Relevant points for Standard Operating Procedures (SOP) for Analysis and dissemination
Legal aspect
Article13/1/ of the proclamation No 780/2013 states that the center has the mandate to collect, receive, store, survey, analyze and disseminate information concerning suspected money laundering and financing of terrorism.
Source of information
-Reporting entities
Banks have been reporting CTRs on weekly bases and STR within three days after detected to the Information System and Financial Security Directorate (ISFSD). The ISFSD is responsible to check whether reporting entities fulfill the requirement while receiving reports from banks. Once the ISFSD confirms its standard, it transfers to the Financial Transactions Examination and Analysis Directorate (FTEAD) through the Deputy General Director or directly.
Input from Reporting Entities: 1. STR 2. CTR 3. Electronic Transfer Report (ETR) 4. Wire Transfer Report (WTR)
- Self-generated cases: Informants & Media
Information also generated from informants through the DG and DDG
-Law enforcement agencies[CGCC1]
-Foreign FIUs
Main activities of FTEAD
The directorate is responsible to analyze and disseminate cases to relevant low enforcement agencies. To conduct these activities, the FTEA directorassigns STRs to experts for examination and analysis in line with the direction that has been given by the deputy director general of the center.Experts are required toapply principles of handling of sensitive information and Ensuring preserving confidentiality of information and using intelligence[CGCC2]. The directorate also responsible developingstrategic intelligence reports to show methodologies and trends of the crimes.
23.Confidentiality
The officers, employees and seconded personnel of the Center, and any other persons who obtain through legitimate and legal means information in the possession of the Center may not disclose the information, except as provided under this Proclamation.
Step one: Search from data base and other sources for additional financial transactions;
Experts usually start examination weather there is any connectionwith the data already available STR and CTR reports that are previously collected. Moreover analysts’ are also required searching from open sources/websites or others/ for additional information such as company and business formation, associations and others.
Step two: Information request from GO and NGO
Analysts are responsible to develop action plan to collect additional information from banks or governmental agencies that have mandate to give license and legal documents.These areministry of trade, investment office, Ethiopian Revenue and Customs Authority and others.
Step three: Look for patterns of the crime
Analysts have to assess the intelligence to organize and identify main targets involved in criminal activity, the source and flowmoney,association between conductors and individuals who are laundering funds. Most importantly, analystsare expected to come up with identifying predicate offence of the crime and crime patters of the case. They also classify evidences including information gaps and possible law enforcement agency who can handle the case.
Step four: Prepare final report
Analystsare required to prepare a summary report which is submitted to the Director of FTEAD based on the report format. The director examines the effort experts invested on it. Accordingly, the director forwards comment on uncovered area if there is at all. Then final report is sent to the general director and the deputy general director for approval. Finally the director disseminates to the proper law enforcement agency including relevant documents and covering letter.
In the other side,there is a possibility to hold cases when the final analysis resulted in wider information gab or when the case is lesssensitive.
Step five: Receive feedback
Although the directorate hasn’t prepared a feedback format yet, it had been receiving request from the federal police investigation team that demands additional evidences for cases that had already been disseminated by FIC.
On-site Supervision (compliance)
- Letter notifying inspection planned in person
- Auditor unit – on-site audit
- Desk assessment
- Check list
- Benchmark
- Size of bank
- Asset
- Employee
- No of STR/CTR reported
- Letter of improvement areas
- Sanction measures committee
25.Investigative Techniques
1/For the purpose of obtaining evidence of money laundering or financing of terrorism or tracing proceeds of crime, the judicial organs may authorize crime investigation authorities, for a specific period:
Note
These steps can’t be applied to terrorist financing reports since the nature of the crime is sensitive[CGCC3].
Flowchart
Initial Clarifications re: Analysis Flowchart steps
Pre-Analysis:
Input
Receiving (see 1st day notes- intake)
Analysis Flowchart SOPs
**Before analysis can begin, an officer receives the STR to confirm whether mandatory information is there. This is acknowledge of receipt.
- Initial Assessment and matching
- Search FIC Database as part of
- Search/Analysis Planning
- Information and source evaluation
- Begin movement and tracking of STR (be sure to document)
- Director assigns STR to analyst
- Understanding the case
- Completeness of STR and all 6 parts
- Address
- Suspected entity
- Transaction
- Link
- Opinion of compliance officer
- Attachment
- Set hypothesis - optional
- Initial hypothesis Collection Analysis
- Optional for analyst to form hypothesis based on his/her background and expertise.
- Analyst should not collect information in a biased manner in order to support one hypothesis[CGCC4].
- Search Planning
- Search FIC Database
- Analyst is authorized to search database regarding individual named in STR
- Check external databases - open, government organization [CGCC5]database
- Ex: Civil Status Division, registrar companies and general, national transport authority, customs database, tax system, cash info from customs, customs imports and exports, adverse information from open sources, commercial database such as World Check
- Collection of information
- Organization of information
- Sources and contact
- Required data and information
- Timing
- Responsibility
- Request external information from private, reporting entity
- Analyst must get approval from superior for sensitive cases
- Format for requesting information from external institutions – to determine
- Informal – good relationship with institutions
- No ability to control information from reporting institution - danger of losing information
- Depends on integrity of intelligence officer
- Official – request
- Lose confidentiality through documentation department
- Who provides approval? DG, or Senior Analyst
- Who can authorize from which organization?
- Timeframe for analyst to submit request
- At what time is response [CGCC6]expected?
- Source evaluation to determine validity
- If information is not correct, begin collection #2.
- Insert FIU Mauritius Intelligence Report matrix - 5 criteria regarding reliability of information
- Define indicators on each parameter
- Understanding pattern
- FATF Typologies
- What, how and why ML/TF linked?
- Technical Analysis
- Linking of sources and operators
- Linking of funders and sources
- Linking between people and addresses
- Preparation of report – format
- Base information on documents already collected, though gaps remain due to administrative style of the FIC.
- The pattern of the crime is observed during the process
- With regards to analysts – they should identify gaps, what information is missing? What has yet to be collected? These are recommendations to be included.
- Should also recommend which organization is the appropriate authority to handle the case?
- Format – cover letter, case, feedback form
- See Mauritius presentation format if would like to edit
- Analyst Proposal and recommendation No, Set Aside analysis again
Dissemination SOPs
Analyst Proposal and recommendation Yes, Dissemination
- Dissemination
- Approval given by DG to disseminate to relevant authority
- Keep statistics of how many cases are disseminated
- Feedback and Follow-up
- Develop feedback format
- Same feedback form for national and international partners
- Give feedback form to outside agency
- See Thai AMLO example of feedback form
- Receive comments and clarity from external organizations
- Give comments to analysts to add information
- Keep statistics of how many convictions, and which predicate offenses were linked to each conviction.
- Cooperate with police.
- Joint Committee
- FIC has ability to be informed of result of/status of case[CGCC7]
- Joint Committee with investigative body (Police) – regularly meet with them if they want additional information regarding case
- Cite MoU with Police
- Record Keeping
- Maintain copies of all files received
- Hard copy vs. soft copy
- Keep statistics of:
- # of disseminations - Sent to law enforcement
- Under investigation
- Prosecuted – areas of prosecution – case pending in court
- Already convicted
- Assets seized
- Predicate offenses and what percentage they represent in total ML cases
[CGCC1]Suggestion: Specify the rank of the requesting officers and what procedures, if any, the requesting officer must follow for a procedurally correct request. Ex., Will a phone call suffice?
[CGCC2]Suggestion: Is there a reason to differentiate between intelligence and evidence here? Need to ensure that successful production of documentation pursuant to a criminal investigation is admissible in court.
[CGCC3]Suggestion: Validate this statement against the definition of a ‘terrorist act’ per Proclamation No. 652/2009.
[CGCC4]Suggestion:Clarify the purpose of making a hypothesis before collection.
[CGCC5]Suggestion: Clarifying access to government agency databases may be useful here.
[CGCC6]Suggestion: Clarify procedures in the event of non-compliance with an official request.
[CGCC7]Suggestion: Clarify per the MoJ.