Professional Documents
Culture Documents
Trade Based Money Laundering - A Primer For Banking Staff
Trade Based Money Laundering - A Primer For Banking Staff
ABSTRACT Purpose: What are the reason(s) for writing the paper and the aims of the research? – This
article provides a detailed overview of the risks associated with trade-based money laundering and
in particular the use of free trade zones. The purpose of the article is to inform the development of
risk-based assessments within the banking sector on trade-based money laundering. It offers
findings from research conducted by the author and other academic findings on areas to focus on
in risk assessment. Design/Methodology/Approach: How are the objectives achieved? Include the main
method(s) used for the research. What is the approach to the topic and what is the theoretical or subject scope of
the article? – The article uses a number of sources of secondary data, including FATF reports, the
Wolfsberg Principles and current research into TBML and the banking sector. It also uses findings
from research by the author. The subject scope is trade-based money laundering (TBML). Find-
ings: What was found in the course of the work? This will refer to analysis, discussion, or results – The main
findings from the analysis are that banks have a greater legal and regulatory responsibility towards
detecting and reporting suspicious transactions than they would have previously considered. This
includes identifying the source and purpose of fund transfers related to trade and shipping finance
and establishing the beneficial ownership of clients and the businesses in which they are working.
The article highlights the inherent risks associated with free trade zones and the need for a greater
level of awareness across all units of the bank on risk assessment from TBML crimes. Research lim-
itations/implications (if applicable): If research is reported on in the article this section must be completed and
should include suggestions for future research and any identified limitations in the research process – The article
is a viewpoint paper but is based on forthcoming research by the author and uses an extensive
literature-based research analysis. Practical implications (if applicable): What outcomes and implications
for practice, applications and consequences are identified? How will the research impact upon business or enter-
prise? What changes to practice should be made as a result of this research? What is the commercial or economic
impact? Not all papers will have practical implications – The research article has identified a number of
implications to the banking sector on addressing Anti-Money Laundering (AML) deficiencies,
especially the need to improve standards of beneficial ownership verification and CDD checks for
business clients involved in trading and shipping. It also has implications for IT development
within this sector for all agencies working on TBML crimes. Social implications (if applicable): What will
be the impact on society of this research? How will it influence public attitudes? How will it influence (corporate)
© 2016 Macmillan Publishers Ltd. 1741-3591 International Journal of Disclosure and Governance 1–23
www.palgrave-journals.com/jdg/
Naheem
social responsibility or environmental issues? How could it inform public or industry policy? How might it affect the
quality of life? Not all papers will have social implications – This article has implications for the global
banking sector. It will also influence approaches to AML regulation, risk assessment and audit within
the broader financial services sector. In addition it has implications for agencies working on TBML,
including law enforcement, customs, governments and tax and revenue investigators. Originality/
Value: What is new in the article? State the value of the article and to whom – The originality of this article
is the in-depth discussion on TBML and banking risk assessment processes.
International Journal of Disclosure and Governance advance online publication, 21 January 2016;
doi:10.1057/jdg.2015.21
Keywords: trade-based money laundering; free trade zones; customer due diligence; beneficial
ownership; risk assessment; global banking sector
2 © 2016 Macmillan Publishers Ltd. 1741-3591 International Journal of Disclosure and Governance Vol. 00, 0, 1–23
Trade-based money laundering
between countries. Liner shipping accounts for produced a guidance document in 2006 and
about 60 per cent of the global trade in shipping defined TBML activity as ‘the process of dis-
according to the World Shipping Council guising the proceeds of crime and moving value
(2015), transporting an estimated value of US$4 through the use of trade transactions in an
trillion around the globe. The World Shipping attempt to legitimize their illicit origins’ (p. 5).
Council reports that in 2012 there were approxi- This definition has been criticized by some
mately 500 services providing almost daily routes academics (Soudijin, 2014) as being too vague
between countries with an estimated 9000 port by not specifying whether the focus is on goods
calls made. An overview of the main trade and/or services and whether it is international
shipping routes shows that Asia–North America trade only or if it includes domestic transfers.
is the biggest trading route with over 23 million Also by its limited definition of ‘illicit origins’ it
trade routes carried out in 2013, with Asia– does not cover terrorism funds moved in this
North Europe the second busiest at 13.5 million way or capital flight/tax evasion schemes using
routes (World Shipping Council, 2015). the same systems. In a report published by the
This level and scale of shipping transactions Australian Institute of Criminology the follow-
that are being undertaken on a daily basis ing definition is used for TBML: ‘the use of
provides an ideal cover for criminal organiza- trade to move value with the intent of obscur-
tions seeking to move illicit goods and cash ing the true origin of funds’ (Sullivan and
between countries. TBML is a relatively new Smith, 2011, p. 10). They also explicitly state
phenomenon for the formal financial services that alternative remittance systems and the
sector (Araujo, 2008), but has become increas- movement of cash are not covered in their
ingly more prominent as a means by which to definition.
defraud both tax and revenue departments, as In this article the focus is on the mechanisms
well as involving the banking sector in facilitat- behind the different schemes and methods used,
ing other types of illicit activity, including and from this information to start to consider or
laundering money (PWC, 2014a). This article establish an appropriate risk assessment frame-
seeks to describe some of the facts and myths of work that can be used across the different
what TBML is and explain the challenges it schemes. For the purposes of this article the
presents to the banking sector for risk assess- predicate crimes or purposes for undertaking
ment and audit procedures. TBML activity could be tax evasion, money
laundering, capital flight and/or terrorist
funding.
Trade-based money laundering
(TBML)
TBML has been difficult to define across both TBML SCHEMES
the industrial banking and the academic sectors, Banks are often involved in shipping and trade
partly because of its complexity and partly transactions because some form of pre-shipping
because of the variety of ways in which TBML finance is needed by the client to enable them
can occur. It is not just money launderers who to purchase the goods and ship them (APG,
use trading and shipping methods to hide goods 2012). The buyer will not usually want to pay
or fund transfers. Many white collar criminals upfront for all the goods until they can be
involved in tax evasion or corrupt politicians inspected at the destination port, and thus banks
and corporate businesses involved in capital provide the bridge between the sellers and the
flight schemes also utilize many of the TBML buyers in the transaction. As part of the banking
schemes for their own purposes. The first real process an assessment is undertaken as to the
attempt at a definition was by the Financial viability of the business transactions and the risk
Action Task Force (FATF, 2006), when they to the bank in agreeing to fund it. The bank
© 2016 Macmillan Publishers Ltd. 1741-3591 International Journal of Disclosure and Governance Vol. 00, 0, 1–23 3
Naheem
4 © 2016 Macmillan Publishers Ltd. 1741-3591 International Journal of Disclosure and Governance Vol. 00, 0, 1–23
Trade-based money laundering
customs. Similarly, revenue could do an audit other ships, thus hiding the true destination
to discover inventory discrepancies between country of products. All of these incentives
widgets produced and amount shipped or sold. provide an additional opportunity for criminals
However, from the banking perspective, with- to hide the source of the money and the
out supporting evidence from either customs or original source of the goods being transported
revenue it becomes very difficult to ascertain (Sullivan and Smith, 2011). In total there are an
whether the documents being produced and estimated 3000 FTZs, and FATF has high-
given to the bank accurately reflect the ship- lighted their concerns that many FTZs are also
ment details. The example shown in Figure 1 located in major financial hubs, thus providing
can also be repeated in reverse with the expor- criminals with easier access to the main financial
ter Company E claiming to ship 1 million sector (FATF, 2010).
widgets but instead sending only 500 000. Pay- In particular, one of the highlights of the
ment is still received for $2 million from FATF (2010) report was that the inspection of
Company F of which $1 million is sent to the goods by the zone authorities is carried out only
supplier and the remaining $1 million goes into for some percentage of the cargo. This would
a bank account for Company F to access at a facilitate cases of over- and under-invoicing as
later stage. In this arrangement Company F has there would be little chance of any verification
transferred $1 million undetected into the checks being carried out. However, the chal-
country of Company E. lenge to the banking sector is that they have
Schemes such as under- and over-invoicing little chance of having the information verified
have begun to be noticed and have been either; thus, the use of FTZs is in itself a red flag
described in typology reports such as indicator and needs to be considered in light of
AUSTRAC (2013) as well as being identified other information known about the client and
in the FATF guidelines and red flag indicators their business history.
(FATF, 2006). One of the ways that criminals In addition to FTZs there are a number of
can circumvent the trade documentation similar schemes across the globe that operate
process is through the use of free trade zones, according to the same principal model of an
which enable shipments to be unloaded FTZ but without always focussing specifically
and reloaded with minimal checks and with- on developing export growth. Examples of
out having to resubmit documentation these include the following:
through customs. This provides an opportunity
Export Processing Zones (EPZ)
to move goods and change shipments without
Hybrid EPZ model
being detected, or to change the destination
Enterprise Zones
port without the banking finance unit being
Free Ports
aware.
Single factory EPZ
Special Economic Zones
Foreign Trade Zones
Free trade zones (FTZs)
Bonded Warehouses
Free trade zones (FTZs) are designated areas
within jurisdictions where incentives are offered All of these free trade schemes highlight the
to support development through increased importance, to the trade finance and AML
exports and foreign direct investment (FATF, units, of understanding the client’s proposed
2010). The way this is achieved is through shipping routes and consider why certain areas
offering benefits such as exemptions from tax have been used and what type of zones will be
and duties, simplified administration, and less available to facilitate criminal activity. Free zone
stringent checks on goods. FTZs also enable areas pose a significant number of challenges to
goods to be easily unloaded and reloaded onto banks especially when trying to determine
© 2016 Macmillan Publishers Ltd. 1741-3591 International Journal of Disclosure and Governance Vol. 00, 0, 1–23 5
Naheem
accurate shipping information including bene- FTZs were introduced in order to develop and
ficial ownership and documentation on the strengthen trading within and across certain
legal entities involved in some of the transac- geographic regions. The FTZs offer a number
tions. In particular, FATF (2010) noted that of advantages to those in the shipping business,
many zone authorities are not as stringent in such as easier access to transhipment, re-packa-
establishing new legal entities as they would be ging, warehouse storage and re-labelling of
if operating outside the zone area; as a result goods. Goods entering FTZs are not usually
they determined several weaknesses in the subject to the usual customs checks and con-
system from an AML perspective because of trols. However, for criminals seeking to launder
the following reasons: funds these same facilities also provide an ideal
The zone authorities often require little or no haven in which to store illicit goods or change
ownership information of the companies shipment routes without informing banking
setting up in the zone services.
The physical presence of a company in the Goods introduced in a FTZ can undergo
zone is not always a requirement for estab- various economic operations, such as
lishment in the area transhipment, assembly, manufacturing,
The regulations covering the control of processing, warehousing, re-packaging
FTZs are not always explicitly stated; thus, it and re-labelling as well as storage for
may not be clear whether the government or timely marketing, delivery and tranship-
the customs authorities have the jurisdiction ment. The tracking of shipments, espe-
Controls are often carried out by random cially for repackaging, is a key element in
selection more than on risk assessment or the control of FTZs. The same shipment
indicators may use FTZs as a base around the globe
There are no clear procedures, authority, or for no other purpose than to launder
documentation identified upon which to funds.(FATF, 2010, P16)
organize and execute the examinations
Licensing procedures and supervision of
activities in FTZs are often complicated and
Privatization of FTZs
bureaucratic, which can lead to insufficient
One of the biggest shifts in FTZ development
oversight
has been the movement towards private opera-
These new legal entities that have been formed tors as opposed to government or state-mana-
through the FTZs now have access to the ged zones. The rapid change in the
financial system in the same jurisdiction, or in development of FTZs (2010) also means that
other jurisdictions, and will be considered by some of the AML/CTFs may not be up to date,
most banks as legal businesses. This poses a risk which is another issue that was raised as a
to all banks as many of these new legal entities concern by FATF and which they state needs
will be seeking to access financial services in to be addressed. Table 1 shows the shift towards
other countries in order to move funds across private zone development and the areas of the
the globe. globe most affected.
FTZs provide a number of opportunities by
even if banks outside of the FTZs are which criminal organizations can exploit the lax
involved in the trade transactions, they AML controls in order to facilitate trade fraud in
are less able to manage ML/TF risks some form. One of the difficulties is that through
because of the others vulnerabilities of the the establishment of legal entities and businesses,
zones (opaqueness and relaxed oversight). which can then trade with each other within a
(FATF, 2010, p. 15) FTZ, additional layers of complexity are
6 © 2016 Macmillan Publishers Ltd. 1741-3591 International Journal of Disclosure and Governance Vol. 00, 0, 1–23
Trade-based money laundering
Table 1: Showing the shift from public to private controlled trading zones reproduced from FATF (2010,
p. 13)
Private and public sector zones in developing and transition economies
Region Public zones Private zones Total
© 2016 Macmillan Publishers Ltd. 1741-3591 International Journal of Disclosure and Governance Vol. 00, 0, 1–23 7
Naheem
Figure 2: Example provided by FATF (2010, p. 25) of Carousel Fraud using various companies
registered in free trade zones Copyright © FATF/OECD. All rights reserved.
tends to result in less efficiency and less useful needs to be handed over to the financial intelli-
material being produced. A balance is needed gence unit. Inevitably, in order to process the
whereby the banking sector can analyse the large quantities of data, some form of automated
initial data before discerning which information search system is required.
8 © 2016 Macmillan Publishers Ltd. 1741-3591 International Journal of Disclosure and Governance Vol. 00, 0, 1–23
Trade-based money laundering
© 2016 Macmillan Publishers Ltd. 1741-3591 International Journal of Disclosure and Governance Vol. 00, 0, 1–23 9
Naheem
at the national and international level as country, customs district, product, and transac-
well as with the private sector as it relates tion price risk characteristics. As this informa-
to FTZs. The exchange of information is a tion is often collected by different agencies at
key element to better identify the illicit different points in the trading process, there was
activities (e.g. fraud schemes) using FTZs. a strong need to share data across agencies and
(FATF, 2010, p. 28) increase inter-agency cooperation (FCA, 2013).
This now offers one example of an inter-agency
In the United States, a model of local trade
model to illustrate how cooperation and sharing
transparency units (TTUs) has been devel-
of trade data can benefit those working to
oped (Hoffman, 2012), which was initiated
combat TBML transactions (Zdanowicz, 2009).
by the office of immigration and customs
However, the TTU works with other trade
enforcement (ICE). Here the use of trade data
fraud crimes as well as with TBML, which
analysis has been developed, and information
raises the question whether TBML should be
is shared as one way in which law enforce-
viewed as a separate crime or as just a money-
ment and customs officials can thwart price
laundering technique by which to commit an
alterations and changes to weights of ship-
array of financial crimes. Whatever the name
ments (FCA, 2013). The first TTU was
it is clear that a centralized data system is
established in Washington in 2004, and since
needed, rather than a series of separated units,
then units have been introduced in Argentina,
in order to facilitate data sharing and develop
Brazil, Colombia, Paraguay, Mexico and
expertize in this area. As stated by Hoffman
Panama.
(2012) ‘these activities may be so related and
One of the most effective ways to identify interconnected that it only makes sense
instances and patterns of trade-based for one entity to target all of them together.’
money laundering is through the (p. 337).
exchange and subsequent analysis of trade
data for anomalies that would only be
apparent by examining both sides of a
trade transaction.(ICE, 2015)
Pricing data
The banking sector is faced with a number of
ICE is hoping that the model of TTUs will challenges when trying to examine trade
spread globally and are working with FATF to finance applications and assess the viability of
promote this particular model (ICE, 2015). The shipping proposals (FATF, 2010). Factors such
work focusses on the four key areas of data as the large number of trading transactions and
interest that Zdanowicz identified, which are the large volume and diversity of goods being
10 © 2016 Macmillan Publishers Ltd. 1741-3591 International Journal of Disclosure and Governance Vol. 00, 0, 1–23
Trade-based money laundering
shipped at any one time imply that trying to under-invoicing for movement into the coun-
determine the feasibility of a business proposal try. Many examples of trade discrepancies can
being presented by a client can be daunting. be accounted for through natural currency
Unfortunately the difficulties in capturing these differences or price fluctuations. However,
data have caused a gap to emerge with a lack of some examples of large discrepancies such as
trade data in some areas causing particular those that Zdanowicz (2009) discovered for US
difficulties when trying to assess interna- exports, which appeared at below average
tional trading patterns and money-laundering prices using this system, are shown in Table 2.
possibilities. These trade discrepancies are notably
higher or lower than the normal trade prices,
The lack of trade data which can be
and thus data mining software should be able to
effectively mined by law enforcement
detect such obvious anomalies. de Boyrie et al
creates a black hole for investigations and
(2007) suggested using a price matrix system
shipments entering and exiting FTZs
whereby:
worldwide. It is significant impediment to
effectively combating TBML in FTZs. The price of any trade item, the standard
(FATF, 2010, p. 20) deviation, upper- and lower-quartile
prices are determined and compared to
One tool that is slowly being developed is
that of the world (or a combination of all
the use of trade data comparing usual price
countries that trade with the USA). Those
ranges for specific goods in the United States
items that are mispriced can be then sub-
using the trade database developed by
ject to further scrutiny.(de Boyrie et al,
Zadanowicz (2009) and linking this to work
2007, p. 487)
developed by several of the key agencies
involved in trade investigations. In his analysis However, for traders who are only modifying
of trade data in the United States Zdanowicz prices by a small amount, these anomalies will
(2009) states that there are four statistical pro- not be easily detected. Therefore, trade-based
files that can be used when detecting TBML money laundering through over- and under-
activity. These are: invoicing will continue to provide an ideal
method to move smaller amounts of money
(1) country risk profiles;
across international jurisdictions.
(2) customs district risk profiles;
(3) product risk profiles;
(4) transaction price risk profiles.
Zdanowicz (2009) analysed bilateral trade Guidelines on using trade data for
results between the United States and other TBML detection
countries to compare trading price anomalies. In their updated report on TBML (2008), FATF
Bilateral trade results are often used in order to considered a number of ways by which the use
check that import and export figures match of computerized trade data could be used in
between the two countries. Other research order to assist in TBML detection. Although
using bilateral trade statistics includes work many of the examples listed below assume the
undertaken by Yalta and Demir (2010) on presence of software available to perform these
Turkey, which shows that TBML schemes are tasks, the reality for many banks is that these
country specific, depending on which direction programs have yet to be developed. The other
the value is moving. Patterns of trade data problem is that most of these data would need to
discrepancies for some countries are, therefore, be analysed by other agencies outside of the
reported either by using over-invoicing for the banking sector with experience in customs and
movement of funds out of a country or by using shipping. FATF identified eight major areas in
© 2016 Macmillan Publishers Ltd. 1741-3591 International Journal of Disclosure and Governance Vol. 00, 0, 1–23 11
Naheem
which AML data mining software could be used there is better organization and management of
to facilitate TBML/AML detection. shipping data at an international level.
1. Comparing domestic and foreign import/ 1. Comparing domestic and foreign import/export
export data data – this would include detecting discre-
2. Analysing financial information pancies in the Harmonized Tariff Schedule,
3. Examining cargo movements country of origin, manufacturer, importer/
4. Examining domestic import data exporter, ultimate consignee, broker, unit
5. Comparing information price, commodity activity by time period,
6. Using statistical analytical methods and port of import/export.
7. Comparing export information 2. Comparing information such as the origin,
8. Paying particular attention to trade transac- description and value of the goods, parti-
tions that display known red flag indicators culars of the consignee and consignor,
of TBML/FT activity and the route of shipment with intelli-
gence information in existing databases to
The different forms of information that FATF
detect any irregularities, targets or risk
suggested being utilized actually cover an
indicators.
extensive array of databases and shipping data.
3. Paying particular attention to trade transactions
Therefore, in order to apply the recommenda-
that display known red flag indicators of TBML/
tions of FATF (2008) more effectively this
FT activity.
report suggests dividing the data into two
Cross-comparing known typologies of
groups, with group one being external data
risk, such as those identified in the FATF
and group two being internal data, where
Typologies Report on Trade-based
internal data relate to information that the
Money Laundering with trade data, infor-
banking sector can easily access themselves and
mation on cross-border monetary transfers
utilize in-house and external data are that which
associated with the payment of goods,
would be collected and analysed within exter-
intelligence, tax and wealth information,
nal agencies, including law enforcement and
the kind of goods exported, and connec-
customs. The reason for this divide is that
tions with organized crime or any other
current research (Naheem, 2015) and other
illicit activity, and making the completed
work on data mining and AML compliance
analysis available to the investigative
(Gao and Ye, 2007) have found that many of
authorities.
the banking AML structures are not yet able to
handle large amounts of AML-related data, nor This type of information needs to be analysed
is the expertize available to interpret the find- within the context of a risk assessment frame-
ings and apply them to a standard AML frame- work that considers the overall business of the
work. This report suggests that progress towards client and the knowledge of previous business
fully implementing the FATF guidelines needs ventures that the client has undertaken. The
to be stepped up and in conjunction with other information required within a risk framework
agencies working in this area. includes understanding patterns of behaviour
linked to money laundering, including red flags
such as trading in countries known to be high
Internal banking data risk, as well as trading in goods known to be
The following types of data are available at associated with money-laundering cases already
present for the banking sector and could be detected, and using systems such as FTZs and
included in current risk assessment processes, unnecessary third parties. As with any business
although some types of data may be largely proposal the bank is trying to determine the
incomplete. This will remain the case until commercial viability of the business. A recent
12 © 2016 Macmillan Publishers Ltd. 1741-3591 International Journal of Disclosure and Governance Vol. 00, 0, 1–23
Trade-based money laundering
case against Credit Agricole (Croft and The final point that FATF emphasized was the
Chassany, 2015) highlighted the failure of a need for taking appropriate follow-up action
bank to file a suspicious transaction report. The when anomalies and discrepancies in trade and
underlying basis of the case was the lack of financial transactions were identified. This fol-
commercial viability of the transaction, and the low-up could also include seeking further
ruling by the judge stated that the bank should clarity or additional information before and
have been in a position to assess the risk then deciding whether to file a suspicious
associated with this client based on this one activity report (SAR).
aspect.
© 2016 Macmillan Publishers Ltd. 1741-3591 International Journal of Disclosure and Governance Vol. 00, 0, 1–23 13
Naheem
including the possibility that the source of the jurisdictions, and some of these jurisdictions
funds or the purpose for the funds is illegal may be particularly prone to money-laundering
activity. schemes. However, gathering this information
still poses a challenge.
Risk matrices
Money-laundering risk assessment has often A four-pronged approach to TBML
used a risk matrix model, which focusses on risk assessment
client behaviour and transaction activity. The In order for risk assessment to be effective it
risk is calculated through a rules-based approach needs to be evidence based. To achieve this the
with tick boxes used to determine the questions process requires building a profile of the client
asked and the checks made. The higher the and the business that is engaging with the
client appears in the risk matrix the greater the banking services. Current research suggests
level of risk. However, in previous research on (Ai et al, 2010; Ai, 2012; Naheem, 2015) that
TBML (Naheem, 2015) it was suggested that a this can only be achieved through a greater
broader risk matrix model that could be adapted understanding of the client and the business.
was needed. This model needed to be more One of the ways that this can be achieved is
flexible than a rules-based approach and also through mapping the client business risks
needed to be informed by AML research on the including their other business associations,
client and the business. The move to risk-based commodities being exported or imported and
approaches is not new. Other authors have also the countries being used as destination and
stressed the importance of a more responsive transit points on the trading route. The four-
approach (Ai et al, 2010). The FATF (2012) pronged approach suggested by Naheem (2015)
report has also suggested that a more dynamic would categorize the information being col-
and risk-based approach needs to be adopted lected under the following four headings:
within the banking sector so that it can be Client – Information pertaining to the client
flexible enough to respond to new and emer- would include observations on their interaction
ging examples of money laundering. with the bank, such as their willingness to
In work on risk-based approaches Ai (2012) provide information about the business, as well
identified three areas to enhance traditional as their understanding of why the trading
Know Your Customer assessment. One of these transactions and routes have been planned that
was understanding customer transactions; the way. Sometimes legitimate clients and busi-
other two were knowing the customers of your nesses can be used by money launderers as a
customer and knowing the business partners of front company for their activities, and the client
the customer. This concept of an enhanced may be either a knowing or unknowing
level of understanding of the customer and their accomplice in the illicit activity.
business was also suggested in previous research Transactions – Client accounts can also be
by the author (Naheem, 2015). In the model hijacked by money launderers especially if
suggested by Naheem the two main areas of information such as amounts of invoices are
client behaviour and transaction patterns are known and countries of payment. Schemes
used. However, in addition there are two other such as cuckoo smurfing whereby accounts are
areas of concern that a risk approach needs to used without the client’s knowledge can enable
monitor. These additional two areas are the money launderers to move money from one
geographic profile of the business and the country to another if it matches the client’s own
involvement or links to third-party organiza- business transactions (AUSTRAC, 2013). Indi-
tions. These are particularly relevant in TBML cators of this kind of transaction often show as
cases as money is being moved to other money coming into the client’s account from a
14 © 2016 Macmillan Publishers Ltd. 1741-3591 International Journal of Disclosure and Governance Vol. 00, 0, 1–23
Trade-based money laundering
different source to the invoiced company, or in clarifying the beneficial ownership information
a combination of different smaller amounts to of business clients and companies involved with
make up the invoiced total. the bank’s client. Beneficial ownership is
Many of the red flag indicators that have defined in banking as ownership and control
been issued for TBML by FATF (2006) are over a specific account ‘equating to ultimate
focussed on shipping documentation alerts. control over funds in such account, whether
These include falsified documents and a lack of through ownership or other means’ (The
commercial viability for the business transac- Wolfsberg Group, 2012, p. 1)
tions. However, actual financial transaction In other words, the name of the account
patterns are not as well emphasized, and these holder may not equate with whoever is actually
would include matching fund transfer amounts placing and withdrawing funds through that
to invoices, ensuring that the company invoiced account. Criminals sometimes use existing cli-
is the same company that pays for the goods, ents to open accounts on their behalf because
and watching for structuring of funds occurring the existing client will already pass the CDD
through the client’s account. Other red flags checks. However, at present, within banking,
would also include large fund transfers that are much of the customer due diligence verifi-
unaccounted for, or money transferred to cation is on the actual account holder rather
family members or to off-shore companies/ than the beneficial owner of the account
accounts. (Davilas, 2014). These four areas are not new
Geographic Profile – Geographic profiling is in terms of risk assessment systems; however,
perhaps new within AML compliance, but the indicators under each of the headings are
according to the Wolfsberg principles for cor- constantly being updated as new typologies and
respondent accounts (2014) there are a number cases emerge.
of additional risks that some countries pose to
money-laundering risk assessment.
Certain jurisdictions are internationally
AML compliance across the bank
It is not entirely clear whether TBML should be
recognised as having inadequate anti-
viewed as separate to other money-laundering
money laundering standards, insufficient
schemes. The only real distinction is that ship-
regulatory supervision, presenting greater
ping routes are used in order to move illicit
risk for crime, corruption, terrorist finan-
gains rather than relying purely on the financial
cing or pose elevated risk of evading
systems or cash-based transactions. The other
sanctions.(Wolfsberg Group, 2014, p. 3)
option would be to consider whether TBML is
Clients that are dealing with countries at a just a technique for facilitating trade-related
higher risk are exposed to more involvement fraud or crime. The main priority and focus of
in certain criminal activities. The geographic this article, however, is to determine what the
risk assessment still applies even if the bank that implications are for detecting TBML within the
the client is doing business with in the high-risk banking system.
country is connected to the main client’s bank. The main additional difference between
Third-Party involvement – There is risk in assessing for money-laundering activity and
money laundering from third-party client and TBML is the broader nature of TBML activities
business associates who may be using the client and the need to include trade finance units as
as a front business to hide their own illicit well as the AML compliance section within a
operations. Or the client may be doing business banking risk assessment process. There is also a
with a number of companies all of which are requirement that the AML compliance staff
actually owned by the same client. One of the become knowledgeable of business and ship-
ways in which this information is gathered is by ping trade processes, which will be needed by
© 2016 Macmillan Publishers Ltd. 1741-3591 International Journal of Disclosure and Governance Vol. 00, 0, 1–23 15
Naheem
16 © 2016 Macmillan Publishers Ltd. 1741-3591 International Journal of Disclosure and Governance Vol. 00, 0, 1–23
Trade-based money laundering
governance. In the HBUS case nearly 15 000 can update and expand the remit of the AML
suspicious alerts remained unfiled because of audits
inadequate staffing and resource issues. The lack There is a system in place for internal AML
of priority that management gave to this issue audits. These can check that the new indica-
finally resulted in a legal case being taken against tors have been incorporated and are being
the bank. The AML compliance unit therefore used across all units in the bank
needs to work closer with the management and
governance structures of the bank if their work In the absence of an appropriate AML frame-
is to be recognized and given appropriate level work banks will inevitably be faced with a
of support. number of difficulties. In the HSBC case in the
Anti-money-laundering compliance and United States (Homeland Security, 2012) insuf-
regulations rely on the banking sector to iden- ficient resources were allocated to the AML
tify and subsequently report any suspicious compliance section. This resulted in a backlog
activity that they feel warrants further investiga- of internal suspicious alerts that were never
tion, which is sent to the national financial assessed by the AML compliance section or
intelligence unit in the form of suspicious passed onto the financial intelligence unit.
transaction reports. Following the recommen- Eventually this resulted in an investigation by
dations of FATF (2012) many countries the financial regulator.
across the globe have implemented their own Other difficulties that have been noted with
specific financial intelligence units to process weak AML systems are a lack of communica-
these reports. However, one of the challenges tion with the audit committee, which was
for the banking sector and other financial noted in the FCA (2013) report. They noted
services is that within this system the very that if auditors within the banking system are
definition of the term ‘suspicious’ is constantly not up to date with different AML red flag alerts
evolving. and potential risks from money-laundering
Each new typology report such as the AUS- schemes, then they are not adequately placed
TRAC report or APG (2012) or the FATF to produce relevant audit reports or challenge
indicators identifies new red flags of suspicious the systems being implemented. This is a view
activity for a particular money-laundering that was also raised in a recent report by the
scheme. The banks have to incorporate these Auditing company PriceWaterhouseCoopers
new indicators into their existing AML frame- who stated that ‘Regulators are looking to
work so that they can be added as a suspicious internal audit as the third and final lines of
activity. In order for this to be effective this defense to detect irregularities within an orga-
approach makes a number of assumptions about nisation's BSA/AML and PFAC programs, and
the banking AML frameworks, most notably to provide assurance that the first two lines of
the following: defines are effective’ (PWC, 2014b, p. 5).
Finally some academics have highlighted the
There are currently AML frameworks in theoretical concept of over-reporting in
place that are using red flag alerts and risk- response to increased regulation (Pellegrina and
based indicators Masciandaro, 2008), whereby ‘Given that the
These frameworks are updated regularly and law asks the FIs to report suspicious transactions,
are flexible enough to incorporate new the incentive to implement excessive but useless
indicators reporting may arise, in order to avoid sanctions’
Staff training occurs on a regular basis so that (p. 5). This theory supports the approach
new indicators can be explained favoured by FATF (2012), which is to focus on
The AML framework includes the audit prevention and encourage the ethos of ‘integ-
committee and internal audit so that they rity’ rather than relying on law enforcement
© 2016 Macmillan Publishers Ltd. 1741-3591 International Journal of Disclosure and Governance Vol. 00, 0, 1–23 17
Naheem
and strict regulation. Stricter regulation may to be routinely updated; however, once the
work initially at forcing banks to report activity, initial training has been completed the second
but it does not encourage an in-depth investi- stage should become easier to implement and
gative risk assessment approach. The latter is less resource intensive.
ultimately more beneficial to both clients and
banks as clients can be penalized and have their
business transactions delayed if suspicious New and emerging risks
reports are filed against them. One of the challenges in crime prevention is
In summary, the failure to develop an appro- that a phenomenon of ‘crime displacement’
priate AML framework has been shown to occurs. This is a term used in criminology to
produce the following situations: describe the means by which criminals adapt
their methods in response to crime prevention
More and more indicators of suspicious strategies (Gurette, 2009). In financial crime
activity are filed and held within AML terms and for money laundering in particular,
compliance but not communicated across criminal organizations will continue to exploit
the rest of the bank those areas within the financial system that
Audits are not aware of changes in risk are the weakest. Although some authors chal-
assessment and do not inform governance lenge the inevitability of crime displacement
and management of potential risks or (Soudijin, 2014), criminologists have stated that
resource implications as long as the motivation to change behaviour is
A concern for regulation compliance means worthwhile crime displacement will continue
that any suspicious activity is reported and to occur (Cornish and Clarke, 1987). Crimin-
sent to the FIU to deal with ologists term this the rational choice theory.
FIUs become inundated with poorly under- For criminals seeking to launder money the
stood suspicious reports, which in turn ideal method is to use the weaker systems,
detracts from the efficiency of their own which are often located in the informal or
work shadow financial economy, including disguising
Some analysts have suggested that all suspicious transactions through trade and shipping routes.
repotting procedures should require a more in- These sectors are less easily regulated and harder
depth reporting structure to avoid simplistic for law enforcement agencies to infiltrate.
over-reporting. Therefore, using the criminology-based ratio-
nale choice theory, systems such as alternative
… each suspicious transaction reported remittance systems and trade disguise systems
should cover all related information about such as TBML will continue to grow and
the transaction, with an attached analysis become the major source of threat for enforce-
and explanation made by the reported ment agencies across the globe.
entity. A suspicious transaction should not As the United States and other countries
be reported simply because the transaction worldwide tighten financial regulation and
is inconsistent with the descriptions of reporting for the formal and even informal
AML regulations.(Ai, 2012, p. 206) financial sectors, the use of trade-based
money laundering and alternative remit-
Although the banking sector will no doubt be
tance systems will assuredly grow.(US
reluctant to enforce reporting at this level of
Dept of State, 2005)
detail, it is important that an AML framework
be established and that all staff are brought up to It is important within banking risk assessment
date with AML compliance and the many processes that displacement theories such as this
indicators of risk. Moving forward, this needs be understood. They enable all agencies
18 © 2016 Macmillan Publishers Ltd. 1741-3591 International Journal of Disclosure and Governance Vol. 00, 0, 1–23
Trade-based money laundering
working on the issue to develop a deeper services, some less regulated than others for
understanding of the implications and conse- AML compliance
quences of any AML actions that they take, so Many clients take advantage of free trade
that subsequent changes by criminals in their zones in many trade transactions, and banks
money-laundering behaviour will also be fore- need to ensure that they retain a balance
seen and hopefully prevented. This should also between achieving greater flexibility and
reduce the scenario of moving the problem speed of shipping in these specific areas for
from one area of the bank to remain undetected their client versus the AML risks that they
in another. pose
Finally the international dimension of ship-
ping and trade means that governments are
having to work together at a regional and
CONCLUSION global level in order to combat criminal
This article has provided an overview of
AML risks within their own country. Bank-
TBML as it affects the global banking context.
ing risk assessment frameworks also need to
There are already several academic and empiri-
remain up to date with these different inter-
cal documents on TBML, which have
national agreements
explained some of the typologies that banks
can expect to discover through TBML schemes. The use of technology will become more
However, the discussion also needs to move paramount in the future, especially as a way to
beyond this to consider the issue in more depth, analyse the amount of data that could be
and to analyse the implications for developing a generated in TBML investigations. However,
robust AML framework within the banking currently there are limited software options
sector. The model that seems to work most available, and most data systems within the ports
effectively to combat TBML, according to and customs are hybrid systems of IT and paper
the FATF (2010), is one that is based on work, which makes information and data shar-
prevention and establishing integrity rather than ing hard to achieve. Other limiting factors for
relying on law enforcement and prosecutions. banks can occur when trying to establish bene-
There are a number of reasons for this, but in ficial ownership information for off-shore legal
general the TBML schemes are too complex entities or trading businesses created through
and involve too many different agencies work- FTZs, where administrative and AML checks
ing together to rely solely on one sector. All are less stringent. Despite these challenges there
agencies working in this area need to be able to has been some progress made in certain regions,
communicate together and share data and such as the United States with their interagency
information. TTU. These TTUs may provide trade data sets
For banks in particular the multi-agency that can become the starting point for trade data
aspect of trade means that a number of addi- comparison programmes and software applica-
tional factors need to be considered in any risk tions in other parts of the globe.
assessment framework for TBML. Enhanced
TBML risk assessment frameworks would be
needed because there are differences between Risk assessment
TBML and other forms of money-laundering All of the points highlighted above illustrate
techniques. These differences include the that there is no quick fix solution to dealing
following: with trade-related money laundering across the
There are a number of different jurisdictions global banking sector. Each money-laundering
involved in trade transactions and this also case can be very specific to a particular region or
includes a number of other potential financial country and can use very localized money-
© 2016 Macmillan Publishers Ltd. 1741-3591 International Journal of Disclosure and Governance Vol. 00, 0, 1–23 19
Naheem
laundering processes. There is a stronger onus knowledge base also involves understanding
on banks to develop their own localized AML how trade facilitates different forms of financial
research using a combination of typology crime, such as money laundering, tax evasion
reports and indicators of red flags from FATF and smuggling. Detecting TBML activity
and other sources. However, banks are trying to involves a number of agencies that are involved
develop a risk-based approach to TBML while in the tracking and monitoring of data. The
working with guidelines that have often only AML framework for the banking sector will
focussed on generic examples that may be too need to be a dynamic and evolving model that
general for the local banking process. Other can respond easily to new schemes, as they are
reports and academic papers are still needed to reported and uncovered across the globe. It is
continue expanding the knowledge base and not an easy task ahead, but the sooner it is
provide more localized examples for different implemented the more effective it will become
banks across the globe to use. in the future.
Risk-based approaches that can be flexible in
their response and at the same time focussed on
the key risk areas are still sought after within the ACKNOWLEDGEMENTS
banking sector. Previous research by authors The author acknowledges being the recipient
have suggested that strengthening customer due of a research grant awarded by Princess Ālae as
diligence and focussing on third parties and part of Seven Foundation’s ‘2020 Banking
geographic risks all need to inform any risk Vision – building banks of the future’ and he
assessment model for TBML. Criminal schemes thanks her for the continued support and
have developed in sophistication and have motivation both to himself and to other stu-
moved beyond establishing their own accounts dents who benefit through her generosity
where CDD checks can stop their activities. (www.sevenfoundation.ch). The author also
Many organizations now use front companies thanks Professor Muhammad Jum`ah (a leading
possibly established in FTZs or use established economist of this era based in Damascus) who
clients within a bank to provide a legitimate has continued to provide valuable input both
front to the money-laundering business. Client through his teaching of the science of econom-
accounts can also be hacked by criminals, ics and through his continued guidance.
meaning that banks also have an oversight role
on behalf of their client as well as implementing
AML compliance tasks on behalf of the regu-
lator. Perhaps the biggest challenge will be the REFERENCES
resources required to upskill staff in AML alerts Ai, L. (2012) ‘Rule-based but risk-oriented’
and new money-laundering schemes. This approach for combating money laundering in
training needs to be implemented across all chinese financial sectors. Journal of Money
units of the bank and for all levels of staff. Laundering Control 15(2): 198–209.
Finally the bank needs to ensure that a robust Ai, L., Broome, J. and Yan, H. (2010) Carrying out
AML framework is established across the bank, a risk-based approach to AML in china: Partial
or full implementation? Journal of Money Laun-
which has the appropriate level of support at
dering Control 13(4): 394–404.
governance and audit levels.
Akinci, G. and Crittle, J. (2008) Special Economic
This article aimed to create a realistic aware- Zones: Performance, Lessons Learned, and Implica-
ness of the complexity of TBML and develop tions for Zone Development. Washington DC:
an understanding that AML compliance in this FIAS, WorldBank Group.
area requires a far greater and more in-depth APG (2012) APG Typology Report on Trade Based
understanding of trade and money laundering Money Laundering. Sydney, Australia: Asia
and how it is abused for criminal activity. This Pacific Group on Money Laundering.
20 © 2016 Macmillan Publishers Ltd. 1741-3591 International Journal of Disclosure and Governance Vol. 00, 0, 1–23
Trade-based money laundering
Araujo, R.A. (2008) Assessing the efficiency of the terrorism & proliferation [The FATF Recom-
anti-money laundering regulation: An incen- mendations], http://www.fatf-gafi.org/media/
tive-based approach. Journal of Money Launder- fatf/documents/recommendations/pdfs/FATF
ing Control 11(1): 67–75. _Recommendations.pdf, accessed 28 July 2015.
AUSTRAC (2013) Typologies and case studies report. FCA (2013) Bank’s Control of Financial Crime Risks in
Australian Transaction and Analysis Centre, Trade Finance. London: Financial Conduct
http://www.austrac.gov.au/sites/default/files/ Authority.
documents/typ13_full.pdf, accessed 17 July Gao, Z. and Ye, M. (2007) A framework for data
2015. mining-based anti-money laundering research.
Bridges (2011) Transparency in trade initiative Journal of Money Laundering Control 10(2):
launched at global review Vol 15 No.27 170–17.
http://www.ictsd.org/bridges-news/bridges/ Gottschalk, P. (2013) White-Collar criminals in
news/transparency-in-trade-initiative- modern management.
launched-at-global-review, accessed 21 July Guerette, R. (2009) Analysing Crime Displacement
2015. and Diffusion, Tool guide no. 10, http://
Cornish, D.B. and Clarke, R.V. (1987) Under- www.popcenter.org/tools/displacement/
standing crime displacement: An application print/, accessed 20 July 2015.
of rational choice theory. Criminology 25(4): Hoffmann, L. (2012) A critical look at the current
933–947. international response to combat trade-based
Croft, J. and Chassany, A.-M. (2015) Crédit agricole money laundering: The risk-based customs
loses suspicious transaction case, http://www audit as a solution. Texas International Law
.ft.com/cms/s/0/ef67acea-e9b4-11e4-b863- Journal 48: 325; 329–330.
00144feab7de.html#axzz3Zd0pvgKH, Homeland Security (2012) HSBC exposed US
accessed 9 May 2015. financial system to money laundering, drug,
Davilas, C. (2014) AML compliance for foreign terrorist financing risks. From permanent sub
correspondent accounts: A primer on benefi- committee on investigations:. US Senate,
cial ownership requirements and other chal- http://www.hsgac.senate.gov/subcommittees/
lenges. Journal of Investment Compliance 15(1): investigations/media/hsbc-exposed-us-finacial-
4–16. system-to-money-laundering-drug-terrorist-
de Boyrie, M.E., Nelson, J.A. and Pak, S.J. (2007) financing-risks, accessed 8 May 2015.
Capital movement through trade misinvoi- ICE (2015) ICE leads trade-based money laundering
cing: The case of africa. Journal of Financial investigations, http://www.ice.gov/trade-
Crime 14(4): 474–489. transparency, accessed 20 July 2015.
FATF (2006) Trade based money laundering, Mugarura, N. (2014) Customer due diligence
France, http://www.fatf-gafi.org/media/fatf/ (CDD) mandate and the propensity of its
documents/reports/Trade%20Based% application as a global AML paradigm. Journal
20Money%20Laundering.pdf, accessed 28 July of Money Laundering Control 17(1): 76–95.
2015. Neilsen, G. and Furneaux, W. (2013) Financial
FATF (2008) Best practices paper on trade based crime: Compliance and failure, http://www
money laundering. Paris: FATF Report, .bankingtech.com/57881/financial-crime-
http://www.fatf-gafi.org/, accessed 11 May compliance-and-failure, accessed 6 May 2015.
2015. O’Brien, J. and Dixon, O. (2013) The common link
FATF (2010) Money laundering vulnerabilities of in failures and scandals at the world’s leading
free trade zones. France, Paris: FATF/OECD. banks. The Seattle University Law Review
http://www.fatf-gafi.org/media/fatf/docu- 36(Winter): 941–972.
ments/reports/ML%20vulnerabilities%20of% Pellegrina, L.D. and Masciandaro, D. (2008) “The
20Free%20Trade%20Zones.pdf, accessed 28 risk based approach in the new European anti-
July 2015. money laundering legislation: A law and eco-
FATF (2012) International standards on combatting nomics view”, Research Paper Series No.
money laundering and the financing of 2008–2022.
© 2016 Macmillan Publishers Ltd. 1741-3591 International Journal of Disclosure and Governance Vol. 00, 0, 1–23 21
Naheem
PWC (2014a) Goods gone bad. Addressing money- Yalta, A.Y. and Demir, I. (2010) The extent of trade
laundering risk in the trade finance system, mis-invoicing in turkey: Did post-1990 poli-
http://www.pwc.com/us/en/risk-assurance- cies matter, https://mpra.ub.uni-muenchen.
services/publications/assets/pwc-trade- de/30186/1/MPRA_paper_30186.pdf.
finance-aml.pdf. Zdanowicz, J. (2009) Trade based money launder-
PWC (2014b) Internal audit holding the line on ing and terrorist financing. Review of Law and
BSA/AML compliance. Retrieved from Economics 5(2): 855–878.
http://antimoneylaundering-fiba.com/files/
1499.pd, accessed 2 May 2015.
Soudijn, M. (2014) A critical approach to trade-
based money laundering. Journal of Money FURTHER READINGS
Laundering Control 17(2): 230–242. Naheem, M.A., (2015) Trade based money launder-
Sullivan, C. and Smith, E. (2011) Trade-Based Money ing: Exploring the implications for global
Laundering: Risks and Regulatory Responses. banks. PhD thesis scheduled for publication in
Canberra, Australia: Australian Institute of Winter 2015/Spring 2016.
Criminology. Naheem, M A., (2015) Trade based money launder-
Takáts, E. (2007) A theory of ‘crying wolf’: The ing: Towards a working definition for the
economics of money laundering enforcement. Ana banking sector, Journal of Money Laundering
Lucia Corofnel. IMF Working Paper. Control, 18(4): 513–524.
The Wolfsberg Group (2012) The wolfsberg AML Naheem, M A., (2015) Money laundering: A primer
principals frequently asked questions with for banking staff. International Journal of Disclo-
regards to beneficial ownership in the context sure and Governance, advance online publica-
of private banking, http://www.wolfsberg- tion, 3 September, doi:10.1057/jdg.2015.10,
principles.com/pdf/faq/Wolfsberg-FAQs-on- http://www.palgrave-journals.com/jdg/jour-
Beneficial-Ownership-May-2012.pdf. nal/vaop/ncurrent/full/jdg201510a.html.
The Wolfsberg Group (2014) Wolfsberg anti- Naheem, M.A., (2015) Money laundering using
money laundering principles for correspon- investment companies, Journal of Money Laun-
dent banking, http://www.wolfsberg-princi- dering Control, 18(4): 438–446.
ples.com/pdf/home/Wolfsberg-Correspon- Naheem, M.A., (2015) ‘HSBC Swiss bank
dent-Banking-Principles-2014.pdf, accessed accounts-AML compliance and money laun-
27 July 2015. dering implications’, Journal of Financial Regula-
Turnes, P.B. and Ernst, R. (2015) A framework for tion and Compliance, 23(3): 285–297.
transparency in international trade. Investiga- Naheem, M.A., (2015) The legal implications of
ciones Europeas de Direccion y Economia de la Suspicious activity reports for AML compli-
Empresa 21(1): 1–8. ance: The Crédit Agricole case. Finance Reg-
UNODC (2011) Estimating illicit financial flows ulation International 18:6, http://www
resulting from drug trafficking and other .financialregulationintl.com/financial-crime/
transnational organized crimes, https://www. the-legal-implications-of-suspicious-activity-
unodc.org/documents/data-and-analysis/ reports-for-aml-compliance-the-credit-agri-
Studies/Illicit_financial_flows_2011_web.pdf. cole-case-110688.htm.
U.S. Department of State (2005) Trade Transpar- Naheem, M A., (2015) FIFA case highlights need for
ency Units. International Narcotics Control new PEP, client-risk criteria. Complinet
Strategy Report, http://www.state.gov/j/inl/ (Thomson Reuters), http://www.complinet.
rls/nrcrpt/2005/vol2/html/42381.htm, com/global/news/news/article.html?
accessed 20 July 2015. ref=179959.
World Bank (2015) http://wits.worldbank.org, Naheem, M.A., Hakam, S S., (2015) Allegations of
accessed 11 May 2015. bribery and corruption in FIFA – are
World Shipping Council (2015) Global trade, there implications for the banking sector?
http://www.worldshipping.org/about-the- Finance Regulation International, Issue 18:5
industry/global-trade, accessed 8 May 2015. http://www.financialregulationintl.com/
22 © 2016 Macmillan Publishers Ltd. 1741-3591 International Journal of Disclosure and Governance Vol. 00, 0, 1–23
Trade-based money laundering
financial-crime/allegations-of-bribery-and- .complinet.com/global/news/news/article.
corruption-in-fifa–are-there-implications-for- html?ref=177933.
the-banking-sector-109228.htm. Naheem, M A., (forthcoming) Is tackling trade
Naheem, M.A., (2015) Suspicious transaction alerts based money laundering through stricter
in AML: The Credit Agricole case. Complinet reporting regulation the most effective
(Thomson Reuters), http://www.complinet. response? Journal of Money Laundering Control.
com/global/news/news/article.html? Naheem, M A., (forthcoming) FIFA – highlighting
ref=179394. the links between global banking and interna-
Naheem, M.A., (2015) AML compliance – A banking tional money laundering. Journal of Money
nightmare? The HSBC case study. International Laundering Control.
Journal of Disclosure and Governance, advance online Naheem, M A., (forthcoming) Risk of money
publication, May 21, doi:10.1057/jdg.2015.5, laundering in the US: HSBC case study.
http://www.palgrave-journals.com/jdg/journal/ Journal of Money Laundering Control.
vaop/ncurrent/full/jdg20154a.html. Naheem, M A., (forthcoming) China’s dirty laundry
Naheem, M.A., (2015) Trade-based money laun- – international organizations posing a risk to
dering among biggest banking risks. Compli- China’s AML systems. Journal of Money Laun-
net (Thomson Reuters), http://www dering Control.
© 2016 Macmillan Publishers Ltd. 1741-3591 International Journal of Disclosure and Governance Vol. 00, 0, 1–23 23