set out under each Member States
national laws.
24
Module 1
OFACs jurisdiction is wide and requires compliance with its regulations by all
US persons, including all US citizens and permanent resident aliens no matter
where they are located, all persons and entities within the US, together with all US
incorporated entities and their foreign branches. Certain OFAC programmes also
require foreign persons in possession of goods of US origin to comply.
In recent years the OFAC has aggressively extended the reach of its attempts to
regulate, for example, non-US banks. Despite the fact that US sanctions do not
apply to non-US banks outside the US, whenever any currency payment is in US
dollars, such that it has to be cleared through New York, this is now treated as
sufficient basis to engage the OFAC regulations.
As noted above, breach of the US sanctions regime can carry substantial financial
penalties. Fortunately, these are usually easy to predict and manage particularly
as they are often negotiated between the company in breach and the US
government. If they were the only penalties, the decision about the level of internal
regulation to impose would be a simpler cost-benefit analysis. However, there are
also hidden costs to being found in breach. Most prominent amongst these is the
reputational damage which accrues. In order for managers to accurately calculate
both the justifiable cost of compliance procedures and the best steps for dealing
with an accusation of breach, it is vital that these costs are considered separately
and on their own merits.
OFAC administers and enforces economic sanctions based on laws passed by the
US Government and goes beyond the UN targeted states and include states such
as Burma, Cuba, the Western Balkans, Belarus and Zimbabwe. OFAC publishes a list
of Specially Designated Nationals and Blocked Persons (SDN List), which holds over
6,000 names of companies and individuals from around the world. OFAC requires all
US persons to comply with its regulations and the definition covers all US citizens
and permanent residents regardless of where they are based. All US entities and
foreign branches must comply, as should subsidiaries that are owned or controlled
by US companies. Breaches can result in substantial civil and criminal penalties.
Firms should be particularly mindful of OFAC sanctions if:
Some OFAC sanctions measures, for example those in place in respect of Iran, also
specifically apply in respect of foreign financial institutions.
Example
Lloyds TSB agreed to pay an unprecedented penalty of US$350 million in 2009
in lieu of criminal prosecution in the US for processing prohibited payment
transactions made by its client through non-affiliated US correspondent
banks. Lloyds was technically not a US person and none of its actions that
caused prohibited transactions took place in the US; but its actions caused
its non-affiliated US correspondent banks to breach OFAC regulations. The
extraterritorial aspects of this case are important to note.
25
Module 1
OFAC has jurisdiction over business imposed under the provisions of the US
International Emergency Economic Powers Act (IEEPA) and Trading with the
Enemy Act (TWEA). These cover corporations organised under US Law, including
foreign branches of US companies. This would apply to US firms with branches
in Malaysia.
Institutions should have written policies and procedures in place to deal with
sanctions screening. Regular reviews and updates of sanctions policies and
procedures should take place to ensure they remain fit for purpose and are
effectively enforced. Training of staff on sanctions, particularly those involved in
taking-on and monitoring clients is an on-going process. It is important that firms
screen clients when new sanctions notices are released.
To ensure that your screening program is effective it is important to think about
variables such as:
The following case study illustrates the dangers of not monitoring the automated
systems you have in place:
Example
In August 2010 the UK FSA levied a fine of 5.6 million on the Royal Bank of
Scotland Group (RBSG) for failing to have adequate systems and controls in
place to prevent breaches of UK financial sanctions.
The FSA stated that RBSG had failed to establish and maintain appropriate and
risk-sensitive policies and procedures relating to:
1.
2.
3.
RBSG had failed to implement and properly oversee systems used to screen
relevant customers and payments against the HMT List despite being one of the
largest processors of foreign payments among UK banks. RBSG failed to screen:
a.
b.
c.
26
Module 1
Another key issue that is particularly of note was their failure to effectively
monitor the fuzzy logic name-matching features of their screening software.
This meant that names that had been mis-typed, translated or had common
name variations were not picked up when they ran matches against the HMT
Sanctions list. Their systems had only been calibrated once and could not
cope with various name orders combined with initials. For example, if the name
John Smith, appeared as Smith, J. they would have missed the match on the
sanctions list. In some cases, the software only looked for exact matches for
company names.
The UK FSA recommended that firms regularly review the effectiveness of their
systems and ensure that their screening software provider is responding to
issues with the same levels of priority so that any problems are swiftly resolved.
The decision notice also highlighted the groups failure to hold sufficient
information on beneficial owners and directors of its corporate customers. In
many cases the names were not screened against sanctions and they did not
monitor these entities on an on-going basis. The FSA deemed that they had
failed to effectively manage the risk of such complex corporate structures.
Source extract: Mind the Gap, by Naomi Cohen, www.KYC360.com.
It is recommended that senior management are involved in formulating and
overseeing policies and procedures for sanctions. Documented policies and
procedures should be in place and regularly reviewed. It is good practice for an
independent review of procedures to be carried out periodically by staff who are
not involved in overseeing the firms systems and controls for financial sanctions.
All clients, including corporate customers such as directors and beneficiaries and
third party payees should be screened against sanctions lists.
In July 2011 the US Federal Reserve issued an unprecedented cease and desist
order on the RBS Group. They were given 60 days to improve their systems. In
regards to due diligence procedures they were required to provide an:
acceptable written customer due diligence program designed to reasonably
ensure the identification and timely, accurate, and complete reporting by any
of the U.S. Branches of all known or suspected violations of law or suspicious
transactions to law enforcement and supervisory authorities, as required by
applicable suspicious activity reporting laws and regulations. At a minimum, the
program shall include:
a.
b.
c.
d.
27
Module 1
e.
f.
Within 60 days of the order they needed to provide a written plan to:
enhance each branchs compliance with OFAC Requirements. At a minimum, the
written plan shall include:
(a)
(b)
(c)
(d)
(e)
(f )
Firms should ensure that they have clear internal and external policies for
dealing with a sanctions match and clear lines for reporting the issue. They
should also ensure that they have procedures in place for investigating potential
matches and keep records of any false positives that may arise. Senior management
should be involved where a target cannot be easily verified and of any breaches
that occur.
If a firm finds a target match on a sanctions list it should investigate the match and
determine using their CDD information on the client if they are an exact match to
the sanctioned entity. If there it is an exact match or if there is any doubt the firm
must report the match to the relevant authority as soon as possible.
28
Module 1
8.
9.
Lloyds TSB is Busted by Uncle Sam for Stripping, Stephen Platt Article 2009.
Informer, Volume 2/Issue 13/Spring 2010.
29
Module 1
United Nations Security Council (UNSC) Resolution 1267 requires Member States to
freeze the funds, other financial assets and economic resources of persons listed at
the UN on suspicion of association with al-Qaeda or the Taliban. UNSC Resolution
1373 requires similar action to be taken against persons suspected of committing,
attempting to commit, participating in, or facilitating acts of terrorism.
The United Nations Counter-Terrorism Implementation Task Force (CTITF)10,
established by the Secretary-General in 2005, is comprised of 34 UN and
international entities. CTITF works to ensure overall coordination and coherence
in the counter-terrorism activities of the United Nations system and to support
Member States efforts in the implementation of the UN Global Counter-Terrorism
Strategy (A/RES/60/288) adopted in 2006. CTITF provides for the delivery of this
focused and coherent assistance mainly through its Working Groups and other
initiatives, and strives to ensure that the Secretary-Generals priorities are integrated
in its work, including respect for human rights, as expressed in the Human Rights
Up Front action plan. CTITF also seeks to foster constructive engagement between
the United Nations system and international and regional organizations, civil
society and the private sector, where appropriate, on the implementation of
the Strategy.
The United Nations Global Counter-Terrorism Strategy, which brings together
into one coherent framework decades of United Nations counter-terrorism policy
and legal responses emanating from the General Assembly, the Security Council
and relevant United Nations specialized agencies, has been the focus of the
work of CTITF since its adoption by the General Assembly in September 2006
(General Assembly resolution 60/288). While the primary responsibility for the
implementation of the Global Strategy rests with Member States, CTITF ensures
that the UN system is attuned to the needs of Member States, to provide them with
the necessary policy support and spread in-depth knowledge of the Strategy, and
wherever necessary, expedite delivery of technical assistance.
10.
http://www.un.org/en/terrorism/ctitf/index.shtml.
30
Module 1
In the UK, Part III of the UK Joint Money Laundering Steering Group (JMLSG)
guidance outlines sanctions requirements and procedures in detail. The global
community responded rapidly to the human rights abuses in Libya at the start of
2011 when the UN Security Council passed Resolution 1970 on 26 February 2011.
It introduced financial sanctions against those persons involved in or complicit in
ordering, controlling, or otherwise directing, the commission of serious human
rights abuses against persons in the Libyan Arab Jamahiriya, including by being
involved in or complicit in planning, commanding, ordering or conducting attacks,
in violation of international law, including aerial bombardments, on civilian
populations and facilities; or acting for or on behalf of or at the direction of
such persons.
The EU adopted Regulation 204/2011 on 2 March 2011, which implemented UNSCR
1970 (2011). The Regulation also provided for the EU to list, separately to the UN,
persons involved in or complicit in ordering, controlling, or otherwise directing, the
commission of serious human rights abuses against persons in Libya, including by
being involved in or complicit in planning, commanding, ordering or conducting
attacks, in violation of international law, including aerial bombardments, on civilian
populations and facilities. As members of Gadhafis regime melted away from his
control some names have been removed.
The aggressive crackdown in Syria has also led to the global community calling
for sanctions against the regime for human rights abuses. The EU adopted Council
Regulation (EU) No 442/2011 on 9 May 2011. The Regulation included assetfreezing measures on certain persons identified as being responsible for the
violent repression of the civilian population in Syria and targets key leaders of the
regime. The UK passed The Syria (Asset-Freezing) Regulations 2011 to bring the EU
regulations into effect.
In Malaysia, to counter the financing of terrorism, Sections 66C and 66D of the
AMLATFPUAA empower the Minister of Home Affairs (Minister) to make orders
for the implementation of measures to give effect to resolutions adopted by
the United Nations Security Council (UNSC; the Charter of the United Nations
(Charter) confers on the UNSC primary responsibility for the maintenance of
international peace and security. Pursuant to Article 41 of the Charter, the UNSC
may decide on measures not involving the use of armed forces to be employed to
give effect to its decisions, and may call upon the Members of the UN (including
Malaysia) to apply such measures), and to obtain information on possession or
control of terrorist property.
On November 26, 2014, Malaysia's Prime Minister, Najib Razak11, urged the country's
parliament to adopt stronger legal safeguards against terrorism. In particular, he
expressed concern about Malaysian citizens returning home with extremist views
after having fought beside Islamic State (IS) militants in Syria and Iraq, noting that
39 citizens had already joined IS and that its radical ideology should not be allowed
to spread. Also on November 26, the House of Representatives (Dewan Rakyat) of
Malaysia's Parliament unanimously approved the government white paper tabled
by the Prime Minister, entitled Toward Combating the Threat of Islamic State.
11.
Malaysia PM Proposes Anti-Terrorism Law (Nov. 26, 2014); Teks Ucapan Pembentangan
Kertas Putih Ke Arah Menangani Ancaman Kumpulan Islamic State [Speech on
Presentation of White Paper to Address the Threat of the Islamic State], Office of the
Prime Minister website.
31
Module 1
The white paper points out the need to combat not only the threat posed by the
IS but also the alleged involvement of Malaysian jihadists within the group. It also
calls for a specific anti-terrorism law to be adopted and for the current relevant
laws, the Security Offences (Special Measures) Act 2012, the Prevention of Crime
Act, and the Penal Code, to be reinforced.
Learning outcomes
By the end of this module you should:
understand that money is laundered to disguise its origins in criminal activity and
to protect the criminals from detection and prosecution
appreciate the diverse routes by which money can be laundered and the way
in which finance professionals can wittingly or unwittingly commit money
laundering offences
be aware of the staged interpretation of the money laundering process while
being able to explain its limitations
understand the core obligations/recommendations placed on a reporting entity
by FATF
understand the differences and similarities between money laundering and
terrorism financing
be able to describe some typologies and techniques of terrorist financing
be able to evaluate the roles of the FATF and APG
understand the nature and types of sanction that can be imposed.
32