Following the Money to Combat Terrorism, Crime and Corruption

Similar documents
THE ISLAMIC STATE AND ITS HUMAN TRAFFICKING PRACTICE

International Organization for Migration (IOM) Migrant Smuggling as a Form of Irregular Migration

Note to Ad Hoc Group members: Working Group on the Disruption of Criminal Networks involved in People Smuggling and Trafficking in Persons

COUNCIL OF THE EUROPEAN UNION. Brussels, 29 October /09 JAIEX 79 RELEX 981 ASIM 114 CATS 112 JUSTCIV 224 USA 93 NOTE

Montessori Model United Nations. Distr.: Middle School Twelfth Session XX March Security Council

WCAML Forum. The Challenges of Terrorist Financing in 2014 and Beyond. May 7, Dennis M. Lormel President & CEO DML Associates, LLC

Addressing Emerging Terrorist Threats and the Role of UNODC

Security Council. Topic B: Protection of Natural Resources and Cultural Heritage from Terrorism and Transnational Organized Crime

UN Security Council Resolution on Foreign Terrorist Fighters (FTFs)

MASTER OF ARTS IN THE FIELD OF MIDDLE EAST STUDIES

EPP Policy Paper 1 A Secure Europe

Title of Presentation. Global Threat Brief President / CEO Global Guardian

REGIONAL PROGRAMME TO COMBAT CRIMINAL & TERRORIST THREATS AND STRENGTHEN CRIMINAL JUSTICE & HEALTH SYSTEMS IN LINE WITH INTERNATIONAL STANDARDS ON

Criminological Theories

Role of Security Sector and Civil Society in Responding to and Preventing VE

Countering Illicit Arms Trafficking and its Links to Terrorism and Other Serious Crime UNODC s Global Firearms Programme

Terrorism in Africa: Challenges and perspectives

ROSMUN 2017 Rosary Sisters High School Model United Nations

Next- Generation National Security and Public Safety in Europe

PC.DEL/764/08 15 September ENGLISH only

epp european people s party

Dirty Entanglements: Corruption, Crime and Terrorism Louise Shelley

Adopted by the Security Council at its 6557th meeting, on 17 June 2011*

Adopted by the Security Council at its 7598th meeting, on

White Paper of the Interagency Policy Group's Report on U.S. Policy toward Afghanistan and Pakistan INTRODUCTION

Roma Lyon Group s First Report on the Implementation of the G7 Action Plan on Countering Terrorism and Violent Extremism

US-Mexico Cooperation Against Organized Crime

Montessori Model United Nations. Distr.: Upper Elementary Eleventh Session XX September Sixth Committee Legal

Agenda: Protecting and Promoting Human Rights to Prevent and Counter Violent Extremism

TURKEY Check Against Delivery. Statement by H.E. Sebahattin ÖZTÜRK Minister of Interior / Republic of Turkey

Vienna, 25 and 26 June 2003

Confronting the Terror Finance Challenge in Today s Middle East

Good afternoon. I want to thank Dr. Robert Satloff for his invitation to speak to you today.

G8 Declaration on Counter Terrorism

INTER-AMERICAN COMMITTEE AGAINST TERRORISM (CICTE) Washington, D.C. 13 March 2013 Original: Spanish DECLARATION

Eurojust Basic Q & A

I. INSTITUTIONAL BUILDING / NATIONAL ANTI-DRUG STRATEGY

Finland's response

Measures to prevent the recruitment and radicalization of young persons by international terrorist groups

Boko Haram I. Background Boko Haram is an islamic terrorist group that is primarily ran out of Nigeria and is also

Adopted by the Security Council at its 5907th meeting, on 11 June 2008

United Nations Regional Centre for Preventive Diplomacy for Central Asia (UNRCCA) Programme of Action for

Sanctions in the Geopolitical Landscape

Section 1222 Report: Strategy for the Middle East and to Counter Violent Extremism

Understanding the Transnational Criminal Organization

Recalibrating the Anti-ISIS Strategy. The Need for a More Coherent Political Strategy. Hardin Lang, Peter Juul, and Mokhtar Awad

Statement of Mr. Vladimir Voronkov, Under-Secretary-General of the United Nations Office of Counter-Terrorism

Hidden Costs of Crime: Quantifying the Economic Impact of Illicit Trade on Business and Investment

The nexus between human trafficking and terrorism

ASEAN Regional Forum. Work Plan for Counter Terrorism. and Transnational Crime

International Legal Framework on Counter-Terrorism As applicable to Pakistan

NMUN NY 2015 CONFERENCE A

A New Authorization for Use of Military Force Against the Islamic State: Comparison of Proposals in Brief

Europol External Strategy. Business Case: Cooperation with Brazil

Transnational Organized Crime Manuel Eising, Policy & Co-ordination Officer OSCE Transnational Threats Department

Committee: International security and disarmament Question of: Measures to reduce International Weapons Trafficking to Radical Terrorist Organizations

Recommendation for a COUNCIL DECISION

BENEFITS OF THE CANADA-EU STRATEGIC PARTNERSHIP AGREEMENT (SPA)

Report on links between Terrorism and Transnational Organized Crime. Ana SALINAS DE FRIAS. Chair of Public International Law, University of Málaga

Speech by Prime Minister Erna Solberg at the UN Crime Commision-meeting i Vienna, 14 May 2018.

Twelfth United Nations Congress on Crime Prevention and Criminal Justice

Written Testimony. Submitted to the British Council All Party Parliamentary Group on Building Resilience to Radicalism in MENA November 2016

INTER-AMERICAN COMMITTEE AGAINST TERRORISM (CICTE)

Cover Story. - by Shraddha Bhandari. 24 JANUARY-FEBRUARY 2016 FSAI Journal

After the Fall of Daesh in Syria and Iraq: Counter-Radicalisation

Measures to eliminate international terrorism

9 th Session of the Conference of the Parties to the United Nations Convention against Transnational Organized Crime October 2018

Model United Nations College of Charleston November 3-4, 2017

Thirteenth United Nations Congress on Crime Prevention and Criminal Justice

IPB Congres War in Syria and The Future Of the Middle-East 30/09-03/ Haytham Manna

Chair s Statement 1. Strengthening Partnership for Peace and Sustainable Development

UNIÃO AFRICANA P.O. Box: 3243, Addis Ababa, Ethiopia, Tel.: (251-11) Fax: (251-11)

La politica di contrasto alla criminalità organizzata nell Unione Europea. 19 Dicembre 2015

Overview of the Afghanistan and Pakistan Annual Review

Situation in Iraq and Syria and the IS offensive including the persecution of minorities

PROTECTING CULTURAL HERITAGE

Al-Iktissad Wal-Aamal Beirut, december 15-16,2015

Drug trafficking and the case study in narco-terrorism. "If you quit drugs, you join the fight against terrorism." President George W.

Concept Note: Preventing of ideas radicalization Author: Séraphin ALAVA

National Strategy. for. of the United States of America

Resolution adopted by the General Assembly on 13 June [without reference to a Main Committee (A/68/L.50)]

S/2003/487. Security Council. United Nations

The Future Evolution of Transnational Criminal Organizations and the Threat to U.S. National Security. Celina B. Realuyo

Brussels VIENNA. Cairo. Dakar. Abuja. Pretoria - COUNTRY OFFICE

Combating Transnational Organized Crime

Recommendation for a COUNCIL DECISION

Unifying Europe: Consensus-Building on Migration and Terrorism. December 2017 PREAMBLE

14406/15 EB/dk 1 DGD 1C

UNITED NATIONS HEADQUARTERS, NEW YORK WEDNESDAY, 5 APRIL 2017, A.M. Ali Rached INTERPOL Counter-Terrorism Directorate

ROMANIA - FOREIGN RELATIONS AND NATIONAL SECURITY

Statement by. President of the Republic of Latvia

2014 GLOBAL TERRORISM INDEX

2017 ASEAN COMPREHENSIVE PLAN OF ACTION ON COUNTER TERRORISM

Official website of the Department of Homeland Security Contact Us Quick Links Site Map A-Z Index

Opening Statement Secretary of State John Kerry Senate Committee on Foreign Relations December 9, 2014

Chapter 8: Political Geography. Unit 4

INTERNATIONAL CONVENTIONS

Román D. Ortiz Coordinador Área de Estudios de Seguridad y Defensa Fundación Ideas para la Paz Bogotá, Abril 30, 2009

Comments on the Draft Additional Protocol to the Council of Europe Convention on the Prevention of Terrorism

Strengthening Cooperation in the Struggle against Terrorism and Organized Crime

Transcription:

Following the Money to Combat Terrorism, Crime and Corruption ACAMS Houston Chapter April 19, 2017 Celina B. Realuyo Professor of Practice William J. Perry Center for Hemispheric Defense Studies, National Defense University Senior Fellow, Joint Special Operations University professorcelina@gmail.com Twitter @CRealuyo Disclaimer: The views expressed in this presentation are those of the speaker and do not reflect the official policy or position of the William J. Perry Center for Hemispheric Defense Studies, National Defense University, Department of Defense, or the U.S. Government.

Leading National Security Concerns in 2017 Anti-Globalization Wave ISIL in Syria & Iraq and Beyond Sunni-Shia Divide A Rising China Drug Violence Migration Crisis in Latin America Corruption and the Panama Papers EU-BREXIT Terrorism Refugee Crisis Russian Adventurism U.S. and NATO in Afghanistan Nuclear Proliferation Cybersecurity and Emerging Technologies

Illicit Networks are Empowered by Globalization Source: LA Times

Global Supply Chain Management Four Critical Elements MATERIEL What is Moving? What Resources are Accessed? How is Technology Used? MONEY Who is Funding? How is Revenue Generated? Where is Money Going? MANPOWER Who is Moving? Who is in Control? Who is Enabling? MECHANISMS What Modes of Conveyance? Land, Air, Sea routes? What about Cyberspace? Source: Source: Celina Celina B. Realuyo B. Realuyo

The Threats from Illicit Networks in the Americas NORTHBOUND DRUGS PEOPLE SOUTHBOUND MONEY ARMS

Human Migration Routes in the Americas SOURCE: MISSING MIGRANTS PROJECT, INTERNATIONAL ORGANIZATION FOR MIGRATION

Human Smuggling vs. Human Trafficking An immigration crime across borders Voluntary and involved in the act Pay a fee to smugglers The objective is to find economic opportunity or join family A crime against a person and his/her human rights Not voluntary Involves fraud, coercion, and violence A persistent crime like slavery Source: US State Department Trafficking in Persons Report

Panama Papers, Offshores, PEPs

The Far Reach of the Odebrecht Scandal across Latin America

Critical Enablers of Illicit Networks LEADERSHIP ENVIRONMENT ILLICIT ACTIVITIES TECHNOLOGY Illicit Networks LOGISTICS WEAPONS PERSONNEL FINANCING

Understanding Threat Financing Flows Raise Spend Move Store

Money Laundering and Terrorist Financing Methods Banks Trade-Based Money Laundering Bulk Cash Smuggling Money Services Businesses Mobile Internet Banking Store of Value Front Companies

Following the Money Trail of La Maestra Elba Esther Gordillo, The Teacher, arrested February 2013 for skimming $200mm from the bank accounts of the National Union of Education Workers for herself.

Bulk Cash Smuggling

MSBs and Casas de Cambio

Trade-Based Money Laundering

Opportunities and Risks with Free Trade Agreements: NAFTA, Colombia and Panama

Money Laundering through Front Companies and Authentic Entreprises

FINTECH and Virtual Currencies Fuente: Celina B. Realuyo, WJPC RealuyoC@ndu.edu

Counter Threat Finance Strategy MISSION To deny terrorists and criminals the financial means to plan and execute their activities by detecting, disrupting, and dismantling their financing networks through three pillars: 1. law enforcement and intelligence operations 2. public designations/asset freezes 3. capacity building

The Convergence of Illicit Networks Facilitators Terrorists Criminals

The Convergence of Terror-Crime Networks Taliban, Haqqani Network, Al Qaeda in Afghanistan ISIS in Iraq, Syria, and Beyond Al Qaeda in the Arabian Peninsula Al Shabaab in East Africa Boko Haram in Nigeria FARC and BACRIM in Colombia Hezbollah and its Global Facilitators

ISIS: Auto-Financed Criminalized State

U.S. Strategy to Degrade and Destroy ISIL Nine Lines of Effort to Counter ISIL November 2014 1.Supporting Effective Governance in Iraq 2.Denying ISIL Safe-Haven 3.Building Partner Capacity 4.Enhancing Intelligence Collection on ISIL 5.Disrupting ISIL s Finances 6.Exposing ISIL s True Nature 7.Disrupting the Flow of Foreign Fighters 8.Protecting the Homeland 9.Humanitarian Support Source: The White House

Promoting National and International Efforts in the Three Spheres of the Campaign against ISIS Ideological Physical Financial

Source: The New York Times October 2015 Leverage the Financial Instrument of National Power to Counter ISIS

The Islamic State as the Richest Terrorist Group: Sources of Financing Banks Extortion Oil Revenue Agriculture Human Trafficking Donors/Internet Antiquities

Composition of ISIS Sources of Financing

The Islamic State as the Richest Terrorist Group Revenue Source: Extortion of Those Occupied

ISIS Oil Smuggling Routes and Revenues

Human Trafficking and Kidnap for Ransom

Destruction of Ancient Sites and Antiquities Looting

U.S. Strategy to Destroy ISIS in Iraq and Syria The Role of the Armed Forces ($12.5m cost per day)

November 13, 2015

September 26, 2016

Operation Tidal Wave II against ISIS Oil and Financial Assets

The Expansion of ISIS Beyond Iraq and Syria Inspired vs. Directed Attacks BRUSSELS, BELGIUM SAN BERNARDINO, CALIFORNIA ORLANDO, FLORIDA NEW YORK/NEW JERSEY PARIS and NICE, FRANCE GERMANY TURKEY AFGHANISTAN BANGLADESH THAILAND NORTH AFRICA Source: The New York Times June 2015

Source: The Brookings Institution ISIS Foreign Fighter Flows and Threat from Returnees

Presidential Memorandum Plan to Defeat the Islamic State of Iraq and Syria (1/28/17) Within 30 days, a preliminary draft of the Plan to defeat ISIS shall be submitted to the President by the Secretary of Defense. The Plan shall include: (A) a comprehensive strategy and plans for the defeat of ISIS; (B) recommended changes to any United States rules of engagement (C) public diplomacy, information operations, and cyber strategies to isolate and delegitimize ISIS and its radical Islamist ideology; (D) identification of new coalition partners in the fight against ISIS and policies to empower coalition partners to fight ISIS and its affiliates; (E) mechanisms to cut off or seize ISIS's financial support, including financial transfers, money laundering, oil revenue, human trafficking, sales of looted art and historical artifacts, and other revenue sources; (F) a detailed strategy to robustly fund the Plan. Source: The White House

The New Global Security Environment U.S. Responses to Transnational Threats TRANSNATIONAL THREATS TO BE WRITTEN OR UPDATED BY NEW ADMINISTRATION Counter-Terrorism Counter- Proliferation Counter-Narcotics Cybersecurity Counter-Crime

Partnering to Combat the Convergence of Illicit Networks Countering Violent Extremism Homeland Security and Critical Infrastructure Protection Cybersecurity and Privacy Leveraging the Financial Sector to Combat Terrorist Financing

Partnering with Private Sector to Counter Violent Extremism and Recruitment via Social Media

Partnering with Private Sector to Counter Terrorist Financing and Money Laundering

Role of Average Citizens in September 17 New Jersey and New York Bombings Case

The New Global Security Environment Fostering a Whole of Nation Approach to National Security C3 THROUGH P3 Private Sector Public Sector Civic Sector COMMUNICATE, COOPERATE, COLLABORATE

The New Global Security Environment and the Convergence of Illicit Networks