Sie sind auf Seite 1von 5

81

Chapter 7
Money Laundering and Transnational Financial Flows

CHAPTER SUMMARY

Overview
The purpose of this chapter is to learn how money laundering occurs and to determine whether anything can
be done to trace it and prevent it,

Money Laundering: An Introduction


The traditional money laundering process can be divided into three steps. First, the money is deposited in a bank
or financial institution. Second, a set of complex transfers is made to disguise the original source for the money and
to hide the audit trail. This is called layering the transactions. The final step is integrating the money back into the
legitimate money supply. Not all processes would follow this order, depending on the specific situation.
17001 Legal and Illegal Laundering
A definition of money laundering that covers both legal and illegal contexts is to take money that comes from
one source, hide that source, and make the funds available in another setting so that the funds can be used without
incurring legal restrictions or penalties.
The primary purpose for money laundering is to make the funds spendable in a context that would have been
unavailable otherwise. Consequently, the definition extends money laundering activities beyond the realm of drug
dealers and criminals. It is possible to find accounting practices used within legitimate businesses and governments
that closely follow the techniques used by international drug dealers to conceal the source of funds.
1)7011 Cybercash Creates New Laundering Opportunities
In the very near future, using the Internet, it will be possible for anyone to transfer large sums money from one
location to another without using a bank and with the transfers being totally anonymous. Today, cybercash transactions
are beginning to take place without the need for third parties and the consequential scrutiny that might otherwise exist.
Furthermore, cybercash transfers can be structured so that they originate in a jurisdiction where such activities are not
considered illegal.
117021 Who Uses Money Laundering Practices?
No list can contain all the examples of those who would use the techniques of money laundering. It should be
remembered that the reason for money laundering is to convert resources into a format that makes them usable to their
recipient.
Grant Recipients. In recent years, a number of universities were caught using methods to convert federal grant
monies into discretionary spending.
Criminals. Many crimes, if successful, have the potential to generate large pools of money whose origin cannot
be explained, thus prompting the use of money laundering procedures.
Political Asylum Seekers. People persecuted for religious or ethnic reasons within a specific country may need
help in escaping from that country as well as help in taking their personal wealth with them.

2011 CCH. All Rights Reserved. Chapter 7


82 Forensic and Investigative Accounting

Financial Institutions' Role in Money Laundering


International banking plays a role in identifying money laundering activities, but it also plays a role in creating
an environment where money laundering can exist.
17031 Correspondent Banking
International banking is interrelated with a series of correspondent and respondent banks that allow for the 24-
hour transfer of cash to and from any point in the world. Correspondent banks have relationships with thousands of
other banks around the world, and large money center banks can process up to $1 trillion in wire transfers per day.
Correspondent banking takes place when one bank provides services to another bank to move funds, exchange
currencies, and access investment services such as money market accounts, overnight investment accounts, CDs,
trading accounts, and computer software for making wire transfers and instant updates on account balances. Another
service provided by foreign respondent banks to their clients through these correspondent-banking relationships is a
payable-through account. Such an account enables the respondent bank's clients within the country where the bank
is registered to write checks that are drawn directly on the respondent bank's correspondent account in the United
States.
1)7041 Tools Banks Use to Identify Money Launderers
Banks do attempt to identify those individuals who might be laundering money at the point where illegal money
enters the banking system. Banks have purchased software that allows them to monitor account transactions and
identify suspicious activity.
At a minimum, banks are supposed to have a set of policies and controls, a compliance officer, employee
training, and independent audits to test their programs. Further, the U.S. Department of the Treasury requires banks to
file Currency Transaction Reports (CTRs) about transactions above a specified dollar amountcurrently $10,000
and Suspicious Activity Reports (SARs) for transactions as noticed by bank personnel.
1)7051 Due Diligence Laws for Banks
Laws and regulations require that a bank perform due diligence in its relationships with other banks and important
clients as well as continually monitor account transactions. Within banks, due diligence must co-exist with the client's
need for privacy and the secrecy laws existing in many foreign jurisdictions that prevent access to bank documents.
17061 Shell Banks
Shell banks are generally high-risk banks that exist without any physical presence in any legal jurisdiction.
These banks have a banking license in a specific country, but they are not likely to have a staff and may be operated as
part of another business or operated out of an individual's personal residence. Shell banks are usually not subjected to
any scrutiny by banking regulators. These banks should not be thought of as branch banks without a physical presence
in a country and affiliated with a home-country financial institution.
Offshore banks are slightly different than shell banks, although neither is mutually exclusive from the other.
An addition to an offshore banking license prevents the organization from transacting banking activities with any
citizens of the licensing jurisdiction or transacting business with the currency of the licensing jurisdiction. These bank
operations solely exist within international financial transactions.
Both shell and offshore banks provide nested correspondent services where a foreign bank's private clients
use U.S. correspondent accounts. Today, respondent shell and offshore banking operations can be entirely Internet-
based.
Other Businesses' Role in Money Laundering
Businesses besides banks are affected by money laundering activities as money launderers look for ways to
legitimatize their cash collections. Small businesses also can be used to launder money. Businesses that typically
receive large amounts of cash are especially vulnerable to infiltration by money launderers.

Chapter 7 2011 CCH. All Rights Reserved.


Textbook Solutions 83

17071 Cash-Oriented Businesses


Businesses with large amounts of cash sales include vending machine companies, taxicab companies, car washes,
currency exchanges, nightclubs, bars, restaurants, real estate agencies, travel agencies, casinos, online auctions, and
brokers. All these businesses are attractive operations for money launderers. By acquiring or investing in one or more
of these businesses, a money launderer can identify a legitimate source of cash receipts, and with businesses such as
a tavern there are no sales invoices to falsify.
Currency Exchanges, With a currency1 exchange, the large amounts of cash flowing through in wire transfers
provides an easy means to convert criminal proceeds into legitimate money. All documentation can be falsified,
making it difficult to prove that these operations are not legitimate business transactions.
Online Auctions. An online auction provides another good way to launder money into legitimate cash when
items are overpaid for an auction site. Overpaying for the item, listed on the auction site by confederates shuts out
other buyers except for the launderer. The seller of the item receives the money, through PayPal, for example, and the
transaction is legitimized at that point through the sham sale.
Casinos. Money launderers use casino gambling as a way to launder money. There are a number of techniques
to launder money through a casino. The simplest method is for the money launderer to take cash into the casino and
buy gambling chips, A few small normal bets are placed and afterward when the launderer leaves the casino, the bulk
of the chips are redeemed at the cashier's cage.
Purchasing Departments. Even normal business purchasing activities can be easily converted into a money
laundenng operation. By setting up a retail computer company in a country outside the United States, the means
are provided for laundering money overseas and back into the United States. Assume that large-scale purchases of
computer equipment are made in the United States with money that has been placed in the banking system through
smurfing. Smurfing is a money laundering technique in which confederates of the money launderer deposit random
amounts of less than $10,000 into variously named accounts at a number of different banks. The equipment is then
sent and sold overseas below cost. At the point of sale, the money has been legitimized.
Credit Cards. Credit cards are another means to launder cash. Credit cards are used to legitimatize cash by
making prepayments on the cards and transferring the cash into a country other than the one the where the illegal cash
was generated.
17081 Audit Trail for Business Money Laundering Schemes
The more transactions through which illegal money can be churned, the more difficulty one has in following
and identifying the audit trail. The more countries through which the money can be transferred (especially targeting
those countries with strong bank secrecy laws), the more difficult the money trail becomes to follow.
Finding Money Laundering Schemes
17091 Likely Sources
Under most money laundering schemes, the traditional paper trail only exists in a fraudulent form. In other
words, the audit trail exists to convince investigators that the sources of cash are legitimate. Support for the fraudulent
trail can be complete through the warehousing of inventory items, false purchase orders, false sales invoices, ghost
staffers, etc. Once this fact is realized, one must realize that traditional methods of following the paper trail are only
going to be successful when the falsified audit trail is weak or not properly maintained. Certain areas that are more
difficult to falsify and may provide a more reliable source of information for forensic investigators who are trying to
trace a money laundering scheme are: web logs, wire transfers, and bank reports.
Identification Through Web Logs. Although web logs and wire transfers are not 100 percent reliable, they
are more reliable than the falsified books maintained by a criminal enterprise. Log data of particular interest to the
forensic investigator includes the IP address, user name and password (if used), GMT time adjustment, files requested,
and the URL where the visitor was. This information potentially can identify and trace the person using the site.

2011CCH. All Rights Reserved. Chapter 7


84 Forensic and Investigative Accounting

Identification Through Wire Transfers. With both wire transfers and EFTs, there is a great deal of information
logged about these transactions. Depending on the logging system, different information can be retained.
Identification Through Bank Reports. The mandatory information on a Fedwire transfer is
The receiving bank's nine-digit American Bankers Association (ABA) number
Type/subtype classification: regular transfer
The sending bank's nine-digit ABA number
The dollar amount of the transfer
Name of the originator of the transfer

Guarding Against Money Laundering


Today every business has to be careful not to become unintentionally involved in money laundering operations.
A number of steps should be taken when a bank establishes a relationship with a new client, especially when private
banking is involved. But, even though these policies are particularly important for a bank, they also are important for
a business that is considering accepting an investment from another company or group of individuals.
1J7101 Individual Due Diligence Using Identity Checks
Becoming familiar with the background of a new client or investment partner is important. The first step in this
process is the verification of his or her identity. If third parties are acting for underlying beneficiaries, the identity
verification process also applies to the third party and the underlying parties.
1J7111 Company Due Diligence in Verification Procedures
Webs of shell companies can be fronts for money laundering, so investigators must verify the legal existence
of a company and ascertain that the company has a true economic purpose. The forensic accountant verifies that the
person acting on behalf of a company is really authorized to be an agent of the company and, if not, discerns the true
identity of the parties who have ultimate control over the business. If these parties cannot be identified, a red flag
should be raised. The nature of the business and intercompany relationships should be clearly understood.
1)7121 Trust Due Diligence Using Trust Deeds
A trust is generally a legal relationship that is established by one person when assets have been placed under
the control of another person for the benefit of the beneficiary for a specific purpose. Trusts provide an easy means
for criminals to remain unidentified while retaining control of the trust's assets. Therefore, the forensic accountant
must be suspicious if the person establishing the trust and the trust beneficiary are not related in any apparent manner.
Usually, a trust is used in a money laundering scheme after the money has already been put into the banking system.
17131 Organization-wide Suspicious Activities
Although one factor in itself does not indicate that money laundering is occurring, a combination of factors
should be considered suspicious. See f 7131 for a list of examples of red flags.
17141 The Accountant's Role as Gateway Keeper
Generally, antimoney laundering laws have focused their attention at the gateway where the illegal money enters
the financial system (i.e., largely banks). The methods used in money laundering transactions to avoid exceeding legal
monetary limits may not be as visible to individual banks receiving those deposits as they would to the company
accountant or auditor who observes the network of transactions.
Currently, U.S. auditors have two auditing standards that provide some guidance with money laundering
activities. These standards relate to the overall effects on the entity's financial statements. Guidelines are provided in
AICPA's Statement on Auditing Standards (SAS) No. 54, Illegal Acts by Clients, and Statement on Auditing Standards
(SAS) No. 82, Consideration of Fraud in a Financial Statement Audit (now replaced by SAS No. 99).

Chapter 7 2011CCH. All Rights Reserved.


Textbook Solutions 85

117151 USA Patriot Act of 2001


In October 2001, the USA Patriot Act (the Act) was signed into law. Although many of the working provisions
of the Act are yet to be fully developed by the issuance of Treasury regulations, a number of statutes apply to money
laundering. These statutes are found in the section of the Act entitled International Money Laundering Abatement and
Financial Anti-Terrorism Act of 2001 (MLAA). The MLAA increases the penalties for money laundering as well as
extends the power of the federal government in controlling money laundering activities Within the provisions of the
MLAA are guidelines that allow the U.S. Treasury Department to require U.S. financial organizations to file specific
information about transactions occurring in countries identified as primary money laundering havens. Use of payable-
through accounts, correspondent accounts, and concentration accounts are specifically mentioned in the Act. The
MLAA also made several other enhancements and restrictions, including some to reporting requirements.
17161 Conclusion
Money laundering is a transnational crime that can potentially corrupt financial systems around the world
with bribes and payoffs. When money laundering is used to convert illegal proceeds into spendable resources, these
activities should be considered a serious crime by all jurisdictions. If laundering techniques are adopted within a
legal context to remove government restrictions from funds, for example, they should be considered a violation of
organizational ethical codes.

Solutions to Chapter Exercises


1. See 1J7141, The Accountant's Role as a Gateway Keeper. There is currently very little in the way of Auditing
Standards to guide the auditor in this situation. The bankers' guide of "know-your-customer" may apply for
the auditor in this situation. If the auditor is familiar with the business and knows the owners, then the auditor
should have confidence regarding the legitimate origin of a large percentage of cash revenues. If the auditor is
not familiar with the owners or there are new owners of the business, the auditor needs to be more cautious.
Although there may not be an auditing requirement to report, money laundering, the audit firm's professional
reputation and its license to operate in the State of Texas may be at stake.
2. Banks are part of the solution as well as part of the problem to money laundering activities. Banks can offer
a solution to the problem of money laundering because they serve as the gateway to the financial systems.
If they are particularly guarded about who has access to the system, they can help to seriously deter money
launderers. Banks have a tradition of providing privacy and confidentiality to their clients. For that reason,
banks are hesitant to disclose all possible "money laundering types of activity" to the government as some of
these activities are just normal financial transactions. Finally, the banks receive a great deal of revenue from
servicing foreign accounts and foreign banks. They do not want to take any actions, such as the constant and
continual disclosure of private information, to outrage their clients and reduce these revenues.
3. Answers will vary. This exercise is an opportunity to study a number of actual money laundering cases with
the class.
4. A virtual bank is one that does not have to have a physical presence in any geographical location. Such a
bank would be exemplified by a bank operating with a set of PCs and one employee in a bedroom. It is not
monitored by any government agency for compliance with banking regulations.
5. Howard Tech should exercise due diligence procedures and not blindly accept the money. In the past,
alumni have illegally obtained monies through frauds and contributed large sums to their alma mater. These
universities have been embarrassed and found it necessary to return the fraudulent funds. Minimum due
diligence procedures would require Howard Tech to accurately verify the source of the contribution with
confirming details from a collaborating independent institution. Crosschecks against public records should
be made to verify the legitimacy of the business, i.e., directors' names, office locations. If none of this
information is available from U.S. sources, it should be determined if such information is available from the
foreign country in which the contributor lives. Checks should be made on the bank from which the check is
drawn. Is the contributor's bank an offshore or shell bank? If possible, checks should be made with national
law enforcement organizations in the United States.

2011 CCH. All Rights Reserved. Chapter 7

Das könnte Ihnen auch gefallen