Certified Cryptoasset AFC Specialist FLASHCARDS Version 1.02 acams.org Instructions 1. Fold flashcards along vertical edges. 2. Cut flashcards along horizontal edges. acams.org 1-1 A structure of cryptocurrency transaction data on the blockchain 1-1 What is a block? 1-2 A restricted blockchain that operates within a closed network 1-2 Private blockchain 1-3 A non-restrictive and permissionless blockchain that is accessible to anyone Public blockchain Version 1.02 © ACAMS. All rights reserved. 1-3 1-4 No one can remove or alter transaction data 1-4 Immutability 1-5 No single authority has entire control 1-5 Decentralization 1-6 Blockchain consensus mechanism that allows miners to compete to verify transactions Proof of work Version 1.02 © ACAMS. All rights reserved. 1-6 1-7 Blockchain consensus mechanism that randomly selects miners based on their stake 1-7 Proof of stake 1-8 The secure codes needed to access your cryptoassets 1-8 Private key 1-9 Any change to a block would require changes for all blocks that follow Why is it difficult to change a validated block? Version 1.02 © ACAMS. All rights reserved. 1-9 1-10 A form of digitally stored value that uses distributed ledger technology and encryption 1-10 Cryptoasset 1-11 By the extent to which it is issued, operated, managed, and regulated by a central party 1-11 How is cryptoasset centralization measured? 1-12 Low fees, fast processing times, and ability to purchase with any currency worldwide Advantages of cryptoassets over fiat currency Version 1.02 © ACAMS. All rights reserved. 1-12 1-13 Sophisticated technological equipment and a lot of computational power 1-13 What is needed to mine cryptoassets? 1-14 Shared computing resources and the ability to earn rewards more quickly 1-14 Benefits of mining pools 1-15 Use green energies such as solar, wind, and hydroelectric energy Ways to reduce environmental impacts of mining Version 1.02 © ACAMS. All rights reserved. 1-15 1-16 Each Bitcoin can be divided into 100 million satoshis, which can be purchased individually. 1-16 How can a single Bitcoin be divided? 1-17 Any cryptocurrency that is not Bitcoin 1-17 Altcoin 1-18 Token sale that allows a new venture to raise funds to develop new projects Initial coin offering (ICO) Version 1.02 © ACAMS. All rights reserved. 1-18 1-19 A decentralized blockchain platform with a native cryptocurrency called ether (ETH) 1-19 Ethereum 1-20 A virtual currency or denomination of cryptocurrency 1-20 Token 1-21 A unique cryptographic blockchain asset, often in the form of an image or video Non-fungible token (NFT) Version 1.02 © ACAMS. All rights reserved. 1-21 1-22 A digital asset form of money issued by a country's central bank, often using blockchain 1-22 Central bank digital currency (CBDC) 1-23 A natural or legal person who provides financial services for or on behalf of others 1-23 Virtual asset service provider (VASP) 1-24 Physical kiosks that allow anyone to purchase cryptocurrencies using cash or a bank card Crypto ATMs Version 1.02 © ACAMS. All rights reserved. 1-24 1-25 Allow cryptocurrency buyers and sellers to trade on their platforms in exchange for fees 1-25 Centralized exchanges 1-26 Allow cryptocurrency buyers and sellers to connect through peerto-peer (P2P) trading 1-26 Decentralized exchanges 1-27 Hiding the source of cryptoasset funds to make transaction tracing nearly impossible What are mixers and tumblers used for? Version 1.02 © ACAMS. All rights reserved. 1-27 1-28 A system that offers financial products and services using smart contracts on a blockchain 1-28 Decentralized finance (DeFi) 1-29 Freedom from censorship by government or others and data protection via a blockchain 1-29 Benefit of decentralized application (dApp) 1-30 A group that chooses a set of rules and codes them into a computer program Decentralized autonomous organization (DAO) Version 1.02 © ACAMS. All rights reserved. 1-30 1-31 The transaction is broadcast across the blockchain network, validated, and confirmed. 1-31 What happens in a blockchain transaction? 1-32 Incentivizing the computers on the network with a higher fee 1-32 How to speed up a transaction 1-33 Virtual asset service provider (VASP) The most common way to buy a cryptoasset Version 1.02 © ACAMS. All rights reserved. 1-33 1-34 Allows digital transactions to take place when the amount includes a fraction 1-34 The function of unspent transaction output (UTXO) 1-35 Without the need for a bank, government, or intermediary to process a payment 1-35 Peer-to-peer (P2P) transactions 1-36 Media activity, technology changes, government regulation, economic changes, etc. Market forces affecting prices of cryptoassets Version 1.02 © ACAMS. All rights reserved. 1-36 1-37 Exchanges that offer their services 24 hours a day, 7 days a week 1-37 Cryptoasset markets 1-38 Identity management, supply chains, insurance, real estate ownership, etc. 1-38 Examples of applications of blockchain technology 1-39 21 million Maximum number of Bitcoin to be produced Version 1.02 © ACAMS. All rights reserved. 1-39 1-40 In wallets that users control or within virtual asset service providers (VASPs) 1-40 How are cryptoassets stored? 1-41 A string of characters representing a wallet to send and receive funds 1-41 Cryptocurrency address 1-42 Users control the private keys and the assets. Unhosted wallets Version 1.02 © ACAMS. All rights reserved. 1-42 1-43 Virtual asset service provider wallets 1-43 Hosted wallets 1-44 A login ID and password allow the user to control the wallet key pairs. 1-44 Cloud wallets 1-45 Portable devices allowing users to securely manage their cryptocurrency assets Hardware wallets Version 1.02 © ACAMS. All rights reserved. 1-45 1-46 Miners control more than 50% of the network's validating and mining power. 1-46 51% attacks 1-47 A radical change to the network that effectively results in two branches. 1-47 Hard forks 1-48 A minor change to the blockchain software, such as an upgrade Soft forks Version 1.02 © ACAMS. All rights reserved. 1-48 1-49 1-49 Self-executing transaction protocols stored on a blockchain that run when predetermined conditions are met. Smart contracts 1-50 The mining reward is cut in half. 1-50 Block halving 1-51 Individuals and entities can be tracked and potentially identified. Pseudonymous cryptocurrency Version 1.02 © ACAMS. All rights reserved. 1-51 1-52 Monero, ZCash, and Dash 1-52 Examples of cryptoassets that offer enhanced anonymity 1-53 Used to identify patterns within transactions. 1-53 Blockchain analytics 1-54 Immutable and publicly available Benefits of information on a blockchain Version 1.02 © ACAMS. All rights reserved. 1-54 1-55 Finding and evaluating publicly available cryptoasset transaction activity 1-55 Functions of blockchain monitoring software 1-56 Using paid blockchain analytic software 1-56 You can visually trace transactional information by... 1-57 Open source intelligence and paid blockchain explorers Methods of attributing data to activity Version 1.02 © ACAMS. All rights reserved. 1-57 1-58 Data, a hash, the previous hash, and metadata 1-58 What does a block contain? 1-59 A process of using blockchain data to group multiple addresses into a wallet 1-59 Clustering 1-60 Tracking ownership of all portions of cryptocurrency Benefits of unspent transaction output (UTXO) tracing Version 1.02 © ACAMS. All rights reserved. 1-60 2-1 Money laundering, terrorist financing, sanctions, fraud, bribery, tax evasion, etc. 2-1 Examples of financial crime 2-2 Placement, layering, integration 2-2 Three stages of money laundering 2-3 A money laundering technique to evade triggering a reporting or recordkeeping requirement What is structuring? Version 1.02 © ACAMS. All rights reserved. 2-3 2-4 The use of funds for an illegal political purpose to support terrorist activities 2-4 What is terrorist financing? 2-5 Penalties imposed by one entity on another to provoke a change in behavior or policy 2-5 Sanctions definition 2-6 Payment-related, trade-related, ownership-related Methods of sanctions evasion Version 1.02 © ACAMS. All rights reserved. 2-6 2-7 Payments are often processed through third-party banks that do not know beneficiaries' identities. 2-7 Correspondent banking risk for sanctions 2-8 An intentional act of criminal deception to obtain an unjust or illegal advantage 2-8 Fraud definition 2-9 Unrealistic claims for returns; companies not registered with a regulator Indicators of smart contract exploitation Version 1.02 © ACAMS. All rights reserved. 2-9 2-10 Giving or receiving an advantage connected to improper performance of a position of trust 2-10 Bribery definition 2-11 Legitimately reducing the amount of tax owed to a government by legal or natural persons 2-11 What is tax avoidance? 2-12 The use of illegal practices to avoid paying a tax liability What is tax evasion? Version 1.02 © ACAMS. All rights reserved. 2-12 2-13 By keeping their cryptoassets in a third-party account and failing to report 2-13 How might criminals evade taxes on cryptoassets? 2-14 Criminal activity committed using a computer or the internet, often to access data 2-14 What is cybercrime? 2-15 A form of malware that encrypts the users’ files and data and the victim must pay a ransom What is ransomware? Version 1.02 © ACAMS. All rights reserved. 2-15 2-16 Regulatory, legal, financial, and reputational risk 2-16 Key risks in financial crime prevention controls 2-17 Customer, jurisdiction, product, and channel 2-17 Money laundering prevention categories of risk 2-18 Person or persons (natural or legal) with ultimate control over the funds in an account Beneficial owner definition Version 1.02 © ACAMS. All rights reserved. 2-18 2-19 Natural persons who benefit from the activities of a legal person or a group of legal persons 2-19 Ultimate beneficial owner definition 2-20 Foreign PEPs and domestic PEPs 2-20 Two types of politically exposed persons (PEPs) 2-21 Can be used to claim the proceeds of crime as legitimate revenue Risk of shell companies Version 1.02 © ACAMS. All rights reserved. 2-21 2-22 To combine illegally obtained funds with cash legally generated by the business 2-22 How might criminals use cash-based businesses? 2-23 Laundering illicit funds; breaching sanctions requirements; funding terrorism 2-23 Charity and non-governmental organizations risk 2-24 Disguising criminal proceeds by moving value through the use of trade transactions Trade-based money laundering is the process of... Version 1.02 © ACAMS. All rights reserved. 2-24 2-25 The inherent risk posed by the method in which an institution’s products are delivered 2-25 Channel risk definition 2-26 To change the amount of funds sent or to keep the amount under reporting thresholds 2-26 How might criminals use electronic transfer? 2-27 A bank service allowing users to scan a check and transmit the digital image for deposit Remote deposit capture (RDC) Version 1.02 © ACAMS. All rights reserved. 2-27 2-28 Website that sells illegal goods and services and is accessed by specialized software 2-28 What is a dark market? 2-29 Obscure transaction history and disguise movements of illegally obtained cryptocurrency. 2-29 Illicit cryptocurrency holders can use mixers to... 2-30 Different global compliance requirements; the historical use of gaming to launder money Why does gaming with cryptoassets carry risks? Version 1.02 © ACAMS. All rights reserved. 2-30 2-31 Using business resources by classifying customers based on the level of perceived risk 2-31 Risk-based approach to business 2-32 Preventive, detective, and corrective 2-32 Three categories of control strategies 2-33 Inherent risk – controlled risk = residual risk Residual risk equation Version 1.02 © ACAMS. All rights reserved. 2-33 2-34 Front line or customer-facing employees 2-34 What is the first line of defense? 2-35 When files are reviewed by a second person to ensure proper checks are performed 2-35 What is a four eyes check? 2-36 Identify and mitigate risks to an organization and clearly document functions. Role of the second line of defense Version 1.02 © ACAMS. All rights reserved. 2-36 2-37 Oversee an organization’s antimoney laundering program and file a SAR. 2-37 Responsibility of the MLRO 2-38 Develops and maintains an audit risk assessment to determine audit priorities. 2-38 What does an effective internal audit department do? 2-39 Know your customer (KYC), transaction monitoring, and investigations Phases of customer research Version 1.02 © ACAMS. All rights reserved. 2-39 2-40 Low, medium, and high 2-40 Three risk classification levels for customers 2-41 Type of risk an organization is willing to accept when it does business 2-41 What is an organization's risk appetite? 2-42 Identify transactions to assess the possibility of financial crimes. Transaction monitoring process Version 1.02 © ACAMS. All rights reserved. 2-42 2-43 The UN Security Council, the EU, and individual nations or states 2-43 Who imposes sanctions? 2-44 Checking information obtained about a person, entity, goods, or services against sanctions lists 2-44 What is sanctions screening? 2-45 Determining if there is any risk related to the customer, including sanctions. What is name screening? Version 1.02 © ACAMS. All rights reserved. 2-45 2-46 The ability to be suspicious, keep an open mind, and stay up to date with training and research 2-46 What are the traits of an investigative mindset? 2-47 Assess, explore, organize, present 2-47 Four research steps 2-48 Collect information to understand the nature and purpose of the customer’s account CDD for a natural person Version 1.02 © ACAMS. All rights reserved. 2-48 2-49 Identify the natural person who ultimately owns and controls a legal person 2-49 CDD for a legal person 2-50 2-50 When a person discloses information that is likely to prejudice a money laundering investigation What is tipping off? 2-51 Legal obligation to store data securely Data security and privacy Version 1.02 © ACAMS. All rights reserved. 2-51 2-52 To demonstrate compliance efforts to auditors and the supervisory authorities 2-52 Why is it important to document your research? 2-53 Summary, basic information, the nature of business, red flags, issues of concern 2-53 A common customer profile structure includes... 2-54 Failure to report can result in fines and imprisonment Duty to report Version 1.02 © ACAMS. All rights reserved. 2-54 2-55 Internal review group, internal escalation report, file a SAR or UAR with law enforcement 2-55 Suspicious activity escalation process 2-56 Alert law enforcement to potential instances of money laundering or terrorist financing. 2-56 Suspicious activity reports 2-57 Money laundering reporting officer or other financial crime compliance leadership Who writes a SAR? Version 1.02 © ACAMS. All rights reserved. 2-57 2-58 Scanning and analysis of historic transactional data for potential money laundering or sanctions 2-58 Transaction monitoring 2-59 Regular review and enhanced monitoring, legal restrictions, and changes in the relationship 2-59 What happens after a SAR filing? 2-60 Follow your organization's policies and procedures. What should you do if you reject a customer because of suspicious activity? Version 1.02 © ACAMS. All rights reserved. 2-60 3-1 Regulatory, legal, financial, and reputational risk 3-1 Key risks in financial crime prevention controls 3-2 Types of information, how it should be shared, protocols for sharing 3-2 FATF standards on information sharing include: 3-3 Risk-based AML standards for member states What do the FATF 40 provide? Version 1.02 © ACAMS. All rights reserved. 3-3 3-4 Requires VASPs to share originator, beneficiary information for virtual asset-related transactions 3-4 Travel Rule definition 3-5 Analysis and recommendations for preventing criminal abuse of financial system 3-5 FATF mutual evaluations provide: 3-6 Agreements between countries to obtain information and evidence; not shared between law enforcement Mutual legal assistance Version 1.02 © ACAMS. All rights reserved. 3-6 3-7 Ability of a state to enforce sanctions beyond its territory 3-7 Extraterritoriality definition 3-8 Obliged entity required to follow EU AML regulations and register with local authorities 3-8 EU 5AMLD VASP definition 3-9 Exchange providers; custodian wallet providers Two types of UK cryptoasset companies Version 1.02 © ACAMS. All rights reserved. 3-9 3-10 Rapid, illicit fund transfers; AML laws enforced against both 3-10 Cryptoassets, fiat money laundering similarities 3-11 Bank Secrecy Act (BSA) 3-11 Most important US AML regulation 3-12 Strengthen AML laws beyond the Bank Secrecy Act, Money Laundering Control Act USA PATRIOT Act purpose Version 1.02 © ACAMS. All rights reserved. 3-12 3-13 Anti-Money Laundering Act (AMLA) of 2020 3-13 US Act that updated AML cryptoasset regulations 3-14 Develop, implement, maintain an effective AML program 3-14 Bank Secrecy Act requires entities to: 3-15 3-15 Assists member states to develop robust AML programs, legal frameworks, institutional infrastructure, technical skills Purpose of UN's GPML initiative Version 1.02 © ACAMS. All rights reserved. 3-16 Level of acceptable financial crime risk within business and goal parameters 3-16 Risk appetite 3-17 Level of AML risk in place before applying mitigation controls 3-17 Inherent risk 3-18 Customer, jurisdiction, product, channel Categories that determine customer risk Version 1.02 © ACAMS. All rights reserved. 3-18 3-19 Quickly upload data, verify accuracy, look for gaps, calculate final scoring 3-19 Benefits of third-party risk-rating tools 3-20 3-20 Source of funds, VASP AML controls, negative news, funds destination, interaction with high-risk services What should a crypto risk assessment consider? 3-21 Hidden ownership; fast, irreversible transactions; pseudonymous; transfer ownership Cryptoasset inherent risks Version 1.02 © ACAMS. All rights reserved. 3-21 3-22 PEP status, high-risk entities, jurisdictions, negative customer information, AML red flags 3-22 What factors can make customers high-risk? 3-23 Built-in technical measures obscure the link between sending and receiving addresses 3-23 Why are privacy-centered cryptoassets different? 3-24 Supply-based risks, regulations, technology, market abuse, reputation, negative news VASP risk factors Version 1.02 © ACAMS. All rights reserved. 3-24 3-25 Internal policies, designated compliance officer, employee training, audit, CDD 3-25 Pillars of an AML compliance program 3-26 High-level steps to ensure compliance with AML, sanctions and other relevant regulations 3-26 Compliance procedures definition 3-27 Test adequacy of AML, sanctions, and consumer controls to determine appropriateness Role of independent audits Version 1.02 © ACAMS. All rights reserved. 3-27 3-28 Robust due diligence and monitoring programs at onboarding, throughout the relationship 3-28 How do you mitigate employee or vendor risk? 3-29 Risk-management practices, internal controls, CDD, reporting, recordkeeping, compliance monitoring 3-29 What should AML policies and procedures cover? 3-30 Present report; ensure it is clear, understandable; respond to questions, challenges Responsibilities of risk assessment teams Version 1.02 © ACAMS. All rights reserved. 3-30 3-31 Customer risk of money laundering or terrorist financing 3-31 The extent of due diligence depends on: 3-32 Reduce costs, enhance efficiency, generate possible solutions 3-32 Benefits of machine learning 3-33 Improve risk management, efficiency, client experience, work quality How do new technologies help banks? Version 1.02 © ACAMS. All rights reserved. 3-33 3-34 Links to PEPs, litigation, regulatory, reputation, SOW 3-34 Examples of EDD for a natural person 3-35 Process of adding real-world entities to nondescript addresses used on the blockchain 3-35 Attribution definition 3-36 Information source, format, date, number of correlated sources Factors that impact cryptoasset sources Version 1.02 © ACAMS. All rights reserved. 3-36 3-37 In real-time, prior to onboarding 3-37 When is name screening performed? 3-38 Centralized or decentralized, AML controls, products, exposure to risk, jurisdiction 3-38 Factors to know when assessing a VASP 3-39 Prior customer transactions, blockchain activity Information found on the blockchain Version 1.02 © ACAMS. All rights reserved. 3-39 3-40 Recent pay stub, bank statement, tax return 3-40 Ways to determine source of funds (SOF) 3-41 Complete wallet view, wallet transaction history, other known entities, past transactions 3-41 Purchased blockchain monitoring services include: 3-42 Designed to hide transaction information such as addresses, amounts, history Anonymity-enhanced cryptocurrency (AEC) definition Version 1.02 © ACAMS. All rights reserved. 3-42 3-43 After the customer has been accepted and completed transactions 3-43 When is transaction monitoring performed? 3-44 Centralized, senior leaders make decisions; Decentralized, all levels have decision authority 3-44 Differences between centralized and decentralized VASPs: 3-45 Total current wealth of customer Source of wealth (SOW) definition Version 1.02 © ACAMS. All rights reserved. 3-45 3-46 Court proceedings, media from reliable outlets, definite facts (screenshots), court cases 3-46 Valid research findings include: 3-47 Who, what, where, when, why, how of the case 3-47 A SAR narrative answers: 3-48 KYC, transaction monitoring, investigations Phases of customer research Version 1.02 © ACAMS. All rights reserved. 3-48 3-49 Send to review group, internal escalation report, file SAR with law enforcement 3-49 Escalation steps for potential suspicious activity: 3-50 Investigator’s thought process; back up suspicion with facts; question everything 3-50 Investigative mindset definition 3-51 Identify roles, responsibilities; protect organization; mitigate risks Investigations: Purpose of policies, procedures Version 1.02 © ACAMS. All rights reserved. 3-51 3-52 Assess, Explore, Organize, Present 3-52 Four research steps 3-53 Online interface to view cryptoasset transactions 3-53 What is a blockchain explorer? 3-54 Trail of data created while using the internet; websites, emails, online information Digital footprint definition Version 1.02 © ACAMS. All rights reserved. 3-54 3-55 Conclusions are justifiable by others based on content, documentation, steps followed 3-55 How much research is “reasonable”? 3-56 Clear, concise, fully documented; maintain records; follow organization's policy 3-56 Communication best practices 3-57 Acknowledge request, be concise, timely, factual, clarify any points not understood Responding to law enforcement requests: Version 1.02 © ACAMS. All rights reserved. 3-57 3-58 Narrative that describes details of who, what, when, where 3-58 Most important part of the SAR 3-59 Assist in collecting information, intelligence on potential illegal activity 3-59 Purpose of a SAR 3-60 Customer engages in suspicious activities; change in firm’s risk appetite Reasons for rejecting an existing customer Version 1.02 © ACAMS. All rights reserved. 3-60