On The Job Project
On The Job Project
On The Job Project
On
AML / KYC & Transaction
Monitoring Process
Prepared by: Mayank Narang
(MBA Executive)
12 December, 2022
Faridabad
Submitted By :- Submitted To :-
Mayank Narang Dr. Manisha Goel
(MBA Executive Programme)
Roll No: 21001704010
Acknowledgement
Backlog accumulation
Regulator scheduling and support
High employee turnover ratio
When talent sourcing is difficult or not cost effective
Performing a thorough lookback
Placement- At this stage, the money launderers inject the crime money into the
financial system. That is often done by depositing funds into a bank account
registered to an anonymous corporation or a professional middleman.
Electronic money- There are many ways where criminals can acquire money,
whether by infusing malware, phishing, account hackers, or other vectors. Stored
value cards are often used to launder such illegal money by purchasing items from
that money.
Money Mules- Cash smugglers who help carry the illegal cash across different
countries and deposit that cash in countries with less stringent tax laws are equally
liable as the money launderer is.
Crypto currencies- The newly inserted online transacting currency in the form
of crypto such as Bit coin and several others has increased the chances of money
laundering. Increasing amounts of OTC trade might result in the heavy transfer of
funds between countries. The lack of strict KYC norms in some crypto currencies
has also acted as an invitation to money laundering.
Casinos- Money launderers buy chips from the casinos with their cash and later
get those chips exchanged with checks provided by the casinos, sometimes without
betting or gambling.
The Bank Secrecy Act passed by the United States in 1970 asks financial
institutions to report suspicious transactions or cash transactions exceeding
$10,000 to the Department of the Treasury.
The USA Patriot Act assists in tracking money laundering by investigating and
preventing organized crimes and drug trafficking, which can also be helpful in
terrorist tracking.
Financial organizations need to build AML compliance systems that assist trained
employees to flag suspicious transactions as efficiently as possible. Internal
controls and procedures should have the means to recognize clues that a
transaction is potentially illegal, and ensure that employees know it. There are a
number of factors these controls would monitor, mostly concerning a customer’s
behavior.
Some of these “red flags” are easier to spot by employees during the due diligence
research on a customer. Others, such as cash transactions patterns, might be built
into digital controls that can be set to alert employees. In either case, employees
and managers have to be trained to recognize potential risks, and put them under a
magnifying lens for a closer look. Submitting a SAR is not a legal action against a
customer—it is just prudent activity that helps the financial business stay in
compliance.
Anti-Money Laundering
Anti money laundering (AML) refers to the web of laws, regulations, and
procedures aimed at uncovering efforts to disguise illicit funds as legitimate
income. Money laundering seeks to conceal crimes ranging from small-time tax
evasion and drug trafficking to public corruption and the financing of groups
designated as terrorist organizations.
AML legislation was a response to the growth of the financial industry, the lifting
of international capital controls and the growing ease of conducting complex
chains of financial transactions.
A high-level United Nations panel has estimated annual money laundering flows
at $1.6 trillion, accounting for 2.7% of global GDP in 2020.
Anti-Money Laundering History
Financial Action Task Force (FATF) was formed in Paris in July 1989 when a
group of countries came together to fight against money laundering. FATF has
been imposing regulations since then. FATF expanded its mission and started
imposing regulations to fight against terrorist financing after the 9/11 attacks.
The European Union also released the first anti-money laundering Directive in
1990 to prevent the financial system's misuse of money laundering. The European
Union AML Directives are constantly being revised to reduce the risks associated
with money laundering and terrorist financing.
The UK AML laws are imposed by the Proceeds of Crime ACT 2002 (POCA).
Several organizations were established in the U.K. to prevent financial crime, like
NCA, SFO, FCA, HMT. Even though the U.K. has left the European Union, The
UK's laws and regulations comply with FATF recommendations and European
Union Anti-Money Laundering directives.
As its name suggests, Know Your Customer (KYC) implies the process of
validating a customer’s identification. It’s a subset of the larger term AML.
It is used by businesses to gather information about their clients and verify their
credentials. Clients wanting to use a company’s service must present their
identification documents. Likewise, it helps the organization to adequately evaluate
the risk involved with every client.
Customer due diligence is integral to the KYC process, for example by ensuring
the information a potential customer provides is accurate and legitimate. But it is
also a constant process extending to customers old and new, and their transactions.
According to the U.S. Treasury's Financial Crimes Enforcement Network, the four
core requirements of customer due diligence in the U.S. are:
One rule in place to foil layering is the AML holding period, which requires
deposits to remain in an account for a minimum of five trading days before they
can be transferred elsewhere.
Transaction Monitoring
Transaction Screening
Client Screening
Client Activity Review
Risk-based Scorecard Review
*Suspicious transaction reports (STRs) is the term used in North America and by
FATF. In the UK these reports are known as suspicious activity reports (SARs)
while in Australia they are suspicious matter reports (SMRs).\
SAR (Suspicious Activity Report)
Although the report varies from country to country, monitoring any activity that
could threaten public security is often necessary. However, there is a suspicion that
the account holder is trying to hide something or take illegal action. The
Suspicious Activity Report is usually sent to the country's financial crime
enforcement agency to collect and analyze transactions and then report them to the
relevant law enforcement agencies. SAR file must be submitted no later than 30
calendar days from the date of the first identification of facts that may serve as the
basis for filing.
Transaction Screening
Anti-Money Laundering (AML) rules may vary across jurisdictions but generally
require organizations to take prudent steps in detecting and reporting any
suspicious activity such as securities fraud and terrorist financing (some examples
include the U.S. Patriot Act and Bank Secrecy Act (BSA). A critical component of
an anti-money laundering program involves transaction screening.
While transaction monitoring refers to the process of observing customer
transactions in real-time or retroactively to spot trends and red flags, transaction
screening involves verifying customer identities and ongoing screening of their
transactions. The goal of transaction screening, like many parts of the Know Your
Customer (KYC) process, aims to stop financial crime in its tracks. The goal here
is to screen transactions to ensure that they are not being processed on behalf of a
restricted party, either sender or beneficiary, as well as other elements of a
transaction before it materializes into something worse.
What seems like a straightforward task is quite time-consuming. Firms create
internal systems or work with third-party vendors to screen large volumes of
transactions against encoded rules that may include available sanction lists or other
official lists. These screening environments, which form the foundation of
transaction screening, are frequently tuned to meet the latest challenges.
One of the most effective ways to do that is to screen, monitor and analyze as
much information as possible. Making informed decisions from a large volume of
data can help keep both criminals and regulators at bay.
False positives: Models or systems may flag a client for suspicious activity,
when, in fact, they pose no such threat.
Ongoing maintenance: Firms must revisit their systems, models, and data
feeds to address the increasingly sophisticated methods criminals use to avoid
detection and regulations.
False Positives
Preset rules are helpful, and they can help, especially if you do not have the
expertise needed to implement a system, but they can never be wholly accurate.
In the case of transaction monitoring systems, these presets will result in the
system generating a high volume of positives, not all of which will be true
positives, which increases the workload for compliance officers.
No Uniform Approach
An issue that affects areas of compliance and regulation across the board is a
difference in viewpoints across different jurisdictions from different regulators.
In the case of transaction monitoring, many regulators have differing ideas on
what is acceptable. An example of this is system alerts. If an alert was to arise
from a calibration issue, then some regulators would see it as acceptable not to
review that alert, while others say an alert should be reviewed regardless of how
it arises.
The differences in approaches and rules create confusion and further muddy the
waters in an already complex regulatory landscape.
It is extremely important to know what your regulatory obligations are, but that
is no easy task when it differs depending on who you are dealing with, and it’s
not getting any easier.
Certification Of Anti Money Laundering