foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003...

95

Upload: others

Post on 11-Jul-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword
Page 2: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy i

Foreword

Page 3: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy iii

Table of Contents

Foreword ............................................................................................................................................................................... i

Table of Contents ............................................................................................................................................................... iii

Executive Summary ............................................................................................................................................................ 1

Introduction ..................................................................................................................................................................... 2

Goal 1: Safeguard the International Financing System from

Money Laundering and Terrorist Financing ........................................................................................................... 5

A. Blocking Assets and Cutting off Worldwide Channels of Terrorist Funding ............................................ 6

B. Establishing International Standards ........................................................................................................... 7

C. Ensuring Global Compliance with International Standards ...................................................................... 9

D. Addressing Financing Mechanisms of Particular Concern ...................................................................... 13

E. Facilitating International Information Sharing ......................................................................................... 17

F. Outreach and Cooperation with the Private Sector .................................................................................. 18

Goal 2: Enhance the United States Government’s Ability to Identify, Investigate and Prosecute Major Money Laundering Organizations and Systems ....................................................................... 19

A. Enhancing Interagency Coordination ........................................................................................................ 20

B. Ensuring that Law Enforcement Agencies and Task Forces Use and ShareFinancial Databases and Analytical Tools .................................................................................................. 21

C. Focusing Law Enforcement Personnel and Other Resources onHighest-Impact Targets and Financial Systems ......................................................................................... 21

D. Utilizing New and Improved Statutory and Regulatory Authorities ....................................................... 22

E. Increasing International Operational Cooperation .................................................................................. 23

F. Improving United States Government Interaction with the Financial Community .............................. 24

G. Helping State and Local Governments Investigate and Prosecute MoneyLaundering and Financial Crime Cases ..................................................................................................... 25

Goal 3: Ensure Effective Regulation ................................................................................................................................... 26

A. Strengthen and Refine the Anti-Money Laundering RegulatoryRegime for All Financial Institutions ......................................................................................................... 26

B. Improve the Effectiveness of Anti-Money Laundering Controls ThroughGreater Communication, Guidance, and Information ............................................................................. 28

C. Enhance Regulatory Compliance and Enforcement Efforts ..................................................................... 30

List of Appendices .............................................................................................................................................................. 33

Appendix A: Recent Significant Cases in the War Against Terrorist Financing (Goal 1) ......................................... 34

Appendix B: Comprehensive List of Joint Designations of Individuals and Entities asTerrorists or Terrorist Supporters (Goal 1) ............................................................................................ 37

Appendix C: Progress with Non-Cooperative Countries and Territories (NCCTs) (Goal 1) ...................... 38

Appendix D: Trade-Based Money Laundering and Terrorist Financing (Goal 1) ..................................................... 42

Appendix E: Recent Significant Money Laundering Cases (Goal 2) 45

Appendix F: Financial Crime-Free Communities (C-FIC) Support Program Grants (Goal 2) .............................. 48

Appendix G: Summary of the Anti-Money Laundering Provisions of the USA PATRIOTAct and the Steps Taken to Implement Them (Goal 1) ......................................................................... 49

Appendix H: Terrorist Financing Online (Goal 1) ....................................................................................................... 53

Appendix I: Money Laundering Defendants Sentenced in FY 2001 – Highlights (Goal 2) .................................... 81

Appendix J: International Asset Forfeiture Sharing (Goal2) ..................................................................................... 83

Treasury Forfeiture Fund .............................................................................................................. 84

Department of Justice forfeiture Fund ........................................................................................ 85

Page 4: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy 1

Executive Summary

The 2003 National Money Laundering Strategy reflects the U.S. government’s ongoing commitment to attackmoney laundering and terrorist financing on all fronts, including the formal and informal components of

both the domestic and international financial systems. Armed with important new authorities provided by theUSA PATRIOT Act, we are taking coordinated and aggressive action using all available tools, including law enforce-ment actions, appropriate financial regulation and oversight, and coordination with our private sector and interna-tional partners. While we continue to make significant progress, much remains to be done to confront theever-changing, global threat of money laundering and terrorist financing.

The 2003 Strategy represents a continuation of our past efforts, and a commitment to move forward byidentifying, disrupting, and dismantling high value terrorist financing and money laundering organizations andnetworks. The central tenet of our 2003 Strategy is the ever-increasing need for all relevant U.S. governmentagencies, our foreign government counterparts, and our partners in the private sector to pool our collectiveexpertise and coordinate our activities to stop the laundering of criminal proceeds and to staunch the flow offunds to terrorists. By attacking the financial infrastructure of complex criminal organizations and terroristnetworks, we do long term damage to their ability to perpetuate their operations.

To achieve these objectives, the 2003 Strategy focuses on three major goals: (1) to cut off access to theinternational financial system by money launderers and terrorist financiers more effectively; (2) to enhance theFederal government’s ability to target major money laundering organizations and systems; and (3) strengthenand refine the anti-money laundering regulatory regime for all financial institutions to improve the effectivenessof compliance and enforcement efforts.

The 2003 National Money Laundering Strategy includes, among other items, a commitment to accomplish thefollowing:

• Block and seize terrorist assets and identify and designate terrorist organizations. To date, over 315 terrorist-related entities have been designated and over $136 million in assets frozen.

• Target countries and institutions that facilitate money laundering and terrorist financing, including using thefull range of measures provided by Section 311 of the USA PATRIOT Act.

• Take law enforcement action against high value money laundering targets, including those with ties to majornarcotics trafficking operations.

• Improve the effectiveness of compliance and enforcement efforts to continue to strengthen and refine theanti-money laundering regulatory regime for all financial institutions by identifying new and emergingthreats that can be addressed through regulation, improving the effectiveness of anti-money launderingcontrols through greater communication, guidance, and information-sharing with the private sector, andenhancing regulatory compliance and enforcement efforts.

• Encourage foreign countries throughout the world to adopt and adhere to international standards to inhibitthe flow of illicit funds, both through the formal and informal financial sectors, and to assist in developing andenhancing anti-money laundering regimes in targeted countries to enable them to thwart terrorist financing.

• Improve the Federal government’s partnership with the private financial sector to increase information-sharing and close the gaps in the financial system that allow abuse by money launderers and terroristfinanciers.

Executive Summary

Page 5: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy2 Introduction

Introduction

The 2003 National Money Laundering Strategy bothtargets terrorist financing as a top priority and

directs improvement of our ongoing efforts to combatmoney laundering. It embodies our conviction,deepened by our growing experience in this area, thatthe broad fight against money laundering is integral tothe war against terrorism.

At the same time, the 2003 Strategy continues toembrace anti-money laundering efforts as key toattacking all kinds of other criminal activity, includingnarcotics trafficking, white collar crime, organizedcrime, and public corruption. Resources devoted tofighting money laundering and financial crimes reapbenefits far beyond addressing the financial crimesthey directly target. Financial investigations expose theinfrastructure of criminal organizations; provide aroadmap to those who facilitate the criminal activity,such as broker-dealers, bankers, lawyers and accoun-tants; lead to the recovery and forfeiture of illegally-obtained assets; and support broad deterrence againsta wide range of criminal activity. Thus, the 2003Strategy is intended to sharpen our ongoing efforts tocombat money laundering by ensuring that lawenforcement agencies and task forces use and share allavailable financial databases and analytical tools,focusing law enforcement personnel and other re-sources on high-impact targets and financial systems,and improving Federal government interaction withthe financial community.

Although money laundering and terrorist financingdiffer in certain ways,1 they share many of the samemethods to hide and move proceeds. Moreover, bothdepend on a lack of transparency and vigilance in thefinancial system. Accordingly, our efforts to identifyand target shared-methods to place, layer, and transfermoney -- such as by using the informal financialsector, including alternative remittance systems; bulk

currency shipments; money transmitters; moneychangers; and commodity-based trade--will help uscombat both those who launder criminal proceeds andthose who finance terrorism.

The 2003 Strategy recognizes that in an era thatcontinues to be plagued by terrorist attacks, theFederal government’s efforts to combat money laun-dering and terrorist financing necessarily take place inan environment where some of the personnel andother resources previously devoted to anti-moneylaundering enforcement have been redirected tocounter-terrorism activities. The 2003 Strategy strivesto meet this challenge and continue to achieve majorsuccesses against both terrorist financing and moneylaundering and financial crime, by leveraging ourresources in a variety of ways.

Enhanced coordination and information sharing areessential. The USA PATRIOT Act provided authorityto enhance the flow of financial information relevantto money laundering and terrorist financing (1) withinthe Federal government; (2) between the governmentand financial institutions; and (3) among the financialinstitutions themselves. Under the 2003 Strategy, weare utilizing these new authorities to forge dynamicnew partnerships across all relevant governmentagencies and the financial sector to combat terroristfinancing and money laundering.

To enhance the Federal government’s efforts to combatterrorist financing, money laundering, and otherfinancial crimes, on March 3, 2003, the Department ofthe Treasury established the Executive Office ofTerrorist Financing and Financial Crimes (EOTF/FC).This new office works closely with other Treasuryoffices, other Federal and state government agencies,foreign government counterparts, and the privatesector to prevent terrorists and other criminals from

1 Briefly, money laundering depends on the existence of an underlying crime, while terrorist financing does not. Methods for raisingfunds to support terrorist activities may be legal or illegal, and the transactions tend to be smaller and much less observable than, forexample, the typical narcotics money laundering transaction. Moreover, money laundering investigations are initiated to achieveprosecution and forfeiture. Terrorist financing investigations share these objectives; however, their ultimate aim is to identify, disrupt andcut off the flow of funds to terrorists, whether or not the investigation results in prosecutions.

Page 6: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy 3Introduction

abusing the domestic and international financialsystems and to identify, block, and dismantle sourcesof terrorist financing.

The 2003 Strategy directs law enforcement to leverageassets by focusing efforts on high-impact targets, suchas terrorist fundraisers and the heads of narcoticsmoney laundering organizations. In this latter area,Federal law enforcement agencies are workingcollaboratively to develop a unified national list ofdrug organization targets, called the “ConsolidatedPriority Organization Target List” (CPOT), whichtargets those believed to be primarily responsible forthe domestic drug supply. This effort allows lawenforcement to focus collective investigative resourceson particular high impact targets, including majordrug money launderers.

Significantly, law enforcement will aggressively exploitthe points of common vulnerability between “ordi-nary” criminal money laundering and terrorist financ-ing. A recent North Carolina-based cigarette smug-gling case exemplifies this kind of synergy. The casebegan when local law enforcement in North Carolinaobserved activity that led them to suspect inter-statecigarette smuggling and shared this information withFederal law enforcement. Thereafter, Federal Bureauof Investigations (FBI) intelligence agents, Alcohol,Tobacco and Firearms (ATF) and Internal RevenueService-Criminal Investigation (IRS-CI) agents, withcontinuing close cooperation from local and Canadianlaw enforcement, conducted an investigation thatrevealed a massive cigarette smuggling and tax evasionscheme, in which Lebanese members of a Charlotte,North Carolina, Hizballah Cell were smugglinguntaxed cigarettes from North Carolina to Michiganand using the proceeds to provide financial supportand military equipment to terrorists in Beirut,Lebanon. The case culminated in Federal prosecutorsconvicting 18 people for material support of terrorismand other crimes involved in the smuggling scheme.The lead defendant, Mohammed Hammoud, wassentenced in February 2003, to 155 years in prison.

Similarly, pursuant to the 2003 Strategy, we will takefull advantage of the combination of regulatory andcriminal enforcement, including the vital role playedby the financial sector in helping to deter and detectmoney laundering and terrorist financing. A robustregulatory system is essential to the success of our

anti-money laundering/counter-terrorist financingefforts. The USA PATRIOT Act expanded our anti-money laundering regime to all financial institutionsby requiring the establishment of anti-money launder-ing programs, creating the requirements for customeridentification/verification programs, and enhancingrecordkeeping and suspicious activity reportingrequirements. The 2003 Strategy takes full advantageof the greater transparency and more effective regula-tory scrutiny the USA PATRIOT Act made possible tostrengthen the partnership between government andthe financial sector, in order to identify and combatterrorist financing and money laundering.

Over the past year, the Treasury Department, throughthe Financial Crimes Enforcement Network (FinCEN),has issued many of the regulations necessary toimplement the Act’s various anti-money laundering/terrorist financing provisions, further enhancing thecivil regulatory regime. These implementingregulations make financial transactions moretransparent, provide the government with moreinformation about financial activity in new sectors,and deter misuse of the U.S. financial system bymoney launderers and terrorists. They also promotecloser cooperation between the public and privatesector. By requiring financial institutions toconcentrate enhanced due diligence and suspiciousactivity monitoring on terrorist financing and moneylaundering schemes or typologies, they enablefinancial institutions to provide a much moreeffective first line of defense against moneylaundering, terrorist financing, and other financialcrime. The information provided by financialinstitutions under the PATRIOT Act not only helpsprevent money laundering and other financial crime,but also plays an important role in creating the type ofaudit trail that law enforcement can use to investigatemoney laundering and terrorism financing.

Continuing improvement of international cooperationis vital to law enforcement’s efforts to combat terroristfinancing and money laundering alike. In particular,the United States continues to pursue bilateral andmultilateral designations of terrorist-related entities toblock assets and cut off worldwide channels of terror-ist funding. The United States plays a primary role insetting international standards to address moneylaundering and terrorist financing by working throughthe Financial Action Task Force (FATF) and the FATF-

Page 7: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy4 Introduction

style regional bodies (FSRBs). In this role, the unitedstates continues to facilitate FATF’s close collaborationwith the World Bank, the International MonetaryFund (IMF), the UN Counter Terrorism Committee(UN/CTC), and other multilateral bodies to ensurethat countries are assessed against their anti-moneylaundering/counter-terrorist finance regimes based onthe FATF standards and are identified to receivepriority technical assistance to enable full compliancewith the standards.

The 2003 Strategy seeks to guide improvement in theanti-money laundering/counter terrorist financingregimes in foreign jurisdictions through bilateraloutreach and technical assistance programs, as well as,through coordination with the international donorcommunity. Our efforts will be backed, if necessary,by the authority provided by the USA PATRIOT Actto designate a foreign jurisdiction, foreign financialinstitution, type of international transaction, or typeof account as a “primary money laundering concern,”and to require U.S. financial institutions to takespecified countermeasures. The United States alsowill work to strengthen multilateral and bilateral lawenforcement cooperation on an operational level,including international information sharing andmutual legal assistance.

For 2003, the National Money Laundering Strategy hasthree overarching Goals:

1. Safeguard the International Financial Systemfrom Money Laundering and TerroristFinancing

2. Enhance the United States Government’s Abilityto Identify, Investigate, and Prosecute MajorMoney Laundering Organizations and Systems

3. Ensure Effective Regulation

Each of these Goals builds on the strategic frameworkand developments from previous strategies, and eachis discussed in greater detail belowrecent achieve-ments, as discussed in greater detail below.

Page 8: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy 5Goal 1

Goal 1“Safeguard the International Financial System

from Money Laundering and Terrorist Financing”

Introduction

The modern financial system of the United States, likethat of other developed nations, is vitally and insepa-rably integrated with the entire international financialsystem. This underlying reality means that interna-tional cooperation is critical to addressing the threatsof terrorist financing and money laundering. Sinceboth the formal and informal sectors of the interna-tional financial system can be accessed from virtuallyany point on the globe, it will continue to be suscep-tible to abuse by terrorist and criminal organizationsunless countries throughout the world work togetherto identify, attack and punish its abuse. Accordingly,the United States will continue to rely heavily upon,and promote, close cooperation with our internationalpartners to achieve collective success.

Our efforts to combat terrorist financing and moneylaundering require that we utilize our intelligence, lawenforcement, and administrative powers. Amongother things, they involve broadening and strengthen-ing the legal, financial, and regulatory infrastructure ofcountries around the world to better secure theinternational financial system against abuse by terror-ist groups and other criminal organizations.

The 2003 Strategy for denying terrorist and othercriminal organizations use of the internationalfinancial system focuses on six objectives for our workdomestically and within the multilateralorganizations:

◊ Blocking terrorist and illicit assets and cuttingoff worldwide channels of terrorist and illicitfunding.

◊ Establishing and promoting internationalstandards to be adopted by countries to ensurethat their financial systems are adequatelyprotected from abuse by terrorist and othercriminal organizations.

◊ Ensuring that countries throughout the worldconsistently implement these internationalstandards.

◊ Focusing efforts on financing mechanismssuspected of being of particular use by terroristand other criminal organizations.

◊ Facilitating international information sharing.

◊ Enhancing outreach and cooperation with theprivate sector.

This comprehensive strategy has achieved significantresults with respect to the fight against terrorist financ-ing. These results are described in Appendix A, and aresummarized below. Among the noteworthy achieve-ments are the following:

• 315 terrorist-related entities and individualsare currently designated by the United Statespursuant to E.O. 13224. The internationalcommunity has frozen over $136 million inover 1400 accounts and transfers worldwide.

• 170 countries have blocking orders in forceagainst the assets of terrorists, and 52 countrieshave submitted names to the United NationsSanctions Committee for designation.

• In October 2002, fifty (50) nations combinedto jointly designate Jemaa Islamiya (JI), an al-Qaida related terrorist network in SoutheastAsia, as a terrorist group -- the most wide-spread show of support of any terroristdesignation to date.

• Since September 11, 2001, the estimatedworldwide total of assets seized pursuant toinvestigations with a possible terrorist link hasrisen to over $60 million .

Page 9: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy6 Goal 1

• Since September 11, 2001, the Department ofJustice has prosecuted over 45 individuals for“providing material support” to terrorists orfor operating illegal transmitting businesseswhich illegally transferred millions of dollarsto Iraq and other Middle Eastern countries.These cases include:

◊ On February 19, 2003, a Federal grandjury indicted Professor Sami Al-Arian,three overseas leaders of PalestinianIslamic Jihad (PIJ), and four members ofthe Tampa, Florida, PIJ cell headed by Al-Arian, for conspiracy to commit racketeer-ing, murder, and for knowingly providingmaterial support to PIJ, a designatedforeign terrorist organization (FTO). PIJis a Syrian-based organization that, as partof the Palestinian-Israeli conflict, hasengaged in a campaign of suicide bomb-ings and armed attacks that have killedhundreds of innocent people, includingAmerican tourists traveling in Israel.

◊ On December 18, 2002, a Federal grandjury in Dallas, Texas, returned a superced-ing indictment (following an initialindictment in February 2002), chargingGhassen Elashi, the chairman of the HolyLand Foundation for Relief and Develop-ment and HAMAS leader Mousa AbuMarzook, the Holy Land Foundation’smost significant early donor, for prohib-ited financial dealings with terrorists.

◊ On February 10, 2003, Enaam Arnaout,Executive Director of the BenevolenceInternational Foundation, pleaded guiltyin Chicago to operating his charity as aRacketeer Influenced Corrupt Organiza-tion (RICO) enterprise and failing to telldonors that their money was being used tosupport violent jihad.

◊ On February 26, 2003, a Federal prosecu-tor unsealed criminal charges and broughtcriminal cases against persons in Syracuse,New York and Boise, Idaho, for allegedlyfinancing terrorism through charitiesknown as “Help the Needy” and “TheIslamic Association of North America.”

◊ Federal prosecutors, supported by FBI,ATF and IRS-CI agents, with close coop-eration from local and Canadian lawenforcement, convicted 18 people formaterial support and other crimes in-volved in a massive cigarette smugglingand tax evasion scheme, in which Leba-nese members of a Charlotte, NorthCarolina, Hizballah Cell smuggled un-taxed cigarettes from North Carolina toMichigan and used the proceeds toprovide financial support and militaryequipment to terrorists in Beirut,Lebanon. The lead defendant,Mohammed Hammoud, was sentenced onFebruary 20, 2003, to 155 years in prison.

• In March 2003, federal prosecutors in Brook-lyn unsealed indictments against two Yemeninationals, including Mohammed Ali-Hassanal-Moayad who boasted that he had providedsome $20 million to Usama bin Laden, forengaging in a plot to raise funds from U.S.sources for al Qaida and HAMAS. Theseindividuals are in German custody, and theUnited States is seeking their extradition.

• Since October 2001, the U.S Bureau of Immi-gration and Customs Enforcement (BICE) hasseized over $28 million in bulk cash smugglingas a result of enhanced targeted efforts tocapture illicit cross-border flows of moneythat may be related to terrorism.

A. Blocking Assets and Cutting off WorldwideChannels of Terrorist Funding

Identifying and interdicting terrorist assets in order toprevent terrorist activities will always be a primaryobjective of the U.S. international strategy. The U.S.government will continue to work with our partnersabroad to freeze the assets of terrorist supporters andnetworks. This objective requires unparalleled coop-eration, not only among our allies throughout theworld, but among all parts of the United States gov-ernment dedicated to this endeavor -- from intelli-gence and law enforcement to the diplomatic andregulatory communities.

Public designation of terrorist-related entities andblocking of assets has been a highly visible weapon in

Page 10: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy 7Goal 1

the financial war on terrorism. The 2003 Strategy callsfor us to continue to wield this weapon against terror-ists and their supporters and facilitators in order toprevent the collecting, receiving, consolidating,managing and moving of assets through the world’sfinancial system.

Currently, 315 individuals and entities are designatedunder the U.S. Executive Order 13224 as terrorists orterrorist supporters, and 36 are designated as ForeignTerrorist Organizations (FTOs), and more than $136million worldwide has been frozen, as a result of (1)the UN 1267 Sanctions Committee’s continuousefforts to add names to its list of al Qaida-linkedindividuals and entities whose assets UN members areobligated to freeze and (2) our ability to persuadeother nations to follow U.S. domestic designation/blocking efforts.2 On numerous occasions, the UnitedStates has also sought to designate jointly, with ourallies, individuals and entities as terrorists or terroristsupporters. A comprehensive list of all joint designa-tions can be found in Appendix B.

U.S. designation efforts are underscored by the obliga-tions imposed by United Nations Security CouncilResolutions (UNSCRs) 1373 and 1455. UNSCR 1373obliges all member states, among other things, to,freeze the assets of all terrorists without delay;criminalize the financing of terrorism; and preventtheir nationals or other persons from providingmaterial support or safe haven to terrorists. UNSCR1455 is directed specifically at terrorists and terroristsupporters linked to al Qaida, Usama bin Laden(UBL), and the Taliban. UNSCR 1455 establishes andprovides for ongoing updating of a list of al Qaida,UBL, and Taliban-linked individuals and entitieswhose assets member states are obligated to freeze.The United States has been by far the largest contribu-tor of names to this list to date, yet as a result of ourinternational efforts, many other allies are now takingtheir own actions, pursuant to their own investiga-tions, to crack down on the individuals and entitiesthat support these terrorist networks.

The U.S. and international actions to designate terror-ists and their supporters publicly do much more thansimply freeze specific terrorist-related assets. They

also (1) help shut down the pipeline through whichdesignated parties move money and operate finan-cially in mainstream financial sectors; (2) inform thirdparties, who may be unwittingly financing terroristactivity, of their association with supporters of terror-ism; (3) deter non-designated parties, who mightotherwise be willing to finance terrorist activity; (4)expose terrorist financing “money trails” that maygenerate leads to previously unknown terrorist cellsand financiers; (5) force terrorists to use potentiallymore costly and/or less efficient or reliable informalmeans of financing their activities; and (6) supportour diplomatic efforts to strengthen other countries’capacities to combat terrorist financing throughadopting and implementing legislation to comply withthe obligations of UNSCRs 1455 and 1373.

B. Establishing International Standards

The measures described above target funds that havealready entered the international financial system.Establishing international standards and ensuringtheir effectiveness is a long term element of thisStrategy. It is designed to make it more difficult andexpensive for criminals and terrorists to access theinternational financial system in the first place, and tomake their fund movements more transparent if andwhen they do so.

We will continue to work diligently through theFinancial Action Task Force (FATF) – the premierstandard--setting body in the international campaignagainst money laundering and terrorist financing.Created by the G-7 in 1989, the FATF has since grownto 33 members, along with numerous observers,including the United Nations, IMF, and World Bank.FATF’s primary mission is to articulate internationalstandards for countries to adopt and implement in theareas of money laundering and terrorist financing, andto seek the greatest possible level of worldwide compli-ance with these standards.

The next two sections discuss the development ofFATF’s international standards – the Forty Recom-mendations on Money Laundering and the EightSpecial Recommendations on Terrorist Financing –

2 An aggregate of over $36 million in terrorist-related assets has been frozen since September 11, 2001 in the United States alone. Due tothe collapse of the Taliban and the granting of licenses to designated entities, approximately $30 million has been unfrozen and, atpresent, the U.S. has $5.7 million frozen.

Page 11: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy8 Goal 1

which, when taken together, represent the full range ofmeasures that countries should have in place tocombat money laundering and terrorist financing.They are followed by a section that discusses themeasures that FATF, the United States, and the inter-national community at large have taken to maximizethe level of worldwide compliance with these stan-dards.

The FATF Forty Recommendations onMoney Laundering

The FATF Forty Recommendations on MoneyLaundering (the Forty Recommendations) representthe international standard for anti-money launderingregimes. They cover the complete range of measuresthat should be included in a national anti-moneylaundering regime, and focus on such areas as regula-tory controls, supervisory mechanisms, and criminallaws, as well as international cooperation.

The Forty Recommendations were first articulated inthe early 1990s and updated in 1996. As they havebeen applied and implemented throughout the world,ambiguities and gaps have been identified. Moreover,money laundering methods and techniques change asnew measures to combat money laundering areimplemented and new technologies are developed.Therefore, in 2001, FATF embarked on a review ofthe Forty Recommendations to ensure that theyremain comprehensive and up-to-date. This majorinternational undertaking culminated in June 2003,when the FATF unveiled the revised FortyRecommendations that substantially expand thescope and enhance the effectiveness of the interna-tional anti-money laundering standards. The revisionalso provided an opportunity for other countries tobenefit, as the United States has, from the key anti-money laundering provisions of the USA PATRIOTAct, including tighter controls on foreign correspon-dent banking and transactions with foreign politicalofficials.

The more significant revisions include the following:

Expansion of the predicate offenses that mustbe covered by a criminal money launderingstatute.

Tougher customer due diligence requirements,including those that relate to the identificationof the beneficial owners of corporate vehicles.

Extension of appropriate anti-moneylaundering requirements to the full range offinancial institutions and to other professionsthat serve as gateways to the financial system.

Tighter requirements relating to correspon-dent banking, third party introducers, foreignpolitical officials, and the issuance of bearershares.

Banning of shell banks worldwide.

Requirements to establish financialintelligence units.

Enhanced international cooperation related tomoney laundering.

As will be discussed in more detail below, the revisedForty Recommendations represent the new interna-tional standard with which countries around the worldshould endeavor to comply, and against which theywill be assessed by the international community,including such international bodies as the IMF and theWorld Bank.

The FATF Eight Special Recommendations onTerrorist Financing

Though highly relevant to an effective counter-terrorist financing regime, the Forty Recommenda-tions generally focus on the broader fight againstmoney laundering. In response to the September 11,2001 terrorist attacks, and under the leadership of theUnited States, the FATF expanded its mandate toaddress terrorist financing specifically to ensure thatinternational standards covered all measures necessaryto combat terrorist financing. On October 31, 2001,the FATF issued the Eight Special Recommendationson Terrorist Financing. The Eight Special Recommen-dations now represent the international standard forcounter-terrorist financing regimes in the same waythat the Forty Recommendations represent the inter-national standard for anti-money laundering regimes.

Page 12: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy 9Goal 1

The Eight Special Recommendations state that coun-tries should take the following measures as interna-tional standards for countering terrorist financing:

I. Ratify the UN International Convention forthe Suppression of the Financing of Terror-ism and implement relevant UN Resolutionsagainst terrorist financing.

II. Criminalize the financing of terrorism,terrorist acts, and terrorist organizations.

III. Freeze and confiscate terrorist assets.IV. Require financial institutions to report

suspicious transactions linked to terrorism.V. Provide the widest possible assistance to

other countries’ law enforcement and regula-tory authorities for terrorist financinginvestigations.

VI. Extend anti-money laundering requirementsto alternative remittance systems.

VII. Require financial institutions to includeaccurate and meaningful originator informa-tion in money transfers

VIII. Ensure that non-profit organizations cannotbe misused to finance terrorism.

Given the novelty of some of the issues incorporatedinto these new standards, the FATF has been workingto elaborate on the Eight Special Recommendations byissuing interpretative notes and best practice guidanceto assist countries in applying the Special Recommen-dations.

To date, the FATF has issued:

An interpretative note on Special Recommen-dation VI establishing the minimum legal andregulatory requirements to which all money orvalue transfer services should be subjected.

A draft best practices paper on Special Recom-mendation VI providing guidance on the fullrange of measures for countries to considerwhen establishing a regulatory regime for ARS,such as hawala.

An interpretative note on Special Recommen-dation VII articulating the scope of therequirement and specifying the precise infor-mation that must be included in wire trans-fers.

A draft best practices paper on Special Recom-mendation VIII calling for increased transpar-ency and oversight of charities to ensure thatfinanciers of terrorism cannot misuse non-profit organizations.

In the coming months, FATF plans to issue aninterpretative note and best practices paper onSpecial Recommendation III to establish the stepsnecessary to implement effectively a terrorist assetblocking and confiscation regime. The UnitedStates will continue to lead and support theseefforts to elucidate and implement these specialrecommendations.

In the field of international standard setting, theUnited States is also sponsoring and supporting aneffort in the Organization of American States(OAS) to modify the Inter-American Drug AbuseControl Commission (CICAD) Model Regulationson Money Laundering to reflect the need toaddress the problems of terrorist financing. Underthe U.S. presidency, the OAS CICAD ExpertsWorking Group met in June 2003 to draft terroristfinancing related amendments to the ModelRegulations that will be based on the FATF stan-dards and the related UN Security CouncilResolutions concerning terrorist financing.

C. Ensuring Global Compliance withInternational Standards

Establishing international standards is only the firststep toward denying terrorists and criminals access tothe international financial system. Without vigorousand consistent implementation of these standardsthroughout the globe, terrorists and criminals willenter the international financial system at the point ofleast resistance, and preventive national efforts will berendered considerably less effective.

Ensuring global compliance with international stan-dards is accomplished through a three-prong strategythat includes: (i) objectively assessing all countriesagainst the international standards; (ii) providingcapacity-building assistance for key countries in need;and (iii) ensuring appropriate consequences forcountries and institutions that fail to take reasonable

Page 13: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy10 Goal 1

steps to implement standards to prevent terroristfinancing and money laundering.

Global Assessments

The IMF and the World Bank

At the 2001 Annual Meeting of the IMF, World Bankand the FATF Style Regional Bodies in late September2001, the United States and the G-7 stressed theimportance of integrating anti-money laundering andcounter-terrorist financing issues into the interna-tional financial institutions’ financial sector assess-ments, surveillance, and diagnostic activities. As aresult, and after a year of preparatory work among theFATF, the IMF and World Bank, in the fall of 2002, theExecutive Boards of the IMF and World Bank en-dorsed a 12 month pilot project to assess globalcompliance with the anti-money laundering andcounter-terrorist financing standards articulated bythe FATF.

These assessments are being conducted by the IMFand World Bank, in the context of their financialsector assessment programs. The FATF and the FSRBsare participating in these assessments. By October2003, between 46 and 56 assessments are expected tobe completed during the project using this methodol-ogy. As of mid-May 2003, half the assessments were inprogress. The United States will support efforts tomake these assessments a permanent part of IMF andWorld Bank surveillance.

FATF

The FATF itself not only sets anti-money launderingand counter-terrorist financing standards, but alsoassesses countries against these standards. As dis-cussed below, FATF further ensures appropriateconsequences for countries that do not cooperate withinternational efforts.

The FATF is active in the following assessmentinitiatives:

• As a condition of membership, FATF membersare obliged to participate in a peer reviewprocess called “mutual evaluations.” Through

this process, FATF members assess each otheragainst the FATF standards, and develop plansto enhance each member’s compliance

• As discussed above, FATF participates in theIMF/World Bank pilot program by providingexperts for various assessment missions

• At its June 2003 Plenary, FATF announced itsplans to work cooperatively with the interna-tional donor community – represented by thenewly established Counter-Terrorism ActionGroup (CTAG) – and the United Nations toassess countries’ compliance with the areas ofoverlap between the Eight Special Recommen-dations and the requirements of UNSCR 1373

FATF-Style Regional Bodies

FATF membership is limited to 33 members. There isalso a small group of countries that are candidates formembership in the coming years. Participation in theinternational FATF system, however, is not limited,and over 100 countries throughout the world aremembers of FATF-Style Regional Bodies (FSRBs).These FSRBs participate as observers in all FATFmeetings; assess their members against the FATFstandards; and in many cases, participate in the IMF/World Bank assessment program. Currently, there aresix FSRBs:

• Asia/Pacific Group Against Money Laundering(APG)

• Caribbean Financial Action Task Force(CFATF)

• Eastern and Southern African Anti-MoneyLaundering Group (ESAAMLG)

• GAFISUD (covering South America)

• Inter-Governmental Action Group againstMoney Laundering (GIABA) (covering WestAfrica)

• Moneyval (covering Central and EasternEurope)

Page 14: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy 11Goal 1

In addition, Central Asian and Middle EasternCountries are working with the FATF to establishFSRBs. The establishment of such groups will be animportant part of the U.S. government strategy toexpand the scope of anti-money laundering andcounter-terrorist financing efforts throughout theworld using these bodies. The United states willcontinue to leverage the existance of FSRB’s to expandthe establishment of internationally-established anti-money laundering regimes throughout the world.

Capacity Building

In an effort to ensure global compliance with interna-tional standards, the United States helps build capacity,both bilaterally and through a number of differentmultilateral fora. On a bilateral basis, the United Statesregularly delivers anti-money laundering and counter-terrorist financing technical assistance, includinglegislative drafting, FIU development, judicial andprosecutorial training, financial supervision, andfinancial crime investigatory training. the U.S. govern-ment will build on its assistance efforts to date and willcontinue to deiver needed technical assistance aroundthe world. Recent examples of bilateral anti-moneylaundering technical assistance include:

• In February 2003, an interagency U.S. team joinedseveral FATF counterparts in assisting the Philip-pines to draft anti-money laundering legislationthat meets international standards. Enactment ofthis legislation by the Philippines legislature, andits signing into law by President Arroyo, allowedthe Philippines to successfully avoid the imposi-tion of counter-measures by the FATF.

• In December 2002, an interagency U.S. teamvisited Turkey to help strengthen that country’scounter-terrorist financing capabilities. TheUnited States provided guidance on drafting newlegislation to comply effectively with U.N. Resolu-tion 1373, and on creating a separate entity toadminister blocking orders.

• In May 2003, the United States assisted Serbia inenacting its anti-money laundering law; creatingan FIU, and assessing the FIU’s technical assistanceneeds, including analytical training and IT net-work guidance. The U.S. delegation proceeded to

Podgorica, Montenegro, to assess progress on theMontenegrin anti-money laundering regime,construct a timeline by which legal and opera-tional measures could be expected to be imple-mented, and gauge the current and futureMontenegrin needs.

• From 2002-2003, a Treasury resident advisor andDOJ attorney provided Russian officials andlegislators with a variety of anti-money launderingassistance. This assistance included advice onwriting anti-money laundering legislation to meetinternational standards, developing regulatorypolicy, and establishing Russia’s Financial Intelli-gence Unit--the Financial Monitoring Committee(FMC)-- to monitor financial transactions.Russia’s efforts to be removed from the FATF NonCooperative Countries and Territories (NCCT) listwere successful, and Russia became a full memberof the FATF in June 2003. Russia’s FMC is a fullmember of the Egmont Group of FinancialIntelligence Units.

• In 2002-2003 , an attorney from DOJ’s AssetForfeiture and Money Laundering Section(AFMLS) conducted several consultations with theGovernment of Albania regarding the moneylaundering and terrorist financing investigation ofa UN Security Resolution listed person and theassets that were frozen pursuant to that investiga-tion. In addition, AFMLS attorneys worked closelywith the Ministries involved in drafting the newmoney laundering legislation, providing com-ments and advice, and finally met with the mem-bers of Parliament responsible for passing thelegislation. Based upon this final meeting, thegovernment agreed to revise parts of the law andsubmit it to a vote. The law was subsequentlyenacted.

• The United States has provided several countrieswith regulatory training, training related to trade-based money laundering, and financial investiga-tive training.

In addition to its bilateral efforts, the United States haspressed for increased international burden sharing inthe anti-money laundering/terrorist financing area,and has participated in the establishment of CTAG tocoordinate the international provision of anti-terror-

Page 15: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy12 Goal 1

ism training and technical assistance. Terrorism andinternational crime present a significant worldwidethreat. Donor countries throughout the world musttherefore join in ensuring that key developing countrieshave the capacity to protect their financial systems.Under the 2003 Strategy, the United States will workintensively with our partners in the international donorcommunity over the next year to ensure that mecha-nisms exist to coordinate the delivery of technicalassistance and allow forappropriate burden sharing.

As noted above, the United States, along with other G-7countries, has emphasized the need for the IMF andWorld Bank to increase their involvement in strength-ening financial regulatory frameworks and to provideanti-money laundering and counter-terrorist financingtechnical assistance. The Executive Boards of the IMFand World Bank have responded by calling for bothinstitutions to provide more technical assistance tomembers, particularly for capacity building andenhancing legal and institutional frameworks. Thegrowing number of anti-money laundering andcounter-terrorist financing assessments being con-ducted by these institutions will provide the basis formore systematic identification and prioritization oftechnical assistance needs. In addition, the WorldBank, along with the IMF, has been leading the effort toestablish an international mechanism for informationsharing in order to coordinate and optimize thedelivery of technical assistance.

Each of these efforts will be important in building thecapacity of countries worlwide to ensure their ability tocomply with established international standards.

Targeting Countries and Institutions That Fail toImplement Anti-Terrorist Financing and MoneyLaundering International Standards

As important as it is to establish international stan-dards and to assist countries in their complianceefforts, it is equally imperative that countries refusingto cooperate face appropriate consequences. Ideally,these consequences arise from multilateral processes.However, the United States always reserves the right touse the tools provided by Congress to safeguard itsfinancial sector from abuse by terrorists and criminals.The most important of these tools -- both multilateraland domestic -- play a significant role in the 2003Strategy, and are discussed below.

The FATF Non-Cooperative Countries and Territories(NCCT) Process

Since 2000, the FATF has been engaged in a majorinitiative to identify NCCT’s in the fight against moneylaundering. Specifically, this has involved developing aprocess to identify critical weaknesses in anti-moneylaundering systems that serve as obstacles to interna-tional cooperation in this area. The aim of this processis to reduce the vulnerability of financial systems tomoney laundering by ensuring that all jurisdictionsadopt and implement sufficient measures for theprevention, detection, and punishment of moneylaundering.

In June 2000, the FATF issued an initial list of 15NCCT jurisdictions. One year later, in June 2001, fourcountries – the Bahamas, the Cayman Islands,Liechtenstein, and Panama – were removed from thelist after implementing significant reforms to theiranti-money laundering regimes. At the same time,Burma, Egypt, Guatemala, Hungary, Indonesia andNigeria were added to the list. In September 2001, theFATF identified two new jurisdictions – Grenada andUkraine – as non-cooperative. Since then, FATF hasremoved 9 more of the listed countries – Dominica,Grenada, Hungary, Israel, Lebanon, the MarshallIslands, Niue, St. Kitts and Nevis and St. Vincent andthe Grenadines – from the NCCT list after theyimplemented significant reforms. As a result ofpressure created by the listing process, many of the 10countries remaining on the NCCT list have nowenacted most, if not all, of the necessary anti-moneylaundering legislation, and several of these countriesare also now working toward implementing their newregimes. Most of the other countries on the list areactively engaged in enacting legislative reforms. Asummary of the reforms each country has enacted canbe found in Appendix C.

The United States will continue to work within thecontext of this process to pressure governments tomake necessary changes to their relevant laws andpreactices to ensure compliance with internationalstandards and expectations.

USA PATRIOT Act Section 311

Section 311 of the USA PATRIOT Act authorizes theSecretary of the Treasury -- in consultation with theAttorney General and the Secretary of State -- to

Page 16: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy 13Goal 1

designate a foreign jurisdiction, institution, class oftransaction, or type of account as a “primary moneylaundering concern.” This authority allows theSecretary to require U.S. financial institutions to takeone or more special measures with respect to suchdesignation. Once such a designation has been made,there are five specific special measures that can beimposed, either individually, jointly or in anycombination:

• Enhanced record-keeping and reporting of certainfinancial transactions

• Information relating to beneficial ownership

• Information relating to certain payable-throughaccounts

• Information relating to certain correspondentaccounts

• Prohibitions or conditions on opening ormaintaining certain correspondent or payable-through accounts

To date, the United States has twice invoked Section311 in support of the FATF NCCT process. In Decem-ber 2002, in response to FATF’s call for countermea-sures on Ukraine and Nauru, the Treasury Depart-ment began the Section 311 process by formallydesignating those two jurisdictions as primary moneylaundering concerns, and announcing the intention toapply one of the statutory special measures. Ukraineresponded to this designation by quickly enactinganti-money laundering legislation that met interna-tional standards, resulting in FATF lifting its call forcountermeasures and obviating the need for theUnited States to proceed with the Section 311 process.FATF and the United States will continue to monitorthe situation in Ukraine to ensure that the new law iseffectively implemented.

Nauru, a jurisdiction that has provided licenses toseveral hundred shell banks, did not move as quicklyas Ukraine to address its deficiencies. As a result, onApril 17, 2003, the Department of the Treasury issueda Notice of Proposed Rulemaking, which, whenfinalized, will require U.S. financial institutions toterminate correspondent relationships with Nauru-

licensed institutions. Since then, Nauru has enactedlegislation that it claims will eliminate all Nauru-licensed shell banks within six months. The UnitedStates will continue to examine the situation in Nauruto ensure that the Nauru financial sector does notprovide criminals a point of entry into the interna-tional financial system.

Section 311 is also available to target entities beyondthose called for by the FATF NCCT process. As statedabove, the provision authorizes the Secretary of theTreasury to target not just foreign jurisdictions, butalso foreign institutions, classes of transactions, ortypes of accounts. In the coming year, the TreasuryDepartment will examine the use of this authority totarget foreign institutions involved in facilitatingmoney laundering or terrorist financing.

D. Addressing Financing Mechanisms ofParticular Concern

In addition to the broad international initiativesdescribed above, the United States will continue tofocus on specific financing mechanisms that areparticularly vulnerable or attractive to terroristfinanciers and money launderers. The U.S. govern-ment will employ a variety of interagency collabora-tive efforts, including Organized Crime Drug Enforce-ment Task Forces (OCDEF); High Intensity FinancialCrimes Areas (HIFCAs); High Intensity Drug Traf-ficking Areas (HIDTAs); and Suspicious ActivitiesReports (SAR) Review Teams to identify criminalactivities, the proceeds of which might be used tofinance terrorism.

In this regard, the 2003 Strategy will particularly focuson the following:

Charities

Curtailing the practice of financing terror throughostensibly charitable institutions is an importantelement in the global fight against terrorist financing.To address this problem, the United States is takingaggressive measures to (1) identify and shut downthose charities that have ties to terrorist organizations;and (2) prevent legitimate charities from being abusedby terrorist financiers without disturbing legitimatecharitable donations and charitable work.

Page 17: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy14 Goal 1

Under the authority of Executive Order 13224, theUnited States has designated 23 charitable organiza-tions as having ties to al Qaida or other terroristgroups, including the Holy Land Foundation for Reliefand Development that acted as a funding vehicle forthe HAMAS terrorist organization. Many of ourinternational partners have also closed down suspectcharities, often seizing their assets and/or arresting theindividuals responsible for the abuse of theseorganizations.

Internationally, we have worked bilaterally with keyjurisdictions, and also multilaterally through the FATF,to prioritize this issue. As noted above, a key step inthis process involves the FATF’s articulation of SpecialRecommendation VIII as an international standard,and its issuance of a best practices paper on theprotection of charities and other non-profit organiza-tions (SR VIII). Pursuant to the establishment of thesestandards, several jurisdictions, including the GulfStates, have undertaken actions to monitor how theircharitable organizations operate, especially in conflictzones, in order to protect them from abuse or infiltra-tion by terrorists and their supporters.

Domestically, we are working with the private non-profit sector to develop self-monitoring mechanismsfor charitable and non-governmental organizations.Treasury officials have met with charitable sectorwatchdog and accreditation organizations, includingthe Better Business Bureau Wise Giving Alliance and theInternational Committee on Fundraising Organizations,to raise their awareness of the threat posed by terroristfinancing. In addition, in 2002, the Treasury Depart-ment developed voluntary best practices guidelines forall U.S.-based charities. The guidelines, which areconsistent with the principles espoused by the FATFand in the private sector, focus on financial controlsand vetting of potential foreign recipients. They callfor rigorous, self-imposed financial oversight; highlevels of disclosure and transparency; and immediatesevering of all ties to any foreign recipient associated

with a terrorist organization. Although wholly volun-tary, if implemented with sufficient resources anddiligently adhered to in practice, the guidelines offer ameans by which charities can protect themselvesagainst terrorist abuse, enhance donor confidence, andsignificantly reduce the risk of a blocking order.

Hawala/Alternative Remittance Systems

The terrorist attacks of September 11, 2001 broughtinto sharp focus the ease with which terrorist finan-ciers and other criminals can use alternativeremittance systems (ARS), also known as informalvalue transfer systems (IVTS), or hawala,3 to move andlaunder large amounts of money quickly and surrepti-tiously. The very features that make hawala attractiveto legitimate customers – efficiency, reliable access toremote or under-developed regions, potential ano-nymity, and low cost – also make the system attractivefor the transfer of criminal proceeds or terrorist-related funds. These informal systems of transferringmoney are prevalent throughout the world, includingSouth Asia, the Middle East, Europe, and NorthAmerica. In some countries, hawala is illegal; inothers, it is unregulated. Since ARS such as hawalahave largely escaped financial regulatory scrutiny, it isdifficult to measure accurately the total volume offinancial activity associated with such systems.

The United States has already taken steps to regulatehawala and other ARS. Money remitters (informal orotherwise) must register as a “money services busi-ness” (MSB). As a result of Bank Secrecy Act regula-tions issued by FinCEN, well over 14,000 MSBs--money transmitters, money order businesses, traveler’scheck businesses, and currency exchangers -- haveregistered with the federal government since theDecember 31, 2001 deadline, and are also required toreport suspicious activities.4 The PATRIOT Act alsomakes it a crime for a money transfer business owneror operator to move funds that the owner knows areeither the proceeds of a crime, or are intended to beused for an unlawful activity, including terrorism.

3 The word “hawala” refers to a fast and cost-effective method for the worldwide remittance of money or value, particularly forpersons who may not have ready access to the regulated financial sector. In hawala, an individual in one country gives funds to ahawala broker, who notifies a counterpart (usually of the same extended family or ethnic group) in another country, to transfer anequivalent amount of money to a recipient in that country. The transaction occurs informally, outside the regulated financialsystem, without using financial instruments that would create a “paper trail”.

4 To increase awareness within the diverse MSB community nationwide about their obligations under the new MSB rules, FinCENis conducting an outreach campaign, which includes advertising, community outreach, and distributing educational materials.

Page 18: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy 15Goal 1

Failure by money service business principals to registerwith FinCEN, and/or failure to obtain a state license,also are federal crimes.5

Using this new authority, the United States has suc-ceeded in disrupting the operations of several illegalmoney remitters potentially implicated in terroristfinancing. Recent investigations in Buffalo, Brooklyn,Detroit, Denver, Minneapolis and Seattle, have led tocharges involving the illegal transmission of funds toYemen, Iraq and elsewhere. In each of these investiga-tions, the illegal transmission of funds to a countryassociated with terrorist activities formed a predicatefor possible links to the financing of terrorism. Trac-ing those funds after they reach the destinationcountries is a complicating factor, but an essential,element in a terrorist financing charge.

We are also working bilaterally and multilaterally toensure the integrity and transparency of ARS world-wide. FATF Special Recommendation VI, discussedabove, addresses this issue by requiring countries toregister or license ARS, and subjects them to all theFATF Recommendations that apply to banks and non-bank financial institutions. In addition, at a confer-ence on hawala in the United Arab Emirates (UAE) inMay 2002, nearly 40 countries drafted and agreedupon the Abu Dhabi Declaration on Hawala, which setsforth a number of principles calling for the regulationof hawala, including adoption of FATF Special Recom-mendation VI. Shortly thereafter, the UAE govern-ment announced that it would impose a licensingrequirement on hawala operators operating within itsborders. Other countries responded by developingregulatory requirements for the first time. Thisdevelopment significantly enhances informationgathering and sharing and financial transparency inthe informal financial sector.

In addition to our work to ensure the integrity andtransparency of ARS, we are working bilaterally andmultilaterally to identify and address the factors thatcontribute to the use of ARS for legitimate purposes.These factors vary by country and can include the lowcost, convenience, security, speed, and ease of access to

ARS, as opposed to the formal financial sector. Abilateral initiative with Mexico suggests that greatercompetition and technological innovation can increasethe use of the formal system over ARS. Building uponthis, we have broadened our work on remittances byco-chairing the APEC Finance Ministers WorkingGroup on ARS to examine the economic and institu-tional factors contributing to the use of ARS in theAsia-Pacific region. We have also encouraged themultilateral development banks to study existing ARSnetworks and to consider ways to increase the use ofthe formal system, which would allow better monitor-ing of compliance with AML/CFT standards.

As part of our international effort to combat theexploitation of ARS by terrorists and money launder-ers, the United States also provides training andtechnical assistance to other countries. For example,FinCEN hosted an international conference on ARS(IVTS) in Oaxaca, Mexico on October 9, 2002, whichcovered money laundering risks and law enforcementand regulatory challenges posed by ARS.6

The United States government will continue to focusour efforts on the regulatory, institutional, andenforcement elements of this financial vehicle and tocreate greater transparency and accountability in suchmovement of funds globally.

Bulk Cash Smuggling

Bulk cash smuggling is yet another means of transfer-ring resources used by both money launderers andterrorists. In the United States alone, BICE hasexecuted 650 bulk cash seizures, totaling $28 million,including more than $19 million with a Middle Eastconnection. But disrupting bulk cash smugglingrequires a global approach. To identify and attack bulkcash movements, we are working with the internationalcommunity to ensure mandated inbound/outboundcurrency reporting at reasonable levels (e.g., the U.S.reporting threshold is $10,000).

5 See 18 U.S.C. § 1960.

6 At the Oaxaca Conference, FinCEN shared key findings from its domestic law enforcement outreach efforts with international lawenforcement officials. Speakers included representatives from Italy, the United Kingdom, Pakistan, Bahrain, the International MonetaryFund, and the World Bank

Page 19: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy16 Goal 1

In addition, we will work to foster internationalcooperation among intelligence-gathering; law en-forcement; customs; and immigration officials to shareinformation about potential terrorist financingsmugglers/couriers. In this regard, we are continuingto explore the creation of bilateral, and possiblymultilateral, customs-to-customs Hotlines, whereappropriate, to exchange “real time” bulk currencyinformation on large-value cross-border cashtransfers. In addition, the U.S. government is explor-ing the use of international fora, like the FATFtypologies exercises, both to better the understand thecontours of this problems and to address the risks inthe multilateral or regional fashion.

A recent narco-terrorist investigation illustrates oursuccessful law enforcement efforts to combat bulk cashsmuggling. The investigation revealed that a Colom-bian national, affiliated with the Revolutionary ArmedForces of Colombia (FARC) Narco-Terrorist groupand guerilla army, was an active money launderer whowas engaged in bulk cash smuggling. When heattempted to transport 182,000 Euros into the UnitedStates, BICE agents arrested him on October 22, 2002,for failure to obtain a state money-transmittinglicense, in violation of 18 U.S.C. 1960, and seized themoney. The investigation is ongoing.

Trade-Based Money Laundering and TerroristFinancing

Both terrorist financiers and money launderers mayuse trade-based mechanisms to raise, launder, andmove their funds. Trade-based schemes move money

intended for criminal purposes, including terrorism,by means of commerce in either licit or illicit goods.7

For instance, we now know that the Taliban and theFARC rely on international narcotics trafficking toraise funds to support their terrorist activities. More-over, as we have learned from experience with theseterrorist entities, the associations terrorist groupsestablish with narcotics traffickers give them readyaccess to the arms traffickers, smugglers, and illicitcommunications and transportation facilitators thatservice narcotics organizations.

Similarly, major international drug traffickers relyextensively on trade-based money laundering schemesto disguise and move the illicit proceeds of drugcrimes. For instance, Colombian drug cartels use acomplex trade-based money laundering system, theBlack Market Peso Exchange (BMPE), to launderbillions of dollars annually in cash proceeds fromillegal narcotics sales in the United States. Those whouse the BMPE to move funds seek to evade the report-ing and record keeping requirements of the BankSecrecy Act, as well as Colombian foreign exchangeand import laws and tariffs, by using drug proceeds inthe United States to buy U.S. trade goods, such asmajor household appliances, consumer electronics,liquor, cigarettes, used auto parts, and precious metals.Such goods are then imported or smuggled intoColombia, where they are sold in the normal stream ofcommerce.8

Under the 2003 Strategy, we will continue to investi-gate the use of licit and illicit international tradecommodities, including diamonds, gold, honey,

7 Appendix D provides a detailed description of trade-based money laundering and terrorist financing.

8 The BMPE launders drug proceeds through the following steps:1. Colombian cartels export narcotics to the United States, where the illegal drugs are sold for U.S. dollars.2. The cartels contact a peso broker in Colombia to launder their drug money.3. The peso broker agrees to exchange pesos that he controls in Colombia for U.S. dollars that the cartel controls in the United States—

i.e., the peso broker buys the cartel’s U.S. dollars, paying the cartel with pesos in Colombia. At this point, the cartelhas effectively laundered its money and is out of the BMPE process.

4. The peso broker uses contacts in the United States to place the drug dollars he purchased from the cartel into the U.S. bankingsystem, and “sells” these narcotics proceeds to legitimate Colombian importers, who place orders for items and make paymentsthrough the peso broker.

5. The peso broker uses contacts in the United States to purchase the requested items from U.S. manufacturers and distributors, andpays for these goods using a variety of methods, including his U.S. bank accounts.

6. The purchased goods are shipped to Caribbean or South American destinations, sometimes via Europe or Asia, and are thensmuggled or otherwise fraudulently moved into Colombia, where the importer pays the peso broker for the merchandise withColombian pesos and takes possession of his goods, having avoided paying extensive Colombian import and exchange tariffs. Thepeso broker, who has made money charging both the cartels and the importers for his services, uses the pesos paid by the importersto buy more dollars in the United States from the cartels, and the cycle begins again.

Page 20: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy 17Goal 1

cigarettes, and the pirating of intellectual property aswell as narcotics, to fund terrorism. We will alsocontinue our efforts to identify under- and over-invoicing schemes that mask the movement of terror-ist and criminal funds.

To counter trade-based terrorist financing and moneylaundering systems, it is essential that the governmentutilize bilateral and multilateral mechanisms, includ-ing the sharing of law enforcement tools designed toaddress trade-based money laundering and terroristfinancing schemes. In this regard, BICE has devel-oped a state-of-the-art database system, the Numeri-cally Integrated Profiling System (“NIPS”), whichidentifies anomalous trade patterns for imports/exports to/from the United States. BICE has demon-strated this system to other nations, including Colom-bia, and more recently, the UAE, with importantresultsand bilaterl leads and information. We willcontinue to pursue sharing trade-based data bilaterallyand on a regional basis, to identify and attack anoma-lous activities that might mask terrorist financing and/or money laundering. We also will provide interna-tional training on trade-based money laundering andterrorist financing schemes.9 In addition, we willcontinue to combat illicit international trade com-modities, such as narcotics, by building on existingdomestic and international law enforcement andinvestigative authorities and initiatives.

Cyber Crime

The Department of the Treasury is currently workingwith other government agencies and departments todevelop an effective approach for investigating andinterdicting terrorist cyber-fundraising activities. Inthis regard, we will take all possible action to preservethe integrity of the financial system and the vitality ofe-commerce, while stopping the flow of terrorist-related funds. See Appendix H, Terrorist FinancingOnline.

E. Facilitating International Information Sharing

Information sharing is critical to fighting terrorismand financial crime. An essential element of ourefforts to identify and dismantle terrorist financing isthe ability to access terrorist-related informationquickly from our international partners. To improvethe flow of financial information related to terroristfinancing or money laundering, we have worked toestablish and expand international information-sharing channels. Through FinCEN, the U.S. FinancialIntelligence Unit (FIU), we have directed the attentionof the Egmont Group, which now represents 84 FIUsfrom various countries around the world, to terroristfinancing. Since September 11, 2001, at the urging ofthe United States, the Egmont Group has taken stepsto leverage its information collection and sharingcapabilities to support the global war on terrorism.On October 31, 2001, FinCEN hosted a specialEgmont Group meeting that focused on the role ofFIUs in the fight against terrorism. The FIUs agreedto: (1) work to eliminate impediments to informationexchange; (2) make terrorist financing a form ofsuspicious activity to be reported by all financialsectors to their respective FIUs; (3) undertake jointstudies of particular financial activities vulnerable toabuse by money laundering and terrorist financing(e.g. hawala); and (4) sanitize cases so that they can beused for training purposes. Egmont has conducted,and will continue to host, training sessions to improvethe analytical capabilities of FIU staffs around theworld.

The United States is committed to supporting theexpansion and enhancement of FIUs worldwide, andFinCEN is currently mentoring several FIU’s which areunder consideration for admission to the EgmontGroup. By expanding the Egmont Group, we willincrease the sharing of relevant information throughestablished channels as well as to spur the amount offinancial data analysis conducted and shared world-wide.

9 In addition, we will continue to combat the use of trade-based terrorist financing and money laundering in commodities. TheDepartment of the Treasury and BICE, in consultation with the Departments of Justice and State, have developed an internationaltraining program that sensitizes foreign customs and law enforcement officials to trade-based money laundering schemes andintroduces them to BICE-developed software used to combat it. BICE presented an inaugural trade-based money laundering programin Abu Dhabi and Sharjah / Dubai, United Arab Emirates (UAE) from October 10-17, 2002. The program included detailedpresentations on money laundering in general and trends in commodity and trade-based money laundering in particular, as well as onterrorist financing issues; organizing and presenting a money laundering case; and a demonstration of the Numerically IntegratedProfiling System, using UAE data. This inaugural event was a successful first step in providing assistance to priority countries in theMiddle East. Additional programs were conducted in Qatar and Kuwait, and more are planned for Pakistan and India.

Page 21: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy18 Goal 1

F. Outreach and Cooperation with the Private Sector

The private sector often serves as the front-line in thewar against terrorist financing. To date, cooperationwith the private sector, including banks and tradeassociations, has been essential to increasing ourvigilance against the abuse of our financial system byterrorist groups. With the expansion of our anti-money laundering provisions to new segments of thefinancial community pursuant to the USA PATRIOTAct, we will expand such cooperation. During thecoming year, we will continue to work with ourdomestic financial community, including banks, creditcard issuers and redeemers, and internet serviceproviders, among others, to enhance their abilities todetect and report possible terrorist-related activities,thereby augmenting the value of our regulatory regimeand its public-private partnership to the government’sfight against terrorist financing.

In particular, we intend to improve cooperation withthe private sector by: (1) increasing the amount ofinformation the Federal government provides withrespect to its ongoing efforts; (2) providing feedbackon the usefulness of the private sector’s efforts; (3)educating the private sector to recognize terroristfinancing-related typologies and “red flags”; (4)reinvigorating the law enforcement-industry partner-ship to develop “best practices” for corporations tofollow to avoid BMPE transactions and (5) enhancingongoing due diligence efforts, while balancing thedemands on institutions. These initiatives aim toenhance the ability of both the public and privatesectors to insulate the financial system from abuse,while ensuring the free flow of capital and commerce.Such efforts will also enhance the government’sabilities to uncover and disrupt terrorist financingschemes and networks.

Page 22: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy 19Goal 2

Goal 2

Enhance the United States Government’s Abilityto Identify, Investigate and Prosecute Major

Money Laundering Organizations and Systems

Introduction

At a time when the Federal government’s law enforce-ment mission must increasingly focus on protectingour nation from terrorist attack, we will make themost of existing anti-money laundering/terroristfinancing resources by directing them where they willhave maximum impact. We will do this by makingmoney laundering a primary—not merely an ancil-lary—part of any attack on substantive crimes thatgenerate illicit proceeds and/or that facilitate terror-ism, and by targeting the financial infrastructurethrough which illicit proceeds are placed and moved.

Regardless of the predicate offenses generating illicitproceeds, where the proceeds take the form of largevolumes of cash, the money itself becomes an “Achil-les heel” for the criminals. We will exploit thisvulnerability and follow the money downstream, toidentify the professionals moving and launderingillicit proceeds through the global financial systems,and upstream, to identify perpetrators of the substan-tive offenses.

In this regard, Federal and state anti-money launder-ing laws and regulations provide criminal and civilinvestigators with the legal authority to investigatesuspicious behavior and to identify and attack signifi-cant criminal activity, including drug trafficking,white collar crime, fraud, and corruption, as well asterrorism. These statutes and regulations also providestrong support for the seizure and forfeiture ofcriminal proceeds, instrumentalities of the crime, andfacilitating property.

Anti-money laundering laws and regulations are mosteffectively applied using interagency and internationalcooperation to identify and target vulnerabilities infinancial systems and mechanisms and the financial

professionals who, either knowingly or unwittingly,place and move illicit funds, corrupt and abuseotherwise legitimate financial sectors. Recent ex-amples of significant cases developed by thesemethods are described in Appendix E.

The 2003 Strategy continues and further develops ourefforts to identify and attack financial systems byimproving our efforts in seven key areas:

• Enhancing Interagency Coordination.

• Ensuring that Law Enforcement Agencies andTask Forces Use and Share Financial Databasesand Analytical Tools.

• Focusing Law Enforcement Personnel andOther Resources on Highest-Impact Targetsand Financial Systems.

• Utilizing New and Improved Statutory andRegulatory Authorities.

• Increasing International OperationalCooperation.

• Improving United States GovernmentInteraction with the Financial Community.

• Helping State and Local Governments Investi-gate and Prosecute Money Laundering andFinancial Crime Cases.

Page 23: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy20 Goal 2

A. Enhancing Interagency Coordination

The Federal government will continue to develop anduse interagency mechanisms, such as Organized CrimeDrug Enforcement Task Forces (OCDETF), HighIntensity Drug Trafficking Areas (HIDTAs), and HighIntensity Financial Crimes Areas (HIFCAs), as well asthe Joint Terrorism Task Force (JTTF),10 the NationalJoint Terrorism Task Force (NJTTF),11 and the ForeignTerrorist Asset Targeting Group (FTAT-G).,to ensurethat money laundering and asset seizure and forfeitureare fundamental components of all significant investi-gations undertaken or supported by any of these TaskForces, and that enhanced coordination and consulta-tion routinely occurs among them. These interagencyTask Forces leverage scarce anti-money laundering lawenforcement resources by targeting key money laun-dering professionals and financial mechanisms, such asbulk cash movement12 and wire remissions, that aremost abused by criminals.

HIFCAs have been created specifically to identify andaddress money laundering in designated geographicalareas. HIFCA Task Forces seek to improve the qualityof federal money laundering and other financial crimeinvestigations by concentrating the expertise of theparticipating Federal and state agencies in a unifiedtask force, utilizing all FinCEN, Drug EnforcementAgency (DEA) Special Operations Division, and BICEMoney Laundering Coordination Center financialdatabases. As called for in the 2002 Strategy, we arecurrently reviewing the operation of the HIFCAs inorder to enhance their potential and ensure that theycomplement other appropriate interagency initiativesand task forces.

To help coordinate the use of investigative resourcesaimed at the most significant drug trafficking/drugmoney laundering organizations, in July 2002, theAttorney General established, through OCDETF, theConsolidated Priority Organization Target (CPOT)List. The CPOT list allows the Federal government tobetter track the collective use of investigative resourcesaimed at the highest-value narcotics money launderingtargets, and to evaluate more precisely the impact ofthese law enforcement efforts.

Effectively attacking the financial infrastructure of themost significant drug trafficking organizations re-quires us to focus, as a primary, not ancillary matter,on the mechanisms and financial systems used tomove and launder billions of dollars of illicit funds.Recognizing that an interagency, strategic attack on thefinancial infrastructure of international drug traffick-ing is essential to destabilize these activities, under the2003 Strategy, we are taking aggressive steps to developan interagency anti-drug-money laundering financialintelligence center, to serve as a drug-money launder-ing intelligence and operations center at law enforce-ment headquarters. It is anticipated that this center,currently in the initial planning stages, will consist ofmoney laundering investigators, prosecutors, andanalysts dedicated exclusively to reviewing and actingupon all law enforcement and other financial informa-tion in order to develop the highest value targets,identify and disseminate information about develop-ing trends and patterns, and help coordinate financialattacks on the systems, geographic locations, andindividuals by and through which drug proceeds aremoved and laundered.

10 JTTFs are teams of federal, state and local law enforcement officers and personnel who work shoulder-to-shoulder to investigate andprevent acts of terrorism. These task forces are important “force multipliers” in the war on terror, pooling multi-agency expertise andensuring the timely collection and sharing of intelligence, including financial intelligence, absolutely critical to prevention efforts.Although the first JTTF came into being in 1980, the total number of task forces has nearly doubled since September 11, 2001. Today,there are 66 JTTFs, including one in each of the FBI’s 56 main field offices and ten in smaller offices. More than 2,300 personnel workon these task forces nationwide including approximately 1,700 federal agents and 649 full-time officers from state and local agencies.

11 The NJTTF was created at FBI Headquarters in July 2002, and includes representatives from 30 other government agencies representingthe intelligence, law enforcement, defense, diplomatic, public safety and homeland security communities. The National JTTF collectsterrorism information and intelligence, including financial information and intelligence, and funnels it to the 66 JTTFs, variousterrorism units within the FBI, and partner agencies. Agency representatives assist the FBI with all aspects of terrorism investigations.

12 In the international arena, BICE, under the supervision of the Department of Homeland Security, will initiate bilateral Bulk CashMovement Task Forces that will utilize inbound/outbound cash reporting laws of each nation, to identify and attack anomalies.

Page 24: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy 21Goal 2

B. Ensuring that Law Enforcement Agenciesand Task Forces Use and Share FinancialDatabases and Analytical Tools

At present, each Federal law enforcement agencycollects information relevant to its own cases. Forexample, the United States Postal Service has a databasethat identifies and traces the movement from point-of-sale to final deposit of potentially suspicious PostalMoney Orders sold in the United States. Similarly, inthe area of trade-based money laundering, such as theBlack Market Peso Exchange System, BICE’s Numeri-cally Integrated Profiling System (“NIPS”) identifiesanomalous trading patterns. Likewise, BICE’s MoneyLaundering Coordination Center and DEA’s SpecialOperations Division each have their own financialdatabases.

Each of these databases and analytic tools is useful byitself, but currently there is no single intelligence centerthat consolidates all of the information separatelyavailable in Federal agencies to provide a one-stoppoint of information and analysis on trends andstatistics in money laundering cases. Such informationis essential in order to improve our ability to develop anaccurate threat assessment and implement measuresthat will most effectively address that threat. One of thefunctions of the interagency anti-drug-money launder-ing financial intelligence centerdescribed above will be to utilize all available financialand other sources of financial information to compiletrends and patterns of drug-money laundering. Asecond important function will be to identify signifi-cant money laundering targets and disseminate theleads for investigation. The center will also supportand, where appropriate, help coordinate multi-districtcriminal investigations.

FinCEN Databases and Analytic Resources

FinCEN’s databases and resources play an importantrole in U.S. enforcement efforts against money launder-ing, terrorist financing, and other financial crimes.

Money laundering laws and techniques have changedsignificantly since FinCEN was created in 1990.Consequently, FinCEN must evolve in order to keeppace with, and anticipate, these changes. As our FIU,FinCEN must develop and implement new genera-tions of analytical tools that provide enhanced capa-bilities to track money laundering activity acrossmultiple BSA databases and provide faster, moreefficient cross-linkages with law enforcement andother national information sources. FinCEN hasalready taken some necessary steps in this regard. Inparticular, it has enhanced Federal, state and local lawenforcement access to BSA data by expanding its“Gateway Program,” and by creating new resourcecenters, such as its Geographic Threat Assessment andNon-Traditional Methodologies Sections.

Beyond these developments, under the 2003 Strategy,FinCEN will continue to improve its Gateway Programin order to streamline law enforcement access to BSAdata and provide a de-confliction mechanism for lawenforcement entities. In addition, the Department ofthe Treasury will thoroughly re-examine FinCEN’scrucial role in the Federal government’s anti-moneylaundering and anti-terrorist financing programs andidentify any necessary improvements in the anti-money laundering information delivery systems.FinCEN’s databases and resources will play an impor-tant role in the interagency anti-drug-money launder-ing financial intelligence center, described above.

C. Focusing Law Enforcement Personnel andOther Resources on Highest-Impact Targetsand Financial Systems

Our 2003 Strategy calls for those districts bringing thelargest number of money laundering prosecutions tocontinue their aggressive and productive efforts.13

Numbers alone, however, do not necessarily ensure themost effective use of scarce14 money launderingenforcement resources. To do that, we must ensurethat we are successfully targeting and disablingsignificant money launderers.

13 Attached as Appendix I are the Highlights of money laundering defendants sentenced in FY2001.

14 Our challenge is especially acute in light of the recent extension of SAR filing requirements. SAR filing requirements have beenextended to the money service business industry, broker-dealers, and casinos, and SAR requirements for other types of financialinstitutions are being finalized. In order to review, analyze, and investigate these reports with maximum efficiency, we have developedSAR Review Teams, composed of representatives from Federal, state, and local law enforcement agencies, typically with the participationof an Assistant U.S. Attorney, to evaluate all SARs filed in the team’s respective Federal district.

Page 25: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy22 Goal 2

Accordingly, under the 2003 Strategy, we will makeeven greater efforts to concentrate enforcementresources on cases that will shut down systems andorganizations moving illicit proceeds. In particular,we will apply the lessons learned and informationobtained from past operations to ongoing and futureefforts in order to: (1) encourage, enhance, and pursuecutting-edge bilateral operations; (2) identify andattack bulk cash movements systematically andenhance national targeting of bulk cash mechanismsthrough bi-lateral relationships with currency-importing/exporting countries; (3) identify and attackdrug money laundering systems, such as the Colom-bian Black Market Peso Exchange; and (4) addressillegal money remitters through the appropriate use ofSection 373 of the USA PATRIOT Act,15 that enhancedthe BSA’s “unlicensed money remitter” provision.FinCEN’s registration of specified money servicebusinesses, including money remitters, will enhancelaw enforcement’s ability to target those who fail toregister; register falsely; and/or knowingly deal withcriminal proceeds.

One important example of new efforts to focus lawenforcement resources on large money launderingfinancial systems is the Department of HomelandSecurity’s (DHS) Operation Cornerstone. OperationCornerstone is a new financial investigations programto identify vulnerabilities in financial systems throughwhich criminals launder their illicit proceeds, bringthe criminals to justice, eliminate the vulnerabilities,and develop a working partnership with industryrepresentatives to share information and close indus-try-wide security gaps that could be exploited bymoney launderers and other criminal organizations.Operation Cornerstone will:

Identify and assess the means and methodsused by criminals to exploit financial systemsin order to transfer, launder and otherwisemask the true source of criminal proceeds.

Work with specific private sector industries togather new information and reduce vulner-abilities found within existing financialsystems.

Assign a dedicated special agent to each of the25 field offices of BICE to liaison with theprivate sector.

Investigate and prosecute criminal organiza-tions exploiting emerging traditional andnon-traditional financial systems.

Work with financial institution security teamsto help them understand how criminalorganizations exploited financial systems intheir industry.

Provide the private sector with a quarterlyreport that details specific examples of howcertain U.S. financial systems are beingexploited by criminal organizations to trans-fer, launder or mask the true source ofcriminal proceeds. The report will providerecommendations to industry on how todetect and prevent such exploitation.

In addition to these investigative efforts, we willenhance and leverage our existing money launderingenforcement resources through more focused trainingefforts. A crucial component of any anti-moneylaundering effort is a well-trained cadre of financialspecialists. As it takes many years to develop anexperienced financial investigator, and as many of ourmost experienced investigators are reaching retirementage, we will continue to focus on hiring and traininglaw enforcement personnel skilled in financial investi-gations and analysis. For the same reasons, we willemphasize and, where necessary, expand the trainingof financial analysts. Because banks, as well as otherfinancial institutions, can play an important role indetecting and attacking money laundering, we will alsomake concerted efforts to develop and expand the roleof the private sector.

D. Utilizing New and Improved Statutory and Regulatory Authorities

The United States will aggressively utilize all new andpreviously-existing legislation to identify and attackthe financial infrastructure of financial criminals andmoney launderers. As discussed above, we are already

15 Codified at 18 U.S.C. 1960.

Page 26: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy 23Goal 2

using the host of new or enhanced authorities pro-vided by the USA PATRIOT Act, as well as existingBSA and anti-money laundering criminal and civilprovisions, to track, seize, freeze and forfeit money,and impose sanctions on lax jurisdictions. For ex-ample, as discussed earlier, U.S. law enforcement isaggressively using the re-invigorated provisions of 18USC 1960 to target the illegal movement of fundsthrough the domestic and international wire transfersystems.

We also are using the International Economic Emer-gency Powers Act (IEEPA) sanctions authority, underExecutive Order 12978 and the Foreign NarcoticsKingpin Designation Act, to deny drug traffickersaccess to the U.S. financial system by freezing theirassets and prohibiting U.S. businesses from anydealings with individuals and businesses associatedwith named major drug kingpins. In February 2003,the Department of the Treasury’s Office of ForeignAssets Control (OFAC) successfully targeted theextensive financial network controlled by Cali cartelleaders Miguel and Gilberto Rodriguez Orejuela bydesignating 137 companies and individuals as Spe-cially Designated Narcotics Traffickers (SDNTs). ThisOFAC action targeted a Colombian money exchangebusiness and a stock brokerage firm that activelymoved millions of dollars through the U.S. financialsystem on a monthly basis.

In March 2003, OFAC targeted 2 new Colombiancartel leaders, Joaquin Mario and Guillermo ValenciaTrujillo, and their financial network of 58 companiesand individuals. This SDNT action was coordinatedwith a multi-agency drug task force and the U.S.Attorney’s Office in Tampa, Florida.

In May 2003, OFAC utilized a blocking action underE.O. 12978, which was strengthened by the USAPATRIOT Act, to “block pending investigation” of thebank accounts of several U.S. and Bahamian compa-nies that were controlled by SDNT individuals desig-nated in the February and March 2003 SDNT actions.Since the inception of the SDNT program in 1995,OFAC has named 824 Colombian drug cartel indi-viduals and businesses.

In consultation with the Departments of Justice, Stateand Defense, and the Central Intelligence Agency,Treasury’s OFAC coordinated the annual worldwidedrug kingpin designation process established by theForeign Narcotics Kingpin Designation Act to recom-mend the designation of new drug kingpins to thePresident. On June 2, 2003, the White Houseannounced seven new drug kingpins. The 2003 actionnamed three “foreign entities” as drug kingpins. Theseinclude two narco-terrorist groups: including theRevolutionary Armed Forces of Colombia and theUnited Self-Defense Forces of Colombia, a Colombianparamilitary force. The third drug Kingpin group isthe United Wa State Army, which is a Burmese ethnicguerilla army. The two Colombian entities werepreviously named as foreign terrorist organizations bythe U.S. government. To date, a total of 38 foreignpersons have been named as foreign drug kingpins bythe President.

These designations seriously inhibit a designatedindividual and entity from conducting business asusual. They absolutely prohibit financial dealings withU.S. individuals and firms, and increase pressure onany host country to investigate and/or take other stepsto stop the designated individual and entity fromoperating.

E. Increasing International OperationalCooperation16

Significant domestic money laundering investigationsinevitably lead beyond U.S. borders. To successfullyinvestigate and prosecute persons involved in complex,transnational money laundering schemes, and to seizeand forfeit assets and instrumentalities located abroad,U.S. law enforcement agencies must work closely withour foreign counterparts. This type of internationalcooperation and coordination is becoming increas-ingly critical in the global fight against money laun-dering, as well as terrorist financing, and is a centralcomponent of our 2003 Strategy.

The United States has built a strong record of success-ful cooperative international investigations and/ormutual legal assistance with a number of foreignjurisdictions, including Canada, Hong Kong, Italy,Spain, Switzerland, the United Kingdom and most

16 Non-operational international matters are discussed primarily in Goal 1.

Page 27: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy24 Goal 2

recently, Colombia. Many cooperative relationshipsgrow from our training and technical assistanceprojects and are enhanced by our internationalforfeited assets sharing program.17 The United Stateswill build upon these strong relationships; developnew ones; and apply a “lessons learned” approach toensure that we can pursue international financialinvestigations as seamlessly and aggressively as pos-sible.

F. Improving United States Government Interactionwith the Financial Community

From both a regulatory and information-sharingperspective, working with the financial servicescommunity is essential to any effective money laun-dering/terrorist financing enforcement strategy. Underthe 2003 Strategy, the Federal government will takesteps to greatly increase cooperation among lawenforcement, financial regulators, and financialinstitutions.

In the past, despite various obstacles inhibitingcommunications between Federal law enforcementand the financial community, we achieved somesuccess in fostering regular interaction—for instance,through the Bank Secrecy Act Advisory Group—aswell as on an ad hoc, situation-specific basis, particu-larly post September 11, 2001. Now, however, Section314 of the USA PATRIOT Act has provided a frame-work that significantly enhances the ability of theFederal government, including both regulators andlaw enforcement, to communicate directly with, andreceive information from, financial institutions whereterrorist financing or money laundering is reasonablysuspected.

Under Section 314 (a), the Department of the Trea-sury has established a system in which FinCEN servesas an information conduit between Federal lawenforcement agencies and financial institutions tofacilitate the sharing and dissemination of informa-

tion relating to suspected terrorists and money laun-derers.18 The mechanism, which requires financialinstitutions to search recent records upon receiving aname from FinCEN, permits law enforcement to locatethe accounts and transactions of suspects quickly andwithout compromising pending investigations. Ifmatches are found, law enforcement will follow upwith the financial institution directly. Since issuing theregulation implementing this provision, Treasury andFinCEN have worked closely with the financial andlaw enforcement communities to address the opera-tional problems with the system and to assess thevolume of requests. While considerable progress hasbeen made, and the results of the searches have beensuccessful, there is still room for additional progress toaccommodate both the need to protect private cus-tomer information and law enforcement’s need toobtain investigatory information as quickly as possible,while preserving the confidentiality of ongoinginvestigations. We will continually seek to improvebalancing these factors as part of our 2003 Strategy.

In addition, Section 362 of the PATRIOT Act requiredthe Secretary of the Treasury to establish a networkwithin FinCEN to allow financial institutions to fileBank Secrecy Act reports electronically through asecure network, and for FinCEN to provide financialinstitutions with alerts regarding suspicious activitiesthat warrant immediate and enhanced scrutiny. Toimplement this provision, FinCEN has established thePATRIOT Act Communications System (“PACS”),which is now operational. E-filing will expeditereporting for financial institutions; reduce their costsof complying with filing BSA reports; and makeinformation available to law enforcement faster.

Interagency SAR Review Teams also play a role inpromoting cooperation and coordination between thefinancial community and law enforcement.19 SARReview Teams, located throughout the United States,will be encouraged to conduct regular meetings withcompliance officers at financial institutions to provide

17 Attached as Appendix J are the most recent figures from the Departments of Treasury and Justice for equitable sharing to foreigncountries. Although the total amounts shared will vary from year to year, the significance of these sharing efforts cannot be understated.

18 While the final rule establishing this mechanism will apply to all financial institutions, in the short term, as a practical matter, the abilityto communicate quickly will likely be limited to traditional financial institutions, such as banks and securities brokers.

19 FinCEN currently has public-private partnerships with the financial industry, which have been used to exchange information andprovide appropriate guidance on BSA-related issues. The SAR Team-financial sector interaction will enhance these ongoing efforts.

Page 28: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy 25Goal 2

the private sector with feedback and training on SARs.These meetings also will enable government and theprivate sector to discuss trends and developments inmoney laundering/terrorist financing activity.

G. Helping State and Local GovernmentsInvestigate and Prosecute Money Launderingand Financial Crime Cases

We are strongly committed to leveraging and enhancingthe role of state and local governments, so that in the yearsahead, they can play an increasingly important role inmoney laundering prevention, detection, and enforce-ment. As discussed above, state and local participation isalready occurring on a routine basis in some of the mostsignificant anti-money laundering investigations throughOCDETFs, HIDTAs, HIFCAs, and individual agency taskforces. We will continue to support state and localparticipation in these interagency Task Forces. We alsowill provide training and will continue to review andimprove the means and methods by which non-Federallaw enforcement agencies can access investigative infor-mation possessed by the Federal government. OCDETFhas agreed to fund a series of 24 financial investigationtraining courses in locations around the United Statesover the next 2 years. DOJ is coordinating this OCDETF-funded financial training. In addition, federal law en-forcement will continue to work with state and local lawenforcement to ensure that we obtain as much informa-tion as possible from money couriers identified andstopped by state and local authorities, and that we aggres-sively pursue leads downstream and upstream in themoney channels.

The investigation and development of money launderingcases can pose challenges to many local law enforcementagencies. The cases are often complex, labor intensive,and evolve over extended periods of time. Many local lawenforcement agencies lack the budgetary resources toassign investigators to these cases and to build up a bodyof expertise in pursuing them. For these reasons, state andlocal participation in interagency law enforcement taskforces is crucial to our success.

Access to financial information is essential as well.FinCEN’s Gateway Program, discussed above, is an

important tool for supporting the involvement of stateand local law enforcement in anti-money laundering/terrorist financing efforts. Gateway not only providesstate and local law enforcement with essential access toBSA data for use in their own money launderinginvestigations, it also incorporates an “alert” process,which notifies requesting agencies of other queries onthe same subjects that have been received throughGateway. This alert system promotes more coordi-nated and vigorous pursuit of violators, and provides amechanism that facilitates the “de-confliction” ofinvestigative efforts that may overlap when multiplejurisdictions investigate the same targets.

In addition, during the past few years, the U.S. govern-ment has successfully used the Financial Crime-FreeCommunities (C-FIC) Support Program, a lawenforcement-oriented grant program, to enable stateand local governments to undertake innovative anti-money laundering initiatives. Between September2000 and September 2003, C-FIC will have providedover $9 million in seed capital to 22 recipients. Thesefunds have been used to institute state and localcounter-money laundering enforcement efforts todetect and prevent money laundering and relatedfinancial crimes, whether related to narcotics or otherunderlying offenses. C-FIC grants helped state andlocal communities marshal information and expertiseto build innovative approaches to money launderingcontrol and enforcement,20 and provided additionalsupport to various HIFCA Task Forces.

As part of the closeout of the C-FIC program during2003-2004, the Bureau of Justice Assistance willprepare a C-FIC Program Evaluation Report, whichwill examine how C-FIC grant resources were used bythe grantees; evaluate the effectiveness of the grantsand the C-FIC program and whether the C-FIC grantsachieved their intended objectives; provide specificexamples of benefits to the United States generated bythe grant recipients; evaluate the overall impact of theC-FIC grant program; and make recommendations, ifany, for how to conduct a similar grant program in thefuture, should the need arise. Short summaries ofsome of the more significant grants to date, and theresults achieved thereby, are set forth in Appendix F.

20 As one grant recipient, the San Diego Police Department, stated, “It is no exaggeration to say that C-FIC funds have provided the onlyopportunity for local law enforcement . . . to engage in an effective assault on money laundering. The cases are simply too lengthy andcomplex, and staff power too limited, to commit existing resources on a meaningful level.” San Diego Police Department C-FIC RenewalRequest, September 2002, pp. 25-26 (emphasis in the original.)

Page 29: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy26 Goal 3

Goal 3Ensure Effective Regulation

Introduction

The 2002 Strategy affirmed our commitment to arobust anti-money laundering regulatory regime thatplays an essential role in our overall money launderingstrategy. Issued in the wake of the USA PATRIOT Act’slandmark amendments to the Bank Secrecy Act, the2002 Strategy articulated a core focus on the aggressiveimplementation of these provisions and closecooperation between the public and private sectors todeny money launderers and terrorist financiers easyaccess to the financial sector. This remains a toppriority. In this regard, the 2003 Strategy is acontinuation of last year’s efforts.

This essential continuity does not mean, however,that we will be anything less than aggressivelyproactive, both in identifying new and emergingthreats that can be addressed through regulation, andin evaluating the effectiveness of the regulations issuedto date and seeking ways of improving them.Accordingly, this year’s Strategy contains thefollowing objectives for 2003:

• Strengthen and refine the anti-moneylaundering regulatory regime for allfinancial institutions.

• Improve the effectiveness of anti-moneylaundering controls through greatercommunication, guidance, and informationsharing with the private sector.

• Enhance regulatory compliance andenforcement efforts.

A. Strengthen and Refine the Anti-MoneyLaundering Regulatory Regime for AllFinancial Institutions

The anti-money laundering provisions of Title III ofthe USA PATRIOT Act, together with the many

regulations the Treasury Department has issued sinceNovember 2001 to implement the Act, aim tostrengthen areas in which our financial services sectormay be vulnerable to abuse. The legislation reflectsstrong Congressional resolve to expand and improveour anti-money laundering regulatory regime andprotect our financial system from evolving moneylaundering/terrorist financing threats. Followingpassage of the Act, the Department of the Treasury,along with FinCEN, the Federal functional regulators,the Department of Homeland Security, and theDepartment of Justice, began the task of draftingregulations to implement the many revisions to theBank Secrecy Act. This process continues today.

From the outset, we have committed ourselves tomeeting the challenge of developing implementingregulations that simultaneously effectuate the purposeof the anti-money laundering provisions, respect andreasonably protect the business activities of financialinstitutions, and ensure that regulations do not undulyinfringe upon the legitimate privacy interests of ourcitizens. Striking this balance remains essential to thesuccess of our ongoing regulatory efforts.

In implementing the Act, we are guided not only bythe express statutory language, but also by certaincore principles that form the cornerstones of ouranti-money laundering regulatory policy:

• Enhance the flow of critical financialinformation;

• Prevent regulatory arbitrage;

• Focus financial institution reporting requirements on information that is useful to lawenforcement;

Page 30: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy 27Goal 3

• Protect important privacy interests; and

• Protect the financial system.

Since passage of the Act, we have—

• Expanded our basic anti-money launderingprogram requirements to the major financialservices sectors, including the securitiesindustry, the futures industry, insurancecompanies, and unregistered investmentcompanies, such as hedge funds;

• Issued regulations to permit and facilitate thesharing of critical information between lawenforcement and financial institutions, as wellas among financial institutions themselves;

• Issued a series of regulations aimed at mini-mizing risks presented by international corre-spondent banking;

• Issued regulations requiring financial institu-tions to implement customer identificationand verification procedures; and

• Expanded the universe of financial institutionsreporting suspicious activities to FinCEN.

Appendix G contains a summary of the anti-moneylaundering provisions of the USA PATRIOT Act thathave been implemented.

In 2003 and beyond, we will do the following:

Complete Regulations Implementing theAnti-Money Laundering Provisions ofTitle III of the USA PATRIOT Act

Our top priority is to complete the formal rulemakingprocess implementing the provisions of the USAPATRIOT Act. Important tasks include issuing finalregulations to ensure that the appropriate level of duediligence is applied to correspondent accountsmaintained for foreign financial institutions, andissuing final regulations that expand the anti-moneylaundering regime to a variety of financial institutions.

Review, on an Ongoing Basis, the Effective-ness of Anti-Money Laundering Regulations,Including those Implemented Pursuant to theUSA PATRIOT Act

The anti-money laundering provisions of the USAPATRIOT Act and the implementing regulationstriggered profound changes in the financial servicesindustry. But issuing final regulations is only thebeginning of our work. We must now take a criticallook at the regulations, assess how they are working inpractice, and make adjustments, when necessary, toensure that they continue to achieve our anti-moneylaundering and anti-terrorist financing goals, withoutimposing unnecessary burdens.

This review must be a continuing process because thefinancial services sector is dynamic and money laun-dering and terrorist financing risks changeable.Indeed, the volume of regulations called for under theUSA PATRIOT Act and the compressed time frame inwhich they were to be issued, which Congress recog-nized was necessary and appropriate post September11, 2001, require from the government an even greater,more formal commitment to evaluate our efforts.

In October 2002, then-Treasury Deputy SecretaryKenneth Dam created a new task force within theDepartment of the Treasury, the Treasury USA PA-TRIOT Act Task Force, to undertake this review andserve as the point of contact with the financial servicesindustry, law enforcement, the regulators, and Con-gress on issues relating to anti-money launderingregulation. This year, the Task Force will provide areport that outlines the results of our initial review ofregulations issued to date. The Task Force will con-tinue, as it has since its formation, to meet withfinancial regulators, the regulated community, lawenforcement, and consumers to gain their insights andrecommendations as to how to improve the regula-tions that have been issued, in light of experiencegained through implementation. The report willcontain preliminary findings and, if necessary, recom-mended regulatory or statutory changes. This reportand the Task Force’s future work will focus on assess-ing the effectiveness of the regulations, as well as thecost and burden they impose on financial institutions.

Beyond that, the Task Force will devote itself to findingways to improve the effectiveness of our anti-money

Page 31: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy28 Goal 3

laundering regime. Through existing mechanisms,such as the Bank Secrecy Act Advisory Group, and newones, such as the Task Force, the whole of the Federalgovernment, with input and assistance from theprivate sector, must work together to optimize ouranti-money laundering regime.

Ensure Continued Cooperation Among theFinancial Regulators

Federal and state banking, securities, and futuresregulators have been, and continue to be, on the frontline of responding to evolving money launderingthreats. At the Federal level, the financial regulatorscontinue to be a vital component of successful imple-mentation of the USA PATRIOT Act, contributingboth expertise and resources to the process. TheDepartment of the Treasury and FinCEN’s USAPATRIOT Act implementation efforts centered onestablishing several interagency working groupsdedicated to the Act’s various provisions. Federalregulators participate centrally in these workinggroups, reviewing legal and policy issues and draftingregulatory language. Once the regulatory language isin place, the regulators’ work to ensure industrycompliance begins. Already, the regulators have begunthe process of developing examination procedures andindustry guidance. Under the 2003 Strategy, we willcontinue to work together to ensure uniform andconsistent application of the regulations.

Reduce Cyber Vulnerabilities

Since the number of financial transactions conductedelectronically is increasing exponentially, we mustminimize the vulnerability of electronic paymentmethods to money laundering, terrorist financing, andother criminal activity. As called for by the 2002Strategy, the Departments of Justice and Treasury haverecently issued a report examining the ability ofterrorists to raise funds over the Internet. A copy ofthe report, outlining key issues that we will addressgoing forward, is attached as Appendix H.

Law enforcement and regulatory officials must workclosely with the private sector to reduce the vulnerabil-ity of cyber systems to electronic attack. Banks andother depository institutions are required by law and

supervisory guidance to have policies and proceduresto maintain the integrity of their data and systems. Wewill work with financial institutions to further protecttheir electronic systems from intrusions by alertingthem to recent incidences of and trends in cybercrimes and continue our efforts in this area.21

Work with International Partners andThrough International Organizations toEncourage the Adoption of Similar Anti-Money Laundering Regulations Throughoutthe World

In many important respects, anti-money launderingregulations issued pursuant to the USA PATRIOT Actraise the international regulatory bar. But if the rest ofthe world does not follow our lead, our goals will beundermined. Not only will tainted funds find otherways into the financial system, but the U.S. financialservices industry may find itself at a competitivedisadvantage if it insists on rigorous due diligence andanti-money laundering procedures where others donot. Goals One and Two discuss the internationalaspects of our anti-money laundering strategy, but itbears emphasizing that the Federal government mustaggressively seek to encourage all jurisdictions toadopt similar controls.

B. Improve the Effectiveness of Anti-MoneyLaundering Controls Through GreaterCommunication, Guidance, and InformationSharing

The flow of information has proven to be one of themost important elements of an effective anti-moneylaundering regime. The 2003 Strategy identifies severalkey information sharing priorities.

Expand Partnership with the FinancialServices Industry

Since passage of the USA PATRIOT Act, we havemaintained active consultations with the financialservices industry, with the result that the private sectorhas come to play an invaluable role in our efforts todevelop the Act’s implementing anti-money launder-ing regulations. Not only have we been able to rely onestablished relationships with the banking, securities,

21 See T. Glaessner, T. Kellermann, and V. McNevin, Electronic Security: Risk Mitigation in Financial Transactions (June 2002).

Page 32: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy 29Goal 3

futures, and insurance industries, among others, butwe have also forged new relationships with the manyother types of financial institutions that are now orwill soon be subject to anti-money laundering regula-tion and oversight.

To fully promote the role of the financial servicesindustry in the regulatory process, we have movedbeyond the traditional role contemplated by theAdministrative Procedures Act, whereby industriesaffected by proposed regulations have the opportunityto submit formal comments. Although this aspect ofthe financial services industry’s multifaceted involve-ment in the regulatory process remains important, wehave increasingly emphasized communication betweenthe affected industries and policy makers even beforerules are issued in proposed form. With respect to therules affecting correspondent banking relationships,for example, the banking and securities industryprovided valuable input from the outset concerningbusiness models and existing controls placed on suchrelationships.

Finally, we recognize that perhaps the most importantrole played by the financial services industry has been,and will continue to be, to provide accurate andconstructive feedback on the application of regula-tions. We are committed to ensuring that the regula-tory scheme meets our enforcement goals withoutimposing undue burden and expense. Our bestsources of information on such issues are the institu-tions that have to operate under them.

Improve the Quality and Timeliness ofRegulatory Guidance and Feedback Providedto Regulated Entities

Because so many new types of financial institutionsare subject to anti-money laundering controls, and thefinancial services sector is dynamic by its very nature,new fact patterns constantly arise that were notcontemplated when regulations were first issued.While industry is charged with ensuring that they arein full conformity with the law, we are committed toproviding clear, timely guidance so that financialinstitutions will be in a position to meet their legalobligations. We will also focus on better informingregulated institutions how information required to becollected or reported is used, and what types of datalaw enforcement finds most useful.

Specifically, we will work to provide guidance throughthe continued review and analysis of SuspiciousActivity Reports; feedback and guidance from theregulators on an industry-specific basis, especially forfinancial institutions newly subject to Bank Secrecy Actregulation; the Bank Secrecy Act Advisory Group;Operation Cornerstone; and other informal methods.

Further Strengthen the Public/Private Ex-change of Information

A key goal of the USA PATRIOT Act is to enhancecoordination and information flow between theFederal government and the private sector. Thisinformation exchange must flow both ways—from thefinancial institutions to the government, and from thegovernment to financial institutions. To this end, wewill continue to work to improve information ex-change mechanisms, both formal and informal, andwill work closely with financial institutions to informthem about changes in money laundering methods andthreats.

Improve the Process for Dialog withInterested Parties Regarding Privacy Issues

Automated information systems and advanced infor-mation processing techniques have made privacy asignificant national concern, and the growing impor-tance of anti-money laundering regulation has height-ened the need for fuller and more in-depth analysis ofprivacy issues. Systems used for analyzing and dissemi-nating BSA and related information must ensure thatthe information is well protected. Similarly, lawenforcement use of reported financial information insuch systems must maintain the security of the datainvolved and respect the appropriate privacy interestsof the nation’s citizens.

We are committed to ensuring thoughtful governmentconsideration of privacy issues, and will seek to de-velop a mechanism for effectively addressing andpromoting meaningful dialog--both within the govern-ment, and between the government and concernedcitizens--about them. We will consider how to achieveanti-money laundering goals in ways that are consis-tent with minimizing burdens and protecting indi-vidual privacy. To the extent feasible, the Federalgovernment will continuously address and review theseissues in light of new technological developments.

Page 33: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy30 Goal 3

C. Enhance Regulatory Compliance andEnforcement Efforts

Further Strengthen the Civil Enforcementand Examination of Money LaunderingRegulations

Comprehensive examination and credible enforcementof BSA regulatory requirements form is an integralpart of an effective anti-money laundering regime.These objectives have always been important and havebeen reflected in previous strategies; however, the USAPATRIOT Act has required us to place renewedemphasis on them. First, as a result of the Act, finan-cial institutions are subject to additional and increas-ingly complex requirements that will require corre-sponding changes to examination modules andprocedures. Second, we are now in the process ofextending BSA regulation to a host of new categoriesof financial institutions not previously subject to therange of anti-money laundering controls. Accordingly,we will take all steps necessary to provide for theappropriate examination of these entities.

1. Civil Enforcement

Authority for the civil enforcement of the BSAcurrently resides with FinCEN.22 Over the pastyear, FinCEN has applied a variety of availablesanctions against financial institutions for viola-

tions of the BSA, including the assessment of a $20million civil monetary penalty against BancoPopular de Puerto Rico in January 2003.23

Going forward, FinCEN will continue to build onthis foundation and exercise its available BSA civilenforcement remedies, whether alone or inconjunction with its regulatory and enforcementpartners, to ensure compliance. In particular,FinCEN will take steps to develop civil cases,where appropriate, that address non-complianceacross the spectrum of financial institutionssubject to the BSA. This will include the assess-ment of penalties and other appropriate remediesas the facts warrant, that will serve to remind thefinancial industry as a whole of the importance ofmaintaining effective BSA compliance programs.As part of this effort, the Federal government willseek greater cooperation among law enforcement,regulators, Treasury, and FinCEN to ensureconsistency in pursuing and applying appropriateremedies to BSA non-compliance matters. Trea-sury and FinCEN will also meet with the financialregulators to develop proposals for improving theFederal government’s ability to consistentlyenforce civil compliance with the BSA, and willreview the issue of delegating enforcementauthority to the other financial regulators toenhance BSA compliance.

22 FinCEN has delegated BSA examination authority to various supervisory agencies. See 31 C.F.R. 103.56(b). Based on examinationsconducted by these agencies, findings are sometimes referred to FinCEN for consideration of civil BSA penalties. Under Title 12, certainfederal supervisory agencies (Office of the Comptroller of the Currency; Office of Thrift Supervision; Board of Governors of the FederalReserve System; Federal Deposit Insurance Corporation; and National Credit Union Administration) also have remedies available,including the assessment of civil money penalties, for failure to comply with Title 12 suspicious activity reporting and BSA complianceprogram requirements.

23 In 2002, FinCEN assessed two civil money penalties, issued 33 letters of warning, 27 cautionary letters, and closed 16 other lesssignificant matters referred to it for review. In January 2003, Banco Popular de Puerto Rico entered into a deferred prosecutionagreement with the U.S. Department of Justice for failing to file Suspicious Activity Reports (SARs), in violation of Title 31 USC 5318(g)(l) and 5322(a), and agreed to forfeit $21.6 million to the United States. Concurrently, FinCEN assessed a $20 million civil moneypenalty against Banco Popular de Puerto Rico for BSA violations.

On April 3, 2002, Sovereign Bank, Wyomissing, Pennsylvania entered into a Consent to the Assessment of Civil Money Penalty to pay$700,000, without admitting or denying FinCEN’s determination that the institution failed to file timely approximately 2,000 CTRs. OnAugust 23, 2002, Great Eastern Bank of Florida, Miami, Florida entered into a Consent to the Assessment of Civil Money Penalty to pay$100,000, without admitting or denying FinCEN’s determination that the institution failed to file complete SARs in a timely manner forreportable transactions by at least 20 customers.

Also, in November 2002, the federal government prosecuted Broadway National Bank for its failure to maintain an adequate anti-moneylaundering program; failure to file SARs concerning approximately $123 million in suspicious bulk cash and structured cash deposits;and aiding and assisting customers to structure approximately $76 million in transactions to evade currency reporting requirements.Broadway National Bank pleaded guilty and was assessed a $4 million fine.

Page 34: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy 31Goal 3

2. Examination

The banking regulators, the Securities and Ex-change Commission, and the Commodity FuturesTrading Commission have already begun theprocess of developing new examination proce-dures in light of the changes brought about by thePATRIOT Act. With the issuance of final regula-tions, the task of examination begins. As always,educating the regulated community about the newrequirements is an integral part of successfulimplementation. This process has already begun,and will continue. The Department of the Trea-sury and FinCEN will assist the regulators, helpingto ensure consistency in the interpretation of theregulations and making necessary adjustments tothe regulatory text.

In addition, the Department of the Treasury andFinCEN are committed to meeting the majorchallenge of providing for appropriate examina-tion of the broad and diverse range of financialinstitutions that are or will be newly subject toanti-money laundering regulation under the BSA,but have no existing federal anti-money launder-ing regulator. Anti-money laundering examina-tion is not an exact science, and anti-moneylaundering compliance is not susceptible toformulaic implementation across industry sectors.Nevertheless, under the 2003 Strategy, we pledge todo all possible to ensure that we maintain aneffective and consistent examination regime tokeep up with the expanding scope of our anti-money laundering regulations.

As a first step toward meeting this goal, we willwork to ensure that the examiners of the indus-tries newly subject to BSA regulation aggressivelyundertake to educate them about their newresponsibilities, and assist in developing programsand procedures that target the money launderingrisks. Education and outreach are important toensure that parts of the financial services industrywith less experience with comprehensive federalregulation are fully informed of their obligationsand understand how to achieve full compliancewith the law.

3. Work with State Governments to Ensure thatthere is a Consistent and ComprehensiveAnti-Money Laundering Regime in theUnited States

State, and in some instances, tribal and municipalgovernments have and will continue to play animportant role in our overall anti-money launder-ing strategy. This is especially true as we expandanti-money laundering regulation to categories offinancial institutions that are predominantlyregulated at the state level. All government,whether Federal, state, tribal or local, has aninterest in ensuring that our financial sector is notsubject to unnecessarily duplicative or inconsistentregulation. In a spirit of mutual respect, based onour system of federalism, we will work to activelyengage these partners to ensure that inconsisten-cies are removed.

Among other things, under the 2003 Strategy, wewill work vigorously to improve the process forraising and discussing issues with non-Federalregulators. These regulators may potentially playimportant roles in ensuring the overall effective-ness of anti-money laundering regulation, andoften possess much greater in-depth knowledge ofparticular financial institutions in their jurisdic-tions. The key is coordination. With respect tomoney transmitters, for example, communicationbetween state and Federal regulators is essential,given the intersection of the two regulatoryschemes. Moreover, we wish to ensure that thethoughts, views, and experience of non-Federalregulators are incorporated into the Federalregulatory regime.

4. Strengthen Regulatory Oversight of ARS

As noted in Goal 1, ARS, such as hawala, arevulnerable to money laundering. To date, lawenforcement’s experience has been that alternativeremittance transmitters often maintain limited, ifany, reviewable account and transaction recordsledgers. This paucity of standardized record-keeping is complicated by the fact that the recordsmay be impossible to decipher without the help ofan insider, and that the notations memorializingspecific transactions are often destroyed within ashort period of time. In addition,

Page 35: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy32 Goal 3

alternative remittance transmitters may servecustomers without asking many questions abouttheir true identity, the true ownership of thefunds or other questions relevant to an effectiveanti-money laundering program, and there maybe significant use of nominee account holders.

Such activities are not permitted for a moneytransmitter operating in the United States.Money transmitters and other ARS are subject tocomprehensive record keeping requirementsunder the BSA. We intend to ensure that theseinstitutions are meeting their reporting andrecord keeping requirements under the BSA, andwill institute enforcement actions against thosewho do not comply with the regulations. To thisend, we will continue our outreach efforts toeducate the industry about the regulatoryrequirements. We will also continue to workclosely with law enforcement to identify addi-tional ways to better ensure compliance withexisting laws and regulations.

Page 36: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy 33

List of Appendices

Appendix A – Recent Significant Cases in the War Against TerroristFinancing (Goal 1)

Appendix B – Comprehensive List of Joint Designations of Individualsand Entities as Terrorists or Terrorist Supporters (Goal 1)

Appendix C – Progress with Non-Cooperative Countries and Territories(NCCTs) (Goal 1)

Appendix D – Trade-Based Money Laundering and Terrorist Financing(Goal 1)

Appendix E – Recent Significant Money Laundering Cases (Goal 2)

Appendix F – Financial Crime-Free Communities (C-FIC) SupportProgram Grants (Goal 2)

Appendix G – Summary of the Anti-Money Laundering Provisions ofthe USA PATRIOT Act and the Steps Taken toImplement Them. (Goal 1)

Appendix H – Terrorist Financing Online (Goal 1)

Appendix I – Money Laundering Defendants Sentenced in FY 2001 –Highlights (Goal 2)

Appendix J – International Asset Forfeiture Sharing (Goal2)Treasury Forfeiture FundDepartment of Justice forfeiture Fund

Page 37: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy34 Appendix A

Appendix ARecent Significant Cases in the

War Against Terrorist Financing

Benevolence International Foundation: EnaamArnaout, Executive Director of Benevolence Interna-tional Foundation (BIF), an Illinois charity recognizedas a tax deductible charitable organization, had arelationship with Usama bin Laden and his associates.Through BIF, Arnaout illicitly obtained funds forterrorist organizations using funds from both knowingand unsuspecting donors. Arnaout, a Syrian-bornnaturalized U.S. citizen, has been in federal custodysince he was arrested April 30, 2002 on perjurycharges. On October 9, 2002, he was charged in amulti-count indictment that included charges ofproviding material support knowing that such supportwould be used to engage in overseas violence. It wasalleged that these moneys covertly supported al Qaida,the Chechen mujahideen, and armed violence inBosnia. The indictment further alleged that BIF,which was not itself indicted but whose assets werefrozen and subject to forfeiture, operated together withArnaout and other individuals and entities, as acriminal enterprise that engaged in a pattern ofracketeering activity, raised funds and provided othermaterial support for the violent activities of terroristorganizations in various areas of the world. OnFebruary 10, 2003, Arnaout pled guilty to a racketeer-ing conspiracy, admitting that donors of BIF weremisled to believe that their donations would supportpeaceful causes when, in fact, their funds were ex-pended to support violence overseas. Arnaout alsoadmitted providing various items to support fightersin Chechnya and Bosnia-Herzegovina, includingboots, tents, uniforms, and an ambulance. On August18, 2003, Arnout was sentenced to over 11 years’imprisonment and ordered to pay over $315,000restitution to the UN High Commission on Refugees.

Sami Omar Al-Hussayen & Help the Needy: TheDepartment of Justice recently took concerted lawenforcement actions in Idaho and Syracuse, NY in aninvestigation involving a Michigan-based charityknown as the Islamic Assembly of North America(IANA). IANA’s Internet web sites contain messages

calculated to raise funds and recruit persons for anti-U.S. violence and jihad.

On February 12, 2003, a University of Idaho graduatestudent and Saudi citizen named Sami Al-Hussayenwas indicted in Boise on seven counts of visa fraudand four false statement offenses. The charges arebased in part on Al-Hussayen’s failure to include hisassociation with IANA on a student visa renewal form.Al-Hussayen has been a registered agent of IANA’ssince May 11, 2002, and is also listed as the administra-tive contact on a number of IANA-operated websites.Between January 1997 and December 2002, approxi-mately $300,000 of unexplained (non-student aid)funds flowed through various bank accounts con-trolled by Al-Hussayen. Approximately one-third ofthe money transmitted to these accounts from over-seas was ultimately remitted to IANA and otherassociates. According to the indictment, in June 2001an IANA website posted an article entitled “Provisionsof Suicide Operations,” which suggested the use ofaircraft as instruments of suicide attacks.

On February 18, 2003, in Syracuse, NY, four defen-dants and two organizations, including “Help TheNeedy,” were charged with conspiring to transfer fundsto Iraq in violation of International EmergencyEconomic Powers Act (IEEPA), as well as twelve countsof money laundering and one count of conspiracy tocommit money laundering. Founded in 1993, Help theNeedy describes its mission as a relief effort to Iraq.Among the defendants was its founder, Dr. RafilDhafir, listed as IANA’s vice president. Dhafir, OsamehAl-Wahaidy, and Ayman Jarwan were arrested onFebruary 25, 2003, and search warrants were executedat 11 different locations. On April 22, 2003, AlWahaidy pled guilty to a felony charging him with anIEEPA violation. On April 25, 2003, Jarwan pled guiltyto conspiring to violate IEEPA by sending money toIraq, and conspiring to defraud the United States byimpairing and impeding the calculation and collectionof taxes.

Page 38: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy 35Appendix A

Mohammed Ali Hasan Al-Moayad: On January 4,2003, prosecutors in Brooklyn, NY, filed a criminalcomplaint charging Mohammed Al-Moayad withconspiring to provide material support and resourcesto Al Qaida and Hamas. On January 9, 2003, a crimi-nal complaint was filed charging Al-Moayad’s assis-tant, Mohammed Moshen Yahya Zayead, with thesame charges. Al-Moayad is a prominent Yemeni clericwhose name appears as a reference on Al Qaidatraining camp documents. Al-Moayad solicited fundsfrom persons in the United States, claiming that hehad provided over $20 million to al Qaida and that hecould guarantee that the remitted funds would beapplied solely to jihad activities. On January 10, 2003,al Moayed and Zayed were arrested in Germany, wherethey had traveled to receive a large donation. OnJanuary 11, 2003, a German court found the U.S.charges sufficient and ordered them detained. InMarch 2003, in Frankfurt, Germany, a judge ruled thatthe U.S. had presented sufficient evidence to supportextradition of Al-Moayad and Zayed. As of thiswriting, the extradition is pending.

United States v. Sami Al-Arian, et al: On February 19,2003 in Tampa, FL, ProfessorSami Al-Arian and sevenothers were charged in a fifty-count indictment forusing facilities in the United States, including theUniversity of South Florida and affiliated non-profitresearch foundations, to serve as the North Americanbase of Palestinian Islamic Jihad (PIJ), a designatedterrorist organization since 1997. Eight years ofintercepted wire conversations and faxes demonstratethe defendants’ active involvement in the worldwideoperations of PIJ. Charges filed included, amongothers, conspiracy to provide material support toterrorism.

James Ujaama: On August 28, 2002, in Seattle, WA,U.S. citizen and Muslim convert James Ujaama wasindicted for conspiracy to provide material support orresources to terrorism, and using, carrying, possessing,and discharging firearms during a crime of violence.Ujaama attempted to set up a jihad training camp at afarm in Bly, Oregon, and operated websites for theformer Imam of the Finsbury Park Mosque in London,England. On April 14, 2003, Ujaama pled guilty toconspiracy to violate IEEPA. He admitted to conspir-ing with others to provide support, including money,computer software, technology, and services, to theTaliban and to persons in the territory of Afghanistan

controlled by the Taliban. He agreed to cooperate withthe government’s ongoing terrorism investigations.Pursuant to the plea agreement, Ujaama will besentenced to 24 months in prison.

Portland Jihad Case: The charges arise out of analleged attempt in late 2001 and early 2002 by six ofthe seven defendants (Jeffrey Leon Battle, PatriceLumamba Ford, Ahmed Bilal, Muhmmad Bilal, HabisAbdulla al Saoub and Mike Hawash) to enter Afghani-stan through China and Pakistan to aid and assist theTaliban against the United States and coalition forcesstationed there. The seventh defendant, October Lewis,Battle’s ex-wife, served as a conduit for money sent tohim during his trip, including his later travel to Koreaand then to Bangladesh to join Tablighi Jamatt, anevangelical Islamic group, as a way of entering Paki-stan and ultimately Afghanistan. On October 3, 2002,all defendants, but one, were indicted on charges ofconspiring to levy war against the U.S., conspiring toviolate the IEEPA and provide material support andresources to terrorism, and possession of firearms infurtherance of crimes of violence. The last defendantwas charged by criminal complaint on April 28, 2003and ultimately added as a defendant by supersedingindictment on May 2, 2003. Trial is scheduled forOctober 1, 2003. In a related matter, on March 3, 2003,Mohammed Kariye, the Iman of the Portland mosque,pled guilty to social security fraud.

North Carolina Hizballah Cell: This criminal investi-gation began when a North Carolina sheriff noticed agroup of Lebanese men buying large volumes ofcigarettes. An FBI Joint Terrorism Task Force investi-gation uncovered a cigarette smuggling enterpriseinvolving two dozen people, some of whom hadconnections to Hizballah operatives in Lebanon. OnMarch 28, 2001, the defendants were indicted onRICO charges, based on the cigarette smuggling, andtax evasion. Later, they were charged with conspiringto provide material support to Hizballah in violationof 18 U.S.C. § 2339B. The latter charges rested onfunds sent to Hizballah, and a military procurementprogram in which operatives in Beirut tasked NorthAmerica-based adherents to purchase and ship avariety of dual-use items purchased in the UnitedStates and Canada.

Primary defendants Mohamed Hammoud and ChawkiHammoud were tried and convicted in June 2002 in

Page 39: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy36 Appendix A

the first 18 U.S.C. § 2339B jury trial in Americanhistory. On February 28, 2003, Mohammed Hammoudwas sentenced to 155 years imprisonment (based onthe terrorism sentencing enhancement) and hisbrother Chawki Hammoud received 51 monthsimprisonment and was ordered to report to Immigra-tion and Naturalization Service (INS) for deportationproceedings immediately after serving his sentence.

Al Qaida Drugs-for-Weapons Plot: On September 17,2002, Syed Mustajab Shah, Muhammed Abid Afridiand Ilyas Ali were charged with conspiring to importand distribute drugs and conspiring to provide mate-rial support to Al Qaida. Between April and September2002, they allegedly negotiated with undercover lawenforcement agents for the sale of 600 kilograms ofheroin and five metric tons of hashish. The defendantsalso negotiated with undercover law enforcementagents for the purchase of four “Stinger” anti-aircraftmissiles, which they indicated they were going to sellto members of Al Qaida in Afghanistan. Thosenegotiations took place in, among other places, SanDiego and Hong Kong. The defendants were arrestedin Hong Kong on September 20, 2002 by local lawenforcement authorities, at the request of the UnitedStates government. On March 6, 2003, they wereextradited thereafter arraigned in San Diego.

AUC Drugs-for-Weapons Plot: On November 1, 2002,federal prosecutors in Houston filed a criminal com-plaint charging Uwe Jensen and his boss, Carlos AliRomero Varela, both of Houston as well as CesarLopez (A.K.A. “Commandant Napo”), and an indi-vidual identified as “Commandant Emilio,” both highranking members of Autodefensas Unidas de Colom-bia (AUC/United Self Defense Forces of Colombia),the Colombian right-wing designated terrorist organi-zation, with drug conspiracy and conspiracy to pro-vide material support or resources to AUC. Thecomplaint provided the authority for Costa Rican lawenforcement officials, in conjunction with the FBI andDEA, to arrest three of the defendants on November 5,2002 in San Jose, Costa Rica. Jensen was arrested thatsame day in Houston. These arrests resulted from anundercover sting in a drugs-for-weapons deal thatwould have delivered $25 million worth of weaponryto AUC, in exchange for cash and cocaine. Theweapons that the defendants believed they werepurchasing included 9,000 assault rifles, including AK-47’s, submachine guns, and sniper rifles; 300 pistols;

rocket propelled grenade launchers; almost 300,000grenades; shoulder fired anti-aircraft missiles; andapproximately 60 million rounds of various types ofammunition. The grand jury returned an indictmenton December 4, 2002. On April 23, 2003, Varela pledguilty to the § 2339B charge and the drug conspiracycharges. Jensen pled guilty on June 24, 2003. Emilioand Napo are both in Costa Rican custody awaitingextradition

INFOCOM/Marzook Illegal Export & Asset Conceal-ment Case: In December 2002, the Attorney Generalannounced the indictment of a closely-held computercompany in Dallas known as INFOCOM and severalof its officers. The indictment charges the defendants’alleged conduct of concealing a continuing profitinterest held in the company by Mousa Abu Marzook,a senior Hamas leader who was listed as a SpeciallyDesignated Terrorist in a 1995 Executive Order issuedpursuant to the IEEPA. Marzook and his wife, NadiaElashi, who allegedly participated in the scheme, werealso named as defendants. Under IEEPA and therelated designation process, United States-basedpersons can be charged with the crime of failing tofreeze the assets of specially designated terrorists.

Page 40: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy 37Appendix B

Appendix BComprehensive List of Joint Designations of Individuals

and Entities as Terrorists or Terrorist Supporters

U.S.-Saudi Joint Designations —On March 11, 2002,the United States participated in its first joint designa-tion of a terrorist supporter. Acting with Saudi Arabia,we jointly designated the Somalia and Bosnia-Herzegovina offices of Al Haramain, a Saudi-basedNGO linked to al Qaida, and jointly forwarded thenames of these organizations to the UN SanctionsCommittee for inclusion under the UNSCR 1333/1390list. On September 9, 2002, the United States andSaudi Arabia jointly referred to the Sanctions Com-mittee Wa’el Hamza Julaidan, an associate of Usamabin Laden and al Qaida supporter.

G7 Joint Designation – On April 19, 2002, the UnitedStates and the other G7 members jointly designatednine individuals and one organization. Most of thesegroups were European-based al Qaida organizers andterrorism financiers. Because of their al Qaida links,all ten names were forwarded to the UN SanctionsCommittee for inclusion under the UNSCR 1333/1390list.

U.S.-Italy Joint Designation – On August 29, 2002, theUnited States and Italy jointly designated 11 individu-als linked to the Salafist Group for Call and Combatdesignated in the original U.S. Annex to E.O. 13224,and 14 entities that are part of the Nada/Nasreddinfinancial network run by two terrorist financiersdesignated on earlier E.O. 13224 lists.

U.S.-Central Asia Joint Designation – On September6, 2002, the United States; Afghanistan; Kyrgyzstan;and China jointly referred to the UN SanctionsCommittee the Eastern Turkistan Islamic Movement,an al Qaida-linked organization that operates in theseand other countries in Central Asia.

Designation of Jemaa Islamiyya – On October 23,2002, the United States designated the Southeast Asianterrorist group, Jemaa Islamiyya, responsible for thebombing of a nightclub in Bali on October 12, 2002 –the deadliest terrorist attack in the world sinceSeptember 11, 2001. Subsequently, in the most

widespread show of support of any terrorist designa-tion to date, the United States joined Australia, Indo-nesia; Singapore; and 46 other countries, including allthe members of ASEAN and the EU, in requesting theUnited Nations to also designate Jemaa Islamiyya forits ties to al Qaida.

Jemaa Islamiyya Leaders – On January 24, 2003 theUS designated two key individuals, Mohamad IqbalAbdurrahman (aka “abu Jibril”) and NurjamanRiduan Isamuddin (aka “Hambali”), related to the SEAsian group Jemaa Islamiyah. Australia joined theUnited States in requesting that both names be addedto the UN list and Singapore joined in requesting theaddition of one of the names (Hambali).

Three Chechen Groups – On February 28, 2003, theUnited States designated three Chechnya-basedterrorists groups responsible for the Moscow theatersiege. Thereafter, UN Security Council membersFrance; Russia; China; the UK; Spain; and Germanyjoined the United States in asking the United Nationsto also designate these groups for their ties to al Qaida.

Page 41: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy38 Appendix C

Appendix C

The 2002 NMLS included a comprehensive report onthe status of each of the 23 countries that were placedon the FATF Non-Cooperative Countries (NCCT) listduring 2000 and 2001. The 2002 NMLS also reportedthat, as of June 2002, a total of eight countries hadbeen removed from the NCCT list and described theirprogress. The NCCT review process continues tostimulate efforts by many of the governments toimprove their systems. This report reflects the signifi-cant developments of the remaining NCCT countriesthat have either been removed from the list since June2002, have enacted significant legislative reforms toavoid countermeasures by the FATF, or have madefurther legislative changes to address deficiencies intheir AML regime.

While a number of countries who remain on theNCCT list have developed their AML regime sinceJune 2002, there are some jurisdictions in whichsubstantial reforms have not yet been made andrecognized by the FATF. No updates will therefore beincluded on Burma, and Indonesia.

Countries Removed From NCCT list

Russia

As a result of the implementation of significantreforms to its anti-money laundering system, Russiawas removed from the NCCT list in October 2002.Since being placed on the NCCT list in June 2000,Russia has actively sought to address the deficienciesidentified by the FATF. Since the effective date of itsanti-money laundering legislation, Russia has madenotable progress in implementing its anti-moneylaundering regime. The Russian FIU has accom-plished much in a short period of time. Its leadershipand staff are dedicated to implementing the require-ments of the law. As a result of a positive FATF mutualevaluation report, the Russian Federation was admit-ted to full FATF membership in June, 2003.

Progress with Non-CooperativeCountries and Territories (NCCTs)

Dominica

As a result of the implementation of significantreforms to its anti-money laundering system,Dominica was removed from the NCCT list in Octo-ber 2002. Since being placed on the NCCT list in June2000, Dominica has actively sought to address thedeficiencies identified by the FATF. The governmentof Dominica has attempted to meet resource needs byallocating staff and funds to the appropriate bodies toimplement the new anti-money laundering regime.There is a high level of awareness of the new anti-money laundering requirements throughout thefinancial sector, both on and offshore, and full engage-ment in the effective implementation of those require-ments. The enhancement of Dominica’s anti-moneylaundering regime and strengthening of its regulatoryand supervisory oversight of the financial servicessector has had a major impact on the offshore sector,which has diminished substantially.

Grenada

As a result of the implementation of significantreforms to its anti-money laundering system, Grenadawas removed from the NCCT list in February 2003.Since being placed on the NCCT list in September2001, Grenada has actively sought to address thedeficiencies identified by the FATF. Substantiallegislation has been enacted strengthening Grenada’santi-money laundering regime and establishing aneffective supervisory and regulatory regime for theoffshore sector, resulting in a drastic reduction in thenumber of offshore banks operating in the jurisdic-tion. Previous impediments to information exchangehave been eliminated. International cooperation hasimproved substantially. Grenada’s FIU has activelyinvestigated several money laundering cases, withanother case proceeding in court.

Page 42: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy 39Appendix C

Marshall Islands

As a result of the implementation of significantreforms to its anti-money laundering system, theMarshall Islands was removed from the NCCT list inOctober 2002. Since being placed on the NCCT list inJune 2000, the Marshall Islands has actively sought toaddress the deficiencies identified by the FATF. In June2000, no such framework was in place and theMarshall Islands fully met many of the NCCT criteria.The anti-money laundering system in the MarshallIslands is in its infancy and is developing rapidly.While being a very tiny jurisdiction, the MarshallIslands authorities have established an effective bankexamination program and a functioning financialintelligence unit that handles reports of suspicioustransactions. In addition, there are no offshore banksthat are licensed in the Marshall Islands. The offshoresector primarily consists of maritime-related NonResident Companies (NRCs). The Marshall Islandsauthorities ensure that necessary information regard-ing legal and business entities is recorded, maintainedand accessible to provide to relevant authorities. Itwas determined that these NRCs pose limited moneylaundering risks.

Niue

As a result of the implementation of significantreforms to its anti-money laundering system, Niue wasremoved from the NCCT list in October 2002. Sincebeing placed on the NCCT list in June 2000, Niue hastaken a number of drastic steps to reform its offshoresector. The International Banking Repeal Act, whichwas brought into force on June 5, 2002, brings to anend Niue’s status as an offshore banking center. Inpractice, Niue no longer has a financial sector that isexposed to the threat of money laundering.

St. Vincent and the Grenadines

As a result of the implementation of significantreforms to its anti-money laundering system, St.Vincent and the Grenadines was removed from theNCCT list in June 2003. Since being placed on theNCCT list in June 2000, St. Vincent and the Grena-dines has actively sought to address the deficienciesidentified by the FATF. The government of St. Vincentand the Grenadines has enacted significant legislativereforms establishing an FIU, mandating suspicious

transaction reporting, enabling exchange of informa-tion, facilitating international cooperation, andstrengthening the supervisory and regulatory regimefor its offshore sector. The size of the offshore sectorhas been significantly reduced as a result of implemen-tation of the enhanced regime. The FIU is fullyoperational, active and has responded promptly andfully to numerous foreign requests for assistance.

Countries That Have Made Legal Reforms toAvoid Countermeasures

The Philippines

On September 29, 2001, the Philippines passed theAnti-Money Laundering Act of 2001. However, therewere a number of key legal deficiencies with this law.The FATF therefore recommended the application ofadditional countermeasures as of March 15, 2003 if thePhilippines failed to enact adequate legal reforms. OnMarch 13, 2003, the FATF decided not to apply anycountermeasures against the Philippines as a result ofthe enactment of the March 7, 2003 Republic Act No.9194 which amends the Philippine Anti-MoneyLaundering Act of 2001. This new legislation ad-dresses the main legal deficiencies in the Philippineanti-money laundering regime previously identified bythe FATF. On the basis on this progress, the FATF hasinvited the Philippines to submit an implementationplan. However, the Philippines will still remain on theNCCT list until it has effectively implemented its newanti-money laundering legislation.

Ukraine

On December 7, 2002, Ukraine enacted the “Law ofUkraine on Prevention and Counteraction of theLegalization (Laundering) of the Proceeds fromCrime.” This legislation, however, contained seriousdeficiencies identified by the FATF. As a result ofUkraine’s failure to enact anti-money launderinglegislation meeting international standards, the FATFapplied countermeasures against the Ukraine onDecember 20, 2002. On February 14, 2003, the FATFwithdrew its recommendation for the imposition ofcountermeasures against Ukraine as a result of theenactment by Ukraine of several legislative amend-

Page 43: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy40 Appendix C

ments addressing key deficiencies in the legislativeframework. Ukraine will, however, remain on theNCCT list until it has effectively implemented its newanti-money laundering legislation.

Nigeria

After being placed on the NCCT list, Nigeria did nottake action to address the deficiencies in its anti-money laundering regime and did not adequatelyengage with FATF. On October 31, 2002, the FATFtherefore recommended the application of additionalcountermeasures if Nigeria failed to enact adequatelegal reforms by December 15, 2002. The FATFdecided not to apply additional countermeasures toNigeria due to Nigeria’s enactment of the “MoneyLaundering Act (Amendment) 2002” on December 14,2002. This legislation significantly enhances the scopeof Nigeria’s 1995 anti-money laundering law. InDecember 2002, Nigeria also enacted the Economicand Financial Crimes Commission Act to establish afinancial intelligence unit as well as competent investi-gative and enforcement authorities against moneylaundering. In May 2003, Nigeria enacted the MoneyLaundering Act 2003 to consolidate and improveprevious anti-money laundering legislation. However,Nigeria must continue to strengthen and harmonize itslegislative and regulatory framework and must beginoperating its anti-money laundering regime. Nigeriawill remain on the NCCT list as it works towards thesegoals.

Countries That Have Enacted AdditionalLegislation

Egypt

In 2003, Egypt continued to improve its anti-moneylaundering legislative and regulatory framework. OnJune 9, 2003, Egypt enacted Law No. 78-2003 toexpand the scope of predicate offenses and to remove apre-existing overbroad exemption from imprisonmentfor money laundering activity. In addition, on June10, 2003, Egypt enacted Prime Minister Decree No.951-2003 to detail requirements for financial institu-tions regarding suspicious activity reporting andcustomer identification procedures. The Decree alsoelaborated on the functions of the Egyptian financialintelligence unit (MCLU), the supervision of entitiesfor compliance with anti-money laundering obliga-

tions, and international cooperation. Egypt is nowworking towards implementing its anti-money laun-dering regime.

Cook Islands

On May 7, 2003, nine new Acts were passed by theCook Islands Parliament with the intention of creatingan effective anti-money laundering framework, andintroducing regulation and supervision of the finan-cial sector consistent with international standards.The FATF is assessing this legislation, and had identi-fied a number of issues requiring clarification. At itsPlenary meeting in June 2003, the FATF acknowledgedthe substantial progress which the Cook Islands hasmade in addressing the concerns of the internationalcommunity through the enacted of this legislativepackage. The FATF noted that the necessary regula-tions have yet to be enacted. The Cook Islands willremain of the NCCT list until it is demonstrated thatthis legislation have been fully implemented and haseliminated all shell banks.

Guatemala

In June 2002, Guatemala enacted a Banks and Finan-cial Groups Law that will place offshore banks underthe oversight of the Superintendency of Banks follow-ing a transition period and once authorization tooperate is granted. The Superintendency of Banks hasconducted on-site inspections of 13 offshore banksoperating in Guatemala, 12 of which have applied forauthorization to operate within a financial group.Additionally, on May 21, 2003, Guatemala’s MonetaryBoard issued Resolution FM-68-2003 eliminating allcoded accounts within three months. As a result of thesignificant progress made by Guatemala in addressingdeficiencies identified by the FATF, Guatemala hasbeen invited to submit an implementation plan to theFATF, representing a positive step forward in theprocess toward removal from the NCCT list.

Nauru

On March 27, 2003, Nauru’s Parliament passed twopieces of legislation which are intended to address theconcerns of the FATF. The Corporation (Amendment)Act of 2003 is intended to abolish the offshore bankingsector which consists primarily of shell banks. Thesecond act is intended to update and consolidate the

Page 44: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy 41Appendix C

Anti-Money Laundering Act of 2001. At its Plenarymeeting in June 2003, the FATF welcomed Nauru’srecent legislative efforts to eliminate offshore shellbanks. However, before the FATF can consider theremoval of counter-measures, it believes that Naurumust take additional steps to ensure that the shellbanks cease to operate and are no longer conductingany banking activity. Once Nauru establishes that itis cooperating fully with the international commu-nity, and has taken all available steps to ensure thatthe offshore banks that it had previously licensed areno longer operating, the FATF will consider theremoval of counter-measures.

Page 45: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy42 Appendix D

APPENDIX D

24 U.S. v. Shakeel Ahmad, 231 F.3d 805 (2000) (cert. denied Nov. 27, 2000.)

25 The Black Market Peso Exchange is extensively discussed in Goal 1, see fn. 8.

Trade-Based Money Laundering and Terrorist Financing

Trade-Based Value Transfer

Criminally-minded individuals and organizations havelong misused international trade mechanisms to avoidtaxes, tariffs, and customs duties. As both the formalinternational financial system and informal valuetransfer systems become increasingly regulated,scrutinized, and transparent, the risk of criminalmoney launderers and terrorist financiers attemptingto use fraudulent trade-based practices in interna-tional commerce to launder, move, and use funds alsoincreases.

Trade-based value transfer schemes use commerce inlicit or illicit goods to transfer value. For example,under-invoicing a shipment of trade goods fromcountry A to country B provides a simple and effectiveway to launder the proceeds of criminal activity. Over-invoicing a shipment of goods gives criminal organiza-tions a paper rationale to send payment abroad and/orlaunder money. Thus, if a container of electronics isworth U.S. $ 50,000, but is over-invoiced for U.S. $100,000, the subsequent payment of U.S. $ 100,000will cover both the legitimate cost of the merchandise(U.S. $ 50,000) and allow an extra U.S. $ 50,000 to beremitted or laundered abroad. The business transac-tion and documentation disguise the illicit transfer of$50,000, and wash the money clean. Informal ValueTransfer Systems (IVTS) frequently make use ofinvoice manipulation as part of a scheme to transfervalue between IVTS operators.24

There are a number of other types of invoice fraud andtrade techniques. For instance, export incentives oftenencourage and disguise fraud. In this scheme, govern-ments pay company cash incentives to export prod-ucts, and the company uses the same export to laundermoney. In some countries, traders report to exchangecontrol authorities that imports cost more, or exports

less, than the actual value. The excess foreign exchangegenerated can be used to purchase additional foreigntrade items. In some areas of the world, trade goods(including narcotics) are simply bartered for othercommodities of value.

The simple schemes described above can become morecomplex when the misuse of trade also involvestraditional and entrenched ethnic trading networks,indigenous business practices, smuggling, corruption,narcotics trafficking, the need for foreign exchange,capital flight, terrorist financing, and tax avoidance.Frequently, many of these elements are co-mingledand intertwined, making it extremely difficult forcriminal investigators to follow the trail.

Trade-based money laundering can also be viewed as acomponent of other types of alternative remittancesystems, such as hawala, the Black Market Peso Ex-change,25 and the use of precious metals, gems, andother commodities. Alternative remittance systems,sometimes referred to as IVTS, can be problematicbecause they use parallel banking, or undergroundbanking and move money or transfer value withoutnecessarily using the regulated financial industry. Inall of these alternative systems, trade is most often thevehicle that provides “counter valuation” or a methodof “balancing the books.”

Trade-based value transfer is prevalent in many partsof the world that harbor terrorist groups and that arevulnerable to terrorist financing because of loosefinancial regulation and lax import/export laws andregulations. At present, it is difficult for law enforce-ment to interdict suspect transactions in this under-world of trade. At times, however, trade-based systemsintersect with banks and other traditional financialinstitutions in order for the terrorist financiers or non-terrorist money launderers to obtain currency needed

Page 46: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy 43Appendix D

26 A recent Congressionally- mandated study conducted by Treasury/FinCEN on ARS revealed that some domestic-based ARS operatorsmaintain bank accounts for various purposes, including managing ancillary businesses; conducting aggregate wire transfers; andacquiring monetary instruments for bulk shipment overseas to settle payments with counterpart ARS operators. The study cites anexample in which a domestic-based ARS operator wired money to an overseas account, after which the funds were withdrawn topurchase commodities that were shipped to another overseas location, where they were sold. Proceeds from those sales were put into abank account maintained by an overseas ARS operator, and used to pay the ultimate beneficiaries.

27 See FinCEN Advisory on Informal Value Transfer Systems, Issue 33, March 2003.

28 U.S. v. Hussein Alshafei, et al.

29 A U.S. company may be willing to sell goods to a foreign company at a discount in order to open up a particular market for the U.S.company overseas. The foreign company purchasing the discounted goods may, unknown to the U.S. company, be a front for a criminaloperation seeking to launder funds, as well as to gain a profit through a trade diversion scheme.

to purchase goods for further fund transfer, or becausethe financial institutions serve as links in a clearingprocess that involves wire transfers.26 Where trade-based money laundering/terrorist financing intersectswith financial institutions, law enforcement may beable to identify the brokers or their representatives.Moreover, at that point, financial institutions may beable to review the trade-related financial transactionsfor indications of unusual activity, which may bereported to authorities in suspicious activity reports.

In this regard, it is important for law enforcementofficials to assert a much more aggressive role inrecognizing and investigating how trade can be used inmoney laundering and in the financing of terrorism. Itis also essential that government authorities take activemeasures to make financial institutions aware of theways IVTS operations may intersect with their institu-tions, so that they can better monitor and report onthese activities.27

Recent money laundering cases involving Interna-tional Emergency Economic Powers Act (IEEPA)violations demonstrate the use of commodities orgoods to facilitate the transfer of value to OFAC-blocked countries.28 In these cases, IVTS operatorsaccept cash from expatriates in the U.S. and, usinginformal alternative remittance system mechanisms,transfer the funds abroad where the money is used topurchase miscellaneous goods, (medicine, food, etc.)for family members and friends located in the OFAC-blocked country. In many of these cases, funds aretransferred through third parties outside the OFAC-blocked country, who further transfer the funds/valueto the OFAC-blocked country, in the form of localcurrency or goods.

Trade Diversion Schemes

Trade diversion schemes create hard-to-detect valuetransfers that not only launder dirty money, but alsothemselves provide quick illegal profits. For example, aforeign front company may purchase legal goods froma legitimate U.S. company at a significant discount (upto 50%);29 pay through a letter of credit, send thegoods via an intermediary in a third country, anddivert (i.e. return) the goods back to the United States,where they are sold to wholesalers at a higher price,but at an amount that still represents a discount (e.g.,20%) for the new buyer. The seller in this lattertransaction (e.g., an intermediary front companyassociated with a criminal operation) then receives theproceeds of a legal sale. If a front company purchases$1 million worth of goods at a $500,000 discount andre-sells them for $800,000 a few weeks later through atrade diversion scheme, the mechanism can generate a$300,000 profit in apparently clean funds that anyonecan use.

Gold, Gems, Diamonds, and Trade

Trade in gold, diamonds, and other precious metalsand gems have long been associated with moneylaundering. Terrorist organizations around the worldhave also used gold and the trade of precious com-modities to launder money or transfer value. Sinceour success in establishing international anti-moneylaundering/counter-terrorist financing standards isbringing about an increase worldwide in financialtransparency, the underworld of gold and otherprecious metals and gems may increasingly be used asan alternative method of laundering illicit proceeds ormoving terrorist-related funds.

Page 47: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy44 Appendix D

30 Many other commodities with universal value (e.g., medical equipment; alcohol; tobacco; construction material; etc.) are just asvulnerable to being used for money laundering and value transfer. Terrorist financiers, for example, can raise funds to support terrorismby exporting any kind of commodity or good that has value and use in the receiving country. Such transactions can be ad hoc, asopposed to repeated and regular, and mixed in with other trade transactions, making the activity even harder to detect.

31 Associated Press, Group That Tracks Financing of Terrorists to Double in Size, LA Times, Jan.10, 2003 at A20.

There are many reasons that gold is popular withmoney launderers. It has been a universal repositoryof wealth since antiquity; is a readily acceptablemedium of exchange around the world; enjoys rela-tively constant value; offers easy anonymity; is por-table; its form can be readily altered; trade in gold iseasily manipulated; cultural reasons ensure a constantdemand for gold; and, depending on the form of thegold, it can act as either a commodity or a de factobearer instrument. Gold is used in all stages of moneylaundering—placement, layering, and integration. It isan alternative remittance system by itself, and is alsoan integral part of other alternative remittance sys-tems, such as hawala and the black market pesoexchange Although almost any trade item can be usedto launder money,30 gold is particularly attractive tomoney launderers because it has less bulk than manyother commodities, and a relatively constant highdollar value.

Because of gold’s unique properties, it is also a wellestablished vehicle to help finance terrorist operations.For example, the right-wing Posse Comitatus in theUnited States, the Aum Shinri Kyo cult in Japan, andColombian narco-traffickers have all used gold.

Gold is also emerging as a base for Internet digitalcurrency transactions. One Internet business is usinggold-backed currency, making it the world’s firsthundred percent precious metal-backed Internet(digital) currency businesses.

Gems such as emeralds and tanzanite are also linked tomoney laundering and terrorist financing. Forexample, much of the trade in emerald gemstonesidentified as originating in Pakistan actually originatesin Afghanistan. The gems are often traded throughMumbai and Jaipur, India, with the resulting salerevenue going directly to Dubai, where it is traded forgold bullion that goes back to India, where it is used tomake jewelry for export – i.e., another trade-basedvehicle. Similarly, gemstone auctions in Burma areused to launder narcotics proceeds. There are alsoreports that tanzanite, mined only in northeastern

Tanzania, is smuggled through ports in East Africa tobazaars in the Middle East, where the black markettrade in these gems is susceptible to manipulation bymoney launderers and those that help financeterrorism.

The extra-legal trade of diamonds in Africa ofteninvolves money laundering for criminal and politicalpurposes, and provides a means to purchase arms andinfluence the political arena. “Blood diamonds” is theterm used to describe the diamond trade that hashelped finance African civil wars in Angola, SierraLeone, Liberia, and other countries.

There have been press and other media reports31 thatthe diamond trade is also being used for terroristfinancing operations. The diamond trade in Africa issusceptible to terrorist financing exploitation throughcross-border trade that uses established diamond traderoutes, secondary level traders and agents, and suspectbuyers. Diamond traders in Africa are often non-African. Operating from secured compounds, expa-triate buyers, including those with terrorist links, oftenpurchase rough diamonds via local currency. (Al-though purchases occur in local currency, the dia-mond trade utilizes U.S. dollars at all levels of com-merce including the payment to buyers). Subsequentexports by the diamond buyers to the major diamondtrading centers are often under-valued. Diamonds arealso used to provide counter valuation in hawalatransactions. Many of the diamond buyers involvedwith illicit diamond dealing in West and Central Africapay protection money to groups identified as terroristorganizations.

Page 48: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy 45Appendix E

Appendix E

Broadway was a bank of choice for several major druggangs and money laundering syndicates, which placedand moved $123 million through more than 100accounts. The bank was ordered to pay a $4 millionfine. The bank has been under close supervision bythe Office of the Comptroller of the Currency since1998.

Bank officer investigation: In June 2002, the U.S.Attorney for the District of New Jersey and BICEannounced charges against Maria Carolina Nolasco, abanker from Jersey City, N.J., and Turist-CambioViagens e Turismo, Ltda, a Brazilian currency ex-change business, in connection with a money launder-ing scheme that moved more than half a billion dollarsin eight months through various bank accounts andan illegal money transmitting business.Nolasco, an assistant vice president for internationalbanking at the Valley National Bank branch in NewYork City, was charged in an eight-count criminalcomplaint with money laundering, illegally “structur-ing” cash deposits, operating a money transmittingbusiness without a license, and tax evasion. BICEagents, with substantial support from DEA and IRS-CI, also served warrants on 39 bank accounts at ValleyNational Bank resulting in the seizure of approxi-mately $15.8 million. Valley National Bank was notcharged with any wrongdoing and has cooperatedfully with the government’s case.

Lehman Brothers Account Representative: An indict-ment unsealed in June 2002 charged ConsueloMarquez, a former Lehman Brothers account repre-sentative, with facilitating the laundering of millionsin drug money belonging to Villanueva Madrid, themid-1990s Governor of the Mexican State of QuintanaRoo. Madrid and his son, Luis Ernesto VillanuevaTenorio, were also charged in the conspiracy.

Madrid is alleged to have received payments, totalingan estimated $30 million, from Mexico’s SoutheastCartel for shipments of cocaine that went throughQuintana Roo en route to the United States in ex-

“Operation Capstone”: This BICE case focused onmajor money laundering mechanisms and systems thatwere responsible for the international movement ofover $80 million by Colombian narcotics traffickers.The investigation demonstrated that the traffickersused, among other things, international life insurancepolicies, financial professionals, and internationalmarkets. Operated out of Miami, this complex investi-gation involved law enforcement cooperation amongUnited States, Colombia, the United Kingdom, the Isleof Man, and Panama. To date, Capstone has resulted inseizures of approximately $9.5 million in the UNITEDSTATES, as well as $20 million worth of insurancepolicies in Colombia, and $1.2 million in Panamanianbank accounts.

“Operation Wire Cutter”: In this case, BICE, in con-junction with DEA and Colombia’s DepartamentoAdministrativo de Seguridad, completed a 2 Ω yearundercover investigation of Colombian peso brokersand their money laundering organizations. Theinvestigation culminated in the January 2002 arrest of37 individuals, accused of laundering millions ofdollars for several cartels. Investigators seized over $8million in cash, 400 kilos of cocaine, 100 kilos ofmarijuana, 6.5 kilos of heroin, nine firearms, and sixvehicles. The arrests were made possible by undercoverBICE agents working with Colombian peso brokerswho directed them to illicit funds nationwide that werewired back to Colombia, often in the name of Colom-bian companies and banks, and subsequently with-drawn as pesos. Operation Wire Cutter an importantexample of the cooperation between UNITED STATESand Colombian law enforcement.

Broadway National Bank: In November 2002, Broad-way National Bank — which has three branches inNew York City — pled guilty to failing to report $123million in suspicious deposits, failing to maintain ananti-money-laundering program and allowing crimi-nal groups to structure their deposits so they wouldn’thave to report $76 million in cash to the federalgovernment. From 1996 to 1998, prosecutors said,

Recent Significant Money Laundering Cases

Page 49: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy46 Appendix E

change for protection and transport of the shipments,which included the use of state owned facilities. Since1995, Madrid and Tenorio allegedly deposited largeamounts of narcotics proceeds into foreign and U.S.bank and brokerage accounts. They then enlistedMarquez to conceal ownership and avoid detection ofthe funds. Marquez utilized her positions at SerfinSecurities (a Mexican investment firm with offices inNew York) and later with Lehman Brothers to establishoffshore corporations structured to conceal theproceeds and their ownership. The seizure and forfei-ture of the accounts, estimated at approximately $45million, are being sought.

After becoming a fugitive in 1999, days before his termas Governor and its immunity from prosecution underthe Mexican constitution was to expire, Madrid wasfinally arrested in May 2001. The case was the result ofa joint investigation between the U.S. Department ofJustice (United States Attorney’s Office for the South-ern District of New York) and the Mexican AttorneyGeneral’s Office, and involved the coordinated effortsof Drug Enforcement Administration agents in NewYork, Phoenix and Mexico.

Operation Southern Approach: In December 2002,following arrests in Miami, New York, Texas andColombia, seven money laundering indictments wereunsealed in the District of New Jersey following aninternational money laundering investigation. Theindictments - the result of an investigation by the FBI,IRS and U.S. Attorney’s Office - charge 26 individualswith conspiracy to launder drug proceeds and/ormoney laundering. Of the 26 defendants charged, 11individuals were arrested in the United States and fourwere arrested in Colombia.

The indictments describe a hierarchy of individualsinvolved in conspiracies to direct the movement ofdrug money in the United States as well as conceal thenature, source, and ownership of the money. Defen-dants gathered cash from the sale of drugs, directedthe movement of cash, acted as money couriers, orcontrolled bank accounts through which the drugmoney was moved. After the money arrived in NewJersey, it is alleged that some of the cash was retrievedby couriers and moved to other locations, includingFlorida. Other monies were deposited into bankaccounts and then transferred to accounts controlled

by members of the money laundering conspiracies.One indictment charged Salomon Camacho Mora, theleader of a Colombian cocaine-exporting organization,and eight others, with laundering approximately $1.6million through this scheme.

The indictments were the culmination of a five-yearOCDETF undercover operation. The FBI and IRSwere assisted by DEA as well as by agents in the SpecialSupport Unit of the Departamento Administrativo deSeguridad (DAS) in Colombia. The U. S. plans to seekextradition of the South American based defendantspursuant to the United Nations Convention AgainstIllicit Traffic in Narcotic Drugs and PsychotropicSubstances.

Banco Popular de Puerto Rico: On January 16, 2003,the United States and Banco Popular de Puerto Rico(BPPR) entered an agreement wherein the UnitedStates agreed to defer prosecution of BPPR on chargesthe that bank failed to file Suspicious Activity Reports(SARs) and currency transaction reports in a timelyand complete manner in violation of Title 31, USC,Sections 5318(g)(1), 5322(b), 5324(a)(2) and5324(d)(2). The bank agreed to forfeit $21.6 millioninvolved in the unreported transactions.

The charges arose out of a BICE investigation con-ducted between June 1995 and June 2000. During thistime, more than $33 million was laundered throughthe bank in suspicious cash transactions conducted bytwo of its customers and millions more in suspicioustransactions were moved through the accounts ofeleven money service businesses located in the Do-minican Republic that were customers of the bank.Regular deposits of cash, totaling as much as $500,000in a single day and totaling over $32 million in a threeyear period, were deposited and immediately wiretransferred out. BPPR failed to properly monitor andinvestigate these accounts, thereby allowing millions ofdollars of illegal drug proceeds to move through thebank without being detected and reported to lawenforcement. When SARs were filed by BPPR, theyfailed to accurately report periods and amounts ofsuspicious activity.

Money Laundering Through Jewelers: In June 2003,U.S. Attorney’s Office for the Southern District of NewYork announced the unsealing of criminal complaints

Page 50: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy 47Appendix E

charging 11 individuals at seven different retail orwholesale jewelers in New York City with moneylaundering by accepting cash in exchange for golditems they believed were being smuggled to Colombia.

As part of the undercover operation, undercover lawenforcement agents, more than $1 million in cash wasdelivered to different wholesale and retail jewelrybusinesses which had been identified as having partici-pated previously in this laundering method. Whendelivering these funds, undercover agents or cooperat-ing witnesses represented that the cash was the pro-ceeds of narcotics trafficking. In return for the cash,undercover agents received more than 100 kilogramsof gold, which they told the defendants would besmuggled to South America.

The charges were the result of an investigation con-ducted by the El Dorado Task Force, which specializesin investigating money laundering violations, andcomprises agents of BICE, and IRS-CI, as well asmembers of the New York City Police Department andother state and local law enforcement agencies. Theinvestigation was conducted in cooperation with theOrganized Crime Drug Enforcement Task Force(“OCDETF”) program in New York.

Page 51: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy48 Appendix F

Appendix F

subsequent Strategies. The Texas Attorney General’sOffice reports that, under this initiative, it has openedsome 40 cases, and obtained 25 indictments.

State Police, State of Illinois—HIFCASAR ReviewTotal Funding $491,022

The State Police’s original application under C-FICplaced the emphasis on financial analysis, especiallytargeting through SAR review and analysis. As a resultof this grant, the Illinois State Police also is able toperform financial analysis for the Chicago HIFCA. Asa result of the analysis effort funded by this grant,multiple seizures have occurred including one totaling$624,691 generated through a single arrest. Theproject now has become the repository for financialintelligence data that is available to all members of theChicago HIFCA- related agencies. To date, the intelli-gence gathered through this project has resulted inmore than 23 instances where the financial intelligencegathered was used in opening and advancing cases.

Significant C-FIC Grants

Attorney General, State of Arizona-MoneyTransmitter ProjectTotal Funding $599,519

This project was designed to support investigationsand prosecutions targeting the use of money transmit-ters by money launderers and other financial crimi-nals. The primary approach is to examine financialrecords then follow up through six interrelated initia-tives: (1) removal and exclusion of money transmittersengaging in illicit transactions from legitimate com-merce; (2) prosecution of pick-up operators (thosewho use multiple fake ID to deal directly with moneytransmitters on behalf of those who need to moveillicit funds); (3) seizure of funds in transit; (4)leveraging the effects of related investigations; (5)coordination with related investigations outside theregion; and (6) training and education of industrypersonnel. The project coordinates its activities withthe South West Border Region HIFCA. Importantly, asa result of activities undertaken through this project,the legislature of Arizona has adopted a new moneytransmitter regulator statute based on recommenda-tions made by the Attorney General of Arizona.

Attorney General, State of Texas —Bulk Currency ProjectTotal Funding $514,071

This project’s proposal involved the problem of bulkcurrency smuggling across the United States/Mexicoborder. This effort specifically targeted, for the firsttime, the vehicular movement of bulk currency acrossthe Southwest Border. This effort reflected bulkcurrency movement concerns articulated in theNational Money Laundering Strategy for 2000 and

Financial Crime-Free Communities (C-FIC)Support Program Grants

Page 52: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy 49Appendix G

Summary of the Anti-Money Laundering Provisions of the USAPATRIOT Act and the Steps Taken to Implement Them

APPENDIX G

Section Description Status

§ 311 Provides the Secretary of the Treasury withauthority to require U.S. financial institutions toapply graduated, proportionate counter measuresagainst a foreign jurisdiction, a foreign financialinstitution, a type of international transaction ora type of account that the Secretary finds to be a“primary money laundering concern.”

• Designated Ukraine and Nauru onDecember 26, 2002.

• Proposed rule that would imposecountermeasures against Nauru anda notice revoking designation forUkraine issued on April 17, 2003.

§ 312 Requires U.S. financial institutions that estab-lish, maintain, administer, or manage a “privatebanking account” or a correspondent accountfor a non-U.S. person (including a foreign bank)to apply due diligence, and in some casesenhanced due diligence, procedures and controlsto detect and report instances of money laun-dering through those accounts.

• Proposed rule issuedMay 30, 2002.

• Interim rule issuedJuly 23, 2002.

§ 313 Prohibits U.S. banks and securities brokers anddealers from maintaining correspondent ac-counts for foreign shell banks, that is, unregu-lated banks with no physical presence in anyjurisdiction. Also requires financial institutionsto take reasonable steps to ensure that foreignbanks with correspondent accounts do notthemselves permit access to such accounts byforeign shell banks.

• Interim guidance issuedNovember 27, 2001.

• Proposed rule issuedDecember 27, 2001.

• Final rule issuedSeptember 18, 2002.

§ 314 Encourages cooperation and the sharing ofinformation relating to money laundering andterrorism among law enforcement authorities,regulatory authorities, and financialinstitutions. (314 (a))

Upon notice to the Secretary of the Treasury,permits the sharing among financial institutionsof information relating to individuals, entities,organizations, and countries suspected of possibleterrorist or money laundering activities. (314 (b))

• Proposed rule issued March 4, 2002.

• Final rule issued September 18, 2002.

Page 53: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy50 Appendix G

§ 319(b)

Section Description Status

Authorizes the Secretary of the Treasury or theAttorney General to issue a summons or subpoenato any foreign bank that maintains a correspon-dent account in the United States requestingrecords relating to that correspondent account.

Requires U.S. financial institutions that maintain acorrespondent account for a foreign bank to keeprecords identifying (1) the owners of the foreignbank; and (2) the name and address of a person inthe United States who is authorized to acceptservice of legal process for records related to thecorrespondent account.

• Interim guidance issuedNovember 27, 2001.

• Proposed rule issuedDecember 27, 2001.

• Final rule issued September 18,2002.

Requires the Secretary of the Treasury, inconsultation with the Attorney General and thefederal functional regulators, to evaluate theoperations of Title III and submit recommen-dations for legislative amendments that may benecessary.

§ 324 • Due in April of 2004.

§ 325 Authorizes the Secretary of the Treasury to issueregulations governing the use of concentrationaccounts.

• Reviewing existing controls onsuch accounts and consideringoptions for regulatory action.

§ 326 Requires the Secretary of the Treasury, jointlywith the federal functional regulators, to issueregulations prescribing minimum standards forfinancial institutions to identify and verify theidentity of their customers who open accounts.

• Proposed rules issued July 16, 2002for banks, savings associations, andcredit unions; securities broker-dealers; mutual funds; and futurescommission merchants and intro-ducing brokers.

• Final rules issued May 9, 2003.

§ 326(b) Requires the Secretary of the Treasury to submita report to Congress on ways to improve theability of financial institutions to identifyforeign nationals.

• Report issued in October 2002.

§ 328 Requires the Secretary of the Treasury, inconsultation with the Attorney General andthe Secretary of State, to take reasonable stepsto encourage foreign governments to includeoriginator information in wire transferinstructions.

• Proposed and successfully securedthe adoption of a special recom-mendation of the Financial ActionTask Force that originator infor-mation be included in wire trans-fer instructions.

Page 54: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy 51Appendix G

Section Description Status

§ 352 Requires all financial institutions to establishanti-money laundering programs.

• Interim final rules applicable tobanks, savings associations, andcredit unions; securities broker-dealers; futures commission mer-chants and introducing brokers;casinos; money services businesses;mutual funds; and operators of acredit card system issued April 24,2002.

• Proposed rules (or advance pro-posed rules) issued for insurancecompanies; unregistered investmentcompanies; investment advisers;commodity trading advisors; dealersin precious metals, stones or jewels;travel agents; vehicle sellers; andpersons involved in real estateclosings and settlements.

• Statutory compliance deadline forfinancial institutions extendedpending issuance of an applicablefinal or interim final rule.

§ 356(a) Directs the Secretary of the Treasury, inconsultation with the Securities and ExchangeCommission and the Board of Governors ofthe Federal Reserve, to prescribe regulationsrequiring securities broker-dealers to filesuspicious activity reports to the extentconsidered necessary and expedient.

• Proposed rule issuedDecember 31, 2001.

• Final Rule issued onJuly 1, 2002.

§ 356(b) Authorizes the Secretary, in consultation withthe Commodity Futures Trading Commission,to prescribe regulations requiring futurescommission merchants, commodity tradingadvisors, and commodity pool operators to filesuspicious activity reports.

• Proposed rule requiring futurescommission merchants to filesuspicious activity reports and tocomply with BSA recordkeepingrequirements issued May 5, 2003.

§ 356(c) Requires the Secretary of the Treasury, theBoard of Governors of the Federal Reserve, andthe Securities and Exchange Commission tosubmit jointly a report to Congress recom-mending ways to apply Bank Secrecy Actrequirements to investment companies.

• Report issued on December 31,2002.

Page 55: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy52 Appendix G

Section Description Status

§ 357 Requires the Secretary of the Treasury tosubmit a report to Congress on the role of theInternal Revenue Service in the administrationof the Bank Secrecy Act.

• Report issued onApril 26, 2002.

§ 359 Requires the Secretary of the Treasury to submita report on the need for additional legislationrelating to ARS.

• Report issued inNovember 2002.

§ 361 Requires, to the extent considered necessaryand expedient, the Secretary of the Treasuryto submit a report on improving compliancewith the reporting requirements of section5314 of title 31, United States Code (FBARreporting requirements).

• Report issued on April 26, 2002.

§ 362 Requires the Secretary of the Treasury toestablish a highly secure network withinFinCEN for filing of BSA reports.

• System operational.

§ 365 Requires non-financial trades or businesses tofile currency transaction reports with FinCEN.

• Interim final rule issuedDecember 31, 2001.

§ 366 Requires, to the extent considered necessaryand expedient, the Secretary of the Treasury toreport to Congress on whether to expand theexisting exemptions to the requirement thatfinancial institutions file currency transactionreports and on methods for improving finan-cial institution utilization of exemptions.

• Report issued on October 25, 2002.

Page 56: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy 53Appendix H

APPENDIX H

I. INTRODUCTION

For more than 2,000 years, military strategists haverecognized the truism that armed conflict cannot bewaged until it has been financed.32 Accordingly,shortly after the September 11, 2001 terrorist attackson the United States, President Bush observed that thecountry’s first strike in the war against terrorismwould target terrorists’ financial support.33 As formerSecretary of the Treasury Paul O’Neill stated in Octo-ber 2001, “our goal must be nothing less than thedisruption and elimination of the financial frame-works that support terrorism and its abhorrent acts.”34

Since September 11, 2001, the United States has maderemarkable strides in disrupting and interdicting theflow of financial resources to terrorists. The UnitedStates has twice amended its laws to provide, consis-tent with the rights and privacy of its citizens, addi-tional tools for preventing, investigating, and prosecut-ing terrorist financing.35 We have engaged in capacity-building around the globe, encouraging other coun-tries to establish appropriate money-launderinglegislation and effective oversight of their banking andfinancial systems. We have led initiatives in multi-lateral fora to develop and implement legal andregulatory controls on alternative means of valuetransfer, such as hawala. We have also coordinatedwith the private sector and the international commu-nity to develop best practices to protect charitableorganizations from exploitation by terrorists to raisefunds.

32See SUN TZU, THE ART OF WAR 72-73 (Samuel B. Griffith trans., Oxford University Press 1963).

33Comments of President George W. Bush, Delivered at the Department of Treasury, November 7, 2001.

34 Remarks of Secretary of the Treasury Paul O’Neill before the Extraordinary Meeting of the Financial Action Task Force, Oct. 29, 2001,available at http://www.treas.gov/press/releases/po735.htm.

35See generally USA PATRIOT Act, Pub. L. 107-56 (2001) and Homeland Security Act of 2002, Pub.L. 107-296 (2002).

36 See 50 U.S.C. §§ 1701-1706.

37 Prepared Statement of Kenneth W. Dam, Deputy Secretary of the Treasury, before the Senate Committee on Banking, Housing, & UrbanAffairs’ Subcommittee on International Trade & Finance (Aug. 1, 2002).

38 “The Financial War on Terrorism,” Testimony of Undersecretary of State Alan Larson before the Senate Committee on Finance,October 9, 2002.

In cooperation with other countries and with interna-tional bodies, the United States has frozen funds andassets worth more than $136 million. Furthermore,the Secretary of the Treasury has frozen the assets of,and prohibited financial transactions with, 315individuals and organizations by identifying them asspecially designated global terrorists under the Inter-national Emergency Economic Powers Act (“IEEPA”).36

Countries around the globe are following our lead – asof August 1, 2002, more than 160 foreign countrieshad instituted blocking orders affecting accountsworth more than $70 million.37 There is no tellinghow many more donations, how many more financialtransfers to the operational arms of terrorist organiza-tions, and how many more acts of funded terrorism wehave prevented with our amended laws, diplomaticefforts, and increased financial and banking controls.

Indeed, one government official recently observed,“[t]errorists can no longer safely use the internationalbanking system. . . . As formal financial systems arepurged of terrorist finance, terrorists naturally areinclined to resort to other, more costly and uncertain,but still serviceable mechanisms for moving re-sources.”38 Although this observation may be overlyoptimistic in one respect – terrorists and terroristorganizations still use the international bankingsystem – it correctly emphasizes that as the bankingsystem comes under increasing scrutiny, terrorists may

Terrorist Financing Online

Page 57: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy54 Appendix H

turn as well to other mechanisms to transfer funds.While maintaining our vigilance over traditionalmeans of value transfer, therefore, we must also focuson alternative means – trading in commodities such asgold, gems, and precious stones and metals; non-bankonline remittance systems; and informal value transfersystems such as hawala.39

This Report addresses the Internet, a technologicalinfrastructure that suffuses both traditional andalternative means of resource and money transfer. TheInternet has, in the last ten years, revolutionized globalcommerce and communications. Its potential benefits– in education, in commerce, in communication, andin spreading the message of freedom and democracy –are almost limitless. But the Internet is a value-neutralscientific advance. With the exception of its inherentopenness, nothing fundamental to the Internet’sarchitecture favors education over indoctrination,legitimate commerce over fraud and money launder-ing, or democratic, egalitarian ideals over extremismand intolerance. The anonymous, largely unregulated,and geographically unbounded nature of the Internethas thus created not only unprecedented opportunitiesfor legitimate commerce; it has created unprecedentedopportunities for fraud, money laundering, and theprovision of material support to terrorists and terror-ist organizations as well.

A. Mission Statement

In the 2002 National Money Laundering Strategy,40 theDepartment of the Treasury and the Department ofJustice committed to study, in coordination with theintelligence community, how the Internet is used toraise and move funds to terrorist groups. In further-ance of this task, the Department of the Treasury andthe Department of Justice have convened a working

group (the “Working Group”) of experts on Internetcrime, money laundering, and terrorism. The Work-ing Group includes representatives of the regulatorycommunity, the law enforcement community, and theintelligence community.41 This Report is a compila-tion of these individuals’ experience and expertise. Itaddresses both the manners in which the regulatory,law enforcement, and intelligence communities haveobserved terrorist organizations using the Internet toraise and transfer funds in the past and some of themanners in which such organizations will likely usethe Internet for such purposes in the future.

A comprehensive discussion of how terrorists may usethe Internet to collect and transfer resources is anenormous and, to the best of the Working Group’sknowledge, heretofore unattempted undertaking. It isappropriate at the outset, therefore, briefly to addressthe breadth and scope of this project and the limitingdefinitions that guide the Working Group’s work.

1. The Internet

The Internet was conceived in 1961 and delivered intoexistence in a primordial stage of development by aconsortium of government scientists and academics in1969. During the 1970s, the Internet developed as anopen-architecture network that would accommodatediverse network interfaces and architectures and as adecentralized, redundant network to ensure reliabilityif any of its “nodes” malfunctioned. Applications suchas electronic mail and file transfer were invented and acommon language, or set of protocols, was agreedupon. In the 1980s, government encouraged thedevelopment of private networks and commercialapplications. A tripartite symbiotic interaction amonggovernment, academia, and private industry acceler-ated the growth rate and application diversity of the

39 For ease of reference, this Report adopts the colloquial shorthand of referring to the trust-based informal value transfer system withthe term “hawala.” This system has different names, however, in different geographical regions. It is called hawala in the Middle East,Afghanistan, and parts of Pakistan; hundi in India and parts of Pakistan; fei ch’ien in China; and phoe kuan in Thailand.

40 Available online http://www.treas.gov/offices/enforcement/ml2002.pdf.

41The working group includes experts from following agencies and organizations: the Office of Comptroller of the Currency (“OCC”), theDepartment of the Treasury Terrorism and Violent Crime Section, the Department of the Treasury Financial Crimes EnforcementNetwork, the Securities and Exchange Commission (“SEC”), the Commodity Futures Trading Commission (“CFTC”), the InternalRevenue Service Criminal Investigation Section, BICE , the Department of Justice Asset Forfeiture & Money Laundering Section, theDepartment of Justice Computer Crime & Intellectual Property Section, the Department of Justice Counter Terrorism Section, theFederal Bureau of Investigation, the Department of Defense, the Central Intelligence Agency, and the National Security Agency.

Page 58: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy 55Appendix H

the IP address involved in a transaction, there are anumber of practical obstacles to such a determination.The anonymous nature of the Internet has the desir-able effect of protecting Internet users’ privacy. Aswith many characteristics of the Internet, however,anonymity is a double-edged sword. It also makesdifficult investigation of Internet users who engage inillegal conduct.

Second, the Internet is, for all intents and purposes,not geographically bounded. An Internet user inWashington, DC can as easily exchange e-mail, engagein “chat,” visit a web page, or conduct web-basedfinancial transactions with a user or server in a foreigncountry anywhere in the world as with another user orserver in Washington, DC. Again, although it istheoretically possible to locate an Internet user ingeographic space, several practical obstacles make theprocess of pinpointing a user’s geographic locationdifficult. As a result of the Internet’s global nature,regulation and investigation of communications andtransactions on the Internet often involve two or morecountries, which may or may not be on cooperativeterms and may or may not have similar procedural andsubstantive laws.45

Internet. The open, multi-disciplinary community outof which the modern Internet evolved is reflected in anumber of its signature characteristics – it remains anopen, interoperable, decentralized, and largely unregu-lated network.

The Internet today is a global network of intercon-nected communication and information systems.42 Auser at any Internet terminal in the world can commu-nicate, share documents and stored information, andengage in financial or commercial transactions withmillions of other users throughout the world, or canaccess the vast wealth of information available on theWorld Wide Web.43 The 2002 CIA World Factbookestimates that worldwide there are more than 10,000Internet Service Providers (“ISPs”) and more than 580million Internet users.44

Several of the Internet’s cardinal characteristics arerelevant to its use to raise and transfer funds. First,Internet users enjoy a large measure of anonymity.Many Internet interactions are memorialized only bycomputers’ exchange of unique numeric identifiers,called Internet Protocol (“IP”) addresses, assigned tothem by their respective ISPs. Although it is theoreti-cally possible to determine which user was assigned

42 For the purposes of this Report, the term “Internet” does not include the separate network infrastructures provided for automated tellermachine (“ATM”), wire transfer, or debit and credit card networks, although it does include web-based applications through which debitand credit card transactions may be accomplished.

43The terms “Internet” and “World Wide Web” are often, but incorrectly, used interchangeably. The Internet describes the network itself –the computers, the physical or virtual connections, and all of the protocols and applications it supports – whereas the World Wide Webdescribes the resources available on that network through the use of one particular protocol, the hypertext transfer protocol (“HTTP”).

44See http://www.cia.gov/cia/publications/factbook/geos/xx.html.

45 International differences in regulatory regimes and procedural and substantive laws are mediated to a large degree in the area ofterrorist financing by a number of international legal instruments and by the work of several multilateral organizations. TheInternational Convention for the Suppression of the Financing of Terrorism, which was adopted by the United Nations in 1999 and hasbeen ratified by 61 countries, requires countries to establish substantive and procedural laws pursuant to which acts of terroristfinancing can be effectively investigated and prosecuted and the proceeds of terrorist financing can be frozen, seized, and forfeited. TheUnited Nations Security Council also passed immediately after the September 11th attacks a resolution requiring all 189 membernations to freeze the financial assets of persons and entities who commit or attempt to commit terrorist acts and to forbear from makingfunds available to terrorists and their supporters. The 33 members of the Financial Action Task Force on Money Laundering (“FATF”)have endorsed eight Special Recommendations on Terrorist Financing, which establish international standards relating to regulationsand laws facilitating the prevention, investigation, and prosecution of terrorist financing, and to international cooperation in theenforcement of such regulations and laws. Similarly, on June 3, 2002, the General Assembly of the Organization of American States(“OAS”) entered into a comprehensive treaty to prevent, punish, and eliminate terrorism. The Inter-American Convention againstTerrorism seeks to prevent the financing of terrorism, strengthen border controls, and increase cooperation among law enforcementauthorities in different OAS countries, among other measures. The UN, the G8, the OAS, the Asian Pacific Economic Cooperation(“APEC”) group, the Association of Southeast Asian Nations (“ASEAN”), the International Organization of Securities Commissions(“IOSCO”), and other bilateral and multilateral fora continue to explore the ways in which international cooperation can facilitate theprevention, investigation, and prosecution of terrorist financing.

Page 59: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy56 Appendix H

Third, the Internet permits users to communicate andconduct financial transactions more quickly and moresurreptitiously than would be the case if they wereusing traditional phone lines or conducting businessthrough “brick-and-mortar” financial institutions. Byusing widely-available encryption tools, Internet userscan convert a message or document into “ciphertext”for secure transmission. The message or document isunintelligible to anyone except the intended recipient,who possesses the key necessary to decrypt it. Simi-larly, Internet users can embed messages or documentsinto image, sound, or other files through a processcalled “steganography.” Steganographic files areindistinguishable from the millions of regular filestransiting through or posted on the Internet. Unlessone knows that the file has an embedded message andpossesses the proper tool to reveal that message, it maywell remain undetected. These encoding algorithmshave important and legitimate information securityand privacy protection applications. But when theyare combined with the speed of Internet communica-tions, the ephemeral nature of records of Internetcommunications and transactions (retention periodsvary by ISP, ranging from no retention at all to aperiod of days to, in rare cases, a period of years), andthe largely unregulated nature of the Internet, theyalso pose obstacles to investigations of Internetcommunications and transactions.

Finally, the Internet is subject to very little regulation.To a large degree, the only “regulations” imposed onInternet users are those that are essential to theInternet’s functioning. Because the Internet developedas an open, interoperable network, such rules are fewin number and impose only minimal constraints.Moreover, because the Internet is global and decentral-ized – there is no single point or even set of pointsthrough which all information transiting the Internetmust flow – its architecture is not easily susceptible toregulation.

In sum, the Internet poses unique challenges toregulatory bodies and to law enforcement because it islargely anonymous, geographically unbounded,unregulated, and decentralized. These challenges willbe a recurring theme in the discussion that follows.

2. Raising Funds

Investigations indicate that terrorists and terroristorganizations can use the Internet in four primaryways to solicit funds and collect resources:

1. They can solicit donations, share information,and recruit supporters directly via web sites,chat rooms, and targeted electronic mailings;

2. They can exploit charitable organizations,solicit funds with the express purpose ofclothing, feeding and educating a populationbut with the covert intent of exploitingcontributors’ largesse to fund acts of violence;

3. They can perpetrate online crimes such asidentity and credit card theft, intellectualproperty piracy, and fraud and support theirmission with the proceeds of such crimes; and

4. They can use the Internet as a means ofcommunication to organize and implementother fund raising activities.

The support sought by, and provided to, terroristorganizations need not always be in the form ofcurrency. Terrorist organizations may also solicitonline other fungible goods (gold or gems, for in-stance),46 supplies, or adherents and foot soldiers. ThisReport construes “raising funds” broadly in order toprovide a comprehensive discussion of the manner inwhich terrorist organizations use the Internet tofurther their cause (with the notable exception ofusing the Internet as a weapon to attack criticalinfrastructures). In particular, the Report construesraising funds to be consistent with the United Statescriminal law prohibiting and punishing materialsupport of a terrorist or terrorist organization:

the term ‘material support or resources’ meanscurrency or monetary instruments or financialsecurities, financial services, lodging, training,expert advice or assistance, safehouses, falsedocumentation or identification, communicationsequipment, facilities, weapons, lethal substances,

46 See Jeannine Aversa, “Cutting Terror Funds Said Effective,” The Associated Press, 2002 WL 26545883 (Sept. 10, 2002) (reporting thatTreasury officials had emphasized “money flowing through nontraditional financial channels such as trading in diamonds or gold” asone challenge in interdicting terrorist funding).

Page 60: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy 57Appendix H

explosives, personnel, transportation, and otherphysical assets, except medicine or religiousmaterials.47

In the broadest sense, then, the Report addresses howterrorists use the Internet, directly or indirectly, toaccumulate the funds, resources, and other materialsupport necessary to maintain their organizations andcommit their violent acts.

3. Moving Funds

This Report also construes the term “moving funds”broadly and as encompassing the relevant criminallaw. In the context of terrorist fundraising, “movingfunds” includes the conduct proscribed and punishedby 18 U.S.C. § 1956(a)(2):

Whoever transports, transmits, or transfers, orattempts to transport, transmit, or transfer amonetary instrument or funds from a place in theUnited States to or through a place outside theUnited States or to a place in the United Statesfrom or through a place outside the United States .. . with the intent to promote the carrying on ofspecified unlawful activity.

The definition adopted by the Report is broader thanthis statutory definition, however, in two respects.First, the Report also addresses the transportation,transmission, or transfer of funds within the UnitedStates with the intent to support terrorists and terror-ist organizations. Second, the Report interpretsmoving funds to include making funds available toterrorists or terrorist organizations by providing themwith the means of accessing them, such as a debit orcredit card, a PIN number, or a password.48 Terroristfinancing may be an inchoate crime in the sense that itis the intent that a further act be committed, a terroristact, that makes it illegal. Because the parties’ intent isoften not visible on the face of their transaction, it may

be difficult to distinguish legitimate transfers of value(to support an ailing relative in the sender’s nativeland, for instance) from terrorist financing.

This Report will address two different methods ofmoving funds via the Internet: online banking servicesand other online financial services such as ARS,brokerage and securities and futures accounts, anddigital currency systems. It will also discuss howInternet communications are used to facilitate fundtransfers.

4. Terrorists & Terrorist Organizations

The term “terrorists and terrorist organizations” asused in this Report includes the 36 organizationscurrently designated as Foreign Terrorist Organiza-tions (“FTOs”) by the Secretary of State pursuant to 8U.S.C. § 1189 and the 281 individuals and organiza-tions designated as Specially Designated GlobalTerrorists (“SDGTs”) pursuant to IEEPA. In addition,it includes any person or organization that intends tocarry out or to aid, assist or support, an act of domes-tic or foreign terrorism as those terms are defined by18 U.S.C. §§ 2331(1) and (5).49

There is a temptation to treat terrorist financing just asone would any other form of money laundering orfinancial fraud, but terrorist financing often has somedistinguishing characteristics. First, terrorists andterrorist organizations are not profit motivated. Theirgoal is not to amass wealth; it is rather to inflict harmand instill terror. Although the maintenance of aterrorist organization may cost tens of millions ofdollars annually, terrorist operations such as theSeptember 11, 2001 attacks can often be carried out onrelatively low budgets.50 Accordingly, the funding ofterrorist operations may involve fund transfers that aretoo small to arouse suspicion or trigger regulatoryscrutiny. The financing operation of a terrorist cellmay be much more modest, and therefore much more

47 18 U.S.C. § 2339A.

48The Department of Justice asserts that such conduct is proscribed by 18 U.S.C. § 1956(a)(2), although there is no judicial precedentdefinitively resolving this issue.

49 See also 22 U.S.C. § 2656f(d) (“The term ‘terrorism’ means premeditated, politically motivated violence perpetrated againstnoncombatant targets by subnational groups or clandestine agents, usually intended to influence an audience.”).

50The FBI estimates the budget required to perpetrate the September 11th attacks at between $300,000 and $500,000. See Matthew A.Levitt, The Political Economy of Middle East Terrorism, MIDDLE EAST REVIEW OF INTERNATIONAL AFFAIRS JOURNAL, Vol. 6, No. 4 (Dec. 2002).

Page 61: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy58 Appendix H

difficult to detect than, for instance, the moneylaundering operation for a drug cartel.

Second, whereas money laundering generally involvesfinancial transactions designed to conceal the illicitorigin of funds, the funds used to finance terrorism areoften not derived from an illicit source or generated byillicit activity. Law enforcement may uncover moneylaundering during the investigation of the predicatecrime that produced the funds to be laundered – forinstance, in the investigation of a drug cartel. Some-times terrorist financing is linked with other crimes,such as fraud or narcotics trafficking, and may bereported by the victims or otherwise discovered duringthe investigation of those crimes. In other instances,however, the funds used to finance terrorism derivenot from other criminal conduct, but from donationsor business proceeds. These facially legitimate fundraising mechanisms are not associated with separatecriminal conduct that might arouse law enforcementsuspicion. Moreover, in such cases, there may be no“victim” to report the fundraising activity.

The most important distinction between terroristfinancing and money laundering, however, is this:terrorist financing supports acts of untold atrocity andviolence against innocent victims. Any discussion ofterrorist financing must be informed by the starkreality that what leaves our shores as currency ormaterial resources today may later return or appearelsewhere as bullets, bombs, or other means of massdestruction. Understanding and interdicting terroristfinancing thus accomplishes more than frustrating aparticular type of criminality or recovering criminalproceeds. It presents an opportunity to depriveterrorist organizations of the funding on which theirexistence depends, to unearth their networks andidentify their members before they can act, and todisrupt or destroy them before they take or injuremore innocent lives.51

B. Methodology

This Report explores the ways in which terrorists andterrorist organizations are using or might use theInternet to raise and move funds, resources, andmaterial support. The Report first discusses the onlinemethods terrorist organizations may use to raise andmove funds. It then discusses the challenges posed bythese methods in three areas: the prevention of thatparticular method, whether by regulation, securitymeasures, or deterrence; the investigation of thatmethod to stop the flow of resources and identify theparties responsible; and the prosecution of thoseparties under United States law.52 These discussionsare meant to raise, but do not purport to resolve, theseissues, which may involve choices affecting regulationof the Internet; individual privacy; the rules applicableto banks, other financial institutions, ARS, and taxexempt organizations; and other broad policyconcerns.

This Report is both a first step and a work in progress.It is a first step in the sense that it provides a founda-tion of understanding for further action, such asdeveloping a strategy for preventing, investigating, andprosecuting online terrorist financing. It is a work inprogress in that the Internet is an evolving technology.Many of the web sites referred to in the Report, forinstance, have long since disappeared, only to bereplaced by others. Similarly, as new Internet financialapplications and new Internet communication tech-nologies are developed, new challenges may be raisedand new issues may be posed.

II. TERRORIST USE OF THEINTERNET TO RAISE FUNDS

Terrorists use the Internet in four different ways toraise funds, collect resources, and recruit adherents.First, terrorists use the Internet as a vehicle for direct

51 Former FBI Director Louis Freeh, testifying before Congress in 1999, indicated that the 1993 attack on the World Trade Centers couldhave been much more devastating, but the perpetrators lacked sufficient funds to build a bomb as big as they intended. He alsoattributed a strong investigative lead in the case to the perpetrators’ lack of adequate funding – they were identified in part by theirattempt to recover the deposit fee on the rental truck used to transport the bomb. See Statement of Louis J. Freeh, Senate Committee onAppropriations, Subcommittee for the Departments of Commerce, Justice, and State, the Judiciary, and Related Agencies (Feb. 4, 1999).

52 The Report does not discuss other potential avenues for stopping the flow of resources to terrorist organizations, such as encouragingprosecution by foreign powers or conducting targeted military or intelligence operations against terrorists or terrorist organizations.

Page 62: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy 59Appendix H

solicitation, publishing web sites that openlyrequest money and resources to support theircampaign of violence. Second, terrorists infiltratecharitable organizations, soliciting funds fromdonors who may or may not be aware of the endsto which their donations are being dedicated.Third, terrorists engage in online fraud, identifytheft, and other Internet crimes and use theproceeds of these crimes to support their mission.Finally, terrorists use the Internet as a pervasive,inexpensive, anonymous means of communicationthrough which they can plan and orchestrate fundraising activities. Each of these uses is addressedbelow.

A. Direct Solicitation

Terrorist organizations use web sites, chat rooms,and targeted mass e-mailings to solicit fundsdirectly from their supporters. Several terroristorganizations maintain web sites, accessible to anyInternet user that celebrate past acts of terrorism,exhort adherents to further violence, and requestdonations in support of their causes. A prominentexample was the site www.azzam.com, a site namedafter Abdullah Azzam, Usama bin Laden’s mentorwho conceived and implemented the idea ofestablishing international terrorist training campsin Afghanistan.53 The site sold Islamic extremistpublications, including a book by Omar AbdelRahman, the mastermind behind the 1993 WorldTrade Center bombings. The site also included apage entitled “What Can I Do to Help Jihad andthe Mujahideen?” which read, in pertinent part:

Around the Muslim world, the Jihad is beingentirely funded by donations from individuals.. . . Jihad is a profitable investment that payshandsome dividends. For someone who is notable to fight at this moment in time due to avalid excuse they can start by the collectionand donation of funds . . . Azzam Publications

is able to accept all kinds of Zakat and Sadaqahdonations and pass them on where they are mostneeded. The Jihad . . . consists of . . . the one whoorganizes the weapons and ammunition [and] . . .the one overseas who raises the money . . .

Several other terrorist organizations have solicitedfunds and material resources directly from supportersby way of the Internet. A recent article in a Pakistaninewspaper reported that five Pakistani jihad organiza-tions currently maintain web sites, some of whichreceive up to 300 visitors each day.31 The followingexamples are illustrative of the direct solicitation sitesthat have been on the Internet since September 11,2001:

$ HAMAS’ military wing, the Izz al-Din al-Qassam Brigades, posted communications on aweb site recruiting suicide bombers andencouraging supporters “to donate . . . whatyou can to assist the cause of Jihad and resis-tance until the occupation is eliminated andevery span of the Muslim Palestine is liber-ated.”

$ Hizballah’s television station Al-Manar main-tained a web site that urges contributions “forthe sustenance of the Intifadah,” listing bankaccounts in Lebanon to which donationsshould be made.

$ The Global Jihad Fund published a web siteurging donations “to facilitate the growth ofvarious Jihad Movements around the World bysupplying them with sufficient funds topurchase weapons and train their individuals.”The site listed bank accounts in Pakistan andfeatured links to web sites supporting terroristorganizations, including the Taliban, LaskerTaiba, Hamas, and Hizballah.

53 Most of the examples cited in this Report involve terrorist organizations based in the Middle East and founded upon a militant,extreme, anti-American form of Islamic ideology because these organizations currently pose the gravest and most immediate threat tothe United States. The Report does not intend to impugn the countries of the Middle East or the vast majority of Islamic sects andcommunities, many of whom have been among the United States closest allies in waging the war against terrorism since the September11th attacks. The discussion and conclusions contained in the Report are equally applicable to all terrorists and terrorist organizations,regardless of where they come from, whether they are foreign or domestic, or what their underlying motive or objective may be.

54 See Amir Rana, Jihad Online, LAHORE DAILY TIMES, Apr. 20, 2003.

Page 63: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy60 Appendix H

$ A message carried on at least four jihadist websites offered greetings from Usama bin Laden,other al-Qaeda leaders, and MullahMuhammad Omar urged men to donatemoney and women to donate jewelry to thecause of jihad.

In addition to such web sites, terrorist organizationsrequest donations through bulletin boards, chatrooms, and targeted mass e-mailings. One messageposted to an Arabic language Internet forum exhortedits readers to send “assistance to the families of theGuantanamo captives, for the families of the martyrsof the American invasion of Afghanistan, and for thefamilies of those innocent arrestees detained onaccount of terrorism.”55

1. Prevention

It is difficult, if not impossible, to prevent such solici-tations from occurring through web sites, bulletinboards and chat rooms. Regulation and deterrence faileffectively to prevent such sites from appearing foressentially four reasons. First, the Internet is global.Among the more than 10,000 Internet service provid-ers worldwide are several in countries that have largepopulations sympathetic to Islamic extremism orantagonistic to the United States. According to the2002 CIA World Fact Book, the seven nations cur-rently listed by the State Department as “state sponsorsof terrorism” maintain 19 ISPs.56 Website hosts inthese countries are not subject to United States regula-tory jurisdiction, nor may these countries be eager toassist the United States in preventing terrorist organi-zations from soliciting funds on the Internet.

Second, the Internet is inexpensive. Many ISPs,including several in the United States, allow subscrib-ers to register online for free web hosting services.These ISPs provide their services to subscribers free ofcharge and therefore have no incentive to identifyaccurately their subscribers. Nor do their subscribershave any disincentive to register a web site that will beclosed down after a short period of time – it coststhem nothing, and they can simply open another one.

Indeed, www.azzam.com used to inform its visitors:“We expect our web-site to be opened and closedcontinuously. Therefore, we urgently recommend anyMuslims that are interested in our material to copy allthe articles from our site and disseminate themthrough their own web-sites, discussion boards and e-mail lists.”57

Third, the Internet may be used anonymously. Userscan access the Internet from a public library or a cybercafé without providing any identifying information. Auser can even register such a web site from his homecomputer without identifying himself by first visiting asite, called an anonymizer, that replaces the IP addressfor the user’s home computer with another IP addressthat cannot be traced back to the user (becauseanonymizers generally do not maintain logs). Internetinvestigative techniques in such cases will determinethat the web site was registered from a public library, acyber café, or an anonymizer, but will be unable totake the next step and identify the person in the libraryor café, or the user who visited the anonymizer.See Figure 1.

Fourth, the Internet is largely unregulated. In mostcountries, there is no central government authoritythat reviews the content of web sites before they arehosted online. Moreover, most ISPs have neither theresources nor the desire to monitor the content oftheir customers’ web sites. Large ISPs have literallymillions of customers; small ISPs generally havelimited budgets and small staffs. Although law en-forcement may search the Internet for public

sites soliciting donations to terrorist organizations,they, too, lack the resources to maintain constantvigilance over the vastness of the Internet.

Recent events suggest that terrorist organizations areaware of these and other features of the Internet. Thecapture of terrorist officials or infiltration of terroristcompounds is now often accompanied by the discov-ery of computers that have accessed the Internet.58 Inaddition, many of the individuals and organizations inthe United States under investigation or facing pros-

55 Available at www.arabforum.net (October 18, 2002).

56The nations currently on the State Department list are Cuba, Iran, Iraq, Libya, North Korea, Sudan, and Syria.

57 Jihad Online: Islamic Terrorists and the Internet, available at http://www.adl.org/internet/jihad_online.pdf (April 22, 2003).

Page 64: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy 61Appendix H

The Flow of Information

The Flow of Investigation

1. The internet User Connects to the internet via ISP

2. The ISP assigns an IP address

3. The user visits an "anonymiser" which replaces the IP address the ISP assigned with an "anonymiser" address

4. The user posts a web site soliciting donations to a terrorist organization

4. The anonymiser has no information regarding the user

3. Obtains a court order requiring the anonymiser to disclose all information regarding the user associated with the anonymous IP address

2. Subpoenas the anonymiser IP address from the web hosting service's logs;

1. Law enforcement discovers the site

Home User ISP Web HostAnonymiser

Web HostAnonymiser

ecution for terrorist-related activities are highlytrained in computer networks and communicationsystems.59 Cybersecurity specialists also maintain thatterrorists have probed the networked operation andsecurity systems for several US critical infrastructures,possibly in preparation for an attack on those sys-tems.60 Terrorist organizations are becomingincreasingly adept at taking advantage of these fea-tures of the Internet.

2. Investigation

Investigation of terrorist organizations’ direct solicita-tion of funds over the Internet faces many of the same

difficulties as prevention of such conduct. Evenassuming that a terrorist web site is hosted in theUnited States – and in the post September 11, 2001atmosphere of strict counter-terrorism practices, thatis an assumption that would rarely be met – investigat-ing the people responsible for web site, bulletin board,or chat room solicitations may be difficult. If theperpetrator is Internet savvy, he can mask his onlineidentity even as he hosts a public site on the Internet.An example may be helpful in trying to understandhow this is possible:

Consider an al-Qaeda operative living in New YorkCity. He receives, by regular mail, a diskette from

Figure 1

58See, e.g., Kamran Khan, Alleged September 11 Planner Captured in Pakistan, THE WASHINGTON POST, March 2, 2003, at A1 (reporting thatcomputer equipment was seized from the house in which Khalid Sheik Mohammed was captured); Alan Cullison & Andrew Higgins,Suicide Watch: Al Qaeda Acolyte, One of Many, Vows to Die for Cause, THE WALL STREET JOURNAL, Dec. 30, 2002 (reporting on the contentsof a computer seized from a Taliban compound in Afghanistan).

59See, e.g., Susan Schmidt, 5 Tied To Islamic Charity Indicated in N.Y., Idaho, THE WASHINGTON POST, Feb. 27, 2003, at A2; John Mintz, 5 inTexas Jailed in Hamas Probe, THE WASHINGTON POST, Dec. 19, 2002, at A3.

60See Barton Gellman, Cyber-Attacks by Al-Qaeda Feared, THE WASHINGTON POST, June 27, 2002, at A1.

Page 65: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy62 Appendix H

The Flow of Information

The Flow of Investigation

1. The Operative enters a public library

2. Accesses the internet using a library account

3. Is assigned an IP address for the library account

4. And posts a web site using false registration information

4. But cannot identify the operative

3. determines that the IP address belongs to a library account

2. Subpoenas the IP address and registration information

1. Law enforcement discovers the site

Al QaedaOperative

NY Public Library Web HostISP

Web HostISPNY Public Library

Pakistan containing the content of a web site praisingthe September 11, 2001 “martyrs” and encouragingsupporters to send funds to three bank accounts inKarachi to support future attacks against the “infidels.”The sympathizer accesses the Internet from a NewYork public library and registers online using falseidentification information with a free web-hostingprovider (there are dozens, at least, in the UnitedStates). Law enforcement does not discover the website for several weeks. They compel the ISP to provideany information it has regarding the subscriberaccount, a process that may take additional time, anddiscover that the information is almost certainly false:the site was registered from a public library computerby John Doe at 315 Nameless Avenue, New York, NY,telephone 123-456-7890. Because the ISP keepsvirtually no logs (records of activity on the site) – itsbusiness plan calls for low overhead, the ISP’s repre-sentative explains, and logging and data storage costmoney – law enforcement obtains, at most, IP ad-dresses for the visits to the site over the last severaldays. The logs are not detailed enough to distinguishbetween someone who visited the site accidentally,leaving immediately when he discovered its content,and someone who printed out donation instructionsor submitted a donation via credit card while on thesite. See Figure 2.

With one exception, investigation of the individualswho donate through such sites is subject to the sameobstacles – use of public computer terminals oranonymizers, Internet accounts registered using falsesubscriber information, and failure of the web hostingISP to retain logs of who visited the site and what theydid there. Donors are susceptible to an undercoverinvestigative technique – law enforcement, posing asan online solicitor, can host such a site itself. Siteshosted by law enforcement for the purpose of attract-ing and gathering information on criminals are called“honey pots.” Such a site would appear identical to theone above (law enforcement could even re-open thesite on a computer it administered). It would differfrom the site above, however, in that it would recordeverything a visitor did while on the site. If a donorread a home page describing the site’s purpose (i.e., tosupport a terrorist organization) and then filled outand submitted an electronic donation form, lawenforcement would have good evidence that the visitorintended to donate money to support a terroristorganization.

3. Prosecution

The United States criminal code contains strict prohi-

Figure 2

Page 66: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy 63Appendix H

bitions against providing material support or re-sources, knowing that material support or resourceswill be used to commit terrorist acts,61 or that they willknowingly provided to a Foreign Terrorist Organiza-tion.62 The code also prohibits conspiring within thejurisdiction of the United States to kill, kidnap, ormaim any individual outside the United States or todamage any property in a foreign country with whichthe United States is at peace, a prohibition that mayapply to a perpetrator who solicits or donates funds inthe United States knowing that they will be used tocommit a specific act of terrorist violence abroad.63

Moreover, the money laundering statutes64 apply toany individual other than the original donor whohandles such a donation knowing that it will be usedto support a terrorist organization, because each suchindividual conducts a transaction knowing that itinvolves the proceeds of illegal conduct (the donation)with intent to promote or continue the conduct.These criminal statutes impose substantial penaltiesfor violations and, in conjunction with other statutes,enable the government to seize and forfeit the pro-ceeds of illegal fund raising activities.

As the United States’ global effort to crack down onterrorist fundraising gains the support of countriesaround the world, the regimes under which terroristorganizations are allowed to flourish are decreasing.As a result, direct solicitation is becoming less preva-lent, and terrorist organizations are exploiting other,more surreptitious means of raising funds.

B. Exploitation of Charities & E-Commerce

Terrorist organizations have frequently and success-fully exploited charities as vehicles for surreptitiousfundraising. In some cases, as with Wafa al-Igatha al-Islamiya, Rabita Trust, Rashid Trust, Global ReliefFund, Benevolence International Foundation, andUmmar Tamir-e-Nau, terrorist organizations haveestablished a charity with an ostensibly humanitarianpurpose. These charities have advertised in sympa-thetic communities’ press and on web sites and chatrooms with common themes.65

For example, Al-Rashid Trust, a Pakistan-based, al-Qaeda affiliated charity describes itself as “[a] presti-gious welfare organization whose comprehensiveservices are benefiting all the Muslims of the world.”66

The Trust’s web site, which is still available in Englishas of the writing of this Report, solicits donors with animpressive list of humanitarian accomplishments anda promise that “[m]ore attention shall be given to thedepartments of health, food, education, and employ-ment.”67 Just days after the September 11, 2001attacks, however, President Bush signed an executiveorder identifying the Trust as a financial conduit forthe Taliban and al-Qaeda and freezing its U.S. assets.68

The Benevolence International Fund (“BIF”) providesanother excellent example of how terrorists cansimultaneously raise funds and avoid scrutiny bycloaking themselves as a charitable organization. In

61 See 18 U.S.C. § 2339A.

62 See 18 U.S.C. § 2339B.

63 See 18 U.S.C. § 956.

64 18 U.S.C. § 1956.

65 The Qur’an requires Muslims to give a portion of their money to charity. The Quran divides alms giving into the obligatory (“zakat”)and the voluntary (“sadaqa”). Devout Muslims may give contributions directly to Islamic organizations or needy individuals. In someIslamic countries, however, the collection and distribution of charitable funds is managed by the government. For example, the Islamicaffairs councils of various states in Malaysia collect and disburse contributions, while Pakistan imposes a 2.5% annual income tax uponits Sunni Muslim residents. Unfortunately, terrorist organizations exploit this admirable Islamic practice to support their mission ofviolence.

66 See www.ummah.net.pk/dharb/services.htm (April 22, 2003).

67 Id.

Page 67: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy64 Appendix H

1993, the IRS granted BIF tax-exempt status under 26U.S.C. § 501(c)(3).69 BIF raised millions of dollarseach year during the 1990s, in part by acceptingdonations on its web site. Authorities have uncoveredevidence that BIF supported al-Qaeda and otherterrorist organizations. The Department of Treasuryhas listed BIF as a financier of terrorism.70 In October2002, BIF’s leader, Enaam Arnaout, was indicted for,among other things, providing material support toterrorist organizations, including al-Qaeda.71 In 2003,Arnaout pled guilty to charges involving diversion ofcharitable contributions to armed militant groups inBosnia and Chechnya.72

In other cases, terrorists have infiltrated branches of anexisting charity to raise funds surreptitiously. Manysuch organizations provide the humanitarian servicesadvertised: they feed and clothe the poor, educate theilliterate, provide medical care for the sick and thesuffering – and it is important not to presume thatcharitable organizations have terrorist affiliationssimply because they serve regions or religious orideological communities with which terrorism may beassociated. Some such organizations, however, inaddition to pursuing their public mission of providinghumanitarian aid, pursue a clandestine agenda ofproviding material support to the militant groups thatseek violently to “liberate” their particular region orexpand the influence of their particular religion orideology. These organizations’ propaganda may ormay not provide hints as to their darker, more secretpurpose.

Terrorist-affiliated entities and individuals have alsoestablished Internet-related front businesses as asimultaneous means of facilitating communicationsamong terrorist cells and raising money to supporttheir mission. For example, InfoCom, a Texas-basedISP, was indicted along with its individual corporateofficers in December 2002 on thirty-three countsrelating to its provision of communication services, in-kind support, and funds to terrorist organizations suchas HAMAS and the Holy Land Foundation for Reliefand Development.73 According to the Indictment,InfoCom also exported advanced computer technolo-gies to Libya and Syria, designated state sponsors ofterrorism, in violation of IEEPA.74 Incorporated inTexas in 1992, InfoCom’s initial capital was donatedprimarily by Nadia Elashi Marzook, wife of HAMASfigurehead and specially-designated terrorist MousaAbu Marzook.75

1. Prevention

Charities continue to be an attractive vehicle toterrorist groups seeking to raise and move funds. Suchorganizations are often hard to distinguish from thescores of legitimate charities providing humanitarianaid, a task rendered more difficult by the fact thatoften organizations that bankroll terrorist groups alsofinance legitimate charitable projects. The Internetexacerbates this problem in two respects. First, acharity may locate itself anywhere in the world – in astate that sponsors terrorism, for instance, or a countrythat does not regulate charitable organizations – and,through the Internet, obtain access to donors world-wide. Second, a charity that exists primarily online

68Exec. Order No. 13224, 66 Fed. Reg. 49079 (Sept. 23, 2001).

69 See Indictment, United States v. Arnaout, No. 02-CR-892 (N.D. Ill. Nov. 1, 2002), available at http://news.findlaw.com/hdocs/docs/terrorism/usarnaout10902ind.pdf.

70 See Indictment, United States v. Arnaout, supra note 43.

71 Id.

72 See Plea Agreement, United States v. Arnaout, , No. 02-CR-892 (N.D. Ill. Nov. 1, 2002), available at http://news.findlaw.com/hdocs/docs/bif/usarnaout203plea.pdf.

73 See Indictment, United States v. Elashi, Cr. No. 3:02-CR-052R (N.D.Tex.) Dec. 17, 2002), available at http://news.findlaw.com/hdocs/docs/infocom/uselashi121702sind.pdf.

74 Id.

75 Id.

Page 68: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy 65Appendix H

(the Working Group is not currently aware of any thatexist only online) is not generally subject to thescrutiny of donors or regulators in the way thatpredominantly brick-and-mortar charities are. Do-nors do not, for the most part, visit the charity’s officesor speak to one of its representatives.

The United States’ effort to prevent terrorist groupsfrom raising and moving money through charitiesfocuses largely on international cooperation anddomestic regulation. With regard to charities that arelocated overseas, the United States relies heavily on thehost country’s help in preventing abuse. To this end,the Special Recommendations on Terrorist Financingadopted by the FATF in October 2001 exhortedmember countries to review their laws and regulationsgoverning charitable organizations and ensure thatsuch organizations are not subject to misuse.76 Inaddition, the United States has actively availed itself ofbilateral meetings and multilateral fora to encourageother countries to strengthen regulatory control overcharities within their borders.77

To obtain charitable status in the United States anorganization must file an Application for Recognitionof Exemption (Form 1023) with the IRS.78 TheApplication requires the organization to list its name,address, phone number, and web site and generalinformation about its formation or incorporation andits activities and operations. The organization mustalso provide information regarding its financialsupport and its fundraising program, its officers ordirectors, and the basis upon which it qualifies forexempt status.

Once the IRS grants an organization tax-exemptstatus, the organization must file annually a Form 990containing its name, address, web site and phone

number; its contributions and other forms of incomeor revenue; its operational expenses; its charitableactivities and accomplishments; its officers anddirectors; and a list of its contributors who donatedmore than $5,000 during that year.

The Internal Revenue Code specifies the proceduresthat the IRS must follow to revoke the exempt status ofany organization.79 The Code also provides theorganization with the right to contest a determinationthat its tax exempt status should be revoked in theUnited States Tax Court, and appeal an adversedecision from the Tax Court to the appropriate UnitedStates Court of Appeals.80 To revoke an organization’stax exempt status, the Commissioner of InternalRevenue must: (1) conduct an examination of theorganization; (2) issue a letter to the organizationproposing revocation; and (3) allow the organizationto challenge that determination in administrativeproceedings.81 The actual letter of revocation may beissued only at the conclusion of that administrativeprocess. During any subsequent Tax Court proceedingor appeal to the Court of Appeals, the organizationcontinues to enjoy tax exempt status. This processmay take years to complete. As a result, an organiza-tion that has had its assets frozen pursuant to a Presi-dential order may continue to remain tax exemptunder the code for years. To address this situation, theSenate is currently considering a bill that wouldsuspend an organization’s status as soon as it isidentified as a terrorist organization.82

Greater awareness and caution on the part of donorsmay also help curb online terrorist fund raising. Inthis respect, the Internet provides some of the meansto cure its own ills. Donors may be educated both bywaging a proactive media campaign to raise awarenessof online charities associated with terrorist organiza-

76 See Special Recommendations, supra note 17.

77 See Prepared Statement of Kenneth Dam, supra note 6.

78If the organization seeks the exemption for any subsection other than 501(c)(3), they provide similar information on a Form 1024instead.

79 See 26 U.S.C. § 7428.

80 See id.

81 See id.

82 See The Care Act of 2003, S.272.

Page 69: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy66 Appendix H

tions and by encouraging donors to take advantage ofthe vast resources on the Internet regarding charitableorganizations. For instance, the sitewww.guidestar.org provides information on everycharitable organization recognized by the IRS.Donors may also take advantage of the web sites oforganizations such as InterAction, the Better BusinessBureau Wise Giving Alliance, and the NationalAssociation of State Charities Officials, which providereports on charities, promote standards of account-ability for charities, and alert donors to current charityfrauds.83 The Treasury Department, too, has promul-gated guidelines encouraging charities to operate withappropriate transparency and accountability in orderto discourage criminals and terrorists from exploitingcharitable organizations.84 By publicizing terrorists’use of charity web sites to raise funds and by encour-aging donors to learn about a charity before contrib-uting to it, the amount of unwitting donations madeto terrorist groups can be reduced.

2. Investigation

Investigation of a charitable organization with anonline presence generally begins with discovery of thatorganization’s affiliation with a terrorist organization.In a rare case, it may be possible to demonstrate theaffiliation by online investigation. For instance, if acharitable organization’s web site includes a hyperlinkto a terrorist propaganda page or vice versa, this mayform the basis for further investigation. The informa-tion provided regarding a particular charity by onlineinformation services, such as www.guidestar.org, mayalso provide grounds to suspect that a charitableorganization has terrorist connections. More oftenthan not, however, the affiliation will be discoveredthrough offline investigative techniques.

Once the affiliation is identified, there will be severalsources of information online. The ISP that hosts thecharity’s web site may have logs that indicate whocreated the site, who has visited it, and what they havedone there. In addition, such organizations may keep

electronic records of their donors, so that they cancontact them again for future donations. Recordsregarding the accounts associated with the organiza-tion may be subpoenaed, and affiliated electronic mailaccounts can be searched for communications withmembers of terrorist organizations or regardingterrorist activities. In addition to these online sources,law enforcement may obtain a charitableorganization’s Form 1023 or 1024 and its Form 990s.85

See Figure 3.

3. Prosecution

Once investigation demonstrates the affiliation be-tween a charity and a terrorist group, the case againstthe charity or individuals associated with the charitymay be made. Law enforcement still has an importantdecision to make, however, before prosecuting such acharity and/or its donors. A charity that providesfunds and resources to a terrorist organization may bea valuable source of information regarding thatorganization. If the ISP that provides web hostingservice to the charity is located within the UnitedStates, law enforcement can obtain logs showing the IPaddresses from which the site was accessed, the dona-tions submitted online, and the electroniccommunications of the web site operators (assumingthat they provide their own electronic mailservice through the web site), which may identifyindividuals involved in the terrorist organization orreveal details about imminent terrorist operations.Law enforcement must assess in each investigationwhether the benefit to be gained by prosecuting theindividuals who are abusing the charitable organiza-tion outweighs the benefit to be gained by monitoringthem as they continue to act.

If law enforcement does prosecute such a case, asdiscussed above, providing money or material supportto a terrorist organization may violate 18 U.S.C. §2339A, § 2339B (if the organization has been desig-nated a FTO), or § 956. Soliciting donations over theInternet from donors who believe their money is being

83 See http://www.interaction.org; http://www.give.org/donors/index.asp; http://nasconet.org.

84 See U.S. Department of the Treasury Anti-Terrorist Financing Guidelines: Voluntary Best Practices for U.S. Based Charities, available athttp://www.treas.gov/press/releases/docs/tocc.pdf.

85 As a result of amendments to the tax laws passed in the Victims of Terrorism Tax Relief Act of 2001, Pub. L. No. 107-134, 115 Stat. 2427(Jan. 23, 2002), law enforcement now has expanded authority to obtain tax returns and return information for the purpose ofpreventing or investigating terrorist incidents, threats, or activities. See 26 U.S.C. § 6103.

Page 70: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy 67Appendix H

DONOR

DONOR

DONOR

3. Bank Acct. Info.

3. Bank Acct. Info.

3. Bank Acct. Info.

4. Bank Acct. Info.

2.IP AddressWeb Host

3. B

ank

Acc

t. In

fo.

HumanitarianProjects

5. Bank Acct. Info.

1.Acct.InfoISP

Terrorism

Bank

CharitableOrganization

used for humanitarian purposes, when in fact it isbeing used to support violent extremism and mili-tancy, may violate the wire fraud statute.86 Transfer-ring funds received by a charity to another organiza-tion to further such unlawful activity may violate themoney laundering statute, § 1956. In all likelihood,too, the organization will have submitted false taxdocuments, a violation of 26 U.S.C. § 7206(1).

Prosecution of contributors to such organizationswould, in most instances, not follow because suchcontributors intended to contribute to a humanitar-ian organization, not to a terrorist front. Generally, acontributor must know that a charity is affiliatedwith a terrorist organization to be prosecuted for aviolation of sections 956, 1956, or 2339A. If anorganization has been designated a FTO, however, theprosecutorial burden is somewhat lighter – undersection 2339B, the government must prove only thatthe contributor had knowledge concerning the statusof the recipient FTO; it need not prove that thecontributor knew the funds would be used to supportterrorist activities.

C. Proceeds of Online Crimes

In addition to soliciting funds, either directly orthrough charitable or e-commerce front organizations,terrorist groups use the Internet to raise funds byperpetrating online crimes. The same qualities thatprotect individual privacy on the Internet make itparticularly susceptible to fraud and deception. Theanonymity users enjoy online also allows the perpetra-tor of a fraud to pose easily as someone else – anidentity theft victim or a fictitious person. Terroristshave used identities they have stolen through onlinefraud schemes to obtain cover employment within theUnited States, access to bank and credit card accounts,and even entry into secure locations.87

It requires very little technical expertise to change the“from” information on an e-mail so that it appears tocome from an ISP’s billing department, a credit cardcompany, or a bank. Just slightly more skill allows auser to design a fraudulent web page that purports tobe an ISP’s, the credit card company’s, or the bank’scustomer service center. The ease and efficiency withwhich an Internet user can communicate with hun-dreds or thousands of other users, regardless of

Figure 3

86 18 U.S.C. § 1343.

87See Dennis M. Lormel, Statement on Technology, Terrorism and Government Information before the Senate Judiciary Subcommittee(July 9, 2002).

Page 71: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy68 Appendix H

geographic location, makes the Internet an environ-ment particularly conducive to vast fraud schemes withnumerous victims.

Online auction fraud is another common e-crimegambit – the perpetrator offers to sell a valuable item,such as a piece of jewelry, through an online auctionservice, receives payment, and never sends the item.The purchaser attempts to obtain recourse from theseller, only to find out that he has provided fraudulentcontact information. Online securities frauds, such as“pump and dump” schemes in which an investorpublishes fraudulent information about a securityonline to inflate its value and then sells large quantitiesof the security at the inflated price, might also providea source of funding for terrorist organizations.88

Finally, commentators have recently suggested that theproceeds of intellectual property piracy may also besupporting terrorist organizations.89

1. Prevention

Regulation of ISPs and of Internet users themselveswould prevent some online crimes. If electroniccommunications services, remote computing services,web hosting services, and other ISPs were required toobtain and verify valid contact information for each oftheir subscribers, for instance, the number of investiga-tions that would dead end at false registration informa-tion would diminish significantly. Similarly, if ISPswere required to retain logs regarding the use of theirservices, more information would be available to lawenforcement investigating online crimes. The UnitedStates does not require by law or regulation, however,

that ISPs retain such information, in part becauseregulatory approaches to the prevention of onlinecrime are viewed as at odds with the free and openethic of the Internet. 90 ISPs are understandablyreluctant to have business practices that facilitate lawenforcement investigations, rather than profit genera-tion, imposed upon them. Internet users are under-standably protective of their privacy and anonymity.

For these reasons, the problem of Internet crime maybe better prevented by encouraging increased securityby ISPs and online businesses and by educatingInternet users regarding the danger of fraud online.ISPs and online businesses can significantly reduceInternet crime by many means, some as simple asactively notifying their subscribers of current scamsand swindles. Similarly, Internet users can abateonline fraud by following simple rules such as “neverprovide your credit card number over the Internetexcept over a secure connection with a merchant youtrust.” As such measures reduce Internet crime ingeneral, they will also reduce the amount of moneyflowing to terrorist organizations.

Deterrence, also, may play an important role indiminishing terrorists’ ability to capitalize on onlinecrimes. In both the USA PATRIOT Act and theHomeland Security Act, Congress strengthened thestatutory penalties for some computer crimes.91 TheHomeland Security Act also directed the United StatesSentencing Commission to amend the United StatesSentencing Guidelines to reflect adequately the preva-lence and seriousness of computer crimes.92 Inaddition, federal, state and local investigative and

88 For a thorough discussion of online securities frauds, see John Reed Stark, Enforcement Redux: A Retrospective of the SEC’s InternetProgram Four Years after Its Genesis, 57 BUS. LAW. 105 (2001).

89See Matthew A. Levitt, The Political Economy of Middle East Terrorism, MIDDLE EAST REVIEW OF INTERNATIONAL AFFAIRS (MERIA) JOURNAL,Vol. 6, Issue 4 (2002).

90 Most European countries have also shied away from requiring ISPs to retain information. “[T]o ensure . . . protection of . . . the right toprivacy, with respect to the processing of personal data in the electronic communication sector,” the European Union obligates its 15member countries to pass laws requiring ISPs to delete information regarding electronic communications if it is no longer being used toensure the integrity of the communication service or for billing purposes. European Union Directive on Privacy and ElectronicCommunications, 2002/58/EC (July 31, 2002). Several European countries, including France, Spain, Ireland, and Denmark, have,however, taken advantage of an exception to the “data protection” requirement that permits countries to adopt legislation requiring ISPsto retain data “for a limited period . . . to safeguard national security, . . . defence, public security , and the prevention, investigation,detection and prosecution of criminal offenses.” See id., at Art. 15(1).

91 See USA PATRIOT Act, Pub.L. 107-56, Title VIII, § 814 (2001); the Homeland Security Act, Pub.L. 107-296, Title II, § 225 (2002).

92See the Homeland Security Act, Pub.L. 107-296, Title II, § 225 (2002).

Page 72: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy 69Appendix H

prosecutorial agencies have improved their ability torespond to such crimes. As these steps make punish-ment for online crimes more likely and more severe,the Internet will become a less appealing environmentfor criminal activity.

2. Investigation

United States law enforcement’s capacity to investigateand prosecute computer crimes has increased over thelast several years. This is due, in part, to amendmentsin the USA PATRIOT Act and the Homeland SecurityAct to the procedural laws applicable to investigationsof online activity.93 These two Acts amended the lawsthat prescribe the procedures by which law enforce-ment may obtain information regarding online com-munications,94 effectively streamlining these proce-dures while protecting the autonomy of ISPs and theprivacy of Internet users. The Acts also amended thesubstantive laws applicable to computer crimes,95

explicitly taking new strains of Internet criminalityinto account and strengthening penalties for manyonline crimes.

Law enforcement’s increasing effectiveness in investi-gating and prosecuting computer crimes is also due, inpart, to the dedication of increased resources to thisarea and to federal, state, and local law enforcemententities’ concomitant development of expertise in thearea of computer crimes. Many such entities now havecybercrime squads that are trained to investigate crimecommitted via the Internet.

The investigation of computer crimes has also been afertile ground for international cooperation over thepast seven years, resulting in a greater ability to trackcomputer crimes that cross international borders. TheG8 Roma & Lyon Groups, established to combat,respectively, transnational terrorism and transnational

organized crime, for example, maintain a group ofinternational computer crime experts, the G8 Sub-group on High-Tech Crime, that has promulgatedprinciples and best practices regarding the prevention,investigation, and prosecution of computer crimes.The Subgroup also maintains a network of computercrime experts from 31 countries that are available 24-hours-a-day, 7-days-a-week to respond to computercrime emergencies. In addition, in November 2001,the Council of Europe completed negotiation of theConvention on Cybercrime, which commits its 35signatories to pass procedural and substantive com-puter crime laws and to provide assistance to othersignatory countries investigating cybercrimes.96 Suchcooperation and capacity-building in the internationalcommunity is essential if the United States is toinvestigate effectively a mode of criminality that oftentranscends international borders.

It is worth noting that the measures for effectivelypreventing Internet crime and those for effectivelyinvestigating it are complementary. Adequatelysecured ISPs, well-educated users, strong, comprehen-sive procedural and substantive laws, and enhancedlaw enforcement capacity all support effective preven-tion and investigation of online crimes and depriveterrorists of the proceeds of such crimes as a source offunding.

3. Prosecution

As mentioned above, the procedural and substantivelaws pertaining to computer crimes have beenamended twice since September 2001, aiding bothinvestigators and prosecutors while maintaining ahealthy respect for Internet privacy. Federal, state, andlocal prosecutorial teams have also developed specificexpertise in the area of computer crimes. The UnitedStates Department of Justice, for instance, maintains

93See supra note 4. Some of the amendments in the USA PATRIOT Act are subject to a sunset provision which will remove them from thecode, unless they are affirmatively renewed, on December 31, 2005. See Pub.L. 107-56, Title II, § 224 (2001). If these provisions arepermitted to sunset, it will be a tremendous setback to law enforcement’s ability to investigate and prosecute online crimes.

94Generally speaking, these laws are the Wire Tap Act, 18 U.S.C. §§ 2510, et seq., the Electronic Communications Privacy Act, 18 U.S.C. §§2701, et seq., and the Pen Register/Trap & Trace statute, 18 U.S.C. §§ 3121 et seq. See also the Department of Justice’s manual,“Searching and Seizing Computers and Electronic Evidence,” available at http://www.cybercrime.gov/s&smanual2002.pdf.

95The primary substantive law applicable to computer crimes is the Computer Fraud and Abuse Act, 18 U.S.C. § 1030.

96 See http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm.

Page 73: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy70 Appendix H

the Computer Crime & Intellectual Property Section, ateam of approximately 40 attorneys with expertise inthe prevention, investigation, and prosecution ofcomputer crimes.97 This team forms the nucleus of anetwork of federal computer crime experts thatincludes at least one Computer & TelecommunicationsCoordinator (“CTC”) in each of the United States’ 94federal law enforcement districts and ComputerHacking and Intellectual Property (“CHIP”) units inseveral of the larger districts. These experts comple-ment traditional investigative techniques with Internetinvestigative techniques (such as legally obtaininginformation from ISPs and using publicly availableonline resources) and computer forensics.

Although one should not expect fraud or unautho-rized intrusions to be eradicated from the Internet anymore than fraud or burglary have been eradicatedfrom the brick-and-mortar world, as network security,user education, and investigative and prosecutorialcapabilities all continue to improve, Internet crimemay well decrease, and with it the proceeds terroristorganizations derive from Internet crime.

III. TERRORIST USE OF THEINTERNET TO MOVE FUNDS

Terrorists and terrorist organizations may use theInternet to transfer funds in three primary ways. First,they can use Internet banks and online banking andother financial services.98 Second, they can useInternet-based alternatives to the banking system, suchas Internet payment services and e-cash. Finally,terrorists can communicate over the Internet regard-

ing the movement of funds. Each of these topics istaken up below.

A. Internet Banks, Online Banking, & Other Online Financial Services

Brick-and-mortar banks and other financial institu-tions increasingly offer their customers online finan-cial services.99 A recent article estimated that whereasin 1994 only .3% of United States households usedonline banking, currently 26% (a total of 21 millionUnited States households) use such services.100 Thearticle projected that this figure would increase to 45%by 2010. Similarly, an April 2002 report on Internetbanking by Harvard University’s Program on Informa-tion Resources Policy indicated that all the largestUnited States banks now offer Internet banking.101

As demand for the convenience of online servicesincreases, Internet-only banks are also entering themarket. There were only nine separately charteredvirtual banks at the beginning of 2000.102 For instance,First-e, the virtual bank of online finance companyEnba, attracted 71,000 customers in its first six monthsof business. Online banking is equally popular abroad,with financial entities such as EGG and INGpopulating foreign financial services markets.

The Internet infrastructure underlying online bankingand other financial services allows customers moreeasily to take advantage of the global nature of thefinancial system. With a few clicks of the mouse, acustomer in one country can set up accounts in severalother countries. With a few more clicks, the customercan transfer money between these accounts. The

97 To learn more about the Department of Justice’s efforts to combat computer crime and intellectual property violations, visit http://www.cybercrime.gov.

98 Terrorists and terrorist organizations may move funds through a variety of formal financial institutions, including securities andfutures brokerages, mutual fund companies, and investment companies. These institutions are included within the definition of“financial institution” set forth in the anti-money laundering provisions of the Bank Secrecy Act and, pursuant to the USA PATRIOTAct, they must establish anti-money laundering programs reasonably designed to prevent their use for money laundering or terroristfinancing. See 31 U.S.C. §§ 5313(a)(2) and 5318(h).

99 Although this Report focuses primarily on the banking system, much of the discussion in Section III.A applies equally to non-bankingfinancial services and to non-depository financial institutions.

100The Rise in Online Banking, THE PHILADELPHIA INQUIRER, February 10, 2003.

101Karen Furst, William W. Lang, and Daniel E. Nolle, INTERNET BANKING: DEVELOPMENTS AND PROSPECTS (April 2002), available atwww.pirp.harvard.edu.

102 Id.

Page 74: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy 71Appendix H

Terrorist Operative

Online BankOnline Bank

Alternative

Online Bank

Alternative

Online Bank

Alternative

Online BankISPTerrorist Financier

Online Layering Transaction

efficiency of the Internet also makes it easier to “layer”transactions and fund transfers, routing moneythrough a number of accounts using a number ofdifferent instruments and transfer mechanisms withina short period of time. See Figure 4. If any of theaccounts used by the customer is in a country that doesnot require financial institutions to maintain informa-tion regarding such transactions or in a country thatdoes not share such information, the ability to tracesuch transfers is severely hindered.

Terrorist use of online banking services is facilitated inpart by banks that have terrorist ties. For instance, Al-Taqwa Bank, founded by the Muslim Brotherhood inthe Bahamas in 1988, maintained branches in Algeria,Liechtenstein, Italy, Malta, Panama, and Switzerland,and provided banking services to al-Qaeda andHAMAS until it was shut down by sanctions in thewake of September 11, 2001.103 Similarly, HAMASestablished Al-Aqsa Bank in 1997.104

The convenience, speed, and fluidity of online financialservices are tremendous assets to customers and to theglobal economy. These same features, however, make

online financial services a potential vehicle for terror-ists and terrorist organizations seeking to move funds.

1. Prevention

Regulation of the financial services industry is theprimary tool for preventing terrorists from movingfunds through the United States banking system.Banks often act as the gateway to the world of financialand fund transfer services. The first step in financialsecurity is identifying a customer as she opens anaccount and verifying her identity.105 In this arena, theInternet poses some unique challenges.106 For tradi-tional brick-and-mortar banking, this process ofteninvolves meeting the customer, obtaining identifyingdocuments that have photographs or list physicalcharacteristics that match the customer’s characteris-tics, and observing the customer’s behavior. In anInternet banking context, none of these traditionaltechniques is possible.107 Banks can, and do, amelio-rate the risks inherent in online banking by requiringnew customers to provide identifying informationsuch as their social security number, driver’s licensenumber, address, and phone number and by indepen-

103See Testimony of Steven Emerson, supra note 49.

104Id.

105 See Internet Banking: Comptroller’s Handbook (Oct. 1999), available at http://www.occ.treas.gov/handbook/intbank.pdf. Banks mayalso offer transferable monetary instruments such as money orders and value transfer services such as wire transfers without requiring acustomer to open an account. Monetary instruments are subject to identification rules promulgated by FinCEN if they are purchasedwith more than $3,000 in cash. See 31 C.F.R. § 103.29. Likewise, money transfer services that involve more than $10,000 in cash aresubject to FinCEN’s currency transaction reporting rule. See 31 C.F.R. § 103.30. In addition, the purchase of money orders and the useof value transfer services are subject to the suspicious activity reporting requirements discussed infra.

106 See OCC Bulletin: ACH Transactions Involving the Internet (Jan. 14, 2002), available at http://www.occ.treas.gov/ftp/bulletin/soos-2.txt.

107 See Authentication in an Electronic Banking Environment (Aug. 8, 2001), available at http://www.ffiec.gov/PDF/pr080801.pdf.

Figure 4

Page 75: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy72 Appendix H

dently confirming that the information provided isvalid.108

The USA PATRIOT Act normalized the process ofidentification and verification, directing the Secretaryof the Treasury to promulgate regulations requiringfinancial institutions109 to establish reasonable proce-dures to verify to the extent reasonable and practicablethe identity of any customer seeking to open anaccount, to maintain records of the information usedto verify the customer’s identity, and to determinewhether the customer appears on any list of known orsuspected terrorists or terrorist organizations main-tained by any government agency. 110

On April 30, 2003, the Secretary of the Treasury, inconjunction with the Federal banking agencies, theSEC, and the CFTC, released for final publication aseries of regulations promulgated under the authorityof Section 326 of the USA PATRIOT Act, whichrequires banks, broker-dealers, mutual fund managers,futures commission merchants, and introducingcommodities brokers to adopt a written CustomerIdentification Program (“CIP”) setting forth proce-dures pursuant to which it will: (1) identify customersas they open accounts by obtaining certain requiredinformation such as the customers’ name, address,date of birth, and taxpayer identification number; (2)exercise reasonable efforts to verify the customer’sidentity; (3) maintain records of information obtainedduring the identification and verification processes;and (4) consult lists identified by the Department ofthe Treasury of individuals and organizations whoseassets have been blocked or frozen. The financialinstitution’s CIP must enable it to form a reasonable

belief that it knows the true identity of each customer.These regulations apply equally to online financialservices. Financial institutions must comply with thenew regulations by October 1, 2003.

Financial institutions’ role in ensuring the security andintegrity of the United States’ financial system doesnot end once a customer has opened an account.United States banks and securities brokers are alsorequired to report to an appropriate federal lawenforcement agency and to the Department ofTreasury’s Financial Crimes Enforcement Network(“FinCEN”) any transaction exceeding $5,000 thatattracts suspicion, either because it serves no evidentbusiness purpose or because it is unusual for thatparticular customer.111 The United States, throughparticipation in multilateral bodies, has encouragedother countries to adopt similar regulations.112

As these regulations indicate, much of the burden ofsecuring online financial services against abuse byterrorist organizations must be borne by financialinstitutions. Both within the United States andinternationally, oversight and regulatory bodies haveoffered guidance to financial institutions seeking toexpand into the electronic market without becomingvulnerable to misuse by terrorist organizations andother criminals. For instance, in 2001 the FederalFinancial Institutions Examination Council (“FFIEC”)issued a report entitled Authentication in an ElectronicBanking Environment that advises banks regardinghow successfully to verify the identity of new custom-ers who open accounts online and authenticate theidentity of existing customers who initiate fundtransfers or other transactions online.113 The OCC

108 See Ivan Schneider, Banks Crack Down on Terror Funds, Apr. 8, 2002, available at www.banktech.com/story/whatsNews/BNK20020408S0002 (noting that “in the ongoing war on terrorism, banks and their technology providers can best serve the governmentby acting as a tripwire for criminals attempting to infiltrate the world financial systems”).

109 The statutory definition of “financial institutions” includes banks, credit unions, securities brokers and brokerage houses, currencyexchanges, and several other, less formal entities offering financial services. See 31 U.S.C. § 5312.

110 See USA PATRIOT Act, Pub.L. 107-56, Title III, § 326 (2001).

111See 12 C.F.R. § 21.11; 31 C.F.R. §§ 103.18 and 103.19.

112For instance, the Special Recommendations on Terrorist Financing adopted by the FATF exhort countries to require of financial institutions and other business entities prompt reporting of suspicious transactions that may be related to terrorism. See supra, note 17.

113See Authentication in an Electronic Banking Environment, supra note 85; see also OCC Bulletin: ACH Transactions Involving the Internet, supra note 84.

Page 76: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy 73Appendix H

and the Federal Reserve Bank of Chicago also offerguidance regarding secure electronic banking andfraud and intrusion prevention.114 On the interna-tional front, in May 2001 the Basel Committee onBanking Supervision, published its seminal document,“Risk Management Principles for ElectronicBanking.”115 These documents encourage banks in theUnited States and abroad to consider the risks involvedin offering electronic banking services and develop astrategy to manage those risks; install and maintainadequate security to ensure that electronic bankingservices are not vulnerable to fraud or attack, either byan insider or an Internet user; actively superviseelectronic banking services outsourced to third-partyproviders; establish adequate identifying and authenti-cating protocols for electronic bank service customers,preferably involving multiple, complementary meth-ods; and effectuate measures to ascertain the accuracy,completeness, and reliability of banking informationexchanged over public electronic networks.

Regulation and security do not provide a foolproofprevention system, in large part because, from theperspective of a financial institution, a transfer offunds to a terrorist organization through a contact inPakistan, for instance, may look exactly like a legiti-mate transfer by a Pakistani immigrant sendingsupport home to his family.

2. Investigation

Investigation of terrorist use of online financialservices to transfer funds generally begins with infor-mation provided pursuant to the banking regulationsand security measures discussed above. FinCENanalyzes Suspicious Activity Reports (“SARs”) filed byfinancial institutions, searching for trends and pat-terns, and assists law enforcement in tracing complexseries of financial transactions back to criminalsuspects. Law enforcement also investigate reports ofelectronic banking fraud, attacks on electronic bank-ing systems, and intrusions into electronic bankingcomputers. Such investigations rely heavily on the

records maintained by the victim bank, but becausethey involve online conduct, law enforcement may relyon an additional source of information.

A perpetrator’s abuse of an electronic financial serviceleaves an electronic trail. If the conduct simplyinvolves accessing e-banking services to transfer fundsto a terrorist suspect, the perpetrator leaves behind anIP address when he accesses the services. If the ISPthrough which he connected to the Internet is in theUnited States, or a cooperating foreign country, lawenforcement can obtain the customer informationassociated with that user, pinpointing the computerfrom which the account was accessed (although theremay still be significant obstacles to identifying theperpetrator if he used an Internet café, public libraryterminal, or anonymizer). If the conduct involvesfraud, the perpetrator leaves behind an IP address anda cache of electronic messages to and from thedefrauded financial institution or individual. Thefinancial institution very likely logs both the IPaddress from which the customer accessed the website and the customer’s activity while on the web site.Whereas an ISP may have little business incentive tomaintain logs of its subscribers’ communications forextended periods of time, a financial institution hasevery incentive to maintain thorough and accuratelogs of customer and account activities. Not only isreliable verification of account activities central to thefinancial institution’s business, it is required byregulation.116 Moreover, for an online bank transferto work, the customer must provide valid destinationinformation. Investigation of online bank transferstherefore poses only one challenge – as suggested bythe example of the Pakistani immigrant, it is oftendifficult to determine which transfers are worthy ofinvestigation.

3. Prosecution

A bank transfer to a recipient that the transferorknows is a terrorist or terrorist organization may beprosecuted under any of several criminal statutory

114See Internet Banking: Comptroller’s Handbook (Oct. 1999), available at http://www.occ.treas.gov/handbook/intbank.pdf; An Internet Banking Primer, available at http://www.chicagofed.org/bankinforeg/bankregulation/Ibankingbooklet.pdf.

115 See Risk Management Principles for Electronic Banking (May 2001), available at http://www.occ.treas.gov/ftp/release/2001-42a.pdf.

116 The regulations promulgated by the Department of Treasury under the Bank Secrecy Act requiring banks, other financial institutions, and individuals and businesses engaged in certain transactions to maintain records may be found at 31 C.F.R. §§ 103.11-103.39.

Page 77: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy74 Appendix H

provisions. If such a transfer is international, it mayconstitute money laundering117 and probably, inaddition, constitutes material support.118 If thetransfer can be traced to a conspiracy to commitparticular terrorist acts, the transferor and the recipi-ent may also be prosecuted for conspiracy to kidnap,maim, or kill a person or destroy property on foreignterritory.119 Finally, if the transfer is to an individual orentity that has been designated a terrorist or terroristorganization, it may violate the IEEPA120 and section2339B. Any intermediary involved in the transfer thatpossesses the requisite mental state – knowledge thatthe money is to provide material support for terroristsunder section 2339B and knowledge that the money isbeing given to a designated FTO has also violatedthose sections. If the conduct involved fraudulentaccess to financial accounts or services or fraudulentuse of customer information, the perpetrator may betried under the criminal provision prohibiting wirefraud,121 and potentially also the provisions prohibit-ing violating the privacy of a financial institution’scustomer information122 and perpetrating fraud inconnection with an access device such as an accountnumber, PIN number or password.123 If the conductinvolved an intrusion or attack on an electronicbanking system, the perpetrator may be tried underthe Computer Fraud and Abuse Act.124 In addition to

prosecuting the perpetrator, the government may seekforfeiture of the funds and assets involved.125

B. Internet-Based Banking Alternatives

The Internet provides several new financial servicesand means of transferring value. Internet users canavail themselves of online non-bank payment systemssuch as AnonymousGold, PayPal, and StormPay;electronic currencies such as E-Bullion, E-Dinar, E-Gold, and Evocash; electronic checks such as thoseoffered by PayNow and BankServ; and electronic debitcards such as “smartcards.” Dollar-based electroniccurrencies such as Evocash and electronic checks aredependent on the banking system. Transactionsinvolving these value transfer mechanisms musteventually pass value into or out of the traditionalbanking system, subjecting these transactions, at leastsecond-hand, to the record-keeping and reportingrequirements imposed on the banking industry.

Many of the online payment systems, gold-backed e-currencies, and smartcard applications, however, arenot dependent on the banking industry.126 For in-stance, the online payment system StormPay requiresonly an e-mail address to open an account.127 Custom-ers can fund their accounts, StormPay states, by credit

117 18 U.S.C. § 1956.

118 18 U.S.C. § 2339B if the recipient is a designated FTO; potentially 18 U.S.C. § 2339A if the transferor knows that the recipient intends tocarry out any of a number of enumerated violent crimes.

119 18 U.S.C. § 956.

120 50 U.S.C. §§ 1701-1706.

121 18 U.S.C. § 1343.

122 15 U.S.C. § 6823.

123 18 U.S.C. § 1029.

124 18 U.S.C. § 1030.

125 18 U.S.C. § 981. The USA PATRIOT Act broadened the scope of funds and assets subject to forfeiture actions, bringing within the ambitof Section 981 funds in a United States interbank account, funds that are the proceeds of certain foreign crimes, funds and monetaryinstruments involved in currency smuggling, funds transferred without complying with currency reporting requirements, and funds thatare the assets of terrorist organizations. See USA PATRIOT Act, Pub.L. 107-56, Titles III and VIII, §§ 319, 320, 371, 372, and 806 (2001).

126 While these applications are developing largely independent of the banking system, some of them have implemented security, fraudprevention, and recording practices similar to those imposed on banks. PayPal, for instance, has established an aggressive fraudprevention strategy, cooperated routinely with law enforcement investigations, and reported voluntarily suspicious use of its services thatmay implicate money laundering, other criminal conduct, or misuse by terrorist organizations.

127 See http://www.stormpay.com/stormpay/.

Page 78: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy 75Appendix H

2. E-mail Address

4. e-gold account number

3. E-mail Address

6. Clean e-gold

Terrorist Financier

Free mail Server

e-gold server

AnonymousGold Server

5. cash, account number

1.Fra

udulen

t Registration Info.

Online Money Launderingcard, check, electronic currency, another onlinepayment system “and much more!”128 StormPay evenadvertises its services as “MLM [multi-level market-ing] friendly.”129

Similarly, AnonymousGold converts funds into or outof a gold-backed electronic currency.130 To buy aquantity of the e-currency, a customer merely sets upan e-gold account, sends to AnonymousGold, by mail,cash and an order ticket that discloses only thecustomer’s e-gold account number, and notifiesAnonymousGold by encrypted e-mail to expect thepurchase order.131 See Figure 5. Likewise, to convert aquantity of the e-currency into cash, a customersimply transfers the e-currency into AnonymousGold’saccount, and then sends an encrypted e-mail toAnonymousGold notifying it of the address to whichAnonymousGold should send cash or a blank moneyorder by regular mail.132 AnonymousGold states that it“do[es] not deal with banks” and that it “destroy[s] allof [its] transaction records upon completion of [acustomer’s] order.”133 Applications such as StormPayand AnonymousGold effectively protect the privacy oftheir customers. Without doubt, a vast majority oftheir customers use their services for legitimatebusiness purposes and private transfers. But becausethey effectively mask the identity of their customersand destroy or refuse to disclose the records of mon-etary transactions, such services are also susceptible toabuse by terrorist organizations.

Electronic currency accounts with companies such ase-gold (backed by gold)134 and e-dinar (backed by the

Islamic dinar, a specific weight of gold minted accord-ing to Islamic law) may also be opened with only avalid e-mail address (both companies request contactinformation, but the information does not appear tobe verified or essential to the initiation of an accountor the provision of services).135 E-gold can then beconverted into any of eight different currencies ortransferred instantaneously to any other e-goldaccount anywhere in the world.136 Such accounts maybe opened with the information of identity theft

128 Id.

129 Id. The term “multi-level marketing” is sometimes used to conceal fraudulent “ponzi” or “pyramid” schemes. See, e.g., “FutureNetDefendant Settles FTC Charges,” available at http://www.ftc.gov/opa/1998/11/huff.htm.

130 See http://www.securitygold.com/buy.htm.

131 Id.

132 See http://www.securitygold.com/sell.htm.

133 See http://www.securitygold.com/.

134 Gold-based e-currencies back accountholders’ value by physical reserves of gold or other precious metals. The gold remains in acentral, secured vault. Customers pay each other by transferring electronically ownership of a quantity of that gold (GoldMoney, forinstance, quantizes its transactions in units of value called GoldGrams). Accountholders can withdraw value from these companies byordering a check or by ATM or debit card.

135 See https://www.e-gold.com/newacct/; https://www.e-dinar.com/en/index_1.html.

136 See http://www.e-gold.com/unsecure/qanda.html.

Figure 5

Page 79: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy76 Appendix H

victims, funded with their credit cards, and then usedto transfer money into the account of a perpetrator.

Magnetic stripe applications and smartcards areanother stored value alternative that can interface withthe Internet to transfer funds to users around theworld. Magnetic stripe stored value applications, suchas traditional credit and debit cards, utilize existingfinancial networks. Smartcards are microcomputersthe shape and size of a credit card that contain smallelectronic data storage chips from which informationcan be read or to which information can be writtenwith appropriate hardware. Smartcards have a num-ber of useful applications, one of which is serving as abearer-authenticated form of stored value – whoeverholds the card can access the value stored on it. Acustomer can log on to a website, create a usernameand PIN number, and fund the card using a check,money order, cashier’s check, credit card number, ordirect draw from a bank account. The card can thenbe sent to anyone in the world, and used as though itwere cash. The information contained on the card isprotected by strong authentication protocols andencryption and cannot be accessed without theappropriate key, PIN, or biometric identifier. If thesmartcard or e-cash application relies on securities orbrokerage accounts to hold its reserves, these transac-tions are invisible to the regulatory regime thatscrutinizes traditional banking transactions – theyappear to be normal, legitimate transactions.

It is not difficult to imagine how these new alternativepayment processes might be used, either singly or inseries, to transfer funds for terrorists. The relativeanonymity afforded by these processes, their ability tocircumvent banking regulations, and their increasinguse around the world render them vulnerable toexploitation by terrorists and terrorist organizations.

1. Prevention

Abuse of alternative payment processes might beprevented, or at least diminished, by regulatingvendors and requiring them to collect more informa-tion from their customers. Although the regulatorylandscape with regard to new technologies such asalternative payment systems, e-currencies, andsmartcard applications is not clearly defined by statuteor case law, these systems seem to fall within the broaddefinition of “financial institution” set forth in 31U.S.C. § 5312.137 Still, a balance must be struck inregulating these new technologies.

One might argue that these services, which essentiallyperform the functions of a bank, should be subject tothe same oversight and regulation. The counter-argument is twofold: (1) most of these systems inter-face with the banking system at some point, so there isno need for onerous record keeping by alternativepayment companies; and (2) these companies thriveon low overhead and the administrative burden of, forinstance, reviewing transactions and filing SARs wouldimpose an additional transaction cost on vendors.

Similarly, one might argue that customers of suchservices should be required to provide the sameinformation that banking customers provide – at leastnames, social security numbers, driver’s licensenumbers, valid addresses and phone numbers. Thereis an obvious trade-off with this measure, too. Cus-tomers use these services in part because of the privacyand anonymity that they provide.

Nor would an appropriate regulatory regime be apanacea for misuse of such new technologies. Theborderless fluidity of the Internet poses uniquechallenges for such regulations. Customers can easilyconduct online transactions that cross internationalborders or access foreign financial services from an

137 The statutory definition of “financial institution” appears to extend the Secretary of the Treasury’s anti-money laundering and anti-terrorist financing regulatory authority to these new technologies. It includes both specific categories (“a dealer in precious metals,stones or jewels,” § 5312(a)(2)(N); “a licensed sender of money or any other person who engages as a business in the transmission offunds,” § 5312(a)(2)(R)) and catch-all provisions (“any business or agency which engages in any activity which the Secretary of theTreasury determines, by regulation, to be an activity which is similar to, related to, or a substitute for any activity in which any businessdescribed in this paragraph is authorized to engage,” § 5312(a)(2)(Y); “any other business designated by the Secretary whose cashtransactions havea high degree of usefulness in criminal, tax, or regulatory matters,” § 5312(a)(2)(Z)). The definition also includesmoney services businesses, which FinCEN has defined to include providers of alternative payment and stored value services if thoseproviders conduct more than $1,000 worth of transactions per day. See 31 C.F.R. § 103.11(uu). Although FinCEN’s regulations requireissuers, sellers, and redeemers of stored value to have anti-money laundering programs, they are not currently subject to other BankSecrecy Act requirements.

Page 80: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy 77Appendix H

Internet terminal located in the United States. Par-ticularly when transactions span two or more regula-tory jurisdictions, it can be difficult to differentiatelegitimate from illegitimate transactions.

2. Investigation

To the extent that these new technologies interfacewith the Internet, opening accounts with them andusing their services requires visiting a web site. If thecompany logs traffic on its web site and retains thoselogs (although in rare cases, such as those discussedabove, companies proactively destroy business recordsto protect their customers’ privacy, most of themretain logs so that they can investigate customers’claims of fraud or theft), it should, at the very least,have a record of the date, time, and IP address fromwhich the account was accessed for every transaction.Law enforcement can obtain this information for bothaccounts that are party to a transaction, i.e., the payorand the payee. From this information law enforce-ment can in theory determine who accessed eachaccount and participated in the transfer of value.138

3. Prosecution

The potential statutes under which a transfer of fundsto a terrorist or terrorist organization may be pros-ecuted are the same regardless of the means used totransfer the funds. See Section III.A.3, above. If asuspect provides false registration information whenopening an account, that individual might also beprosecuted under the wire fraud statute.139

IV. ELECTRONICCOMMUNICATIONS

Terrorists’ use of the Internet to communicate withone another constitutes perhaps the most prevalent useof the Internet to facilitate the raising and moving offunds. Communication, of course, is protected in theUnited States by the First Amendment unless it is infurtherance of some criminal conduct. Thus, forinstance, the First Amendment protects an individualwho transmits, without doing more, the message, “Ibelieve that the only way to curb the spread of Ameri-can capitalism, and the spiritual vacuum that accom-panies it, is by waging war against the United States.”Communications are often more, however, than apassive ideological statement. They may be an incite-ment to imminent unlawful action or a threat, neitherof which is protected by the First Amendment.140 Aconspiracy to commit unlawful acts may also bepunished, even if communications are the strongestindicators that a conspiracy exists.141 Similarly, com-munications regarding criminal conduct may consti-tute information essential to the prevention of, orevidence valuable to the investigation and prosecutionof, such conduct and may be obtained with appropri-ate legal process.142

Terrorist organizations have established web sites tocommunicate regarding fund transfers. The moststraightforward example of such communication is thelisting on sympathetic web sites of accounts to whichfunds for various terrorist organizations can betransferred. For instance, the site http://www.ummah.net/jihad/support provided accountnumbers for the Al Rashid Trust at Habib BankLimited, for Harkat ul Mujahideen at the Allied Bank

138 In practice, this will depend on how long the ISP through which the customer accessed the Internet maintains information andwhether it requires and confirms valid registration information.

139 See 18 U.S.C. § 1343.

140 See Brandenburg v. Ohio, 395 U.S. 444, 447 (1969) (holding that “the constitutional guarantees of free speech and free press do notpermit a State to forbid or proscribe advocacy of the use of force or of law violation except where such advocacy is directed to incitingor producing imminent lawless action and is likely to produce such action.”); Planned Parenthood of the Columbia/Williamette, Inc. v.American Coalition of Life Activists, 290 F.3d 1058, 1072 (9th Cir. 2002) (en banc) (“[W]hile advocating violence is protected,threatening a person with violence is not.”).

141See Wisconsin v. Mitchell, 508 U.S. 476, 489 (1993) (noting that “[t]he First Amendment . . . does not prohibit the evidentiary use ofspeech to establish the elements of a crime or to prove motive or intent.”).

142 See supra note 72.

Page 81: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy78 Appendix H

of Pakistan, and for Lashker Taiba at Faisal BankLimited.

Many of the terrorists and terrorist organizationsindicted or designated by the United States havecommunicated via e-mail. For instance, the indict-ment of four members of the Islamic Group allegesthat computers were used “to transmit, pass anddisseminate messages, communications and informa-tion between and among IG leaders and members inthe United States and elsewhere around the world.”143

Similarly, six individuals indicted in 2002 in Oregonallegedly communicated via e-mail regarding theirefforts to travel to Afghanistan to aid al-Qaeda and theTaliban in their fight against the United States.144

Mukhtar al-Bakri, indicted in 2002 for training withal-Qaeda to wage war against the United States,allegedly e-mailed with co-conspirators to discuss andplan acts of terrorism.145 Finally, four members of aColombian terrorist organization indicted in Novem-ber 2002, allegedly used e-mail to broker a guns-for-drugs deal.146

Terrorists may also pass PIN numbers, account pass-words, or transfer instructions by e-mail, secure websites, or chat rooms. Increasingly, value transferthrough hawala, the traditional alternative remittancesystem that has provided value transfer to the peopleof the Middle and Far East for centuries, relies on e-

mail communications between hawaladars around theworld.147 Although the vast majority of hawala trans-fers are legitimate (it is estimated that there are tens ofmillions of dollars transferred through hawala annu-ally), experts believe that much of al Qaeda’s funds forSeptember 11, 2001 transferred through hawalas inDubai and that terrorist organizations continue to usehawala to transfer funds.148 Hawala provides a cheap,efficient, less well regulated means of moving money,particularly in and out of countries in the Far andMiddle East.149 The advent of e-mail as a preferredmeans of communication between hawaladars has atleast one benefit – for the first time in the centuries-long history of this alternative remittance system, e-mail creates a record of transactions that law enforce-ment can obtain (or even intercept) to aid in aninvestigation.

Terrorists may be using sophisticated means of elec-tronic communication to conceal their efforts to raiseand move funds and to plan acts of violence. Onecommon method is to provide the username andpassword of an e-mail account to all the members of aconspiracy. One member drafts, but does not send, ane-mail message. He then logs off (exits the e-mailaccount). His co-conspirators can log on from any-where in the world, read the draft, and then delete it.Because the draft was never sent, the ISP does notretain a copy of it and there is no record of it travers-

143 See Indictment, United States v. Sattar, No. 02-CRIM-395 (S.D.N.Y Apr. 9, 2002), available at http://news.findlaw.com/hdocs/docs/terrorism/ussattar040902ind.pdf.

144 See Indictment, United States v. Battle, No. CR 02-399 HA (D.Or.) Oct. 2, 2002), available at http://news.findlaw.com/hdocs/docs/terrorism/usbattle100302ind.pdf.

145 See Criminal Complaint, United States v. Al-Bakri, No. 02-M-108 (W.D.N.Y. Sept. 13, 2002), available at http://news.findlaw.com/hdocs/docs/terrorism/usal-bakri091302cmp.pdf.

146 See Criminal Complaint, United States v. Varela, No. H-02-1008M (S.D.Tex.) Nov. 1, 2002), available at http://news.findlaw.com/hdocs/docs/terrorism/usromero110102cmp.pdf.

147See Patrick M. Jost & Harjit Singh Sandhu, The Hawala Alternative Remittance System and its Role in Money Laundering (noting that forcommunication between hawaladars “e-mail is becoming more and more common”); Christopher Blevins, U.S. Dep’t of Treasury,Hawala: Issues & Policy Implications (2002) (same).

148 See Karen DeYoung & Douglas Farah, Infighting Slows Hunt for Hidden Al Qaida Assets; Funds Put in Untraceable Commodities, WASH.POST, June 18, 2002, at A1.

149 The USA PATRIOT Act amended the definition of “financial institution” to include informal value transfer systems such as hawala. See31 U.S.C. § 5312(2)(R). As a result, hawalas operating in the United States must now establish an anti-money laundering program,register with FinCEN, and comply with record keeping and reporting requirements. Several foreign countries, such as United ArabEmirates and Saudi Arabia, now regulate hawala transactions, while other countries, such as India and Pakistan, have banned thepractice of hawala altogether.

Page 82: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy 79Appendix H

ing the Internet – it never went anywhere, its recipientscame to it.

Another common method involves providing basicelectronic mail services in conjunction with a terrorist-sympathizer web site. Imagine a secure web sitewww.jihad.com The web site supports basic e-mailservices. An e-mail can be sent from one of its e-mailaccounts (e.g., [email protected]) to another (e.g.,[email protected]) without ever leaving jihad.com’sservers. It cannot, therefore, be intercepted or tracked.In fact, United States intelligence and law enforcementwill never know about it unless they obtain access tojihad.com’s servers or records. In addition, terroristsmay use encryption and steganography to conceal thecontent of electronic communications regardingraising and moving funds.

1. Prevention

One can no more prevent terrorists from communicat-ing via the Internet than one can prevent them fromcommunicating via telephone or regular mail. Aregulation requiring ISPs to obtain and confirm validsubscriber information would discourage some suchcommunications (and much of the other illicit con-duct discussed in this Report). Such a measure would,however, deprive Internet users of a certain degree ofprivacy and anonymity and impose significant busi-ness costs upon ISPs. As a result of the delicate balancebetween law enforcement’s need for valid identifyinginformation and computer users’ right to privacy, noconsensus for such regulation has developed in theinternational community. Even if the United Statesestablished such a regulatory regime, therefore, terror-ists could simply use mail servers based in othercountries. Moreover, as noted above, a terrorist groupcould easily establish basic mail service capabilities onits own web site. In short, such regulation would limitthe Internet’s use as a global communication media, aforum for international commerce, and an educationalresource without effectively preventing terrorists fromcommunicating over the Internet.

2. Investigation

As noted in Section II.C.2, above, capacity to investi-gate terrorist communications over the Internet hasincreased appreciably over the last several years.

Amendments to procedural and substantive laws,increased cooperation and capacity-building in theinternational community, and the development byfederal, state, and local law enforcement of computercrime expertise, all have combined to enhance ourefforts to investigate the use of the Internet byterrorists.

3. Prosecution

Before pursuing prosecution, law enforcement mustagain decide whether the benefit of prosecutionoutweighs the benefit of the information that might begathered if prosecution is delayed and the terrorists areallowed to continue communicating so that lawenforcement can continue to gather information.Once the decision has been made to prosecute indi-viduals engaged in electronic communications as ameans of soliciting material support for terroristorganizations, the individuals or organizations en-gaged in the communications may be prosecutedunder the statutes prohibiting such solicitations,discussed in Section II.A.3, above.

IV. CONCLUSION

The Internet is undeniably one of the most significanttechnological advances of our era. Its prevalence andaccessibility have revolutionized the ability of indi-viduals and organizations all over the world to com-municate, share and access information, and conducttransactions virtually instantaneously. It has createdan efficient, borderless marketplace for the exchange ofcommunications and ideas and for the transacting ofbusiness and financial affairs. This marketplace hasbeen fertile ground for innovation, providing aninfrastructure within which existing businesses canoffer services with greater efficiency and convenienceand new businesses can capitalize on the remarkableattributes of this new global network.

With this technological advance and these new oppor-tunities, however, come new challenges. The veryattributes that make the Internet an invaluable com-munication, educational, and business resource makeit susceptible to abuse by criminals and terrorists. Thechallenge, then, for legislators and for regulatory andlaw enforcement agencies, is to preserve the attributesthat make the Internet such a remarkable innovation –

Page 83: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy80 Appendix H

the anonymity and privacy it offers users, theliberation from geographic boundaries, the speed-of-light efficiency, and the rarity of regulatory constraints– while at the same time making it less susceptible tocriminal abuse.

The full weight of this challenge is implicated in theeffort to curtail terrorist use of the Internet to raiseand move funds. Terrorists and terrorist organizationstake advantage of all of the Internet’s uses (for com-municating, for accessing and sharing information,and for transacting business) and avail themselves ofall of its cardinal attributes (the anonymity achievedthrough false identifiers and through communicationsprotected by encryption and steganography, thedisregard of geopolitical boundaries, the speed oftransactions and communications, and the paucity ofregulations). They raise funds on the Internet bydirect solicitation, by exploiting facially legitimateonline charities and e-commerce companies, and bygarnering the proceeds of online criminality. Theymove these funds through any of the panoply oftraditional and alternative banking and other financialservices offered online. And they use the Internet’scommunication applications to facilitate the raisingand moving of funds. As Internet communication andbusiness technologies evolve, so too will terrorists’ useof the Internet to raise and move funds.

Several future steps in addressing the threat of onlineterrorist financing suggest themselves. Technological,investigative, and legal experts drawn from the regula-tory, law enforcement, and intelligence communitiesshould continue to take up legal and policy issuesassociated with terrorist abuse of the Internet to raiseand move funds; coordinate efforts to prevent, investi-gate, and prosecute such abuse; and address newtechnological challenges as they arise. Acting inconcert, such experts might also develop a uniformstrategy to address existing problems, such as directsolicitation sites and the abuse of charity sites, andcontinue to encourage international outreach, inconjunction with existing bilateral cooperation andmultilateral bodies, to our foreign partners in theeffort to curb online terrorist fund raising and transfer.And they should continue to work with industryrepresentatives to foster public-private cooperation ineffectively preventing, investigating, and prosecutingterrorist use of the Internet to raise and move funds.

Page 84: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy 81Appendix I

Appendix IMoney Laundering Defendants

Sentenced in FY 2001 - Highlights

In FY 2001, there were 951 defendants convicted ofmoney laundering as the primary guideline of convic-tion150 representing nearly 1.6% of all defendantssentenced in the United States. Another 243 defen-dants also were convicted of money launderingoffenses on other counts, totaling 1,194 defendantswho were convicted of money laundering under anyguideline of conviction.151 For these additionaldefendants, other offenses, mostly drug trafficking andfraud offenses, yielded the highest sentence.

In 2001, 615 or 65% of all money laundering defen-dants were convicted of laundering monetary instru-ments (2S1.1); 121 (13%) were convicted of engagingin monetary transactions with property derived fromspecified unlawful activity (2S1.2); and 215 (22%)were convicted of structuring transactions to evadereporting requirements, failure to report cash ormonetary transactions, failure to file currency andmonetary instrument report, or knowingly filing falsereports (2S1.3).

For the purpose of analyzing sentencing factors, thisanalysis focuses on the 736 defendants who weresentenced under 2S1.1 (laundering monetary instru-ments) and 2S1.2 (engaging in monetary transactionswith property derived from specified unlawful activ-ity) as primary guidelines of conviction. The attachedtables present summaries for defendants sentencedunder each of the three money laundering guidelinesseparately, as well as for the sum of defendants sen-tenced under the two main money laundering guide-lines (2S1.1 and 2S1.2).

Characteristics and District Distribution (2S1.1 and2S1.2)

About 46% (340) of money laundering defendantssentenced in FY 2001 were White, 30% (220) were

Hispanic and 19% (141) were Black. The majority,78% or 571 defendants, were U.S. citizens, 62% (455)were over 35 years of age, 76% (558) were high schoolor college graduates, and 80% (591) were male.

The five districts with the greatest number of moneylaundering defendants sentenced in FY 2001 collec-tively accounted for nearly a third of all moneylaundering defendants sentenced that year. Thesedistricts were: Florida Southern (55), New YorkSouthern (47), California Central (46), Puerto Rico(40), and Florida Northern (37).

Sentencing (2S1.1 and 2S1.2)

In FY 2001, 90% (660) of all money launderingdefendants pleaded guilty, and about 89% (653)received prison sentences – 89% of defendants sen-tenced under 2S1.1, 90% of 2S1.2, and 41% of 2S1.3.The greatest number, 442 or 60%, of money launder-ing defendants received one to less than five years ofimprisonment and about 21% (151) received five toless than ten years of imprisonment. The majority,(59%) of defendants sentenced under 2S1.1 and 68%of those sentenced under 2S1.2 received one to lessthan five years of imprisonment.

The average length of imprisonment in FY 2001 was52 months for defendants who received imprisonment,up from 50 months in 1997, and 46 months for allmoney laundering defendants. Substantial differencesin the average length of imprisonment exist betweendefendants who received imprisonment under thethree money laundering guidelines. On average,defendants sentenced under 2S1.1 received 54 monthsof imprisonment, defendants sentenced under 2S1.2received 41 months, and defendants sentenced under2S1.3 received 10 months.

150 Defendants for whom money laundering convictions yielded the highest sentence under 2S1.1, 2S1.2, and 2S1.3.

151 Defendants for whom money laundering convictions contributed to the sentence.

Page 85: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy82 Appendix I

Approximately 56% (369) of all money launderingdefendants were sentenced within the recommendedsentencing guideline range, 33% (216) receiveddownward departures for providing substantialassistance to the government, and 11% (70) receiveddownward departures for other reasons. The mostfrequently cited reasons for departures were: theexistence of general aggravating or mitigating circum-stances, criminal history level over-represents thedefendant’s involvement, and family ties and responsi-bilities. The majority of money laundering defendantswere sentenced at the minimum guideline range.

Aggravating/Mitigating Factors (2S1.1 and 2S1.2)

About 33% (204) of defendants sentenced under 2S1.1were convicted of laundering $100,000 or less, 43%(266) of over $100,000 to $1 million, 19% (116) ofover $1 million to $10 million, and 5% (29) of offensesexceeding $10 million.

About 28% (34) of defendants sentenced under 2S1.2were convicted of transactions involving $100,000 orless, 42% (51) of over $100,000 to $1 million, 20%(24) of over $1 million to $10 million, and 10% (12) oftransactions involving over $10 million.

About 42% (90) of defendants sentenced under 2S1.3were convicted of offenses involving $70,000 or less,46% (99) of over $70,000 to $350,000, 8% (18) of over$350,000 to $1.5 million, and 4% (8) of over $1.5million.

The majority of defendants sentenced under 2S1.1,47% or 288 defendants, and 17% or 21 defendantssentenced under 2S1.2 knew or believed that the fundswere the proceeds of an unlawful activity involving themanufacturing, importation, or distribution ofnarcotics or other controlled substances. About 41%(87) of defendants sentenced under 2S1.3 and 74%(89) of defendants sentenced under 2S1.2 knew orbelieved that the funds were proceeds of unlawfulactivity or were intended to promote unlawful activity.

About 20% (125) of defendants sentenced under2S1.1, 17% (21) under 2S1.2, and 5% (10) under 2S1.3received aggravating role adjustments for their partici-pation in the offense. About 58 (9%) defendantssentenced under 2S1.1, 9 under 2S1.2, and 2 under

2S1.3 received four additional sentencing levels forbeing a leader or organizer of five or more partici-pants. About 29 (5%) defendants sentenced under2S1.1, 5 under 2S1.2, and 2 under 2S1.3 received threeadditional sentencing levels for being a manager of fiveor more participants. About 38 (6%) defendantssentenced under 2S1.1, 7 under 2S1.2, and 6 under2S1.3 received two additional sentencing levels forbeing a leader, organizer, manager, or supervisor.

Small percentages of money laundering defendants(4% under 2S1.1, 13% under 2S1.2, and 1% under2S1.3) received two additional sentencing levels forabusing a position of trust, while 28 defendants hadadditional criminal history points applied for commit-ting the offense less than two years after their releasefrom prison.

About 75% (550) of all money laundering defendantssentenced in 2001 had criminal history category I. Themajority (83% or 609) of all money launderingdefendants received reductions for acceptance ofresponsibility – 79% (579) received a three-levelreduction and 4% (30) received a two-level reduction.About 16% (116) of all money laundering defendantssentenced in 2001 received reductions ranging fromtwo to four levels for their minor/minimal participa-tion the offense.

Page 86: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy 83Appendix J

JUSTICE TREASURY TOTAL

FY89 - FY99 FY90 - FY99 SHARING

COUNTRY AS OF 4/30/99 AS OF 9/30/99 FY89-9/99

Argentina $162,852 $0 $162,852

Aruba $0 $161,702 $161,702

Bahamas $165,833 $342,000 $507,833

British Virgin Islands $2,437,886 $0 $2,437,886

Canada $2,402,844 $2,277,745 $4,680,589

Cayman Islands $1,686,326 $682,980 $2,369,326

Colombia $2,473,385 $0 $2,473,385

Costa Rica $733,019 $0 $733,019

Ecuador $4,264,700 $0 $4,264,700

Egypt $51,240 $999,187 $1,050,427

France $0 $2,000,000 $2,000,000

Guatemala $816,176 $0 $816,176

Guernsey $297,713 $145,045 $442,758

Honduras $0 $139,720 $139,720

Hungary $8,415 $0 $8,415

Isle of Man $335,862 $0 $335,862

Israel $69,725 $0 $69,725

Jersey $0 $1,049,991 $1,049,991

Liechtenstein $20,500 $0 $20,500

Luxembourg $19,104,348 $0 $19,104,348

Mexico $0 $6,030,750 $6,030,750

Netherlands Antilles $22,500 $0 $22,500

Nicaragua $0 $58,586 $58,586

Panama $0 $39,971 $39,971

Paraguay $70,000 $0 $70,000

Appendix JInternational Asset Forfeiture Sharing

Payments To Other Countries

Page 87: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy84 Appendix J

Treasury Forfeiture FundEquitable Sharing To Foreign Countries

Fiscal Years 1995-2003

Country FY 1995 FY 1996 FY 1997 FY 1998 FY 1999 FY 2000 FY 2001 FY 2002 FY 2003 Totals

Aruba $36,450 $0 $32,550 $0 $0 $0 $0 $0 $69,000

Australia $44,958 $44,958

Bahamas $342,000 $0 $0 $0 $0 $0 $0 $0 $342,000

Cayman Islands $0 $0 $0 $682,980 $0 $2,680,803 $14,324 $9,061 $3,387,168

Canada $67,260 $21,725 $130,525 $8,394 $42,119 $241,446 $640,778 $686,863 $706,909 $2,662,678

China $0 $0 $0 $0 $0 $0 $0 $216,555 $216,555

Dominican Republic $0 $0 $0 $0 $0 $63,885 $0 $0 $63,885

Egypt $0 $0 $0 $0 $999,187 $0 $0 $0 $999,187

Guernsey $0 $0 $145,045 $0 $0 $0 $0 $0 $145,045

Honduras $0 $0 $0 $0 $139,720 $0 $0 $0 $139,720

Isle of Man $0 $0 $0 $0 $0 $0 $0 $300,802 $300,802

Jersey $0 $0 $1,049,991 $0 $0 $0 $0 $0 $1,049,991

Mexico $6,030,000 $0 $0 $0 $0 $0 $0 $843,388 $6,873,388

Netherlands $0 $0 $0 $0 $0 $1,717,213 $144,220 $64,407 $1,925,840

Nicaragua $0 $0 $0 $0 $0 $0 $0 $0 $58,587

Panama $0 $0 $0 $0 $0 $0 $0 $0 $39,971

Portugal $0 $0 $0 $0 $0 $85,840 $0 $0 $85,840

Qater $60,000 $0 $0 $0 $0 $0 $0 $0 $60,000

Switzerland $79,992 $335,408 $0 $37,669 $938,576 $903,934 $0 $0 $2,295,579

United Kingdom $670,049 $145,754 $17,784 $449,567 $739,225 $1,019,499 $279,443 $0 $3,321,321

TOTALS $7,285,751 $502,887 $1,375,895 $1,178,610 $2,858,827 $6,712,620 $1,078,765 $2,121,077 $751,867 $24,081,515

Treasury Forfeiture FundEquitable Sharing To Foreign Countries

Fiscal Years 1990-1994

Country FY 1990 FY 1991 FY 1992 FY 1993 FY 1994 TOTALS

Aruba $0 $0 $0 $92,702 $0 $92,702Canada $1,500,000 $141,063 $186,177 $56,566 $116,658 $2,000,464France $0 $2,000,000 $0 $0 $0 $2,000,000Mexico $750 $0 $0 $0 $0 $750Netherlands $0 $0 $0 $0 $0 0Nicaragua $0 $0 $0 $0 $58,586 $58,586Panama $0 $0 $0 $0 $39,971 $39,971Trinidad $0 $0 $40,330 $0 $0 $40,330United Kingdom $0 $3,000,000 $0 $0 $0 $3,000,000TOTALS $1,500,750 $5,141,063 $226,506 $149,269 $215,216 $7,232,803

Page 88: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy 85Appendix J

Department of Justice Transfers to Foreign CountriesSummary of International Asset Sharing

Name of Case Recipient Amount of Transferor Investigation Country Transfer Date

Operation Polar Cap Canada $1,000,000.00 01-Aug-89(S.D. Florida) DEA Switzerland $1,000,000.00 01-Aug-8921 U.S.C. 881

In re Isle of Man United Kingdom $2,486,637.63 04-Dec-91(S.D. Florida)21 U.S.C. 881

US v. $2,421,327.43 Canada $807,109.00 11-Dec-91(N.D. Florida)21 U.S.C. 881

In re Isle of Man B.V.I. $640,730.45 20-Dec-91(S.D. Florida) DEA B.V.I. $1,797,155.18 03-Apr-92(D. Massachusetts)

Transfer of $1,173,229 Cayman Islands $1,173,229.00 13-Mar-92to the Cayman IslandsW.D. La., S.D. Tex.M.D. Pa., S.D. Ind.D. Me., DEA - E.D.N.C.21 U.S.C. 881

Jose Rodriguez Gacha Switzerland $2,485,673.00 24-Mar-92(M.D. Florida) Colombia $900,000.00 25-Feb-9221 U.S.C. 881 Colombia $1,573,385.28 13-Nov-92

Switzerland $1,421,667.20 20-Nov-96 (91-646-Ci v-J-10) Isle of Man $335,862.39 01-Jun-96

Luxembourg $18,104,348.00 23-May-97Res’d for Colo. $12,279,348 Colombia $5,825,000.00 16-Dec-99(originally $18,104,348.00)

US v. $ 43 Million Venezuela $1,384,845.00 24-Mar-92(D. of Puerto Rico)21 U.S.C. 881

US v. Taboada Switzerland $93,751.00 10-Apr-92(D. South Carolina) FBI21 U.S.C. 881

Page 89: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy86 Appendix J

Name of Case Recipient Amount of Transferor Investigation Country Transfer Date

In re Seizure of $100,000 Paraguay $70,000.00 25-Jun-92(S.D. Texas) DEA21 U.S.C. 881

SDNY and 12 DEA Guatemala $227,147.94 23-Jul-92Admin CasesDEA 1 - C.D. Cal.DEA 3 - E.D.N.Y.DEA 8 - E.D. La.21 U.S.C. 881

US v. $279,895 Guatemala $139,947.50 23-Jul-92US v. $733,988 Guatemala $146,797.60 23-Jul-92(M.D. Florida)21 U.S.C. 881

Vessel named “Aguja” Costa Rica $120,000.00 17-Aug-92(S.D. Florida) DEA21 U.S.C. 881

US v. $1,007,611 Guatemala $302,283.00 08-Oct-92(W.D. Texas)21 U.S.C. 881

US v. $53,964 in Canada $16,445.88 27-Aug-92Canadian Currency(W.D. New York)21 U.S.C. 881(a)(1)(6)

In re Seizure of Argentina $162,851.50 26-May-93$325,703, DEANo. 101156(S.D. Florida) DEA

In re Seizure of Egypt $51,240.00 check mailed$39,480 and $63,000 10-Aug-93DEA Seizure Nos.103598, 103599

US v. Luytjes Switzerland $1,087,344.50 09-Sep-93(M.D. Pennsylvania)21 U.S.C. 881

Page 90: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy 87Appendix J

Name of Case Recipient Amount of Transferor Investigation Country Transfer Date

US v. Newton/Datz Switzerland $8,183,626.10 01-Oct-93and Bloomfield Switzerland $2,958,492.50 23-Nov-93(E.D. New York)21 U.S.C. 881

In re Seizures Bahamas $109,510.00 08-Oct-93Nos. 120458 and120461(S.D. Florida) DEA21 U.S.C. 881

In re Seizure of $11,220 Hungary $8,415.40 24-Feb-94DEA Case No.GZ 90-0048(US v Bacha, E.D. Va.)21 U.S.C. 881

US v. Fernandez Switzerland $606,254.90 07-Mar-94(M.D. Florida)21 U.S.C. 881

US v. McCarthy Canada $64,324.96 15-Mar-94(N.D. Indiana)21 U.S.C. 881

US v. Michael LeBoss Liechtenstein $20,500.00 01-Apr-97(W.D. Washington) Check re-issued21 U.S.C. 881

US v. Kubosh Cayman Islands $422,387.87 19-Apr-94(N.D. Texas)21 U.S.C. 881

In re $47,500 (Roizis) Romania $23,700.00 15-Jul-94(S.D. N.Y.) DEA

U.S. v. Hugo Reyes Torres Switzerland $3,833,092.02 19-Sep-94Funds Ecuador $3,833,092.02 13-Oct-95 21 U.S.C. 881 Ecuador $330,316.96 27-Jun-9418 U.S.C. 981

Page 91: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy88 Appendix J

Name of Case Recipient Amount of Transferor Investigation Country Transfer Date

US v. Hickey Guernsey $297,713.00 25-Oct-94(N.D. Indiana)S CR-86-91 (01)

Fair Rose of Sharon Netherlands Antilles $22,500.00 01-Nov-94DEA Case No.I991X019

Seizure of $150,120 Bahamas $56,323.00 14-Nov-94from Darrell ChambersDEA Case No. I7930033(E.D. Michigan)

US v. $2,146,084.56 Switzerland $1,073,042.00 23-Dec-94(M.D. Florida)21 U.S.C. 881

Operation Softshoe Canada $27,907.77 21-Jun-95Administrative Forfeitures Canada $19,878.66 17-Jun-96FBI - N.D.Cal. Canada $10,150.60 30-May-97

David Shmuel Israel $34,769.55 27-Jun-95(D. Mass., N.D. N.Y.)

Ancaleto Case Canada $13,509.94 26-Oct-95DEA Case No. MK84Z004(D. Col.)

Alarcon Mengual Case Switzerland $679,696.62 26-Oct-95(N.D. Florida) Canada $135,919.12 24-Jan-96

Switzerland $1,365,409.82 18-Nov-96Canada $136,526.58 28-May-98

US v. Herberto Rodriguez Switzerland $1,417,786.26 30-Nov-95(N.D. Florida) Canada $51,302.11 05-Jun-96

The Ayala Brothers Ecuador $51,345.00 10-May-96DEA case No G1-93-0356S.D. Fla.

Santa Cruz Londono United Kingdom $523,392.44 15-Dec-95(E.D. N.Y.) Luxembourg $1,000,000.00 08-Mar-96

Page 92: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy 89Appendix J

Name of Case Recipient Amount of Transferor Investigation Country Transfer Date

U.S. v. Michael J.P. Green United Kingdom $529,507.96 17-Jul-96S.D. Fla., C.D. Cal.

U.S. v. Real Property United Kingdom $463,596.76 17-Jul-96Five Civil Forfeiture cases (M.D. Fla.)Derrick Walpole

U.S. v. Midvale Cayman Islands $12,470.87 31-Oct-96Development Corp. et al. (W.D. Wa.) 18 U.S.C. 981

U.S. v. $33,967.00 in United Kingdom $8,940.81 03-Dec-96United States Currency (C.D. Cal.) USPS case

In re Seizure of $460,000 United Kingdom $68,922.15 06-May-97from Narko TettegahDEA Case #C1-95-0113S.D. N.Y.

U.S. v. All monies, etc. in United Kingdom $175,316.22 29-Sep-97Swiss Bank Corp. London Cayman Islands $58,438.74 13-May-98 (E.D. Texas) Martinez

US v 220 NW 132 Ave. Miami Canada $74,518.04 16-Dec-97Tellechea, S.D. Fla.

Jose Roberto Martinez Cayman Islands $19,800.00 13-May-98DEA Administrative case (S.D. Fla.)

M/V Pegasus Ecuador $49,946.00 06-Apr-98DEA Administrative caseNo. CT 92Z001 (S.D.N.Y.)

U.S. v. Montalbo, et al., Costa Rica $428,920.50 23-Jun-98Case No. 95-0142-Cr. and

U.S. v. Premises and Real Israel $34,954.52 10-Aug-98Property, etc. (Efraim)

Page 93: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy90 Appendix J

Name of Case Recipient Amount of Transferor Investigation Country Transfer Date

US v. Stephen Lloyd Chula Costa Rica $184,098.50 14-Oct-98Cr. Case No. 94-0669-BDEA (S.D. California)

Jorge Luis Cantieri Canada $14,338.15 03-Dec-98 FBI Admin. forfeitureCase No. 3010-84-F-139

Ives Charest Canada $24,887.50 03-Dec-98DEA Admin. forfeitureCase No. C7970084

US v. Julio Nasser David, et al. Switzerland $89,016,022.00 18-Dec-98Case No. 94-131-CR (SDFL) Switzerland $4,554,086.00 23-Dec-99

Switzerland $245,464.18 23-Oct-00Switzerland $1,499,980.00 18-Apr-02Switzerland $2,379,330.00 12-July-02

Daniel BergerDEA Admin. forfeiture Switzerland $107,161.13 05-Feb-99Case No. GH960118 (CD. Cal)

Walter Furst Admin. Forfeiture Switzerland $10,630.43 05-Feb-99Case No. R1960625 (CD. Cal)

Farina (D.Col.)U.S v. $1,814,807.93 United Kingdom $181,466.89 03-Jun-99Case No. 97-S-1928 Hong Kong S.A.R. $907,403.00 21-Jun-00

Operation Dinero (N.D. Ga)U.S. v. $295,375,28 United Kingdom $229,517.39 03-Jun-99No. 1:94-CV-3340-ACU.S. v. $3,531,149.00 Anguilla $328,528.99 24-Aug-99No. 1:95-CV-0153-AC

Luz Mary Durango Ecuador $14,327.50 18-May-99DEA Admin. ForfeitureCase No. C1960051

Page 94: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy 91Appendix J

Name of Case Recipient Amount of Transferor Investigation Country Transfer Date

U.S. v. Midkiff Switzerland $226,447.88 24-Jul-00DEA and D of OregonDrug money laundering case

U.S. v. Haddad Canada $37,809.97 02-Aug-00DEA and SDTexasDrug trafficking

U.S. v. Esquivel Ecuador $14,850.00 22-Aug-00DEA/Admin Fft and SDFLCS Payment Drug trafficking

Phan Case/ DEA Admin Thailand $19,144.00 09-Nov-0021 U.S.C 881ND GA

U.S. v. All Funds, Securities, etc., Barbados $100,000.00 27-Dec-0018 U.S.C. § 981(i)Blair Down USPIS and W.D. Wa.

U.S. v. Barnette United Kingdom $612,500.00 28-Dec-0018 U.S.C. § 981(a)(1)(A)FBI and USAO MD Fla

Greenberg / DEA Admin Canada $89,129.62 05-Mar-01Seattle, WA and LA, CA21 U.S.C 88112,500 shared directly with RCMP

U.S. v. Fuqua Mobile Home Canada $31,653.89 22-Mar-01(Francine Corbeil-For. Bank Fraud)FBI and USAO SD Fla

Luis Cano/DEA/SDFLA Dominican Republic $1,139,399.77 02-Apr-0121 U.S.C. 881

US v. $393,892.66 (Op. Green Ice) Cayman Islands $146,874.34 11-May-01DEA and SD Cal 881 (e)

US v. Eric Howard Wells (N. Minn.) South Africa $11,044.57 22-May-01DEA Seizure Nos. 115499 and 186868

U.S. v. Frederick Taft et al. (E.D. PA) Canada $151,794.92 15-June-01

Page 95: Foreword - treasury.govtreasury.gov/resource-center/sanctions/ofac-enforcement/document… · 2003 National Money Laundering Strategy i Foreword

2003 National Money Laundering Strategy92 Appendix J

Name of Case Recipient Amount of Transferor Investigation Country Transfer Date

U.S. v. Jafar Rayhani Turkey $264,846.42 07-Feb-02(CV 95-8694-RMT andCV- 96-1595-RMT ) CDCA

US v. Gammella Canada $200,377.58 08-Mar-02(CR No. 96-083T) Dist. of RI

US v. Ned K. Schroeder Canada $7,704.36 08-Mar-02(No. 94-Cr-161) E.D. Wisc.

DEA Case No. I2-95-0080 (Henderson) Canada $14,334.00 08-Mar-02

U.S. v. M/V Bulk Princess Greece $2,267,959.05 03-July-02Case No. 00-7459-CIV (SDFL)

Wilhelm Koenig Luxembourg $686,842.66 17-Sept-02(Criminal No. 95-116 LH) Dist. NM

U.S. v. $155,750 in US Currency (Chochana) Switzerland $155,750.00 12-Sept-02Civil No. 3:02CV1690 (Dist. Conn.)

U.S. v. Richard Spence Canada $323,642.20 27-Dec-02Case No. 95 Cr.380 (SDNY) - DEA

DEA Case No. C1-97-0289 (Fischer) United Kingdom $29,761.72 14-Jan-03

US v. Claude Duboc (GCR 94-01009) Hong Kong SAR $2,898,755.42 11-June-03(N.D. Florida)

DEA Case No. G-5960172 (Melendez) Dominican Republic $10,000 Aug-03

TOTALS $181,727,532.85