RISK PROFILING OF MONEY LAUNDERING AND TERRORISM FUNDING - Practical Problems of Current Information Strategies

B. H. M. Custers

Abstract

In order to track money laundering and terrorist funding, banks have to create risk profiles of their clients. Banks that want to do business in the United States have to implement a worldwide Know Your Customer (KYC) program, partially based on the Patriot Act. Implementing a KYC policy, however, raises several problems and seems to be neither effective nor efficient in tracking money laundering and terrorist funding. Given problems regarding the identification of individuals, it is not too difficult for criminals and terrorists to avoid being detected by certain types of screening. In this contribution, the way risk profiling strategies are implemented in practice are discussed, including the problems this may raise.

References

  1. Anderson, R.J., 2001, Security Engineering; a guide to building dependable distributed systems. New York: John Wiley & Sons, Inc.
  2. Baker, S., Kuilwijk, K., Chang, W., and Mah, D., 2003, Anonymization, Data-Matching and Privacy: A Case Study. Washington DC: Steptoe & Johnson LLP, Attorneys at Law.
  3. BSA, 1970, US Banking Secrecy Act, 1970, <http://www.federalreserve.gov/boarddocs/supmanual /bsa/7-00bsaman.pdf>
  4. Bygrave, L.A., 2002, Data protection law; approaching its rationale, logic and limits, Information Law Series 10, The Hague, London, New York: Kluwer Law International.
  5. Comptrollers Handbook, 2000, Bank Secrecy Act/AntiMoney Laundering, Comptroller of the Currency, Administrator of National Banks, US Department of the Treasury.
  6. Custers, B.H.M., 2003, Effects of Unreliable Group Profiling by Means of Data Mining. In: G. Grieser, Y. Tanaka and A. Yamamoto (eds.) Lecture Notes in Artificial Intelligence, Proceedings of the 6th International Conference on Discovery Science (DS 2003) Sapporo, Japan. Berlin, Heidelberg, New York: Springer-Verlag, Vol. 2843, p. 290-295.
  7. Custers, B.H.M., 2004, The Power of Knowledge; Ethical, Legal and Technological Aspects of Data Mining and Group Profiling in Epidemiology, Tilburg: Wolf Legal Publishers.
  8. Custers, B.H.M., Risicoprofilering en identificatie van terreurfondsen, Banking Review, October 2006, p. 28- 33.
  9. Dutch Ministry of Justice, 2006, Snel en Secuur Toetsen; het alternatief voor de verklaring van geen bezwaar. Bijlage bij het eindrapport interdepartementale werkgroep Toezicht Rechtspersonen, Niet-dossierstuk just050263.
  10. Harvey, J., 1990, Stereotypes and Group-claims; epistemological and moral issues, and their implications for multi-culturalism in education, Journal of Philosophy of Education, Vol. 24, No. 1, p. 39-50.
  11. OFAC List, 2006 <http://www.ustreas.gov/ offices/enforcement/ofac/sdn/t11sdn.pdf>
  12. Patriot Act, 2006 <http://www.epic.org/ privacy/terrorism/hr3162.html>
  13. Piatetsky-Shapiro, G., and Frawley. W.J., 1993, Knowledge Discovery in Databases, Menlo Park, California: AAAI Press/The MIT Press.
  14. Simpson, G.R., How Top Dutch Bank Plunged into World of Shadowy Money, Wall Street Journal, 30th December 2005, p. A1.
  15. Schneier, B., 2000, Secrets and Lies; digital security in a networked world, New York: Wiley Computer Publishing.
  16. US Sanctions list, 2006 <http://www.ustreas.gov/ offices/enforcement/ofac/programs/>
Download


Paper Citation


in Harvard Style

H. M. Custers B. (2007). RISK PROFILING OF MONEY LAUNDERING AND TERRORISM FUNDING - Practical Problems of Current Information Strategies . In Proceedings of the Ninth International Conference on Enterprise Information Systems - Volume 3: ICEIS, ISBN 978-972-8865-90-0, pages 90-94. DOI: 10.5220/0002347700900094


in Bibtex Style

@conference{iceis07,
author={B. H. M. Custers},
title={RISK PROFILING OF MONEY LAUNDERING AND TERRORISM FUNDING - Practical Problems of Current Information Strategies},
booktitle={Proceedings of the Ninth International Conference on Enterprise Information Systems - Volume 3: ICEIS,},
year={2007},
pages={90-94},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002347700900094},
isbn={978-972-8865-90-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Ninth International Conference on Enterprise Information Systems - Volume 3: ICEIS,
TI - RISK PROFILING OF MONEY LAUNDERING AND TERRORISM FUNDING - Practical Problems of Current Information Strategies
SN - 978-972-8865-90-0
AU - H. M. Custers B.
PY - 2007
SP - 90
EP - 94
DO - 10.5220/0002347700900094