meeting our vision of offering institutions
worldwide a standardized means of mea-
suring, understanding and explaining their
money laundering risks.
AT: As a longtime advocate for human
trafficking (HT) awareness, can you
tell us how you first became involved
in fighting this heinous crime?
TM: Raised in Colombia, South America, I
remember at 15-16 years old, seeing many
girls my age going overseas with the prom-
ise of legitimate job placements that would
enable them to help their families back
home. Soon after, we learned of their true
fate and it became “the elephant in the
room” at many social gatherings. The
silence on this started to become deafening
to me. Later on as an adult, I decided to
conduct research on the subject, and it was
Nicholas Kristof’s book Half the Sky that
paved the road for me to do more to break
the silence.
AT: Tell us more about what the
ACAMS Fight Against Human
Trafficking Committee is currently
doing to help fight HT?
TM: We have three main objectives: aware-
ness, community engagement and strategic
collaboration to make a global impact. Cur-
rently, as Polaris Freedom Circle members,
we are helping disseminate their most
recent report, “The Typology of Modern
Slavery” to our members. We are also sup-
porting Kristi House, a local organization in
Miami, Florida in their efforts as well.
AT: As an avid reader, what book are
you currently reading?
TM: I’m reading two actually: Option B by
Sheryl Sandberg and Adam Grant, and The
Circle by Dave Eggers.
Interviewed by: Alexa Serrano, CAMS,
editorial assistant, ACAMS, Miami, FL,
USA, [email protected]
Test your
AML/CTF
knowledge
today!
Visit
ACAMSToday.org
to take the latest quiz
1. Which of the following is an example of a false positive?
A)
B)
C)
D)
A customer is falsely labeled as a risk
A customer gives false information to the FI
A customer or suspicious activity is overlooked as a risk
None of the above
2. Which conduit do cybercriminals use to move their funds?
A)
B)
C)
D)
Digital currency
Money mules and shell corporations
Money transfer services
All of the above
3. IP addresses are generally associated with an individual
user, but they may or may not be associated with a
specific computer or server.
A) True
B) False