© Compliance Aid 2011 1 HOW WELL DO YOU REALLY “KNOW YOUR CUSTOMERS”? Two Day Course MODULE I May 26th – 27th, 2011 Presented by: Caribbean Association of Indigenous Banks & Compliance Aid © Compliance Aid 2011 2 Introduction • The purpose of this training course is to make all participants aware of their responsibility and the role that they play in the Anti-Money Laundering, Know your Customers regulations that govern your respective financial institutions. • Financial Institution are the front-line gatekeepers who are required to take reasonable actions to identify, detect and manage any risks that illegal financial activity may pose to an institution. © Compliance Aid 2011 3 Instructor Michelle N. Martin, CAMS, ACA • Ms. Michelle Martin is the President of Compliance Aid and a Partner at Compliance Solutions Consultants with over seventeen years of experience in banking, insurance, regulatory compliance, public and private accounting. She is a Certified Anti-Money Laundering Specialists (CAMS) and founding co-chair of the ACAMS South Florida Chapter. • Born and raised in Antigua, she attended the Christ the King High School and Antigua State College. Ms. Martin started her financial career in Antigua with Canadian Imperial Bank of Commerce (CIBC). In 1996, Ms. Martin moved to Miami to pursue a higher education. She obtained a Bachelor in Accounting and a Master in Accounting Information Systems at Florida International University (FIU) in 2002. • • Ms. Martin professional experience in the United States (US) began in public accounting as an Auditor with KPMG, LLP for two years then moved on to Ernst & Young LLP. In 2004, she transitioned to the private sector as a Franchise Auditor within the Internal Audit department at Burger King Corporation then moved into the insurance industry by joining Assurant, Inc as an Internal Audit Manager in mid 2005. In 2007, Ms. Martin worked as an Assistant Vice President & AML/BSA Project Manager at Ocean Bank headquarter, and in 2008 worked as a Compliance/OFAC Officer with Banco Do Brasil where she was responsible for implementing a Compliance Program for their New York, Orlando and Miami Offices in addition to coordinating other regulatory efforts for the Bank. © Compliance Aid 2011 4 Course Overview Day one During today’s course we will cover: Role of Financial Institutions (FI’s) in Combating Money Laundering History of Anti-Money Laundering (AML) Overview of Anti-Money Laundering & Essentials of an effective AML Program Know your Customer (KYC) Applying a Risk Based Approach to Due Diligence High-Risk Customers and Enhanced Due Diligence (EDD) AML Challenge © Compliance Aid 2011 Course Overview Day two During tomorrow’s course we will cover: AML Suspicious Activity AML Red Flags Keys to Writing effective SAR Narrative Questions & Course Wrap-up 5 © Compliance Aid 2011 6 Role of Financial Institutions (FI’s) in Anti - Money Laundering © Compliance Aid 2011 7 Role of Financial Institutions (FI’s) in Anti - Money Laundering Financial Institutions have the information and the expertise to detect money laundering and terrorist financing. Law Enforcement agencies rely on Suspicious Activity Reports (SARs) filed by Financial Institutions to aid in terrorist and other criminal investigations. © Compliance Aid 2011 8 Why should you care? Reputation Risk – Negative Publicity Individual, Corporate Civil and Criminal liability. Fines and Imprisonment Suspension of License “It take twenty years to build a reputation and five minutes to ruin it. If you think about that, you’ll do things differently”. Warren Buffett © Compliance Aid 2011 9 History of Anti-Money Laundering (AML) © Compliance Aid 2011 10 Anti - Money Laundering Legislation Bank Secrecy Act (1970) Implemented reporting system for large financial transactions (over $10,000) - Created a “paper trail” Money Laundering Control Act (1986): • Criminalized money laundering and structuring. • Introduce civil and criminal forfeitures for AML violations. Annunzio -Wylie Anti-Money Laundering Act 1992 Death Penalty for Financial institutions USA PATRIOT Act - Post September 11th © Compliance Aid 2011 11 THE USA PATRIOT ACT Uniting & Strengthening America by Providing Appropriate Tools to Restrict, Intercept & Obstruct Terrorism Act The USA PATRIOT Act was enacted by the Congress after the 9/11 terrorist attack and requires: • Verification of Customer Identification • Enhanced Due Diligence Program; and • Establishment of AML Programs across the Financial service industry, which must be in writing and must include at a minimum the following: - Development of internal policies, procedures, & controls; The designation of a compliance officer; An ongoing employee training program; and An independent audit function to test programs. © Compliance Aid 2011 12 THE USA PATRIOT ACT Title III - International Money Laundering Abatement & Anti-Terrorist Financing Act of 2001 • Enhanced Due Diligence on Correspondent Banks, Private Banking, Non-Cooperative Countries and Territories (NCCTs), Politically Exposed Persons (PEPs). • Shell Bank Prohibition. • Maintenance of Certain Information for Correspondent Banks. © Compliance Aid 2011 13 International Anti-Money Laundering Efforts Financial Action Task Force FATF FATA is an intergovernmental organization founded in 1989 on the initiative of the G7. The purpose of the FATF is to develop policies to combat money laundering and terrorist financing. Issued 40 recommendation to combat money laundering Issued 9 Special Recommendations (SR) on Terrorist Financing © Compliance Aid 2011 14 Financial Action Task Force FATF) The Financial Action Task Force (FATF) can be seen as the international standard-setter in the fight against terrorist financing and money laundering. It was established in 1989, by a Group of Seven (G-7) Summit held in Paris. The summit recognised the growing threat posed by money laundering to the banking system and financial institutions and set up the FATF to develop and promote national and international policies, globally, to help eliminate this threat. In 2001, the FATF took over responsibility for the development of standards in the fight against terrorist financing http://www.anti-moneylaundering.org/FATF.aspx © Compliance Aid 2011 15 Caribbean Financial Action Task Force The Caribbean Financial Action Task Force (CFATF) was designed to encourage the coordination of and the participation in antimoney laundering and terrorist financing training programmes. It is aimed at assessing the degree to which its members have implemented the recommendations of the FATF and CFATF. http://www.anti-moneylaundering.org/FATF.aspx 16 © Compliance Aid 2011 Caribbean AML/CTF Principles 1. PREAMBLE The Caribbean Association of Indigenous Banks (CAIB) has agreed that these Principles constitute global guidance on the establishment and maintenance of internationally accepted banking standards to prevent money laundering and the financing of terrorism, and the application of these Principles will serve to enhance the integrity of Correspondent Banking relationships. www.caribbean-principles.com © Compliance Aid 2011 17 Caribbean AML/CTF Principles 4. RISK-BASED DUE DILIGENCE By this Declaration, CAIB member banks will ensure that they cooperate fully with the risk-based approach and the requirements arising from their Correspondent Banking relationships. Caribbean institutions recognize the necessity to meet all international banking standards as defined by their Correspondent Banks and understand that under a risk-based review they may be subjected to a higher level of due diligence. www.caribbean-principles.com © Compliance Aid 2011 18 Caribbean AML/CTF Principles 5. DUE DILIGENCE STANDARDS CAIB member banks will operate in accordance with local and international AML/CTF standards and subject their account holders to appropriate due diligence that will seek to assure that the institution is comfortable conducting business with all its clients and be able to assess each client’s risk profile. It is appropriate for a Caribbean institution to consider the fact that a Correspondent Banking relationship will wish to assess that its Caribbean client operates in a regulator y environment that is internationally recognized as adequate in the fight against money laundering. www.caribbean-principles.com © Compliance Aid 2011 19 Overview of Anti-Money Laundering & Essentials of an effective AML Program © Compliance Aid 2011 20 ANTI-MONEY LAUNDERING (AML) Money Laundering is the process criminals use to exchange their dirty money (funds they made through illegal activity) for clean money (funds that can’t be traced back to the crime or the criminals). © Compliance Aid 2011 21 Stages of Money Laundering? It usually involves three stages: Placement is the initial stage of the process, when the money launderer introduces the illegal proceeds into the financial system; © Compliance Aid 2011 22 Stages of Money Laundering? Layering is the stage that involves converting the proceeds into another form and creating complex financial transactions to disguise the audit trail and the source and ownership of funds. The layering can involve such transactions as wire transfer of deposited cash from one account to another, the conversion of deposited cash into monetary instruments (e.g. travelers checks); © Compliance Aid 2011 23 Stages of Money Laundering? Integration: This involves placing the laundered proceeds back into the economy to create the perception of legitimacy. © Compliance Aid 2011 24 Money Laundering Stages How Money Laundering is Done. Cash is generated by Illicit Activity i.e. drug trafficking 1 - Placement Cash is converted to monetary instruments or deposited into financial institution accounts 2 – Layering Funds are moved to other financial institutions to obscure origins 3 - Integration – Funds are used to acquire legitimate assets or to fund further illicit activities © Compliance Aid 2011 How is money laundered? Structuring Smurfing Interbank wire transfers Misinvoicing Smuggling 25 © Compliance Aid 2011 26 Your AML Program must: Be in writing and must include: • The development of internal policies, procedures, and controls; • The designation of a compliance officer; • An ongoing employee training program; and • An independent audit function to test AML program. © Compliance Aid 2011 27 Internal Controls Risk-focused approach Board and management oversight Written policies and procedures Monitoring and due diligence Management succession (common mistake not including the AML Officer) Strong management information system © Compliance Aid 2011 AML Officer Has policy/decision making authority Has sufficient resources Qualifications, knowledge, and training Communication line to Board of Directors 28 © Compliance Aid 2011 29 Training For directors, senior management, and all staff Conducted at least annually by qualified source New employees should be trained ASAP Should include regulatory requirements and policies/procedures Example of teller selling monetary instrument to non- customer – job specific Document attendance (track those that have not attended and perform make up training)* important © Compliance Aid 2011 30 Independent Testing Performed by individuals independent from the compliance function Auditor should have sufficient knowledge of AML laws and regulations Risk-based audit program Transaction testing © Compliance Aid 2011 31 AML Penalties for Non-Compliance Failure to comply with the AML Act can have serious consequences for you and your institution. CIVIL: Any financial institution, Officer, or employee who willfully violates the AML provisions, is liable for fines. For example, the penalty could be imposed if the institutions consistently fail to file reports and/or file incorrect reports. © Compliance Aid 2011 32 AML Penalties for Non-Compliance CRIMINAL: Any person who willfully violates the AML Act through illegal activity is liable to fines; imprisonment; or both. Willful Blindness: You cannot ignore when you suspect about the legitimacy of the funds. Ignoring RED FLAGS can constitute “Willful Blindness”, and as such may be grounds for prosecution. © Compliance Aid 2011 BREAK 33 © Compliance Aid 2011 Know your Customer (KYC) 34 © Compliance Aid 2011 35 Know your Customer (KYC) In an effort to prevent money laundering financial institutions are required to establish Know your customer Program that meet certain requirements. Before opening an account for any entity (individual or business), you must: • Record identifying information; • Verify that information is valid by using documentary or non/documentary methods; • Check all new customers against sanction list. © Compliance Aid 2011 36 KYC GUIDELINES Identifying the customer and verifying that customer’s identity (Individual / Commercial) Determine the source of funds and purpose of account Commercial entities: Identifying the beneficial owner, and taking reasonable measures to verify the identity of the beneficial owner Conduct on-going review to determine that activity is consistent with profile © Compliance Aid 2011 37 Client Acceptance The financial institutions must make a strong effort to accept only those clients whose Source of Wealth and Funds that can be reasonably established to be legitimate. The primary responsibility for this function lies with the front-line staff who has the contact with the customer and introduces the client for acceptance. Simply fulfilling the internal procedures or providing basic information, does not relieve the front-line staff his/her responsibilities. © Compliance Aid 2011 38 Client Acceptance Financial institutions must identify whether the client is acting on his/her own behalf. Beneficial ownership must be established for all accounts. Identify and inform your Compliance Department of customers that may pose a higher risk to the bank. (e.g. Politically Exposed Persons “PEP”). © Compliance Aid 2011 39 What is a Politically Exposed Persons – PEP’s A person identified as a senior foreign political figure, any member of their immediate family and any close associate. © Compliance Aid 2011 40 Due Diligence Due diligence is designed to detect and report any known or suspect money laundering or suspicious activity. It is the financial institution staff responsibility to provide accurate information as well as to maintain the Profile up to date. © Compliance Aid 2011 41 Due Diligence Customer due diligence is essential when establishing any customer relationship and it is critical for high profile customers. For example, private banking clients. In order to identify an unusual or suspicious activity, it is essential to Know Your Customer (KYC). © Compliance Aid 2011 42 Know Your Customer Essential information to collect and record: Customer Background Purpose of the account Expected activity Source of Funds Source of Wealth KYC © Compliance Aid 2011 43 Customer Background Relevant information includes: Employer, Occupation, Type/Nature of Business, Position/Title, Years in the Area of Business, Salary © Compliance Aid 2011 44 Customer Background Others Source of Income, Referred by, Nationality, Achievements, Products or Services of Interest and Any other Appropriate Information © Compliance Aid 2011 45 Customer Background Identify/mention if the customer is related to any other account in the financial institution. Identify/mention very clearly if the customer is a Politically Exposed Person (PEP). Remember to assign a HIGH RISK for customers classified as (PEP). © Compliance Aid 2011 46 Purpose of the Account Is the intention/objective for opening the account including (but not limited to): Salary account, Investment account or Checking account © Compliance Aid 2011 47 Expected Activity Information about the expected activity in the account is an important and essential tool to monitor the customer’s account activity in order to identify any unusual activity. © Compliance Aid 2011 48 Source of Funds For funds that are coming from US, mention the amount in USD, the exchange rate at the time the profile is being written, and the approximate amount in E.C Dollars. Expected initial deposit amount must be mentioned. © Compliance Aid 2011 49 Source of Funds Source of funds include (but are not limited to): Business / Employment (specify) Rental Income (specify) Investments (specify) Foreign Investments (specify) Sale of property (specify) Other (specify) © Compliance Aid 2011 50 Source of Wealth Documentation supporting the customer’s Source of Wealth, serves to prove that the wealth is compatible with the alleged deposits or investments that the customer plans to have with the financial institution. © Compliance Aid 2011 51 Source of Wealth Cases must be analyzed on a case-by-case basis, though some cases may have some similarities but each case is by nature different and must be treated separately. “Common sense” is the answer to most of the questions as to whether the document provided supports or not the customer’s wealth. © Compliance Aid 2011 52 Source of Wealth Although several documents can be presented to support the source of wealth and confirm other information; the income tax is the most comprehensive document and is therefore mostly recommended (note: it is recommended, not mandatory). © Compliance Aid 2011 Source of Wealth Advantages of the Income Tax: Proof of employment, Proof of residence, Overall list of assets, Occupation, Tax Identification number, Possible Sources of Funds, Earnings. 53 © Compliance Aid 2011 Know your Customer • Collect minimum information (All Accounts): Name Address Date of Birth-if individual Identification Number • Verify customer information timely Documentary Non-Documentary Additional Verification • Maintain appropriate records • Records Retention (x years after account closed) • Consult government sanction terrorist lists 54 © Compliance Aid 2011 55 Know your Customer Customer Due Diligence (CDD) CDD begins with verifying the customer’s identity and assessing the risks associated with that customer; Obtain information at account opening sufficient to develop an understanding of normal and expected activity for the customer’s occupation or business operations; Common exceptions include incomplete forms (transaction activity) © Compliance Aid 2011 56 KYC INDIVIDUALS Name Date of Birth Street Address Tax ID Number Identification type and Identification Form (unexpired government issued photo-identification) Place of employment & occupation are helpful for knowing new customers. © Compliance Aid 2011 57 KYC Commercial Entities Name of Business Street Address Tax ID Number Must obtain documentation to verify Information Provided by Commercial Customer © Compliance Aid 2011 58 KYC Sole Proprietorships A type of business entity that legally has no separate existence from its owner. Most proprietorships will register a trade name or operate as “Doing Business As”. Obtain information about the business in the same manner in which you would obtain information from individual. Also need specific information regarding source of funding, line of business and expected activity. © Compliance Aid 2011 59 KYC Partnerships Partnership refers to an association of persons or an unincorporated company with the following major main features: Formed by two or more persons The owners are all liable for legal actions and debts the company may face personally Created by agreement as proof of existence Obtain information about the partnership in the same manner in which you would obtain information from individuals. Obtain partnership agreement. Identify all partners. Also need specific information regarding source of funding, line of business and expected activity. © Compliance Aid 2011 60 KYC Corporations A corporation is a legal entity which has a separate legal personality from its members. The defining legal rights and obligations of the corporation are: The ability to sue and be sued; The ability to hold assets in its own name; The ability to hire agents; The ability to sign contracts; and The ability to make by-laws, which govern its internal affairs Obtain information to verify the existence of company; Governing Documents, Beneficial Owners, Government Issued Identification Number, Identify of Directors/Signors; Source of Funds and Nature of Activity. © Compliance Aid 2011 KYC = AML COMPLIANCE KNOW YOUR CUSTOMERS IDENTIFY SUSPICIOUS ACTIVITY REPORT TO COMPLIANCE DEPARTMENT 61 © Compliance Aid 2011 62 KYC Tips Search Public Web-site for Filings Obtain Financial Statements is available on line Conduct Media Searches Obtain Parent Information if company not firmly established © Compliance Aid 2011 LUNCH 63 © Compliance Aid 2011 64 Applying a Risk Based Approach to Due Diligence © Compliance Aid 2011 65 Applying a Risk Based Approach to Due Diligence Two step process Identification Analysis Products/Services Customers/Entities Geographic location © Compliance Aid 2011 66 © Compliance Aid 2011 67 Risk Mitigation Monitoring of transactions Client contacts (meetings, discussions, in- country visits etc.) Third party information (e.g. newspaper, internet etc…) Financial institution internal knowledge of the client’s environment (e.g. political situation in his/her country). © Compliance Aid 2011 68 Risk Mitigation If you are in doubt about a specific transaction/case, contact your immediate supervisor or Compliance Department. Compliance is not only a responsibility of the Compliance Department, it evolves all the Departments in the Financial institution, and it is a shared responsibility. © Compliance Aid 2011 69 Risk Approach Common problems Incomplete list of products and services Failure to update annually or when things change No explanation for the risk ratings © Compliance Aid 2011 70 High-Risk Customers and Enhanced Due Diligence (EDD) © Compliance Aid 2011 71 High-Risk Customers and Enhanced Due Diligence (EDD) Policies, procedures, and processes should be developed for EDD Understand anticipated transactions Implement monitoring system © Compliance Aid 2011 72 High-Risk Customers and Enhanced Due Diligence (EDD) File SARs if applicable Common exceptions include: • Infrequent/inconsistent monitoring • Lack of documentation of monitoring • Not obtaining complete and accurate information at account opening (transaction activity) © Compliance Aid 2011 73 HIGH RISK CATEGORIES High Risk Products / Services Private Banking, Correspondent Banking, Cash Services. High Risk Geographies FATF Countries, International Narcotics Control Strategy Report (INSCR) “Countries of primary concern”, OFAC SDN Countries, Designated by Secretary of State, EU Blacklist. High Risk Customers Non-Bank Financial Institutions (MSB’s), Non-governmental obligations, cash-intensive businesses, Politically Exposed Persons, Foreign Correspondent Banks, Private Investment Legal Vehicles (PILVs) such as Int’l business Companies, Private Investment companies –PICs ( Bearer Shares, Power of Attorney), Trusts and Foundations. © Compliance Aid 2011 74 Products & Services to Monitor Products: Services: • Non-interest Bearing Checking Account (DDA) • Time Deposits, Fix Deposits (CDs) • Loans • Mutual Funds • Securities • Debit/Credit Card • Funds Transfers (Wires) • Pouch Services • Negotiable Instruments: Official Checks • Internet Banking • Investment Banking • Bill Payment © Compliance Aid 2011 75 High-Risk Products/Services Electronic funds payment services: Stored value cards, Wires, Third-party payment processors, Automated clearing house transactions, Automated teller machines © Compliance Aid 2011 76 High-Risk Products/Services Electronic banking Private banking (domestic and international) Trust and asset management services • Monetary instruments • Foreign correspondent accounts • Trade finance (letters of credit) • Loans secured by cash collateral © Compliance Aid 2011 77 Enhanced Due Diligence Information Purpose of the account Source of funds and wealth Beneficial owners of the accounts Customer’s (or beneficial owner’s) occupation or type of business Financial statements/banking references Domicile (where the business is organized) © Compliance Aid 2011 78 Enhanced Due Diligence Information Proximity of customer’s residence, place of employment, or place of business to the bank Description of the customer’s primary trade area and whether international transactions are expected to be routine Description of the business operations, the anticipated volume of currency and total sales, and a list of major customers and suppliers Explanations for changes in account activity (Implies ongoing monitoring) © Compliance Aid 2011 79 High Risk Corporations OFFSHORE CORPORATIONS Incorporated in Offshore / Haven Jurisdictions. Not legally able to operate in the haven, and normally have secrecy provisions to protect identity. Very easy to create corporation in offshore havens, with very little documentation. BEARER SHARE CORPORATIONS Bearer shares are corporation stock certificates which are owned simply by the person who holds them, the "Bearer". © Compliance Aid 2011 80 High Risk Corporations U.S. HAVEN JURISDICTIONS States such as Delaware, Florida and Nevada are known tax havens, which operate similar to Offshore Jurisdictions. SHELL CORPORATIONS A shell corporation is as "a company that is incorporated, but has no significant assets or operations." Shell corporations are not in themselves illegal and they may have legitimate business purposes. However, they are a main component of underground economy specially those based in tax havens. They may also be known as International Business Corporations (IBCs), Personal Investment Companies (PICs), Front Companies, or "mailbox" companies. © Compliance Aid 2011 AML Challenge 81 © Compliance Aid 2011 AML Challenge DESIGN AND DEVELOP A MONEY LAUNDERING SCHEME. ENSURE THAT IT CONTAINS EACH ELEMENT OF MONEY LAUNDERING 82 © Compliance Aid 2011 Questions ???? 83 © Compliance Aid 2011 DAY TWO 84 © Compliance Aid 2011 Course Overview Day two During today’s course we will cover: AML Suspicious Activity AML Red Flags Keys to Writing effective SAR Narrative Ethics AML/Ethics Challenge Questions & Course Wrap-up 85 © Compliance Aid 2011 AML Suspicious Activity 86 © Compliance Aid 2011 87 Introduction • In today’s constant changing Financial environment, it is important to be aware of latest guidelines on money laundering and suspicious activities. • We will illustrate common red flags based on product types. • It is important to note that one cannot replace constant vigilance in protecting the interests of the institution. In doing so, it is just as important to rely on your instinct when conducting your daily tasks. © Compliance Aid 2011 88 What is a Suspicious Activity? Any transaction involving funds derived from illegal activities and/or any attempt to hide or disguise funds from illegal activities, as part of a plan to violate or evade any law. Any attempt to evade requirements under the Anti-Money Laundering Act. Transaction has no business or apparent lawful purpose, or is inconsistent and unexplained for the “normal” activity of a customer. Any attempt to access financial institution's computer system to customer funds, information or to damage information. © Compliance Aid 2011 89 Suspicious Activity Customer has an unusual or excessively nervous demeanor. Customer is reluctant to proceed with a transaction after being told it must be reported. Customer threatens an employee attempting to deter a record keeping or reporting duty. Customer makes large cash deposit without counting the cash. © Compliance Aid 2011 90 Suspicious Activity Customer deposits checks and/or money orders that are not consistent with the intent of the account or nature of business. Customer attempts to take back a portion of a cash deposits that exceeds the reporting threshold after learning that the currency transaction report will be filed on the transaction. Customer makes frequent purchases of monetary instruments for cash in amounts less than the reporting threshold. Suspicious Activity Detected? Contact Your AML Officer Immediately! © Compliance Aid 2011 AML Red Flags 92 © Compliance Aid 2011 93 What are Red Flags? Indicators as to which customers may warrant additional attention based on entity type , geography, product usage, activity or other factors. © Compliance Aid 2011 94 AML Red Flags There is a list of money laundering red flags (warning signs) all financial institutions employees should watch for. If you were to encounter any of the following behaviors or activities, you should notify your designated supervisor immediately and provide as much detail as possible. © Compliance Aid 2011 95 AML Red Flags Structuring at multiple branches or at the same branch with multiple individuals Corporate Layering between bank accounts and charitable organizations Wire transfers by charitable organizations Lack of apparent funds raising activity Cash debiting schemes / attempts (ATMs) © Compliance Aid 2011 96 AML RED FLAGS • Structuring at multiple branches or at the same branch with multiple individuals. • Corporate Layering between bank accounts and charitable organizations. • Wire transfers by charitable organizations. • Illegitimate fund raising activity. • Cash debiting schemes / attempts (ATMs). • Movement of funds through FATF designated NCCTs. © Compliance Aid 2011 97 AML RED FLAGS • Inconsistent activity for client profile. • Activity not commensurate with occupation. • Use of multiple account for no legitimate purpose. • Structuring of deposits to avoid AML requirements. • Refusal to provide identification. • Use of personal accounts for business purposes. • Abrupt change in account activity. • Deposit maintained for short period, and wired out. © Compliance Aid 2011 98 AML Red Flags Refusal or reluctance to proceed with a transaction, or abruptly withdrawing a transaction. Customer reluctance to provide information or identification. Structured or recurring, non-reportable transactions. Multiple third parties conducting separate, but related, non-reportable transactions. © Compliance Aid 2011 99 AML Red Flags Multiple even dollar amount transactions. Transactions structured to lose the paper trail. Significant increases in the number or amount of transactions. Transactions which are not consistent with the customer’s business or income level. Transactions by non-account holders. © Compliance Aid 2011 100 Deposit Accounts Red Flags Lack of references or identification and/or minimal, vague or fictitious information provided. Customer with multiple accounts. Frequent deposits or withdrawals with no apparent business source. Multiple accounts with numerous deposits under $10,000.00 Numerous deposits under $10,000.00 in a short period of time. Accounts with high volume of activity and low balances. © Compliance Aid 2011 101 Deposit Accounts Red Flags Large deposits and balances. Deposits and immediate requests for wire transfers. Numerous deposits of small incoming wires or monetary instruments, followed by a large wire debits Accounts used as a temporary repository for funds. Funds deposited into several accounts, transferred to another account, and transferred outside of your territories. © Compliance Aid 2011 102 Deposit Accounts Red Flags Disbursement of certificates of deposit by multiple bank checks. Early redemption of certificates of deposits. Sudden, unexplained increase in activity or balance. Inconsistent deposit and withdrawal activity. Strapped currency -frequent deposits of large amounts of currency, wrapped in currency straps that have been stamped by other banks. Client, Trust, and Escrow accounts - large cash deposits in these types of account. © Compliance Aid 2011 103 Wire Transfers Red Flags Frequent wire transfers with no apparent business reason. High volume of wire transfers with low account balances. Incoming and outgoing wires in similar dollar amounts. Large wire by customers operating cash business. Cash or bearer instruments used to fund wire transfers. © Compliance Aid 2011 104 Wire Transfers Red Flags •. Outgoing wire transfers requested by non-account holders. International funds transfer which are not consistent with customer’s business. International transfers funded by multiple monetary instruments. Other unusual domestic or international transfers. No change in form of currency - proceeds of cash deposit may be wired to another country without changing the form of currency. © Compliance Aid 2011 105 Monetary Instruments Red Flags Structured purchases of monetary instruments - purchases of monetary instruments with currency in amounts below the $3,000.00 reporting threshold. Replacement of monetary instruments - the use of one or more monetary instruments to purchase another monetary instruments. Frequent purchase of monetary instruments without apparent legitimate reason – repeatedly buying a number of official checks or traveler’s checks with no apparent legitimate reason. © Compliance Aid 2011 106 Monetary Instruments Red Flags Deposit or use of multiple monetary instruments. Incomplete or fictitious information -- customer may conduct transactions involving monetary instruments that are incomplete or contain fictitious payees, remitter, etc. Large cash amounts - the customer may purchase cashier’s checks, money orders, etc. with large amounts of cash. © Compliance Aid 2011 107 Lending Red Flags Certificates of deposits used as collateral - customer purchases certificate of deposit and then uses them as loan collateral. Sudden/unexpected payment on loans. Reluctance to provide purpose of loan, or the stated purpose is ambiguous. Inconsistent or inappropriate use of loan proceeds. Overnight loans. Loan payments by third parties. Loan proceeds used to purchase property in the name of a third party, or collateral pledge by a third party. © Compliance Aid 2011 108 Lending Red Flags Permanent mortgage financing with an unusually short maturity. Attempt to sever paper trail. Wire transfer of loan proceeds. Disbursement of loan proceeds by multiple bank checks. Financial statement inconsistent with those of similar business. © Compliance Aid 2011 109 Credit/Debit Cards Red Flags High balances paid off within short time. Over payment of balances. Credit received from third parties, not related to account. Multiple requests for credit refunds. Multiple cash withdrawals from different ATMs. Identify theft indications: such as multiple pay phone calls, multiple daily purchases not exceeding $2000, various internet transactions etc. Activities not consistent with customer general profile. © Compliance Aid 2011 110 Internet Banking Red Flags Large volume of activity with equal amount of debits and credits. Suspicious movement of funds. Movement of funds from one institution, into another institution, and back into the first institution can be indicative of money laundering. Unusual transfer of funds among related accounts, or accounts that involve the same or related principals. Payments or receipts with no apparent links to legitimate contracts, goods or services. • © Compliance Aid 2011 111 Internet Banking Red Flags Large volume of wire transfers deposited into, or purchased through, an account when the nature of the account holder’s business would not appear to justify such activity. Large incoming wire transfers on behalf of a foreign client with little or no explicit reason. Activity that is unexplained, repetitive, or shows unusual patterns. Transfers that are unexplained, repetitive or shows unusual patterns. © Compliance Aid 2011 112 Customer and/or Bank Employee Red Flags Questions or discussions on how to avoid reporting/record- keeping. Customer attempt to influence a institution employee not to file a report. Lavish lifestyles of customers or bank employees. Short-term or no vacations. Circumvention of internal control procedures. Multiple incorrect or incomplete Currency Transactions Reports. © Compliance Aid 2011 BREAK 113 © Compliance Aid 2011 114 Keys to Writing effective SAR Narrative © Compliance Aid 2011 115 SUSPICIOUS ACTIVITY REPORT (SAR) Each employee at a financial institution should be on the lookout for suspicious activity. If you get a feeling something’s “just not right about a customer’s behavior, a transaction, or a pattern of transactions, tell your designated supervisor, and Compliance Department immediately (Do not tell anyone else besides your designated supervisor and Compliance Department). SUSPICIOUS ACTIVITY REPORT (SAR) Confidentiality In order not to breech your institution’s safe harbor protection, it is essential that suspicions and Suspicious Activity Reports (SARs) be kept confidential. Discuss these matters with no one but your designated supervisor and Compliance Department. Neither the banks or its employees are permitted to notify any person involved in the transaction that an SAR has been filed, except where such request has been made by your FIU/ONDCP. © Compliance Aid 2011 117 The Importance of Filing a SAR Identifies potential & actual illegal activity: Money Laundering Terrorist Financing Other Financial Fraud & Abuse Detects & prevents flow of illicit funds. Establishes emerging threats through analysis of patterns & trends. It’s Required By LAW! © Compliance Aid 2011 118 Writing effective Suspicious Activity Report (SAR) Do not assume the reader is familiar with your institution’s internal terminology, acronyms, operational processes, or has other knowledge related to the reported violation. © Compliance Aid 2011 119 Writing effective Suspicious Activity Report (SAR) The Narrative should: Be concise & clear Provide a detailed description of the known or suspected criminal violation or suspicious activity Identify the essential elements of information (the 5 W’s) Be chronological & complete 120 © Compliance Aid 2011 Essential SAR Elements SARs narratives should contain the “5 Ws and the How" of the transaction being reported in a SAR: Who? What? When? Where? Why? How? © Compliance Aid 2011 121 Writing effective Suspicious Activity Report (SAR) Who is conducting the criminal or suspicious activity? Describe additional details about the suspect(s) : Employer & occupation information Relationship between the suspect & the filing institution Length of the financial relationship © Compliance Aid 2011 122 Writing effective Suspicious Activity Report (SAR) What instruments or mechanisms facilitate the suspect activity/transactions? Identify & describe the transactions raising the suspicions of the financial institution. Examples include: Cash deposits and/or withdrawals Checks & other monetary instruments (money orders; traveler’s checks; cashiers or bank checks) © Compliance Aid 2011 123 Writing effective Suspicious Activity Report (SAR) Additional types of transactions raising the suspicions of the financial institution: Wire or other electronic transfers (ATM, ACH) Foreign currency © Compliance Aid 2011 124 Writing effective Suspicious Activity Report (SAR) When did the criminal or suspicious activity occur? If a one-time occurrence, identify the date If a pattern of activity occurred over a span of time, state when the activity first initiated and then describe the activity during the duration Identify when the activity was detected © Compliance Aid 2011 125 Writing effective Suspicious Activity Report (SAR) Where did the suspicious activity take place? Identify the branch/department location or locations within the institution where the activity occurred (name of branch, office or department and the street address for each) Identify all account numbers & types of accounts affected by the transactions/activity Indicate if suspect transactions involve other domestic or international banks & identify the banks, their locations, account numbers, etc. © Compliance Aid 2011 126 Writing effective Suspicious Activity Report (SAR) Why does the institution think the activity is suspicious? First, describe the filer’s type of institution © Compliance Aid 2011 127 Writing effective Suspicious Activity Report (SAR) Why does the institution think the activity or transaction is suspicious (cont.)? Next, describe concisely but fully, why the institution considers the activity as suspicious Be sure to include any relevant information about suspicious customer activity that the institution has in its files at the time the SAR is filed © Compliance Aid 2011 128 Writing effective Suspicious Activity Report (SAR) How did the suspicious activity occur? In a concise, accurate and logical manner, describe how the suspect transaction or pattern of transactions were completed For account activity, provide as completely as possible an explanation of the cycle of funds including the source of the funds in the account & application of those funds © Compliance Aid 2011 129 Writing effective Suspicious Activity Report (SAR) Suggested structure of the narrative Introduction Body Conclusion © Compliance Aid 2011 130 Writing effective Suspicious Activity Report (SAR) The Introduction Provide a brief statement of the SAR’s purpose Generally describe the known or suspected violation Identify the date of any SARs previously filed on the subject & the purpose of that SAR Indicate any internal investigative numbers used by the filing institution to maintain records of the SAR © Compliance Aid 2011 Writing effective Suspicious Activity Report (SAR) The Body Provide the relevant facts about all parties facilitating the suspect activity or transactions Answers Who? 131 © Compliance Aid 2011 Writing effective Suspicious Activity Report (SAR) The Body (cont.) Identify all involved accounts and transactions in chronological order by date and amount – do not use or insert tabular objects, tables, or pre-formatted spread sheets Answers What? Where? When? 132 © Compliance Aid 2011 Writing effective Suspicious Activity Report (SAR) The Body (cont.) Explain in detail the filer’s position that the activity or transaction is illegal or suspicious Answers Why? 133 © Compliance Aid 2011 Writing effective Suspicious Activity Report (SAR) The Body (cont.) Describe the method of operation of the subject: Manner in which the activity and/or transactions were completed; Any relationship to other transactions, accounts, conductors, etc.; and Subsequent results of the activity Answers How? 134 © Compliance Aid 2011 Writing effective Suspicious Activity Report (SAR) The Conclusion Summarize the report & include: Any planned or completed follow-up actions by the institution Names & telephone numbers of persons with additional information about the reported activity Location within the institution where all SAR-related records are maintained 135 © Compliance Aid 2011 136 SAR - Penalties Failure to file a report. Filing report containing material omission or misstatement. Failure to maintain required records. Failure to secure identifying information. © Compliance Aid 2011 Your Responsibility Be familiar with your institution AML program Comply with KYC procedures Conduct enhanced Due Diligence When in doubt . . . Ask and look it up Identify and report any suspicious activity or transactions to your Compliance Officer Review new customers against the sanction List “KNOW YOUR CLIENT” 137 What is Ethics Ethics describes a system of moral principles, rules or standards that govern the conduct of members of a group. Ethics deals with right and wrong – and the moral consequences of what we do. Ethics also is indelibly linked with trust – and, in our industry, trust is everything. WHY HAVE AN ETHICS POLICY Reason # 1: People are diverse. An Ethics policy establishes a common understanding – among all employees – as to what is ethical behavior. WHY HAVE AN ETHICS POLICY Reason # 2: An Ethics Policy Sets Clear Expectations. An official code of Ethics tells you exactly what is expected in terms of ethical behavior and the consequences should you fail to live up to those expectations. WHY HAVE AN ETHICS POLICY Reason # 3: An Ethics Policy Can Provide Legal Protection. An Ethics policy may protect an institution in potential action against a rogue employee. WHY HAVE AN ETHICS POLICY Reason # 4: Ethics & Compliance go Hand-In-Hand. Your Compliance with your ethics policy will support your institution’s compliance with consumer protection laws. WHY HAVE AN ETHICS POLICY Reason # 5: Good Ethics are Good Business In an ethical organization, the best interests of employees and customers always win out. This result in increased loyalty from both. What Should An Ethics Policy Say It should be a workable guide for all employees. It should be unique to the institution’s organization and business practices. It should spell out rare situations in which the policy may be waived. It should contain a special “whistleblower” clause to protect from fear of reprisal employees who report those engaged in suspected illegal or unethical conduct. What Should An Ethics Policy Say Every Ethics Policy should address: Conflicts of interest Gifts and gratuities, including dollar limits, if applicable and Privacy of records and information © Compliance Aid 2011 AML/Ethics Challenge 146 © Compliance Aid 2011 Questions ???? 147 © Compliance Aid 2011 Compliance Aid Michelle N Martin, CAMS, ACA President E-mail Michelle@ComplianceAid.pro Telephone: Miami, Florida, U.S.A. +1 (305) 772-9712 St. John's Antigua, W.I. +1 (268) 784-9423 148 Compliance Solutions Consultants Michelle N Martin, CAMS, ACA Partner Website http://compliancesolutionsconsultants.com E-mail Michelle@compliancesolutionsconsultants.com Telephone: Miami, Florida, U.S.A. +1 (305) 772-9712 St. John's Antigua, W.I. +1 (268) 784-9423 © Compliance Aid 2011 AML KYC Training If you have any questions, do not hesitate to contact us! CAIB & Compliance Aid 149