Money laundering requires an underlying, primary, profit-making crime (such as corruption, drug trafficking, market manipulation, fraud, tax evasion), along with the intent to conceal the proceeds of the crime or to further the criminal enterprise. These activities generate financial flows that involve the diversion of resources away from economically- and socially-productive uses—and these diversions can have negative impacts on the financial sector and external stability of member states.
Terrorism needs money to operate. Terrorists need funds to purchase weapons, equipment, supplies, and services. Financing for terrorist activity may come from the public (government-sponsored terrorism) or private (individuals, businesses, charities, nongovernmental organizations [NGOs]) sources, often in the form of many small donations. Funds may be generated from legal or criminal activity. Activities to prevent and deter terrorist financing activities are varied and many. The FATF 9 Special Recommendations on Terrorist Financing suggest some methods of combating those activities.
How do money laundering investigations differ from terrorist financing investigations?
Who investigates money laundering and terrorist financing cases?
Money Laundering and Terrorist Financing – Definitions and Nature
The Duties and Responsibilities of the Money Laundering Reporting Officer (MLRO) – Compliance Officer (AML/CFT)
Anti-Money Laundering Typologies across Industry Sectors
Combating the Financing of Terrorism
Compliance Officers
AML Officers
Money Laundering Reporting Officers (MLROs)
Know Your Customer (KYC) analysts
Auditors and any other professionals with responsibilities for financial compliance within their organization.
The fundamental concepts of money laundering and terrorist fi nuancing
Their implications for development from economic, social, and governance perspectives
Existing international standards and key international players in the fight against money laundering and terrorist financing
Responsibility for effective supervision
Institutions subject to AML/CFT compliance
The principal regulatory and institutional requirements
Enforcement of AML/CFT requirement
Professional associations and their roles
Obligations under AML/BSA/CFT/OFAC
Learn the use and application of Currency Transaction Reports, Source of Funds Declarations, how to identify and conduct enhanced due diligence on politically exposed persons
Understand the legal obligation regarding OFAC, Sanctions & Terrorist
Identify high-risk customers and have a keen understanding of conducting enhanced due diligence
Develop and document a risk-based approach to independent audit
Cybercrimes, New Technologies & the future of Compliance
Many different sources can provide information for use in initiating or pursuing money laundering investigations:
FIUs, or anti-money laundering units—are the primary sources in most countries
This program can help anyone at any level to improve the speed and effectiveness of their reading (for work and study). It also explains the secrets of super memory systems and shows how mind mapping can be used for better note-making, planning, and communication skills.
Risk is key in any project yet is often misunderstood as to the huge value that it can deliver, both to the project itself and to the people involved. This interactive, highly practical Risk Management Professional training course is designed to help delegates cover the risk management framework from the fundamentals up to the senior management level. This training course is delivered in such a way that delegates can expect to become skilled risk practitioners themselves.
Corporate/Public governance and risk management are critical There is increasing attention being paid to corporate governance and risk management in business schools and among legislators.
This course covers prerequisite topics introducing you to information security, programming, and testing it also builds strong foundations by giving theoretical lessons reinforced with practical exercises, covering topics like system, network, web app, and Wi-Fi security by the end of this course you will become a professional IT Security personnel and it will increase your ability to defend and assist an organization in assessing and mitigating infrastructure and the risks within the cyberspace
Business networking is an effective and efficient way for business people to connect, develop meaningful relationships, and grow their businesses. These achievements don’t come through a direct sales approach, however. They come from being interested in helping others, in listening, and in purposefully meeting and introducing people to one another. In this course, you’ll learn the essential ingredients for business networking, including in-person, people-centered connections, and online spaces such as LinkedIn.