[PDF] Searches related to intelligence financière pdf filetype:pdf





Previous PDF Next PDF



De lIntelligence Artificielle à lIntelligence Financière

L'AUTOMATISATION INTELLIGENTE DES PROCESSUS FINANCIERS. S'IMPOSE DANS TOUTES LES STRATES utilisons intègrent des principes d'Intelligence Artificielle.



Léducation financière - Manuel du participant Notre relation avec l

Étape 1 - Définissez votre objectif INTELLIGENT. Soyez aussi précis que possible. Incluez tous les coûts associés à la réalisation de vos objectifs. Essayez de 



THÈSE

Intelligence financière et statistique zipfienne : deux outils au service de la prise de position sur les marchés financiers.



INTELLIGENCE ÉCONOMIQUE ET MODÉLISATION FINANCIÈRE :

Nous analyserons dans un premier temps quelle peut être la contribution de l'Intelligence. Economique (IE) aux activités financières. Nous montrerons de plus 



Online Library Augmentez Votre Intelligence Financiere

4 days ago Télécharger AUGMENTEZ VOTRE. INTELLIGENCE FINANCIERE PDF ... Augmentez votre intelligence financière. (French) Paperback – Jan. 29 2009 by.



INTELLIGENCE FINANCIÈRE ET DU RISQUE

Qui sommes-nous. Diligence préalable et conformité INSIDE. GRC - Gouvernance gesion des risques et conformité. Gesion du risque de réputaion. Surveillance.



Décembre 2018 Intelligence artificielle : enjeux pour le secteur

1 Dec 2018 financier (fédérations professionnelles banques



Quest ce que léducation financière ?

Aujourd'hui la Fédération bancaire française (FBF) la Banque de. France et différents partenaires privés accordent également leur soutien financier. Comme le 



Untitled

25 Jul 2016 son intelligence financière et faire bien plus avec moins d'argent et plus de temps pour lui et sa famille ? Ne serait-ce pas une bonne.



Financial Intelligence Units: An Overview (June 2004) - IMF

Financial intelligence units (FIUs) constitute an important component of these strategies An FIU is a central national agency responsible for receiving analyzing and transmitting disclosures on suspicious transactions to the competent authorities



Télécharger gratuitement cours intelligence financière [PDF]

intelligence gathering the report does identify a number of proliferation financing cases Determining for example that a high medium or low number or value of international financial transactions are facilitating proliferation may be impractical however the cases identified in the report show several



De l’innovation financière à l’inclusion - IMF

technologies numériques transforment le secteur financier en changeant à la fois la manière dont les paiements l’épargne l’emprunt et les services d’investissement sont fournis et leurs fournisseurs



Robert T Kiyosaki - databnffr

Guide pour investir (2014) Augmentez votre intelligence ?nancière (2009) Thèmes en relation avec Robert T Kiyosaki (12 ressources dans data bnf fr) Économie politique Travail (7) Crise économique (2008) Finances personnelles Réseaux d'entreprises Succès dans les affaires



Avis sur la digitalisation des services financiers dans le

Le volume des flux financiers générés par les différents marchés : immobiliers santé tourisme mines etc attirent les criminels financiers L’avènementdu numérique D’une part la prolifération des technologies numériques offre aux entreprises des possibilités sans précédent



RedalycBusiness intelligence y la toma de decisiones

de business intelligence en su desarrollo científi-co como en sus diferentes aplicaciones REVISIÓN TEÓRICA En esta sección se presentarán varios elementos relacionados con la Inteligencia de Negocios desa-rrollados todos ellos en diferentes escenarios histó-ricos técnicos y tecnológicos En la sección 2 1 se



FINANCIAL INTELLIGENCE

Jan 12 2006 · FINANCIAL INTELLIGENCE Manager’s Guide to Knowing What the Numbers Really Mean By Karen Berman and Joe Knight with John Case Harvard Business School Press Publication date: January 12 2006 Price: $24 95; Page count: 288; ISBN: 1-59139-764-2 Distributed to the trade by Client Distribution Services



Manuel du participant Notre relation avec l’argent

Étape 2 – Tracez un aperçu des étapes qui vous mèneront à votre objectif Écrivez toutes les étapes que vous devrez suivre grandes ou petites Vous aurez ainsi un tracé clair pour l’atteinte de votre objectif Étape 3 – Examinez les défis et pensez à la stratégie pour les relever



Intelligence économique et management de l'information

L'intelligence économique est d'abord un concept empirique qui s'appuie sur des processus des actions et des comportements en entreprises dont le rapport Martre viendra donner en France une première formalisation (Lebrument 2011)



De l’Intelligence Artificielle - CELGEfr 1er comparateur

De l’Intelligence Artificielle à l’Intelligence Financière Introduction Présentée comme la 4e révolution industrielle l’Intelligence Artificielle (dite I A ) captive tout autant qu’elle questionne ; comment s’intègre-t-elle dans notre quotidien et à quelle échelle peut-elle bouleverser notre économie ?



Searches related to intelligence financière pdf filetype:pdf

Although intelligence sources provide insights into terrorist financing activities that information and information related to money laundering gathered from law enforcement flows to the private sector as risk management guidance advisories and targeted economic sanctions The private sector also is alerted to risks

Quels sont les attributs de l’intelligence financière ?

  • Il en est ainsi lorsqu’ils rencontrent des informations comptables, ils peuvent discerner la meilleure ligne de conduite à adopter. De la théorie à l’application réelle, voila les quatre principaux attributs de l’intelligence financière: La fondation: les décideurs doivent comprendre comment lire les documents financiers de base.

Qui a le plus intérêt à développer l’intelligence financière ?

  • Il explique que ceux qui évoluent, ou qui souhaitent évoluer, dans les quadrants P et I sont ceux qui ont le plus intérêt à développer leur intelligence financière car leurs revenus sont directement corrélés à leur intelligence financière. La réussite dans les quadrants P et I se mesure avec l’argent.

Comment développer son intelligence financière ?

  • Dans ce chapitre l’auteur explique comment concrètement faire pour développer son intelligence financière : L’auteur s’appuie ici sur la notion d’intelligences multiples (concept de Howard Gardner). Logico-mathématiques (capacité à comprendre des concepts logiques et abstraits) Musicale (aisance pour comprendre et reproduire le langage musical)

Quels sont les points essentiels du livre Augmentez votre intelligence financière ?

  • Dans ce chapitre Robert Kiyosaki aborde également un point essentiel du livre Augmentez votre intelligence financière. Il explique, qu’en 1971, le Président Nixon, en proclamant la suspension de la convertibilité du dollar en or, a provoqué une modification profonde des règles de l’argent.

Financial Action Task Force

Groupe d'action financière

MONEY LAUNDERING & TERRORIST

FINANCING RISK ASSESSMENT STRATEGIES

18 June 2008

© FATF/OECD 2008

All rights reserved. No reproduction, copy, transmission or translation of this publication may be made without written permission. Applications for permission to reproduce all or part of this publication should be made to: FATF Secretariat, OECD, 2 rue André Pascal 75775 Paris Cedex 16, France

TABLE OF CONTENTS

Introduction ........................................................... .................................................................... 2

I. What is a Risk Assessment? ........................................................................

.......................... 5

Conducting a National ML/TF Risk Assessment .......................................................... 5

The FATF Recommendations and the Risk Assessment Process ................................. 6

II. Examples of National ML and/or TF Assessments .............................................................. 9

Australia .............................................................. .......................................................... 9 Belgium ................................................................ 10 Canada ................................................................. ........................................................ 11 Japan .................................................................. .......................................................... 11 Macao, China ........................................................................ ...................................... 11 Netherlands ............................................................ ...................................................... 12 Poland ................................................................. ......................................................... 12 Spain .................................................................. .......................................................... 13 United Kingdom ........................................................................ .................................. 14 United States ........................................................................ ....................................... 15 Europol ................................................................ ........................................................ 15 Interpol ............................................................... ......................................................... 16 III. Issues to Consider When Conducting a national ML/TF Risk Assessment ...................... 17

Meeting the Needs of the Customer ........................................................................

.... 17

Resources and the Assessment Process .......................................................................

17 Interagency Cooperation ........................................................................ ..................... 18

Data Availability and Quality ........................................................................

............. 18

Developing an Ongoing Assessment Process ............................................................. 18

IV. Sources of Data for a National ML/TF Risk Assessment ................................................. 20

Determining the Threat ........................................................................ ....................... 20 Measuring Crime ........................................................................ ................................. 21 Victimisation Surveys ........................................................................ ......................... 22 Offender Surveys ........................................................................ ................................. 23

Other Relevant Data Sources for a Threat Assessment ............................................... 23

Country and Sector ML/TF Vulnerability ................................................................... 24

V. Issues for Further Consideration ........................................................................

................ 27 Conclusion ............................................................. .................................................................. 28 Bibliography ........................................................... ................................................................. 29 Appendix 1: Summary of Money Laundering Assessment Survey Responses ...................... 31

Appendix 2: Evaluating Law Enforcement Effectiveness ...................................................... 36

Appendix 3: Estimating the Total Scope of Money Laundering ............................................ 39

ACRONYMS

AML Anti-money laundering

CDD

Customer due diligence

CFT

Combating the financing of terrorism

DNFBPs

Designated non-financial businesses and professions FATF

Financial Action Task Force

FI

Financial institution

FIU

Financial intelligence unit

FSRB

FATF-style regional body

IMF

International Monetary Fund

LEA

Law enforcement agency

ML

Money laundering

RBA

Risk-based approach

SAR

Suspicious activity report

SSI

Strategic surveillance initiative

STR

Suspicious transaction report

TF

Terrorist financing

WGTYP

Working Group on Typologies

WB

World Bank

INTRODUCTION

1. Understanding the sources and methods of money laundering and terrorist financing in a

jurisdiction is essential for competent authorities to develop and implement an effective anti-money laundering/counter-terrorist financing (AML/CFT) programme. A national money laundering/terrorist financing (ML/TF) risk assessment should be considered the foundation for setting AML/CFT policy priorities and resource allocation.

2. The purpose of this report is to provide information on developing a national ML sk

assessment. There are obvious similarities and differences between money laundering and terrorist financing, but the risks of both are often assessed and managed using the same information flows between public and private sector institutions. 1

3. The Financial Action Task Force (FATF) typology report, Terrorist Financing, published in

February 2008 notes: "The application of the FATF 40 Recommendations and 9 Special Recommendations provides a solid basis upon which to gather financial information. Leveraging this

financial information with wider information on counterterrorism, including intelligence, at a national

level may prove to be the most effective use of fi nancial information in identifying terrorist activity." 2

4. The terminology used in this paper as well as the risk management principles and procedures

that are presented draw heavily on the June 2007 FATF paper, Guidance on the Risk-Based Approach to Combating Money Laundering and Terrorist Financing (RBA paper). 3

The RBA paper defined a

"risk management process for dealing with money laundering and terrorist financing" that

encompasses i) recognising the existence of risks; ii) undertaking an assessment of the risk(s); and iii)

developing strategies to manage and mitigate the identified risks. 4

This paper offers methodologies for

undertaking the risk assessment portion of that framework at the national level.

5. Although depth of coverage may differ, a national ML sk assessment is a process that

typically presents information on: The nature and scale of ML/TF and related predicate crimes (i.e. the threat). Weaknesses in AML/CFT systems and controls and other features of a jurisdiction that make it attractive to money launderers and terrorist financiers (i.e. the vulnerability). 5

6. The purpose of a national ML sk assessment is to identify money laundering and terrorist

financing methods across a jurisdiction and to determine how often those methods are used, how 1

Although intelligence sources provide insights into terrorist financing activities, that information and

information related to money laundering gathered from law enforcement flows to the private sector as risk

management guidance, advisories, and targeted economic sanctions. The private sector also is alerted to risks

regarding specific individuals, entities, and transactions through information requests received from law

enforcement. Relevant ML/TF information flows the other way as well, through currency and transaction

reporting from financial institutions required to file such reports. 2

FATF (2008).

3

FATF (2007a).

4 Ibid. 5 There are currently no standard definitions used internationally within the AML/CFT context for the

terms risk, threat, and vulnerability. This project identifies concepts linked to these terms in order to promote a

consistent approach by countries, but does not go so far as to suggest precise definitions for adoption by the

international community. Having a clear understanding of what the concepts mean, however, will assist countries

when establishing the terms of reference and scale of ambition when conducting a national ML/TF assessment.

2 effective they are in moving illicit funds, and whether there are gaps in the AML/CFT systems and controls.

7. A national ML sk assessment should be regarded as "fundamental background

information" to assist supervisors, law enforcement authorities, the financial intelligence unit (FIU),

and financial institutions. 6 This requires that competent authorities periodically renew their awareness of current money laundering and terrorist financing methods and reassess the effectiveness of established safeguards.

8. The ML/TF risk assessment process should inform a consideration of whether current laws are

sufficient to address new threats, and whether current methods of supervision and enforcement are adequate. Where the law is inadequate, there is vulnerability. Where the law is adequate, but supervision and examination are weak law enforcement will be overwhelmed. Where law enforcement is weak, the law has little deterrent effect.

9. Conducting a risk assessment should be useful to policymakers in identifying AML and CFT

priorities. "The principle is that resources should be directed in accordance with priorities so that the

greatest risks receive the highest attention." 7 Assessments should be tied to strategic planning and linked to specific actions.

10. In addition to identifying high priority ML sks at the national or jurisdictional level,

aggregating risk assessments across jurisdictions will help to identify priority concerns at the international level. To support the goal of producing a global threat assessment, the February 2008 FATF plenary initiated the Strategic Surveillance Initiative (SSI). The SSI process includes aggregating existing national ML sk assessments, surveying FATF and FATF-style regional body members regarding emerging trends and high priority ML sks, fact-finding by the FATF Secretariat, and discussion in the FATF Working Group on Typologies (WGTYP).

11. This project was undertaken in the FATF WGTYP. The co-chairs of the project were the

International Monetary Fund (IMF), United Kingdom (UK), United States (US) and World Bank. Source material for the project included a review of the relevant literature, consultation with Dr. Peter

Reuter

8 and Dr. Matthew Hitchcock Fleming, 9 survey responses from FATF members describing jurisdictional risk assessment methodologies and terminology, contributions from the core project group 10 and related discussions in Bangkok, Thailand at the November 2007 FATF Typologies

Experts' Meeting.

12. The first section of the report describes what a national ML sk assessment is and what a

risk assessment project entails. While the risks and the priorities may vary from one country to another, much of the information gathering and even the assessment process are built into the FATF

Recommendations.

11 The 40+9 Recommendations and the role of financial institutions, regulatory and

supervisory authorities, financial intelligence units, and law enforcement are mapped to the assessment

process in this first section. 6 Ibid. 7 For more on why to conduct a national money laundering/terrorist financing risk assessment, refer to

FATF (2007a).

8 Dr. Reuter is a professor in the School of Public Policy and the Department of Criminology at the

University of Maryland in the United States.

9

Dr. Fleming is currently serving as a Highly Qualified Expert with the US Department of Defense; he was

a consultant on AML/CFT matters with the IMF at the time of drafting of this report. He has also held positions

with the IMF, World Bank, United Nations, and with University College London's Jill Dando Institute of Crime

Science.

10

In addition to the IMF, UK, US and World Bank, the core project team included Australia, Belgium, and

the Netherlands. 11

See The FATF 40+9 Recommendations .

3

13. The second section of the report presents examples of jurisdictional risk assessments covering

money laundering and/or terrorist financing. The methodology and output of these efforts varies, but together they illustrate the many approaches that can be taken to understand how terrorists and criminals move money within a jurisdiction.

14. The third section of the report addresses the environment in which a national ML sk

assessment is produced, describing the process and resources needed.

A national risk assessment may

be a collection of single agency efforts or a c oordinated multi-agency project. Either approach is resource-intensive requiring information and cooperation from competent authorities.

15. The fourth section of the report provides guidance to relevant information sources and

analytical methods that may provide information helpful to understanding the scope of money laundering and/or terrorist financing beyond what can be identified through law enforcement investigations and financial institution currency and transaction reporting.

16. The report concludes with suggestions for further study, focusing on FATF Recommendations

31 and 32. These Recommendations address the need for relevant data and cooperation among

competent authorities, which are the two fundamental building blocks of a national ML sk assessment. Although authorities may prefer to work independently on mission-specific ML sk assessments, this approach could suffer from a lack of scope and relevant information unless

opportunities exist for the relevant authorities to reinforce one another's risk analysis and resulting

AML/CFT strategy.

17. Appendix 1 is a summary of the responses received to the project survey issued through the

FATF WGTYP. Appendix 2 describes a model that can be used to help evaluate the effectiveness of law enforcement. Appendix 3 provides a framework to go beyond known data to estimate the full scope of money laundering in a jurisdiction. 4

I. WHAT IS A RISK ASSESSMENT?

18. Many industries conduct risk assessments. Depending on the circumstances, a risk assessment

can be retrospective or prospective, quantitative or qualitative, or some combination. A quantitative

risk assessment, using valid data, can be more objective and more useful over time than a qualitative

risk assessment developed from assumptions and random case studies.

19. Retrospective risk assessments have the benefit of drawing on data from past events to help

anticipate future problems. 12 Although the past is not always a reliable indicator of the future, consistent patterns can emerge in data and crime data is no exception.

20. Prospective risk assessments attempt to see into the future without the benefit of historical

data. 13 The risk assessment process when little or no data is available involves using whatever information is known to anticipate real or potential outcomes. This approach relies primarily on qualitative rather than quantitative indicators.

21. The best risk assessment methodology uses a combination of approaches in order to capture

all that is known and as much as possible about what is not known.

22. There are likely to be illicit financing methods being used that have not been detected by

financial institutions or law enforcement, and so will not show up in the data gathered from criminal

investigations or financial institution currency or transaction reporting. And there may be other illicit

financing options that even the criminals have not yet discovered. In the absence of data or case studies identifying these methods, financial institutions and competent authorities must rely on creative intuition and a careful analysis of potential systemic weaknesses.

Conducting a National ML/TF Risk Assessment

23. A national ML sk assessment is an organised and systematic effort to identify and

evaluate the sources and methods of money laundering and terrorist financing and weakness in the AML/CFT systems and other vulnerabilities that have an impact, either direct or indirect, on the country conducting the assessment. Such an assessment may involve multiple public sector offices working together with or without the private sector, or it may involve one or more individual agencies working independently to assess specific aspects of the country's ML/TF situation.

24. An assessment effort that is organised and systematic is one that has a well-defined process

and purpose with clearly stated goals. Also important is that sufficient resources are available, including information, to achieve the stated goals. 12 Life insurance companies study, among other things, the circumstances involved in the deaths of

policyholders to look for indicators of premature death that will help in pricing future policies. Auto insurers

study accidents, particularly those involving their policyholders, in order to identify indicators of poor driving

habits. Financial analysts study historic pricing patterns for financial stocks and bonds. Price fluctuation is

perceived as "risk" in financial markets. Doctors and pharmaceutical manufacturers test experimental treatments

on small groups of patients in order to anticipate positive and potentially negative outcomes in the general

population. 13 This kind of assessment is common in industries in which a single accident or malfunction can have

horrific consequences, limiting potential testing (e.g. aircraft design, nuclear power plant operations, and disaster

preparedness). 5

25. Although depth of coverage may differ, a national ML sk assessment is a process that

typically presents information on: The nature and scale of ML/TF and related predicate crimes (i.e. the threat). Weaknesses in AML/CFT systems and controls and other features of a jurisdiction that make it attractive to money launderers and terrorist financiers (i.e. the vulnerability).

26. Assessing the nature and scale of ML/TF and related predicate crimes involves identifying and

quantifying the predicate crimes and methods supporting money laundering and terrorist financing,

using law enforcement investigations, prosecutions, and convictions, as well as financial institution

currency and transaction reporting, and other relevant data.

27. Assessing weakness in the AML/CFT systems and controls involves determining whether

appropriate laws are in place to block or deter certain illicit financing activity. Where adequate laws

are in place yet data shows that illicit activity is occurring at an unacceptable rate the effectiveness of

law enforcement has to be evaluated, as well as the potential impact of corruption.

28. The output of a national ML sk assessment is generally a public document, although in

some jurisdictions, a restricted version may also be produced which may elaborate on specific criminal

(and, potentially, national security) intelligence.

29. The national ML sk assessment should be an input to a national strategy, as part of the

country's overall AML sk management process. 14

30. The extent to which an assessment can identify and evaluate ML/TF threats depends on the

information available. At a minimum, identifying the common predicate crimes that generate illicit proceeds and the subsequent money laundering methods used should be a routine function of domestic law enforcement. Going beyond identifying to quantifying and evaluating the money laundering/terrorist financing situation requires data from investigations, prosecutions, and convictions; financial institution currency and transaction reporting; and relevant indicators of potential criminal activity.

31. Although evaluating the scale and scope of ML/TF is valuable, just identifying all of the

relevant methods of illegal financial activity is often challenging. The risk assessment process will

require that judgments be made about the information available, including what information to use, how to use it, and even how to interpret it. For example, determining what constitutes "domestic"

money laundering or terrorist financing can itself be a challenging question. The globalisation of trade,

increasing use of the Internet, and introduction of new payment methods has made it difficult to determine where crimes are committed or where the associated transactions take place.

32. Regardless of whether a national ML sk assessment is quantitative or qualitative,

retrospective or prospective, the inputs to the risk assessment process - both objective and subjective

sources of information - should be clearly identified along with any assumptions or interpretations. The FATF Recommendations and the Risk Assessment Process

33. Whether a national ML sk assessment is drawn from risk assessments conducted by

individual public sector agencies working independently or is coordinated as a single effort with broad

participation, the private sector, regulatory and supervisory authorities, FIU, and law enforcement 14

The strategy should address the vulnerabilities identified in the risk assessment (e.g. implement or amend

laws as appropriate, study identified problems in greater detail as necessa ry, reallocate resources to cover law

enforcement inadequacies, and/or focus on personnel or agencies suspected of creating vulnerabilities through

corruption). 6 community each competent authority involved in AML/CFT has a unique vantage point to make a contribution to the ML/TF risk assessment process.

34. Regardless of which offices of the national government collaborate to produce a national

quotesdbs_dbs12.pdfusesText_18
[PDF] intendance 03

[PDF] intendance03

[PDF] intendant établissement scolaire

[PDF] intendant lycée definition

[PDF] intendant zonard

[PDF] intensité concurrentielle secteur automobile

[PDF] intensité du courant exercices corrigés pdf

[PDF] intensité du trafic erlang

[PDF] intensité sonore en fonction de la distance

[PDF] intention d'achat achat

[PDF] intention d'achat immobilier

[PDF] intention stratégique renault

[PDF] intention to treat

[PDF] inter définition

[PDF] inter definition larousse