Richard Warner USA Patriot Act: Money Laundering Provisions.

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Advertisements

Chapter 4: Federalism.
Paul Ohm Associate Professor, CU Law Initiative Director, Silicon Flatirons December 4, 2009.
Reports and Subpoenas. Authority for Reporting and Subpoenas Most state and federal agencies that have significant regulatory powers may require reporting.
US Constitution and Right to Privacy Generally only protects against government action Doesn’t obligate government to do something, but rather to refrain.
HIPAA and Public Health 2007 Epi Rapid Response Team Conference.
 Original Intent: ◦ Act passed in 1996 with two main goals: 1.Ensure individuals would be able to maintain their health insurance between jobs (the “portability”
Lecturer: Miljen Matijašević Session 8, 7 May 2014.
Unit 3 Option 2 Stop and Search & Search of Premises
Passed by the Senate 98-1 Passed by the House October 26, 2001 – Signed into law by President Bush 130 pages in length Divided into 10 titles.
USA PATRIOT Act and Libraries Eric Johnson & Rodney Clare Jackman Sims Memorial Library.
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
Workshop on Harmonizing Cyberlaw in the ECOWAS region ( Procedural Law in the Budapest Convention ) Ghana, Accra 17 – 21 March 2014, Kofi Annan International.
USA PATRIOT ACT USA PATRIOT ACT
13.1 Chapter 13 Privacy © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
Unlawful Internet Gambling Enforcement Act Final Rule Joseph Baressi June 3, 2009.
Anti-Money Laundering (AML)
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
Lecturer: Miljen Matijašević G10, room 6, Tue 15:30-16:30 Session 9, 16 Dec 2014.
Money Laundering 23 September Contents 1 What is money laundering? 2. The ‘primary’ money laundering offences 3. Failure to report and tipping off.
1 Raymond Doray Conflicts between the new Canadian Money Laundering Act and the rules of professional conduct and ethics September 13, 2002.
Last update: 2010 Bringing Smart Policies to Life The basics: AML/CFT for financial inclusion.
Allows FBI to request (from FISA court judges) access to certain business records, including Common carriers (airlines, bus companies, and others in the.
Banks and the Privacy of Medical Information 8 th National HIPAA Summit March 8, 2004 Joy Pritts, JD Health Policy Institute Georgetown University
+ Protecting Individual Liberties Section 1 Chapter 14.
Featured Programs Awards Publications Products Catalog LRE Network Contact Print This | Page Feedback | ShareThisPage Feedback Criminal Law Rules on Search.
Copyright © 2004 by Nelson, a division of Thomson Canada Limited CANADIAN BUSINESS AND THE LAW Second Edition by Dorothy Duplessis Steven Enman Shannon.
Federal Bureau of Investigation
Class 11 Internet Privacy Law Government Surveillance.
Other Laws (Primarily for E-Government) COEN 351.
The Patriot Act Protecting the US or Violating People’s Freedoms.
Combating Terrorism Financing 1 National Accountants Conference 2004, Kuala Lumpur “Combating Terrorism Financing” 13 October 2004 by Koid Swee Lian Financial.
© 2012 Edwards Wildman Palmer LLP & Edwards Wildman Palmer UK LLP Criminal & civil recovery mechanisms to recover the proceeds of corruption a common law.
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
Legal Framework and Regulatory Regime Required for an effective AML/CFT System Richard Pratt 29 March 2005.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
Duties and Powers of the Comptroller and Auditor General of India.
Powers to stop and Search of Premises POLICE POWERS STOP & SEARCH and SEARCH OF PREMISES.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Chapter 22: Organization and Coordination of Counterterrorism Investigations.
Reports and Subpoenas. Authority for Reporting and Subpoenas Most state and federal agencies that have significant regulatory powers may require reporting.
Section 411 ‘Patriot Act’ violates 1st Amendment Permits guilt to be imposed solely on the basis of political associations protected by 1st Amendment.
Agencies and Surveillance Authority SNFI Agencies and Surveillance Authority 1.Civics 101, Courts, and the Constitution 2.Executive Agencies 3.PATRIOT.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
JUSTICE  The principle of fairness: the idea of moral equality. Criminal Justice Today  The proper ordering of things and persons within a society.
Session 5 Anti-Money Laundering & Financial Crime Conducting or Supporting the Investigation Process Presented by ERM Institute Monday, 24 February 2014.
Police and the Constitution: The Rules of Law Enforcement.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated;
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
Chapter 8 Reports and Subpoenas. 2 Authority for Reporting and Subpoenas Most state and federal agencies that have significant regulatory powers may require.
Chapter 19 - Congressional Authority for National Security Surveillance Part I.
Lecture 7 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS 1.
Responsibilities of Financial Institutions in the AML Architecture – AML Regulations in Afghanistan Mr. Jafar Sadat, Da Afghanistan Bank.
Ministry of the Interior of the Republic of Latvia STATE POLICE of LATVIA CENTRAL CRIMINAL POLICE DEPARTMENT Economic Crime Enforcement Department.
Patriot Act (2002)Patriot Act (2002) Dylan Plassmeyer-Pd:8.
Felicity Banks Head of Business Law Institute of Chartered Accountants in England & Wales The Role of Accountants in the Fight against Money Laundering.
Disclaimer This presentation is intended only for use by Tulane University faculty, staff, and students. No copy or use of this presentation should occur.
Criminal Justice Today CHAPTER Criminal Justice Today, 13th Edition Frank Schmalleger Copyright © 2015, © 2013 by Pearson Education, Inc. All Rights Reserved.
Duties and Powers of the Comptroller and Auditor General of India RTI, Allahabad1DPC Act.
Surveillance around the world
What Is Criminal Justice?
Legal Implications.
Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University
APRL's Seventh International Professional Responsibility Conference, Paris Lawyer’s Reporting Obligations in Corporate Transactions: When does legal privilege.
USA PATRIOT ACT WHAT DOES IT STAND FOR?.
An Introduction to Public Records Office of the General Counsel
What Is Criminal Justice?
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Presentation transcript:

Richard Warner USA Patriot Act: Money Laundering Provisions

 Law enforcement cannot achieve control alone. The cooperation of private business is required.  The reason: controlling white collar crime requires access to and analysis of vast amounts of information, information possessed partly by law enforcement and partly by private business. Controlling Money Laundering

 In addition, private businesses–such as credit card companies and banks–collect and analyze relevant information as part of their normal business operations.  To the extent they share this information with law enforcement agencies, those agencies avoid the cost of obtaining and analyzing the information themselves. Controlling Money Laundering

 The Act responds in a sensible way to money laundering.  It is an example of the modern law enforcement response to modern crime..  It raises serious privacy concerns. Three Points

 “Money laundering... provides the financial fuel that permits international criminals to conduct and expand their operations.” 301(a).  Minimizing money laundering strikes at the heart of organized crime and terrorism. The Money Laundering Problem

 The Act is typical of modern uses of technology to combat crime.  It is a reaction to the use of the Internet and modern communications infrastructure by criminals. The Patriot Act as an Example

 The Act establishes Information sharing requirements; Information recording requirements; Investigation requirements; And, a clearinghouse for sharing information (using the Internet to the maximum extent possible). What the Act Does

An Open Network  The Internet is an open network in two senses.  First, it is built on a common, non-proprietary protocol. Any one who connects to the Internet can count on being able to communicate with anyone else who is connected.  Second, you do not need anyone’s permission to connect to the Internet—unlike public roads, for example.

A Decentralized Network  In classical telephone networks operated by national organizations, intelligence and control were centrally located.  On the Internet intelligence and control is mostly at the periphery, where the users and services are.  The Internet backbone is optimized to transmit data as efficiently as possible. It does not analyze data.

backbone Regional feeder networks ISPs Users backbone Regional feeder networks ISPs Users Structure of the Internet

 The Act responds to decentralization by imposing a variety of requirements on financial institutions which constitute the relevant the periphery, but also...  By creating a centralized clearinghouse for information sharing, and using the Internet to communicate between this center and the periphery. Dealing With Decentralization

 The Act establishes Information sharing requirements; Information recording requirements; Investigation requirements; And, a clearinghouse for sharing information (using the Internet to the maximum extent possible). What The Act Does

 “Money launderers subvert legitimate financial mechanisms and banking relationships by using them as protective covering for the movement of criminal proceeds and the financing of crime and terrorism.” 302(a)(3)  To identify money laundering transactions governments, government agencies, and businesses must share information; otherwise, the “protective covering” is difficult to remove. Information Sharing

 The Act imposes cooperation requirements on the entities at the periphery because controlling money laundering requires cooperation Between governments (302(a)(9); Within governments, between agencies (358 (c)); Between government and business (314, 318(a)(1)). Requiring Cooperation

 You can only share information you have.  So, the Act empowers the Federal government to impose recording requirements on financial institutions (311(b), 358(d)). Customer identification (326) Correspondent and payable-through accounts (311(e), 312(a)(i)(1 - 3), 313(a)(2) Recording Requirements

 Financial institutions are not only required to record information, they are also required to actively obtain it.  The Act imposes investigation requirements. (312(b)) If the investigation reveals that a shell bank is seeking an account, the Act prohibits dealing with that bank. (313) Investigation Requirements

 To increase the effective administration of the Acts requirements, it prohibits unlicensed money transmission. (373(a – b))  “Money transmission” is defined very broadly. (373(b)(C)) This may affect many e-commerce sites.  In this way, the Act controls the kind of financial institution that can be on the periphery of the Internet. Licensed Money Transmission

 The Act identifies FinCEN as a central clearing house for coordinating the sharing of information. FinCEN is The Financial Crimes Enforcement Network, established in  “The Secretary of the Treasury shall establish and maintain operating procedures with respect to government-wide data access through... FinCen.” (310(c)) A Centralized Clearinghouse

 FinCEN brings intelligence and control from the periphery to a centralized clearinghouse.  The Act specifies that financial institutions and agencies should submit their “reports through the Internet or other secure network, whenever possible.” (310(c)(1)(A)) FinCEN’s Role

 No system is perfect. Errors will occur, imposing costs on subjects investigated, financial institutions, and the government. Given the broad powers the Act creates, it may well be that many investigations focus on people that turn out to be innocent. Errors

 Increasing governmental power always carries the inherent risk that the power will be abused.  Even if the power is used properly in the present, you must worry that it will be abused in the future.  The adage, “Power corrupts,” is true. Abuse

 The Act limits the use of information collected: for example, “Information received by a financial institution... Shall not be used for any purpose other than identifying and reporting on activities that may involve terrorist acts or money laundering activities.” (314(a)(5)) Slippery Slope

 We should worry that such limitations will eventually be ignored.  This is especially worrisome in the case of FinCEN. What guarantee—of genuine practical value—do we have that FinCEN’s databanks will not eventually be used for greatly expanded purposes? Slippery Slope

 The Act illustrates a general approach to security and control with regard to modern, decentralized, global networks.  The solution is to coordinate the periphery with a centralized clearinghouse.  What guarantee do we have that the system will not be abused? The Question Is Critical

 Democratic control of governmental power is matter of checks and balances.  What checks and balances do currently operate in systems of the sort illustrated by the Act?  What checks and balances should in such systems? Checks and Balances

Sliding Down: Three Levels of 4 th Amendment Protection  First level: Non-exigent searches and seizures typically require a warrant based on probable cause.  Second level: Some less invasive actions (stopped on the street by a police officer) are permissible on reasonable suspicion (specific, articulable facts that criminal activity is occurring).  Third level: Where the government seeks records from a third party, it can use a subpoena. This does not require reasonable suspicion, only a finding that the information sought is relevant to an investigation. The target of the subpoena can challenge it, before the records are handed over, on grounds of irrelevance or overbreadth. Examples: credit reports, financial and medical records.

Beyond the Three Levels  Delayed notice subpoena: requires danger that notice might frustrate the investigation; used to obtain financial records.  Ex parte subpoena: challengeable by the third party holding the records; used to obtain .  Relevance order: issued by a court on grounds of relevance; used to obtain phone records.

Beyond the Three Levels  Certification order: issued by a court based on a claim of relevance by the police; the court does not make an independent judgment of relevance. Used to intercepted transaction information about calls and s.  Extrajudicial Certification: Issued by police based on police claim of relevance. Used to obtain federal public records and records related to terrorism.  No requirement: All other public records not protected by state laws.