Detecting Suspicion General Approach to Detecting Suspicion in the Financial Industry Kevin Whelan Resident Advisor, EAG Office of Technical Assistance.

Slides:



Advertisements
Similar presentations
How Compliance Fits Sandra Dolson Wholesale Compliance Manager SLF Canada.
Advertisements

Prevention of Money Laundering Training session. Overview What is Money laundering? Requirements under the Act Arcadias policy Relevance to your routine.
An Introduction to professional services. The professional services The professional services support businesses of all sizes across the economy, providing.
At Hyderabad December 29, 2010 Kunnel Prem. ICP 27 on Insurance Frauds and ICP 28 on AML/CFT.
Anti Money Laundering (AML) An Overview for Staff Prepared by MSM Compliance Services Pty Ltd.
Anti-Money Laundering and OFAC Compliance for Transfer Agents SSA Annual Conference July 25, 2008.
1 INTERNAL CONTROLS A PRACTICAL GUIDE TO HELP ENSURE FINANCIAL INTEGRITY.
Anti-Money Laundering (AML)
KYC Norms & AML Standards Guidelines
1 Supplement to the Guideline on Prevention of Money Laundering Hong Kong Monetary Authority 8 June 2004.
1 CSI COMPLIANCE AWARENESS TRAINING ANTI MONEY LAUNDERING July 2004 This is confidential proprietary and trade secret information of American Express Travel.
This tool can be found in the Banker Tools section of BankersOnline.com. 1 Bank Secrecy, Anti-Money Laundering & OFAC Director Education.
Anti-Money Laundering
Money Laundering 23 September Contents 1 What is money laundering? 2. The ‘primary’ money laundering offences 3. Failure to report and tipping off.
Financial intelligence centre REPUBLIC OF SOUTH AFRICA Presentation to the Portfolio Committee on Trade and Industry on Online Gambling 2 March 2012 Presentation.
1 Presented by: L.K.Barathi. Advisor – American Express Bank Ltd Mumbai.
1 Jersey Funds Association Educational training session – 22 June 2010.
1 Raymond Doray Conflicts between the new Canadian Money Laundering Act and the rules of professional conduct and ethics September 13, 2002.
CONTENTS First: Main Points of National Risk Assessment Second: FIs Risk assessment and CDD.
Last update: 2010 Bringing Smart Policies to Life The basics: AML/CFT for financial inclusion.
International International Standards on Regulating DNFBPs & The way forward Mr Ping-Yiu MA Assistant Secretary for Security 4 March 2010 Narcotics Division,
Global Treasury Services Latin America Operating Risk.
Western Union Confidential ©2009 Western Union Holdings, Inc. All Rights Reserved. FAC003 Suspicious Activity.
Eimer O’Rourke Head of Retail Banking Anti-Money Laundering 3 rd time lucky ICAI – 18 October 2007.
ANTI-MONEY LAUNDERING TRAINING FOR LENDERS Bill Heyman Offit Kurman
Heba Shams (World Bank) & Nadim Kyriakos –Saad (IMF) World Bank
Combating Terrorism Financing 1 National Accountants Conference 2004, Kuala Lumpur “Combating Terrorism Financing” 13 October 2004 by Koid Swee Lian Financial.
International International Standards on Regulating DNFBPs & The way forward Mr Peter KWOK Assistant Secretary for Security 19 February 2009 Narcotics.
Best Practices for Banking MSBs
Financial Crimes Enforcement Network (FinCEN) Institute of International Bankers Annual Seminar on Regulatory Examination, Risk Management and Compliance.
FATF Updates, Common AML Exam Deficiencies & AML Supplement Amendments
Legal Framework and Regulatory Regime Required for an effective AML/CFT System Richard Pratt 29 March 2005.
Forensic and Investigative Accounting
Certificate for Introduction to Securities & Investment (Cert.ISI)
Chapter 19: Ethical Responsibilities Chapter 19 Ethical Responsibilities.
1 A Presentation for Members of the Bank Compliance Association of Connecticut (BCAC) June 12, 2008 Rebecca Williams FDIC Case Manager (Special Activities)
Challenges and Opportunities in the Caribbean Financial Services Sector Rudolph F. Zepeda, Jr. Federal Reserve Bank of Atlanta Miami Branch.
ANTI-MONEY LAUNDERING COMPLIANCE PROGRAM FCM TRAINING
FINANCIAL INTELLIGENCE CENTRE
Agenda  Background and Purpose  Money Laundering and Terrorist Financing  BSA Program Requirements  Risk Based Program Management  Suspicious Activity.
Customer Due Diligence/ Know Your Customer
Suspicious Transactions James Wright. Cash Transactions  1. Cash deposits or withdraws for considerable, unusual amounts of money, made by natural persons.
Correspondence Accounts and Wire Transfers
Presented by: Hany Faidy Senior Vice President, Head of Compliance Division March 2009 Procedures followed by FI’s when reporting Suspicious Transaction.
AML Compliance Findings & Observations Wyn Clark U.S. Treasury.
An Overview of Hong Kong’s Anti-Money Laundering & Counter- Terrorist Financing Regime (AML & CTF Regime) Michael YIP Assistant Secretary Financial Services.
World Bank International Standards and their Measures for Financial Institutions and Non-Financial Businesses and Professions to Prevent Money Laundering.
Responsibilities of Financial Institutions in the AML Architecture – AML Regulations in Afghanistan Mr. Jafar Sadat, Da Afghanistan Bank.
International International Standards on Regulating DNFBPs & The way forward Mr Peter KWOK Assistant Secretary for Security 27 February 2009 Narcotics.
Legal Considerations Members in Practice (MIP) Members in Business (MIB)
Legal Considerations Members in Practice (MIP) Members in Business (MIB)
ComplianceAid Caribbean Basin AML Conference 2016 “How to End a Relationship Under AML” Randy Graham, CEO March 10, 2016.
Suspicious Activity Reporting Reporting Risks and Creating Effective Reports Kevin Whelan Resident Advisor, EAG Office of Technical Assistance US Department.
Bank Secrecy Act Training For Volunteers
Forensic and Investigative Accounting
Beneficial Ownership and Source of Wealth
IMPLEMENTATION STRUCTURE & EXPECTED OUTCOMES FOR RECOMMENDATION 16, 17, 18, 19 & 20 Oladele Adeoye.
Correspondent Banking (1)
Anti Money Laundering (AML)
IMA Member Meeting Legal update - MLD4 and MLD5 Siobhan Moore
What Constitutes a “Triggering Event?”
USA PATRIOT ACT WHAT DOES IT STAND FOR?.
Red Flags Rule An Introduction County College of Morris
MALAWI GAMING BOARD Anti-Money Laundering Compliance in the gaming industry Presented by: Master Maliro.
Leaders Credit Union Board Presentation
PART II.. PART II. AGENDA- PART II (chapter 5) Identification and client due diligence procedures Reliance on third parties Identification of individuals.
FIU - STR Red Flags.
Forensic and Investigative Accounting
Tackling money laundering
Presentation transcript:

Detecting Suspicion General Approach to Detecting Suspicion in the Financial Industry Kevin Whelan Resident Advisor, EAG Office of Technical Assistance US Department of Treasury

FATF Recommendations  Recommendation 11 Financial institutions should pay special attention to all complex, unusual large transactions, and all unusual patterns of transactions, which have no apparent economic or visible lawful purpose. The background and purpose of such transactions should, as far as possible, be examined, the findings established in writing, and be available to help competent authorities and auditors.  Recommendation 13 If a financial institution suspects or has reasonable grounds to suspect that funds are the proceeds of a criminal activity, or are related to terrorist financing, it should be required, directly by law or regulation, to report promptly its suspicions to the financial intelligence unit (FIU).

Two Basic Types of Suspicion  Type A (Recommendation 11): Activities and behaviors that are not reasonable and expected for particular customers, customer accounts, or transactions.  Type B (Recommendation 13): Activities and behaviors that are consistent with illegal activity, indicators of illegal activities, or typologies for illegal activity, or activities and behaviors that are simply suspicious even in the absence of established indicators or typologies  These types are not mutually exclusive Both types should be actively detected by reporting entities.

Type A Suspicions  Need to establish expectations for normal behavior. Customer Due Diligence (CDD) is critical At account opening Over time through account monitoring Rely heavily on knowledge of customers and being able to establish customer profile Know Your Customer (KYC) Risk Based  Activities and behaviors need to be monitored Deviations from transactional patterns should be detected and explained Failure to adequately explain should be grounds for suspicion. Deviations from normal behavior need to be detected

Type A—Example 1  Customer opens personal account and declares profession to be government employee. Over a period of one year regular deposits are made corresponding to government salary. Average balance remains constant.  Suddenly several large deposits are made into the account by the owner and others, followed by wire transfers to foreign accounts Customer explains that he is purchasing foreign property Sources of deposited funds are not adequately explained Automated monitoring system flags transactions as deviating significantly from the norm and forwards an alert to the compliance officer

Type A—Example 1  The facts as presented are plausible, but suspicious The client has deviated significantly from normal activity based on his individual profile The bank compliance officer should investigate further and consider filing a suspicious activity report

Type A—Example 2  The bank holds accounts for several small retail grocery shops.  These shops collectively have an identifiable pattern of activity Regular cash deposit activity that correlates with consumer purchasing patterns (e.g. higher sales before weekends and holidays) Monthly payments to wholesalers, suppliers, landlord, utilities providers, etc.  One shop deviates significantly from this industry pattern Cash deposits deviate from the pattern in terms of size and regularity Also significant amount of non-cash deposits Payments also deviate from pattern Account makes unexplained use of wire transfers to foreign accounts

Type A—Example 2 (cont)  Again, it is plausible that this firm simply uses a different business model. However … The client has deviated significantly from normal activity based on an industry profile The compliance officer should investigate and consider filing a suspicious activity report

Type B Suspicions  Knowing the customer is still important.  ‘Red Flag’ indicators also important Describe situations that require additional scrutiny Many red flags rely on knowledge of customer and so are related to Type A Most red flags are indicators of possible criminal behavior

Type B Suspicions (cont.)  Some basic examples: At Account Opening  False, misleading, or inconsistent statements at account opening  Desires for products that don’t make economic sense for the type of account and activity  Overly curious about banks specific internal policies and practices During account exercise  Use of multiple accounts with no clear economic purpose  Patterns of transactions that appear designed to avoid reporting (More later)

Example of Type B  Multiple accounts share same address but different account owners All declared as retail-level businesses to explain cash generation  Cash deposits below mandatory reporting limits made into accounts in highly correlated manner (e.g. same day, or consecutive days)  Wire transfers made to single offshore foreign account soon after deposits  Indicators: Probable use of straw men (proxies) Probable structuring of deposits Lack of legitimate economic purpose Rapid transfer to consolidation account in offshore jurisdiction

More FATF Recommendations for Financial Institutions  Customer due diligence and record-keeping (Recommendations: 4, 5, 6, 7, 8, 9, 10, 11, 12)  Reporting of suspicious transactions and compliance (Recommendations: 13, 14, 15, 16)  Other measures to deter money laundering and terrorist financing (Recommendations: 17, 18, 19, 20)  Measures to be taken with respect to countries that do not or insufficiently comply with the FATF Recommendations (Recommendations: 21, 22)2122  Regulation and supervision (Recommendations: 23, 24, 25)232425

Summary of Recommendation 5  No anonymous accounts or accounts in obviously fictitious names  Risk-based due diligence measures, including identifying and verifying the identity of their customers, when: establishing business relations; carrying out occasional transactions: (i) above the applicable designated threshold; or (ii) that are wire transfers in the circumstances covered by the Interpretative Note to Special Recommendation VII; there is a suspicion of money laundering or terrorist financing; or the financial institution has doubts about the veracity or adequacy of previously obtained customer identification data.  Due diligence includes: Identifying and verifying customer and/or beneficial owner Understanding purpose and nature of proposed business relationship Ongoing monitoring of relationship and transactions

Where are the Risks?  Risky Customers Those with high net worth PEPs may be considered high risk  So might be their relatives Those in risky professions/industries Charities Those who are of risky national/geographic origin Those without adequately explained sources of wealth/income Those whose identity is not convincingly established Those whose stated purpose for establishing a relationship with the bank is not fully convincing Those who match ‘red flag’ indicators

Where are the Risks?  Risky Products/Services Wire transfer Certain types of loans Trust services Private Banking Trade Financing Correspondent Banking

Where are the Risks?  Risky Transactions Large cash transactions Transactions to offshore jurisdictions Other transactions that match ‘red flag’ indicators

Where are the Risks?  Risky Locations Countries without adequate AML/CFT regulation Jurisdictions known to be involved in the narcotics trade Countries in which the production or transportation of illegal drugs may be taking place Bank Secrecy Havens Countries identified in FinCEN advisories or the advisories of other countries Money laundering countries and jurisdictions identified in the US Department of State’s annual International Narcotics Control Strategy

Profiling Customer Risk  How? By who they are By the products they use By the transactions they make By where they are  When Account Opening When conducting transactions Periodically when updating customer information  High risk customers should get extra scrutiny at account opening and when conducting transactions

Recommendation 15  Recommendation 15 Financial institutions should develop programs against money laundering and terrorist financing. These programs should include: a) The development of internal policies, procedures and controls, including appropriate compliance management arrangements, and adequate screening procedures to ensure high standards when hiring employees. b) An ongoing employee training program. c) An audit function to test the system.

Compliance Plan  Should include the following: Internal policies, Procedures, and Controls Definition of roles and responsibilities  Compliance Officer role, in particular Internal Audit function Training function Should be designed for effectiveness given the characteristics of the bank (there is not one size that fits all) Should be designed to implement local AML/CFT laws and regulations Plan should be in writing, regularly reviewed, and put into practice.  Should be approved by Board of Directors

Ongoing Training  At a minimum staff should be trained to: Understand the bank’s Compliance Plan Understand specific risks and red flags associated with customers, products, and transactions in their area of work Understand the concept of suspicion Understand the internal reporting procedure for suspicions Understand legal provisions against unauthorized disclosure of reporting activity Understand safe harbor provisions of the law Understand potential penalties under the law  Training should be a tool for changing the culture of compliance of bank staff

Internal Audit/Control  Can be based on regulatory exam procedures For example, exam procedures by US regulators are published on their webs site  Should include transaction testing Are suspicious transactions really being identified and reported?  Should assess employee’s knowledge Do they know what they are supposed to? Are they applying that knowledge? Are they following the policies and procedures?  Should detect possible internal complicity in evading AML controls

Typical CDD/Monitoring Strategies  Large Bank Strategy (capital intensive) Focus on policies and procedures Invest in automated systems Risk oriented Testing and monitoring of the system itself  Small Bank Strategy (labor intensive) Less emphasis on policies and procedures Focus on testing of transactions and records Much more hands-on emphasis

Role of Technology  What Technology Cannot Do: Cannot substitute for training Cannot create a compliance culture nor implement standards of integrity and ethical behavior Cannot replace the human element, especially when dealing with the human element Cannot be an excuse for failing to detect abuse  What Technology Can Do: Reduce Compliance Costs  In record keeping, for example Manage and analyze large amounts of information Enhance sharing of information Assist in the case management process

Technology  Risk Management Software Designed both for regulatory compliance and protection of reputation Software can be configured to highlight suspicious transactions of both Type A and Type B  Those transactions which don’t match the normal patterns for the individual or legal entity  Those transactions which match a known pattern of financial crime Can assist in manual investigation of highlighted transactions Can automate reporting requirements Can automate record keeping requirements Rare that these technologies are used in developing economies  Expensive  Work in conjunction with sophisticated automated transactions processing systems  Many banks in developing economies can’t justify the expense  Still possible to do same things at low cost  Identification Software Watch List Matching (e.g. UN List)

Most Important Considerations for Detecting Suspicion  Suspicious activities are not always difficult to detect. But … You Have to look for Suspicion!  You have to make investments into training and systems  You have to monitor the systems and ensure they are working  You have to work with the FIU and others to ensure that the latest typologies are known to you You have to see suspicion when it is there  Consider the definitions  Don’t be too willing to rationalize what you see  Encourage employees to report what they see to the compliance officer  Do not discourage employees from reporting … no penalties, no fear! You have to act upon suspicion that you see  Have courage  Have confidence in yourself and the FIU  File a complete SAR