News

03:07 PM
Reuters
Reuters
News
Connect Directly
RSS
E-Mail
50%
50%

Standard Chartered Left U.S. Vulnerable to Terrorists

A rogue Standard Chartered Plc banking unit violated U.S. anti-money laundering laws by scheming with Iran to hide more than $250 billion of transactions, and may lose its license to operate in New York State, a state banking regulator said on Monday.

U-TURN

The charges are the latest by U.S. law enforcement that highlight how banks might have systematically moved U.S. dollars through sanctioned countries despite a federal crackdown.

New York banking licenses let foreign banks operate a hub to handle transactions in U.S. dollars, the world's most widely-used currency. Without that hub, a bank would lose access to the dollar markets.

Removal of a U.S. banking license could be unprecedented, and the threat of losing it could force Standard Chartered into at least paying a large fine and adopting compliance reforms.

Lawsky said Standard Chartered moved money through its New York branch on behalf of Iranian financial clients, including the Central Bank of Iran and state-owned Bank Saderat and Bank Melli, which were subject to U.S. sanctions.

At the center were the alleged "U-Turn" transactions -- money moved for Iranian clients among banks in the United Kingdom and Middle East and cleared through Standard Chartered's New York branch, but which neither started nor ended in Iran.

Such transactions were permissible until November 2008, when the Treasury Department prohibited them on concerns that they were being used to evade sanctions, and that Iran was using banks to fund nuclear and missile development programs.

The order contended that Standard Chartered found ways to circumvent the rules, such as by altering message fields and inserting phrases such as "NO NAME GIVEN" to hide the nature of the transactions.

Standard Chartered's New York branch held $40.8 billion of assets as of March 31, Lawsky said.

Standard Chartered as of June 2011 was one of only 10 foreign-owned institutions with "direct bidder" access to U.S. government debt auctions through a computerized system.

(Additional reporting by Dena Aubin, Joseph Ax, Emily Flitter in New York, Aruna Viswanatha in Washington, D.C. and Steve Slater in London; Editing by Lisa Von Ahn and Leslie Gevirtz)

Copyright 2012 by Reuters. All rights reserved.

Previous
2 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This is a secure windows pc.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.