首页    期刊浏览 2025年04月07日 星期一
登录注册

文章基本信息

  • 标题:Operational perspectives on anti-money-laundering management
  • 作者:Jee Meng Chen
  • 期刊名称:The RMA Journal
  • 印刷版ISSN:1531-0558
  • 出版年度:2003
  • 卷号:July-August 2003
  • 出版社:Risk Management Association

Operational perspectives on anti-money-laundering management

Jee Meng Chen

Rather than revisit the sine qua non elements of an anti-money-laundering program or propose a one-size-fits-all AML risk model, this article examines operational perspectives of managing money-laundering risk that are not commonly addressed in conventional AML literature. A mini case study is used to stimulate thought about lessons to be learned.

Money laundering--filtering illegal proceeds through the financial system to disguise their origin--is big business, accounting for 2-5% of the global gross domestic product. Today's players include bankers, brokers, lawyers, and accountants. They take advantage of the increasing complexity of financial services and integration of world financial markets through electronic interfaces to effect a maze that thwarts the tracing of illicit funds.

Be it a case of heightened regulations or a genuine concern for enterprise-wide risk management, the immediate response of most financial institutions has focused on formalizing anti-money-laundering (AML) policies and procedures. The standard drill includes detailed written policies and procedures for knowing the customer; escalated processing and resolution of inconsistent findings; staff awareness, training, and education; and realization of the importance of management support. The goals are to demonstrate compliance with regulatory and legislative guidelines as well as protect the bank. The problem that arises is a focus on form (procedural framework) rather than substance, which can result in a prescriptive AML framework that lacks the operational capabilities necessary in identifying, tracking, and reporting suspicious activities.

Case Study

D10, a small trading company purported to specialize in sourcing and reselling products to ultimate buyers, went to a banking branch for import letters of credit (LCs). Typical of trading companies, D10 had a very thin balance sheet. To provide assurance of performance, the owners agreed to partially cash collateralize the LCs (a cash deposit was calculated as a percentage of the LG amount). Like most credit proposals, D10's credit application was approved by local bank management. D10 was an active user of LCs and promptly paid off monies owed. With the company's proven repayment record, the bank gradually increased the LC limits to support increased demand for LG issuance. Sounds like a decent deal? Following a tip-off of alleged improper practices, an investigation revealed the following:

* D1O's appetite for LC utilization appeared unusually large for its size. The aggregate of LCs issued exceeded the bank's authorized approving limit and, in accordance with the bank's global credit policy, head office approval was needed for any subsequent increase in trade limits. To bypass this "cumbersome" requirement, D1O offered 100% cash deposit as lien for each LC issued that was over the limit. Further, the bank was authorized to uplift the cash deposit for subsequent payment to the exporter. As its position was fully secured, the bank allowed further LG issuance without seeking head office approval. The ability of DIO to fully cash collateralize its LGs, however, seemed uncharacteristic of conventional middleman operations. Where were D10's funds coming from? There was no evidence that the bank had exercised due diligence to ascertain the source of funds.

* D1O did not request issuance of back-to-back LCs. As such, the bank could not ascertain whether a genuine transaction existed, since a prime LO (export LC) was never lodged to support the issuance of the import LG.

* The type of goods imported varied. The bulk of D10's imports were chemicals, which did not tie in with the owners' expertise.

* Where inward funds were received in favor of D10, the company instructed the bank to retransfer the monies to third-party companies, purportedly as intercompany loans. The bank did not question the nature of these inward remittances or verify the purpose of the outward transfers on the argument that these were the client's monies.

* Before a full-fledged investigation could be carried out on the alleged laundering activities, the account officer left the bank. Not surprisingly, D10's relationship with the bank ended abruptly as well. What AML management perspectives could bank practitioners draw from this case study?

Not Just High-Risk Financial Activities

Some banks focus their surveillance on certain financial activities, such as private banking, deposits, over-the-counter retail remittance services, and securities brokerage. These are considered high-risk activities because of their vulnerability as money-laundering conduits. For instance, it was reported in the "Minority Staff Report for Permanent Subcommittee on Investigations Hearing on Private Banking and Money Laundering"1 that private banking would continue to be used by those intent on laundering money. Indeed, the conventional view presumes that high-risk financial activities invariably increase a bank's exposure to money laundering.

While monitoring high-risk activities appears logical from a risk-focused perspective, it has inherent risks. Consider, for example:

* If a bank were to focus solely on high-risk activities, other activities might inevitably be excluded from monitoring. This problem is accentuated in a situation where the compliance officer or designated money-laundering reporting officer (MLRO) has other operational priorities. As such, the bank might not be alerted if "non-high-risk" financial products were being used to launder funds.

* Some banks do not place AML monitoring as a top priority. These institutions perceive their laundering risk exposure as insignificant because they neither engage in high-risk activities, such as wealth management, nor do they entertain walk-in customers without proper- identification and/or sufficient referrals. Such an assumption disregards the possibility that laundering can arise through a range of financial products. Prevailing AML literature places such significant emphasis on money-laundering risk in relation to high-risk activities (e.g., private banking and correspondent banking) that other financial activities are not examined.

Although the case study did not conclude whether monies were actually laundered through the bank's trade-services platform, it highlighted the vulnerabilities of the banking system. Trade-financing services may provide the right tool for laundering in an environment where sound controls and active due diligence are lacking. To an unsuspecting bank practitioner, monies could be remitted readily from one country to another under the guise of legitimate business activities, say, payments to suppliers. This potential loophole is exacerbated because banks are not required, under the Uniform Customs and Practices2 framework, to ascertain the existence of goods. Documentary credit compliance is the key in international trade financing.

Given that high-risk financial activities attract attention from bank practitioners and supervisors alike, launderers are moving away from such activities. Methods used to launder funds have become more sophisticated, and the range of financial services being targeted has expanded. As such, an obsessive focus on monitoring high-risk activities does not necessarily ensure adequate oversight of laundering issues. After all, what constitutes "high risk"? Perhaps, as an alternative to differentiating low-risk from high-risk activities, bank practitioners should divert their attention toward understanding how laundering activities pass through the banking system.

Managing Risk Entry Points

What controls could mitigate a bank's exposure to laundering risk? Would the answer lie in current AML literature, where best practices on client acceptance criteria, et al., have been discussed at length? Before considering which controls are applicable and designing them, it is imperative to conduct an enterprise-wide analysis of the business processes with a view to understanding how laundering risk arises or where laundering risk entry points occur.

Concept of risk entry points. Risk-point analysis considers risk in two dimensions-- entry and exit points. A suspicious activity could enter the bank through the front line--for example, a customer requests to open a deposit account urgently with minimal verification--or through such back-end processes as an unusually large inward remittance in favor of a customer. Generally, risk entry points permeate the organization from front-office to back-office processes. In an ideal control environment, suspicious activities are isolated and no further processing is allowed, pending investigation and satisfactory resolution. In cases where the bank does not have concrete evidence of laundering activities, the transaction might be processed but subsequent activities would be closely monitored. In the absence of sound operational controls and/or inadequate surveillance, however, the suspicious activity is not detected and exits from the bank's monitoring system. The risk entry point concept is illustrated in Figure 1.

Suspicious inward funds transfers were received in D10's favor (entry point). If controls were in place, the bank would have carried out the necessary investigations. However, as illustrated in the case study, the monies were subsequently remitted out to third parties (exit point) without further queries, reflecting the absence of requisite controls.

Risk-entry-point analysis goes beyond a risk identification exercise, as it facilitates proactive risk management by addressing fundamental questions, including:

* Where are the likely sources for laundering activities?

* What controls are currently in place to identify suspicious activities?

* Under what circumstances would a suspicious transaction evade detection?

So, apart from understanding how laundering risk exposure arises, the bank needs to review the robustness of its business processes and control framework.

Designing controls around risk entry points. Operational controls against money laundering are developed on the basis of identified risk entry points. It is wrong, however, to assume that risk entry points are restricted to business processes. Two other critical elements, people risk and information technology risk, should be incorporated into AML controls in the developing of a holistic monitoring system. For instance, the capability of information systems in churning exception reports based on predefined or ad hoc parameters would facilitate transactional monitoring and pattern analysis. Table 1 illustrates a risk-entry-point framework that links the risk management strategies to the risk entry points identified.

Benchmarking Process

As the length of the bank-client relationship increases overtime, relationship managers tend to focus on the client's profitability more than the "know your customer" requirement. After all, what can go wrong with an established client? And isn't growth in the client's business a good sign? That being true, why should the bank be unnecessarily alarmed over the client's profitability?

As illustrated in the case study, what appears to be a high-growth trading firm disguises questionable business activities. The prudent banker will thoroughly review every angle. That said, how does one draw the line between normal and unusual activities? AML surveillance is not a witch-hunting game, and the effectiveness of an AML program hinges on the bank's operational capability in weeding out unusual activities. In this respect, benchmarking may serve as an effective AML surveillance tool.

Understanding benchmarking. Benchmarking refers to the generic process in which a firm adapts and establishes its performance standards against best practices and/or predefined performance criteria with a view to improving its performance. In the context of AML surveillance, benchmarks serve as warning indicators. When a transaction deviates from a benchmark, it should be treated as an anomaly and investigated. It is important to understand that the benchmarking model cannot be applied universally across institutions because banks differ not only in size but in scope of business activities as well. How can banks apply the benchmarking process against potential laundering activities?

Benchmarking methodology. Table 2 illustrates a simplified benchmarking model. The first benchmarks--or performance indicators--(Column 2) to be identified are those that are relevant to the bank's core operational processes (Column 1), such as trade financing, corporate banking, deposits, securities, electronic funds transfer, etc. To facilitate comparison, benchmarks should be measurable and could be expressed in the form of revenues and/or costs. In practice, the benchmarks illustrated in Column 2 must be quantifiable. A hypothetical example might be that small and medium-sized companies in the wholesaling business with average annual sales of $20 million are unlikely to use import LCs with an aggregated notional value of $36 million from their primary financing bank. Therefore, an unusually high LC usage rate might warrant further investigation, say, into the client's business modus operandi. The benchmarks are institution specific and should be crafted to reflect the types of business activities, the vol ume of activities, and the client's profile.

Actual performance against benchmarks is compared in two dimensions--business performance focused (Column 3) and AML focused (Column 4). Each warrants investigation, though for different reasons, to determine whether the transaction concerned is related to potential money-laundering activities (Column 5). The benchmarking model facilitates timely detection and, thus, immediate review of suspicious activities. Further, it helps auditors and the MLRO to review potential suspicious transactions on a postmortem basis.

Conclusion

Regardless of the sophistication level of a bank's AML risk management system, bank management cannot afford complacency. Anti-money-laundering efforts are a continuous process, and such risk management initiatives as know-your-customer programs and suspicious transactions reporting capabilities should be periodically validated and enhanced. The spectrum of international money-laundering activities is diverse and its depth is akin to an iceberg. It's a strategic necessity, from legal and reputational risk management perspectives, for banks to review their AML programs to ensure they are addressing more than the tip of an iceberg.

Table 1

Identifying the Risk Entry Point


Risk Entry Points        Where to Focus?

People              Not limited to compliance
                    officers and/or internal audit
                    specialist. Includes front-
                    and back-office staff as well.




Business processes  Enterprise-wide.
                    Emphasis should be given to
                    operational processes identi-
                    fied as "high risk."





I.T. capability     Targeted at:
                    Isolating unusual trans-
                    actions.
                    The ability to generate
                    exception reports.



                      Identifying the Risk Entry
                                 Point

                        Reason(s) for
Risk Entry Points      Risk Occurrence

People              1. Inadequate training.
                    2. "Cultural" problem,
                       e.g., indifference.
                    3. Attempt to defraud.




Business processes  1. Policies and proce-
                       dures lagged behind
                       business environmen-
                       tal and changing regu-
                       latory requirements.
                    2. Inadequate under-
                       standing of opera-
                       tional lapses.

I.T. capability     1. Old paradigm focuses
                       on monitoring physical
                       cash transactions.
                    2. I.T. capability not suffi-
                       ciently harnessed to
                       analyze firm-wide
                       data.

                       Designing Controls

                        Risk Management
Risk Entry Points         Strategies

People              * Customize AML train-
                      ing.
                    * Inculcate firm-wide
                      AML culture.
                    * Ensure adequate
                      "four-eye" mecha-
                      nisms.

Business processes  * Enhance robustness of
                      business processes on
                      ongoing basis through
                      identification of issus
                      and problems.




I.T. capability     * Address current inade-
                      quacies in the firm's
                      I.T. capability to mee
                      AML requirements.

Table 2




Column 1               Column 2

Operational            Benchmarks/
Areas                  Performance Indicators

                       * Frequency of LCs issued
1. Trade Financing.      per client.
                       * Amount of issuance and
   Issuance of           handling fees earned per
   import LCs.           client.



2. Corporate Banking.  * Rate of delinquent loans
                         recovery.
   Management of
   delinquent loans.




                            Performance Analysis

Column 1               Column 3

Operational            Business-based
Areas                  Explanation

                       High fees earned indicate
1. Trade Financing.    profitability of client
                       relationship; low fees
   Issuance of         indicate the opposite.
   import LCs.



2. Corporate Banking.  Low write-offs and recovery
                       of delinquent loans indicate
   Management of       highly successful loan-
   delinquent loans.   recovery strategies.



                           AML-Based Surveillance
                            Performance Analysis

Column 1               Column 4

Operational            Laundering-based
Areas                  Explanation

                       Increased use of trade
1. Trade Financing.    lines must be reviewed,
                       especially if there is a
   Issuance of         sudden surge in LC issuance
   import LCs.         that appears to deviate
                       from the client's normal
                       business activity.

2. Corporate Banking.  Unexpected loan payoff
                       from an uncooperative
   Management of       delinquent client is unusual,
   delinquent loans.   especially if the client's
                       operation is strapped for
                       cash.

                          AML-Based Surveillance


Column 1               Column 5

Operational            Red Flags for
Areas                  Further Review

                       * LC notional amount is
1. Trade Financing.      unusually large.
                       * The exporters' countries.
   Issuance of         * Types of goods dealt in.
   import LCs.



2. Corporate Banking.  * Source of funds cannot be
                         sustantiated and is
   Management of         ambiguous.
   delinquent loans.

Notes

(1.) http://levin.senate.gov/issues/psireport2.htm

(2.) ICC Uniform Customs and Practice for Documentary Credits (UCP 500). According to Article 4: Documents v. Goods/Services/Performances, "In credit operations all parties concerned deal with documents, and not with goods, services and/or performances to which the documents may relate."

[c] 2003 by RMA. Chen Jee Meng, an auditor and freelance writer, currently lectures part-time at a local polytechnic in Singapore. The views expressed herein are the author's own, unless explicitly specified or apparent from the context. His organizaiton assumes no responsibility for the accuracy of the information. The concepts discussed in this article are meant as a guide for further deliberation. It does not purport to offer professional advice.

Contact Chen at learningresources2003@yahoo.com

COPYRIGHT 2003 The Risk Management Association
COPYRIGHT 2005 Gale Group

联系我们|关于我们|网站声明
国家哲学社会科学文献中心版权所有