acm-header
Sign In

Communications of the ACM

New architectures for financial services

Detecting Money Laundering and Terrorist Financing via Data Mining


The terrorist attacks of Sept. 11, 2001 confirmed the importance of open source intelligence. The passage of the USA Patriot Act and the creation of the U.S. Department of Homeland Security signaled a new era in applying information technology and data mining techniques to detecting money laundering and terrorist financing. Law enforcement agencies have traditionally focused on money laundering activities facilitated through transactions in the financial service sectors. Historically, banks and other financial service institutions were the main focus of law enforcement. Intelligence agencies are generally doing an adequate job curtailing money laundering through the front door (financial institutions) but have, to date, largely ignored money laundering through the back door (abnormal international trade pricing.)

The use of international trade to move money, undetected, from one country to another is one of the oldest techniques used to circumvent government scrutiny. Either overvaluing imports or undervaluing exports can achieve this transfer. If an imported product is overvalued, the foreign exporter receives an inflated value for the product, and wealth is shifted from the domestic importer to the foreign exporter. Normally, this would not be a financially profitable transaction for the domestic importer. However, if the domestic importer and the foreign exporter are colluding partners in the transaction, then both share in the transfer of money to the foreign country. Overvalued import transactions may result in three crimes: customs fraud, income tax evasion, and money laundering. The transaction may also facilitate the movement of money to a foreign exporter who may be an operative of a terrorist organization. An example of such a transaction is detailed in Figure 1.

An alternative method used to launder money out of a country to a foreign country is through the undervaluation of domestic exports. Research indicates a majority of the money laundered out of the U.S. is through undervalued exports, which is preferred by terrorists and money launderers for two reasons. First, most governments, including the U.S. government, do not adequately monitor their export transactions. The undervaluation of exports is also preferred because it allows the terrorist or money launderer to avoid the use of financial institutions, which may be monitored by government agencies. The money launderer converts his illegal money into products by purchasing products for cash at the market price of the product. The products are then exported to a foreign colluding importer at below market prices. The foreign importer receives the undervalued exports and resells them in the market at the real prices that reflect their true value. An example of such a transaction is detailed in Figure 2.

Money may be laundered into a country by importing products at undervalued prices or exporting products at overvalued prices. Recently, there has been concern these pricing schemes may be used to finance the illegal activities of Al Qaeda terrorist cells operating in various countries.

Back to Top

Data Mining Methodology

The analysis evaluates the 2001 U.S. import and export transactions data produced by the U.S. Department of Commerce, Bureau of Census, and contained in the U.S. Merchandise trade database. This is the same database used to determine the U.S. balance of trade.1

The estimate of money shifted out of the U.S. is based on pricing norms, (interquartile range), as specified in the section 482 regulations of the U.S. Internal Revenue Service tax code. The IRS defines suspicious prices as those import prices that exceed the upper quartile import prices and those export prices that are less than the lower quartile export prices. They focus on abnormal transfer prices between corporations that may result in shifting taxable income and taxes out of the U.S. An observed price deviation may be related to income tax avoidance/evasion, money laundering, or terrorist financing. The observed price deviation may also be due to an error in the U.S. trade database.

Calculation procedures and estimates of money moved out of the U.S. The median price, lower quartile export price, and the upper quartile import price for every commodity exported and imported to and from every country were determined. There were 16,390 import commodity codes and 8,568 export commodity codes in 2001. There were 230 countries that traded with the U.S. in the same year. Every import record was evaluated and compared to the country-specific import upper quartile price to determine if it was overvalued. The dollar amount of overvaluation for every import transaction was determined.


The use of international trade to move money, undetected, from one country to another is one of the oldest techniques used to circumvent government scrutiny. Either overvaluing imports or undervaluing exports can achieve this transfer.


Similarly, every export record was evaluated and compared to the country-specific export lower quartile price to determine if it was undervalued. The dollar amount of undervaluation for every export transaction was determined. The dollar amounts of all undervalued export transactions and all overvalued import transactions for every commodity, for every country were aggregated. The total estimated money moved out of the U.S. for 2001 was $156.22 billion. The details of this study are contained in a report published by the Trade Research Institute (see cba.fiu.edu/ finance/zdanowic). Tables 1 and 2 contain a variety of examples of abnormally priced transactions from among thousands such transactions identified in the 2001 U.S. Merchandise Trade Database.

Estimated amount of money moved to Al Qaeda watch list countries. The amount of money moved from the U.S. to the 25 countries appearing on the U.S. State Department's watch list is estimated to be approximately $4.27 billion. Trade with the top five Al Qaeda countries on the list resulted in $3.65 billion moved out of the U.S. to these countries (see Table 3).

Back to Top

Conclusion

These estimates of money laundering and terrorist financing are based on the analysis of historical price data. This analysis could be conducted in real time to determine which transactions should be audited and which cargo shipments should be inspected. The U.S. now requires that manifest information be sent to the U.S. Customs Agency 24 hours in advance of the shipment from a foreign port. This requirement will help facilitate real-time audits and inspections of abnormally priced imports and exports.

The efficient evaluation of data will be crucial to winning the war on terrorism. Intelligence is an inexact science, but the utilization of information technology and data mining techniques applied to financial transactions can contribute to increasing the quality of intelligence information.

Back to Top

Author

John S. Zdanowicz ([email protected]) is a professor of Finance at Florida International University, the former director of the Center for Banking and Financial Institutions, and a consultant to the U.S. Department of Justice on issues related to transfer pricing and money laundering and the U.S. Congress Office of Technology Assessment on the analysis of wire transfers.

Back to Top

Footnotes

1Data source: CDIM (2001–01 to 12) U.S. Imports of Merchandise, and CDEX (2001–01 to 12) U.S. Exports of Merchandise; www.census.gov/ foreign-trade/guide/.

Back to Top

Figures

F1Figure 1. Example: Overvalued U.S. imports.

F2Figure 2. Example: Undervalued U.S. exports.

Back to Top

Tables

T1Table 1. Abnormally high U.S. import prices.

T2Table 2. Abnormally low U.S. export prices.

T3Table 3. Money moved from the U.S. to Al Qaeda watch list countries.

Back to top


©2004 ACM  0002-0782/04/0500  $5.00

Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee.

The Digital Library is published by the Association for Computing Machinery. Copyright © 2004 ACM, Inc.


 

No entries found