<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>December</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Supporting the Combating of Financing of Weapons of Mass Destruction with</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Louis de Koker</string-name>
          <email>L.DeKoker@latrobe.edu.au</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Commercial and Labour Law, University of the Western Cape</institution>
          ,
          <addr-line>Bellville, Cape Town 7535</addr-line>
          ,
          <country country="ZA">South Africa</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>La Trobe LawTech, La Trobe Law School, La Trobe University</institution>
          ,
          <addr-line>Melbourne, VIC 3086</addr-line>
          ,
          <country country="AU">Australia</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2022</year>
      </pub-date>
      <volume>19</volume>
      <issue>2022</issue>
      <fpage>9</fpage>
      <lpage>21</lpage>
      <abstract>
        <p>The anti-money laundering and combating the financing of terrorism compliance obligations are becoming increasingly complex for large banks. To meet these obligations, these banks are increasingly relying on regulatory compliance technologies, also known as ”regtech”. The use of AI technologies enhances the ability of regtech to perform complex tasks such as rating customer risk and identifying potential suspicious transactions. With the adoption of new risk assessment and risk mitigation standards for proliferation financing (PF) of weapons of mass destruction, there is a greater need for appropriate and improved regtech. This paper provides an overview of the development of these standards, their relationship with AML/CFT standards, and the common areas where regtech can be applied to meet AML/CFT obligations. It also highlights some of the legal risks associated with relying on regtech in this space. Regulators, compliance oficers, and technologists must navigate these risks to ensure that appropriately-designed regtech can be used to increase global financial integrity and security.</p>
      </abstract>
      <kwd-group>
        <kwd>Regtech</kwd>
        <kwd>proliferation financing</kwd>
        <kwd>FATF</kwd>
        <kwd>anti-money laundering</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>AI Technologies⋆</p>
    </sec>
    <sec id="sec-2">
      <title>1. Introduction</title>
      <p>
        Large banks are increasingly relying on compliance technologies, known as “regtech” to meet
their anti-money laundering (AML) and combating of financing of terrorism (CFT) regulatory
obligations [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Where AI technologies are employed regtech’s usefulness to undertake more
complex task such as rating the risk of customers and identifying potential suspicious
transactions is enhanced. The need for appropriate and improved regtech increased with the adoption
of new risk assessment and risk mitigation standards in relation to proliferation financing (PF)
of weapons of mass destruction.
      </p>
      <p>This brief paper provides a short overview of the development of the latter standards, their
relationship with AML/CFT standards and some of common areas of application of regtech
to meet AML/CFT obligations. It concludes by highlighting a few cases that illustrate some
of the remaining legal risks related to reliance on regtech in this space. These risks will need
to be navigated by regulators, compliance oficers and technologists to ensure that the power
CEUR
of appropriately-designed regtech can be harnessed to increase global financial integrity and
security.</p>
      <p>The paper reflects initial perspectives gained in a study of the implementation of FATF’s PF
standards, especially their 2020 extension to require countries and AML/CFT/CPF-regulated
institutions (such as banks) to undertake PF risk assessments in relation to targeted financial
sanctions of the United Nations Security Council and to adopt enhanced control measures where
risks are found to be higher. Interviews were conducted with key FATF, FATF-style regional
bodies, proliferation and PF experts, compliance consultants, development experts, as well as
compliance oficers representing global, large and smaller banks.</p>
    </sec>
    <sec id="sec-3">
      <title>2. Background</title>
      <p>
        In January 2022 the Science and Security Board of the Bulletin of the Atomic Scientists placed
the hands of the Doomsday Clock at 100 second to midnight, the same placement position it
held since 2020. On 24 January 2023 the clock hand was moved 10 second later to 90 seconds
to midnight. This is the closest to midnight - the nightmare hour of global catastrophe - in its
75-year existence. The increasing nuclear risk linked to the war in Ukraine, the continuing
investment of the Democratic Republic of North Korea in its nuclear program, and the fragility
of international non-proliferation agreements added to this assessment [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>
        Given this risk, proliferation measures – broadly defined as measures aimed at combating
the acquisition and use weapons of mass destruction (WMD) – should enjoy priority attention
globally. While there is a broad measure of consensus that chemical and biological weapons
should not be produced and used, politics, however, complicate discussion and action on nuclear
proliferation and these complications are evident in a lack of consensus and weak agreements
on action where agreement is reached [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>
        Against this backdrop, the Financial Action Task Force (FATF), the global intergovernmental
standard-setting body for anti-money laundering (AML) and combating of financing of terrorism
(CFT), was given the mandate to also combat proliferation financing (PF), i.e. financial or
economic support for proliferation [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. FATF standards have a powerful impact as they determine
contents of national regulations and of compliance programs of regulated financial institutions
(e.g. banks, insurance companies, etc.) and designated businesses and professions (lawyers,
accountants, real estate agents, etc.) worldwide. Countries that fail to FATF standards efectively
may sufer negative economic impact linked to their non-compliance [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Banks and other
regulated institutions that fail to comply with AML/CFT laws face penalties that may run into
billions of dollars [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>
        The FATF mandate was however restricted to support for targeted financial sanctions (TFS)
adopted by the United Nations Security Council (UNSC) under Chapter VII of the United
Nations Charter against countries whose proliferation activities are deemed to threaten peace
or constituted breaches of the peace or acts of aggression [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. In practice, that means that the
FATF measures are focused on support for UNSC sanctions against Iran and North Korea. It is
furthermore restricted to the UNSC’s TFS in relation to those two countries, i.e. those sanctions
levied on named entities and individuals, and do not extend to general activities that are listed
as part of the UNSC’s activity-based sanctions [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
      <p>
        Despite the relative ease with which these PF-TFS measures could be implemented through
name-scanning against the sanctions lists, implementation was slow. A FATF report in 2022 on
the levels of compliance and efectiveness of the implementation of their standards found that
levels of efectiveness with this set of PF-TFS obligations to be largely unsatisfactory, with 52%
of FATF members and 82% of FATF-style regional body members rated either low or moderate.
Only 34% of the 59 sampled jurisdictions transposed UNSC designations without delay. In more
than two-thirds of countries, financial institutions demonstrated on average a medium-to-high
understanding of their obligations regarding PF-TFS but designated non-financial businesses
and professions had a poor to unclear understanding in 70% of cases [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
      <p>
        FATF’s presidency rotates and the improvement of the FATF’s contribution to combating
proliferation financing standards was a goal of the 2018-2019 US presidency of FATF [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
This resulted in 2020 in the adoption of enhanced standards that required countries and their
AML/CFT/CPF-regulated institutions to undertake PF-TFS risk assessments and to adopt
enhanced control measures where higher risks were identified [
        <xref ref-type="bibr" rid="ref11 ref7">7, 11</xref>
        ].
      </p>
      <p>The new risk assessment and risk mitigation requirements are not trivial. They require access
to information and the capacity of each regulated institution, large or small, to correctly assess
how their products and services may be used to evade targeted UNSC financial sanctions.</p>
      <p>
        FATF’s PF-TFS measures can make a meaningful contribution to non-proliferation if
implemented efectively and eficiently. This brief paper identifies some of the implementational
challenges regarding PF-TFS and useful contributions that AI technologies can make to increase
the efectiveness and eficiency of the relevant measures.
3. AML/CFT
In 1989 the G7 created a task force to advise on how best the large economies can protect
their financial systems against drug-related money laundering abuse. In 1990 the task force,
known as the Financial Action Task Force (FATF), produced 40 recommendations [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. These
recommendations have since developed into global standards. Each country is assessed by the
FATF framework for their level of technical compliance with the standards and, since 2013,
also for the efectiveness of their measures. Countries that are deemed to fall short, may be
grey- or blacklisted. Risk management requirements that apply to listed countries hold negative
economic impacts and listed countries generally work hard to reach the required compliance
levels to be delisted [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>
        The FATF standards create a framework where financial institutions and designated
nonifnancial businesses and professions must identify and verify the oficial identities of their
customers. They must also profile their customers and use these profiles to identify unusual
and suspicious transactions that may involve proceeds of crime. Collectively these measures
comprise “customer due diligence” (CDD) measures [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. Should concerns remain after internal
investigations these transactions must be reported to national financial intelligence units that
must support law enforcement agencies with appropriate financial intelligence. Certain standard
transactions, for example large cash transactions, may also be made reportable by countries
whether or not they are suspicious.
      </p>
      <p>
        In 1996 the FATF framework was extended to proceeds of all serious ofence and in 2001 to
ifnancing of terrorism using legitimate funds or proceeds of crime [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. In 2012 the FATF’s
scope was extended to support UNSC targeted sanctions in relation to proliferation financing,
as discussed in 2. FATF-related control measures have also become aligned with and embedded
in institutional compliance with national and global economic sanctions regimes.
      </p>
      <p>
        In practice, FATF measures require AML/CFT/CPF-regulated institutions to collect, manage
and analyze a large body of data. Customers have to identified by collecting specified identity
particulars, e.g. name, date of birth, national identity number (if any), residential address, etc.
This data must be verified in a manner specified by the institution’s risk-based compliance
framework, e.g. comparing the name to a government-issued document with the person’s
oficial name and photograph or other reliable, independent data or information [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] .
      </p>
      <p>
        Information must also be collected to understand how the customer wishes to use the services
and to profile the customer to anticipate transaction patterns [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. The patterns that can be
expected of a student’s account would difer from that of a salaried civil servant or a small
entrepreneur and deviations from expected behaviour would trigger a closer investigation by
the regulated institution.
      </p>
      <p>
        In addition, the FATF, in an efort to combat corruption, require regulated institutions to
determine whether any of their customers are foreign Politically Exposed Person or PEPs, and
to obtain senior management approval to provide services to such customers. PEPs, especially
foreign PEPs, are deemed to be at higher risk of PEPs are viewed as more vulnerable to bribery
and corruption. They include senior politicians, senior military and judicial oficers and senior
government oficials, their family members, close associates, and senior executives of any
state-owned business enterprise are defined as PEPs [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. PEP status can frequently change,
e.g. after a national election. Identifying whether a customer is a PEP or not, whether in your
country or elsewhere, requires PEP data and continuous customer scanning and data collection
[
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
      </p>
      <p>These tasks become even more complicated when the client is a company or a trust as the
regulated institutions must attempt to identify the natural persons who are the beneficial owners
and controllers of the client.</p>
      <p>
        Since 2012 the FATF embraced a mandatory risk-based approach, requiring countries and
institutions to undertake money laundering and terrorist financing risk assessments and adopt
enhanced AML/CFT control measures where higher risks are identified. Where lower risks
are present, countries may allow their institutions to simplify their CDD measures [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. The
risk-based approach requires ongoing risk assessment processes. These in turn require analysis
of appropriate data to determine changes in risk levels and the design and implementation of
appropriate risk mitigation measures.
      </p>
      <p>Regulated institutions therefore have to maintain diferent processes for customers depending
on their risk profiles and these profiles change as the customer’s own activities and relationship
change over time. For large institutions that is a formidable task that can only be performed
when supported by appropriate technology.</p>
    </sec>
    <sec id="sec-4">
      <title>4. AML/CFT, data and data technologies</title>
      <p>
        Over the course of the past two decades large regulated financial and other institutions invested
significant amounts in appropriate information systems to manage their customer due diligence
obligations [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ].
      </p>
      <p>
        New standards gave rise to obligations to access new data. When the PEP measures were
introduced, for example, there was a need to access data to identify PEPs in the existing customer
data base and to verify statements by new customers that they are not PEPs [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. Countries
refused to compile national lists of PEPs and therefore banks turned to the market. Vendors
like WorldCheck, since acquired by Refnitiv, was established to collect public data on PEPs,
sanctioned individuals and entities and other customers that may be of interest to regulated
ifnancial service providers for example arms dealers and persons publicly linked to organised
crime. While such data was useful it still required human capacity to consider the information
and inform appropriate decisions by senior management whether to commence, continue or
terminate a relationship with a controversial or higher risk customer.
      </p>
      <p>
        The need for increased human compliance expertise increased institutional compliance costs.
In 2022 LexisNexis estimated the total cost of financial crime compliance across financial
institutions worldwide to be 274.1,    213.9 billion in 2020 [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. After FATF’s adoption of
the mandatory risk-based standards in 2012, it led to “de-risking” or risk-related de-banking of
higher risk customers and sectors. De-risking is described by the FATF as the phenomenon of
financial institutions terminating or restricting business relationships with clients or categories of
clients to avoid, rather than manage, risk in line with the FATF’s risk-based approach. De-risking
afects a range of customers and sectors such as money remittance providers, correspondent
banks, charitable organisations, PEPs, fintech and workers in the legitimate sex industry [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ].
Despite expressions of concern by policymakers that de-risking may impede the access of small
countries to the global financial system, and numerous statements criticizing de-risking, policy
action to address it still remains limited.
      </p>
      <p>
        At an industry level there has been developments to save compliance costs by outsourcing
some of the customer identification and verification functions to a provider or an industry body
generally called a “Know-Your-Customer (KYC) utility”. These can operate in various forms as a
collaborative CDD vehicle [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. These have proved challenging to set up and operate profitably,
especially given the data protection and commercial confidentiality challenges that they need
to navigate, but these collaborative CDD relationships and networks continue to hold great
promise to increase the efectiveness of CDD measures while limiting costs [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ].
      </p>
      <p>
        With the increased digitalization of financial service and the rising trend of fintech innovation
attention began to turn to regtech – technologies that embed or facilitate regulatory compliance
– and suptech – technologies that support supervisory bodies to oversee compliance by regulated
institutions [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Global bodies and national regulators began to organise techsprints to support
the development of technologies that could support more efective and eficient – also
costeficient – AML/CFT/PF compliance [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ].
      </p>
      <p>
        In the same period, technology also began to pose increasing risks to AML/CFP/CPF policy
objectives. Blockchain technology enabled the development of virtual assets and pseudonymous
transactions that could evade AML/CFT/CPF control measures. New business models were
adopted that fell outside the existing regulatory scope. Criminal abuse of these products
increased. In June 2019 FATF therefore adopted standards requiring the registration or licensing
of virtual asset service providers (VASPs) [
        <xref ref-type="bibr" rid="ref21 ref22">21, 22</xref>
        ]. New technologies also increased cyber
security and data protection risks that could undermine AML/CFT/CPF control measures.
      </p>
      <p>
        The FATF in July 2021 published a report on opportunities and challenges of new technologies
for AML/CFT. While security, data protection and human-technology interaction were identified
as major challenges, important opportunities were identified for AI technologies were recognized
[
        <xref ref-type="bibr" rid="ref23">23</xref>
        ]:
      </p>
      <p>The increased use of digital solutions for AML/CFT based on Artificial Intelligence
(AI) and its diferent subsets (machine learning, natural language processing) can
potentially help to better identify risks and respond to, communicate, and monitor
suspicious activity. At public sector level, improved live (real-time) monitoring and
information exchange with counterparts enable more informed oversight of regulated
entities, helping to improve supervision. At private sector level, technology can
improve risk assessments, onboarding practices, relationships with competent authorities,
auditability, accountability and overall good governance whilst cost saving.</p>
      <p>
        The report, for example, identified a few examples of the potential value to be added by machine
learning. These include [
        <xref ref-type="bibr" rid="ref32">32</xref>
        ]:
• Identification and verification of customers: Where institutions deal with remote
customers AI, including biometrics, machine learning and liveness detection techniques, can
be used to perform micro expression analysis, anti-spoofing checks, fake image detection,
and human face attributes analysis.
• Monitoring of the business relationship and behavioural and transactional analysis:
Unsupervised machine learning algorithms can use behaviour to group customers and
enable tailored and eficient monitoring of the business relationship.
• Identification and implementation of regulatory updates: Machine Learning techniques
combined with Natural language processing, cognitive computing capability, and robotic
process automation can scan unstructured regulatory data sources on an ongoing basis
inform compliance decisions and processes.
      </p>
    </sec>
    <sec id="sec-5">
      <title>5. PF-TFS and technology</title>
      <p>
        The non-proliferation sanctions discussed earlier are being evaded by a range of actors. North
Korea is an example of a state that is building a nuclear program in defiance of international
agreements to prevent the spread of these technologies. Non-state parties such as terrorist
groups are also seeking access to these technologies. Non-proliferation control measures are
evaded by professional proliferators. A network operated by AQ Kahn, a Pakistani scientist who
enabled the development of Pakistan’s uranium enrichment capabilities, for example, assisted
other countries such as Iran, Libya and North Korea with their programs [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ]. Many of the
methods used were and are similar to those used by money launderers and terrorist financiers
to evade detection and law enforcement. Proliferators for example commit fraud and use front
companies and obscure beneficial ownership to order controlled goods. Good may ostensibly be
ordered for use in a third country but diverted en route or re-directed to a country of concern
[
        <xref ref-type="bibr" rid="ref25">25</xref>
        ].
      </p>
      <p>Analysing transactions that may involve proliferation activities to identify potential
PFTFS-relevant activities is challenging. Proliferation often involve so-called controlled goods
(such as arms) and especially dual-use goods, i.e. technology that can be abused to construct
WMD or applied for civilian purpose such as medical applications. These goods are normally
identified and described in lists issued by government. Where banks provide trade finance
bank compliance oficers are required to identify when goods subject to export controls may be
involved in a specific transaction without the required permission having been obtained. Lack
of suficient technical knowledge to identify the relevant goods, especially when they are not
described using the language in the list of controlled goods, will undermine the efectiveness of
a bank’s compliance processes. Proliferators also evade controlled goods processes by exporting
goods that fall below the specifications of listed controlled goods but can be upgraded for WMD
use when received at the final destination. Many bank compliance oficers do not necessarily
have the technical expertise to identify relevant trade transaction.</p>
      <p>
        Bank compliance oficers need to understand which countries pose a higher proliferation
risk. Often controlled goods are not exported directly to these countries but diverted to other
countries from where they will be shipped to their final destination [
        <xref ref-type="bibr" rid="ref25 ref7">7, 25</xref>
        ]. Some countries are
more likely to be such transit destinations, often linked to their geographical position and also
their political relationship with the country of final destination.
      </p>
      <p>
        In addition to supporting human decision-taking by filling gaps in expertise, AI technologies
may fulfil a range of other helpful functions too. Schörnig investigated the use of AI as an WMD
arms control tool and points to a range of additional helpful functions that AI technologies may
perform such as translation of technical texts from languages such as Russian, Farsi, Korean,
Arabic and Swahili; interpretation of fast-changing rules and embedding them in Compliance
by/through Design into compliance processes [44]; analysis of visual data, e.g. images of freight
haulage and storage; integration of multi-modal data (the above and more, e.g. communications,
media and social media, etc); and data visualisation to support human decision-taking, where
required [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ].
      </p>
      <p>That said, the standards, though ambitious in some respects, are minimum standards.
Countries and their regulated institutions are therefore able to go beyond these standards and related
laws when they design their FATF-related compliance measures Banks, for example, may extend
their proliferation financing measures beyond UNSC targeted financial sanctions. While such an
extension will support broader non-proliferation, it will also be more challenging than PF-TFS.
Appropriate technology, especially when available to the regulated industry as a whole, will
greatly lessen implementational challenges.</p>
      <p>
        Developers of AI technologies to support proliferation financing will need to navigate a few
barriers. Schörnig, for example, points out that in the proliferation context “the events AI has to
be trained for are very rare but have very serious consequences” [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ]. In addition to analysing
big data on customers, AI also have to be trained on thin datasets of examples of evasion of
proliferation controls. The fact that we have a relatively small number of PF evasion examples
will impact the quality of AI tool. That impact, however, will not necessarily undermine their
efectiveness compared to human detection, given the limited available of appropriate human
expertise. Compliance professionals across the regulated industries globally have to be informed
and trained on new examples and, given the scale of human involvement in AML/CFT/CPF,
this would inevitably alert the proliferators to the known typologies. Inevitably they would
simply adopt alternative approaches to evade human detection. AI technologies may therefore
not be at a significant disadvantage compared to human detection capabilities in this space.
      </p>
    </sec>
    <sec id="sec-6">
      <title>6. Legal regtech hurdles to navigate</title>
      <p>
        While technologists grapple with the design of regtech that would provide appropriate support
for AML/CFT/CPF compliance, compliance oficers are grappling with regulatory liability
regarding the use of regtech. In general, regtech is viewed as a merely a tool and it does not
shift the ultimately institutional responsibility for non-compliance from the regulator to the
designer. The compliance function of the institution must however be comfortable with the
technology, understand its strengths and limits; and be able to compensate for the latter. They
are the “human(s) in the loop” of AI regtech in this space [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ], but their involvement may
not be particularly beneficial unless they are appropriately skilled and resourced. Two recent
Australian cases involving two of Australia’s largest banks show that it should not be assumed
that the relevant humans have the required skills and resources.
      </p>
      <p>
        In June 2018, AUSTRAC, the Australian AML/CFT/CPF regulator, agreed to a AUD 700
million (EUR 435 million) penalty with the Commonwealth Bank of Australia (CBA) to
resolve Federal Court proceedings relating to serious breaches of AML/CTF/CPF laws [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ]. Key
charges related to the failure of CBA to introduce appropriate controls to mitigate and
manage the ML/TF risks of new Intelligent Deposit Machines (IDMs) smart ATMs, that were
able to accept deposits. CBA failed to provide 53,506 threshold transaction reports (TTRs)
to AUSTRAC on time from November 2012 to September 2015, having a total value of about
A625 .     ℎℎ   ℎℎ   10,000 or more.
      </p>
      <p>
        The 53,506 TTRs relate to cash deposits via the IDMs. When IDMs were introduced CBA
designed and implemented an automated process to identify threshold transactions and to report
them to AUSTRAC. The process identified transactions by transaction codes. Two transaction
codes were used to identify the types of deposits involving cash that could be made through
IDMs, being transaction codes 5022 and 4013. In June 2012, an issue was identified regarding
an error message. To address that error message, a third transaction code was introduced for
certain cash deposits through IDMs, being transaction code 5000. At that time, however, the
TTR process was inadvertently not updated and configured to respond to transactions with the
transaction code 5000 with a view to filing an AUSTRAC report. This was clearly the result of
human error. As a result, cash deposits through IDMs identified by transaction code 5000 did
not automatically generate TTRs from 5 November 2012 to 1 September 2015 [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ].
      </p>
      <p>
        In 2020, Westpac, another large Australian bank agreed a AUD 1,3 billion (EUR 806 billion)
ifne with AUSTRAC [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ]. Its serious breaches of AML/CFT/CPF laws included the failure to
report to AUSTRAC all International Funds Transfer Instructions (IFTIs) that it received or sent.
The bank failed to report approximately 19.5 million IFTIs over a 6-year period. Non-compliance
was due to technology failings and human error. Most of the failings could be traced back to the
design and implementation program of the IFTI program in 2009, where the bank stated [
        <xref ref-type="bibr" rid="ref31">31</xref>
        ]:
… resource constraints in the relevant technology team impacted the successful
implementation of the project. In 2011/12, there was also a high turnover of staf where a
whole team departed to join another organisation. The loss of continuity and specialist
knowledge associated with these departures contributed to the implementation errors.
      </p>
      <p>These experiences – and the fines – are sobering. They do have a chilling impact on the
appetite to employ technology where there is concern about the institutional compliance capacity
to identify and correctly manage the attendant technology and technology implementation
risks.</p>
      <p>In addition, institutions also need to be mindful of attitudes of the regulators. Regulators
tend to be conservative, especially in the AML/CFT/CPF space, and may not support the use of
technology for certain compliance functions.</p>
      <p>
        The use of machine learning and AI technologies to support AML/CFT compliance featured
recently in a compliance dispute in the Netherlands. The Dutch central bank, De Nederlandsche
Bank (DNB) took action for non-compliance against the digital challenger bank, Bunq, who
was using data analytics to perform some of its compliance functions [
        <xref ref-type="bibr" rid="ref32">32</xref>
        ]. On appeal, the
some of the conclusions reached by DNB was upheld but the most important conclusions were
overruled.
      </p>
      <p>As pointed out above in 3, a key compliance obligation of a bank is to understand the purpose
and intended nature of the business relationship when an account is opened. That understanding
informs the risk profile and expected transaction profile of the customer. This in turn is then
used to identify outlier transactions for further investigation and potential reporting to the
authorities as suspicious.</p>
      <p>While new business customers were asked questions about their activities and intended use
of the new account, Bunq had a large number of existing customers that were not asked those
questions. Bunq used its data about those customers, including data about their behaviour, to
construct their profiles. (par 8.5.2). The data included the user identity, expected monthly
transaction volume, formal business activity description (according to the Chamber of Commerce),
and company activities. (par 8.5.4) The DNB rejected that approach as insuficient as it believed
that Bunq had to collect that profiling information from each customer. While such profiles are
generally constructed before account opening, the DNB conceded that they can be adjusted
during the relationship based on new information or transactional patterns that may form. (par
8.5.4) Given that the relevant legislation does not prescribe how the customer due diligence
should be performed, the appellate board found that the DNB has not proved that Bunq failed to
establish the purpose and intended nature of the individual business relationships. It therefore
ruled in Bunq’s favour.</p>
      <p>Bunq’s approach to the intended use and transaction profile of private (i.e. non-business)
customers was somewhat diferent. (par 8.6.1). Bunq distinguishes between two segments of
private customers (peer groups): (i) a group of customers who fall within the ’regular user’
profile and who use the current account within the limits of ’regular use’, and (ii) a group of
customers who do not fall within the ’regular user’ profile and/or who do not use use the Bunq
payment account within the ’regular use’ limits.</p>
      <p>Bunq compiled the following regular user profile based on an analysis of data from its
customers and the use of the current account by customers:</p>
      <sec id="sec-6-1">
        <title>Age of customers: Country of residence:</title>
      </sec>
      <sec id="sec-6-2">
        <title>Purpose:</title>
        <p>transaction volume:
Maximum balance:
Number of payments per month:
8-60 years
Netherlands, Belgium, Germany, Austria, Italy, Spain
or France
Standard Payment Account (Monthly outgoing)
EUR 10,000
EUR 10,000</p>
        <p>Up to 150</p>
        <p>According to Bunq’s analysis of its current customers the vast majority of its private customers
fall within this profile and use Bunq’s payment account accordingly.</p>
        <p>Based on this analysis, new customers are initially assigned this profile. Bunq then uses
the data collected during the account registration process, as well as information that Bunq
subsequently collects about the customer (such as transaction behaviour), to check whether
a customer remains within the regular user profile. When this is no longer the case, Bunq
depending on the risk profile of the relevant customer and the customer’s deviations from the
regular user profile - automatically asks the customer a number of questions. The customer’s file
is also manually reviewed. If a customer does not answer these questions within the set period,
the customer will be (temporarily) denied access to the account. Using the new information the
customer’s profile is updated and the customer is no longer classified as a regular user.</p>
        <p>In addition, Bunq treats non-regular users diferently. Bunq’s data analysis shows that,
statistically, non-regular users form a higher risk. As a consequence, the risk profile of these
customer is adjusted upwards. Customers with a higher risk profile are subject to more intensive
transaction monitoring.</p>
        <p>DNB rejected this approach of assigning the same ’regular user profile’ to every client falling
within the general group (par 8.6.2.) It argued that, by failing to obtain specific information
from the client in advance, Bunq has insuficient insight in advance into the nature and purpose
of the relationship and therefore into the possible risks that the service entails. The standard
profile is based on assumptions rather than collected facts.</p>
        <p>The appeal board found in this respect in favour of Bunq. The board held that DNB failed
to show why the information obtained by Bunq via data analysis and statistical research was
insuficient to determine the purpose and intended purpose for private customers who want to
open a payment account and who fall within the ’regular user profile’. It held that DNB did not
contradict Bunq’s argument that, statistically speaking, a vast majority of its private customers
fall within this profile and use the current account in a similar way. Bunq has furthermore
established on the basis of statistical analysis that the risk of fraud among these customers
is smaller than customers who do not fall within that profile (par 8.6.4.) The appellate board
therefore found in Bunq’s favour on this aspect too.</p>
        <p>DNB also argued that Bunq’s continuous monitoring of its customers was defective because it
was applying the statistically-generated risk profile rather than a specific risk profile informed
by data obtained from each individual customer. DNB argued that Bunq only asked questions
after deviations have been detected from the pre-filled standard values. Given the earlier finding
that DNB did not prove that these profiling processes of Bunq were defective, this argument
about monitoring was also rejected.</p>
        <p>Bunq’s processes regarding PEP checks and the quality of its investigation into the source of
the funds of customers were however held to be non-compliant.</p>
        <p>Bunq’s appeal was largely successful and its use of data analytics and statistics was
supported by the appeal board. DNB’s conservative approach to the use of data analytics and
machine learning is however somewhat sobering. DNB has been very progressive in relation to
technology but even progressive regulators and supervisors may need a nudge to adjust their
approaches and allow financial institutions to embrace advanced data technologies to support
their compliance functions. Until they signal clearly to the market where reliance on technology
would meet statutory compliance requirements and the conditions that would apply for such
reliance to enjoy the support of the regulator, the industry may not fully embrace the benefits
of the relevant technology.</p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>7. Conclusion</title>
      <p>AML/CFT measures aim to minimize the risk of organized crime and terrorism globally. These
are important objectives but arguably not as important as the objectives of non-proliferation.
Here the risks are dire. The task of preventing the financing of weapons of mass destruction
outside the norms of international law and the frameworks of international agreements is,
however, complex. If regulated institutions such as banks are to perform this task well they
will need appropriate regtech. Designing that technology will be a complex task that will
require governments, technologists, proliferation scientists, trade experts, criminologists and
compliance professionals to collaborate. In addition a regulatory framework will need to be
created that will enable institutions and their compliance oficers to rely on such technology
without undue exposure to legal risk. The cases mentioned in this paper reflect some of the
complexity that regulators will need to consider when these technologies are used and overseen
by imperfect institutions, teams and individuals. Careful thought should also be given to access
to the technology. Smaller institutions may be at risk of abuse if they are unable to aford the
expensive regtech that large banks can employ. Gaps in the financial industry can undermine
the efectiveness of PF measures. Collaboration, especially collaborative CDD, will therefore be
ideal.</p>
    </sec>
    <sec id="sec-8">
      <title>Acknowledgments</title>
      <p>The support of SOAS; Wolfson College, Oxford; the Faculty of Law of the Autonomous University
of Barcelona, and especially the IDT-UAB; the IIA-CSIC and all the kind colleagues of these
institutions are gratefully acknowledged.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>L.</given-names>
            <surname>De Koker</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Morris</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Jafer</surname>
          </string-name>
          , ”
          <article-title>Regulating Financial Services in an Era of Technological Disruption”</article-title>
          ,
          <source>Law in Context 36.2</source>
          (
          <year>2019</year>
          ):
          <fpage>90</fpage>
          -
          <lpage>112</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2] Science and
          <string-name>
            <given-names>Security</given-names>
            <surname>Board</surname>
          </string-name>
          , ”2023
          <string-name>
            <given-names>Doomsday</given-names>
            <surname>Clock</surname>
          </string-name>
          <article-title>Statement”</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>A.</given-names>
            <surname>Debs</surname>
          </string-name>
          and
          <string-name>
            <given-names>N. P.</given-names>
            <surname>Monteiro</surname>
          </string-name>
          , Nuclear Politics, Cambridge, Cambridge University Press,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Financial</given-names>
            <surname>Action Task Force</surname>
          </string-name>
          , ”
          <article-title>Declaration of the Ministers and Representatives of the Financial Action Task Force”</article-title>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>L.</given-names>
            <surname>De Koker</surname>
          </string-name>
          , ”
          <article-title>Economic Impact of FATF Greylisting”</article-title>
          ,
          <source>Proc. Third Bahamas Empirical Anti-Money Laundering Conference, Central Bank of the Bahamas, Nassau</source>
          ,
          <fpage>20</fpage>
          -
          <issue>21</issue>
          <year>January 2022</year>
          (
          <year>2022</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>M.</given-names>
            <surname>Collin</surname>
          </string-name>
          , L. De Koker,
          <string-name>
            <given-names>M.</given-names>
            <surname>Juden</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. L.</given-names>
            <surname>Myers</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Ramachandran</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Sharma</surname>
          </string-name>
          , and
          <string-name>
            <given-names>G. M.</given-names>
            <surname>Tata</surname>
          </string-name>
          , ”
          <article-title>Unintended consequences of anti money laundering policies for poor countries”, Centre for Global Development (</article-title>
          <year>2015</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>Financial</given-names>
            <surname>Action Task Force</surname>
          </string-name>
          , ”
          <article-title>Guidance on Proliferation Financing Risk Assessment and Mitigation” (</article-title>
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>Financial</given-names>
            <surname>Action Task Force</surname>
          </string-name>
          , ”
          <article-title>International Standards on Combating Money Laundering and The Financing Of Terrorism &amp; Proliferation: The FATF Recommendations” (</article-title>
          <year>2012</year>
          -
          <fpage>2022</fpage>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>Financial</given-names>
            <surname>Action Task Force</surname>
          </string-name>
          , ”
          <article-title>Report on the State of Efectiveness and Compliance with the FATF Standards” (</article-title>
          <year>2022</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>Financial</given-names>
            <surname>Action Task Force</surname>
          </string-name>
          , ”
          <article-title>Objectives for the FATF during the US Presidency 2018-</article-title>
          <year>2019</year>
          ”
          <article-title>(2018-</article-title>
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11] https://www.fatf-gafi.org/media/fatf/documents/reports/Guidance-ProliferationFinancing
          <string-name>
            <surname>-Risk-</surname>
          </string-name>
          Assessment-Mitigation.pdf, accessed
          <year>June 2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>L. De Koker</surname>
            , and
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Turkington</surname>
          </string-name>
          , ”
          <article-title>Transnational organised crime and the anti-money laundering regime”</article-title>
          ,
          <source>International law and transnational organised crime</source>
          ,
          <year>2016</year>
          :
          <fpage>241</fpage>
          -
          <lpage>263</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>Financial</given-names>
            <surname>Action Task Force</surname>
          </string-name>
          , ”Guidance on Digital Identity” (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>L. De Koker</surname>
          </string-name>
          , ”
          <article-title>Applying anti-money laundering laws to fight corruption”, in: A. Graycar, Handbook of global research and practice in corruption</article-title>
          , Cheltenham, Edward Elgar,
          <year>2011</year>
          , pp.
          <fpage>340</fpage>
          -
          <lpage>358</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>Hong</given-names>
            <surname>Kong Monetary Authority</surname>
          </string-name>
          , ”AML/CFT Regtech:
          <article-title>Case Studies and Insights” (</article-title>
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16] https://risk.lexisnexis.com/global/en/insights-resources/research/true
          <article-title>-cost-of-financialcrime-compliance-study-global-report</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>L. De Koker</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Singh</surname>
            ,
            <given-names>and J.</given-names>
          </string-name>
          <string-name>
            <surname>Capal</surname>
          </string-name>
          , ”
          <article-title>Closure of Bank Accounts of Remittance Service Providers: Global Challenges</article-title>
          and Community Perspectives in Australia”,
          <source>University of Queensland Law Journal</source>
          <volume>36</volume>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>T.</given-names>
            <surname>Lyman</surname>
          </string-name>
          , L. De Koker,
          <string-name>
            <given-names>C.</given-names>
            <surname>Martin Meier</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Kerse</surname>
          </string-name>
          , ”Beyond KYC Utilities:
          <article-title>Collaborative Customer Due Diligence” (</article-title>
          <year>2019</year>
          ), https://www.cgap.org/blog/series/beyond-kycutilities
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>F.</given-names>
            <surname>Diepenmaat</surname>
          </string-name>
          , ”
          <article-title>(The Fight Against) Money Laundering: It's All About Networks”</article-title>
          , in: O.
          <string-name>
            <surname>M. Granados</surname>
            and
            <given-names>J. R.</given-names>
          </string-name>
          <string-name>
            <surname>Nicolás-Carlock</surname>
          </string-name>
          (Eds.),
          <source>Corruption Networks: Concepts and Applications</source>
          <year>2021</year>
          , Springer, Cham, pp.
          <fpage>115</fpage>
          -
          <lpage>130</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>[20] https://www.bis.org/hub/g20_techsprint.htm</mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21] https://www.fatf-gafi.org/media/fatf/documents/recommendations/Updated-GuidanceVA-VASP.pdf, accessed
          <year>October 2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>L. De Koker</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Ocal</surname>
            , and
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Casanovas</surname>
          </string-name>
          , ”
          <article-title>Where's Wally? FATF, Virtual Asset Service Providers, and the Regulatory Jurisdictional Challenge”</article-title>
          , in D. Goldbarsht, and L.
          <string-name>
            <surname>De</surname>
            <given-names>Koker</given-names>
          </string-name>
          , (Eds.),
          <source>Financial Technology and the Law : Combating Financial Crime</source>
          , Springer International Publishing, Cham,
          <year>2022</year>
          , pp.
          <fpage>151</fpage>
          -
          <lpage>183</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>Financial</given-names>
            <surname>Action Task Force</surname>
          </string-name>
          , ”Opportunities and Challenges of New Technologies for AML/CFT” (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>P. F.</given-names>
            <surname>Ikonomou</surname>
          </string-name>
          , Global Nuclear Developments:
          <article-title>Insights from a Former IAEA Nuclear Inspector</article-title>
          , Springer, Cham,
          <year>2020</year>
          , pp.
          <fpage>25</fpage>
          -
          <lpage>66</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>J.</given-names>
            <surname>Brewer</surname>
          </string-name>
          , ”
          <article-title>Study of Typologies of Financing of WMD Proliferation - Final Report”, Centre for Science and Securities Studies, King's College</article-title>
          , London, (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>N.</given-names>
            <surname>Schörnig</surname>
          </string-name>
          , ”
          <article-title>Artificial Intelligence as an Arms Control Tool: Opportunities and Challenges”</article-title>
          , in: T. Reinhold, and N. Schörnig (Eds.), Armament,
          <source>Arms Control and Artificial Intelligence: The Janus-faced Nature of Machine Learning in the Military Realm</source>
          , Springer, Cham,
          <year>2022</year>
          , pp.
          <fpage>57</fpage>
          -
          <lpage>72</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>D. A.</given-names>
            <surname>Zetzsche</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. W.</given-names>
            <surname>Arner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.P.</given-names>
            <surname>Buckley</surname>
          </string-name>
          , and
          <string-name>
            <given-names>B.</given-names>
            <surname>Tang</surname>
          </string-name>
          , ”
          <article-title>Artificial Intelligence in Finance: Putting the Human in the Loop”</article-title>
          ,
          <source>Sydney Law Review</source>
          <volume>43</volume>
          (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <surname>AUSTRAC</surname>
          </string-name>
          <article-title>: 'AUSTRAC and</article-title>
          CBA agree $
          <volume>700</volume>
          penalty' (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29] https://www.commbank.com.au/guidance/newsroom/CBA-and
          <article-title>-</article-title>
          <string-name>
            <surname>AUSTRAC-</surname>
          </string-name>
          resolveAMLCTF
          <source>-proceedings-201806.html, accessed Federal Court of Australia, NSD1305 of</source>
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>N.</given-names>
            <surname>Locke</surname>
          </string-name>
          , and
          <string-name>
            <given-names>H.</given-names>
            <surname>Bird</surname>
          </string-name>
          , ”
          <article-title>Perspectives on the current and imagined role of artificial intelligence and technology in corporate governance practice and regulation”</article-title>
          ,
          <source>Perspectives on the Current and Imagined Role of Artificial Intelligence and Technology in Corporate Governance Practice and Regulation (February</source>
          <volume>9</volume>
          ,
          <year>2020</year>
          ).
          <source>Australian Journal of Corporate Law</source>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31] Westpac Group:
          <article-title>'Westpac Releases Findings into AUSTRAC Statement of Claims Issues' (</article-title>
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <surname>Bunq BV v De Nederlandsche Bank (DNB)</surname>
          </string-name>
          (
          <year>2022</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>