11.10.2013 Views

Risk Management Manual of Examination Policies - FDIC

Risk Management Manual of Examination Policies - FDIC

Risk Management Manual of Examination Policies - FDIC

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

BANK SECRECY ACT, ANTI-MONEY LAUNDERING,<br />

AND OFFICE OF FOREIGN ASSETS CONTROL<br />

Furthermore, the use <strong>of</strong> false identities to conduct these<br />

transactions is common; banking <strong>of</strong>ficers should be vigilant<br />

in looking for false identification documents. In an attempt<br />

to conceal their activities, money launderers will <strong>of</strong>ten<br />

resort to “smurfing” activities to get illicit funds into a<br />

financial institution. “Smurfing” is the process <strong>of</strong> using<br />

several individuals to deposit illicit cash proceeds into<br />

many accounts at one or several financial institutions in a<br />

single day.<br />

Furthermore, cash can be exchanged for traveler’s checks,<br />

food stamps, or other monetary instruments, which can<br />

then also be deposited into financial institutions.<br />

Placement can also be done by purchasing goods or<br />

services, such as a travel/vacation package, insurance<br />

policies, jewelry, or other “high-ticket” items. These<br />

goods and services can then be returned to the place <strong>of</strong><br />

purchase in exchange for a refund check, which can then<br />

be deposited at a financial institution with less likelihood<br />

<strong>of</strong> detection as being suspicious. Smuggling cash out <strong>of</strong> a<br />

country and depositing that cash into a foreign financial<br />

institution is also a form <strong>of</strong> placement. Illegally-obtained<br />

funds can also be funneled into a legitimate business as<br />

cash receipts and deposited without detection. This type <strong>of</strong><br />

activity actually combines placement with the other two<br />

stages <strong>of</strong> money laundering, layering and integration,<br />

discussed below.<br />

Layering<br />

The second stage <strong>of</strong> money laundering is typically layering.<br />

This stage is the process <strong>of</strong> moving and manipulating funds<br />

to confuse their sources as well as complicating or partially<br />

eliminating the paper trail. Layering may involve moving<br />

funds in various forms through multiple accounts at<br />

numerous financial institutions, both domestic and<br />

international, in a complex series <strong>of</strong> transactions.<br />

Examples <strong>of</strong> layering transactions include:<br />

• Transferring funds by check or monetary instrument;<br />

• Exchanging cashier’s checks and other monetary<br />

instruments for other cashier’s checks, larger or<br />

smaller, possibly adding additional cash or other<br />

monetary instruments in the process;<br />

• Performing intrabank transfers between accounts<br />

owned or controlled by common individuals (for<br />

example, telephone transfers);<br />

• Performing wire transfers to accounts under various<br />

customer and business names at other financial<br />

institutions;<br />

• Transferring funds outside and possibly back into the<br />

U.S. by various means such as wire transfers,<br />

particularly through “secrecy haven” countries;<br />

Section 8.1<br />

• Obtaining certificate <strong>of</strong> deposit (CD) secured loans<br />

and depositing the loan disbursement check into an<br />

account (when the loan is defaulted on, there is no loss<br />

to the bank); and<br />

• Depositing a refund check from a canceled vacation<br />

package or insurance policy.<br />

Layering transactions may become very complex and<br />

involve several <strong>of</strong> these methods to hide the trail <strong>of</strong> funds.<br />

Integration<br />

The third stage <strong>of</strong> money laundering is integration, which<br />

typically follows the layering stage. However, as<br />

mentioned in the discussion <strong>of</strong> the placement stage,<br />

integration can be accomplished simultaneously with the<br />

placement <strong>of</strong> funds. After the funds have been placed into<br />

the financial system and insulated through the layering<br />

process, the integration phase is used to create the<br />

appearance <strong>of</strong> legality through additional transactions such<br />

as loans, or real estate deals. These transactions provide<br />

the criminal with a plausible explanation as to where the<br />

funds came from to purchase assets and shield the criminal<br />

from any type <strong>of</strong> recorded connection to the funds.<br />

During the integration stage, the funds are returned in a<br />

usable format to the criminal source. This process can be<br />

achieved through various schemes, such as:<br />

• Inflating business receipts,<br />

• Overvaluing and undervaluing invoices,<br />

• Creating false invoices and shipping documents,<br />

• Establishing foreign trust accounts,<br />

• Establishing a front company or phony charitable<br />

organization, and<br />

• Using gold bullion schemes.<br />

These schemes are just a few examples <strong>of</strong> the integration<br />

stage; the possibilities are not limited.<br />

Money Laundering Red Flags<br />

Some activities and transactions that are presented to a<br />

financial institution should raise the level <strong>of</strong> concern<br />

regarding the possibility <strong>of</strong> potential money laundering<br />

activity. Evidence <strong>of</strong> these “red flags” in an institution’s<br />

accounts and transactions should prompt the institution,<br />

and examiners reviewing such activity, to consider the<br />

possibility <strong>of</strong> illicit activities. While these red flags are not<br />

evidence <strong>of</strong> illegal activity, these common indicators<br />

should be part <strong>of</strong> an expanded review <strong>of</strong> suspicious<br />

activities.<br />

General<br />

DSC <strong>Risk</strong> <strong>Management</strong> <strong>Manual</strong> <strong>of</strong> <strong>Examination</strong> <strong>Policies</strong> 8.1-39 Bank Secrecy Act (12-04)<br />

Federal Deposit Insurance Corporation

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!