Cryptocurrency and money laundering: why understanding fraud is critical (2024)

Money laundering

On January 1, 2021, as part of overriding President Trump’s veto of a defense spending bill, Congress enacted the Anti-Money Laundering Act (“AMLA”), which amended the Bank Secrecy Act (BSA) for the first time since 2001.

The AMLA, like other regulatory initiatives, comes from several prior legislative attempts to reform various specific aspects of the Bank Secrecy Act (“BSA”), including the Corporate Transparency Act of 2019, the Illicit CASH Act of 2020 and the STIFLE Act of 2020. A vital purpose of the AMLA is to expand coordination and information sharing among administering agencies, examining agencies, law enforcement agencies, national security agencies, the intelligence community and financial institutions.

The AMLA has numerous substantive provisions that appear to address weaknesses in the U.S. approach to anti-money laundering/countering the financing of terrorism (“AML/CFT”), including the absence of corporate beneficial ownership reporting requirements at the national level. The U.S. has been criticized by, among others, the Financial Action Task Force (“FATF”) for the absence of beneficial ownership reporting requirements at the national level. FATF has described the absence as a “significant gap” and a “serious deficiency” in the U.S. AML regime. Access to beneficial ownership information has also long been a goal of federal law enforcement and national security officials. AMLA also focuses on the use of reasonably designed risk-based programs that embrace innovation and embed technology.

Also, the AMLA contemplates several new mechanisms for sharing BSA-related information, emphasizing the utilization of data, metrics, statistics and analytics. Three of these mechanisms are as follows:

  • Threat pattern and trend analyses of BSA reports: The Treasury Department’s Financial Crimes Enforcement Network (FinCEN) will be required to publish threat pattern and trend information to provide meaningful information about the preparation, use and value of suspicious activity reports (SARs) and other reports filed by financial institutions.
  • Strengthening the feedback loop on BSA reports: The Department of Justice will be required to submit to the Department of the Treasury an annual report on the use of data derived from financial institutions reporting under the BSA, to be used for specified purposes that include enhancing feedback and communications with financial institutions. Notably, this report’s specific purpose will be to provide more detail in Treasury’s semiannual report to the financial services industry on suspicious activities.
  • SAR sharing with foreign branches, subsidiaries and affiliates: Two provisions in the AMLA aim to facilitate cross-border sharing of SARs and suspicious transaction information within financial institutions. Financial institutions will be prohibited from establishing or maintaining any operation located outside the United States for the primary purpose of BSA compliance due to these provisions.
Also, notable
  • The AMLA reiterates that financial institutions should implement reasonably designed risk-based programs that “direct its resources to its higher-risk customers and activities, consistent with the risk profile of a financial institution.”
  • The AMLA’s expansion of the BSA’s purpose to include “establish[ing] appropriate frameworks for information sharing among financial institutions, their agents and service providers, their regulatory authorities, associations of financial institutions, the Department of the Treasury and law enforcement.”
  • The adverse consequences of “de-risking” — generally understood in the AML/CFT context to mean financial institutions’ terminating or restricting business relationships with clients or categories of clients to avoid, rather than manage, risk.
Bank Secrecy Act and cryptocurrency

One notable reform of the AMLA is that it revised the BSA to include cryptocurrency and other digital assets within its scope. However, noticeable absent from the AMLA are the terms “bitcoin,” “crypto business,” “virtual assets,” or “digital currency.” Instead, the AMLA uses the language contained in existing guidance from FinCEN regarding “value that substitutes for currency.” If there is a continued omission of these critical terms, a footnote should be added to detail specific examples of what may qualify as a “value that substitutes for currency.”

Specifically, Section 5312 of the BSA (“Definitions and application”) has been amended so that the definition of “financial institution” includes “a business in the exchange of currency, funds, or value that substitutes for currency or funds” and “a licensed sender of money or any other person who engages as a business in the transmission of currency, funds, or value that substitutes for currency.” It also revises the definition of “money instrument” to include “value that substitutes for any monetary instrument.” In addition, Section 5330 of the BSA (“Registration of money transmitting businesses”) now provides that money transmitting includes any business that transmits “currency, funds, or value that substitutes for currency.”

Therefore, virtual currency businesses that essentially serve as money transmitters must now register with FinCEN. Likewise, antiquities dealers, consultants and advisors now qualify as “financial institutions” under the new BSA definition.

Though FinCEN has repeatedly said that cryptocurrency and other digital assets fall within the scope of the AML regulatory regime, the recent revisions through the AMLA set out that reality. Consistent with the BSA’s theme, these revisions reflect Congress’s concern. Although the use and trading of virtual currencies are legal, fraudsters, including transnational criminal organizations, seek to exploit weaknesses in the global financial system. They do this by using substitutes for currency, including emerging payment methods such as virtual currencies, to move illicit funds.

Reporting

Financial institutions would be required to report certain types of customer information to FinCEN on any transaction of cryptocurrency worth over $10,000 made on their platforms involving an unhosted wallet, sometimes referred to as a self-hosted or non-custodial wallet, which is usually controlled by an individual and bypasses the financial institution and its controls. This type of transaction reporting would have to be done within 15 days. Banks and financial technology companies (fintechs) would also be required to keep records for any such transaction over $3,000 and provide that information to law enforcement upon request.

The transaction amounts of $3,000 and $10,000 align with other AML reporting requirements placed on financial institutions by the BSA.

Among the information financial institutions would have to collect includes:

  • certain transactions or the type of cryptocurrency used;
  • the time of the transaction;
  • the assessed value of the transaction in U.S. dollars;
  • any payment instructions received by the financial institution’s customer;
  • any form relating to the transaction;
  • the name and physical address of “each counterparty” to the financial institution’s customer; and
  • any other information that “uniquely identifies the transaction, the accounts, and, to the extent reasonably available, the parties involved.”
Boards and compliance officers

The board of directors is ultimately responsible for the bank’s AML compliance and should oversee senior management and the compliance officer in implementing the bank’s board-approved AML compliance program.

Based on the AMLA and recent trends, boards and compliance officers should immediately consider the following:

  • Conducting AML and sanctions risk assessments. Understanding risk is critical in developing and modifying an AML program. FINRA’s 2021 Examination Priorities and the Office of Foreign Assets Control’s 2019 guidance on compliance commitments emphasize the importance of conducting risk assessments and updating them based on independent testing results and any changes in size or risk profile. This assessment should include an evaluation of customers, products, services, and geography. The risk assessment is usually the first thing the regulators ask for when something goes wrong and will illustrate the company’s general understanding of risk.
  • Revamping customer due diligence. Regulators will more likely than not expect companies to enhance their customer due diligence process to determine who could be using “fronts” or hiding behind shell companies. Why? Those names and business ties will be more readily available because corporations, limited liability companies and similar U.S. entities, as well as those same foreign entities that register to do business in the United States, will be required to submit, as part of the company formation or registration process, a report to FinCEN that includes specific identification information for each “beneficial owner.” A beneficial owner is defined as any individual who (a) exercises substantial control over an entity or (b) owns or controls 25% or more of the ownership interests of an entity. Several exclusions exist, including an individual acting as an agent for another individual and an individual acting solely as an employee.
  • Reviewing the whistleblower program. AMLA establishes a whistleblower reward program for suspected violations of the BSA. The program is similar in some ways to the whistleblower program at the Securities and Exchange Commission (“SEC”): tipsters who provide original information that leads to an enforcement penalty of more than $1 million would be eligible for a reward as high as 30% of the collected total. Also, reporting tips would allow that individual to claim anti-retaliation protections included under AMLA. Specifically, in the event of a violation of these provisions, the whistleblower can file a complaint with the Department of Labor and seek recourse in federal district court if it is not adjudicated within a certain period.
  • Building a case for better resources and technology. The right compliance system must be equipped with the requisite capabilities and use the latest technology tools to monitor transactions and identify suspicious activities. Regulators expect the use of the most sophisticated detection technology that an organization can afford and manage.
  • Updating policies and procedures. Poorly written or inadequate policies and procedures were frequently cited by the SEC and FINRA as a root cause of other issues within the AML program. Considering the aforementioned combined with the recent pandemic (i.e., remote work environment), a review of policies, procedures and processes are strongly suggested. Throughout this exercise, red flags indicative of fraud, specifically money laundering or terrorist financing, should be identified.
Closing

While there has been much focus on using cryptocurrency to launder money, it is essential to remember and not to lose focus that “cash” is still the preferred medium for money launderers.

There needs to be a change in thinking, bringing “fraud” into the conversation regarding regulatory compliance and specifically money laundering. Those that genuinely understand money laundering will know it’s a tool a fraudster uses to execute their plan. This is why understanding the Triangle of Fraud Action (see below) is vital when analyzing an anti-money laundering program.

  • The act
  • The concealment
  • The conversion of illegally gained proceeds (i.e., “dirty money”)

Cryptocurrency and money laundering: why understanding fraud is critical (1)

Even better, combining the Triangle of Fraud Action (“What based”) along with the Fraud Pentagon (“Why based”) creates the Advanced Meta-Model of Fraud™ and this becomes the basis for not only analyzing the anti-money laundering program, but also for developing programs, controls and oversight that can now be designed with greater precision to reduce risk and enhance the likelihood of meeting specific objectives.

Remember, anti-money laundering programs are based on “five pillars” that a system of internal controls, policies, and procedures and not understanding fraud could expose your organization.

Cryptocurrency and money laundering: why understanding fraud is critical (2)

Lastly, we noted a theme of a failure to conduct adequate independent AML testing from reviewing recent enforcement actions. Under FINRA rules, an independent function (e.g., internal audit or a qualified third party, like Baker Tilly ) should conduct an annual review of the program. Many don’t realize that reviews conducted by the compliance team will not satisfy the requirement.

Baker Tilly’s team of experienced financial crime and compliance professionals can help with most issues financial institutions face today – such as risk assessments, drafting or enhancing policies and procedures, the selection of technology, customized training at all levels, tuning of models, lookbacks, investigations, compliance reviews and internal audits. We are the thought leaders who are the practicing professionals needed on your team.

To learn more about financial crime or how Baker Tilly can help, contact our team.

Cryptocurrency and money laundering: why understanding fraud is critical (2024)

FAQs

How does the use of cryptocurrency influence the ability to commit fraud? ›

How is crypto used to defraud? The use of crypto in a business's regular operations provides new opportunities for dishonest individuals to perpetrate fraud. In fraud cases involving crypto, it was most commonly used to make bribery and kickback payments (48%) and to convert stolen assets (43%).

What are some of the fraud that could be perpetrated using cryptocurrencies? ›

Improper market manipulation may include spoofing, front-running, churning, and other schemes.

How do you deal with cryptocurrency fraud? ›

You can also directly contact the crypto exchange you use. Find out if they offer fraud prevention or have other measures to protect your crypto assets and money.

Who investigates cryptocurrency fraud? ›

The Department of Justice and the Securities and Exchange Commission (SEC) and CFTC investigate cryptocurrency violations.

What role does cryptocurrency play in money laundering? ›

The hackers typically gain access to exchange wallets through phishing attacks and malware. After acquiring the cryptocurrencies, they launder the funds through a web of transactions across different exchanges and countries. They use mixers and privacy coins to further obscure the trail.

Do you think cryptocurrency facilitates fraud or criminal activity such as money laundering? ›

Cryptocurrencies have been adopted as part of money laundering schemes and are particularly associated with several predicate offences including fraud and drug trafficking. They are also widely used as a means of payment for illegal goods and services offered online and offline.

How does crypto reduce fraud? ›

Blockchain technology facilitates real-time monitoring by providing instant access to transaction records across the network. This enables organizations to track and analyze transactions in real-time, allowing them to detect and prevent fraud as it occurs.

How to detect fraud in crypto? ›

Preventing cryptocurrency scams

As with any financial fraud, preventing crypto scams is a challenge. But, AI is one of the most valuable tools in identifying potential crypto scams. Machine learning can analyze large amounts of data, detect patterns, and spot potential scams.

How do criminals exploit cryptocurrencies? ›

Money laundering

By using ICOs criminals launder these funds by buying tokens off of legitimate investors and selling them. This issue is intensified through the lack of measures against money laundering implemented by centralized cryptocurrency-exchanges.

Is crypto fraud a felony? ›

A new mandate requires U.S. citizens to report any digital asset transactions worth more than $10,000 within 15 days. Failure to comply with this directive could result in felony charges, marking a stringent step towards cryptocurrency regulation in the United States.

Is crypto fraud legal? ›

Although crypto fraud is complex and highly case-specific, certain legal remedies have become vital to recovering stolen assets. These include tracing stolen funds or property and obtaining various injunctive orders through the courts.

Who deals with crypto fraud? ›

The MIMF Unit is a national leader in prosecuting fraud and market manipulation involving cryptocurrency.

How is fraud committed by cryptocurrency? ›

A fraudster calls and shows you a fraudulent crypto investment website. They convince you to invest based on a fake potential growth. In many cases, you will only realise the money cannot be withdrawn after a long period of investment time.

Can FBI help with crypto fraud? ›

Members of the public who believe they are victims of a cybercrime – including cryptocurrency scams, romance scams, investment scams, and “pig butchering” fraud scams – should contact the FBI's Internet Crime Complaint Center at https://www.ic3.gov.

Can you sue someone for crypto fraud? ›

A cryptocurrency lawsuit involves legal action taken due to fraud, hacking, or disputes related to digital assets. Cases can be filed against exchanges, ICO promoters, or individuals. Legal actions may cover misrepresentation, breach of contract, security failures, and unauthorized access. 2.

Why is there so much fraud in cryptocurrency? ›

"This is where the crooks pressure you to purchase, trade or store digital assets — such as cryptocurrency — on fraudulent exchanges," Werner said. Cryptocurrency is an unregulated investment space that federal regulators and consumer advocates have long said makes it ripe for fraud.

Can cryptocurrency be fraud? ›

Key Points. Digital assets are not inherently a scam, but they can attract scammers because of their complexity and profit potential. There are crypto versions of classic scams, such as phishing attacks, Ponzi schemes, and pump-and-dump manipulations.

How does cryptocurrency affect cyber security? ›

Your Cryptocurrency Account Security

It's highly risky because it's so easy for hackers to access a person's computer. And once a key is stolen, there's no getting it back. It's like having a credit card with no authentication check. That money is gone for good."

Top Articles
Affirm Help Center – Search for answers and contact us
How GPUs Accelerate Deep Learning | Gcore
Gamevault Agent
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Free Atm For Emerald Card Near Me
Craigslist Mexico Cancun
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Doby's Funeral Home Obituaries
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Select Truck Greensboro
How To Cut Eelgrass Grounded
Craigslist In Flagstaff
Shasta County Most Wanted 2022
Energy Healing Conference Utah
Testberichte zu E-Bikes & Fahrrädern von PROPHETE.
Aaa Saugus Ma Appointment
Geometry Review Quiz 5 Answer Key
Walgreens Alma School And Dynamite
Bible Gateway passage: Revelation 3 - New Living Translation
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
Dmv In Anoka
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Umn Biology
Obituaries, 2001 | El Paso County, TXGenWeb
Cvs Sport Physicals
Mercedes W204 Belt Diagram
Rogold Extension
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Colin Donnell Lpsg
Teenbeautyfitness
Weekly Math Review Q4 3
Facebook Marketplace Marrero La
Nobodyhome.tv Reddit
Topos De Bolos Engraçados
Electric Toothbrush Feature Crossword
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Holzer Athena Portal
Hampton In And Suites Near Me
Stoughton Commuter Rail Schedule
Bedbathandbeyond Flemington Nj
Free Carnival-themed Google Slides & PowerPoint templates
Otter Bustr
Used Curio Cabinets For Sale Near Me
San Pedro Sula To Miami Google Flights
Selly Medaline
Latest Posts
Article information

Author: Rueben Jacobs

Last Updated:

Views: 5658

Rating: 4.7 / 5 (57 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Rueben Jacobs

Birthday: 1999-03-14

Address: 951 Caterina Walk, Schambergerside, CA 67667-0896

Phone: +6881806848632

Job: Internal Education Planner

Hobby: Candle making, Cabaret, Poi, Gambling, Rock climbing, Wood carving, Computer programming

Introduction: My name is Rueben Jacobs, I am a cooperative, beautiful, kind, comfortable, glamorous, open, magnificent person who loves writing and wants to share my knowledge and understanding with you.