0%

Book Description

Uncover the financial fraud that funds terrorist organizations

Trade-Based Money Laundering is an authoritative examination of this burgeoning phenomenon, now coming under scrutiny in the War on Terror. This book walks you through the signs and patterns of trade-based money laundering (TBML) to help you recognize it when it occurs, and shows you how data and analytics can be used to detect it. You'll learn the common value transfer techniques including invoice fraud, over-and-under invoicing, and misrepresentation, and learn why analytic detection systems have yet to be implemented despite the existence of copious data. Case studies from around the world highlight the real-life implications of the concepts and processes presented in the text, giving you a first-hand view of the mechanisms at work inside this expanding illegal market.

Trade-based money laundering uses trade to convert large quantities of illicit cash into less conspicuous assets or commodities to evade financial transparency laws and regulations. As an ideal funding mechanism for terrorist groups, the practice is getting more attention even as it increases in scale and spread. This book takes you deep inside TBML to better arm you against its occurrence.

  • Learn the typical value transfer techniques of TBML
  • Examine case studies detailing international examples
  • Discover why institutions have failed to implement detection systems
  • Explore ways in which analytics can identify TBML

According to the U.S. State Department, TBML has reached staggering proportions in recent years, and is considered by many to be the next frontier of international money laundering enforcement. Trade-Based Money Laundering gives you a battle plan, with expert insight and real-world guidance.

Table of Contents

  1. Title Page
  2. Copyright
  3. Foreword
  4. Preface
    1. How This Book Is Organized
    2. Sourcing
  5. Acknowledgments
  6. About the Author
  7. Chapter 1: The Next Frontier
    1. The Magnitude of the Problem
    2. How Are We Doing?
    3. Notes
  8. Chapter 2: Trade-Based Money Laundering Techniques: Invoice Fraud
    1. How Does TBML Work?
    2. Invoice Fraud
    3. Case Examples: Invoice Fraud and Manipulation
    4. Cheat Sheet
    5. Questions to Ask if a Shipment of Goods Looks Suspicious
    6. Notes
  9. Chapter 3: Black Market Peso Exchange
    1. Background of the BMPE
    2. A Typical BMPE Value Transfer Scheme
    3. Expansion of the BMPE to Mexico and Venezuela
    4. The China Connection
    5. Cheat Sheet
    6. Notes
  10. Chapter 4: Hawala: An Alternative Remittance System
    1. Definition of Hawala
    2. The Hawala Transaction
    3. How Do Hawaladars Make a Profit?
    4. Countervaluation and Trade
    5. An Abused Financial System
    6. How to Recognize Hawala
    7. Countermeasures
    8. Case Examples: Hawala
    9. Cheat Sheet
    10. Notes
  11. Chapter 5: Chinese Flying Money
    1. An Ancient System
    2. The Modern Era
    3. How Does It Work?
    4. Chinese Presence in Africa
    5. Case Examples
    6. Notes
  12. Chapter 6: Misuse of the International Gold Trade
    1. Why Gold Is so Popular with Money Launderers
    2. How Is Gold Manipulated to Launder Money and Transfer Value?
    3. Possible Questions for Gold Dealers
    4. Case Examples
    5. Examples of Gold and Terrorism Financing
    6. Cheat Sheet
    7. Notes
  13. Chapter 7: Commercial TBML
    1. Trade Diversion
    2. Trade Misinvoicing
    3. Transfer Pricing
    4. Cheat Sheet
    5. Notes
  14. Chapter 8: More Schemes and Facilitators
    1. Barter Trade
    2. Service-Based Laundering
    3. Free Trade Zones
    4. The Afghan Transit Trade
    5. Latin America's Tri-Border Area
    6. Carousel Fraud
    7. Case Studies
    8. Notes
  15. Chapter 9: Monitoring Trade
    1. Steps in the International Trade Process
    2. Information Sources
    3. What about Weight Analysis?
    4. Pioneering Analysis in TBML
    5. Trade Transparency Units (TTUs)
    6. The Application of Big Data and Analytics
    7. Case Example: Operation Deluge
    8. Notes
  16. Chapter 10: Red-Flag Indicators
    1. Possible Red-Flag Indicators of TBML
    2. Prudent Steps
    3. Guidance
    4. Notes
  17. Chapter 11: Conclusions and Recommendations
    1. Get Serious about TBML
    2. Define the Magnitude of the Problem
    3. Focus from the Top
    4. A FATF Recommendation
    5. Curtail the Commercial Misuse of Trade
    6. Enhance Wire Transfer Reporting
    7. TBML Analytics
    8. Expand the International TTU Network
    9. Reempower Treasury Enforcement
    10. The Misuse of Trade Is a Law Enforcement Issue—Not Just a Customs Issue
    11. National Task Forces on Underground Finance
    12. Notes
  18. Appendix A: Money-Laundering Primer
    1. Financial Intelligence
    2. How Is Financial Intelligence Used?
    3. Availability of Financial Intelligence
    4. Legislation
    5. Investigating Money Laundering
    6. Money-Laundering Methodologies
    7. Notes
  19. Appendix B: Original Trade Transparency Unit (TTU) Proposal
    1. May 2003 Proposal: Trade Transparency Units
  20. Glossary
  21. Index
  22. End User License Agreement
3.138.102.178