Download as pdf or txt
Download as pdf or txt
You are on page 1of 23

Original Article

Trade based money laundering: A primer for


banking staff
Received (in revised form): 1st September 2015

Mohammed Ahmad Naheem


holds a Bachelor’s Degree, two Masters Degrees and has completed a PhD, all in the economic, banking and investment management
domains. The author is a specialist researcher and practitioner in the fields of Trade Based Money Laundering and Virtual Currencies and at
the time of composing this paper (May 2015) is working on his second doctorate level research project titled ‘Trade Based Money Laundering:
Exploring the Empirical Implications for Global Banks’ which is scheduled for publication in Winter 2015/Spring 2016.

ABSTRACT Purpose: What are the reason(s) for writing the paper and the aims of the research? – This
article provides a detailed overview of the risks associated with trade-based money laundering and
in particular the use of free trade zones. The purpose of the article is to inform the development of
risk-based assessments within the banking sector on trade-based money laundering. It offers
findings from research conducted by the author and other academic findings on areas to focus on
in risk assessment. Design/Methodology/Approach: How are the objectives achieved? Include the main
method(s) used for the research. What is the approach to the topic and what is the theoretical or subject scope of
the article? – The article uses a number of sources of secondary data, including FATF reports, the
Wolfsberg Principles and current research into TBML and the banking sector. It also uses findings
from research by the author. The subject scope is trade-based money laundering (TBML). Find-
ings: What was found in the course of the work? This will refer to analysis, discussion, or results – The main
findings from the analysis are that banks have a greater legal and regulatory responsibility towards
detecting and reporting suspicious transactions than they would have previously considered. This
includes identifying the source and purpose of fund transfers related to trade and shipping finance
and establishing the beneficial ownership of clients and the businesses in which they are working.
The article highlights the inherent risks associated with free trade zones and the need for a greater
level of awareness across all units of the bank on risk assessment from TBML crimes. Research lim-
itations/implications (if applicable): If research is reported on in the article this section must be completed and
should include suggestions for future research and any identified limitations in the research process – The article
is a viewpoint paper but is based on forthcoming research by the author and uses an extensive
literature-based research analysis. Practical implications (if applicable): What outcomes and implications
for practice, applications and consequences are identified? How will the research impact upon business or enter-
prise? What changes to practice should be made as a result of this research? What is the commercial or economic
impact? Not all papers will have practical implications – The research article has identified a number of
implications to the banking sector on addressing Anti-Money Laundering (AML) deficiencies,
especially the need to improve standards of beneficial ownership verification and CDD checks for
business clients involved in trading and shipping. It also has implications for IT development
within this sector for all agencies working on TBML crimes. Social implications (if applicable): What will
be the impact on society of this research? How will it influence public attitudes? How will it influence (corporate)

Correspondence: Mohammed Ahmad Naheem,


Seven Foundation, Zurich 8002, Switzerland
E-mail: mnaheem@sevenfoundation.ch

© 2016 Macmillan Publishers Ltd. 1741-3591 International Journal of Disclosure and Governance 1–23
www.palgrave-journals.com/jdg/
Naheem

social responsibility or environmental issues? How could it inform public or industry policy? How might it affect the
quality of life? Not all papers will have social implications – This article has implications for the global
banking sector. It will also influence approaches to AML regulation, risk assessment and audit within
the broader financial services sector. In addition it has implications for agencies working on TBML,
including law enforcement, customs, governments and tax and revenue investigators. Originality/
Value: What is new in the article? State the value of the article and to whom – The originality of this article
is the in-depth discussion on TBML and banking risk assessment processes.
International Journal of Disclosure and Governance advance online publication, 21 January 2016;
doi:10.1057/jdg.2015.21

Keywords: trade-based money laundering; free trade zones; customer due diligence; beneficial
ownership; risk assessment; global banking sector

Abbreviations AML system and focusses on the example of


one particular type of illicit activity, which is
AML Anti-Money Laundering sometimes referred to as trade-based money
CDD Customer Due Diligence laundering, or TBML. It is a process that
FATF Financial Action Task Force disguises the actual movement of money by
FCA Financial Conduct Authority (UK using the cover of international trading transac-
Regulator) tions (FATF, 2006) and can be used by both
FIU Financial Intelligence Unit money launderers and white collar criminals as a
HBUS HSBC Bank in the US way to move money across different jurisdic-
HBMX HSBC Bank in Mexico tions. There are a number of TBML schemes
ICIJ International Consortium of Inves- that have been uncovered by law enforcement
tigative Journalists and banking intelligence units, and this article
KYC Know Your Customer examines some of these examples in more
ML Money Laundering detail.
RBA Risk Based Approach The main purpose of the article is to examine
PEP Politically Exposed Persons the implications of TBML for the banking and
SAR Suspicious Activity Report financial services sectors, which often have
TBML Trade-based Money Laundering responsibility for approving and facilitating the
UN United Nations trade finance component of such schemes. The
UNODC United Nations Office on Drugs article also explores whether TBML is an
and Crime appropriate name for such activity given the
use of trade transactions to facilitate white collar
crime as well, or whether a broader term such as
Trade Fraud would be a more accurate descrip-
INTRODUCTION tion, which could include a number of different
Money-laundering schemes are continuing to types of trade-related crimes.
grow and develop in complexity to avoid
detection within the main financial institutions;
at the same time, increasing numbers of banks GLOBAL TRADE
have been involved in legal cases due to failures The shipping industry is one of the busiest
in AML compliance and risk management global industries at present, with an estimated
(O’Brien and Dixon, 2013). This article 10 000 liner ships being loaded and unloaded
focusses on some of the issues that the modern per week across the globe. Most of these are
banking sector is facing in developing a strong liner ships that operate across fixed routes

2 © 2016 Macmillan Publishers Ltd. 1741-3591 International Journal of Disclosure and Governance Vol. 00, 0, 1–23
Trade-based money laundering

between countries. Liner shipping accounts for produced a guidance document in 2006 and
about 60 per cent of the global trade in shipping defined TBML activity as ‘the process of dis-
according to the World Shipping Council guising the proceeds of crime and moving value
(2015), transporting an estimated value of US$4 through the use of trade transactions in an
trillion around the globe. The World Shipping attempt to legitimize their illicit origins’ (p. 5).
Council reports that in 2012 there were approxi- This definition has been criticized by some
mately 500 services providing almost daily routes academics (Soudijin, 2014) as being too vague
between countries with an estimated 9000 port by not specifying whether the focus is on goods
calls made. An overview of the main trade and/or services and whether it is international
shipping routes shows that Asia–North America trade only or if it includes domestic transfers.
is the biggest trading route with over 23 million Also by its limited definition of ‘illicit origins’ it
trade routes carried out in 2013, with Asia– does not cover terrorism funds moved in this
North Europe the second busiest at 13.5 million way or capital flight/tax evasion schemes using
routes (World Shipping Council, 2015). the same systems. In a report published by the
This level and scale of shipping transactions Australian Institute of Criminology the follow-
that are being undertaken on a daily basis ing definition is used for TBML: ‘the use of
provides an ideal cover for criminal organiza- trade to move value with the intent of obscur-
tions seeking to move illicit goods and cash ing the true origin of funds’ (Sullivan and
between countries. TBML is a relatively new Smith, 2011, p. 10). They also explicitly state
phenomenon for the formal financial services that alternative remittance systems and the
sector (Araujo, 2008), but has become increas- movement of cash are not covered in their
ingly more prominent as a means by which to definition.
defraud both tax and revenue departments, as In this article the focus is on the mechanisms
well as involving the banking sector in facilitat- behind the different schemes and methods used,
ing other types of illicit activity, including and from this information to start to consider or
laundering money (PWC, 2014a). This article establish an appropriate risk assessment frame-
seeks to describe some of the facts and myths of work that can be used across the different
what TBML is and explain the challenges it schemes. For the purposes of this article the
presents to the banking sector for risk assess- predicate crimes or purposes for undertaking
ment and audit procedures. TBML activity could be tax evasion, money
laundering, capital flight and/or terrorist
funding.
Trade-based money laundering
(TBML)
TBML has been difficult to define across both TBML SCHEMES
the industrial banking and the academic sectors, Banks are often involved in shipping and trade
partly because of its complexity and partly transactions because some form of pre-shipping
because of the variety of ways in which TBML finance is needed by the client to enable them
can occur. It is not just money launderers who to purchase the goods and ship them (APG,
use trading and shipping methods to hide goods 2012). The buyer will not usually want to pay
or fund transfers. Many white collar criminals upfront for all the goods until they can be
involved in tax evasion or corrupt politicians inspected at the destination port, and thus banks
and corporate businesses involved in capital provide the bridge between the sellers and the
flight schemes also utilize many of the TBML buyers in the transaction. As part of the banking
schemes for their own purposes. The first real process an assessment is undertaken as to the
attempt at a definition was by the Financial viability of the business transactions and the risk
Action Task Force (FATF, 2006), when they to the bank in agreeing to fund it. The bank

© 2016 Macmillan Publishers Ltd. 1741-3591 International Journal of Disclosure and Governance Vol. 00, 0, 1–23 3
Naheem

will request a number of documents to be common form of falsification occurs on the


submitted by the seller before the trade finance invoices (AUSTRAC, 2013) where the value
is approved. These may include some or all of and description of the goods are often changed
the following: depending on how money is to be moved –
from the destination country or from the
Commercial invoices – gives information on
country of origin.
the weight and description of goods
Transport document – often known as a
Bill of Lading, which provides details of Example of invoice falsification
the agreed goods for carriage and details of There are two main ways in which invoices are
the shipping arrangements. changed and which are known as ‘over-invoi-
Insurance document – for the goods while cing’ or ‘under-invoicing’ (FATF, 2006). The
in transit principles are similar, but one is a mirror version
Certificate of origin – which states where of the other depending on which way money
the goods were produced needs to move. The example shown in Figure 1
Certificate of inspection – provides an illustrates under-invoicing.
additional opinion on whether the goods In this example company E under-declares
are as stated the number of widgets being shipped to com-
A packing list – often used when the pany F by actually sending out 1.5 million
consignment is divided into smaller widgets rather than the stated invoice amount
packages of $1 million. Each widget is sold at $2 each,
A weight certificate – used by buyers when and thus this transaction produces an extra $1
goods are sold by weight; also used by million in revenue, which is deposited in a local
freight companies to determine the cost of bank of company F for future use by company
transport. E. In affect, company E has moved $1 million
to the country of company F without it being
detected. This kind of transaction obviously
Falsification of trade documents requires complicity on the side of both the
Most business clients know that this informa- seller and the buyer. Similarly, company F will
tion will be required by the bank, and the first also need to falsify their invoices at some point
part of most TBML activity will involve crim- to match the amount of widgets actually sold.
inals developing schemes (Gottschalk, 2013) This kind of transaction is not without its
that will enable them to falsify one or more of risks to the criminals. For example, the weight
these documents. The easiest and most of an extra 500 000 widgets could be spotted by

Figure 1: Example of invoice falsification reproduced from FATF (2006, p. 6) Copyright ©


FATF/OECD. All rights reserved.

4 © 2016 Macmillan Publishers Ltd. 1741-3591 International Journal of Disclosure and Governance Vol. 00, 0, 1–23
Trade-based money laundering

customs. Similarly, revenue could do an audit other ships, thus hiding the true destination
to discover inventory discrepancies between country of products. All of these incentives
widgets produced and amount shipped or sold. provide an additional opportunity for criminals
However, from the banking perspective, with- to hide the source of the money and the
out supporting evidence from either customs or original source of the goods being transported
revenue it becomes very difficult to ascertain (Sullivan and Smith, 2011). In total there are an
whether the documents being produced and estimated 3000 FTZs, and FATF has high-
given to the bank accurately reflect the ship- lighted their concerns that many FTZs are also
ment details. The example shown in Figure 1 located in major financial hubs, thus providing
can also be repeated in reverse with the expor- criminals with easier access to the main financial
ter Company E claiming to ship 1 million sector (FATF, 2010).
widgets but instead sending only 500 000. Pay- In particular, one of the highlights of the
ment is still received for $2 million from FATF (2010) report was that the inspection of
Company F of which $1 million is sent to the goods by the zone authorities is carried out only
supplier and the remaining $1 million goes into for some percentage of the cargo. This would
a bank account for Company F to access at a facilitate cases of over- and under-invoicing as
later stage. In this arrangement Company F has there would be little chance of any verification
transferred $1 million undetected into the checks being carried out. However, the chal-
country of Company E. lenge to the banking sector is that they have
Schemes such as under- and over-invoicing little chance of having the information verified
have begun to be noticed and have been either; thus, the use of FTZs is in itself a red flag
described in typology reports such as indicator and needs to be considered in light of
AUSTRAC (2013) as well as being identified other information known about the client and
in the FATF guidelines and red flag indicators their business history.
(FATF, 2006). One of the ways that criminals In addition to FTZs there are a number of
can circumvent the trade documentation similar schemes across the globe that operate
process is through the use of free trade zones, according to the same principal model of an
which enable shipments to be unloaded FTZ but without always focussing specifically
and reloaded with minimal checks and with- on developing export growth. Examples of
out having to resubmit documentation these include the following:
through customs. This provides an opportunity
 Export Processing Zones (EPZ)
to move goods and change shipments without
 Hybrid EPZ model
being detected, or to change the destination
 Enterprise Zones
port without the banking finance unit being
 Free Ports
aware.
 Single factory EPZ
 Special Economic Zones
 Foreign Trade Zones
Free trade zones (FTZs)
 Bonded Warehouses
Free trade zones (FTZs) are designated areas
within jurisdictions where incentives are offered All of these free trade schemes highlight the
to support development through increased importance, to the trade finance and AML
exports and foreign direct investment (FATF, units, of understanding the client’s proposed
2010). The way this is achieved is through shipping routes and consider why certain areas
offering benefits such as exemptions from tax have been used and what type of zones will be
and duties, simplified administration, and less available to facilitate criminal activity. Free zone
stringent checks on goods. FTZs also enable areas pose a significant number of challenges to
goods to be easily unloaded and reloaded onto banks especially when trying to determine

© 2016 Macmillan Publishers Ltd. 1741-3591 International Journal of Disclosure and Governance Vol. 00, 0, 1–23 5
Naheem

accurate shipping information including bene- FTZs were introduced in order to develop and
ficial ownership and documentation on the strengthen trading within and across certain
legal entities involved in some of the transac- geographic regions. The FTZs offer a number
tions. In particular, FATF (2010) noted that of advantages to those in the shipping business,
many zone authorities are not as stringent in such as easier access to transhipment, re-packa-
establishing new legal entities as they would be ging, warehouse storage and re-labelling of
if operating outside the zone area; as a result goods. Goods entering FTZs are not usually
they determined several weaknesses in the subject to the usual customs checks and con-
system from an AML perspective because of trols. However, for criminals seeking to launder
the following reasons: funds these same facilities also provide an ideal
 The zone authorities often require little or no haven in which to store illicit goods or change
ownership information of the companies shipment routes without informing banking
setting up in the zone services.
 The physical presence of a company in the Goods introduced in a FTZ can undergo
zone is not always a requirement for estab- various economic operations, such as
lishment in the area transhipment, assembly, manufacturing,
 The regulations covering the control of processing, warehousing, re-packaging
FTZs are not always explicitly stated; thus, it and re-labelling as well as storage for
may not be clear whether the government or timely marketing, delivery and tranship-
the customs authorities have the jurisdiction ment. The tracking of shipments, espe-
 Controls are often carried out by random cially for repackaging, is a key element in
selection more than on risk assessment or the control of FTZs. The same shipment
indicators may use FTZs as a base around the globe
 There are no clear procedures, authority, or for no other purpose than to launder
documentation identified upon which to funds.(FATF, 2010, P16)
organize and execute the examinations
 Licensing procedures and supervision of
activities in FTZs are often complicated and
Privatization of FTZs
bureaucratic, which can lead to insufficient
One of the biggest shifts in FTZ development
oversight
has been the movement towards private opera-
These new legal entities that have been formed tors as opposed to government or state-mana-
through the FTZs now have access to the ged zones. The rapid change in the
financial system in the same jurisdiction, or in development of FTZs (2010) also means that
other jurisdictions, and will be considered by some of the AML/CTFs may not be up to date,
most banks as legal businesses. This poses a risk which is another issue that was raised as a
to all banks as many of these new legal entities concern by FATF and which they state needs
will be seeking to access financial services in to be addressed. Table 1 shows the shift towards
other countries in order to move funds across private zone development and the areas of the
the globe. globe most affected.
FTZs provide a number of opportunities by
even if banks outside of the FTZs are which criminal organizations can exploit the lax
involved in the trade transactions, they AML controls in order to facilitate trade fraud in
are less able to manage ML/TF risks some form. One of the difficulties is that through
because of the others vulnerabilities of the the establishment of legal entities and businesses,
zones (opaqueness and relaxed oversight). which can then trade with each other within a
(FATF, 2010, p. 15) FTZ, additional layers of complexity are

6 © 2016 Macmillan Publishers Ltd. 1741-3591 International Journal of Disclosure and Governance Vol. 00, 0, 1–23
Trade-based money laundering

Table 1: Showing the shift from public to private controlled trading zones reproduced from FATF (2010,
p. 13)
Private and public sector zones in developing and transition economies
Region Public zones Private zones Total

Americas 146 394 540


Asia and Pacific 435 556 991
Sub-Saharan Africa 49 65 114
MENA 173 40 213
Central/Eastern Europe and Central Asia 69 374 443
Total 872 1429 2301

Source: Akinci and Crittle (2008).

introduced into money-laundering or tax ANALYSING TRADE DATA FOR


evasion schemes. In particular many of these LINKS TO MONEY-LAUNDERING
entities cannot be checked or have the beneficial
PURPOSES
ownership information verified.
The following case study in Figure 2 high- Analysing the data produced in relation to trade
lights some of the complexities that may be transactions is not an easy operation. There is an
present in money-laundering schemes that inordinate amount of data relating to each
operate through an FTZ, using multiple import shipment entering and leaving the trade zone,
and export traders. The traditional model of and yet according to the research conducted by
money laundering that involves layering the FATF (2010) many FTZs have only computer-
money (Neilsen and Furneaux, 2013) through ized certain aspects of their work, and even
different financial transactions is achieved here more importantly this information is not linked
through the trading commissions. All of these to the custom’s database. This provides a num-
traders could have been established within the ber of challenges for the investigation or mon-
FTZ, meaning that beneficial ownership infor- itoring of potential TBML shipments, both
mation may be harder to detect. within the zones and also by third-party orga-
There are a number of implications to the nizations such as the banking sector. All of these
banking sector from this case study, but one of authorities and personnel responsible for this
the main ones is that money that may be work need to have access to a systematic
released through the trade finance unit for method for analysing the data. Otherwise
legitimate business shipping purposes might investigations become ‘manual, tedious, time-
halfway through the shipment be used for consuming, and resource-intensive’, which
criminal purposes such as smuggling, piracy of often results in ‘their high false positive rate
goods or tax evasion. The more information (FPR) and inefficiency with voluminous data
that the banking units can have on clients the sets’ (Gao and Ye, 2007, p. 171).
better understanding they will have of what The difficulties associated with producing
businesses they are supporting and the risks they volumes of unsorted data have already been
are exposing their bank to. However, informa- noted as one of the side effects of increased
tion gathering is only part of the solution; the reporting regulation (Takáts, 2007). The pressure
other part is understanding how to analyse the on banks to file a suspicious report rather than be
information within a specific TBML risk assess- caught not having done so has resulted in a large
ment framework. increase in data, which as Takáts (2007) noted

© 2016 Macmillan Publishers Ltd. 1741-3591 International Journal of Disclosure and Governance Vol. 00, 0, 1–23 7
Naheem

Figure 2: Example provided by FATF (2010, p. 25) of Carousel Fraud using various companies
registered in free trade zones Copyright © FATF/OECD. All rights reserved.

tends to result in less efficiency and less useful needs to be handed over to the financial intelli-
material being produced. A balance is needed gence unit. Inevitably, in order to process the
whereby the banking sector can analyse the large quantities of data, some form of automated
initial data before discerning which information search system is required.

8 © 2016 Macmillan Publishers Ltd. 1741-3591 International Journal of Disclosure and Governance Vol. 00, 0, 1–23
Trade-based money laundering

Software development COMTRADE and the UN Conference on


One of the challenges in deciding on a software Trade and Development database. The system
package is that the ideal type of data sorting is free to be accessed and provides information
package has not been developed yet and/or on trade data from across the globe. Data can be
separate systems are used that are not linked searched according to countries, products and
together, even within the same FTZ area indicators and can be viewed in a number of
(FATF, 2010). ways.
Other software that has been developed to
Most FTZs software systems, if they exist,
provide information on trade tariffs across the
are not integrated to the Customs IT
globe is MACMAP, which has the aim of
systems, which include all ports. A paper
supporting the development of emerging
based system or a hybrid of paper and IT as
economies. The WITS and MACMAP along
it is in most cases requires longer to
with the Temporary Trade Barriers Database,
monitor and check against related docu-
which has a focus on anti-dumping policies and
ments (in-bound versus outbound). It is
global safeguards, and the SPRD trade services
also difficult to analyze data for trends
database of the World Bank, have all been
related to specific ports, zones, regions or
amalgamated and are being made available to
businesses.(FATF, 2010, p. 17)
the public through a project known as Trans-
In many areas trade data software is still being parency in Trade in 2011 (Bridges, 2011). The
developed and is in the early stages, although greater the level of international trade transpar-
systems have been developed in the United ency the easier it is for banking and financial
States using the US Merchandise Trade Data services to assess the risks that trading with these
Set (Zdanowicz, 2009). Despite the ongoing countries will pose to the bank. Turnes and
development process, there have been some Ernst (2015) suggest that the transparency of
inroads into developing appropriate trade data countries is linked to their bribery indices as
software and some authors have noted that there transparency and corruption are also linked.
are a number of factors that need to be included Using data from the World Bank they depict
in any AML software programme (Gao and Ye, visually how regions of the world map in terms
2007). These include the following areas of of bribery and transparency in international
‘techniques, customer, account, product, geo- trade (Turnes & Ernst, 2015).
graphy, and time’ (Gao and Ye, 2007, p. 172),
which can all be included in a basic data mining
set. However, Gao & Ye also note that, without
Inter-agency cooperation
adequate training, users of this type of software
Because of the size and nature of many of these
will have a tendency to focus only on what they
large-scale money-laundering operations detec-
are looking for, rather than analysing what the
tion often involves cooperation across a number
data are actually presenting.
of agencies, with law enforcement as the central
hub working between customs, revenue, banks
and financial intelligence units. This can cause
WITS project (world integrated trade
difficulties for banks who are involved in one
solution)
component of the transaction and may not have
Integrated trade data programmes are slowly
the remaining information to be sure that a
being developed and different systems amalga-
transaction they are witnessing is actually
mated. One such programme that has been
suspicious.
developed is through the World Bank (2015)
and their WITS project. This database com- There is a clear need to improve the co-
bines several trade databases including the UN operation between competent authorities

© 2016 Macmillan Publishers Ltd. 1741-3591 International Journal of Disclosure and Governance Vol. 00, 0, 1–23 9
Naheem

at the national and international level as country, customs district, product, and transac-
well as with the private sector as it relates tion price risk characteristics. As this informa-
to FTZs. The exchange of information is a tion is often collected by different agencies at
key element to better identify the illicit different points in the trading process, there was
activities (e.g. fraud schemes) using FTZs. a strong need to share data across agencies and
(FATF, 2010, p. 28) increase inter-agency cooperation (FCA, 2013).
This now offers one example of an inter-agency
In the United States, a model of local trade
model to illustrate how cooperation and sharing
transparency units (TTUs) has been devel-
of trade data can benefit those working to
oped (Hoffman, 2012), which was initiated
combat TBML transactions (Zdanowicz, 2009).
by the office of immigration and customs
However, the TTU works with other trade
enforcement (ICE). Here the use of trade data
fraud crimes as well as with TBML, which
analysis has been developed, and information
raises the question whether TBML should be
is shared as one way in which law enforce-
viewed as a separate crime or as just a money-
ment and customs officials can thwart price
laundering technique by which to commit an
alterations and changes to weights of ship-
array of financial crimes. Whatever the name
ments (FCA, 2013). The first TTU was
it is clear that a centralized data system is
established in Washington in 2004, and since
needed, rather than a series of separated units,
then units have been introduced in Argentina,
in order to facilitate data sharing and develop
Brazil, Colombia, Paraguay, Mexico and
expertize in this area. As stated by Hoffman
Panama.
(2012) ‘these activities may be so related and
One of the most effective ways to identify interconnected that it only makes sense
instances and patterns of trade-based for one entity to target all of them together.’
money laundering is through the (p. 337).
exchange and subsequent analysis of trade
data for anomalies that would only be
apparent by examining both sides of a
trade transaction.(ICE, 2015)
Pricing data
The banking sector is faced with a number of
ICE is hoping that the model of TTUs will challenges when trying to examine trade
spread globally and are working with FATF to finance applications and assess the viability of
promote this particular model (ICE, 2015). The shipping proposals (FATF, 2010). Factors such
work focusses on the four key areas of data as the large number of trading transactions and
interest that Zdanowicz identified, which are the large volume and diversity of goods being

Table 2: US exports at low average prices (Zdanowic, 2009, p. 860)


Product country Country Average price World average price

Cooking stoves Colombia $76.62/each $425.65/unit


Erythromycin Iran $0.10/gram $1.20/gram
Nickel Alloy wire Venezuela $2.21/kg $12.26/kg
Herring-Bone tire France $7.69/each $192.25/unit
Machine guns France $364.08/each $2022.67/unit
Enriched 235
Uranium Spain $15.50/kg $172.22/kg
Military Rifles United Kingdom $106.87/each $387.55/un

10 © 2016 Macmillan Publishers Ltd. 1741-3591 International Journal of Disclosure and Governance Vol. 00, 0, 1–23
Trade-based money laundering

shipped at any one time imply that trying to under-invoicing for movement into the coun-
determine the feasibility of a business proposal try. Many examples of trade discrepancies can
being presented by a client can be daunting. be accounted for through natural currency
Unfortunately the difficulties in capturing these differences or price fluctuations. However,
data have caused a gap to emerge with a lack of some examples of large discrepancies such as
trade data in some areas causing particular those that Zdanowicz (2009) discovered for US
difficulties when trying to assess interna- exports, which appeared at below average
tional trading patterns and money-laundering prices using this system, are shown in Table 2.
possibilities. These trade discrepancies are notably
higher or lower than the normal trade prices,
The lack of trade data which can be
and thus data mining software should be able to
effectively mined by law enforcement
detect such obvious anomalies. de Boyrie et al
creates a black hole for investigations and
(2007) suggested using a price matrix system
shipments entering and exiting FTZs
whereby:
worldwide. It is significant impediment to
effectively combating TBML in FTZs. The price of any trade item, the standard
(FATF, 2010, p. 20) deviation, upper- and lower-quartile
prices are determined and compared to
One tool that is slowly being developed is
that of the world (or a combination of all
the use of trade data comparing usual price
countries that trade with the USA). Those
ranges for specific goods in the United States
items that are mispriced can be then sub-
using the trade database developed by
ject to further scrutiny.(de Boyrie et al,
Zadanowicz (2009) and linking this to work
2007, p. 487)
developed by several of the key agencies
involved in trade investigations. In his analysis However, for traders who are only modifying
of trade data in the United States Zdanowicz prices by a small amount, these anomalies will
(2009) states that there are four statistical pro- not be easily detected. Therefore, trade-based
files that can be used when detecting TBML money laundering through over- and under-
activity. These are: invoicing will continue to provide an ideal
method to move smaller amounts of money
(1) country risk profiles;
across international jurisdictions.
(2) customs district risk profiles;
(3) product risk profiles;
(4) transaction price risk profiles.
Zdanowicz (2009) analysed bilateral trade Guidelines on using trade data for
results between the United States and other TBML detection
countries to compare trading price anomalies. In their updated report on TBML (2008), FATF
Bilateral trade results are often used in order to considered a number of ways by which the use
check that import and export figures match of computerized trade data could be used in
between the two countries. Other research order to assist in TBML detection. Although
using bilateral trade statistics includes work many of the examples listed below assume the
undertaken by Yalta and Demir (2010) on presence of software available to perform these
Turkey, which shows that TBML schemes are tasks, the reality for many banks is that these
country specific, depending on which direction programs have yet to be developed. The other
the value is moving. Patterns of trade data problem is that most of these data would need to
discrepancies for some countries are, therefore, be analysed by other agencies outside of the
reported either by using over-invoicing for the banking sector with experience in customs and
movement of funds out of a country or by using shipping. FATF identified eight major areas in

© 2016 Macmillan Publishers Ltd. 1741-3591 International Journal of Disclosure and Governance Vol. 00, 0, 1–23 11
Naheem

which AML data mining software could be used there is better organization and management of
to facilitate TBML/AML detection. shipping data at an international level.
1. Comparing domestic and foreign import/ 1. Comparing domestic and foreign import/export
export data data – this would include detecting discre-
2. Analysing financial information pancies in the Harmonized Tariff Schedule,
3. Examining cargo movements country of origin, manufacturer, importer/
4. Examining domestic import data exporter, ultimate consignee, broker, unit
5. Comparing information price, commodity activity by time period,
6. Using statistical analytical methods and port of import/export.
7. Comparing export information 2. Comparing information such as the origin,
8. Paying particular attention to trade transac- description and value of the goods, parti-
tions that display known red flag indicators culars of the consignee and consignor,
of TBML/FT activity and the route of shipment with intelli-
gence information in existing databases to
The different forms of information that FATF
detect any irregularities, targets or risk
suggested being utilized actually cover an
indicators.
extensive array of databases and shipping data.
3. Paying particular attention to trade transactions
Therefore, in order to apply the recommenda-
that display known red flag indicators of TBML/
tions of FATF (2008) more effectively this
FT activity.
report suggests dividing the data into two
 Cross-comparing known typologies of
groups, with group one being external data
risk, such as those identified in the FATF
and group two being internal data, where
Typologies Report on Trade-based
internal data relate to information that the
Money Laundering with trade data, infor-
banking sector can easily access themselves and
mation on cross-border monetary transfers
utilize in-house and external data are that which
associated with the payment of goods,
would be collected and analysed within exter-
intelligence, tax and wealth information,
nal agencies, including law enforcement and
the kind of goods exported, and connec-
customs. The reason for this divide is that
tions with organized crime or any other
current research (Naheem, 2015) and other
illicit activity, and making the completed
work on data mining and AML compliance
analysis available to the investigative
(Gao and Ye, 2007) have found that many of
authorities.
the banking AML structures are not yet able to
handle large amounts of AML-related data, nor This type of information needs to be analysed
is the expertize available to interpret the find- within the context of a risk assessment frame-
ings and apply them to a standard AML frame- work that considers the overall business of the
work. This report suggests that progress towards client and the knowledge of previous business
fully implementing the FATF guidelines needs ventures that the client has undertaken. The
to be stepped up and in conjunction with other information required within a risk framework
agencies working in this area. includes understanding patterns of behaviour
linked to money laundering, including red flags
such as trading in countries known to be high
Internal banking data risk, as well as trading in goods known to be
The following types of data are available at associated with money-laundering cases already
present for the banking sector and could be detected, and using systems such as FTZs and
included in current risk assessment processes, unnecessary third parties. As with any business
although some types of data may be largely proposal the bank is trying to determine the
incomplete. This will remain the case until commercial viability of the business. A recent

12 © 2016 Macmillan Publishers Ltd. 1741-3591 International Journal of Disclosure and Governance Vol. 00, 0, 1–23
Trade-based money laundering

case against Credit Agricole (Croft and The final point that FATF emphasized was the
Chassany, 2015) highlighted the failure of a need for taking appropriate follow-up action
bank to file a suspicious transaction report. The when anomalies and discrepancies in trade and
underlying basis of the case was the lack of financial transactions were identified. This fol-
commercial viability of the transaction, and the low-up could also include seeking further
ruling by the judge stated that the bank should clarity or additional information before and
have been in a position to assess the risk then deciding whether to file a suspicious
associated with this client based on this one activity report (SAR).
aspect.

Risk assessment in banking


The risk assessment processes used to detect
External data
money laundering within the banking struc-
Many of the areas that FATF (2010) identified
tures have changed considerably during the
contain data that banking institutions would need
time period since they were first introduced.
to source from an external agency first. This level
In 1970 when the Bank Secrecy Act was first
of data would be more likely used by FIUs or tax
introduced in the United States, the focus was
fraud experts/law enforcement agencies. One of
on preventing bulk cash-smuggling schemes.
the key factors of successful trade data analysis is
This included particular focus on those clients
the volume of transactions being used, with a
who were making large cash deposits, which
greater volume of data to compare against provid-
were often made on behalf of drug cartels
ing a more realistic outcome.
seeking to launder drug money into the formal
1. Examining cargo movements through the com- financial services. Drug money still makes up a
parison of import/export documentation large proportion of all laundered monies across
between two counties to verify that the data the globe (UNODC, 2011). However, other
reported to one country’s authorities match illicit activities such as piracy, illegal arms smug-
the data reported to the other country’s gling and human trafficking are also significant
authorities. contributing factors in transnational organized
2. Examining domestic import data with an auto- crime. This also matches the main crimes that
mated technique, such as Unit Price Analy- use FTZs. According to the FATF (2010)
sis, to compare the average unit price for a report the top five predicate crime activities
particular commodity and identify traders that use FTZs for criminal purposes are:
who are importing commodities at a sub-
i Smuggling (especially cigarettes and
stantially higher or lower price than the
alcohol)
world market.
ii Illicit trafficking in narcotics
3. Using statistical analysis methods, such as linear
iii Participation in organized criminal group
regression models, on trade data concerning
and racketeering
individual, non-aggregated imports and
iv Fraud
exports.
v Counterfeiting and piracy of goods
4. Comparing export information with tax declara-
tions to detect discrepancies. Trade-based money laundering does not always
5. Analysing financial information collected by the require a predicate offence as it can be used as a
FIU to identify patterns of activity involving method to move legitimate money illegally or
the importation/exportation of currency, to avoid paying tax on legally acquired money,
deposits of currency in financial institutions, as well as laundering illicit gains from corrup-
reports of suspicious financial activities and tion and other crimes. Risk-based approaches
the identity of parties to these transactions for TBML need to consider a variety of factors,

© 2016 Macmillan Publishers Ltd. 1741-3591 International Journal of Disclosure and Governance Vol. 00, 0, 1–23 13
Naheem

including the possibility that the source of the jurisdictions, and some of these jurisdictions
funds or the purpose for the funds is illegal may be particularly prone to money-laundering
activity. schemes. However, gathering this information
still poses a challenge.

Risk matrices
Money-laundering risk assessment has often A four-pronged approach to TBML
used a risk matrix model, which focusses on risk assessment
client behaviour and transaction activity. The In order for risk assessment to be effective it
risk is calculated through a rules-based approach needs to be evidence based. To achieve this the
with tick boxes used to determine the questions process requires building a profile of the client
asked and the checks made. The higher the and the business that is engaging with the
client appears in the risk matrix the greater the banking services. Current research suggests
level of risk. However, in previous research on (Ai et al, 2010; Ai, 2012; Naheem, 2015) that
TBML (Naheem, 2015) it was suggested that a this can only be achieved through a greater
broader risk matrix model that could be adapted understanding of the client and the business.
was needed. This model needed to be more One of the ways that this can be achieved is
flexible than a rules-based approach and also through mapping the client business risks
needed to be informed by AML research on the including their other business associations,
client and the business. The move to risk-based commodities being exported or imported and
approaches is not new. Other authors have also the countries being used as destination and
stressed the importance of a more responsive transit points on the trading route. The four-
approach (Ai et al, 2010). The FATF (2012) pronged approach suggested by Naheem (2015)
report has also suggested that a more dynamic would categorize the information being col-
and risk-based approach needs to be adopted lected under the following four headings:
within the banking sector so that it can be Client – Information pertaining to the client
flexible enough to respond to new and emer- would include observations on their interaction
ging examples of money laundering. with the bank, such as their willingness to
In work on risk-based approaches Ai (2012) provide information about the business, as well
identified three areas to enhance traditional as their understanding of why the trading
Know Your Customer assessment. One of these transactions and routes have been planned that
was understanding customer transactions; the way. Sometimes legitimate clients and busi-
other two were knowing the customers of your nesses can be used by money launderers as a
customer and knowing the business partners of front company for their activities, and the client
the customer. This concept of an enhanced may be either a knowing or unknowing
level of understanding of the customer and their accomplice in the illicit activity.
business was also suggested in previous research Transactions – Client accounts can also be
by the author (Naheem, 2015). In the model hijacked by money launderers especially if
suggested by Naheem the two main areas of information such as amounts of invoices are
client behaviour and transaction patterns are known and countries of payment. Schemes
used. However, in addition there are two other such as cuckoo smurfing whereby accounts are
areas of concern that a risk approach needs to used without the client’s knowledge can enable
monitor. These additional two areas are the money launderers to move money from one
geographic profile of the business and the country to another if it matches the client’s own
involvement or links to third-party organiza- business transactions (AUSTRAC, 2013). Indi-
tions. These are particularly relevant in TBML cators of this kind of transaction often show as
cases as money is being moved to other money coming into the client’s account from a

14 © 2016 Macmillan Publishers Ltd. 1741-3591 International Journal of Disclosure and Governance Vol. 00, 0, 1–23
Trade-based money laundering

different source to the invoiced company, or in clarifying the beneficial ownership information
a combination of different smaller amounts to of business clients and companies involved with
make up the invoiced total. the bank’s client. Beneficial ownership is
Many of the red flag indicators that have defined in banking as ownership and control
been issued for TBML by FATF (2006) are over a specific account ‘equating to ultimate
focussed on shipping documentation alerts. control over funds in such account, whether
These include falsified documents and a lack of through ownership or other means’ (The
commercial viability for the business transac- Wolfsberg Group, 2012, p. 1)
tions. However, actual financial transaction In other words, the name of the account
patterns are not as well emphasized, and these holder may not equate with whoever is actually
would include matching fund transfer amounts placing and withdrawing funds through that
to invoices, ensuring that the company invoiced account. Criminals sometimes use existing cli-
is the same company that pays for the goods, ents to open accounts on their behalf because
and watching for structuring of funds occurring the existing client will already pass the CDD
through the client’s account. Other red flags checks. However, at present, within banking,
would also include large fund transfers that are much of the customer due diligence verifi-
unaccounted for, or money transferred to cation is on the actual account holder rather
family members or to off-shore companies/ than the beneficial owner of the account
accounts. (Davilas, 2014). These four areas are not new
Geographic Profile – Geographic profiling is in terms of risk assessment systems; however,
perhaps new within AML compliance, but the indicators under each of the headings are
according to the Wolfsberg principles for cor- constantly being updated as new typologies and
respondent accounts (2014) there are a number cases emerge.
of additional risks that some countries pose to
money-laundering risk assessment.
Certain jurisdictions are internationally
AML compliance across the bank
It is not entirely clear whether TBML should be
recognised as having inadequate anti-
viewed as separate to other money-laundering
money laundering standards, insufficient
schemes. The only real distinction is that ship-
regulatory supervision, presenting greater
ping routes are used in order to move illicit
risk for crime, corruption, terrorist finan-
gains rather than relying purely on the financial
cing or pose elevated risk of evading
systems or cash-based transactions. The other
sanctions.(Wolfsberg Group, 2014, p. 3)
option would be to consider whether TBML is
Clients that are dealing with countries at a just a technique for facilitating trade-related
higher risk are exposed to more involvement fraud or crime. The main priority and focus of
in certain criminal activities. The geographic this article, however, is to determine what the
risk assessment still applies even if the bank that implications are for detecting TBML within the
the client is doing business with in the high-risk banking system.
country is connected to the main client’s bank. The main additional difference between
Third-Party involvement – There is risk in assessing for money-laundering activity and
money laundering from third-party client and TBML is the broader nature of TBML activities
business associates who may be using the client and the need to include trade finance units as
as a front business to hide their own illicit well as the AML compliance section within a
operations. Or the client may be doing business banking risk assessment process. There is also a
with a number of companies all of which are requirement that the AML compliance staff
actually owned by the same client. One of the become knowledgeable of business and ship-
ways in which this information is gathered is by ping trade processes, which will be needed by

© 2016 Macmillan Publishers Ltd. 1741-3591 International Journal of Disclosure and Governance Vol. 00, 0, 1–23 15
Naheem

those seeking to deter or detect the activity. Internal audit


Within the banking sector the units that are The role of internal audit is separate from AML
most likely to encounter issues of money- compliance, but it provides an opportunity for
laundering activity in this way are the trade the bank to review the effectiveness of its AML
finance unit, business, front office, AML com- systems and to assess whether appropriate levels
pliance, and internal audit. In order to under- of resources have been allocated for the work
stand the role of each of these units in relation being undertaken. One of the weaknesses iden-
to detecting TBML activity the next section tified in the HSBC case in the United States in
considers each of their roles in more detail. 2012 (Homeland Security, 2012) was failure of
the governance structure to take responsibility
to address weaknesses in their AML systems.
This included a lack of guidance from internal
Front office staff
audit, which is an issue that has also been raised
The role of the front office is often, rather
in a report published in 2014 by PWC (2014b).
mistakenly, overlooked in AML compliance
The Financial Conduct Authority (FCA, 2013)
processes. However, it is the front office staff
has also raised concerns about the lack of
and anyone interacting directly with the client
awareness of TBML among internal audit staff
who will be in a prime position to assess
and identified this as a weakness in the AML
suspicious behaviour linked to potential ML
systems across the financial services sector in the
activity (Mugarura, 2014). This includes the
United Kingdom.
client’s responses to questions, reluctance to
provide information, evasive behaviour and We found that some staff in compliance,
any general suspicious behaviour. This is often internal audit and legal functions had a
considered the first line of defence in the bank limited understanding of trade-based
and feeds directly into the first area of the risk money laundering risks. This meant they
assessment model. were unable to oversee or challenge the
business effectively on decisions taken.
(FCA, 2013, p. 35)
Trade finance/business units Previous research by the author on TBML also
The trade finance and/or business units are analysed responses from the global banking and
often responsible for reviewing and analysing financial services sectors on TBML practice
the business plans and finance requests of the (Naheem, 2015) and discovered similar find-
clients, and offer the next line of defence ings, including that most other departments
against money laundering. One of the key within the bank did not see a role for internal
indicators that needs to be determined is the audit and had not considered that they should
commercial viability of any business proposal. be involved in developing AML systems.
A legal case in June 2015 taken against Credit
Agricole bank (Croft and Chassany, 2015) ruled
against the bank because it was felt that insuffi- AML compliance
cient investigation had been undertaken and AML compliance is the unit that was tradition-
there was no filing of a SAR by the bank, ally left with the responsibility of ensuring that
despite the discovery of a lack of commercial the regulatory demands placed on the bank
viability. The court ruled that the bank had to were met. However, cases such as HBUS in
assume a reasonable level of knowledge on the United States (Homeland Security, 2012)
AML and commercial viability assessment as have identified that the AML compliance unit
part of its professional responsibility to the needs to be supported with adequate resources
clients. and to have the proper support from

16 © 2016 Macmillan Publishers Ltd. 1741-3591 International Journal of Disclosure and Governance Vol. 00, 0, 1–23
Trade-based money laundering

governance. In the HBUS case nearly 15 000 can update and expand the remit of the AML
suspicious alerts remained unfiled because of audits
inadequate staffing and resource issues. The lack  There is a system in place for internal AML
of priority that management gave to this issue audits. These can check that the new indica-
finally resulted in a legal case being taken against tors have been incorporated and are being
the bank. The AML compliance unit therefore used across all units in the bank
needs to work closer with the management and
governance structures of the bank if their work In the absence of an appropriate AML frame-
is to be recognized and given appropriate level work banks will inevitably be faced with a
of support. number of difficulties. In the HSBC case in the
Anti-money-laundering compliance and United States (Homeland Security, 2012) insuf-
regulations rely on the banking sector to iden- ficient resources were allocated to the AML
tify and subsequently report any suspicious compliance section. This resulted in a backlog
activity that they feel warrants further investiga- of internal suspicious alerts that were never
tion, which is sent to the national financial assessed by the AML compliance section or
intelligence unit in the form of suspicious passed onto the financial intelligence unit.
transaction reports. Following the recommen- Eventually this resulted in an investigation by
dations of FATF (2012) many countries the financial regulator.
across the globe have implemented their own Other difficulties that have been noted with
specific financial intelligence units to process weak AML systems are a lack of communica-
these reports. However, one of the challenges tion with the audit committee, which was
for the banking sector and other financial noted in the FCA (2013) report. They noted
services is that within this system the very that if auditors within the banking system are
definition of the term ‘suspicious’ is constantly not up to date with different AML red flag alerts
evolving. and potential risks from money-laundering
Each new typology report such as the AUS- schemes, then they are not adequately placed
TRAC report or APG (2012) or the FATF to produce relevant audit reports or challenge
indicators identifies new red flags of suspicious the systems being implemented. This is a view
activity for a particular money-laundering that was also raised in a recent report by the
scheme. The banks have to incorporate these Auditing company PriceWaterhouseCoopers
new indicators into their existing AML frame- who stated that ‘Regulators are looking to
work so that they can be added as a suspicious internal audit as the third and final lines of
activity. In order for this to be effective this defense to detect irregularities within an orga-
approach makes a number of assumptions about nisation's BSA/AML and PFAC programs, and
the banking AML frameworks, most notably to provide assurance that the first two lines of
the following: defines are effective’ (PWC, 2014b, p. 5).
Finally some academics have highlighted the
 There are currently AML frameworks in theoretical concept of over-reporting in
place that are using red flag alerts and risk- response to increased regulation (Pellegrina and
based indicators Masciandaro, 2008), whereby ‘Given that the
 These frameworks are updated regularly and law asks the FIs to report suspicious transactions,
are flexible enough to incorporate new the incentive to implement excessive but useless
indicators reporting may arise, in order to avoid sanctions’
 Staff training occurs on a regular basis so that (p. 5). This theory supports the approach
new indicators can be explained favoured by FATF (2012), which is to focus on
 The AML framework includes the audit prevention and encourage the ethos of ‘integ-
committee and internal audit so that they rity’ rather than relying on law enforcement

© 2016 Macmillan Publishers Ltd. 1741-3591 International Journal of Disclosure and Governance Vol. 00, 0, 1–23 17
Naheem

and strict regulation. Stricter regulation may to be routinely updated; however, once the
work initially at forcing banks to report activity, initial training has been completed the second
but it does not encourage an in-depth investi- stage should become easier to implement and
gative risk assessment approach. The latter is less resource intensive.
ultimately more beneficial to both clients and
banks as clients can be penalized and have their
business transactions delayed if suspicious New and emerging risks
reports are filed against them. One of the challenges in crime prevention is
In summary, the failure to develop an appro- that a phenomenon of ‘crime displacement’
priate AML framework has been shown to occurs. This is a term used in criminology to
produce the following situations: describe the means by which criminals adapt
their methods in response to crime prevention
 More and more indicators of suspicious strategies (Gurette, 2009). In financial crime
activity are filed and held within AML terms and for money laundering in particular,
compliance but not communicated across criminal organizations will continue to exploit
the rest of the bank those areas within the financial system that
 Audits are not aware of changes in risk are the weakest. Although some authors chal-
assessment and do not inform governance lenge the inevitability of crime displacement
and management of potential risks or (Soudijin, 2014), criminologists have stated that
resource implications as long as the motivation to change behaviour is
 A concern for regulation compliance means worthwhile crime displacement will continue
that any suspicious activity is reported and to occur (Cornish and Clarke, 1987). Crimin-
sent to the FIU to deal with ologists term this the rational choice theory.
 FIUs become inundated with poorly under- For criminals seeking to launder money the
stood suspicious reports, which in turn ideal method is to use the weaker systems,
detracts from the efficiency of their own which are often located in the informal or
work shadow financial economy, including disguising
Some analysts have suggested that all suspicious transactions through trade and shipping routes.
repotting procedures should require a more in- These sectors are less easily regulated and harder
depth reporting structure to avoid simplistic for law enforcement agencies to infiltrate.
over-reporting. Therefore, using the criminology-based ratio-
nale choice theory, systems such as alternative
… each suspicious transaction reported remittance systems and trade disguise systems
should cover all related information about such as TBML will continue to grow and
the transaction, with an attached analysis become the major source of threat for enforce-
and explanation made by the reported ment agencies across the globe.
entity. A suspicious transaction should not As the United States and other countries
be reported simply because the transaction worldwide tighten financial regulation and
is inconsistent with the descriptions of reporting for the formal and even informal
AML regulations.(Ai, 2012, p. 206) financial sectors, the use of trade-based
money laundering and alternative remit-
Although the banking sector will no doubt be
tance systems will assuredly grow.(US
reluctant to enforce reporting at this level of
Dept of State, 2005)
detail, it is important that an AML framework
be established and that all staff are brought up to It is important within banking risk assessment
date with AML compliance and the many processes that displacement theories such as this
indicators of risk. Moving forward, this needs be understood. They enable all agencies

18 © 2016 Macmillan Publishers Ltd. 1741-3591 International Journal of Disclosure and Governance Vol. 00, 0, 1–23
Trade-based money laundering

working on the issue to develop a deeper services, some less regulated than others for
understanding of the implications and conse- AML compliance
quences of any AML actions that they take, so  Many clients take advantage of free trade
that subsequent changes by criminals in their zones in many trade transactions, and banks
money-laundering behaviour will also be fore- need to ensure that they retain a balance
seen and hopefully prevented. This should also between achieving greater flexibility and
reduce the scenario of moving the problem speed of shipping in these specific areas for
from one area of the bank to remain undetected their client versus the AML risks that they
in another. pose
 Finally the international dimension of ship-
ping and trade means that governments are
having to work together at a regional and
CONCLUSION global level in order to combat criminal
This article has provided an overview of
AML risks within their own country. Bank-
TBML as it affects the global banking context.
ing risk assessment frameworks also need to
There are already several academic and empiri-
remain up to date with these different inter-
cal documents on TBML, which have
national agreements
explained some of the typologies that banks
can expect to discover through TBML schemes. The use of technology will become more
However, the discussion also needs to move paramount in the future, especially as a way to
beyond this to consider the issue in more depth, analyse the amount of data that could be
and to analyse the implications for developing a generated in TBML investigations. However,
robust AML framework within the banking currently there are limited software options
sector. The model that seems to work most available, and most data systems within the ports
effectively to combat TBML, according to and customs are hybrid systems of IT and paper
the FATF (2010), is one that is based on work, which makes information and data shar-
prevention and establishing integrity rather than ing hard to achieve. Other limiting factors for
relying on law enforcement and prosecutions. banks can occur when trying to establish bene-
There are a number of reasons for this, but in ficial ownership information for off-shore legal
general the TBML schemes are too complex entities or trading businesses created through
and involve too many different agencies work- FTZs, where administrative and AML checks
ing together to rely solely on one sector. All are less stringent. Despite these challenges there
agencies working in this area need to be able to has been some progress made in certain regions,
communicate together and share data and such as the United States with their interagency
information. TTU. These TTUs may provide trade data sets
For banks in particular the multi-agency that can become the starting point for trade data
aspect of trade means that a number of addi- comparison programmes and software applica-
tional factors need to be considered in any risk tions in other parts of the globe.
assessment framework for TBML. Enhanced
TBML risk assessment frameworks would be
needed because there are differences between Risk assessment
TBML and other forms of money-laundering All of the points highlighted above illustrate
techniques. These differences include the that there is no quick fix solution to dealing
following: with trade-related money laundering across the
 There are a number of different jurisdictions global banking sector. Each money-laundering
involved in trade transactions and this also case can be very specific to a particular region or
includes a number of other potential financial country and can use very localized money-

© 2016 Macmillan Publishers Ltd. 1741-3591 International Journal of Disclosure and Governance Vol. 00, 0, 1–23 19
Naheem

laundering processes. There is a stronger onus knowledge base also involves understanding
on banks to develop their own localized AML how trade facilitates different forms of financial
research using a combination of typology crime, such as money laundering, tax evasion
reports and indicators of red flags from FATF and smuggling. Detecting TBML activity
and other sources. However, banks are trying to involves a number of agencies that are involved
develop a risk-based approach to TBML while in the tracking and monitoring of data. The
working with guidelines that have often only AML framework for the banking sector will
focussed on generic examples that may be too need to be a dynamic and evolving model that
general for the local banking process. Other can respond easily to new schemes, as they are
reports and academic papers are still needed to reported and uncovered across the globe. It is
continue expanding the knowledge base and not an easy task ahead, but the sooner it is
provide more localized examples for different implemented the more effective it will become
banks across the globe to use. in the future.
Risk-based approaches that can be flexible in
their response and at the same time focussed on
the key risk areas are still sought after within the ACKNOWLEDGEMENTS
banking sector. Previous research by authors The author acknowledges being the recipient
have suggested that strengthening customer due of a research grant awarded by Princess Ālae as
diligence and focussing on third parties and part of Seven Foundation’s ‘2020 Banking
geographic risks all need to inform any risk Vision – building banks of the future’ and he
assessment model for TBML. Criminal schemes thanks her for the continued support and
have developed in sophistication and have motivation both to himself and to other stu-
moved beyond establishing their own accounts dents who benefit through her generosity
where CDD checks can stop their activities. (www.sevenfoundation.ch). The author also
Many organizations now use front companies thanks Professor Muhammad Jum`ah (a leading
possibly established in FTZs or use established economist of this era based in Damascus) who
clients within a bank to provide a legitimate has continued to provide valuable input both
front to the money-laundering business. Client through his teaching of the science of econom-
accounts can also be hacked by criminals, ics and through his continued guidance.
meaning that banks also have an oversight role
on behalf of their client as well as implementing
AML compliance tasks on behalf of the regu-
lator. Perhaps the biggest challenge will be the REFERENCES
resources required to upskill staff in AML alerts Ai, L. (2012) ‘Rule-based but risk-oriented’
and new money-laundering schemes. This approach for combating money laundering in
training needs to be implemented across all chinese financial sectors. Journal of Money
units of the bank and for all levels of staff. Laundering Control 15(2): 198–209.
Finally the bank needs to ensure that a robust Ai, L., Broome, J. and Yan, H. (2010) Carrying out
AML framework is established across the bank, a risk-based approach to AML in china: Partial
or full implementation? Journal of Money Laun-
which has the appropriate level of support at
dering Control 13(4): 394–404.
governance and audit levels.
Akinci, G. and Crittle, J. (2008) Special Economic
This article aimed to create a realistic aware- Zones: Performance, Lessons Learned, and Implica-
ness of the complexity of TBML and develop tions for Zone Development. Washington DC:
an understanding that AML compliance in this FIAS, WorldBank Group.
area requires a far greater and more in-depth APG (2012) APG Typology Report on Trade Based
understanding of trade and money laundering Money Laundering. Sydney, Australia: Asia
and how it is abused for criminal activity. This Pacific Group on Money Laundering.

20 © 2016 Macmillan Publishers Ltd. 1741-3591 International Journal of Disclosure and Governance Vol. 00, 0, 1–23
Trade-based money laundering

Araujo, R.A. (2008) Assessing the efficiency of the terrorism & proliferation [The FATF Recom-
anti-money laundering regulation: An incen- mendations], http://www.fatf-gafi.org/media/
tive-based approach. Journal of Money Launder- fatf/documents/recommendations/pdfs/FATF
ing Control 11(1): 67–75. _Recommendations.pdf, accessed 28 July 2015.
AUSTRAC (2013) Typologies and case studies report. FCA (2013) Bank’s Control of Financial Crime Risks in
Australian Transaction and Analysis Centre, Trade Finance. London: Financial Conduct
http://www.austrac.gov.au/sites/default/files/ Authority.
documents/typ13_full.pdf, accessed 17 July Gao, Z. and Ye, M. (2007) A framework for data
2015. mining-based anti-money laundering research.
Bridges (2011) Transparency in trade initiative Journal of Money Laundering Control 10(2):
launched at global review Vol 15 No.27 170–17.
http://www.ictsd.org/bridges-news/bridges/ Gottschalk, P. (2013) White-Collar criminals in
news/transparency-in-trade-initiative- modern management.
launched-at-global-review, accessed 21 July Guerette, R. (2009) Analysing Crime Displacement
2015. and Diffusion, Tool guide no. 10, http://
Cornish, D.B. and Clarke, R.V. (1987) Under- www.popcenter.org/tools/displacement/
standing crime displacement: An application print/, accessed 20 July 2015.
of rational choice theory. Criminology 25(4): Hoffmann, L. (2012) A critical look at the current
933–947. international response to combat trade-based
Croft, J. and Chassany, A.-M. (2015) Crédit agricole money laundering: The risk-based customs
loses suspicious transaction case, http://www audit as a solution. Texas International Law
.ft.com/cms/s/0/ef67acea-e9b4-11e4-b863- Journal 48: 325; 329–330.
00144feab7de.html#axzz3Zd0pvgKH, Homeland Security (2012) HSBC exposed US
accessed 9 May 2015. financial system to money laundering, drug,
Davilas, C. (2014) AML compliance for foreign terrorist financing risks. From permanent sub
correspondent accounts: A primer on benefi- committee on investigations:. US Senate,
cial ownership requirements and other chal- http://www.hsgac.senate.gov/subcommittees/
lenges. Journal of Investment Compliance 15(1): investigations/media/hsbc-exposed-us-finacial-
4–16. system-to-money-laundering-drug-terrorist-
de Boyrie, M.E., Nelson, J.A. and Pak, S.J. (2007) financing-risks, accessed 8 May 2015.
Capital movement through trade misinvoi- ICE (2015) ICE leads trade-based money laundering
cing: The case of africa. Journal of Financial investigations, http://www.ice.gov/trade-
Crime 14(4): 474–489. transparency, accessed 20 July 2015.
FATF (2006) Trade based money laundering, Mugarura, N. (2014) Customer due diligence
France, http://www.fatf-gafi.org/media/fatf/ (CDD) mandate and the propensity of its
documents/reports/Trade%20Based% application as a global AML paradigm. Journal
20Money%20Laundering.pdf, accessed 28 July of Money Laundering Control 17(1): 76–95.
2015. Neilsen, G. and Furneaux, W. (2013) Financial
FATF (2008) Best practices paper on trade based crime: Compliance and failure, http://www
money laundering. Paris: FATF Report, .bankingtech.com/57881/financial-crime-
http://www.fatf-gafi.org/, accessed 11 May compliance-and-failure, accessed 6 May 2015.
2015. O’Brien, J. and Dixon, O. (2013) The common link
FATF (2010) Money laundering vulnerabilities of in failures and scandals at the world’s leading
free trade zones. France, Paris: FATF/OECD. banks. The Seattle University Law Review
http://www.fatf-gafi.org/media/fatf/docu- 36(Winter): 941–972.
ments/reports/ML%20vulnerabilities%20of% Pellegrina, L.D. and Masciandaro, D. (2008) “The
20Free%20Trade%20Zones.pdf, accessed 28 risk based approach in the new European anti-
July 2015. money laundering legislation: A law and eco-
FATF (2012) International standards on combatting nomics view”, Research Paper Series No.
money laundering and the financing of 2008–2022.

© 2016 Macmillan Publishers Ltd. 1741-3591 International Journal of Disclosure and Governance Vol. 00, 0, 1–23 21
Naheem

PWC (2014a) Goods gone bad. Addressing money- Yalta, A.Y. and Demir, I. (2010) The extent of trade
laundering risk in the trade finance system, mis-invoicing in turkey: Did post-1990 poli-
http://www.pwc.com/us/en/risk-assurance- cies matter, https://mpra.ub.uni-muenchen.
services/publications/assets/pwc-trade- de/30186/1/MPRA_paper_30186.pdf.
finance-aml.pdf. Zdanowicz, J. (2009) Trade based money launder-
PWC (2014b) Internal audit holding the line on ing and terrorist financing. Review of Law and
BSA/AML compliance. Retrieved from Economics 5(2): 855–878.
http://antimoneylaundering-fiba.com/files/
1499.pd, accessed 2 May 2015.
Soudijn, M. (2014) A critical approach to trade-
based money laundering. Journal of Money FURTHER READINGS
Laundering Control 17(2): 230–242. Naheem, M.A., (2015) Trade based money launder-
Sullivan, C. and Smith, E. (2011) Trade-Based Money ing: Exploring the implications for global
Laundering: Risks and Regulatory Responses. banks. PhD thesis scheduled for publication in
Canberra, Australia: Australian Institute of Winter 2015/Spring 2016.
Criminology. Naheem, M A., (2015) Trade based money launder-
Takáts, E. (2007) A theory of ‘crying wolf’: The ing: Towards a working definition for the
economics of money laundering enforcement. Ana banking sector, Journal of Money Laundering
Lucia Corofnel. IMF Working Paper. Control, 18(4): 513–524.
The Wolfsberg Group (2012) The wolfsberg AML Naheem, M A., (2015) Money laundering: A primer
principals frequently asked questions with for banking staff. International Journal of Disclo-
regards to beneficial ownership in the context sure and Governance, advance online publica-
of private banking, http://www.wolfsberg- tion, 3 September, doi:10.1057/jdg.2015.10,
principles.com/pdf/faq/Wolfsberg-FAQs-on- http://www.palgrave-journals.com/jdg/jour-
Beneficial-Ownership-May-2012.pdf. nal/vaop/ncurrent/full/jdg201510a.html.
The Wolfsberg Group (2014) Wolfsberg anti- Naheem, M.A., (2015) Money laundering using
money laundering principles for correspon- investment companies, Journal of Money Laun-
dent banking, http://www.wolfsberg-princi- dering Control, 18(4): 438–446.
ples.com/pdf/home/Wolfsberg-Correspon- Naheem, M.A., (2015) ‘HSBC Swiss bank
dent-Banking-Principles-2014.pdf, accessed accounts-AML compliance and money laun-
27 July 2015. dering implications’, Journal of Financial Regula-
Turnes, P.B. and Ernst, R. (2015) A framework for tion and Compliance, 23(3): 285–297.
transparency in international trade. Investiga- Naheem, M.A., (2015) The legal implications of
ciones Europeas de Direccion y Economia de la Suspicious activity reports for AML compli-
Empresa 21(1): 1–8. ance: The Crédit Agricole case. Finance Reg-
UNODC (2011) Estimating illicit financial flows ulation International 18:6, http://www
resulting from drug trafficking and other .financialregulationintl.com/financial-crime/
transnational organized crimes, https://www. the-legal-implications-of-suspicious-activity-
unodc.org/documents/data-and-analysis/ reports-for-aml-compliance-the-credit-agri-
Studies/Illicit_financial_flows_2011_web.pdf. cole-case-110688.htm.
U.S. Department of State (2005) Trade Transpar- Naheem, M A., (2015) FIFA case highlights need for
ency Units. International Narcotics Control new PEP, client-risk criteria. Complinet
Strategy Report, http://www.state.gov/j/inl/ (Thomson Reuters), http://www.complinet.
rls/nrcrpt/2005/vol2/html/42381.htm, com/global/news/news/article.html?
accessed 20 July 2015. ref=179959.
World Bank (2015) http://wits.worldbank.org, Naheem, M.A., Hakam, S S., (2015) Allegations of
accessed 11 May 2015. bribery and corruption in FIFA – are
World Shipping Council (2015) Global trade, there implications for the banking sector?
http://www.worldshipping.org/about-the- Finance Regulation International, Issue 18:5
industry/global-trade, accessed 8 May 2015. http://www.financialregulationintl.com/

22 © 2016 Macmillan Publishers Ltd. 1741-3591 International Journal of Disclosure and Governance Vol. 00, 0, 1–23
Trade-based money laundering

financial-crime/allegations-of-bribery-and- .complinet.com/global/news/news/article.
corruption-in-fifa–are-there-implications-for- html?ref=177933.
the-banking-sector-109228.htm. Naheem, M A., (forthcoming) Is tackling trade
Naheem, M.A., (2015) Suspicious transaction alerts based money laundering through stricter
in AML: The Credit Agricole case. Complinet reporting regulation the most effective
(Thomson Reuters), http://www.complinet. response? Journal of Money Laundering Control.
com/global/news/news/article.html? Naheem, M A., (forthcoming) FIFA – highlighting
ref=179394. the links between global banking and interna-
Naheem, M.A., (2015) AML compliance – A banking tional money laundering. Journal of Money
nightmare? The HSBC case study. International Laundering Control.
Journal of Disclosure and Governance, advance online Naheem, M A., (forthcoming) Risk of money
publication, May 21, doi:10.1057/jdg.2015.5, laundering in the US: HSBC case study.
http://www.palgrave-journals.com/jdg/journal/ Journal of Money Laundering Control.
vaop/ncurrent/full/jdg20154a.html. Naheem, M A., (forthcoming) China’s dirty laundry
Naheem, M.A., (2015) Trade-based money laun- – international organizations posing a risk to
dering among biggest banking risks. Compli- China’s AML systems. Journal of Money Laun-
net (Thomson Reuters), http://www dering Control.

© 2016 Macmillan Publishers Ltd. 1741-3591 International Journal of Disclosure and Governance Vol. 00, 0, 1–23 23

You might also like