ASPECTS OF MONEY LAUNDERING IN SOUTH AFRICAN...
Transcript of ASPECTS OF MONEY LAUNDERING IN SOUTH AFRICAN...
-
ASPECTS OF MONEY LAUNDERING IN SOUTH AFRICAN LAW
by
IZELDE LOUISE VAN JAARSVELD
submitted in accordance with the requirements
for the degree of
DOCTOR OF LAWS
at the
UNIVERSITY OF SOUTH AFRICA
SUPERVISOR: PROF J T PRETORIUS
APRIL 2011
-
Student Number: 3362-407-0
I declare that ASPECTS OF MONEY LAUNDERING IN SOUTH AFRICAN LAW is myown work and that all sources that I have used or quoted have been indicated and acknowledgedby means of complete references.
Izelde Louise van Jaarsveld 3 April 2011
(MS IL VAN JAARSVELD) Date
-
ii
SYNOPSIS
Money laundering involves activities which are aimed at concealing benefits that were acquired
through criminal means for the purpose of making them appear legitimately acquired. Money
laundering promotes criminal activities in South Africa because it allows criminals to keep the
benefits that they acquired through their criminal activities. It takes place through a variety of
schemes which include the use of banks. In this sense money laundering control is based on the
premise that banks must be protected from providing criminals with the means to launder the
benefits of their criminal activities.
The Financial Intelligence Centre Act 38 of 2001 (‘FICA’) in aggregate with the
Prevention of Organised Crime Act 121 of 1998 (‘POCA’) form the backbone of South Africa’s
anti-money laundering regime. Like its international counterparts FICA imposes onerous duties
on banks seeing that they are most often used by criminals as conduits to launder the benefits of
crime. In turn, POCA criminalises activities in relation to the benefits of crime and delineates
civil proceedings aimed at forfeiting the benefits of crime to the state. This study identifies the
idiosyncrasies of the South African anti-money laundering regime and forwards
recommendations aimed at improving its structure.
To this end nine issues in relation to money laundering control and banks are investigated.
The investigation fundamentally reveals that money laundering control holds unforeseen
consequences for banks. In particular, a bank that receives the benefits of crimes such as fraud
or theft faces prosecution if it fails to heed FICA’s money laundering control duties, for example,
the filing of a suspicious transaction report. However, if the bank files a suspicious transaction
report, it may be sued in civil court by the customer for breach of contract. In addition, if the bank
parted with the benefits of fraud or theft whilst suspecting that the account holder may not be
entitled to payment thereof, it may be sued by the victim of fraud or theft who seeks to recover
loss suffered at the hand of the fraudster or thief from the bank.
Ultimately, this study illustrates that amendment of some of the provisions of South
Africa’s anti-money laundering legislation should enable banks to manage the aforementioned
and other unforeseen consequences of money laundering control whilst at the same time
contribute to the South African anti-money laundering effort.
KEY TERMS – Money laundering control; banks; Financial Intelligence Centre Act of 2001;
-
iii
Prevention of Organised Crime Act of 1998; Money Laundering and Terrorist Financing Control
Regulations of 2002; globalisation of criminal activity; money; bank-customer relationship; bank
confidentiality; safe-harbour provisions; ownership of deposited money; proceeds of crime; Basel
Committee on Banking Regulations and Supervisory Practices; Statement of Principles; Financial
Action Task Force on Money Laundering; Forty Recommendations; Council of Europe; Third
Anti-Money Laundering Directive; KYC Standard; customer due diligence; Vienna Convention;
Strasbourg Convention; Proceeds of Crime Act 2002; Bank Secrecy Act; Patriot Act; Financial
Crimes Enforcement Network; common-law ownership remedies; constructive trust; tracing; rei
vindicatio; quasi-vindictory action; actio Pauliana; interdicts; unjust enrichment condictiones;
civil forfeiture; innocent owner defence
-
iv
ACKNOWLEDGEMENTS
Soli Deo Gloria
I would like to thank various people who have been involved with, in at least one way or another,in the preparation of this study. First and foremost, I would like to thank Jesus Christ, mysaviour, for granting me the opportunity and perseverance to undertake and complete this study.
In addition, I would like to thank Professor Jopie Pretorius for allowing me to study under him,and for his guidance, assistance and insight that made this study possible. His reviews andcomments on the drafts of this study were invaluable. During the many periods of ill health thatmarked this study for me, his patience and support became indispensable, and I will always begrateful.
I further owe a great debt of gratitude to the University of South Africa and the Centre forBusiness Law at the Department of Mercantile Law for extending to me the necessary funds toundertake research at the University of Leuven in Belgium, Southern Methodist University inDallas, Texas, University of Columbia in New York, the Institute for Advanced Legal Studiesin London and the University of Western Ontario in Canada.
I am grateful to Professor Muthu Sigwadi, Chair of the Department of Mercantile Law, whoallowed my to work at home during the final months of this study. I will always be indebted tomy colleague, Professor Heinrich Schulze, for his support and advice during the last months ofcompleting the study - his quiet assistance and support did not go unnoticed.
Throughout the development of this study, my family took an interest and supported my work.I would like to say thank you. In this respect, a very special thanks to my father, Fanie vanJaarsveld, for his enthusiasm and sound advice. He is the perfect example of kindness and ahumble spirit. Thanks also to my twin, Marlize, for the example you set, the input, thoughts andunwavering support. I am privileged.
Thank you to Dirk and Ingrid, Fanie and Ilze who over the years were willing to put up with myworking on the subjects contained in what follows. Your support saw me through. George, Laraand Liza-Byrd allowed lots of cuddles.
-
v
THESIS PLAN
Aspects of Money Laundering in South African Law
CHAPTER 1 CHAPTER 2 CHAPTER 3Introduction Concepts of Money Bank-Customer RelationshipProblem Statement Benefits of Crime Bank as Owner of Deposited
Benefits of Crime
CHAPTER 4Definition of Money Laundering
Money Laundering Process Consequences of Money Laundering
INTERNATIONAL POSITION
CHAPTER 5 CHAPTER 6 CHAPTER 7International Institutions EU Position US Position Basel Committee 2005 Directive Bank Secrecy Act FATF Civil Remedies Money Laundering Control Act United Nations Patriot Act
Industry Measures English Position IMF & World Bank Proceeds of Crime Act Wolfsberg Principles * Egmont Group
Civil Remedies Civil Remedies
*Constructive TrustTracingCivil Forfeiture
SOUTH AFRICAN POSITION
CHAPTER 8
AML Legislation Civil Remedies Financial Intelligence Centre Act Rei Vindicatio, Quasi-Vindictory Action, Actio Prevention of Organised Crime Act Pauliana, Interdict
Unjust Enrichment Condictiones Civil Forfeiture
CHAPTER 9Conclusions and Recommendations
-
vi
LIST OF ACRONYMS
ALI American Law Institute
AML Anti-Money Laundering
BIS Bank for International Settlements
CFR Code of Federal Regulations (USA)
CHIPS Clearing House Interbank Payment System
CTR Currency Transaction Report
EC European Commission
EFT Electronic Fund Transfer
EU Countries on the European Continent that are subject to EU Law
FATF Financial Action Task Force on Money Laundering
FICA Financial Intelligence Centre Act of 2001 (South Africa)
FIC Financial Intelligence Centre
FIU Financial Intelligence Unit
IMF International Monetary Fund
KYC Know Your Customer
MVT Money Value Transfer
NDPP National Director of Public Prosecutions
PCA Proceeds of Crime Act 2002 (England)
POCA Prevention of Organised Crime Act of 1998 (South Africa)
NPA National Prosecuting Authority
STR Suspicious Transaction Report
SWIFT Society for Worldwide Interbank Financial Telecommunication
UCC Uniform Commercial Code
UN United Nations
US United States of America
USC United States Code
-
vii
TABLE OF CONTENTS
Page
Synopsis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ii
Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iv
Thesis Plan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v
List of Acronyms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .vi
Table of Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
CHAPTER 1: GENERAL INTRODUCTION
A. INTRODUCTION
1. Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
2. Money Laundering Control Legislation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
3. Dilemma of Banks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
B. PROBLEM STATEMENT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
C. RESEARCH METHODOLOGY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
D. OVERVIEW OF STUDY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
CHAPTER 2: CONCEPTS OF MONEY
A. INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
1. Money as Chattel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
2. Money as Medium of Exchange . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
3. Money as Legal Tender . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
B. HISTORICAL DEVELOPMENT OF MONEY
1. The Origin of Banknotes and Coins . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
2. Electronic Banking
2.1 Electronic Banking as Part of E-Commerce . . . . . . . . . . . . . . . . . . . 51
2.2 Specific Problems of Electronic Banking . . . . . . . . . . . . . . . . . . . . . 51
2.3 Electronic Transfers
2.3.1 Overview and Primary Concepts . . . . . . . . . . . . . . . . . . . . . 52
-
viii
2.3.2 Legal Nature of a Fund Transfer Instruction . . . . . . . . . . . . . 54
2.3.3 Legal Nature of Credit and Debit Transfers . . . . . . . . . . . . . 55
2.3.4 Internet Transfers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
2.3.5 Completion of Payment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
2.4 Electronic Money . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
C. MODERN CONCEPTUALISATION OF MONEY
1. Theoretical Approach
1.1 State Theory of Money . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
1.2 Societal Theory of Money . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
1.3 Res Corporalis and Res Fungibililes . . . . . . . . . . . . . . . . . . . . . . . . . 65
2. Value of Money . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
3. Proposed Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
4. Commingled Money
4.1 Criterion of Mixing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
4.2 Money in a Bank Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
5. Concept of ‘Benefits of Crime’
5.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
5.2 Historical Aspects
5.2.1 Drugs and Organised Crime . . . . . . . . . . . . . . . . . . . . . . . . . . 77
5.2.2 Organised Crime and the Benefits of Crime . . . . . . . . . . . . . . 78
5.3 Different Notions of the Concept ‘Benefits of Crime’
5.3.1 Criminal Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
5.3.2 Tainted Theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
5.3.3 Alley Cat Clothing v De Lisle Weare Racing . . . . . . . . . . . . . . 82
D. CHAPTER COMMENTARY AND SUMMARY . . . . . . . . . . . . . . . . . . . . . . . . . 84
CHAPTER 3: ASPECTS OF THE BANK-CUSTOMER RELATIONSHIP
A. INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
B. BANK-CUSTOMER RELATIONSHIP
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
-
ix
2. Legal Framework
2.1 Relationship of Debtor and Creditor
2.1.1 General Principles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
2.1.2 Bank’s Receipt of the Benefits of Fraud or Theft
2.1.2.1 Right to Terminate Contractual Relationship
Voidable Contract . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Bredenkamp and others v Standard Bank of South
Africa and another . . . . . . . . . . . . . . . . . . . . . . . . . . 97
2.1.2.2 Right to Refuse Payment of Deposited Moneys
General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Intention of Account Holder . . . . . . . . . . . . . . . . . . . . 102
2.2 Bank’s Duty of Care . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
2.3 Bank’s Duty of Confidentiality
2.3.1 Foundation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
2.3.2 Common-Law . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
2.3.3 Statutory Law
2.3.3.1 General Legislation . . . . . . . . . . . . . . . . . . . . . . . . . . 122
2.3.3.2 Anti-Money Laundering Legislation . . . . . . . . . . . . . 123
2.3.4 Limits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
3. Legal Nature of Current Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
C. BANK AS OWNER OF DEPOSITED MONEYS
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
2. Concept of Ownership
2.1 Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
2.2 Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
3. Ownership of Money in Account
3.1 Meaning of Receipt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
3.2 Receipt for Own Use and Benefit
3.2.1 General Principles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
3.2.2 Joint Stock Varvarinskoye v Absa Bank Ltd
3.2.2.1 Facts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
-
x
3.2.2.2 Decision . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
3.2.2.3 Discussion: Money for Own Use . . . . . . . . . . . . . . . 141
3.3 Receipt as Reduction of Overdraft . . . . . . . . . . . . . . . . . . . . . . . . . . 143
D. CHAPTER COMMENTARY AND SUMMARY . . . . . . . . . . . . . . . . . . . . . . . . 148
CHAPTER 4: THE JURISPRUDENCE OF MONEY LAUNDERING
A. INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
B. WHAT IS MONEY LAUNDERING?
1. Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
2. Historical Development of Money Laundering
2.1 Historical Context . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
2.2 Development of Anti-Money Laundering Legislation - Moral Panic 162
3. Scale of Money Laundering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
4. Stages in Money Laundering Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
C. HOW DOES MONEY LAUNDERING WORK?
1. Misuse of the Financial System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
2. Misuse of Legal Entities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
3. Misuse of Certain Professional Groups: Attorneys . . . . . . . . . . . . . . . . . . . . 175
4. Integration of Benefits of Crime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
D. EMPLOYING THE BANKING SYSTEM
1. General Banking Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
2. Correspondent Banking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
3. Private Banking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
4. Electronic Banking Services
4.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
4.2 Anonymity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
4.3 Internet as Platform for Money Laundering Activities
4.3.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
4.3.2 Money Laundering Methods over the Internet . . . . . . . . . . . 185
4.3.3 The Virtual Money Laundering Process . . . . . . . . . . . . . . . . 188
-
xi
4.3.4 International Aspects
4.3.4.1 The European Convention on Cybercrime . . . . . . . . 188
4.3.4.2 Recommendations of the Financial Action Task
Force . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
E. CONSEQUENCES OF MONEY LAUNDERING
1. Why Combat Money Laundering? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
2. Undermining of Financial System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
3. Corruption of Professionals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
4. Harm to the Banking System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
5. Costs of Regulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199
F. CHAPTER COMMENTARY AND SUMMARY . . . . . . . . . . . . . . . . . . . . . . . . 200
CHAPTER 5: INTERNATIONAL CODES, CONVENTIONS AND PROPOSALS
A. INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
B. MONEY LAUNDERING CONTROL
1. Objective Model of Money Laundering Control . . . . . . . . . . . . . . . . . . . 205
2. Subjective Model of Money Laundering Control . . . . . . . . . . . . . . . . . . . . . 207
3. The Know Your Customer (KYC) Standard
3.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208
3.2 Basel Committee on Banking Regulations and Supervisory Practices
3.2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
3.2.2 Statement of Principles (1988) . . . . . . . . . . . . . . . . . . . . . . . 213
3.2.3 Basel Core Principles (1997) . . . . . . . . . . . . . . . . . . . . . . . . 215
3.2.4 Basel Core Methodology (1999) . . . . . . . . . . . . . . . . . . . . . . 217
3.2.5 Client Due Diligence (2001) . . . . . . . . . . . . . . . . . . . . . . . . . 219
3.2.6 General Guide to Account Opening (2003) . . . . . . . . . . . . . 221
3.3 Financial Action Task Force
3.3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
3.3.2 Forty Recommendations (1990) . . . . . . . . . . . . . . . . . . . . . . 224
3.3.3 Eight Special Recommendations on Terrorist Financing
-
xii
(2001) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
3.3.4 Revised Recommendations (2003) . . . . . . . . . . . . . . . . . . . . 229
3.4 Essential Requirements of the KYC Standard
3.4.1 Customer Acceptance Policy . . . . . . . . . . . . . . . . . . . . . . . . 232
3.4.2 Know Your Customer Principle 1 - Identification . . . . . . . . 233
3.4.3 Know Your Customer Principle 2 - Reporting . . . . . . . . . . . 233
3.4.4 Know Your Customer Principle 3 - Record Keeping . . . . . . 235
3.4.5 Know Your Customer Principle 4 - Training . . . . . . . . . . . . 236
3.5 Value of the KYC Standard for Banks . . . . . . . . . . . . . . . . . . . . . . . 236
C. UNITED NATIONS
1. UN Convention Against the Illicit Traffic in Narcotic Drugs (1988)
1.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238
1.2 Anti-Money Laundering Provisions . . . . . . . . . . . . . . . . . . . . . . . . . 239
2. Mutual Legal Assistance Treaties in Criminal Matters
2.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241
2.2 Role in Preventing Money Laundering . . . . . . . . . . . . . . . . . . . . . . . 241
3. UN Convention Against Transnational Organised Crime (2000)
3.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
3.2 Anti-Money Laundering Provisions . . . . . . . . . . . . . . . . . . . . . . . . . 243
D. AUXILIARY INTERNATIONAL ANTI-MONEY LAUNDERING MEASURES
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
2. International Monetary Fund and the World Bank . . . . . . . . . . . . . . . . . . . . 245
3. Interpol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
4. Wolfsberg Anti-Money Laundering Principles . . . . . . . . . . . . . . . . . . . . . . . 248
5. Egmont Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
E. CHAPTER COMMENTARY AND SUMMARY . . . . . . . . . . . . . . . . . . . . . . . . 251
CHAPTER 6: COMPARATIVE POSITION RE MONEY LAUNDERING I
- THE EUROPEAN PERSPECTIVE
A. INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
-
xiii
B. EUROPEAN UNION
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
2. Bank-Customer Relationship
2.1 Debtor and Creditor Relationship . . . . . . . . . . . . . . . . . . . . . . . . . . . 259
2.2 Bank Confidentiality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260
3. Anti-Money Laundering Legislation
3.1 Council of the European Union . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264
3.2 Strasbourg Convention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265
3.3 Convention on Mutual Assistance in Criminal Matters . . . . . . . . . . 267
3.4 First Anti-Money Laundering Directive (1991) . . . . . . . . . . . . . . . . . 269
3.5 Second Anti-Money Laundering Directive (2001) . . . . . . . . . . . . . . 272
3.6 Third Anti-Money Laundering Directive (2005) . . . . . . . . . . . . . . . . 273
4. Civil Remedies
4.1 EU Legislation
4.1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
4.1.2 Brussels Convention (1968) . . . . . . . . . . . . . . . . . . . . . . . . . . 278
4.1.3 Brussels Regulation (2002) . . . . . . . . . . . . . . . . . . . . . . . . . . 279
4.1.4 Rome Convention (1980) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
4.1.5 Rome II Regulation (2007) . . . . . . . . . . . . . . . . . . . . . . . . . . 282
4.2 Civil Forfeiture
4.2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284
4.2.2 Strasbourg Convention (1990) . . . . . . . . . . . . . . . . . . . . . . . . 285
4.2.3 Schengen Agreement (1990) . . . . . . . . . . . . . . . . . . . . . . . . . 287
5. Individualised Anti-Money Laundering Measures
5.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288
5.2 Europol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289
5.3 Action Plan to Combat Organised Crime . . . . . . . . . . . . . . . . . . . . . 290
6. Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
C. ENGLAND
1. Introduction
1.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295
-
xiv
1.2 EU Law in England . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295
2. Bank-Customer Relationship
2.1 Debtor and Creditor Relationship . . . . . . . . . . . . . . . . . . . . . . . . . . . 296
2.2 Bank Confidentiality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300
2.3 Bank as Owner of Deposited Moneys . . . . . . . . . . . . . . . . . . . . . . . . 304
3. Anti-Money Laundering Legislation
3.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305
3.2 Criminal Justice Act (1993) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307
3.3 Drug Trafficking Act (1994) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308
3.4 Proceeds of Crime Act (2002)
3.4.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308
3.4.2 Principal Money Laundering Offences
3.4.2.1 Concealing Criminal Property . . . . . . . . . . . . . . . . . 311
3.4.2.2 Involvement in Money Laundering . . . . . . . . . . . . . . 311
3.4.2.3 Acquiring, Using or Possessing Criminal Property . 312
3.4.3 Auxiliary Money Laundering Offences
3.4.3.1 Failure to Disclose . . . . . . . . . . . . . . . . . . . . . . . . . . 312
3.4.3.2 Invalid Permission to Execute Transaction . . . . . . . . 313
3.4.3.3 Tipping-Off Offence . . . . . . . . . . . . . . . . . . . . . . . . . 314
3.4.3.4 Prejudicing an Investigation . . . . . . . . . . . . . . . . . . . 316
3.5 Anti-Money Laundering Regulations . . . . . . . . . . . . . . . . . . . . . . . . 317
4. Civil Remedies
4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318
4.2 Constructive Trust
4.2.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
4.2.2 Concept of Knowledge . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323
4.2.3 Knowing Receipt
4.2.3.1 General Principles . . . . . . . . . . . . . . . . . . . . . . . . . . . 326
4.2.3.2 Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328
4.2.4 Dishonest Assistance
4.2.4.1 General Principles . . . . . . . . . . . . . . . . . . . . . . . . . . . 329
4.2.4.2 Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332
-
xv
4.3 Tracing
4.3.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332
4.3.2 Common-Law Tracing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
4.3.3 Tracing in Equity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
4.3.4 Foskett v McKeown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338
4.3.5 Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341
4.3.6 Defences to Restitution Claims . . . . . . . . . . . . . . . . . . . . . . . 342
4.4 Civil Forfeiture
4.4.1 Action in Rem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347
4.4.2 Proceeds of Crime Act (2002)
4.4.2.1 General Provisions . . . . . . . . . . . . . . . . . . . . . . . . . . 348
4.4.2.2 Civil Recovery Proceedings . . . . . . . . . . . . . . . . . . . 349
4.4.2.3 Cash Forfeiture Proceedings . . . . . . . . . . . . . . . . . . . 350
4.4.3 Innocent Owner Defence . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351
4.4.4 Interim Recovery Orders . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352
5. Individualised Anti-Money Laundering Measures
5.1 Financial Services Authority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355
5.2 Joint Money Laundering Steering Group . . . . . . . . . . . . . . . . . . . . . 356
5.3 Money Laundering Advisory Committee . . . . . . . . . . . . . . . . . . . . . 357
D. CHAPTER COMMENTARY AND SUMMARY . . . . . . . . . . . . . . . . . . . . . . . . 358
CHAPTER 7: COMPARATIVE POSITION RE MONEY LAUNDERING II
- THE UNITED STATES OF AMERICA
A. INTRODUCTION
1. Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 362
2. Legal System of the United States . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364
B. BANK-CUSTOMER RELATIONSHIP
1. Debtor and Creditor Relationship . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365
2. Bank Confidentiality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371
3. Bank as Owner of Deposited Moneys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378
-
xvi
C. ANTI-MONEY LAUNDERING LEGISLATION
1. Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380
2. Bank Secrecy Act (1970)
2.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382
2.2 Primary Anti-Money Laundering Provisions (31 U.S.C
Sections 5311–5316) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382
2.3 Currency Transaction Reports (31 C.F.R Section 103) . . . . . . . . . . 384
2.4 Suspicious Transaction Reports (31 C.F.R Section 103) . . . . . . . . . 385
3. Money Laundering Control Act (1986)
3.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 386
3.2 Money Laundering Offences
3.2.1. 18 U.S.C Section 1956 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387
3.2.2 18 U.S.C Section 1957 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 392
4. Racketeering Influence Corrupt Organisation Act (1970) . . . . . . . . . . . . . . . 395
5. Annunzio-Wylie Anti-Money Laundering Act (1992) . . . . . . . . . . . . . . . . . 396
6. Money Laundering Suppression Act (1994) . . . . . . . . . . . . . . . . . . . . . . . . . 398
7. International Counter-Money Laundering and Foreign Anti-Corruption Act
(2001) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399
8. Patriot Act (2001)
8.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400
8.2 Money Laundering Offences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402
8.3 Special Measures of the Patriot Act
8.3.1 Measures Pertaining to Banks Operating Outside the
United States . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404
8.3.2 Measures Pertaining to International Financial Transactions
and Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405
9. Anti-Money Laundering Regulations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407
D. CIVIL REMEDIES
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 408
2. Constructive Trust
2.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 412
-
xvii
2.2 Establishing Liability
2.2.1 General Principles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 414
2.2.2 Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 416
2.2.3 Identifiability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 417
2.3 Concept of Knowledge . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 419
2.4 Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 421
3. Tracing
3.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 423
3.2 Common-Law Tracing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 424
3.3 General Tracing Principles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 424
3.4 Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431
3.5 Replevin Action . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431
3.6 Defences to Restitution Claims . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 432
4. Civil Forfeiture
4.1 Action in Rem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 436
4.2 Civil Forfeiture Legislation
4.2.1 Racketeering Influence Corrupt Organisation Statute (1970) 439
4.2.2 Money Laundering Control Act (1986) . . . . . . . . . . . . . . . . . 440
4.2.3 Civil Asset Forfeiture Reform Act (2000) . . . . . . . . . . . . . . . 443
4.2.4 Patriot Act (2001) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444
4.3 Innocent Owner Defence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 445
4.4 Interim Recovery Orders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 450
E. INDIVIDUALISED ANTI-MONEY LAUNDERING MEASURES
1. Financial Crimes Enforcement Network . . . . . . . . . . . . . . . . . . . . . . . . . 451
2. Federal Banking Agencies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453
3. Bank Secrecy Act Advisory Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453
F. CHAPTER COMMENTARY AND SUMMARY . . . . . . . . . . . . . . . . . . . . . . . . 454
CHAPTER 8: MONEY LAUNDERING CONTROL FRAMEWORK
OF SOUTH AFRICA
-
xviii
A. INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 458
B. HISTORICAL DEVELOPMENT
1. General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461
2. South African Law Commission Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . 462
C. ANTI-MONEY LAUNDERING LEGISLATION
1. Drugs and Drug Trafficking Act (1992) . . . . . . . . . . . . . . . . . . . . . . . . . . 463
2. Proceeds of Crime Act (1996) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 464
3. Prevention of Organised Crime Act (1998)
3.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 466
3.2 Money Laundering Provisions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467
4. Financial Intelligence Centre Act (2001)
4.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 472
4.2 Key Provisions
4.2.1 Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 474
4.2.2 Knowledge Requirement . . . . . . . . . . . . . . . . . . . . . . . . . . . . 477
4.2.3 KYC Standard Provisions
4.2.3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 478
4.2.3.2 Identification Obligation . . . . . . . . . . . . . . . . . . . . . . 479
Three Identification Levels . . . . . . . . . . . . . . . . . . . 480
Reasonableness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 482
Risk-Based Approach . . . . . . . . . . . . . . . . . . . . . . . . 484
When to Trace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 487
4.2.3.3 Suspicious Transaction Reporting Obligation . . . . . 488
Accountable Institutions . . . . . . . . . . . . . . . . . . . . . . 489
Knowledge or Suspicion . . . . . . . . . . . . . . . . . . . . . . 492
Tipping-Off Offence . . . . . . . . . . . . . . . . . . . . . . . . . 497
Defences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 497
Internal Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 499
4.2.3.4 Record-Keeping Obligation . . . . . . . . . . . . . . . . . . . 500
4.2.3.5 Training Obligation . . . . . . . . . . . . . . . . . . . . . . . . . . 500
4.3 Auxiliary Provisions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 502
-
xix
5. Money Laundering and Terrorist Financing Control Regulations . . . . . . . . 504
D. CIVIL REMEDIES
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505
2. Common-Law Remedies for Protection of Ownership
2.1 Rei Vindicatio
2.1.1 General Principles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 508
2.1.2 Quasi-Vindictory Action . . . . . . . . . . . . . . . . . . . . . . . . . . . . 512
2.1.3 Evaluation
2.1.3.1 Bank Exercises Control over Benefits of
or Theft . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 513
2.1.3.2 Bank Paid Benefits of Fraud or Theft to
Fraudster or Thief . . . . . . . . . . . . . . . . . . . . . . . . . . . . 518
2.2 Actio Pauliana
2.2.1 General Principles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 518
2.2.2 Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 521
2.3 Interdict . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 524
3. Aspects of Unjust Enrichment Liability
3.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 530
3.2 Establishing Liability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 531
3.3 The Condictiones
3.3.1 General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 534
3.3.2 Condictio Sine Causa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 535
3.3.3 Condictio Indebiti . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 539
3.3.4 Condictio ob Turpem vel Injustam Causa . . . . . . . . . . . . . . 541
3.4 Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 547
4. Civil Forfeiture
4.1 Action in Rem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 555
4.2 Prevention of Organised Crime Act (1998)
4.2.1 Key Provisions
4.2.1.1 Property Subject to Civil Forfeiture . . . . . . . . . . . . . 558
4.2.1.2 Unlawful Activities . . . . . . . . . . . . . . . . . . . . . . . . . . 559
-
xx
4.2.1.3 Proceeds of Unlawful Activities . . . . . . . . . . . . . . . . 561
‘In Connection with’ Requirement . . . . . . . . . . . . . . 561
4.2.1.4 Instrumentality of an Offence . . . . . . . . . . . . . . . . . . 563
‘Which is Concerned in’ Requirement . . . . . . . . . . . 564
4.3 Innocent Owner Defence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 568
4.4 International Cooperation in Criminal Matters Act (1996) . . . . . . . 572
4.5 Interim Recovery Orders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 573
E. INDIVIDUALISED ANTI-MONEY LAUNDERING MEASURES
1. Financial Intelligence Centre . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 577
2. Counter-Money Laundering Advisory Council . . . . . . . . . . . . . . . . . . . . . . 579
3. Eastern and Southern Africa Anti-Money Laundering Group . . . . . . . . . . . 580
F. CHAPTER COMMENTARY AND SUMMARY . . . . . . . . . . . . . . . . . . . . . . . . 583
CHAPTER 9: RESEARCH CONCLUSIONS AND RECOMMENDATIONS
A. INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 595
B. RESEARCH OBJECTIVES AND SYNTHESES REVISITED
1 Concepts of Money
1.1 Functions of Money . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 597
1.2 Historical Development . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 597
1.3 Electronic Banking
1.3.1 General Principles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 597
1.3.2 Electronic Transfers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 598
1.3.3 Electronic Money . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 598
1.4 Modern Conceptualisation of Money
1.4.1 Theoretical Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 599
1.4.2 Value of Money . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 599
1.4.3 Corporeal Money versus Fungible Money . . . . . . . . . . . . . . . . . . . . . 600
1.4.4 Recommended Definition of Money . . . . . . . . . . . . . . . . . . . . . . . . . 600
1.4.5 Commingled Money . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 600
1.5 Concept of Benefits of Crime
-
xxi
1.5.1 Impact of Organised Crime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 601
1.5.2 Tainted Theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 601
1.5.3 Suggested Construction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 602
1.6 Synthesis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 604
2. Bank-Customer Relationship and Money Laundering
2.1 Nature of Relationship
2.1.1 European Union . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 605
2.1.2 England . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 605
2.1.3 United States . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 606
2.1.4 South Africa
2.1.4.1 General Principles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 606
2.1.4.2 Bank’s Receipt of the Benefits of Fraud or Theft . . . . . . . . 607
2.1.4.3 Bank’s Duty of Care . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 608
2.2 Bank Confidentiality
2.2.1 International Community
2.2.1.1 Basel Committee on Banking Regulations and
Supervisory Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 608
2.2.1.2 Financial Action Task Force on Money Laundering . . . . . . . 609
2.2.1.3 Other Organisations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 610
2.2.2 European Union
2.2.2.1 General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 611
2.2.2.2 England . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 611
2.2.3 United States . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 612
2.2.4 South Africa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 613
2.2.5 Synthesis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 614
2.3 Ownership of Benefits of Crime Deposited with a Bank
2.3.1 England . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 616
2.3.2 United States . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 616
2.3.3 South Africa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 616
2.3.4 Synthesis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 618
3. Jurisprudence of Money Laundering
-
xxii
3.1 Nature of Money Laundering
3.1.1 Historical Context . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 619
3.1.2 Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 619
3.1.3 Scale of Money Laundering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 620
3.1.4 Stages in Money Laundering Process . . . . . . . . . . . . . . . . . . . . . . . . 620
3.2 Money Laundering Techniques
3.2.1 Use of Financial System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 621
3.2.2 Legal Entities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 621
3.2.3 Professional Groups: Attorneys . . . . . . . . . . . . . . . . . . . . . . . . . . . . 622
3.2.4 Use of Banking Institutions
3.2.4.1 General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 622
3.2.4.2 Correspondent Banks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 622
3.2.4.3 Private Banks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 623
3.2.4.4 Electronic Banking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 623
3.3 Consequences of Money Laundering
3.3.1 Undermining of Financial System . . . . . . . . . . . . . . . . . . . . . . . . . 624
3.3.2 Corruption of Professionals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 625
3.3.3 Harm to Banks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 625
3.3.4 Costs of Regulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 626
3.4 Synthesis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 626
4. Money Laundering Control Measures
4.1 International Community
4.1.1 Two Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 627
4.1.2 Know Your Customer Standard . . . . . . . . . . . . . . . . . . . . . . . . . . . . 628
4.1.3 Basel Committee on Banking Regulations and
Supervisory Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 628
4.1.4 Financial Action Task Force on Money Laundering . . . . . . . . . . . . . 629
4.1.5 United Nations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 630
4.1.6 Auxiliary International AML Measures . . . . . . . . . . . . . . . . . . . . . . 630
4.2. European Union
4.2.1 General
4.2.1.1 Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 631
-
xxiii
4.2.1.2 Directives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 632
4.2.2 England
4.2.2.1 Proceeds of Crime Act (2002) . . . . . . . . . . . . . . . . . . . . . . . 633
4.2.2.2 Anti-Money Laundering Regulations . . . . . . . . . . . . . . . . . . 633
4.3 United States
4.3.1 Anti-Money Laundering Legislation . . . . . . . . . . . . . . . . . . . . . . . . . 633
4.3.2 Anti-Money Laundering Regulations . . . . . . . . . . . . . . . . . . . . . . . . 635
4.4 South Africa
4.4.1 Anti-Money Laundering Legislation
4.4.1.1 Prevention of Organised Crime Act (1998) . . . . . . . . . . . . . 635
4.4.1.2 Financial Intelligence Centre Act (2001) . . . . . . . . . . . . . . . 636
Identification Obligation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 637
Suspicious Transaction Reporting Obligation . . . . . . . . . . . 638
Record-Keeping Obligation . . . . . . . . . . . . . . . . . . . . . . . . . 640
Training Obligation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 640
4.4.2 Anti-Money Laundering Regulations . . . . . . . . . . . . . . . . . . . . . . . . . 640
4.5 Synthesis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 641
5 Individualised Anti-Money Laundering Measures
5.1 European Union
5.1.1 General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 648
5.1.2 England . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 648
5.2 United States . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 649
5.3 South Africa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 649
5.4 Synthesis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 651
6 Civil Remedies and Banks
6.1 European Union
6.1.1 General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 652
6.1.2 England
6.1.2.1 Constructive Trust
General Principles of Liability . . . . . . . . . . . . . . . . . . . . . . . 653
Knowing Receipt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 655
Dishonest Assistance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 657
-
xxiv
6.1.2.2 Tracing
Common-Law Tracing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 659
Equitable Tracing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 660
6.1.2.3 Defences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 661
6.2 United States
6.2.1 Constructive Trust . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 663
6.2.2 Tracing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 664
6.2.3 Replevin Action . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 665
6.2.4 Defences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 665
6.3 South Africa
6.3.1 Ownership Remedies
6.3.1.1 Rei Vindicatio . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 666
6.3.1.2 Quasi-Vindictory Action . . . . . . . . . . . . . . . . . . . . . . . . . . . . 666
6.3.1.3 Actio Pauliana . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 667
6.3.1.4 Interdict . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 668
6.3.2 Unjust Enrichment Condictiones
6.3.2.1 Condictio Sine Causa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 668
6.3.2.2 Condictio Indebiti . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 669
6.3.2.3 Condictio ob Turpem vel Injustam Causa . . . . . . . . . . . . . . . . . . . . 670
6.4 Synthesis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 671
7 Civil Forfeiture
7.1 European Union
7.1.1 General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 676
7.12 England . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 676
7.2 United States . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 678
7.3 South Africa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 679
7.4 Synthesis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 680
C. SUMMARY OF RECOMMENDED AMENDMENTS TO FICA,
POCA AND THE AML REGULATIONS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 681
D. CONTRIBUTION OF THIS STUDY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 684
E. FINAL CONCLUSION AND SUGGESTIONS . . . . . . . . . . . . . . . . . . . . . . . . . . 685
-
xxv
ADDENDUM - BIBLIOGRAPHY
A. REFERENCE TECHNIQUES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 688
B. TABLE OF BOOKS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 688
C. TABLE OF JOURNALS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 736
D. TABLE OF CASES
1. England . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 762
2. European Union . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 765
3. South Africa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 765
4. United States . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 771
E. TABLE OF LEGISLATION
1. England . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 774
2. European Union . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 775
3. International Organisations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 776
4. South Africa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 776
5. United States . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 777
F. LISTS OF REPORTS, PROPOSALS AND WORKING PAPERS . . . . . . . . . 778
G. LISTS OF INTERNET REFERENCES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 791
-
1
Which is any type of illegal activity that results in a financial loss (see ch 4.B.1).1
See ch 2.C.5.2.1; ch 4.B.2.1 as regards globalisation’s role in promoting money2
laundering.
CHAPTER 1
INTRODUCTION
At all times Chess has the will, the intent, the meaning of picturing a war between two parties: a war ofextinction, conducted according to rules, laws in a cultured manner, yet without clemency. This becomes
evident from the rules of the game almost at first sight. LASKER Chess 1–2
___________________________________________________________________________SYNOPSIS Page
A. INTRODUCTION1. Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12. Money Laundering Control Legislation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83. Dilemma of Banks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
B. PROBLEM STATEMENT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15C. RESEARCH METHODOLOGY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24D. OVERVIEW OF STUDY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
___________________________________________________________________________
A. INTRODUCTION
1. Background
The last three decades witnessed the changing face of banking. Not only has banking been
affected by technological advancement, but globalisation further left its mark on the banking
industry. In the current era of globalisation where financial transactions are often conducted across
borders, relevant banking laws should mirror international regulatory trends as well. South Africa
as a developing country must be internationally competitive and should stay abreast of global
trends. Unfortunately, this means that South Africa needs to address one of the dire consequences
of globalisation, namely, the growth of financial crime and one of its byproducts, money1
laundering. 2
Money laundering involves activities which are aimed at concealing illegally acquired
-
2 Introduction
Section 1(xvi) of the Prevention of Organised Crime Act 121 of 1998, as amended3
(‘POCA’), defines ‘property’ as ‘money or any other movable, immovable, corporeal orincorporeal thing and includes any rights, privileges, claims and securities and interestthereon and all proceeds thereof ’. The ‘proceeds’ of unlawful activities are defined as ‘anyproperty or any service, advantage, benefit or reward which was derived, received or retained,directly or indirectly, in connection with or as a result of any unlawful activity carried on byany person’(section 1(xv)). Of note, an ‘unlawful activity’ is any criminal conduct whether itoccurred in the Republic or abroad (section 1(xv)(a)–(b) of POCA).
See ch 4.B.1 as regards the functional definition of money laundering. For the4
various legal definitions of the concept, see ch 6.B.3.6, par C.3.4; ch 7.C.2–3; ch 8.C.4.2,paras D.4.2.1–4.2.2.
See ch 4.B.2; ch 5.C.1, ch 6.B.3.4, par C.3.3; ch 8.C.1–2.5
Davis Council of Europe 2007 2.6
38 of 2001, as amended (‘FICA’), whose sections came into operation on various7
dates as announced in the government gazette.
property for the purpose of making it appear legitimately obtained. Although money laundering3 4
was historically associated solely with the proceeds of drug trafficking, currently the need to5
legitimise all types of property that was acquired through illegal means is common to all criminal
activities.
This study explores the consequences where criminals use banks as tool to launder money,
one of which is a potential civil claim against a bank filed by either a customer or a victim who
suffered loss as a result of financial crime such as fraud or theft. By way of introduction, the
following comment is significant because it encapsulates the reason for combating money
laundering:6
[n]o country can ever say that it is free from money laundering or that opportunities forterrorist financing have been eradicated. We are shooting at a moving target with newmethods, techniques and vehicles for money laundering ... being identified every day.That is why we need to remain vigilant ... I would like to remind everyone about what isat stake. Financial crime may appear to be discreet and non-violent, but appearances areoften deceptive. Money laundering ... [is] a direct threat to the values which ... [we]defend - democracy, human rights and the rule of law.
Section 1 of the Financial Intelligence Centre Act, the primary money laundering control statute7
of South Africa, defines money laundering as:
[a]n activity which has or is likely to have the effect of concealing or disguising thenature, source, location, disposition or movement of the proceeds of unlawful activitiesor any interest which anyone has in such proceeds, and include any activity which
-
3 Introduction
Section 64 of FICA criminalises transactions conducted for the purpose of avoiding8
reporting obligations (see ch 8.C.4.2.3.3). The sections read as follows: ‘Money laundering9
4. Any person who knows or ought reasonably to have known that property is or forms part of theproceeds of unlawful activities and (a) enters into any agreement or engages in any arrangement ortransaction with anyone in connection with that property, whether such agreement, arrangement ortransaction is legally enforceable or not; or (b) performs any other act in connection with suchproperty, whether it is performed independently or in concert with any other person, which has or islikely to have the effect (I) of concealing or disguising the nature, source, location, disposition ormovement of the said property or its ownership or any interest which anyone may have in respectthereof; or (ii) of enabling or assisting any person who has committed or commits an offence,whether in the Republic or elsewhere— (aa) to avoid prosecution; or (bb) to remove or diminish anyproperty acquired directly, or indirectly, as a result of the commission of an offence, shall be guilty ofan offence. Assisting another to benefit from proceeds of unlawful activities5. Any person who knows or ought reasonably to have known that another person has obtained theproceeds of unlawful activities, and who enters into any agreement with anyone or engages in anyarrangement or transaction whereby— (a) the retention or the control by or on behalf of the said otherperson of the proceeds of unlawful activities is facilitated; or (b) the said proceeds of unlawfulactivities are used to make funds available to the said other person or to acquire property on his or herbehalf or to benefit him or her in any other way, shall be guilty of an offence. Acquisition, possession or use of proceeds of unlawful activities6. Any person who— (a) acquires; (b) uses; or (c)) has possession of, property and who knows orought reasonably to have known that it is or forms part of the proceeds of unlawful activities ofanother person, shall be guilty of an offence’.
Which references are made to POCA. The long title of POCA explains that the Act10
was enacted to introduce measures aimed at organised crime, prohibit activities relating toracketeering; criminalise money laundering and to provide for an obligation to report certaininformation, prohibit gang related activities, enable the recovery of the proceeds of unlawfulactivities, provide for civil forfeiture, cater for the creation of a Criminal Assets RecoveryAccount, amend the Drugs and Drug Trafficking Act of 1992 (see ch 8.C.1) and theInternational Cooperation in Criminal Matters Act of 1996 (see ch 8.D.4.4), repeal theProceeds of Crime Act of 1996 (see ch 8.C.2) and to provide for matters connected with theabove mentioned.
There is a wealth of material available which discusses the nature and purpose of11
the money laundering process. For a South African perspective, see in general De KokerABLU-2002 7–8; Itzikowitz (1999) THRHR 89; ICA AML Manual 73; Smit Clean Money 9;
constitutes an offence of section 64 of this Act or section 4, 5 or 6 of the Prevention8 9
Act.10
The aforementioned definition of money laundering is sufficiently wide that the acquisition, use
or possession of illegally acquired money is a money laundering offence. In simple terms, a
money laundering offence occurs where a person benefits from a criminal offence. Money
laundering occurs through deals and bank transfers until the source of the illegally acquired
money has been concealed and the money appears to be legally acquired. The conversion of11
-
4 Introduction
Goredema Overview of the Threat 1; De Koker (1997) J for Juridical S 18; Itzikowitz (1999)THRHR 89; Bourne (2002) SA Merc LJ 475–476; Itzikowitz (2000) J of Fin Crime 185; Smit(2001) Crime & Conflict 25; De Koker Money Laundering 2-8; Goredema & Montsi (2002)African Security R 8; Itzikowitz ABLU-2005 1; De Koker South Africa 97–110.
Which constitutes the first stage in the money laundering process known as12
‘placement’ (see ch 4.B.5). For example, in Gainsford NNO v Gulliver’s Travel (Bruma) Pty(Ltd) 07/5121 [2009] ZAGPJHC 20 (7 April 2009) a fraudster deposited the proceeds ofmisappropriated shares with a bank for money laundering purposes (see ch 3.B.2.1.2 for thefacts of the case; ch 4.C–D where various money laundering schemes are discussed).
Or ‘AML’.13
Goredema South Africa 86. For money laundering trends in South Africa, see De14
Koker ABLU-2002 29–44; Goredema Overview of the Threat 6, 11. Moodley SA Strategic Review 79. See also ch 4.E.1–5 where the negative15
consequences that money laundering has for a country are considered. See Moodley op cit 68–75; UNDCP Ten Laws; ch 4.E.1–5 as regards the dire16
consequences of money laundering.
illegally acquired money into seemingly legally acquired money can take place through a number
of schemes which include the use of banks.
A money laundering scheme may commence with a deposit into a bank account of
illegally acquired money. The funds can then be converted into monetary instruments through12
the use of banker’s drafts and money orders, or they can be withdrawn and used to buy expensive
items such as property and diamonds to make it difficult for the authorities to ascertain exactly
where the money came from in the first place. As a final stage in the money laundering process
the property or diamonds are sold and the proceeds are again deposited into a bank account where
they re-enter the economy as seemingly legally acquired funds. It follows that any effective anti-
money laundering regime should provide for an early warning system that includes efficient risk13
management and compliance to money laundering control laws which are aimed at preventing the
criminal use of the banking system as a whole. It was recently estimated that the value of
illegally acquired money laundered in South Africa may be as high as 80 billion rand annually.14
Money laundering promotes criminal activities in South Africa because it allows criminals to
profit from their illegal conduct. It further damages the integrity of society and undermines the15
rule of the law because it protects the benefits of crime against discovery. From a prevention16
point of view money laundering is the Achilles heel of criminal activities and, therefore, must be
combated. The idea is that by targeting the money laundering aspect of criminal activities,
criminals will be deprived of their illegally acquired benefits which will leave them profitless and
as a consequence, the criminal activity should cease.
-
5 Introduction
See the long title of POCA.15
Schedule 1 of FICA defines a bank in terms of section 1 of the Banks Act 94 of16
1990, as amended (‘Banks Act’). Section 1 of the Banks Act defines a bank in terms of twoconcepts, namely ‘deposit-taking’ and ‘business of a bank’, both which are delineated inmuch detail. The concept ‘business of a bank’ has different meanings for various purposesand in terms of different legislation (Malan & Pretorius Malan on Bills 254; ItzikowitzBanking 170; Malan Banking Law Influences 18–29; Itzikowitz (1992) SA Merc LJ 176;Schulze (2001) SA Merc LJ 79). In short, a person that receives money as a deposit isconducting the business of a bank (see ch 3.B.1).
See Schedule 1 of FICA for a list of designated persons to which the Act applies; ch17
8.C.4.1. It is important to emphasise that although this study is concerned solely with banks inrelation to money laundering control, FICA applies to various designated institutions. Itfollows that while the ambit of this study is restricted to banks the law is not so restricted.
Which concept is used to denote countries, transnational bodies and forums that are18
involved in the fight against money laundering on a collective basis (see ch 5.B–D). For an analysis of the nexus between organised crime, the benefits of crime and19
money laundering, see ch 2.C.5. Or ‘BCCI’.20
The BCCI was a joint venture between the Bank of America and a Pakistani banker,21
Aga Hassan Abedi (Bosworth-Davies & Saltmarsh Money Laundering 102–103; UnitedStates v BCCI Holdings (Luxembourg), S.A. 69 F Supp 2d 36 (1999) 37–38 [BCCI]). It wasincorporated in both Luxemburg and the Cayman Islands to prevent nationalisation. Since itsmain office was situated in London, the bank was regulated nowhere and was a fraud fromthe beginning because it did not have legitimate capital (Blum Offshore Money 71–75). Withits corporate structures created to evade banking laws, the BCCI was used to fund, inter alia,
POCA is based on the premise that by combating money laundering criminals will be
prevented from using banks as tool to launder their illegal gains. If illegally acquired money can15
be easily processed through a bank because an employee either has been bribed or because it turns
a blind eye to the potential criminal nexus of the deposited money, the bank can become part of
the organised crime syndicate itself. Banks must therefore be protected from inadvertently
providing criminals with the means to launder the benefits of crime. To this end, FICA imposes
onerous duties on banks and other sectors of persons that may be used by criminals as tools16 17
to launder the benefits of crime. In turn, POCA criminalises activities in relation to the benefits
of crime and set-out proceedings aimed at forfeiting the benefits to the state.
Money laundering is further characterised by its international nature. In recent years the
international community has been confronted by the growing problem of preventing the growth18
in organised crime and money laundering. The failure of the Bank of Credit and Commerce19
International is a case in point. The BCCI was a bank that laundered money for both terrorists20
and intelligence agencies. More than one million US dollars were transferred by the BCCI from21
-
6 Introduction
the transfer of military nuclear technologies from Europe to Third World leaders (Hemraj(2005) J of Money LC 346–347). It also became a vehicle for about one billion US dollars ofIslamic deposits which were employed for commodity investments. Services provided by thebank included dishonest auditing for illegal businesses (i.e. fraud), money laundering andsecret transfers for terrorist organisations (Ehrenfeld Evil Money 183; Lilley Dirty Dealing 5;Hemraj op cit 348–350; BCCI 39). Documents were falsified and shell company transactionscreated to manipulate officials in different countries. By the time the BCCI was shut down in1991 it had 430 branches in 73 countries (Bosworth-Davies & Saltmarsh Money Laundering103 ev; Passas (1993) Crime, Law & Social Change 294–295).
Libyan companies incorporated in the United States. Subsequent investigations revealed that
massive fraud and rumours about money laundering, which led to a run on bank deposits,
contributed largely to the demise of the bank. In its wake followed unprecedented activity aimed
at combating criminal activity and money laundering within the banking industry. In essence, the
BCCI’s failure emphasises both the vulnerability of banks to criminal infiltration and the need for
stringent measures to combat money laundering.
In this study money laundering control is compared to a chess match. The enemies
combating each other on the chessboard are the police authorities and a criminal seeking to launder
the benefits of crime. The authorities are represented by White whilst a member of an organised
crime syndicate is represented by Black on the chessboard. The analogy can be illustrated as
follows:
-
7 Introduction
Figure 1.1
WHITE
ROOK
Bank- Cust.
Relation-
ship
KNIGHT
Internat.
AML
Efforts
BISHOP
AML
Statutes
QUEEN
KYC
Standard
KINGBanks
BISHOP
Civil
Forfeiture
KNIGHT
AML
Treaties
ROOK
Bank- Cust.
Relation-
ship
PAWN
Individual
AML
Measures
PAWN
Individual
AML
Measures
PAWN
Individual
AML
Measures
PAWN
Individual
AML
Measures
PAWN
Individual
AML
Measures
PAWN
Individual
AML
Measures
PAWN
Individual
AML
Measures
PAWN
Individual
AML
Measures
PAWN
Variety of
Schemes
PAWN
Variety of
Schemes
PAWN
Variety of
Schemes
PAWN
Variety of
Schemes
PAWN
Variety of
Schemes
PAWN
Variety of
Schemes
PAWN
Variety of
Schemes
PAWN
Variety of
Schemes
ROOK
Internet
Banking
KNIGHT
Bank
Confiden-
tiality
BISHOP
Use of
Legal
Persons
QUEEN
Money
Launder-
ing
KINGBenefitsof Crime
BISHOP
Other
Money
Launder
Tools
KNIGHT
Electronic
Money
ROOK
Internet
Banking
BLACK
Black and White have equal power in the form of sixteen pieces until the pieces are captured. The
objective of the two players are similar: to defend the life of the King. The player who cannot save
his King is ‘checkmate’ and loses the match. Who wins the game is determined by the stealth and
foreseeability of the players.
For the police authorities the White King on the chess board signifies banks that must be
protected against criminal infiltration and money laundering. For the criminals the Black King
signifies the benefits of crime that must be protected from detection, identification, confiscation
and subsequent civil forfeiture. The other White pieces on the board represent various money
laundering control strategies aimed at identifying the benefits of crime whilst the Black pieces
represent elements that act in support of money laundering. Throughout this study the analogy of
a chess match between the police authorities and members of an organised crime syndicate is
referred to. Like a chess match the outcome of crime prevention through money laundering control
is fraught with uncertainty. Since strategies vary, the two players must outwit each other to attain
checkmate and win the match.
-
8 Introduction
Which liability is known as ‘facilitator liability’(Rider (1999) J of Money22
Laundering Control 208; Reid Civil Law and Money Laundering D2). The alternative is to keep the benefits of crime in the form of cash under a bed23
mattress as quipped by the court in Alley Cat Clothing v De Lisle Weare Racing [2002] 1 AllSA 123 (D) [Alley Cat] 131A. However, due to modern banking practices and the fact thatcash is seldom used in the place of electronic money (as to which, see ch 2.B.2) it is fair toassume that banks will always assume a key role in money laundering schemes.
Or ‘KYC standard’ (see ch 5.B.3).24
See ch 5.B.3, paras C–D; ch 6.B.3.4–3.6, par C.3.4; ch 7.C.2–3, par C.8.3.2.25
Ultimately, this study is an attempt to distal some general principles out of various money
laundering control issues in as far as they impact on banks. In particular, the study sets out to
establish that whilst compliance with statutory AML obligations may assist a bank to avoid
prosecution for a money laundering offence, it may also expose the bank to civil liability despite
the fact that its conduct may have been above reproach. 22
2. Money Laundering Control Legislation
Money laundering control legislation is part of the arsenal used by the police authorities to combat
criminal activities by keeping the benefits of crime out of the financial system. The idea is that an
effective money laundering control regime should render it impossible for criminals to use the
benefits of their criminal activities without fear of prosecution and, or civil forfeiture of the funds.
The reason for a bank’s inevitable participation in money laundering control is rooted in the reality
that regardless of the type of institution involved in executing a financial transaction, illegally
acquired money by and large ends-ups in a bank account from where the funds are dispersed as
part of the final stage of the money laundering process.23
Since the early 1990s, the Know Your Customer standard has been promoted by the24
international community as a crucial measure to identify both criminals and the benefits of crime
before the funds can enter the financial system. The KYC standard which is the crux of
international AML legislation comprises four key obligations, namely:25
1. customer identification;
2. suspicious transaction reporting;
3. record-keeping; and
4. training.
-
9 Introduction
See ch 8.C.4–5, par E.1.26
See ch 8.C.3, par D.4.27
Or ‘FIC’ whose objectives are considered elsewhere in the study (see ch 8.E.1).28
Sections 25, 43 of FICA (see ch 8.C.4.2.3.4–4.2.3.5).29
See section 1(xv) of POCA as referred to by section 1 of FICA.30
See ch 8.C.3.2, par D.4.2.1.2 for the 34 offences listed in Schedule 1 of POCA.31
Collectively the four obligations above are aimed at reducing the vulnerability of banks to criminal
infiltration and preventing their prosecution for money laundering offences as well. FICA follows
a path that was caved by international AML legislation. As a result, the KYC standard obligations
have been incorporated in full in the Act. 26
As mentioned above, POCA criminalises activities which are aimed at concealing the
nature, source, location, disposition or movement of the benefits of crime, and provides for the
confiscation and civil forfeiture thereof. In turn, FICA imposes stringent obligations on banks27
and creates money laundering offences when these obligations are neglected. For example, section
21 of FICA requires that a bank establishes the identity of customers whilst section 29 stipulates
that a bank reports suspicious or unusual account activity to the Financial Intelligence Centre.28
Banks must further keep records of their customers’ transactions and train employees to comply
with FICA and their internal AML measures. Failure to observe FICA’s provisions incriminates29
a bank and leads to its prosecution for a money laundering offence.
Two important points as regards the benefits of crime must be emphasised. First, both
FICA and POCA fail to distinguish between money as the object of crime and money as the
proceeds of crime. Instead, both Acts use the concept ‘proceeds of unlawful activities’ to denote
in general terms property that was acquired through criminal means. POCA further provides for30
the civil forfeiture of an ‘instrumentality of an offence’ which offences are listed in Schedule 1 of
the Act. By using some of the offences listed in Schedule 1 of POCA as examples the distinction31
between money as the object of criminal conduct and money as the proceeds of criminal conduct
can best be illustrated as follows:
-
10 Introduction
This is on account of the nemo plus iuris ad alium transfere potest, quam ipse32
haberet rule which provides that no one can transfer more rights in property to some otherthan the person himself has (as to which, see ch 3.C.2.2; ch 8.D.2.1.1)
Figure 1.2
Examples of Financial Crime
Money is the object of: v Money is the proceeds of:
Fraud, theft, robbery, corruption Drug t raff icking, i l legal gambling,extortion, fraud, forgery, offences relating tocoinage, smuggling, exchange controloffences
9 Benefits of crime
Money is the object of crimes such as fraud or theft where it was acquired from the victim through
criminal means. Consider the scenario where money was stolen by an employee of a consulting
firm. The money is the object of the theft and the firm’s clients remain the legal owners of the
funds. In contrast, money is the proceeds of criminal activities such as drug trafficking or illegal32
gambling because it was generated by the criminal activities. The criminal further acquires
ownership of the funds. In this study the concept ‘benefits of crime’ is used as an umbrella term
to denote both money as the object and money as the proceeds of crime.
In most instances where money is the proceeds of the criminal activities listed in Figure
1.2 above there are no obvious victims who have suffered loss. For example, when the proceeds
of drug trafficking or corruption are deposited into a bank account the funds legally belong to the
(criminal) account holder. The state may also instigate civil forfeiture proceedings against the
account holder pursuant to POCA’s provisions.
However, sometimes depending on the nature of the criminal activity money can either be
the object of a crime or the proceeds of a crime, for example, where it was acquired through fraud.
Illegally acquired money constitutes the object of fraud where a person, for example, was
fraudulently induced to pay money to secure an interest in property which never existed. But
illegally acquired money can also constitute the proceeds of fraud where an investor, for example,
was fraudulently induced to invest in property which was subsequently sold to a third-party
without the investor’s knowledge. In the latter case the profits made from selling the property
-
11 Introduction
For the causa of the claim, see par B below; ch 8.D.1.33
This is due to a report by the Financial Action Task Force on Money Laundering34
(see par B below) which recognised fraud and theft as major profit-generating crimes in SouthAfrica (FATF SA Report-2009 3).
This is because drug trafficking presents a tremendous problem for the South35
African police authorities (ibid).
constitute the proceeds of fraud as opposed to the object of fraud. However, regardless of whether
the benefits acquired by the fraudster are the object or the proceeds of fraud in both examples there
is a victim of fraud who seeks to recover his loss. The position can best be illustrated as follows:
Figure 1.3
Examples of Financial Crimes
Obvious victim: No identifiable victim:
Theft, robbery, Drug trafficking, corruption, smuggling, offences
fraud, forgery, extortion relating to coinage or exchange control
Remedies
9 9Civil claim by the victim Civil forfeiture proceedings by the state
against the account holder against the account holder
Where the benefits of crime were acquired through theft, robbery, extortion, forgery or certain
types of fraud a money laundering investigation may point the way to locate the funds and restore
them to the victims. The victim of the aforementioned crimes may further be able to follow his loss
to a bank account where the illegally acquired money was deposited. If the funds were not
withdrawn by the criminal account holder the victim can claim from him. However, the victim33
will be left out of pocket if the funds were withdrawn by the criminal who either absconded with
the money or who proves to be a proverbial man of straw. In this study fraud and theft are used as
examples of criminal activity which left a victim who suffered loss and is seeking to recover it.34
In turn, drug trafficking is used in this study as an example of criminal activity which left no
obvious victim who suffered loss. 35
Secondly, the distinction between money as the object of crime and money as the proceeds
of crime is important in relation to civil forfeiture proceedings. The running argument is that only
the proceeds of drug trafficking which left no obvious victims should be forfeited to the state
-
12 Introduction
See above.36
See ch 8.D.4.2.1, par D.4.3.37
See ch 3.C.3.1 as regards the purpose of banking.38
See Lambiris (Restitution 2–3) who denotes a cause of action as ‘the legal ground39
which entitles a plaintiff to ask a court for relief or to avail himself of relief.’
See ch 3.B.2.3; ch 6.B.2.2, par C.2.2; ch 7.B.2.40
Chambost Bank Accounts 3.41
See Schedule 1 of FICA; ch 8.C.4.1.42
otherwise a victim of fraud or theft may be left out of pocket where fraudulently acquired or stolen
money is the subject of a civil forfeiture application. Consider again the scenario above where an
employee stole money from a consultancy firm and deposited it with a bank. The clients followed
the money to the bank account of the thieving employee only to discover that although the money
was not withdrawn by the thief, the account is the subject of civil forfeiture proceedings. In this
case the court should not grant the state a civil forfeiture order without having to establish first that
there are no persons with a valid claim to the money in the account. The reason is that the
employee, who is a thief, did not obtain a legal title to the stolen money. Therefore, the clients36
of the consulting firm should be allowed first to recover that part of the funds in the account which
represents the amount that was stolen from them before the court can grant the state’s civil
forfeiture application in respect of the money.
This study shows that POCA fails to recognise this distinction. Instead, it sanctions civil
forfeiture of all the benefits of crime to the state irrespective of whether the funds belong to a
victim of crime who has a valid claim to the money. 37
3. Dilemma of Banks
A bank may become embroiled in civil litigation due to the fact that it receives deposits from the
public. There are two potential causes of action against a bank as recipient of the benefits of38 39
crime. First, the bank may be sued by a customer for breach of bank confidentiality. The concept
‘bank confidentiality’ refers to a bank’s common-law duty to observe the confidentiality of
customers in relation to their bank affairs. Bank confidentiality is dated back to the Code of40
Hammourabi. A bank as an accountable institution must heed FICA’s provisions in order to41