quora
Explore More

Shufti globally launches webinr-icon - a new kind of identity solution!

Shufti globally launches - a new kind of identity solution!

Read more

How can AML play a role to impede the financing of terrorism?

Anti-money-laundering

Money Laundering and Terrorism Financing are global issues and there is no dispute regarding it. Every year, billions of dollars are lost due to money laundering. According to a study by UN Office on Drugs and Crime, the estimated amount of money laundered worldwide per annum is 2 – 5% of global GDP, or $800 billion – $2 trillion in current US dollars. Money laundering and financing of terrorism have been going on for a very long time. Keeping in mind the immense loss that has to be encountered, global regulatory authorities set up compliances that were required to be followed by all financial institutions and banks. But before going into that detail, let’s get a glimpse of when were the AML and CFT regulations initially introduced?

Money Laundering

Background of Money Laundering and the Financing of Terrorism

On 9/11, 2001, a tragic terrorist attack took place in which 19 militants related to the extremist group al Qaeda hijacked four airplanes and administered suicide attacks against targets within the United States. Two of the planes were flown into the dual towers of the World Trade Centre in New York City, a 3rd plane crashed into the Pentagon just outside Washington, D.C., and the fourth plane crashed in an open field in Shanksville, Pennsylvania.

Approximately 3,000 people lost their lives during the September terrorist attacks, which led to major U.S. initiatives to fight terrorism under the presidency of George W. Bush.

To carry out the attack, the 9/11 planners spent between $400,000 and $500,000, which was majorly provided by al Qaeda. Albeit the origin of the funding is undisclosed, detailed inquiry has unveiled about the financial transactions that supported the attack.

The hijackers and their financial facilitators used the anonymity provided by the international and domestic financial system to channel their funds via a number of hidden transactions. 

Although the existing financial mechanisms of the country were strong enough to prevent the misuse of the system they were not designed to identify and obstruct transactions that financed state terrorism.

This ultimately led to the development of the KYC process and AML regulations as key components of the US Patriot Act, 2001. Later on, in 2005 the Reserve Bank of India made it mandatory for banks across the globe to adopt these guidelines to prevent the financing of illegal activities.

Read more: 24 scammers arrested on money laundering charges

Introduction of Financial Regulations

International authorities such as FATF and world bank are working with national authorities such as GDPR, FinCEN, FCA, FINMA, etc. and state banks to keep a close check on money laundering activities. Most of the countries are following the guidelines of the financial regulatory authorities such as FATF in impeding crimes such as money laundering.

The Financial Action Task Force or FATF is a global body that provides suggestions to countries with respect to their efforts to restrict terrorist financing and money laundering. The countries mostly follow the 40 recommendations of the FATF to prevent money laundering.

Governments and financial institutions have huge datasets of information regarding their citizens and these lists are regularly updated.

The lists are provided to law enforcement agencies in case any illegal activity is done by an individual, to bring them under the law. 

Read more: Financial regulators assure further assistance to the industry during COVID-19

Techniques to Counter the Financing of Terrorism

Traditionally, financial Institutions would examine government-issued identification documents like a driver’s license and/or passport. These documents, generally, should essentially display an image as well as other identification data of the individual. Best practices, however, involve the displaying of multiple documents to diminish the risks presented by counterfeit and fraudulently obtained documents.

Read more: The Definitive Guide to Anti-Money Laundering & Countering of Terrorist Financing

In today’s online era, when consumers deeply value convenience and instantaneity, a visit to the bank to line up an account may be too inconvenient. So why create difficulties for customers, and asking them to physically present themselves, when there are easier and convenient ways to verify themselves online?

Identity verification service providers have built digital identity verification software that seamlessly authenticates the identity of individuals in a couple of seconds. These systems usually involve the use of cutting-edge AI technology that digitally verifies if the individual actually is who they claim to be or not. To make it certain, the software requires the user’s identification details which could be done through facial verification, document validation, address authentication, 2-factor authentication, and consent verification. These digital identity verification techniques conduct an in-depth analysis of the profile of the users to see if they are involved in any sort of money laundering or terrorism financing activities. 

The software usually attains information from various data sets and sanction lists that are regularly updated by the international authorities. On-going AML checks can also be adopted to keep a close check on the Politically Exposed Persons or people with a history of suspicious activities.

Wrapping Up…

Money Laundering and the Financing of Terrorism are menaces in our society that need to be eradicated entirely. But this cannot be achieved immediately. It takes years of hard work, technology, policy formulation, compliances, and most importantly, the sheer will to fight these hazards. We should all stand united with our authorities and agencies to catch money launderers, terrorism financiers, and criminals. One of the most effective methods of doing this is by incorporating digital KYC verification into our systems and business processes.

Related Posts

Blog

Leveling Up Identity Verification To Meet This Moment

Evolution has always been a defining trait of the identity verification space. The COVID-19 pande...

Leveling Up Identity Verification To Meet This Moment Read More

Blog

A Fintech’s Journey to 100% Compliance and Rapid Growth

Read on to learn about the keys to My EU Pay’s success. Staying Competitive as a Fintech Founded ...

A Fintech’s Journey to 100% Compliance and Rapid Growth Read More

Blog

Identity Verification Isn’t Just for Compliance Anymore

As the article indicates, that fight involves identity verification becoming a mainstream phenome...

Identity Verification Isn’t Just for Compliance Anymore Read More

Blog

The State of Fraud Detection & Prevention in 2024 | Ready, Set, Fraud

Decoding the 2023 Fraud Landscape | Analyzing Shufti’s Millio...

The State of Fraud Detection & Prevention in 2024 | Ready, Set, Fraud Read More

Blog

Revolutionizing the Finance Sector | VKYC’s Impact on Identity Verification in 2024

Video KYC (VKYC) is a method of verifying the identity of an individual or entity by leveraging v...

Revolutionizing the Finance Sector | VKYC’s Impact on Identity Verification in 2024 Read More

Blog

A 2024 Overview of Identity Document Forgery

What is Document Forgery: The Common Types  Identity document forgery is a serious crime that can...

A 2024 Overview of Identity Document Forgery Read More

Blog

Harnessing the power of AML Screenings to Uncover Politically Exposed Persons [PEPs]

The acronym Politically Exposed Persons [PEPs] first emerged in the 1990s, known as Senior Foreig...

Harnessing the power of AML Screenings to Uncover Politically Exposed Persons [PEPs] Read More

Blog

Elevated Business Security: A Comparative Analysis of Identity Proofing and Identity Verification

In general, identity proofing and identity verification are essentially the same processes, as th...

Elevated Business Security: A Comparative Analysis of Identity Proofing and Identity Verification Read More

Blog

Leveling Up Identity Verification To Meet This Moment

Evolution has always been a defining trait of the identity verification space. The COVID-19 pande...

Leveling Up Identity Verification To Meet This Moment Read More

Blog

A Fintech’s Journey to 100% Compliance and Rapid Growth

Read on to learn about the keys to My EU Pay’s success. Staying Competitive as a Fintech Founded ...

A Fintech’s Journey to 100% Compliance and Rapid Growth Read More

Blog

Identity Verification Isn’t Just for Compliance Anymore

As the article indicates, that fight involves identity verification becoming a mainstream phenome...

Identity Verification Isn’t Just for Compliance Anymore Read More

Blog

The State of Fraud Detection & Prevention in 2024 | Ready, Set, Fraud

Decoding the 2023 Fraud Landscape | Analyzing Shufti’s Millio...

The State of Fraud Detection & Prevention in 2024 | Ready, Set, Fraud Read More

Blog

Revolutionizing the Finance Sector | VKYC’s Impact on Identity Verification in 2024

Video KYC (VKYC) is a method of verifying the identity of an individual or entity by leveraging v...

Revolutionizing the Finance Sector | VKYC’s Impact on Identity Verification in 2024 Read More

Blog

A 2024 Overview of Identity Document Forgery

What is Document Forgery: The Common Types  Identity document forgery is a serious crime that can...

A 2024 Overview of Identity Document Forgery Read More

Blog

Harnessing the power of AML Screenings to Uncover Politically Exposed Persons [PEPs]

The acronym Politically Exposed Persons [PEPs] first emerged in the 1990s, known as Senior Foreig...

Harnessing the power of AML Screenings to Uncover Politically Exposed Persons [PEPs] Read More

Blog

Elevated Business Security: A Comparative Analysis of Identity Proofing and Identity Verification

In general, identity proofing and identity verification are essentially the same processes, as th...

Elevated Business Security: A Comparative Analysis of Identity Proofing and Identity Verification Read More

Take the next steps to better security.

Contact us

Get in touch with our experts. We'll help you find the perfect solution for your compliance and security needs.

Contact us

Request demo

Get free access to our platform and try our products today.

Get started