CYBER CRIME and MONEY LAUNDERING where do we stand? 16/11/2018 Bucharest

Size: px
Start display at page:

Download "CYBER CRIME and MONEY LAUNDERING where do we stand? 16/11/2018 Bucharest"

Transcription

1 CYBER CRIME and MONEY LAUNDERING where do we stand? 16/11/2018 Bucharest

2 cc frauds intrusion malicious applications data stealing ransomware 2

3 cybercrime is money online transfer services bank accounts (individuals/companies, real/fictitious) smurfing (breaking down transactions) collecting accounts purchase of electronic money and use of e-wallets cross border payments, global accounts (Earthport, TransferWise, TransferGo) Sending money overseas used to be expensive, slow and confusing Not anymore! 3

4 European Money Mule Action EMMA 1 EMMA 2 EMMA 3 identified interviewed arrested nearly 700 money mules were identified across Europe and 81 individuals were arrested after 198 suspects were interviewed by law enforcement agencies. With the support of over 70 banks, significant financial losses were discovered and prevented, and over 900 victims of this crime were identified. More than 90% of the reported money mule transactions were linked to cybercrime 580 money mules were identified, 178 individuals were arrested and the national law enforcement agencies interviewed 380 suspects in the course of the action week[ ], with overall reported losses amounting to EUR 23 million. [ ] The successful hit on this wide-spread crime was supported by 106 banks andprivate partners. 159 arrested, 409 suspects interviewed by law enforcement, 766 money mules and 59 money mule organisers identified as a result of the European Money Mule Action EMMA3, a global law enforcement action week against money muling [ ] EMMA3 saw 26 countries participating, as well as Europol, Eurojust, the European Banking Federation (EBF), 257 banks and private-sector partners #DontBeaMule campaign 4

5 break the connection between the sending address and the receiving address anonymity the operators behind the May 2017 global ransomware incident WannaCry converted their proceeds into Monero in the first half of 2018, Monero was used in 44% of cryptocurrency ransomware attacks superior mining algorithm, adaptive block size limit, ring signatures 5

6 what attracts launderers? Unlike the traditional money laundering methods, which rely on the banking system, cyber-laundering depends on the use of various types of transactions and financial services providers, ranging from wire transfers, cash deposits/withdrawals and e-money transactions to money mules and remittance services Eurasian Group on Combating Money Laundering and Financing of Terrorism Cybercrime and Money Laundering anonymity (no face-to-face transactions, proxy connections, pre-paid, encryption) speed (digital) facility (no expert work) costs (hiring a botnet - $250, keystroke logger - $50, website hosting for phishing scam - $20). globalization (free movement of people, new payment technologies) cross border activity (several jurisdiction) 6

7 cyber laundering: money laundering 2.0 Cyber criminals are using a combination of new cryptocurrencies, gaming currencies and micropayments to launder up to $200 bil. in illicit gains Bromium study, 2018 virtual currencies - primary tool used by cybercriminals for money laundering small electronic payments made through platforms to avoid triggering alerts (microlaundering techniques) unregulated financial services (stored-value cards, casinos) converting stolen funds into game currencies or in-game items (Minecraft, FIFA, World of Warcraft, GTA 5) 7

8 If cybercrime was a country it would have the 13th highest GDP in the world Bromium study,

9 THANK YOU! QUESTIONS? Florina-Silvia POPA prosecutor Directorate for Investigating Organized Crime and Terrorism 9

The Crooks Aren t Here Pursuing White-Collar Crime in a Foreign Country Pauline Roberts Special Agent (Retired) FBI

The Crooks Aren t Here Pursuing White-Collar Crime in a Foreign Country Pauline Roberts Special Agent (Retired) FBI The Crooks Aren t Here Pursuing White-Collar Crime in a Foreign Country Pauline Roberts Special Agent (Retired) FBI Agenda First steps to take when a victim is defrauded How to identify and follow the

More information

Cyber-Insurance: Fraud, Waste or Abuse?

Cyber-Insurance: Fraud, Waste or Abuse? SESSION ID: STR-F03 Cyber-Insurance: Fraud, Waste or Abuse? David Nathans Director of Security SOCSoter, Inc. @Zourick Cyber Insurance overview One Size Does Not Fit All 2 Our Research Reviewed many major

More information

Stockholm 18/10/2018

Stockholm 18/10/2018 Stockholm 18/10/2018 How the H@ck R U? An Insider Look Into The Cybercrime Dark Web Marcel Kooring Fraud & Risk Intelligence, RSA 6 Steps to Becoming a Cybercriminal Determine your role in cyber crime

More information

Nation-State Exploitation of Cryptocurrencies

Nation-State Exploitation of Cryptocurrencies SESSION ID: BAC-F02 Nation-State Exploitation of Cryptocurrencies Tom Robinson Chief Scientist and Co-Founder Elliptic @tomrobin Yaya J. Fanusie Senior Fellow Foundation for Defense of Democracies @SignCurve

More information

Your defence toolkit. How to combat the cyber threat

Your defence toolkit. How to combat the cyber threat Your defence toolkit How to combat the cyber threat Contents The threat of cyber crime 4 How UK businesses are targeted 6 Case studies 8 Why cyber security is so important to manufacturers now 10 The

More information

FRAUD ALERT! Cyber-Crime Impact on IDENTITY THEFT ACCOUNT FRAUD. n Minimize Risk n Vigilance Works n Fraud Prevention Tools

FRAUD ALERT! Cyber-Crime Impact on IDENTITY THEFT ACCOUNT FRAUD. n Minimize Risk n Vigilance Works n Fraud Prevention Tools FRAUD ALERT! Cyber-Crime Impact on IDENTITY THEFT & ACCOUNT FRAUD n Minimize Risk n Vigilance Works n Fraud Prevention Tools As you probably already know one of the three major consumer credit reporting

More information

Protecting Against the High Cost of Cyberfraud

Protecting Against the High Cost of Cyberfraud Protecting Against the High Cost of Cyberfraud THE ROLE OF CYBER LIABILITY INSURANCE IN YOUR RISK MANAGEMENT STRATEGY Paying the Price...2 The Ransomware Scourge...3 Policy Provisions...3 Management Liability...4

More information

Surface Web/Deep Web/Dark Web

Surface Web/Deep Web/Dark Web Cryptocurrency Surface Web/Deep Web/Dark Web How to Get Data? Where Hacking, Cyber Fraud, and Money Laundering Intersect How to Pay? Digital Currency What is Bitcoin? https://youtu.be/aemv9ukpazg Bitcoin

More information

Introduction from our MD, Lee Byrne

Introduction from our MD, Lee Byrne 1/8/2018 Edition 2 Introduction from our MD, Lee Byrne We have been working closely with leading cryptocurrency technology business, Coinfirm Ltd, to provide advisory and training support for cryptobusinesses

More information

JIT GUIDELINES ON THE USE OF JOINT INVESTIGATION TEAMS THB WB. Co-funded by the Prevention of and Fight against Crime Programme of the European Union

JIT GUIDELINES ON THE USE OF JOINT INVESTIGATION TEAMS THB WB. Co-funded by the Prevention of and Fight against Crime Programme of the European Union JIT THB WB GUIDELINES ON THE USE OF JOINT INVESTIGATION TEAMS Co-funded by the Prevention of and Fight against Crime Programme of the European Union JIT THB WB GUIDELINES ON THE USE OF JOINT INVESTIGATION

More information

MONEY LAUNDERING AND TERRORISM FINANCING IN THE CORPORATE SERVICE PROVIDERS SECTOR. Domestic Trends

MONEY LAUNDERING AND TERRORISM FINANCING IN THE CORPORATE SERVICE PROVIDERS SECTOR. Domestic Trends MONEY LAUNDERING AND TERRORISM FINANCING IN THE CORPORATE SERVICE PROVIDERS SECTOR Domestic Trends 31 May 2016 AGENDA ML/TF Trends National Risk Assessment Findings Sector Vulnerabilities Shell companies

More information

CYBER INSURANCE GUIDE

CYBER INSURANCE GUIDE CYBER INSURANCE GUIDE cfcunderwriting.com OW EXP As we become increasingly reliant on technology, the potential impact of cyber-related incidents continues to grow. Yet the cyber insurance market is relatively

More information

At the Heart of Cyber Risk Mitigation

At the Heart of Cyber Risk Mitigation At the Heart of Cyber Risk Mitigation De-risking Cyber Threats with Insurance Vikram Singh Abstract Management of risks is an integral part of the insurance industry. Companies have succeeded in identifying

More information

Fraud and Cyber Insurance Discussion. Will Carlin Ashley Bauer

Fraud and Cyber Insurance Discussion. Will Carlin Ashley Bauer Fraud and Cyber Insurance Discussion Will Carlin Ashley Bauer Why is it Important to Remain Vigilant? Fraud does not discriminate it occurs everywhere, and no organization is immune The changing business

More information

Will Blockchain Change the Audit? Zhiyong Li. Jianghan University, Wuhan, China. Introduction. The Blockchain Technology

Will Blockchain Change the Audit? Zhiyong Li. Jianghan University, Wuhan, China. Introduction. The Blockchain Technology China-USA Business Review, June 2017, Vol. 16, No. 6, 294-298 doi: 10.17265/1537-1514/2017.06.006 D DAVID PUBLISHING Will Blockchain Change the Audit? Zhiyong Li Jianghan University, Wuhan, China Blockchain

More information

Blockchain & Cryptocurrencies Forensic Services Implications. October 25, 2018

Blockchain & Cryptocurrencies Forensic Services Implications. October 25, 2018 Blockchain & Cryptocurrencies Forensic Services Implications October 25, 2018 Agenda: Forensics and Blockchain & Cryptocurrencies 1. Stolen funds used to purchase cryptocurrencies 2. Employee misappropriation

More information

You ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017

You ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017 You ve been hacked Riekie Gordon & Roger Truebody & Alexandra Schudel Why should you care? U$4.6 - U$121 billion - Lloyds U$45 billion not covered 2 The plot thickens 2016 Barkly Survey: It s a business

More information

IS BLOCKCHAIN THE FUTURE OF REAL ESTATE? DENITZA TYUFEKCHIEVA

IS BLOCKCHAIN THE FUTURE OF REAL ESTATE? DENITZA TYUFEKCHIEVA IS BLOCKCHAIN THE FUTURE OF REAL ESTATE? DENITZA TYUFEKCHIEVA WHAT S BLOCKCHAIN? DISTRIBUTED LEDGER TECHNOLOGY DECENTRALIZED - NOT DEPENDANT ON ONE SINGLE ENTITY CREATES A RECORD THAT CANNOT BE CHANGED

More information

Bank Secrecy Act OFAC FinCEN

Bank Secrecy Act OFAC FinCEN Bank Secrecy Act OFAC FinCEN SOUTHEAST DIRECTORS AND SUPERVISORY COMMITTEE CONFERENCE SEPTEMBER 18, 2017 Financial Crimes Identify Track Report Common BSA Acronyms CIP CDD CTR SAR FinCEN OFAC Customer

More information

EXPERT GUIDE. January Private Investigators, Securities & Intelligence 2015

EXPERT GUIDE. January Private Investigators, Securities & Intelligence 2015 EXPERT GUIDE January 2015 Private Investigators, Securities & Intelligence 2015 ExpErt guide: private investigators, securities & intelligence 2015 USA Olivia G. Robinson robinson@backgroundintelligence.com

More information

Risk univers - SNRA for money laundering and terrorist financing (v 0.2)

Risk univers - SNRA for money laundering and terrorist financing (v 0.2) Risk univers - SNRA for money laundering and terrorist financing (v 0.2) DRAFT Macro risk products Risk products risk description Link to a specific sector Sector/product already covered by 4th AMLD Sector

More information

CONFISCATION OF CRIMINAL PROCEEDS IN THE EUROPEAN UNION CRIMINAL LAW

CONFISCATION OF CRIMINAL PROCEEDS IN THE EUROPEAN UNION CRIMINAL LAW AGORA International Journal of Juridical Sciences, www.juridicaljournal.univagora.ro ISSN 1843-570X, E-ISSN 2067-7677 No. 3 (2013), pp. 1-5 CONFISCATION OF CRIMINAL PROCEEDS IN THE EUROPEAN UNION CRIMINAL

More information

Multi-Annual Strategy

Multi-Annual Strategy Multi-Annual Strategy 2016-2018 Towards developing and enhancing judicial cooperation, coordination and mutual trust in the European Union Introduction Eurojust is successfully supporting the Member States

More information

BITCOINS: THEIR FUTURE IN WORLDWIDE COMMERCE

BITCOINS: THEIR FUTURE IN WORLDWIDE COMMERCE BITCOINS: THEIR FUTURE IN WORLDWIDE COMMERCE ITech Law Asia-Pacific Conference Melbourne, Australia, February 26-28, 2014 DENIS T. RICE Arnold & Porter LLP San Francisco #34582928 WHAT IS BITCOIN? Has

More information

PROGRAMME OF THE 1 st EuroMed Forum of the Prosecutors General

PROGRAMME OF THE 1 st EuroMed Forum of the Prosecutors General DRAFT PROGRAMME OF THE 1 st EuroMed Forum of the Prosecutors General 23 JANUARY 2018 MADRID, SPAIN 1 THE 1 st EUROMED FORUM OF THE PROSECUTORS GENERAL GENERAL PRESENTATION The First EuroMed Forum of the

More information

PSR work on authorised push payment scams

PSR work on authorised push payment scams PSR work on authorised push payment scams 1 PSR work on authorised push payment (APP) scams The Payment Systems Regulator (PSR) is here to make sure payment systems work well for those that use them. Our

More information

Securing Treasury. Craig Jeffery, Managing Partner, Strategic Treasurer Rosemary Lyons, Business Project Manager, Cigna. You. Are. Not. Done.

Securing Treasury. Craig Jeffery, Managing Partner, Strategic Treasurer Rosemary Lyons, Business Project Manager, Cigna. You. Are. Not. Done. You. Are. Not. Done. Craig Jeffery, Managing Partner, Strategic Treasurer Rosemary Lyons, Business Project Manager, Cigna About the Presenter 2 Craig Jeffery, CCM, FLMI Founder & Managing Partner Strategic

More information

Ravi Menon: Crypto tokens - the good, the bad, and the ugly

Ravi Menon: Crypto tokens - the good, the bad, and the ugly Ravi Menon: Crypto tokens - the good, the bad, and the ugly Speech by Mr Ravi Menon, Managing Director of the Monetary Authority of Singapore, at Money20/20, Singapore, 15 March 2018. * * * Ladies and

More information

Year-end 2016 fraud update: Payment cards, remote banking and cheque

Year-end 2016 fraud update: Payment cards, remote banking and cheque Year-end 2016 update: Payment cards, remote banking and cheque 30 March 2017 1. Introduction Financial Fraud Action UK (FFA UK) is responsible for leading the collective fight against in the UK payments

More information

Evaluating Your Company s Data Protection & Recovery Plan

Evaluating Your Company s Data Protection & Recovery Plan Evaluating Your Company s Data Protection & Recovery Plan CBIA Cybersecurity Webinar Series 11AM 12PM Part V. Presented by: Stewart Tosh Charles Bellingrath Date: December 7, 2017 Today s presenters Stewart

More information

ANTI-MONEY LAUNDERING TRAINING FOR AGENTS TRANSAMERICA LIFE & PROTECTION

ANTI-MONEY LAUNDERING TRAINING FOR AGENTS TRANSAMERICA LIFE & PROTECTION ANTI-MONEY LAUNDERING TRAINING FOR AGENTS TRANSAMERICA LIFE & PROTECTION Division of the following Statutory Companies: TRANSAMERICA FINANCIAL LIFE INSURANCE COMPANY TRANSAMERICA LIFE INSURANCE COMPANY

More information

2017 Cyber Security and Data Privacy Study

2017 Cyber Security and Data Privacy Study RESEARCH REPORT DECEMBER 2017 2017 Cyber Security and Data Privacy Study How does your company compare? TABLE OF CONTENTS 05 How does your company compare? 06 Key findings 08 Cyber security and data privacy

More information

Slide 1. Slide 2. Slide 3. Identity Theft Coverage. Today s Agenda. What is Identity Theft? What is Identity Theft?

Slide 1. Slide 2. Slide 3. Identity Theft Coverage. Today s Agenda. What is Identity Theft? What is Identity Theft? Slide 1 Identity Theft Coverage Presented by Hartford Steam Boiler Inspection & Insurance Company Copyright 2010 The Hartford Steam Boiler Inspection and Insurance Company Slide 2 Today s Agenda What is

More information

Needs assessment on tools and methods of financial investigation in the European Union Summary

Needs assessment on tools and methods of financial investigation in the European Union Summary Needs assessment on tools and methods of financial investigation in the European Union Summary Wetenschappelijk Onderzoek- en Documentatiecentrum Rotterdam, 22 December 2015 Dr. Brigitte Slot Mr. Drs.

More information

CONTENTS INTRODUCTION ABBREVIATIONS/ACRONYMS

CONTENTS INTRODUCTION ABBREVIATIONS/ACRONYMS TYPOLOGIES ISSUED MAY 2018 1 CONTENTS INTRODUCTION... 2 UTILISATION OF THIRD PARTY ACCOUNTS... 3 CHANGING OF BANK DETAILS FRAUD... 4 PROCEEDS LAUNDERED THROUGH CASINOS... 5 CORRUPTION... 6 NARCOTICS...

More information

Bank Secrecy Act OFAC FinCEN

Bank Secrecy Act OFAC FinCEN Bank Secrecy Act OFAC FinCEN 2017 CREDIT UNION VOLUNTEER TRAINING Financial Crimes Identify Track Report Common BSA Acronyms CIP CDD CTR SAR FinCEN OFAC Customer Identification Program Customer Due Diligence

More information

CYBER AND INFORMATION SECURITY COVERAGE APPLICATION

CYBER AND INFORMATION SECURITY COVERAGE APPLICATION NOTICE: THIS APPLICATION IS FOR CLAIMS-MADE AND REPORTED COVERAGE, WHICH APPLIES ONLY TO CLAIMS FIRST MADE AND REPORTED IN WRITING DURING THE POLICY PERIOD, OR ANY EXTENDED REPORTING PERIOD. THE LIMIT

More information

José Lopes da Mota Deputy Prosecutor General Former President of Eurojust

José Lopes da Mota Deputy Prosecutor General Former President of Eurojust * José Lopes da Mota Deputy Prosecutor General Former President of Eurojust 1 2 Fraud and corruption in health care recognised as a global problem Different players (persons, companies, entities) Acting

More information

Financial Crime: Awareness & Prevention. Jon Jarosinski

Financial Crime: Awareness & Prevention. Jon Jarosinski Financial Crime: Awareness & Prevention Jon Jarosinski 1 Objectives Current trends in financial crime How to identify scams Ways you can protect yourself Agenda ID Theft Scams & Con Schemes Credit & Debit

More information

Bank Security & Risk Management Conference

Bank Security & Risk Management Conference Bank Security & Risk Management Conference Franklin Marriott Cool Springs Franklin, Tenn. September 6 & 7, 2018 Bank Security & Risk Management Conference Franklin Marriott Cool Springs Franklin, Tenn.

More information

c» BALANCE C:» Financially Empowering You Identity Theft Podcast [Music plays] Nikki:

c» BALANCE C:» Financially Empowering You Identity Theft Podcast [Music plays] Nikki: Identity Theft Podcast [Music plays] Nikki: You re listening to Identity theft protection. Hi. I m Nikki, your host for today s podcast. Identity theft occurs when someone uses your name, social security

More information

Case study. Malware mayhem. A targeted ransomware attack on a technology provider opens up a can of worms

Case study. Malware mayhem. A targeted ransomware attack on a technology provider opens up a can of worms Case study Malware mayhem A targeted ransomware attack on a technology provider opens up a can of worms Ransomware is one of the fastest growing forms of cybercrime in the world. According to our own claims

More information

NOTICE TO BANKS MONETARY AUTHORITY OF SINGAPORE ACT, CAP. 186

NOTICE TO BANKS MONETARY AUTHORITY OF SINGAPORE ACT, CAP. 186 MAS 626 2 July 2007 Last revised on 23 January 2013 (Refer to endnotes for history of amendments) NOTICE TO BANKS MONETARY AUTHORITY OF SINGAPORE ACT, CAP. 186 PREVENTION OF MONEY LAUNDERING AND COUNTERING

More information

Bank Secrecy Act OFAC FinCEN

Bank Secrecy Act OFAC FinCEN Bank Secrecy Act OFAC FinCEN 2017 CREDIT UNION EMPLOYEE TRAINING Financial Crimes Identify Track Report Common BSA Acronyms CIP CDD CTR SAR FinCEN OFAC Customer Identification Program Customer Due Diligence

More information

Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data

Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data Sponsored by ID Experts Independently conducted by Ponemon Institute LLC Publication Date: May 2016 Ponemon Institute Research Report

More information

Cryptocurrencies (Session I) Computer Science and Law

Cryptocurrencies (Session I) Computer Science and Law Cryptocurrencies (Session I) Computer Science and Law Outline Part 1 SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies Part 2 Advancing a Framework for Regulating Cryptocurrency

More information

Money laundering and terrorism financing in virtual environments: a feasibility study

Money laundering and terrorism financing in virtual environments: a feasibility study Money laundering and terrorism financing in virtual environments: a feasibility study This is the peer reviewed author accepted manuscript (post print) version of a published work that appeared in final

More information

Identity thieves use a variety of ways to gain access to your personal information:

Identity thieves use a variety of ways to gain access to your personal information: How Identity Theft Occurs Identity thieves use a variety of ways to gain access to your personal information: Steals information from employers, bribe an employee who has access records, or hacks into

More information

November 2018 Abstract

November 2018 Abstract etxcoin@outlook.com November 2018 Abstract A purely peer-to-peer version of electronic cash scalable and friendly to use would allow online payments to be sent directly from one party to another without

More information

Criminal Exploitation of Digital Currencies. Law Enforcement Sensitive

Criminal Exploitation of Digital Currencies. Law Enforcement Sensitive Criminal Exploitation of Digital Currencies Homeland Security Investigations (HSI) Established in 2003 with the creation of the U.S. Department of Homeland Security (DHS). One of the three components of

More information

Anti-Money Laundering and Counter-Terrorist Financing Seminar

Anti-Money Laundering and Counter-Terrorist Financing Seminar Anti-Money Laundering and Counter-Terrorist Financing Seminar November / December 2017 Raymond Wong, Director Irene Pou, Associate Director Ivan Wan, Senior Manager Intermediaries Supervision Department,

More information

REPORT FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL. on restrictions on payments in cash

REPORT FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL. on restrictions on payments in cash EUROPEAN COMMISSION Brussels, 12.6.2018 COM(2018) 483 final REPORT FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL on restrictions on payments in cash EN EN 1. INTRODUCTION On 2 February

More information

National Risk Assessment on Terrorist Financing

National Risk Assessment on Terrorist Financing Summary National Risk Assessment on Terrorist Financing Background Dutch policy to prevent and combat terrorist financing is based on the recommendations of the Financial Action Task Force (FATF) and EU

More information

CYBER LIABILITY REINSURANCE SOLUTIONS

CYBER LIABILITY REINSURANCE SOLUTIONS CYBER LIABILITY REINSURANCE SOLUTIONS CYBER STRONG. CYBER STRONG. State-of-the-Art Protection for Growing Cyber Risks Businesses of all sizes and in every industry are experiencing an increase in cyber

More information

FRAUD EXAMINERS MANUAL INTERNATIONAL EDITION

FRAUD EXAMINERS MANUAL INTERNATIONAL EDITION TABLE OF CONTENTS VOLUME I SECTION 1 FINANCIAL TRANSACTIONS AND FRAUD SCHEMES ACCOUNTING CONCEPTS Accounting Basics... 1.101 Financial Statements... 1.105 Generally Accepted Accounting Principles (GAAP)...

More information

41% of respondents see cybercrime as the most significant risk over the next 24 months.

41% of respondents see cybercrime as the most significant risk over the next 24 months. Economic Crime and Fraud Survey 2018 Swiss insights Down but not out: Swiss fraudsters are digitalising and diversifying 3 of Swiss organisations experienced fraud and/or economic crime. 41% of respondents

More information

BLOCKCHAIN, CRYPTOCURRENCY & THE LEGAL ENVIRONMENT IN SINGAPORE. 28 November 2017

BLOCKCHAIN, CRYPTOCURRENCY & THE LEGAL ENVIRONMENT IN SINGAPORE. 28 November 2017 BLOCKCHAIN, CRYPTOCURRENCY & THE LEGAL ENVIRONMENT IN SINGAPORE 28 November 2017 I. Introduction In the wake of the recent explosion of the use of blockchain and cryptocurrencies in Singapore, we examine

More information

Money Laundering and Terrorist Financing Risks in the E-Money Sector

Money Laundering and Terrorist Financing Risks in the E-Money Sector Money Laundering and Terrorist Financing Risks in the E-Money Sector Thematic Review TR18/3 October 2018 TR18/3 Contents 1 Introduction 3 2 Overview 5 3 Findings 7 Annex 1 Glossary 16 How to navigate this

More information

Study on: -Terms of reference-

Study on: -Terms of reference- Study on: Combatting fraud in and counterfeiting of non-cash means of payment: Evaluation of the existing policy and legislative framework and preparation of impact assessment regarding possible options

More information

Cyber Risk Proposal Form

Cyber Risk Proposal Form Cyber Risk Proposal Form Company or trading name Address Postcode Country Telephone Email Website Date business established Number of employees Do you have a Chief Privacy Officer (or Chief Information

More information

The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage

The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage James P. Bobotek james.bobotek@pillsburylaw.com (202) 663-8930 Pillsbury Winthrop Shaw Pittman LLP DOCUMENT

More information

Crime Coverage Section Application (Large Public Company > $1B revenues)

Crime Coverage Section Application (Large Public Company > $1B revenues) Crime Coverage Section Application (Large Public Company > $1B revenues) BY COMPLETING THIS CRIME APPLICATION THE APPLICANT IS APPLYING FOR COVERAGE WITH CHUBB INSURANCE COMPANY OF CANADA (THE COMPANY

More information

Surprisingly, only 40 percent of small and medium-sized enterprises (SMEs) believe their

Surprisingly, only 40 percent of small and medium-sized enterprises (SMEs) believe their When It Comes to Data Breaches, Why Are Corporations Largely Uninsured? Under Attack and Unprepared: Argo Group Cyber Insurance Survey 2017 Surprisingly, only 40 percent of small and medium-sized enterprises

More information

Tax Refund Fraud and Identity Theft. IRS Criminal Investigation Special Agent Shannon Vernieuw

Tax Refund Fraud and Identity Theft. IRS Criminal Investigation Special Agent Shannon Vernieuw Tax Refund Fraud and Identity Theft IRS Criminal Investigation Special Agent Shannon Vernieuw Internal Revenue Service Criminal Investigation Criminal Investigation serves the American public by investigating

More information

Summary. Background. What is money laundering?

Summary. Background. What is money laundering? Summary Background Dutch policy to prevent and combat money laundering is based on the recommenations of the Financial Action Task Force (FATF) and EU directives and regulations. The FATF an intergovernmental

More information

Money laundering patterns in Eastern Europe

Money laundering patterns in Eastern Europe Money laundering patterns in Eastern Europe Policy recommendations based on investigative journalism AUTHORS: Attila Biro, RISE Project Romania Elena Calistru, Funky Citizens Iurie Sanduta, RISE Moldova

More information

gamevy Anti- Money Laundering Detecting and Preventing Financial Crime Training for Gamevy

gamevy Anti- Money Laundering Detecting and Preventing Financial Crime Training for Gamevy gamevy Anti- Money Laundering Detecting and Preventing Financial Crime Training for Gamevy Introduction This document is Gamevy s training on anti- money laundering regulations within the context of our

More information

27 th Year of Publication. A monthly publication from South Indian Bank. To kindle interest in economic affairs... To empower the student community...

27 th Year of Publication. A monthly publication from South Indian Bank. To kindle interest in economic affairs... To empower the student community... Experience Next Generation Banking A monthly publication from South Indian Bank To kindle interest in economic affairs... To empower the student community... www.southindianbank.com Student s corner ho2099@sib.co.in

More information

Cryptocurrencies as Charitable Gifts: Should Your Charity Say Yes?

Cryptocurrencies as Charitable Gifts: Should Your Charity Say Yes? With the increased notoriety of cryptocurrencies, many charities are exploring the option of accepting Bitcoin, Ripple, Litecoin and nearly 2,000 other virtual currencies for donations. In fact, Fidelity

More information

Journal of Multistate Taxation and Incentives (Thomson Reuters/Tax & Accounting) Volume 28, Number 4, July 2018

Journal of Multistate Taxation and Incentives (Thomson Reuters/Tax & Accounting) Volume 28, Number 4, July 2018 Journal of Multistate Taxation and Incentives (Thomson Reuters/Tax & Accounting) Volume 28, Number 4, July 2018 SHOP TALK Blockchain & Cryptocurrency Two Roads Converge By JUSTIN E. HOBSON JUSTIN E. HOBSON

More information

APPLE BLOCKCHAIN COIN

APPLE BLOCKCHAIN COIN APPLE COIN www.apcoin.co APPLE BLOCKCHAIN COIN The world s advanced blockchain based platform with Secure, Fast and Infinite Opportunities. WHITEPAPER THE NEXT GLOBAL PAYING WHITEPAPER Introduction APPLE

More information

Brussels, 12 December 2018 [EBF_035275] SUBJECT: EBF position on Crypto-assets and Initial Coin Offerings (ICO) 1. Introduction

Brussels, 12 December 2018 [EBF_035275] SUBJECT: EBF position on Crypto-assets and Initial Coin Offerings (ICO) 1. Introduction Brussels, 12 December 2018 [EBF_035275] SUBJECT: EBF position on Crypto-assets and Initial Coin Offerings (ICO) 1. Introduction Banks are keen to serve customers needs vis-à-vis new, innovative financial

More information

Auditing in the Crypto-Asset Sector

Auditing in the Crypto-Asset Sector Auditing in the Crypto-Asset Sector Introduction Many of the reporting issuers in Canada s crypto-asset sector obtained material crypto-asset holdings or engaged in material crypto-mining activity during

More information

Cyber Risks & Cyber Insurance

Cyber Risks & Cyber Insurance Cyber Risks & Cyber Insurance Terry Quested Executive Director Associated Risk Managers of Ohio Darren Faye Vice President Leonard Insurance / Assured Partners Legal Disclaimer The views, information and

More information

The fight against fraud - the European Union perspective

The fight against fraud - the European Union perspective The fight against fraud - the European Union perspective ACFE - European Fraud Conference Prague, 19 March 2013 Giovanni Kessler Director-General European Anti-Fraud Office (OLAF) OLAF - EUROPEAN ANTI-FRAUD

More information

January to June 2016 fraud update: Payment cards, remote banking and cheque

January to June 2016 fraud update: Payment cards, remote banking and cheque January to update: Payment cards, remote banking and cheque October 1. Introduction Financial Fraud Action UK (FFA UK) is responsible for leading the collective fight against in the UK payments industry.

More information

Cyber breaches: are you prepared?

Cyber breaches: are you prepared? Cyber breaches: are you prepared? Presented by Michael Gapes, Partner Overview What is cyber crime? What are the risks and impacts to your business if you are a target? What are your responsibilities do

More information

topic: Introduce of BAK, current cases of BAK and the main - problems of corruption/economic - investigations (for an European/Austrian investigator)

topic: Introduce of BAK, current cases of BAK and the main - problems of corruption/economic - investigations (for an European/Austrian investigator) Republic of Austria Federal Ministry of the Interior Federal Bureau of Anti-Corruption (BAK) Robert KALENSKY for white collar - crime investigations BAK Investigator topic: Introduce of BAK, current cases

More information

FRAUD EXAMINERS MANUAL

FRAUD EXAMINERS MANUAL TABLE OF CONTENTS VOLUME I SECTION 1 FINANCIAL TRANSACTIONS AND FRAUD SCHEMES ACCOUNTING CONCEPTS Accounting Basics... 1.101 Financial Statements... 1.105 Generally Accepted Accounting Principles (GAAP)...

More information

DIRECTIVES. (Text with EEA relevance) Having regard to the Treaty on the Functioning of the European Union, and in particular Article 114 thereof,

DIRECTIVES. (Text with EEA relevance) Having regard to the Treaty on the Functioning of the European Union, and in particular Article 114 thereof, 19.6.2018 Official Journal of the European Union L 156/43 DIRECTIVES DIRECTIVE (EU) 2018/843 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 30 May 2018 amending Directive (EU) 2015/849 on the prevention

More information

Here is some more information on the Equifax Breach and how you may protect yourself in the aftermath...

Here is some more information on the Equifax Breach and how you may protect yourself in the aftermath... UPDATE 2 October 13, 2017 Here is some more information on the Equifax Breach and how you may protect yourself in the aftermath... What could happen? The Equifax breach gave criminals access to vital personal

More information

Authorised push payment scams

Authorised push payment scams Report and Consultation Authorised push payment scams PSR-led work to mitigate the impact of scams, including a consultation on a contingent reimbursement model November 2017 This paper sets out the work

More information

BLOCKCHAIN/CRYPTOCURRENCIES AND CYBERSECURITY, THREATS AND OPPORTUNITIES

BLOCKCHAIN/CRYPTOCURRENCIES AND CYBERSECURITY, THREATS AND OPPORTUNITIES The 9 th International Conference on Business Information Security (BISEC-2017), 18 th October 2017, Belgrade, Serbia BLOCKCHAIN/CRYPTOCURRENCIES AND CYBERSECURITY, THREATS AND OPPORTUNITIES ALEKSANDAR

More information

STEP CERTIFICATE IN ANTI-MONEY LAUNDERING. Syllabus

STEP CERTIFICATE IN ANTI-MONEY LAUNDERING. Syllabus STEP CERTIFICATE IN ANTI-MONEY LAUNDERING Syllabus In collaboration with Delivered by INTRODUCTION This document contains the detailed syllabus for the. This syllabus should be read in conjunction with

More information

Federal Reserve Bank of Chicago

Federal Reserve Bank of Chicago Federal Reserve Bank of Chicago Blockchain and Financial Market Innovation Rebecca Lewis, John McPartland, and Rajeev Ranjan June 2017 PDP 2017-03 * Working papers are not edited, and all opinions and

More information

Client Update Draft EU Guidelines on Cross- Border Data Transfer

Client Update Draft EU Guidelines on Cross- Border Data Transfer 1 Client Update Draft EU Guidelines on Cross- Border Data Transfer Earlier this month, the Article 29 Data Protection Working Party (a coalition of European Union member states data protection regulators)

More information

Assistant Special Agent in Charge Doug Leff Federal Bureau of Investigation New York Office

Assistant Special Agent in Charge Doug Leff Federal Bureau of Investigation New York Office Assistant Special Agent in Charge Doug Leff Federal Bureau of Investigation New York Office Each of FBI s 56 field offices has an Asset Forfeiture Program. The FBI also has over 75 foreign offices. Therefore,

More information

Banking Title Application Fraud: The Enemy at the Gates

Banking Title Application Fraud: The Enemy at the Gates WHITE PAPER Banking Title Application Fraud: The Enemy at the Gates It is a fraud to borrow what we are unable to pay. Publilius Syrus, first century B.C. ii Contents Overview... 1 What Is Application

More information

Money Mule Awareness

Money Mule Awareness U.S. Department of Justice Federal Bureau of Investigation Money laundering, Forfeiture and Bank Fraud Unit Money Mule Awareness To report fraudulent activity, contact your nearest FBI field office. What

More information

Scam Type #1: Wire Fraud Scams

Scam Type #1: Wire Fraud Scams 2015 Scam Type #1: Wire Fraud Scams The Goal of Wire Fraud Scams is to have the victim wire or otherwise send money to the Scammer through non-refundable, non-traceable methods such as Wire Transfer; Money

More information

Electronic Commerce and Cyber Risk

Electronic Commerce and Cyber Risk Electronic Commerce and Cyber Risk Fifth Third Bank All Rights Reserved Reality and Solutions Objectives for Today What I will cover How banks are changing How the public is changing How the laws are changing

More information

WHEN BAD THINGS HAPPEN TO YOUR GOOD NAME

WHEN BAD THINGS HAPPEN TO YOUR GOOD NAME WHEN BAD THINGS HAPPEN TO YOUR GOOD NAME Corporal Mark Kincaid Hampton Police Division Community Relations Unit What is Identity Theft? Someone uses your name or personal information to: Open credit card

More information

Electronic Funds Transfer in Money Laundering Crime: Regulation Needed in Response to Meeting of Technology and Crime in Indonesia

Electronic Funds Transfer in Money Laundering Crime: Regulation Needed in Response to Meeting of Technology and Crime in Indonesia International Journal of Cyber Society and Education Pages163-170, Vol. 3, No. 2, December 2010 Electronic Funds Transfer in Money Laundering Crime: Regulation Needed in Response to Meeting of Technology

More information

Prevention of Money Laundering : Technology as an Enabler ICAI MARCH

Prevention of Money Laundering : Technology as an Enabler ICAI MARCH Prevention of Money Laundering : Technology as an Enabler SEMINAR ON PREVENTION OF MONEY LAUNDERING ICAI MARCH 16 2019 Disclaimer Please note that the contents of this presentation and the views expressed

More information

CYBERSECURITY: IMPLEMENTING BEST PRACTICES FOR PLAN SPONSORS

CYBERSECURITY: IMPLEMENTING BEST PRACTICES FOR PLAN SPONSORS Founded in 1992 Administration of Over 22,000 Plans and 1.2 Million Plan Participants Over $64 Billion in Assets Under Management Plans in All 50 States PG 1 Cybersecurity: 2 Allocation 3 ABG 4 The 5 Tax

More information

JAMES GRAY SPECIAL GUEST 6/7/2017. Underwriter, London UK Specialty Treaty Beazley Group

JAMES GRAY SPECIAL GUEST 6/7/2017. Underwriter, London UK Specialty Treaty Beazley Group SPECIAL GUEST JAMES GRAY Underwriter, London UK Specialty Treaty Beazley Group All 6 Beazley Lloyd's Syndicates are rated A (Excellent) by A.M. Best Admitted Carrier in the US Beazley Ins Co rated A (Excellent)

More information

White Paper of AML BitCoin (AMLBit) and its Business Model

White Paper of AML BitCoin (AMLBit) and its Business Model White Paper of AML BitCoin (AMLBit) and its Business Model i Abstract The worldwide frenzy driving mass involvement in cryptocurrencies has drawn attention both to the exciting positive features of digital

More information

FATF Report to the G20 Finance Ministers and Central Bank Governors

FATF Report to the G20 Finance Ministers and Central Bank Governors FATF Report to the G20 Finance Ministers and Central Bank Governors March 2018 FINANCIAL ACTION TASK FORCE The Financial Action Task Force (FATF) is an independent inter-governmental body that develops

More information

Financial crime and cryptocurrencies

Financial crime and cryptocurrencies Link to Article on website Financial crime and cryptocurrencies Whilst the challenges of cryptocurrencies may on the face of it appear to be new, the truth is that navigating the risks associated with

More information

LifeLock Product Features LIFELOCK BENEFIT ELITE FACT SHEET LIFELOCK ULTIMATE PLUS FACT SHEET LIFELOCK JUNIOR FACT SHEET

LifeLock Product Features LIFELOCK BENEFIT ELITE FACT SHEET LIFELOCK ULTIMATE PLUS FACT SHEET LIFELOCK JUNIOR FACT SHEET LifeLock Product Features LIFELOCK BENEFIT ELITE FACT SHEET LIFELOCK ULTIMATE PLUS FACT SHEET LIFELOCK JUNIOR FACT SHEET 1-877-511-7906 LifeLock.com/Business FACT SHEET LifeLock Benefit Elite LifeLock

More information