Upozornenie: Prezeranie týchto stránok je určené len pre návštevníkov nad 18 rokov!
Zásady ochrany osobných údajov.
Používaním tohto webu súhlasíte s uchovávaním cookies, ktoré slúžia na poskytovanie služieb, nastavenie reklám a analýzu návštevnosti. OK, súhlasím









A | B | C | D | E | F | G | H | CH | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9

Financial intelligence
 

Financial intelligence (FININT) is the gathering of information about the financial affairs of entities of interest, to understand their nature and capabilities, and predict their intentions. Generally the term applies in the context of law enforcement and related activities. One of the main purposes of financial intelligence is to identify financial transactions that may involve tax evasion, money laundering or some other criminal activity. FININT may also be involved in identifying financing of criminal and terrorist organisations. Financial intelligence can be broken down into two main areas, collection and analysis. Collection is normally done by a government agency, known as a financial intelligence organisation or Financial Intelligence Unit (FIU). The agency will collect raw transactional information and Suspicious activity reports (SAR) usually provided by banks and other entities as part of regulatory requirements. Data may be shared with other countries through intergovernmental networks. Analysis, may consist of scrutinizing a large volume of transactional data using data mining or data-matching techniques to identify persons potentially engaged in a particular activity. SARs can also be scrutinized and linked with other data to try to identify specific activity.

Collection

FININT involves scrutinizing a large volume of transactional data, usually provided by banks and other entities as part of regulatory requirements. Alternatively, data mining or data-matching techniques may be employed to identify persons potentially engaged in a particular activity. Many industrialized countries have regulatory reporting requirements for its financial organisations. It may be possible for the FININT organization to obtain access to raw data at a financial organization. From a legal standpoint, this type of collection can be quite complex. For example, the CIA obtained access to the Society for Worldwide Interbank Financial Telecommunication (SWIFT) data streams through the Terrorist Finance Tracking Program, but this violated Belgian privacy law. Reporting requirements may not affect Informal value transfer systems (IVTS)[1] the use of which may simply be customary in a culture, and of amounts that would not require reporting if in a conventional financial institution. IVTS also can be used for criminal purposes of avoiding oversight.

Analysis

Examples of financial intelligence analysis could include:

  • Identifying high-risk housing tenants on the basis of past rental histories.
  • Detecting tax payers trying to avoid their fiduciary obligations by moving wealth surreptitiously out of a tax-levying jurisdiction.
  • Discovering safe havens where criminals park the proceeds of crime.
  • Accounting for how a large sum of money handed to a targeted individual disappears
  • Checking to see if a corrupt individual has had any sudden and unexplained windfalls.
  • Detecting relationships between terrorist cells through remittances.

In the United States

At the highest level, US domestic FININT, and also some international work, comes under the Under Secretary of the Treasury for Terrorism and Financial Intelligence, heading the Office of Terrorism and Financial Analysis, including:

International financial activity comes primarily from the Department of the Treasury and the Central Intelligence Agency. See CIA access to the Society for Worldwide Interbank Financial Telecommunication (SWIFT).

Terrorist financing scenarios

Gems as an untraceable currency and source of income for terrorists

Following the September 11, 2001 attacks an allegation was made in The Wall Street Journal that tanzanite stones were being used as an untraceable currency and source of income for terrorists. This has not since been firmly established. See possible examples.[2]

The custom common in Africa, uncut diamonds tend to be the de facto standard currency of the illicit small arms trade. Diamonds may be easily counted with a uniform valuation per carat to people in places of the world where there are no automated teller machines. An entire briefcase filled with uncut diamonds without the serial numbers found on refined precious metals can be used to make large illicit value transfers. The practice coexists with human trafficking, narcotics, weapons dealing, terrorism, and the evasion of economic sanctions and embargoes.

However, the Internal Revenue Service has since instituted new anti-money laundering regulations to control the gem trade.[3]

Front-running the market in a terrorist attack

Another intriguing possibility is that a terrorist might buy stocks which are likely to appreciate in the event of a terrorist attack, such as defense industry stocks, or sell short stocks which are likely to depreciate, such as airlines. This possibility led to many investigations of the financial markets subsequent to the September 11, 2001 attacks.[4]

References

  1. ^ United States Department of the Treasury, Financial Crimes Enforcement Network (March 2003). "Informal Value Transfer Systems, FinCEN Advisory Issue 33" (PDF). FinCEN-2003-33. Archived from the original (PDF) on November 21, 2008.
  2. ^ Farah, Douglas (2003-10-24). "The Role of Conflict Diamonds and Failed States in the Terrorist Financial Structure". The Watson Institute, Brown University.
  3. ^ "New Requirement for the Precious Metal, Precious Stone, and Jewel Industries", irs.gov. Archived December 13, 2007, at the Wayback Machine
  4. ^ "Terrorist trade probe widens: Options buying rose in firms that attack affected", by Robert Manor and Melissa Allison, Chicago Tribune, September 19, 2001

Further sources

Zdroj:https://en.wikipedia.org?pojem=Financial_intelligence
>Text je dostupný pod licencí Creative Commons Uveďte autora – Zachovejte licenci, případně za dalších podmínek. Podrobnosti naleznete na stránce Podmínky užití.

čítajte viac o Financial_intelligence


čítajte viac na tomto odkaze: Financial intelligence



Hladanie1.

Western Union
Financial intelligence (business)
File:Question book-new.svg
Wikipedia:Verifiability
Special:EditPage/Financial intelligence
Help:Referencing for beginners
Help:Maintenance template removal
Financial transaction
Tax evasion
Money laundering
Financial Intelligence Unit
Suspicious activity report
Data mining
Data mining
Central Intelligence Agency
Society for Worldwide Interbank Financial Telecommunication
Terrorist Finance Tracking Program
Informal value transfer system
Risk
Tax haven
Crime
Terrorist
Under Secretary of the Treasury for Terrorism and Financial Intelligence
Financial Crimes Enforcement Network
Office of Foreign Assets Control
Central Intelligence Agency
Society for Worldwide Interbank Financial Telecommunication
September 11, 2001 attacks
The Wall Street Journal
Tanzanite
CIA Activities by Transnational Topic: Crime and Illicit Drug Trade#Conflict diamonds and militant financing
Internal Revenue Service
Anti-money laundering
September 11, 2001 attacks
Wayback Machine
Chicago Tribune
ISBN (identifier)
Special:BookSources/978-90-466-0429-8
ISBN (identifier)
Special:BookSources/9780108444692
Template:Espionage
Template talk:Espionage
Special:EditPage/Template:Espionage
Espionage
Espionage#Agents in espionage
Asset (intelligence)
Agent handling
Cover (intelligence gathering)
Double agent
Field agent
Resident spy
Sleeper agent
Spymaster
Intelligence assessment
Analysis of competing hypotheses
Concealment device
Covert listening device
Cryptography
Cutout (espionage)
Computer and network surveillance
Cyber spying
Dead drop
Invisible ink
Numbers station
One-way voice link
Phone surveillance
Short-range agent communications
Steganography
Microdot
Surveillance tools
Tradecraft
Canary trap
Front organization
Limited hangout
Chinese intelligence activity abroad
Chinese espionage in the United States
Cold War espionage
Recruitment of spies
Black operation
Black bag operation
Wetwork
Eavesdropping
Signals intelligence
Measurement and signature intelligence
False flag
Industrial espionage
Human intelligence (intelligence gathering)
Interrogation
Safe house
Surveillance
COINTELPRO
Project MINARET
Project SHAMROCK
Five Eyes
Sexpionage
Stay-behind
Targeted surveillance
Template:Intelligence cycle management
Template talk:Intelligence cycle management
Special:EditPage/Template:Intelligence cycle management
Intelligence cycle management
Intelligence collection management
Human intelligence (intelligence gathering)
Special reconnaissance
List of Special Reconnaissance organizations
Clandestine human intelligence
Recruitment of spies
Clandestine cell system
Clandestine HUMINT and covert action
Direct action (military)
Clandestine HUMINT operational techniques
Espionage
Espionage#Agents in espionage
Field agent
Agent handling
Asset (intelligence)
Black operation
Black bag operation
Concealment device
Cover (intelligence gathering)
Cryptography
Cutout (espionage)
Dead drop
Defection
Turncoat
Denial and deception
Eavesdropping
False flag
Industrial espionage
Interrogation
Numbers station
One-way voice link
Resident spy
Steganography
Surveillance
Signals intelligence
Signals intelligence by alliances, nations and industries
Signals intelligence in modern history
Signals intelligence operational platforms by nation
Direction finding
Traffic analysis
Tempest (codename)
Measurement and signature intelligence
Electro-optical MASINT
Geophysical MASINT
Nuclear MASINT
Radar MASINT
Radiofrequency MASINT
Materials MASINT
Casualty estimation
Earthquake casualty estimation
Geospatial intelligence
Imagery intelligence
Open-source intelligence
Technical intelligence
Intelligence analysis management
Analysis of competing hypotheses
Intelligence cycle (target-centric approach)
Words of estimative probability
All-source intelligence
Basic intelligence
Intelligence assessment
Medical intelligence
Military geography
Technical intelligence
Intelligence dissemination management
Intelligence cycle security
Counterintelligence
List of counterintelligence organizations
Counter-intelligence and counter-terrorism organizations
Template:National intelligence agencies
Template talk:National intelligence agencies
Special:EditPage/Template:National intelligence agencies
Intelligence agency
General Directorate of Intelligence
SHISH
Département du Renseignement et de la Sécurité
Federal Intelligence Agency
National Security Service (Armenia)
State Security and Intelligence Directorate
Australian Secret Intelligence Service
Foreign Intelligence Service (Azerbaijan)
National Security Agency (Bahrain)
National Security Intelligence
State Security Committee of the Republic of Belarus
Belgian General Information and Security Service
Intelligence-Security Agency of Bosnia and Herzegovina
Directorate of Intelligence and Security
Brazilian Intelligence Agency
State Intelligence Agency (Bulgaria)
Brigade Mixte Mobile
Canadian Security Intelligence Service
Agence nationale de sécurité
Agencia Nacional de Inteligencia
Ministry of State Security (China)
National Intelligence Agency (Democratic Republic of the Congo)
Security and Intelligence Agency
Dirección de Inteligencia
Office for Foreign Relations and Information
Danish Defence Intelligence Service
National Intelligence Secretariat (Ecuador)
General Intelligence Directorate (Egypt)
Estonian Foreign Intelligence Service
National Intelligence and Security Service
Directorate-General for External Security
State Intelligence Services (The Gambia)
Georgian Intelligence Service
Federal Intelligence Service (Germany)
Bureau of National Investigations
Border Guard Unit
National Intelligence Service (Greece)
Információs Hivatal
Research and Analysis Wing
Indonesian State Intelligence Agency
Ministry of Intelligence (Iran)
Iraqi National Intelligence Service
Directorate of Military Intelligence (Ireland)
Mossad
Agenzia Informazioni e Sicurezza Esterna
Cabinet Intelligence and Research Office
General Intelligence Directorate (Jordan)
Foreign Intelligence Service (Kazakhstan)
National Intelligence Service (Kenya)
Kyrgyz National Security Service
National Security Agency (Liberia)
State Security Department of Lithuania
General Directorate of General Security
Mukhabarat el-Jamahiriya
Research Division of the Prime Minister's Department
Centro de Investigación y Seguridad Nacional (México)
Information and Security Service of the Republic of Moldova
General Intelligence Agency of Mongolia
National Security Agency (Montenegro)
Direction générale de la surveillance du territoire
Administration for Security and Counterintelligence
General Intelligence and Security Service
New Zealand Security Intelligence Service
National Intelligence Agency (Nigeria)
Reconnaissance General Bureau
Norwegian Intelligence Service
Palace Office (Oman)
Inter-Services Intelligence
National Intelligence Organization (Papua New Guinea)
National Intelligence Coordinating Agency
Agencja Wywiadu
Serviço de Informações Estratégicas de Defesa
Qatar State Security
Foreign Intelligence Service (Romania)
Foreign Intelligence Service (Russia)
General Intelligence Presidency
Security Intelligence Agency
Security and Intelligence Division
Slovenská informačná služba
Slovenian Intelligence and Security Agency
National Intelligence and Security Agency
State Security Agency (South Africa)
National Intelligence Service (South Korea)
National Intelligence Centre (Spain)
State Intelligence Service (Sri Lanka)
General Intelligence Service (Sudan)
Kontoret för särskild inhämtning
Swiss intelligence agencies
General Security Directorate (Syria)
National Security Bureau (Republic of China)
State Committee for National Security (Tajikistan)
Tanzania Intelligence and Security Service
National Intelligence Agency (Thailand)
National Intelligence Organization
Ministry for National Security (Turkmenistan)
External Security Organisation
Foreign Intelligence Service of Ukraine
Signals Intelligence Agency
MI6
Central Intelligence Agency
National Security Service (Uzbekistan)
General Department of Military Intelligence
Département du Renseignement et de la Sécurité
Federal Intelligence Agency
Australian Security Intelligence Organisation
State Security and Intelligence Directorate
State Security Service (Azerbaijan)
Special Branch (Bangladesh)
State Security Committee of the Republic of Belarus
State Security Service (Belgium)
State Investigation and Protection Agency
Directorate of Intelligence and Security
Federal Police of Brazil
Internal Security Department (Brunei)
State Agency for National Security
National Intelligence Service (Burundi)
Canadian Security Intelligence Service
Agencia Nacional de Inteligencia
Ministry of State Security (China)
National Intelligence Directorate (Colombia)
National Intelligence Agency (Democratic Republic of the Congo)
Security and Intelligence Agency
Security Information Service
Danish Security and Intelligence Service
Homeland Security (Egypt)
Estonian Internal Security Service
Finnish Security and Intelligence Service
General Directorate for Internal Security
State Security Service of Georgia
Federal Office for the Protection of the Constitution
State Office for the Protection of the Constitution
Ghana Police Service
National Intelligence Service (Greece)
National Security Department
Office for Safeguarding National Security of the CPG in the HKSAR
Constitution Protection Office
Intelligence Bureau (India)
Indonesian National Police#Central Executive Agencies
Badan Intelijen dan Keamanan Kepolisian Negara Republik Indonesia
Indonesian State Intelligence Agency
Ministry of Intelligence (Iran)
Intelligence Organization of Army of the Guardians of the Islamic Revolution
Iranian Security Police
Garda Crime and Security Branch
Special Detective Unit
Updating...x




Text je dostupný za podmienok Creative Commons Attribution/Share-Alike License 3.0 Unported; prípadne za ďalších podmienok.
Podrobnejšie informácie nájdete na stránke Podmienky použitia.