Saturday, November 27, 2021

Future Methods of Laundering Cash



The relationship between technology and structure has been the topic of much writing and research (Woodward, 1965; Perrow, 1967; Thompson, 1967; Hickson, Pugh, and Pheysey, 1969; Mohr, 1971; Hage and Aiken, 1969; Barley, 1986). Although the accumulation of research studies has modified the concept of technological imperative, technology is still considered an important variable in relation to organizational structure (Rousseau, 1979). Yet, after decades of research relating organizational technology to organizational structure, "the evidence for technology's influence on structure, is at best, confusing and contradictory" (Barley, 1986: 78). The same may be said for the multitude of conceptions and methodologies employed in such studies (Rousseau, 1979). While technology may be generally defined as the transformation of organizational inputs into organizational outputs (Perrow, 1967; Rousseau, 1979), numerous definitions and operationalizations at varying levels of analysis and contexts demonstrate the diversity of technology research (Comstock and Scott, 1977; Rousseau, 1979; Fry, 1982). Despite this diversity, little attention has been paid to the effects of technology over time. Cross-sectional research has typically focused on existing technologies and corresponding formal organizational structures. The majority of these cross-sectional studies treat technology as the independent variable, based on an assumption that organizational technology is inflexible and, correspondingly, that there is a need for structure to adapt to the requirements of technology. These assumptions are questionable. Technology can be a flexible organizational strategy that can be modified by an organization's structure, in particular, the informal structure. Structural arrangements act as the conduits of technological change and, as such, may influence organizational technology as well as be influenced by it. Investigation of the effects of a change in technology may illuminate the process by which structure affects technology, or vice versa. Few studies relating technology to structure have considered the relationship between organizational structure and power. Structural position is an important source of power in that it provides access to people, information, and other resources. As Pfeffer (1981) noted, power is first and foremost a structural phenomenon. Likewise, power strengthens existing structural configurations. Those in power seek to maintain power by reinforcing the existing organizational structure (Pfeffer, 1981). Thus, a change in structure may necessitate a change in the distribution of power, and vice versa.

Although minor, incremental changes in power and structure may occur gradually over long periods of time, the likelihood of a major restructuring may only occur when the organization encounters an "exogenous shock" (Barley, 1986: 80) such as the implementation of a new technology. Such a shock might be conceptualized as a sudden, dramatic increase in uncertainty (Tushman and Anderson, 1986). Attempts to reduce uncertainty may foster changes in interaction patterns, with those able to cope with uncertainty adjusting their social location and increasing their power (Salancik and Pfeffer, 1977; Tushman and Romanelli, 1983). Thus, it is possible that a change in technology may produce changes in structure, power, or both. However, as Pfeffer (1981) noted, stability, not change, is typical of the distribution of power and influence in most organizations. Those in power seek to perpetuate their power advantage. Such processes as commitment to previous decisions, institutionalization of beliefs and practices, and the ability of those in power to generate additional power contribute to stability (Pfeffer, 1981). Likewise, structural patterns of interaction become institutionalized over time and contribute to organizational stability. Thus, while a technological change may provide the opportunity for a redistribution of power and organizational structure, it does not guarantee it.

Unfortunately, even the cleansing dirty money through money laundering procedures has also been affected by technology. Example of these changes includes the new drug trafficking routes are spawned in Africa and the lower regions of the old Soviet regime, the list of countries more vulnerable to money laundering widens. Perhaps more dangerous is the absence of implementation of anti-money laws or even ratification of the 1988 Vienna-U.N. Drug Convention. (Bureau of International Narcotics and Law Enforcement Affairs, 1998) The INCSR lists Aruba, Colombia, Mexico, the Netherlands Antilles, Nigeria, Singapore, Turkey and Venezuela. Just as important, the anti-money laundering laws that governments enacted in the early 1990s are now no longer sufficient, especially given the increase in non-drug crimes, the use of new technologies, and more sophisticated ways to move money.

Moreover, the proliferation of financial crimes include the more common types of financial frauds and new variations, especially the use of prime bank guarantees, phony or fictitious letters of credit, counterfeit or stolen bonds, and other monetary instruments offered as surety for loans, and other scares. Some of the new methods include the use of secret telex codes for bank-to-bank transactions in order to move $42 million in cash from the Hong Kong and Shanghai Bank in Jakarta. (Bureau of International Narcotics and Law Enforcement Affairs, 1998) The use of fake certificates of deposit drawn on other branches of an international bank that can range from $10 million to $25 million recently occurred. "`Fraudsters' will also use counterfeit letters of agreement, drawn on bank letterheads, seemingly vouching for a client from another branch of that bank," or confirming the approval of a bogus deal.  

Similarly, professional money launderers differ little in their money management than corporate money managers. Money brokers and transnational criminals collaborate to minimize their risk, partly through diversification of the means to transport, convert cash, or both, as well as to layer and integrate the laundered funds.(532)

Furthermore, banking is increasingly global, inter-connected, and operates twenty-four hours. Large multinational banks have global branch and subsidiary networks as well as correspondent relationships. Correspondent banking enables launderers to initiate transactions through the weakest link in the bank. Once launderers start a bank relationship, they can quickly move money globally within the bank. (Bureau of International Narcotics and Law Enforcement Affairs, 1998) At the June 1996 International Conference of Banking Supervisors, banking supervisors from 140 countries agreed to adhere to twenty-nine recommendations "designed to strengthen the effectiveness of supervision by both home and host-country authorities of banks that operate outside their national boundaries."(p 154) The recommendations were incorporated into a report by the Basle Committee on Banking Supervision, issued in October 1996. Home supervisors must be able to assess "all significant aspects of their banks' operations, using whatever supervisory techniques are needed, including on-site inspections." Means to overcome impediments to effective consolidated supervision are suggested. The Basle report sets forth "guidelines for determining the effectiveness of home country supervision, for monitoring supervisory standards in host countries, and for dealing with corporate structures which create potential supervisory gaps." Additional guidelines are provided for host country supervision.

Concurrently, when the recommendations conflict with bank secrecy or similar legislation in certain countries, supervisors have agreed to use best efforts to amend the secrecy legislation. Countries with further recommendations were reviewed prior to the international meeting scheduled for October 1998. (Bureau of International Narcotics and Law Enforcement Affairs, 1998) Much competition exists globally to attract high net-worth individuals and companies as private banking clients. The transactions of these clients are treated confidentially. Such customers are treated with more deference and receive various types of personal services. A concern exists that, in the competition to attract and maintain these clients, financial institutions or their officials may suspend or not implement anti-money laundering and other due diligence procedures.

In addition to that, the use of microchip-based electronic money for financial transactions, via smart cards and the Internet, has the potential to revolutionize the means for laundering money. Some new cyberpayments systems are engineered to be an electronic emulation of paper currency. Cybercurrency has the attributes of conventional currency: a store of value; a medium of exchange; a numeraire; potential anonymity; and convenience. Other features include transfer velocity--an almost instant electronic transfer from point to point--and substitution of electrons for paper currency and other physical means of payment. Cyberpayments also include other payment components, such as cyberchecks, cybercredit, cyberdebit, and so forth. This development requires close attention because the use of microchip and telecommunications technologies adds some significant new dimensions for law enforcement.

The existence of cyberpayments also include other payment components, such as cyberchecks, which emulate paper checks, cybercredit, cyberdebit, etc. Cyberpayments raise the issue of whether such payments can be made subject to monetary reporting and supervision measures. Law enforcement issues that will arise include fraud, counterfeiting, and computer hacking. High-speed, worldwide transfers add complexity to law enforcement's ability to trace criminal activity and recover illicit proceeds. (p. 512)

Other challenges to anti-money laundering enforcement include the counterfeiting of currencies and other monetary instruments, especially bonds, the rise in contraband smuggling, the acquisition of banks and other financial institutions by suspected criminal groups, and the resort by criminals to the use of smaller, pass-through banking, and electronic cash systems. As a result of the occurrence of financial crimes and money laundering with varying degrees of regularity in more than 125 jurisdictions, a continuing concern exists that some governments still have not criminalized all forms of money laundering.

 

 

 

 

 

 


 

United Kingdom Laws on Money Laundering

 




The expansion of the anti-money laundering efforts in the Western Hemisphere to include serious crimes rather than just drug trafficking brings this group current with practice in the rest of the world. The consideration of a multilateral evaluation mechanism, the exchange of information, training, and even a convention are all efforts to strengthen compliance and indicate broader political agreement and acceptance of the purposes of anti-money laundering.

The ongoing assessment, (Zagaris, 1997) the establishment of financial intelligence units (FIUs), and the typologies exercise are small steps towards cooperation in hemispheric anti-money laundering enforcement. Meaningful and effective cooperation, harmonization of laws and standards, and effective establishment of an anti-money laundering regime must await the establishment of a proper network. A solid legal infrastructure with funding for professionals is needed for intensive and daily work on compliance with conventions and resolutions, harmonization of laws, collaboration on common approaches to mechanisms and technology, and common approaches to operational problems. At present, the governments and international organizations in the Western Hemisphere are searching for ways to develop ad hoc solutions to individual criminal problems, such as anti-money laundering.

On the international front, anti-money laundering provisions multiplied at a comparable pace. Great Britain, for instance, enacted a counterpart to the American Money Laundering Control Act with the 1986 passage of the Drug Trafficking Offences Act. (Barbot, 1995; Weeling and Todd, 1996) The 1986 Act provides immunity from suit for breach of the implied banking secrecy contract if a person discloses to a police officer "a suspicion or belief that any funds or investments are derived from or used in connection with drug trafficking or any matter on which such a suspicion or belief is based." While the Drug Trafficking Offenses Act, and its successor, the Drug Trafficking Act, contained a defense against disclosure rather than an affirmative duty to disclose, (Helleiner, 1999) this latter obligation was not far behind. In fact, just three years later, Parliament enacted the Prevention of Terrorism Act of 1989, which imposed just such a duty upon any person who is "concerned in an arrangement whereby the retention or control ... of terrorist funds is facilitated."

In England, as in the United States, more stringent anti-money laundering statutes and regulations soon followed. (Walker, 1996) Shortly after the United States and Great Britain launched their first targeted strikes specifically against money laundering, the United Nations joined the fight against dirty money. (Quillen, 1991) The Vienna Convention of 1988, " recognizing the links between illicit traffic and other related organized criminal activities which undermine the legitimate economies and threaten the stability, security and sovereignty of States," enjoined its signatories to criminalize the act of money laundering and to adopt measures to enable the identification, tracing, freezing, seizing and confiscation of illicitly derived proceeds. The Vienna Convention of 1988 was important not only in that it was the first multi-national recognition of the seriousness of the money laundering problem, but because it marked the first major step in affording to law enforcement officials the same international reach formerly available to drug smugglers and organized crime rings, whose complex laundering schemes regularly involved cross-border funds transfers that made their transactions more difficult to trace.

 

Crime Prevention: International Level

Multilateral organizations have set the framework for anti-money laundering standards, mechanisms, and institutions. The United Nations pioneered the 1988 Vienna Convention Against the Trafficking in Illegal Narcotic and Psychotropic Substances, which contains the requirements to criminalize money laundering and immobilize the assets of persons involved in illegal narcotics trafficking. (Gilmore, 1999)

In 1989, the G-7 Economic Summit Group established the Financial Action Task Force (FATF), which operates out of the Office of Economic Cooperation and Development (OECD) headquarters in Paris. (Gilmore, 1999) FATF has issued a set of forty recommendations (Forty Recommendations) that concern legal requirements, financial and banking controls, and external affairs. FATF operates through a Caribbean FATF (CFATF) and is in the process of establishing a similar group in Asia. It issues an annual report that provides an overview of progress and problems in international anti-money laundering.

The G-10 Basle Group of Central Banks has actively provided guidelines for central bank supervisors and regulatory controls. As mentioned below, on September 23, 1997, the Basle Group issued guidelines on supervision. Regionally, the Council of Europe's 1991 Convention on Laundering, Search, Seizure and Confiscation of Assets has become the major international convention that obligates signatory governments to cooperate against anti-money laundering from all serious crimes.

The European Union, as a signatory to the 1988 Vienna Drug Convention and due to its own actions to combat financial crimes against the Communities, issued a 1991 Anti-Money Laundering Directive that it is poised to strengthen. As mentioned below, it is now in the process of an initiative against cybercrimes. An important regional organization in the anti-money laundering has been the Inter-American Drug Abuse Control Commission (CICAD). At its meeting on November 4-7, 1997, CICAD anti-money laundering experts recommended an ongoing assessment of compliance with standards and the creation of national financial intelligence units (FIUs). National governments and international organizations are striving to create mechanisms to monitor regularly compliance with international standards. Because the recent FATF annual reports and topologies provide cutting-edge discussions of the status of money laundering trends, they are discussed next.

A significant achievement of FATF during 1996-97 was the annual survey of money laundering methods and countermeasures. The survey provides a global overview of trends and techniques, especially the issue of money laundering through new payment technologies, such as smart cards and banking through the Internet. (Schroth, 1996) FATF reviewed the issue of electronic fund transfers and examined ways to improve the appropriate level of feedback that should be provided to reporting financial institutions. (Bauer and Ullman, 2001) While drug trafficking remains the single largest source of illegal proceeds, non-drug related crime is increasingly important. (Scroth, 1996) The most noticeable trend is the continuing increase in the use by money launderers of non-bank financial institutions and of non-financial businesses relative to banking institutions. The trend reflects the increased level of compliance by banks with anti-money laundering measures. The survey noted, "Outside the banking sector, the use of bureaux de change or money remittance businesses remains the most frequently cited threat." (Gilmore, 1999)

FATF members have continued to expand their money laundering laws, covering non-drug related predicate offenses, improving confiscation laws, and expanding the application of their laws in the financial sector in order to apply preventive measures to non-bank financial institutions and non-financial businesses. (Gilmore, 1999) FATF discussed money laundering threats that may be inherent in the new e-money technologies, of which there are three categories: stored value cards, Internet/network based systems, and hybrid systems. Important features of the systems that will affect this threat are the value limits imposed on accounts and transactions; the extent to which stored value cards become inoperable with Internet-based systems; the possibility that stored value cards can transfer value between individuals; the consistency of intermediaries in the new payment systems; and the detail in which account and transaction records are kept. (Hernandez, 1993) Future issues include the need to review regulatory regimes, the availability of adequate records, and "the difficulties in detecting and in tracking or identifying unusual patterns of financial transactions." (Summers and Reno, 2000) Since the application of new technologies to electronic payment systems is still in its infancy, law enforcement and regulators must continue to cooperate with the private sector. (Levi, 1991) Then authorities may understand the issues that must be considered and addressed as the market and technologies mature.

As a result of difficulties in tracing illicit funds routed through the international funds transfer system, the Society for Worldwide Interbank Financial Telecommunications (SWIFT) board "issued a broadcast to its members and participating banks encouraging users to include full identifying information for originators and beneficiaries in SWIFT field tags 50 (Ordering Customer) and 59 (Beneficiary)." (Helleiner, 1999) Many countries have acted to encourage compliance within their financial communities with the SWIFT broadcast message.

To strengthen the body of information on identifying the true originating parties in transfers, SWIFT has devised a new optional format (MT103) for implementation after November 1997. (Helleiner, 1999) The message format will have a new optional message field for inputting all data "relating to the identification of the sender and receiver (beneficiary) of the telegraphic transfer." Additionally, "SWIFT has issued guidance to users of its current system to describe where such information may appear in the MT 100 format." FATF has helped SWIFT devise the new mechanism and is encouraging the use of the new message format.  

FATF recommends that at least the recipient of a suspicious transactions report should acknowledge receipt thereof. If the report is then subject to a fuller investigation, the institution could be advised of either the agency that is going to investigate the report or the name of a contact officer. If a case is closed or completed, the sending institution should receive timely information on the decision or result. Further cooperative exchange of information and ideas is required for the partnership between units that receive suspicious transaction reports, general law enforcement, and the financial sector to work more effectively.

Because of insufficient data, FATF has created an ad hoc group that "will consider the available statistical information and other information concerning the proceeds of crime and money laundering."(OOC, 1993) This ad hoc group will also "define the parameters of a study on the magnitude of money laundering and agree on a methodology and a timetable for the study."

 

Money laundering Laws after September 11

While the infamous Al Qaeda terrorists were furtively hatching their schemes of destruction that depended upon filtering money through the international financial system, policy-makers and legislators were publicly hatching schemes to combat the filtering of money derived from or used to support international illegal activity. Although the European Union's (EU) new Directive on money-laundering was recently adopted in the world-wide surge of counter-terrorism measures, it reflects legislative choices made before the world could imagine the terror that would be executed by Al Qaeda.

Nevertheless, trends have occurred due to the terrorists attack on the 11th of September. The slightest central trend is the contraction of financial regulations and the organization or enhancement of obligatory regulatory and enforcement agencies. New laws in the US which sums to broadening the command of the CIA and of the DOJ extra-territorially, was to a certain extent xenophobically described as proposed to make sure the banking system does not become a refuge for overseas fraudulent leaders or other type of foreign structured criminals. Confidentiality and bank privacy laws have been diluted.

Similarly, alliance with off shore shell banks has been prohibited. Dealing with patrons of correspondent banks was truncated. Banks were successfully altered into law enforcement agencies, accountable to verify both the characteristics of their clients and the origin of their funds. Cash transactions were to a certain extent proscribed. And the securities and currency trading industry, insurance companies, and money transfer services are introduced to developing inspection as an intermediary for laundered money.

Consequently, in excess of 150 countries guaranteed to lend a hand with the US in its struggle opposed to the bankroll of terrorism - 81 of which (including the Bahamas, Argentina, Kuwait, Indonesia, Pakistan, Switzerland, and the EU) in point of fact immobilized assets of distrustful individuals, supposed charities, and leery firms, or approved new anti money laundering laws and more stringent regulations. A listed EU instruction would compel lawyers to divulge incriminating information about their clients' money laundering actions. Pakistan commenced a "loyalty scheme", awarding expatriates who have a preference on official bank conduits to the much criticized Hawala, with extra baggage allowance and special treatment in airports.

Still, a worldwide system is emerging, established on the work of the OECD's FATF since 1989 and on the relevant UN conventions. All nations are anticipated by the West, on pain of probable punishments, to approve a homogeneous legal manifesto including reporting on dubious transactions and freezing assets and to apply it to all types of financial mediators, not only to banks.

Tuesday, November 23, 2021

Money Laundering: Legal and Financial Effects on Financial Institutions

 

 Since the initiation of international anti-money laundering efforts in the mid-1980s, various substantive requirements have been established: the requirement to criminalize money laundering activities; the requirement that covered persons must know-their-customer; the requirement to identify and report to authorities suspicious transactions; the requirement to freeze, trace, seize, and ultimately forfeit the proceeds and instrumentalities of money laundering crimes; the requirement of covered persons to have a compliance officer and to train employees; the requirement for covered persons to have outside audits the compliance of their organization with anti-money laundering standards; and the prohibition of secrecy as a reason for a country and covered persons to refuse to follow any of the anti-money laundering obligations.

 

Preventive Measures of Financial Institutions to Curb Money Laundering

Financial institutions such as banks are normally used as intermediaries for cleansing laundered money. In order to curb out this crime, financial institutions must therefore be vigilant in regulating this activity. These institutions must investigate on any dubious accounts and peculiar undertakings of their clients in their system. Suspicious activity may include the use of Letters of Credit and other methods to move money between countries where such trade is inconsistent with the customer's usual business. Another is thing that should be looked into is those customers who make regular payments or receive wire transactions from countries which are tax havens. Similarly,            frequent requests or use of travelers cheques, foreign currency drafts or other negotiable instruments should also be considered as a suspect for launderers. The reluctance to provide normal information or providing minimal or fictitious information that is difficult or expensive for the financial institution to verify when applying to open an account as well as those using accounts with several financial institutions then consolidating them prior to onward transmission of the funds are a good indication of money launderers. A      greater or unusual use of safe deposit facilities as well as companies' representatives avoiding contact with the branch should provide enough skepticism among the bank’s top management regarding the sources of the assets deposited in their institutions. Finally, the requests to borrow against assets held by the financial institution or a third party, where the origin of the assets is unknown or the assets are inconsistent with the customer's standing should also be taken into account.


BANKING REGULATIONS: WHAT CAN BE DONE ABOUT MONEY LAUNDERING?


BANKING REGULATIONS: 

WHAT CAN BE DONE ABOUT MONEY LAUNDERING?

Chapter 1

Money Laundering

 

Money Laundering is the practice of processing criminal proceeds to disguise their illegal origin. (FATF, 2002) The term derives from the fact that certain organized crime rings in the 1920's commingled the proceeds of their illicit operations with the practically untraceable proceeds from coin laundries operated by the ring, thereby making the funds appear to be legitimately derived. (Schroth, 1996) Though the term "money laundering" may have originated in the twentieth century, the practice of disguising ill-gotten gains pre-dates recent history and indeed traces its roots back to the dawn of banking itself. (Campbell, 1992) For instance, when the Roman Catholic Church in medieval times condemned usury, or lending money at interest, financiers devised methods to circumvent this restriction that are still in practice today. (O’Meara, 2000)

 

Stages of Money Laundering

In its simplest form, money laundering involves three stages; placement; layering, and integration. (Schroth, 1996) The placement stage is the process during which criminally derived funds are used to purchase an asset or are deposited into a financial institution. (p. 290) Next, launderers engage in one or a series of transactions to distance the funds from their original source. (p 290) This is the layering stage, which may include such transactions as multiple funds transfers between accounts and across state and international borders, complex loan arrangements, and purchases and resale of assets. (Bauer and Ullman, 2001) Finally, there is the integration stage. This is the point at which the illicitly derived proceeds are reintegrated with the legal financial system and made available for use without suspicion. (Schroth, 1996) As with any criminal enterprise, the variations on these three steps are myriad and have evolved apace both with the sophistication of the financial systems upon which they depend and the law enforcement tactics which threaten their existence.

 

Techniques used by Money Launderers

This part of the chapter shall discuss the methods employed by money launderers to stash their financial assets without the government noticing their crime. One such technique is called smurfing. In this technique, an individual who wants his finances undetected will open several bank accounts on different banks under different names. It is also possible for them to purchase bank drafts from several financial institutions to outwit ceilings for transaction reporting.

Another technique is by shipping huge amounts of money overseas and consequently orchestrates means of getting it back locally. On other accounts, less cumbersome substances such as diamonds, gold or anything that is extraordinarily valuable are purchased domestically. However, the value of their items being directly related to their bulk is a prerequisite, thus allowing an uncomplicated in terms of shipping them overseas and ensures the solvency of the items even if it is outside the borders of the country of origin. Generally, the American dollar is used as the currency of choice in the context of illegal transactions. The reason is that the US dollar considerably more widely circulated outside America compared to other leading currencies in the world.

Another technique is through electronic wire transfers. Scrupulous individuals are currently taking extensive utility of the payment on their transactions through electronic means and message systems for wire transfers. Recent innovations for financial systems authorize iniquitous individuals to transfer monetary remunerations amounting to millions though private desktop computers and satellite dishes. The swift passage of funds between financial records in various jurisdictions increases the intensity and complexity of scrutinizing and discovering the source of funds especially when non-customers and non-correspondent banks transmit to,  by the same token, unheard of third parties.

On the other hand, each and every individual affianced in the business of dealing in securities must look after appropriate customer data and records. Unusual activity includes wishes by clients for investment management services, either foreign exchange or securities, where the origin of the funds is not in agreement with the customer's perceptible eminence, large or strange settlements of securities in cash arrangement and purchasing and acquiring a security with no noticeable objective. These should be taken into account because money launderers are also using investment related transactions in placing their stashed cash.

Alternatively, a noticeable conspiracy with the personnel of the financial institution as well as its agents would also be a means of laundering money without the head of the financial institution knowing.  Doubtful indications include modification in employee characteristics such as lavish life styles or performance, remarkable or unexpected increase in business volume of selling products for cash; consistently high levels of single premium insurance business far in excess of any average company expectation. Similarly, a growing trend of money launderers moving away from the banking sector to the non-bank financial institution sector where the use of currency exchange houses and wire transfer companies to dispose of criminal proceeds remain among the most often cited threats.

Any modestly classy currency launderer will institute a bank account in a financial sanctuary as a company rather than as an individual with a numbered account. In order to augment the manifestation of legality it is preferable that such a company already have an account of tangible activity. Once the business is set up, a bank deposit is consequently completed in the haven state in the appellation of that offshore corporation. The inducement for businesses to be enlisted in offshore havens is to break away from the stern tax and registration policy on local companies. They can concentrate not inconsiderable quantity of financial assets to and from offshore countries devoid of the requirement to announce the dealings to domestic economic authorities. On the stipulation that it does no commerce where it is set up, having an international business (IBC) or "offshore" company facilitates its owners to operate with absolute anonymity and not disburse financial remuneration on taxes. In many fields it is not even necessary to shelve corporate books or records and thus is just the thing for concealing the derivation and destination of merchandise in international commerce. Similarly, companies could be capitalized with holder stocks such that while there is no owner on documentation anywhere, the individual who actually possesses the share certificates owns the corporation.

In many areas, trusts and IBCs are controlled by unfettered trust companies. Loads of decontaminating schemes then develop an additional stratum of cover where management of the company is conveyed to the offshore trust. Consequently, the trustees basically hand over the proprietor immediate admission and control over the assets while trouncing true ownership. The unregulated trust companies can help conceal assets by moving the shares of a corporation from one account to another, by changing corporate names, by merging corporations and by changing trust documents on the instruction of the account holder. They have also been known to manufacture false paper trails and false documentation to assist money launderers and they have routinely provided invoices, receipts and other documents to help fool the customs and tax authorities of other countries.

Furthermore, the path of the dirty money could be further complicated if the launderer acquires their own bank among several jurisdictions that propose such services. Consequently, the individual makes sure that his bank is one of those through which his cash passes so he can either shut down the bank or obliterate the records to elude authorities. Moreover, money launderers recurrently bring into play various legal representatives the length of the route so that they will also be sheltered by the discretion of the lawyer-client affiliation. There is also a mounting dependence in offshore centres on agents and representatives to engender a solid clientele, to function as mediators in instituting accounts, and trusts. Similarly, they are also employed to act as an added tier of insulation and confidentiality. 

Proficient launderers include accountants, lawyers and private bankers who, at the same time as offering money-laundering assistance to an extensive range of felons, are adroit at not asking queries that would compel them to rebuff business or even to give an account of their clients or potential clients to the authorities. They are conscious that those who are unsuccessful to meet the terms with professional standards possibly will be predisposed under the want of probity principle.

Moreover, some offshore financial institutions will spawn false invoices, bills of lading, end-user certificates and other forms of documents to give the facade of legality to an assortment of dishonest transactions. Over-invoicing using phony documents can be an exceptional protection for moving the proceeds of drug trafficking and other crimes. On the other hand, fake invoices, bills and receipts can be utilized for an assortment of tax frauds.

 

Statement of the Problem

 

As stated earlier in the chapter, money laundering is implied as the venerable method of concealing the unlawful source and iniquitous character of finances which is normally acquired in unscrupulous undertakings such as arms sales, smuggling, human trafficking, organized crime, drug trafficking, prostitution rings, embezzlement, insider trading, bribery, and computer fraud. These funds are concealed by repositioning them indiscernibly and investing them in lawful commerce, securities, or bank deposits. Nevertheless, the plain description of the alleged crime disguises its more significant offence. Hiding a bulk of money and laundering it to specific places is an act of tax evasion, avoidance of tax, and blatant practice of fraud. Tax-related laundering nets between 10-20 billion US dollars annually from France and Russia alone. The convergence of criminal and tax reluctant funds in money laundering complex function to obfuscate its mutual sources.

Illegal as well as tax evaded finances are immobile and inefficient. Nevertheless, the incorporation of these funds to the financial system of an economy allows them to engage in commercial activity as a valuable not to mention inexpensive source of investment. The problem with this kind of laundered money is that it is shrouded by secrecy and eventually does away with transparency, especially those in powerful positions. It is thus a source of corruption among government officials. It also figuratively taints the legal segments of the economy. Being financial remuneration from unscrupulous origin, it displaces the availability of legitimate as well as the resources coming from other areas. Similarly, a huge amount of laundered money creates an erratic and irrepressible money supply while encouraging cross-border financial movements. This phenomenon enhances the precariousness of exchange rates

A joint, corresponding, endeavour is therefore mandatory to contradict the global proportions of money laundering. A lot of states chooses to engage in these actions for the reason that money laundering has as well develop into a local political and economic affair. The United Nations, the Bank for International Settlements, the Financial Action Task Force, the EU, the Council of Europe, and the Organisation of American States, all circulated their respective anti-money laundering principles. 


 

Waging War in the name of Peace: Is Military Action the Only Solution to Indonesia’s Aceh Problem?

 


Current Situation

 Citing the continued acts of armed violence and terrorism perpetrated by the Free Aceh Movement (GAM), the Indonesian Government declared in May 18, 2003, a six-month state of martial rule throughout the Province of Nanggroe Aceh Darussalam.[1] This ushered in fresh waves of escalated military operations between the government troops and the secessionist group’s military arm, the Angkatan Gerakan Aceh Merdeka (AGAM).  Peace efforts had once again proved futile.  The shaky foundations of peace established in Geneva just over a year ago have since then crumbled. Already, the number of casualties has reached alarming proportions. To date, the military reports that about 230 troopers have been killed, 206  of which were rebels.[2] In July 8, it claimed to have killed 21 GAM fighters in a span of 24 hours.[3]

Amid the intensifying conflict springs new concerns over human rights violations.  Countless are feared caught in the cross-fires. International rights groups have accused both sides of serious rights abuses. The Indonesian Red Cross says it has recovered 176 bodies in civilian clothes. Almost 42,000 civilians have fled their homes for safety. And their numbers are expected to reach 100,000 as the war is expected to rage for months to come. Inevitably, concerns over humanitarian issues are mounting. There have been reports of food and water shortages in one camp housing some 15,000 people.

Once again, violence has prevailed over the province torn by war for more than 27 years. The bloody war between the Indonesian forces and the Free Aceh Movement has been raging since GAM declared independence in 1976. An estimated 10,000 people, mostly civilians, have already been killed. [3] Prior to the Geneva Peace Agreement of 2002, killings were averaging five persons a day. As a negotiator lamented: “Enormous damage had been wreaked on the economic and social life of this resource-rich province. The people of Aceh were weary of the conflict.”[4]

HISTORY

 

Aceh has a special place in Indonesia’s history. It played a significant role in Indonesia’s growth and development as an Islamic nation. Islam gained its first foothold here. Indonesia’s earliest international trading activities took place in its ports as well.

But more than anything else, Aceh is known for its militancy. Under the Dutch rule, the Acehnese began to forge cooperation with other areas in Indonesia and were involved in various national and political movements.[5]

It was pacified by the Dutch colonizers only in the 1930s, shortly before the outbreak of war.[6] In fact, it was one of the strong supporters of the unitary Republic of Indonesia in the early years of the country's independence.

“Beside moral support, Aceh also gave material support to the young Indonesia. In 1946, Acehnese bought national bonds issued by Indonesia's provisional government in Sumatra, with denominations of Rp 100, Rp 500 and Rp 1,000. In addition, the Acehnese also donated cash to help finance the Indonesian government in Yogyakarta to run its operations and open representative offices abroad. In 1949, the Acehnese donated two airplanes, one of which was the famous Seulawah plane that later became a pioneer in the establishment of national flag-carrier Garuda Indonesia. Because of these donations in the early period of Indonesia, first president Sukarno described Aceh as a capital of Indonesia.”[7]

However, a series of political events took place that somehow sowed seeds of violence throughout the province. Aceh’s role in the development of independent Indonesia was recognized by elevating its status into a province. By a decree issued on 1949, Teungku Daud Beureueh was appointed as its governor. However, the council of ministers disregarded the resolution on establishing the Aceh Province. When Indonesia joined the United Nations  and became a republic, the dissolution of the Aceh province was announced. 

Angered by the series of setbacks experienced by the province, Daud Beureuech declared Aceh’s independence from Indonesia. With numerous Acehnese backing this rebellion, it took a while before it was crushed.

To assuage the hatred felt by many Acehnese, the central government gave Aceh the status of special territory in 1959. This decree conferred an unusually high degree of autonomy in religious, educational and cultural matters. A certain level of prosperity  in the province shortly after, but the secessionist sentiment of many Acehnese has never abated. On Dec. 4, 1976, Teungku Hasan M. di Tiro founded the Free Aceh Movement (GAM). Not long after, a cycle of violence started to unravel. GAM members, calling itself the Aceh-Sumatra National Liberation Front (ASNLF), attacked police and military installations. The Government responded by declaring Aceh a Military Operation Zone (DOM). The DOM status remained for nine years until it was lifted due to rising protests from human rights activists. It is claimed that the imposition of DOM only worsened the situation in Aceh as it facilitated massive human rights violations by military and police personnel. At least 1,600 cases of human rights violations have been reported during the nine-year period. Deaths and disappearances of at least 760 people have been documented. In sum, a total of six hundred women were reported widowed, 10 raped and 1,960 children orphaned during the military operations. This pattern of abuse and violence, committed by both the military and the rebels eventually prevailed up to this day.

On December 9, 2002 in Geneva, Indonesia and GAM signed a peace agreement ending the 26 years of hostility between the two parties.  The agreement stated that GAM would disarm and in return, the government would withdraw most of its troops and would grant Aceh wide regional autonomy and the Acehnese control over the region’s natural resources and permission to hold elections for an Acehnese legislature. Although this peace agreement was perceived to be the solution to the conflict, it only served its purpose temporarily as the conflict in Aceh was renewed in May of this year.[8]

Indonesian President, Megawati Sukarnoputri sent military troops in Aceh when the separatist movement refused to disarm their weapons. Indonesian government deployed thousands of soldiers and Brimob to fight against the 5000 members of GAM. Although this conflict in Aceh is not as huge as compared to the conflict in East Timor, the stake for Indonesia as a country is high. The conflict is a threat to Indonesia’s stability as a country. Indonesia’s territorial integrity is at risk. Furthermore, GAM is believed to be a murderous and extremist group that is involved in narcotic trades and human rights abuses.[9]

The International Crisis Group listed four possible actions which the Indonesian government could execute. The following were to: negotiate with GAM; buy off GAM; marginalize GAM; or pursue military operations. The Indonesian government opted to pursue its military operations when President Sukarnoputri declared martial law in Aceh after negotiations with GAM failed. GAM did not comply to the May-12 deadline given by the government to disarm and abandon their independence goal given. The government was firm not grant GAM full independence of Aceh. What the government was only willing to grant GAM was an autonomy package that would guarantee Aceh a part of the resource revenues and allow the region to implement its sharia law.[10]

Assessment

 

            The Indonesian government’s decision to declare war against the GAM may have resulted to the need to obliterate the separatist group to end the hostility in Aceh. The failure of the peace agreement and renewed negotiations forced the government to declare war as its last resort. GAM was not willing to concede to the government’s conditions. All that GAM demanded for was independence and nothing else. Had the government succumb to GAM’s condition, the integrity of Indonesia would have been put in jeopardy. The demand to have an independent Aceh should not be considered the sentiment of all the people of Aceh since the ones who are advocating for an independent Aceh are only those who belong to the movement as well as those who support it. The government chose to solve the chaos in Aceh by addressing the underlying cause which is the separatist movement.

            The conflict in Aceh may be considered a threat not only to Indonesia but a threat to the whole South-East Asia. Now that the South-East Asia region finds itself in a period of instability, further turmoil and uprising such as that of Aceh will only encourage other separatist movements to organize themselves and revolt against their respective governments. The need for an urgent solution and end to the hostility in Indonesia is a challenge that Indonesian government faces at the moment.

 

 

 


 



[1] Presidential Decree No. 28/2003 On The Declaration of a State of Emergency with the Status of Martial Law in Nanggroe Aceh Darussalam Province

[2] Aceh War Could Last 5 Months, Create 100,000 Refugees http://www.islamonline.net/English/News/2003-06/17/article05.shtml  

[3] (Indonesia will take years to subdue Aceh Rebellion: Official - Additional Reporting By Kazi Mahmood, IOL Southeast Asia Correspondent http://216.239.53.104/search?q=cache:eKhorVb1b7sJ:www.islamonline.net/English/News/2003-07/08/article07.shtml+aceh+war+in+indonesia&hl=en&ie=UTF-

[4] Wiryono Sastrohandoyo,  The Aceh Conflict: The Long Road to Peace

[5] [http://www.thejakartapost.com/special/os_7_history.asp]

[6] [5] A humane dialogue Printed in The Jakarta Post
Thursday, September 28, 2000

[http://www.thejakartapost.com/special/os_7_news.asp?FileID=20000928.C01]

[7] [http://www.thejakartapost.com/special/os_7_history.asp] Northwestern tip of Sumatra Island.

[8]  Slobodan Lekic, “Indonesia, Acehnese rebels sign pact to end 26-year war,” Associated Press, 

[http://www.iht.com/ihtsearch.php?id =79647&owner=(Associated%20Press)&date=20021210125536], 9 December 2002.

 

[9] “The Australian: Big trouble in Little Aceh,”

[http://www.theaustralian.news.com.au/common/story_page/0,5744,6472161%255E25377,00.html], 22 May 2003.

 

[10] Ibid.

Consumer Loyalty and Satisfaction

 




Coca-Cola Company

According to Coca-Cola’s Annual Report (2002), the Coca-Cola Company in 2002 achieved worldwide unit case volume growth of five percent; the growth rate was 4.5 percent. Cash from operations was a record $4.7 billion, a 15 percent increase over 2001. Reported earnings per share were $1.23 after a reduction of $0.54 resulting from accounting changes and several other items, including $0.11 per share impact from stock option expense.

 

Supported by strategic investment and innovation, brand Coca-Cola products achieved 3 percent volume growth in North America, led by the introduction of Vanilla Coke and the continued rollout of diet Coke with lemon. Vanilla Coke brought in eight million new consumers who were not drinking Coca-Cola; in addition, diet Coke with lemon attracted over three million consumers to diet Coke.

 
Such a pace of innovation around the Coca-Cola  brand is unprecedented. It was nearly 100 years before the company launched the first extension of Coca-Cola—diet Coke, in 1982. It took another ten years to build diet Coke into a worldwide brand. It’s now the number-three soft drink in the world, and number-two in some markets.


Responsibility for the world’s most beloved and valuable brand requires extreme care in how, when, and why we extend it. The company does not risk consumer loyalty to the brand or seek an artificial bump in volume by spinning out product after product to chase the latest fad. By staying close to the brand’s identity, Coca-Cola has created new products such as Vanilla Coke, diet Vanilla Coke, and diet Coke with lemon. These products have lasting appeal that are expected to generate equally lasting value for share owners. Further, the quality and reliability of Coca-Cola products, the unparalleled brand appeal and distribution, combined with valuable consumer insights and strong customer relationships have generated sustained profitability for Coca-Cola, Fanta, Sprite and our other carbonated soft drinks for many years.

 
Over the past three years, Coca-Cola has grown internally and through strategic acquisitions to become the world’s largest producer of ready-to-drink juices and juice drinks. Outside the United States, its share of sales for the sports-drink category is one of the largest in the world. Across 70 countries, POWERADE grew 25 percent and increased its share of the category. Moreover, the company has been successful in strategically building a water business that enhances our offerings to our customers. Together with Dasani, which grew volume 40 percent last year as the number-two bottled water brand, we have become one of the leading players in the water category in North America, both in terms of share of sales and dollar value.


Coca-Cola is a classic example of a brand with long-term consumer loyalty. Coca-Cola has revolutionized the way people think about soda. Through proper brand building and the introduction of related offerings such as Diet Coke, Fanta, and Sprite, the Coca-Cola Company made worldwide impact. It catapulted beverage sales to more than one billion servings per day. What separate Coke from other brands are its name, identity, and loyal following--all of which are marketing creations. The company's comprehensive business strategy revolves around the fact that the Coca-Cola brand is the core, and that consumer demand drives all.

 

Consumer Loyalty

A better appreciation of the underlying forces that influence the loyalty of customers--particularly their attitudes and changing needs—helps the Coca-Cola Company develop targeted efforts to correct any downward migration in their spending habits long before it leads them to defect. Such an appreciation also helps the company improve its current efforts to encourage other customers to spend more.

Differentiating and measuring degrees of loyalty is an evolving craft. Companies first tried to measure and manage their customers' satisfaction in the early 1970s, on the theory that increasing it would help them prosper. In the 1980s, they began to measure their customers' rates of defection and to investigate its root causes. By measuring the value of the customers themselves, some companies also identified high-value ones and became better at preventing them from defecting. These ideas are still important, but they are not enough. Managing migration--from the satisfied customers who spend more to the downward migrators who spend less--is a crucial next step.

Service delivery is an interactive and dynamic process, that from the consumer's point of view is much more than a passive exchange of money for a particular service. Characteristics of services often require customers to be actively involved in helping to create the service value -- either by serving themselves or by cooperating and often working collaboratively with service personnel (Claycomb, Inks & Lengnick-Hall 2001). In high-contact systems customers can influence the time of demand, the exact nature of the service, and the quality of service (Lovelock & Young 1979). If consumers somehow become better customers -- that is, more knowledgeable, participative, or productive -- the quality of the service experience will likely be enhanced for the customer and the organization (Bowers, Martin & Luker 1990).

Organizations that capitalize on customers' active participation in organizational activities can gain competitive advantage through greater sales volume, enhanced operating efficiencies, positive word-of-mouth publicity, reduced marketing expenses, and enhanced customer loyalty (Reichheld & Sasser, 1990). Customers who actively participate in organizational activities can directly increase their personal satisfaction and perceptions of service quality (Bowers, Martin & Luker 1990).

Brand and Consumer Loyalty

More businesses are considering the importance of building and managing brand names because of the intense competition within the globalized economy, emerging trends in marketing, brand extension, acquisitions, and many other activities that cause confusions in the business (Laforet & Saunders, 1999). Consequently according to Balmer and Wilson (1998), researchers in marketing, public relations, and corporate communications are concerned with corporate identity management and the benefits branding bring to the business. Moreover, building brand names means announcing the identity of a company (Asher, 1997). The focus in building brand names therefore is to develop an intuitive and memorable image of the firm, services or products by presenting what is unique and special about the company.

When it comes to the buying preferences of today's consumers, a major new business study reveals that what keeps Americans buying a particular brand has less to do with pricing and merchandising than with how well the company treats its customers (Kara, 1998). Conducted for SOCAP by The Center for Client Retention, the study finds a direct correlation between buying intent and a customer's experience with a company's consumer affairs department. Specifically, 90 percent of those consumers who were delighted with their experience say they will continue to buy the product/service while only 37 percent of the customers who were dissatisfied with their experience say they will remain brand loyal.

            Underscoring the importance of these "relationship" factors, the study charts the influence of these attributes on brand loyalty and finds a direct association. Specifically, 88 Percent of respondents who gave "ability to demonstrate concern and interest" the highest ranking said they would be very likely to repurchase a company's products, while only 3 percent would be very unlikely to repurchase. The reaction to representatives who "show enthusiasm" was the same: 88 percent would be very likely and only 3 percent very unlikely to repurchase a company's products.

       In fact, the SOCAP study finds that when customers are satisfied with the way a company handles their questions or complaints, they sometimes become more loyal than customers who never experience a problem. Another way that customer service impacts sales is through the "word of mouth" factor, whereby consumers tell their family and friends about their positive and negative experiences with a company. In this study, 58 percent of all respondents told others about their experience with a consumer affairs department, with most telling three or more people.

Consumer Satisfaction

       In today’s business world, the value and importance of customers is not something that should be set aside by companies. Marketing plans and strategies would be incomplete without paying much consideration to the customers. Customers will and should always be a part of the agenda in any marketing plan of any company. Because of the implications for profitability and growth, customer retention is potentially one of the most powerful weapons that companies can employ in their fight to gain a strategic advantage and survive in today's ever increasing competitive environment (Lindenmann, 1999).

     Nowadays, companies’ concern does not only evolve around managing finances and operations. Companies have realized the importance of managing reputational risk. Business image and reputation are considered as intangible assets which are as equally important as tangible assets. These assets are founded on the companies’ relations with their customers. Integrity, transparency, and accountability are important elements in this foundation. Hence, it is important for companies to be able to secure this relationship by being able to keep the degree of these three elements high (Sercovich, 2003).

            The companies’ commitment to further improve on their accountability, transparency, and integrity should not be considered merely as an effort to serve Public Relations purposes. Instead, this commitment should be regarded as an effort to maintain the long-term sustainability of these companies. As the customers demand for higher standards, any shortcomings on the part of the companies to deliver would jeopardize the life of their respective company. Hence, it is really important for companies to not only maintain and protect these intangible assets. It is also a must that they increase these assets for future benefits (Sercovich, 2003).

       The customer-company relationship is based on a continuum wherein both “always-a-share” and “lost-for-good” relationships occupy the two extremes of the continuum. In an “always-a-share” relationship, transactions are arms-length and discreet. Customers are valuable and at the same time, replaceable. On the other hand, in a “lost-for-good” relationship, the probability that the customer will purchase again from the same company is extremely low when the customer decides to terminate the use of a product due to product defects or problems (Jacobs, Latham, & Lee, 1998).

        The disconfirmation paradigm has been the dominant model used in explaining the customer’s satisfaction or dissatisfaction. There are actually 3 possible reactions that may come from the customer. Two of them are positive reactions while the other one is a negative one. A customer shows a positive reaction either when the product is able to perform as what he/she has expected (zero positive index) or the product is able to exceed its expected performance (positive disconfirmation index). On the other hand, a negative reaction (negative disconfirmation index) is expected when the product performs below the expectation of the customer (Jacobs et al., 1998).

Customer satisfaction refers to the consumer’s positive subjective evaluation of the outcomes and experiences associated with using or consuming the product or service. Satisfaction occurs when the product has been able to meet or exceed the conceived expectations that the customer has (Padilla, 1996). Furthermore, customer satisfaction may also be considered as the measure of the high degree of quality of the product (Jacobs et al., 1998).     

Consumer satisfaction may be considered as the measure of quality of a particular product (Jacobs et al., 1998). However, it should not be limited to the traditional concept of quality. In its traditional concept, manufacturers view quality as inherent in the product or service. Once a product or service has been delivered or sold, its quality is believed to have been established (Leon & Crosby, 2003). However, Leon and Crosby (2003) argued that a product’s quality still has some other dimensions that are under the manufacturer’s control. These dimensions may still be modified and enhanced even after delivery.