austrac misuse of ict in terrorism financing · austrac – misuse of ict in terrorism financing...

14
AUSTRAC – Misuse of ICT in Terrorism Financing Joint Special Meeting, UN 14 December Claudine Lamond, Senior Intelligence Analyst

Upload: others

Post on 22-Jun-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: AUSTRAC Misuse of ICT in Terrorism Financing · AUSTRAC – Misuse of ICT in Terrorism Financing Joint Special Meeting, UN 14 December Claudine Lamond, Senior Intelligence Analyst

AUSTRAC – Misuse of ICT in Terrorism Financing

Joint Special Meeting, UN

14 December

Claudine Lamond, Senior Intelligence Analyst

Page 2: AUSTRAC Misuse of ICT in Terrorism Financing · AUSTRAC – Misuse of ICT in Terrorism Financing Joint Special Meeting, UN 14 December Claudine Lamond, Senior Intelligence Analyst

Introduction

• ICT and Terrorism Financing

– What is the Risk?

• Virtual Currencies

• Online Crowd Funding

Page 3: AUSTRAC Misuse of ICT in Terrorism Financing · AUSTRAC – Misuse of ICT in Terrorism Financing Joint Special Meeting, UN 14 December Claudine Lamond, Senior Intelligence Analyst
Page 4: AUSTRAC Misuse of ICT in Terrorism Financing · AUSTRAC – Misuse of ICT in Terrorism Financing Joint Special Meeting, UN 14 December Claudine Lamond, Senior Intelligence Analyst

ICT and Terrorism Financing

• Tool Kit approach

– Open source block chain analysis

• Links bitcoin wallets to biographical details

– Law enforcement data holdings

– Classified data holdings

– Financial indicators

• Suspicious Transaction Reports

Page 5: AUSTRAC Misuse of ICT in Terrorism Financing · AUSTRAC – Misuse of ICT in Terrorism Financing Joint Special Meeting, UN 14 December Claudine Lamond, Senior Intelligence Analyst

ICT and Terrorism Financing

• SMRs referrals

• Law enforcement data bases

• Profiles over AUSTRAC data base

–Money mules

– Elder / romance scams

– Targeting profiles

Page 6: AUSTRAC Misuse of ICT in Terrorism Financing · AUSTRAC – Misuse of ICT in Terrorism Financing Joint Special Meeting, UN 14 December Claudine Lamond, Senior Intelligence Analyst

Risk of the use of ICT for Terrorism Financing

• Highly Vulnerably

• Unknown likelihood

– General acceptance of increasing likelihood

• Post ISIL - Iraq and Syria

– Increasingly cyber aware

– Returnee Foreign Terrorist Fighters

Page 7: AUSTRAC Misuse of ICT in Terrorism Financing · AUSTRAC – Misuse of ICT in Terrorism Financing Joint Special Meeting, UN 14 December Claudine Lamond, Senior Intelligence Analyst
Page 8: AUSTRAC Misuse of ICT in Terrorism Financing · AUSTRAC – Misuse of ICT in Terrorism Financing Joint Special Meeting, UN 14 December Claudine Lamond, Senior Intelligence Analyst

Virtual Currency

• Understanding virtual and crypto currencies

–How they interact with financial Institutions

–What is their AML/CTF Risk?

– Their role as a reporting entity

Page 9: AUSTRAC Misuse of ICT in Terrorism Financing · AUSTRAC – Misuse of ICT in Terrorism Financing Joint Special Meeting, UN 14 December Claudine Lamond, Senior Intelligence Analyst

Figure 1. Interactive Environment, Peter Warrack – University of Toronto 2014

Page 10: AUSTRAC Misuse of ICT in Terrorism Financing · AUSTRAC – Misuse of ICT in Terrorism Financing Joint Special Meeting, UN 14 December Claudine Lamond, Senior Intelligence Analyst

Virtual Currencies Cont.

• Review of AML/CTF Act to include virtual and crypto currencies.

– To crypto currency distributors to be regulated, or allow voluntary reporting

Page 11: AUSTRAC Misuse of ICT in Terrorism Financing · AUSTRAC – Misuse of ICT in Terrorism Financing Joint Special Meeting, UN 14 December Claudine Lamond, Senior Intelligence Analyst
Page 12: AUSTRAC Misuse of ICT in Terrorism Financing · AUSTRAC – Misuse of ICT in Terrorism Financing Joint Special Meeting, UN 14 December Claudine Lamond, Senior Intelligence Analyst

Online Crowdfunding Platforms

• Unregulated charities – No obligations to adhere to advertised cause

• Operate in open and closed spaces – Public crowd funding platforms

– Private closed groups

• Reliant on bank identification – Often non-reportable transactions

Page 13: AUSTRAC Misuse of ICT in Terrorism Financing · AUSTRAC – Misuse of ICT in Terrorism Financing Joint Special Meeting, UN 14 December Claudine Lamond, Senior Intelligence Analyst

Questions?

Page 14: AUSTRAC Misuse of ICT in Terrorism Financing · AUSTRAC – Misuse of ICT in Terrorism Financing Joint Special Meeting, UN 14 December Claudine Lamond, Senior Intelligence Analyst

www.austrac.gov.au

DISCLAIMER: The information contained in this document is intended only to provide a summary and general overview on these matters. It is not intended to be comprehensive. It does not constitute nor should it be treated as legal advice or opinion. This presentation contains statements of policy which reflect AUSTRAC’s administration of the legislation in carrying out its statutory functions. The Commonwealth accepts no liability for any loss suffered as a result of reliance on this publication, including any errors or omissions therein. AUSTRAC recommends that independent professional advice be sought. The information contained herein is current as at the date of this document.