CRYPTOCURRENCIES IN AFRICA: THE GHANAIAN SITUATION

CRYPTOCURRENCIES IN AFRICA: THE GHANAIAN SITUATION

Cryptocurrency use is still in its infancy.

Cryptocurrencies have been in use around the world, especially in the developed world (Africa) ever since they came onto the scene after the end of the global financial crisis in 2009. In Europe, the US and industrialized parts of Asia they have become mainstream currencies.
However, in Africa in general and Ghana in particular, cryptocurrency use is still in its infancy. A few weeks ago, Ghana’s central bank, the Bank of Ghana, was compelled to even issue a statement on cryptocurrencies and their use in Ghana. The Bank of Ghana in its statement sought to give the impression that cryptocurrency usage in Ghana was not yet formally regulated and therefore cautioned the general public to be careful in dealings involving cryptocurrencies especially with institutions that purport to deal in them.

Dealing with cryptocurrencies is illegal?

This statement from the Bank of Ghana was a bit confusing for many people because some people interpreted it to mean that dealing in cryptocurrencies in Ghana was somehow illegal. However, all that the Bank of Ghana sought to do was to make the statement that it had not yet put in place regulations with respect to cryptocurrencies as a means of payments. The Bank of Ghana is responsible for regulating all payments and payment systems in Ghana.

A few of the players in the country who deal in cryptocurrencies granted interviews to media houses to correct the impression that dealing with cryptocurrencies was illegal. They had to assure the public that what the Bank of Ghana really meant by its statement was just to alert the public that it has not yet put in place binding regulations on cryptocurrencies to protect them from potential fraudsters and that it was in the process of consulting with relevant stakeholders and formulating the needed regulations for cryptocurrency usage in Ghana.

Has Ghana been slow at cryptocurrency adoption to compare with other African states?

Cryptocurrencies have been in use by people in Ghana for a few years now. However, their usage in Ghana is not currently big enough as compared to other African states like South Africa and Kenya. South Africa and Kenya have a more developed and vibrant cryptocurrency regime as compared to Ghana. Ghana has been slow at cryptocurrency adoption mainly because e-commerce generally is in its infancy as compared to other places on the African continent and beyond. Regulation in Ghana also only arises when an activity becomes so prominent that abuses are feared by regulators, consequently regulation is generally slow.

The Future for cryptocurrencies in Ghana.

All this notwithstanding, cryptocurrency usage in Ghana appears to have a bright future because it appears to be following the pattern of “mobile money” evolution in Ghana and Africa. Mobile money usage in Ghana and Africa was not keenly welcomed by the central bank and other financial institutions at the onset. Now mobile money transactions form a chunk of all financial and payment transactions in Ghana and many other African countries, simply for its convenience and ease of usage. I predict the same for cryptocurrency usage in Ghana in particular and Africa in general especially when the needed regulations are finally put in place.

It will definitely catch on!

 

“Top Misconceptions of Cryptocurrency as a Payment System”

 

Which can be read on Amazon Kindle Unlimited for Free  You can find more interesting articles by visiting us on one of the following platforms: AML Knowledge Centre (LinkedIn) or Anti-Bribery and Compliance at the Front-Lines (LinkedIn)

Cryptocurrency: Currency of Choice for Money Laundering and Terrorist Financing?

Cryptocurrency: Currency of Choice for Money Laundering and Terrorist Financing?

Cryptocurrency is only used in on Darknet and by Criminals!

I don’t know a topic that is more misunderstood than cryptocurrency. US regulators unofficially coined the umbrella term “virtual currency” to denote bitcoin and other blockchain-based cryptocurrencies. In countless articles, cryptocurrency, virtual, and digital currency are used interchangeably. For example, the Bangkok Post referred to “virtual currencies including the bitcoin”, while the Toronto Star described the collapse of a bitcoin exchange after hackers stole its “digital currency”. On bitcoinmagazine.com an author illustrated the difference between cryptocurrencies and digital currencies while referring to their use in online virtual economies. In reality, one size doesn’t fit all. Therefore, to understand cryptocurrency you need to first understand what it is and what it isn’t.

One Size Doesn’t Fit All 

For many, the confusion starts right away with the coining (no pun intended!) of umbrella terms such as digital and virtual currencies to include cryptocurrencies. Crypto, digital, traditional and virtual currencies have different attributes and traits and knowing them is necessary for the assessment of the individual risk that each pose as a strategic vehicle for money laundering and terrorist financing.

Fiat currency

Fiat currency is also known as traditional currency issued, monitored and regulated by a centralized government agency. In fact, 8 percent of the world’s money is represented by physical notes. They are used to purchase goods and services. Fiat currencies, in most cases, have no underlying assets of value such as gold or silver. Therefore, their material worth is only as good as the faith of their issuing government.

Digital Currency

Digital currencies such as Visa, AMEX, MasterCard, Bank Cards, and PayPal are a digital form of fiat currency. Also, connected to a user’s bank account and transactions are constantly monitored for known money laundering and fraud typologies. Digital currencies in the form of credit cards issued to consumers, giving them an instant form of credit. Digital currencies operate within an enormous ecosystem of banks, consumers, merchants, and the card companies themselves. Therefore, it’s hard to imagine how digital currency would offer an organized crime syndicate a strategic advantage as a vehicle to launder large sums of money. Of course, terrorist financing is another game altogether. Digital currency in the form of a pre-paid gift card is an adequate vehicle to move smaller amounts of money while flying under the radar.

Virtual currency

A form of currency or game tokens, issued by a centralized entity (not to be confused with a centralized government agency). Circulated within the boundary of a virtual economy (e.g. Second Life, World of Warcraft, EVE Online, etc.) as a game currency. Also, the top virtual platforms, which I checked, will only allow established payment methods (e.g. bank accounts, credit cards (aka digital currency), Skrill, etc.) when purchasing their virtual currencies. Again to set up these payment methods the owners or entity should have gone through the KYC. It’s questionable if these virtual platforms offer the necessary liquidity as well as the economic stability to be strategically interesting as a vehicle for laundering large sums of money. Therefore, it seems that these platforms offer more value for someone acting as a lone wolf trying to transfer or launder smaller amounts of money.

Cryptocurrency

Peer-to-Peer electronic cash systems allow payments to be directly sent from one party to another without a financial institution. A fundamental element of any cryptocurrency system is their Blockchain also known as a distributed public ledger, which is shared among network participants. In the absence of a central authority, miners and maintainers are incentivized with native tokens for their support in operating the network. Cryptocurrency can also be exchanged for services and goods similar to digital currencies, but with a substantially smaller merchant clientele base than digital currencies. To date, Bitcoin with 72 percent (as of December 2017) market share is by far the most popular cryptocurrency. Furthermore, any serious exchange or wallet service will conduct a thorough Know Your Customer (KYC) on every new account as part of their onboarding process. That means linking personal identity to your wallet and to your bank account. Accordingly, a serious exchange or e-wallet will only transfer funds for a cash withdrawal to a connected bank account.

There is the Grey Zone

First, it is debatable if cryptocurrency is a currency at all! There are an estimated 5.8 million unique active users of cryptocurrencies (Cambridge Centre for Alternative Finance). Many of which are operating in a grey zone when it comes to rules and regulation around cryptocurrency or a lack of them. In the USA, there have been controversial cases where presiding judges of similar court cases involving cryptocurrency came to contrasting conclusions and rulings. For example, in the case of Michell Espinoza Judge Pooler’s threw out felony charges. At the time, Michell Espinoza had an account on a website, localBitcoins.com, where he allegedly traded Bitcoin for a profit. The defendant accused of transmitting (as a money services business) and laundering $1,500 worth of Bitcoins by Miami Beach Police and the U.S. Secret Service, while acting undercover. On the charges of engaging in a money services business, the judge issued the statement that “attempting to fit the sale of Bitcoin into a statutory scheme regulating money services businesses is like fitting a square peg in a round hole.” Bitcoin is not, she noted “backed by anything” and is “certainly not tangible wealth and cannot be hidden under a mattress like cash and gold bars.” To the charges of money laundering, Judge Pooler clarified that money laundering is “commonly understood to be the method by which proceeds from illicit activity (“dirty money”) becomes legitimized.” The judge also mentioned that Florida law — states that a person can only be charged with money laundering if they engage in a financial transaction that will “promote” illegal activity — is way too vague to apply to Bitcoin. “Judge Pooler there was no financial transaction because Bitcoin is not money”. Judge Pooler also noted that while the court is not an expert in economics; however, it is clear, even to someone with limited knowledge in the area, that Bitcoin has a long way to go before it is the equivalent of money. In a similar case to that of Michell Espinoza, Judge Nathan made precisely the opposite ruling to Judge Pooler. Anthony Murgio, an operator at Coin.mx, indicted in 2016 for working without a money transmission license. He was charged with money laundering and failure to file suspicious activity reports. Murgio’s council has been fighting to have the money laundering charges dismissed, arguing that Bitcoin is not a legal currency. “Judge Nathan rejected arguments to dismiss the money laundering charges, claiming that Bitcoin explicitly qualifies as currency”. She defended her decision by saying Bitcoins are funds within the plain meaning of that term. Bitcoins can be accepted as a payment for goods and services or bought directly from an exchange with a bank account. Therefore, they function as pecuniary resources and used as a medium of exchange and a means of payment. Clearly, governments were caught off guard by the quick adoption of cryptocurrency and now everyone is grappling with fundamental issues like what it is, how to tax and regulate it. 

Cryptocurrency an Enabler of Crime?

Editorial stories like this one “Bitcoin Gains Value Due to Criminal Use [Only], writes a Forbes Columnist” has influenced us into believing that cryptocurrency is only used by organized crime and terrorist on the darknet. Because it provides them with complete anonymity. Subsequently, another article gave the impression that ISIS and organized crime syndicates were using a shadow banking system (aka darknet) and cryptocurrencies to systematically launder tens of millions, if not, hundreds of millions of dollars on a regular basis, while law enforcement watched helplessly. Overall, the conversations concerning cryptocurrency role in enabling cybercrime, money laundering, and terrorist financing are riddled with misconceptions. Of course, criminals are resourceful and will always use whatever means are available that give them the greatest chance to succeed, which according to the UK’s national risk assessment (NRA) of money laundering and terrorist financing that continues to be High-end and cash-based money laundering.  Key findings of the 2017 UK’s national risk assessment (NRA) of money laundering and terrorist financing comes amidst the most significant period for the UK’s anti-money laundering (AML) and counter-terrorist financing (CTF) regime for over a decade the assessment shows that: • High-end money laundering and cash-based money laundering remain the greatest areas of money laundering risk to the UK. New typologies continue to emerge, including risks of money laundering through capital markets and increasing exploitation of technology, though these appear less prevalent than longstanding and well-known risks. • The distinctions between typologies are becoming increasingly blurred. Law enforcement agencies see criminal funds progressing from lower level laundering before accumulating into larger sums to be sent overseas through more sophisticated methods, including retail banking and money transmission services.
Therefore, it makes sense that criminals will try to exploit cryptocurrencies to launder money or support some local terror cell! With that said, using cryptocurrency doesn’t put criminals out of law enforcement’s reach. On the contrary, as soon as a cryptocurrency is spent, the forensic trail begins.  These unique strings of letters and numbers give law enforcement enough information to follow transactions on a blockchain and eventually to a recipient’s e-wallet. Cryptocurrency is a double edge sword with their blockchain technology turning out to be a much better tool for law enforcement than they had expected in the beginning. There is no better illustration of this than a story shared by Kathryn Haun. First, she illustrates how a government agency task forces brought down Ross Ulbricht (aka Dread Pirate Roberts). The 31-year-old American who created the Silk Road. An online marketplace, facilitating the sale of illegal goods on the darknet. Kathryn goes on to explain how two federal agents involved in the Silk Road case became suspects and later charged with crimes. Without the blockchain, their apprehension would not have been possible. The blockchain is the underlying technology upon which cryptocurrencies run on. More importantly, than the information itself is that all of a blockchain’s data is traceable, permanent, immutable, reliable and available to everyone who wants to see it. 
Maybe, law enforcement panicked in the beginning, but they have adapted and the blockchain technology is not only a digital time-stamp but a digital witness!

Money Laundering

There have even been some cases requiring international law enforcement cooperation. One recent example involved authorities from Finland, Spain, the United States, and Europol. In this case, 137 individuals were investigated and 11 were ultimately arrested in April 2018. Originally, criminals laundered drug money from Spain to Colombia using credit cards. The group realized quickly switched to cryptocurrencies after realizing the easy traceability of traditional bank accounts. Nonetheless, law enforcement officials from Europol were able to track down criminals by monitoring crypto-to-fiat exchange transactions (Colombian pesos). Europol has stated that it is committed to giving additional cryptocurrency crime detection training to its officers. It will also continue to coordinate to stop such crimes both within the EU and beyond. This resource was taken from an article that was originally published at CoinCentral.com  

Willing to go the Extra Mile 

For those, individuals willing to go the extra mile to cover their tracks. The market is saturated with unlawful businesses offering alternative entry points and mixing services to help users improve the anonymity of their cryptocurrency transactions. Likewise, there are cryptocurrencies like Monero (XMR), DASH (DASH), and ZCash (ZEC) that offer users an extra layer of anonymity by applying zero-knowledge proof or a built-in mixing process as is the case with DASH. Granted, the options for concealing one’s identity are endless, and as a result, it makes life harder for law enforcement to follow or tie a transaction to an individual, but not impossible! Before deciding to use an alternative entry point or a coin with zero-knowledge proof to hide one’s identity here are some things to consider:  
  • Cyber attacks and insider fraud are not uncommon events at legitimate cryptocurrency businesses. I can’t imagine that an unlawful business would be a better custodian for someone trying to hide the source of their money.
  • A majority of businesses operating unlawfully are already on law enforcements’ radar and a subpoena can be issued at any time.
  • A business offering unlawful services can also be a setup by law enforcement.
  • Mixing is more vulnerable to Sybil attacks.
  • Mixing is not immune to forensic technology so there is always a real chance that investigators can link the coins back to the original address.
  • Mixing needs at least two people, therefore you are helping someone to launder their money
  • What if, after mixing, you receive coins that were involved in a crime and law enforcement traced them to you. Likely outcome these coins will be confiscated and you might require expensive legal counseling to avoid criminal charges.
  • Let’s not take our eyes off the main players in the industry. Miners confirm valid transactions. Also, 50 percent of the hashpower is controlled by a handful of miners. Government agencies can always apply pressure to these miners as witnessed in China.  
  • Coins that claim to offer total privacy all have their own nuances and if not used accordingly can jeopardize any chance of anonymity. For example, take Monero it offers users full anonymity as long as it is used on its blockchain. Also, many are relatively new ICOs, therefore, the bugs haven’t yet been identified.   
  • It’s only a matter of time before the crypto-industry is regulated and it’s probably safe to say that holders of coins offering total anonymity will be penalized.
  • Unfortunately, for bad actors, the flow of sending and receiving data through these cryptocurrency networks are not well-coordinated events. Therefore, anyone monitoring a network will be able to immediately recognize when a transaction is sent out and map it to that IP address as the owner of that cryptocurrency. Also, when a massive number of transactions are sent from a single source, it’s only a matter of time before the addresses are unwound and mapped to their proper IP addresses.

Under Attack 

However, such alternatives could leave holders of cryptocurrency with uncalculated risk due to the potential of cyber attacks, theft, and fraud. According to a report by Imperva Incapsula titled “Q3 2017 Global DDoS Threat Landscape.” Digital currency operators and Bitcoin exchanges are already the most common targets of distributed denial of service (DDoS) attacks. Also, the report cited that three out of four Bitcoin sites was a victim of DDoS attacks in the third quarter of 2017 alone. Since 2011 to December 2017, there have been at least 30 heists at cryptocurrency exchanges. No one would argue that Bitcoin holders have suffered the most, in fact, It is estimated that more than 900,000 Bitcoins have been stolen with a potential value of $ 6.3 billion as of Dec 2017. Here a few of the noteworthy ones against Bitcoin:   Even though, blockchain technology offers a high level of security, unfortunately, crypto-exchanges and ICOs don’t offer the same level of protection for their customers. While a great deal of the cyber attacks occurred at Bitcoin exchanges, hackers have been able to help themselves to the digital assets of most exchanges some even repeatedly. These attacks are nothing new to the crypto-community but with market caps soaring to new astronomical highs, we can expect cyber attacks to continue to soar.  Even the smartest criminals get careless and blockchain technology continues to be a bonafide weapon for combating and prosecuting crimes.

Final Take

The anonymity promised by cryptocurrency is a contradiction in itself because their blockchain reveals an entire history of all transactions for the public to see including law enforcement! Also, it really needs to be underlined, for the normal users of cryptocurrency, it means linking a normal bank account to an e-wallet. Anyway, governments have already started regulating cryptocurrency. With that said, miners, exchanges, and e-wallets who conduct transactions that use stealth like technologies (e.g. zero-knowledge proof) would most likely be placed on a sanction list blocking these funds until the financial institution has conducted an enhanced due diligence on the customer and the transaction all to the expense of the customer. At the moment, no other currency offers more anonymity and stability for money launders and terrorist than fiat currency…cash is still king for the time being Written by Paul Hamilton  

“Top Misconceptions of Cryptocurrency as a Payment System”

  Which can be read on Amazon Kindle Unlimited for Free  You can find more interesting articles by visiting us on one of the following platforms: AML Knowledge Centre (LinkedIn) or Anti-Bribery and Compliance at the Front-Lines (LinkedIn)
Follow the Money – Has Cryptocurrency Rendered this Adage Useless?

Follow the Money – Has Cryptocurrency Rendered this Adage Useless?

Cybercriminals predate the use of cryptocurrency

Indeed, editorial stories like this one “Bitcoin Gains Value Due to Criminal Use [Only], writes a Forbes Columnist” has influenced many into believing that cryptocurrency is only used by cybercriminals, organized crime and terrorist on the darknet. Before cryptocurrency, victims were informed to transfer ransom money by mailing cash through a money transfer operator (MTO). The pick-up person using fake documentation would take possession of the victim’s cash, leaving no trace of their real identity.   Victims of the WannaCry ransomware attack, in May 2017, received a simple message informing them to send $300 worth of bitcoin to this address if they want to see their data again.     Criminals continue to evolve by exposing any method or means available to them including technology. However, using cryptocurrency doesn’t put criminals out of law enforcement’s reach. On the contrary, as soon as a cryptocurrency is spent, the forensic trail begins. This is an excerpt from the book Cryptocurrency Modern Day Payment System or Uncalculated Risks? Which can be read on Amazon Kindle Unlimited for Free 

The Forensic Trail Begins

Maybe, law enforcement panicked in the beginning, but they have adapted to cryptocurrency and their blockchain technology. Granted, cryptocurrency transactions themselves are not tied directly to anyone’s identity, but every transaction uses a unique string of letters and numbers 1Ez69nzzmePmZX3WpEzMKTrcBF2gpNQ55, that recognize the destination of both sender and receiver. These unique strings of letters and numbers give law enforcement enough information to follow transactions on a blockchain and eventually to a recipient’s e-wallet. More importantly, than the information itself is that all of a blockchain’s data is traceable, permanent, immutable, reliable and available to everyone who wants to see it.   Therefore, that line “follow the money” made famous in the 1976 motion picture “All the President’s Men” is as true today as it was then. Not only a digital time stamp but a digital witness!

Techniques and Tools

Like criminals, law enforcement has adapted to these new technologies developing new techniques and tools to follow and identify cyber attackers, even on unused addresses. Agents monitor blockchains and the darknet looking for correlations across transactions and their attributes such as:
  • Timelines
  • Amounts
  • Domain names
  • IP and email addresses
  • Pseudonyms
  • Payments
  • Connections
  • etc.
Upon detecting any conspicuous activity or transactions on a blockchain or on the darknet, law enforcement will start investigating. In the hope of finding similarities that will give them vital clues in both new and unsolved cases. Therefore, agents comb through thousands of registered cases at the IC3 (Internet Crime Complaint Center). For example, in cases that involved ransomware, if a ransom was paid by registered victims, law enforcement can search for connections between the recipient’s wallets to generate a list of wallets associated with the same entity that issued the ransom demand. At the same time, new addresses are constantly checked against cases in the FBI’s case management system that are currently being worked on. For example, another agent might have already come across these addresses in association with another crime. For instance, someone who sold remote desktop protocol (RDP) credentials on the darknet for accessing third-party computers from anywhere in the world.   This analysis can lead agents to exchanges, e-wallets, and even gambling sites, on which law enforcement could serve a subpoena to learn more details on the transactions and the account owners. Once the payment recipient is identified, the investigator will have a confirmed IP address, location as well as a criminal profile, potentially linking a suspect to other criminals and crimes.    

Consider this before Going the Extra Mile

For those, individuals willing to go the extra mile to cover their tracks. The market is saturated with unlawful businesses offering alternative entry points and mixing services to help users improve the anonymity of their cryptocurrency transactions. Likewise, there are cryptocurrencies like Monero (XMR), DASH (DASH), and ZCash (ZEC) that offer users an extra layer of privacy by applying zero-knowledge proof or a built-in mixing process as is the case with DASH. Granted, the options for concealing one’s identity are endless and as a result, it makes life harder for law enforcement to follow or tie a transaction to an individual, but not impossible! Before deciding to use an alternative entry point or a coin with zero-knowledge proof to hide one’s identity here are some things to consider:
  • Cyberattacks and insider fraud are not uncommon events at legitimate cryptocurrency businesses. I can’t imagine that an unlawful business would be a better custodian for someone trying to hide the source of their money.
  • A majority of businesses operating unlawfully are already on law enforcements’ radar and a subpoena can be issued at any time.
  • A business offering unlawful services can also be a setup by law enforcement.
  • Mixing is more vulnerable to Sybil attacks.
  • Mixing is not immune to forensic technology so there is always a real chance that investigators can link the coins back to the original address.
  • Mixing needs at least two people, therefore you are helping someone to launder their money
  • What if, after mixing, you receive coins that were involved in a crime and law enforcement traced them to you. Likely outcome these coins will be confiscated and you might require expensive legal counseling to avoid criminal charges.
  • Let’s not take our eyes off the main players in the industry. Miners confirm valid transactions. Also, 50 percent of the hashpower is controlled by a handful of miners. Government agencies can always apply pressure to these miners as witnessed in China.  
  • Coins that claim to offer total privacy all have their own nuances and if not used accordingly can jeopardize any chance of anonymity. For example, take Monero it offers users full anonymity as long as it is used on its blockchain. Also, many are relatively new ICOs, therefore, the bugs haven’t yet been identified.   
  • It’s only a matter of time before the crypto-industry is regulated and it’s probably safe to say that holders of  coins offering total anonymity will be penalized.
  • Unfortunately, for bad actors, the flow of sending and receiving data through these cryptocurrency networks are not well-coordinated events. Therefore, anyone monitoring a network will be able to immediately recognize when a transaction is sent out and map it to that IP address as the owner of that cryptocurrency. Also, when a massive number of transactions are sent from a single source, it’s only a matter of time before the addresses are unwound and mapped to their proper IP addresses.
Furthermore, any serious exchange or wallet service will conduct a thorough Know Your Customer (KYC) on every new account as part of their onboarding process. That means linking personal identity to your wallet and to your bank account. Recently, Circle-owned Poloniex exchange froze a slew of user accounts in the midst of implementing a new know your customer (KYC) verification process. Legacy account users, those whose accounts were verified under Poloniex’s old guidelines, reportedly received emails from Poloniex support requesting that they comply with the new verification method. The email asks that each legacy account provides “a verification photo…as well as a photo of a valid government-issued ID card or passport.” More on the Poloniex exchange story can be found at coincentral or click here Even the smartest criminals get careless and blockchain technology continues to be a bonafide weapon for combating and prosecuting crimes. Written by Paul Hamilton  

“Top Misconceptions of Cryptocurrency as a Payment System”

  Which can be read on Amazon Kindle Unlimited for Free  You can find more interesting articles by visiting us on one of the following platforms: AML Knowledge Centre (LinkedIn) or Anti-Bribery and Compliance at the Front-Lines (LinkedIn)
Customer-Centric Risk and Compliance

Customer-Centric Risk and Compliance

Disruption in the Financial Industry

Technology has always had the ability to generate hype and excitement. In addition, to the rising cost of risk and compliance executives are battling to drive more business value from these functions. However, the reality is these functions only support the business. Exactly this prompted me to ask what, if any, impact is digital transformation having on risk and compliance functions at financial services institutions. Before we deep dive into the digital transformation of risk and compliance, let’s look at where the financial services industry is in its digital transformation. Despite the fathom rate of change that Fintechs have brought to the financial services industry. The industry on a whole is clearly lagging in digital transformation as pointed out in the graph by McKinsey&Company.
While a shift away from the historical product-centric mindset to a customer-centric e-commerce approach is a positive signal for customers. Many financial services institutions have yet to streamline and automate business processes as well as consolidate data sources across the enterprise and at all customer touch points. In the same manner as their e-commerce peers. Therefore, digital adoption in the financial services industry has been slower and lacking depth. As illustrated in the graph by McKinsey&Company.
Based on the change management history of the financial services industry, many would agree the people and process dimensions of digital business are the most difficult to transform. Of course, personalizing the customer experience is important to any digital strategy, but risk and compliance are paramount to the overall success of execution.

“Digital transformation is more than building cool customer apps or increasing the number of digital channels”

The Current State of Risk and Compliance

In recent Gartner surveys of CEOs across the globe, more than 77% of CEOs see digital business bringing new and increased levels of risk to their organizations. At the same time, 65% of the CEOs view their risk management investments and maturity as lagging behind their peers. Also, board members and senior management struggle to find intrinsic value in their risk and compliance programs and tend to view them as a cost of doing business. Why are CEOs and senior management responding like this? When hardly any industry spends more on technology than the financial services sector and a significant portion of that spend goes into risk and compliance technology.
In a common risk and compliance environment, business units operate in isolation. Relying on decentralized data systems, and manual processes that are not efficient. This current environment does well to support the business, but not drive business value. Likewise, it’s costly to run and maximizes the potential for lost engagement opportunities at most customer touch points. 
In addition to lost engagement opportunities, criminals thrive in this current state of complexity it offers them the perfect camouflage. In the Carbanak campaign, malware was installed on the bank’s computer systems, sending back vital information about how the bank carried out business critical tasks. Eventually, leaving 100 banks compromised to the sum of $900 million USD. Highly fragmented IT and data architectures cannot provide an efficient or effective environment for monitoring, and analyzing risks in a real-time world while not disrupting customer transactions.

Driving the Business with a Customer-Centric Risk, and Compliance approach

AML/KYC

Today, customers expect real-time decisions at every touch point in order to complete their transactions. However, compliance can get into the way of transactions before they are completed. In fact, financial services institutions have endured a rough journey with AML. Their reward has been an enormous amount of false alerts, and a lot of manual processes. For good reasons, compliance programs feel under-resourced compared to the volume of alerts and reports they must review, while trying not to disrupt good business. Therefore, many banks have invested massively in additional staff, to review false positive, while also turning away profitable high margin customers. As witnessed by massive lawsuits from Money Transfer Operators against banks trying to prevent them from closing their accounts. The advantages that a Customer-Centric Infrastructure would have on an AML/KYC program:
  • Learning transaction behavior of similar customers and clusters to accurately refine and update customer risk segments and individual profiles per their present risk.
  • Identifying outlier transactions and outlier customers accordingly.
  • Learning money laundering and fraud typologies and identify typology specific risks.
  • Dynamically learning correlations between alerts which produced verified suspicious activity reports and those that don’t.
  • Continuously analyzing false-positive alerts and learn common predictors.
  • Many processes and workflows can be automated for example the KYC, controlling the initial screening of alerts, the filing of suspicious activity reports and parts of the case investigation.
  • KYC process would no longer result in delays or potential loss of business.
In particular, streamlining KYC, AML, and Fraud processes at account-opening for a seamless onboarding will go a long way in improving customer satisfaction and ensuring new revenue. AML programs will become more efficient by automating workflow and incorporating technologies such as machine learning and advanced analytics that support the constant improvement of risk assessments and profiling models. This will free up resources and help compliance to go from monitoring to preventing financial crime.

Consumer Credit

As a result of low-interest rates coupled with sparse yields means banks generate fewer profits from the deposits they collect, against the loans they give. Therefore, to increase their return on consumer credit banks need to streamline and automate manual processes, improve risk assessments and stop credit fraud losses. The advantages that a Customer-Centric Infrastructure would have to consumer credit:
  • New integrated data sources, as well as unstructured data from social media, can give better insights into the creditworthiness of an applicant, therefore, protecting against fraud.
  • Advanced analytics and machine-learning tools can increase the accuracy of credit risk models.
  • New data sources, advanced analytics, and machine learning tools can help to detect inconsistencies between application, account and credit card transaction history.
  • Learning patterns of similar customer behavior will go a long way to detecting fraud and money laundering.
In general, streamlining loan application processes to enable real-time decision making will improve customer retention, and be a decisive channel for winning new customers. Likewise, advanced analytics and machine-learning can increase the accuracy of credit risk models, therefore, reducing the time needed for structured credit approvals to a few minutes while minimizing a bank’s exposure to default risk.

Mobile Channels

Traditional banks are being challenged by FinTechs with new business models that are offering reduced fees and eliminating access barriers for the unbanked. As a result, this challenge has led to a major shift in the way money is moved around the world. Thus, breaking the dominance of banks in the area of payments. One good reason, the remittance industry accounted for $583 billion, in cross-border payment transfers in 2014 and the World Bank expects the number to climb to $636 billion in 2017. With that said, digital technology is extremely important to the future of financial services industry. Therefore, traditional financial services institutions have embraced an ecosystem with FinTechs and third parties by allowing access to their infrastructure through APIs. Although, these ecosystems can help to provide more customer value or open new customer segments. At the same time, they bring new types of operational risks with them, such as:
  • Risky user behavior, especially with a mobile device. For example, 70% of smartphone users have never installed an anti-virus program on their mobile device.
  • 24/7 connectivity of mobile devices to a network.
  • WI-FI networks and Bluetooth technologies making it easier for attackers to carry out a fraud campaign.
  • Rogue mobile applications, repacking of apps and ransomware are on the rise.
  • Advance Malware & Viruses for online as well as mobile devices continue to increase.

 “43% percent of merchants in one survey were not able to report what percentage of fraud losses came from their mobile channel”

Currently, the data on mobile fraud isn’t as robust as with other channels. These operational risks need to be continually assessed to build reliable mobile fraud models without jeopardizing the customer experience. In fact, 43% percent of merchants in one survey were not able to report what percentage of fraud losses came from their mobile channel. Per a 2014 report from Alcatel-Lucent’s Motive Security Labs, 16 million mobile devices worldwide are infected with malware. A point often overlooked, is the fact that your ecosystem will make it more difficult for you to protect against external threats. One lesson learned from the Carbanak campaign is the degree of difficulty to detect a compromise until bad things start to happen.

A Customer Centric Risk and Compliance Infrastructure

Marketing and sales have been using customer loyalty, and customer-centric tools for years to effectively maximize sales and measure customer satisfaction. Leveraging sophisticated analytics and CRM tools to conduct market analysis, profile and segment customers to present them with offerings that best address their requirements. It’s clear moving from a state of supporting the business to one of driving it is as much about people and processes as it is about technology. However, true success relays on data quality. Thus, buy-in from stakeholders is mandatory for a data strategy that establishes strong data governance and maintains the highest data quality built around a robust data architecture
The cornerstone of the customer-centric risk and compliance architecture is a big data platform, advanced analytics, artificial intelligence, machine learning, workflow automation, and natural-language processing. Not only can the platform aggregate and analyze all data from account and credit card transaction history but also check for inconsistencies between an application with both structured and unstructured data sources. Another plus of this architecture is employees have accessibility to one source of the truth. Therefore, minimizing the uncertainty of unknown risk-levels of exposures to financial & debt markets, counterparty, private credit, compliance risks, legal liabilities, and security threats from adversaries. One survey stated that compliance was mentioned by 47% of participants, as the most mentioned obstacle to impeding their digital maturity thereafter fragmented data sources at 44%. By leveraging a customer-centric risk, and compliance architecture financial services institutions will drive its ability to mature digitally at a much faster pace. Although the rewards are great when decisions are being made in real-time there is little margin for error. That said the journey will continue to be a laborious one for those who stay on the same path they started on. My profession international business development and sales are also my passions. Devoted to helping financial service institutions choose the right technology for their AML programs making them more effective and customer centric. An ex-professional basketballer with a passion for fitness and respect for nature. I enjoy starting inspiring discussions with articles on Anti-Money Laundering, Cryptocurrency, financial technology, Human trafficking, and terrorist financing as well as on sports & fitness. So, visit me at http://aml-knowledge-centre.org/ or http://sports.fastbreak-marketing.com/ or let’s connect on LinkedIn if you would like to discuss a topic… My profession international business development and sales are also my passions. Devoted to helping financial service institutions choose the right technology for their AML programs making them more effective and customer centric. An ex-professional basketballer with a passion for fitness and respect for nature. I enjoy starting inspiring discussions with articles on Anti-Money Laundering, Cryptocurrency, financial technology, Human trafficking, and terrorist financing as well as on sports & fitness. So, visit me at http://aml-knowledge-centre.org/ or http://sports.fastbreak-marketing.com/ or let’s connect on LinkedIn if you would like to discuss a topic… auch gerne auf Deutsch:-)

“Top Misconceptions of Cryptocurrency as a Payment System”

Which can be read on Amazon Kindle Unlimited for Free  You can find more interesting articles by visiting us on one of the following platforms: AML Knowledge Centre (LinkedIn) or Anti-Bribery and Compliance at the Front-Lines (LinkedIn)
Should cyber and anti-money laundering units remain distinct entities?

Should cyber and anti-money laundering units remain distinct entities?

Why the Carbanak Campaign and the Bangladesh Bank attacks are a wake-up call for every AML compliance program.

Someone once asked me how long will criminals continue to find new ways to circumvent money laundering laws. My reply was simple, so long as crime is profitable they will continue to innovate to avoid AML laws and bank procedures. For any company, survival means consistently adapting to new economic, geographic, and regulatory changes. Therefore, for those syndicates operating illegally the need to launder money will always be there.

If the market value for illegal trade was $650 Billion in 2011, one must wonder how many hundreds of billions are lying under mattresses around the world waiting to be launder. Nevertheless, the direct use of financial institutions for laundering money will be a much more daunting task as in the past.  Employees are well trained to detect the threat of money laundering and terrorist financing. As well, regulators today cooperate globally to align, develop and promote an international response to combating money laundering and terrorist financing. AML laws are continually being amended, for example, know your customer(KYC) and beneficial owner rules have been strengthened in most parts of the world.

Therefore, we need to start thinking about a new scenario where organized crime syndicates start replacing conventional methods to launder money with more advanced methods where technology is the business enabler.

 

A summary of illicit markets and values

gfi-integrity-summary-of-illicit-markets-and-values (Source: Transnational Crime In The Developing World February 2011 by GIF)

The Carbanak campaign and the Bangladesh Bank cases are the new normal in financial crime.

Let’s imagine a scenario, where cyber-attackers would exploit a vulnerability in a financial institution’s system. However, unlike other cyber-attacks, these hackers are not out to steal money.  These cyber-attackers hired by an organized crime syndicate who have acquired money from illegal trade. Their mission isn’t to steal money from the bank but place dirty money in the bank(s) and immediately start layering (transferring) it through accounts at other financial institutions. By using sophisticated malware cyber attackers can enter the bank, learn internal procedures and then when ready takeover mission critical banking systems to start the layering process by transferring money to fake or real accounts. With control of the command server(s), they would easily bypass all anti-money laundering systems going undetected by bank officials. They would want to use the different time zones, regional and local holidays and business hours to their advantage.

A report by Kaspersky Lab in 2015, stating that over 100 banks around the world had been compromised to the sum of $900 million USD. It wasn’t detected until an ATM machine in Kiev started dispensing cash and this was no isolated event. The Carbanak malware was installed and sitting on the bank’s computer systems for months, conducting a reconnaissance mission of how the bank carried out business critical tasks. This international group of hackers was then able to successfully impersonate bank officers and carry out internal procedures at over 100 banks around the world. With complete control of mission-critical systems, they turned on various cash machines and managed the transfer of millions of dollars from banks in Russia, Japan, Switzerland, the United States and the Netherlands into fake bank accounts set up in other countries.

The Carbanak Campaign:

carbanak-v0-1

The February 2016 cyber attackers illegally transferred (steal) US$951 million from Bangladesh Bank, the central bank of Bangladesh, to several fictitious bank accounts around the world, via the SWIFT network.  This was without questioned a well-planned attack and the way regional holidays and time difference were used was brilliant.

The Bangladesh Bank Campaign:

swift-cyber-v-01

There has been much debate as to whether cyber and anti-money laundering units at financial institutions should remain distinct entities. Everybody agrees that efforts to share intelligence between the units should be ramped-up but would this will be enough. One of the biggest problems for large financial institutions when it comes to combating fraud and anti-money laundering is everything operates in silos. In a digital era, with people connecting to financial institutions from multiple devices and locations. It’s no longer an option for financial institutions to operate in batch mode when it comes to financial crime. The dots need to connect in real-time or you lose.

It’s only a matter of time when organized crime syndicates start to launder money per the “What If” scenario or they already are, who would realize it since nothing has been stolen and all records deleted!

Paul Hamilton

Paul Hamilton

Group moderator

Paul Hamilton is a business development specialist for financial technology. After playing professional basketball in Europe, his focus turned to financial services and ultimately to financial technology where he won 15 years of experience working for global players, an SME and a start-up. His enthusiasm and excitement for developing new market opportunities have always been his passion going as far back as his first job as a broker selling investment products. Since then, he has worn many hats and as a consultative sales person, he has worked with financial service providers across EMEA and Asia to help them achieve their business goals.

Paul is also group moderator and founder for the financial crime blog site AML Knowledge Centre. To read his and member blogs go to http://aml-knowledge-centre.org/ or alternatively, you can join the AML Knowledge Centre at LinkedIn https://www.linkedin.com/groups/8196279

Paul enjoys connecting with people so if you want to talk about business, financial technology, or sports and fitness, he’s your person:-)

Women are being traded as slaves on WhatsApp – here’s how the UN can act

Women are being traded as slaves on WhatsApp – here’s how the UN can act

The members of the United Nations Security Council hear terrible stories from conflict zones with alarming frequency. So it takes a truly horrific tale to bring them to tears.

Yet as officials in the Council listened in December to Nadia Murad Basee Taha bravely recount her torturous ordeal as an Islamic State sex slave, some wept openly. When she fell silent, she received a rare ovation.

Murad is returning next week to the UN to be inducted as a Goodwill Ambassador for the Dignity of Survivors of Human Trafficking. Since her last visit, the Security Council has requested a report from the Secretary-General on human trafficking in conflict, and what can be done about it.

The council should act soon – because the problem appears to be rapidly getting worse.

Is slavery making a comeback?

International law is clear that slavery is never allowed, anywhere, any time. Yet the best estimates suggest that 45.8 million people alive today are enslaved.

Armed groups have long forced vulnerable people into sexual exploitation, military service, and forced labor including construction, cleaning work, digging trenches, mining and agriculture. Some people displaced by conflict in South-East Asia may even end up catching and processing the fish that ends up in our supermarkets.

But today, organizations such as Islamic State and Boko Haram are openly encouraging and organizing slavery on a scale not seen since World War II.

More than 5,000 Yazidi women, children and men are thought to be enslaved by Islamic State right now. The organization has set up slave registries and markets, openly advocates for the revival of slavery through official mouthpieces, and has even issued “how-to” manuals on slavery. Increasingly, the group relies on forced child recruits as suicide

Slavery in a social media age

This is not just Iraq and Syria’s problem. Like conflict, the problem of slavery has become international. A recent UN Commission of Inquiry found that men from Algeria, Australia, Belgium, Egypt, Iraq, Kazakhstan, Libya, Morocco, Saudi Arabia, Sudan, Syria, Tunisia, Turkey and Uzbekistan have participated in Islamic State’s enslavement and human trafficking crimes. Other armed groups, such as Boko Haram, are following suit.

This is partly because of social media. In the past year, the UN reports, fighters have used the encrypted communications app Telegram to set up online slave auctions, circulating photos of captured Yazidi women, including their age, marital status, current location and price.

Recently, a member of Islamic State attempted to sell two enslaved women on Facebook. Displaced female Syrian refugees in Lebanon have been traded on WhatsApp, and Islamic State relies increasingly on secure apps such as Surespot and Threema for its communications.

How the UN can help

Faced with this, what can the Security Council possibly do?

The answer is quite a lot, according to a new report published by United Nations University (which I co-wrote). Published with support from the UK Mission to the United Nations and others, and drawing on input from more than 100 experts from across sectors and around the world, the report argues that the Security Council has significant untapped leverage on this issue.

For a start, the Security Council could clearly denounce involvement with this crime against humanity, and encourage states to punish any of their nationals who are involved. The council could also consider a special international tribunal to address Islamic State’s war crimes and crimes against humanity, including enslavement.

There is a lot the council could do to monitor and disrupt human trafficking connected to armed conflicts. This would involve mechanisms to monitor specific groups’ involvement in trafficking, as well as online and real-word hotspots. Members of the council should figure out why existing sanctions that already apply to involvement in human trafficking – including those for Islamic State, Boko Haram and in Libya, the Democratic Republic of Congo and Somalia – are not being used effectively to address it.

The council could also help protect those displaced by conflict – at present at a high of more than 65 million people. These people are especially vulnerable to human trafficking. UN agencies and states can do more to identify, assist and protect civilians in trafficking hot spots, through rapid reaction capabilities, reporting task forces and information campaigns.

Enlisting the private sector

The Council can also encourage the private sector to help. The Security Council could work with the financial, technology and recruitment sectors to develop guidance to prevent their value-chains being tainted by human trafficking in conflict. The council has taken similar steps to prevent industry from profiting from conflict minerals. Why not do the same in relation to human trafficking in conflict?

The technology sector has another key role to play. Social media providers may be able to use location data and content to identify people vulnerable to trafficking, and warn them of particular risks. The London Metropolitan Police has released online videos of Syrian migrant women warning foreigners about the realities of life under Islamic State, to counter fraudulent recruitment and trafficking. Social media providers can ensure these messages get to the right audience.

Nadia Murad Basee Taha’s testimony last December was powerful and moving. Her appointment as a goodwill ambassador signals the UN’s ongoing commitment to support victims.

Now it is up to the Security Council to take action, with partners in the private sector and beyond, to ensure that more people do not suffer her terrible fate. Without such steps, all the council’s applause will ring hollow.

Author: 
Head of Office at the United Nations, United Nations University
This article was originally published at the Conversation.

“Top Misconceptions of Cryptocurrency as a Payment System”

 

Which can be read on Amazon Kindle Unlimited for Free  You can find more interesting articles by visiting us on one of the following platforms: AML Knowledge Centre (LinkedIn) or Anti-Bribery and Compliance at the Front-Lines (LinkedIn)