Transaction Monitoring in AML/CFT
The Transaction
Monitoring process identifies suspicious activity, patterns, or trends that may
indicate money laundering or terrorist financing activities. It is a
process of monitoring, tracking, and analyzing financial transactions. It
involves monitoring customer transactions and assessing their historical and
current information and interactions to provide a complete picture of their
activity.
Transaction monitoring means regularly
keeping a close watch on the transactions. It involves checking a
customer’s historical transactions, customer’s profile, account details, and
interactions. These checks enable the identification of possible customer risks
and the prediction of their future behaviour.
This process uses advanced technology and algorithms to identify transaction patterns, anomalies, and suspicious behavior. It is a crucial tool for financial institutions to help prevent criminal activities and maintain the financial system’s integrity. AML monitoring, therefore, becomes an essential component of this process
Financial criminals conduct fraudulent activities by harnessing loopholes in regulations. They create an air of legitimacy around their scheme, company, and transactions. The Securities and Exchange Commission (SEC) charged Allianz Global Investors U.S. LLC (AGI US) and three former senior portfolio managers with a massive fraudulent scheme that concealed the immense downside risks of a complex options trading strategy they called “Structured Alpha” on May 17, 2022. AGI US marketed and sold the strategy to approximately 114 institutional investors, including pension funds for teachers, clergy, bus drivers, engineers, and other individuals. After the COVID-19 market crash of March 2020 exposed the fraudulent scheme, the strategy lost billions of dollars as a result of AGI US and the portfolio managers’ misconduct. AGI US has agreed to pay billions of dollars as part of an integrated, global resolution, including more than $1 billion to settle SEC charges and together with its parent, Allianz SE, over $5 billion in restitution to victims.
Transaction
Monitoring can help detect patterns of suspicious behaviour and financial
crimes to and from customers. That is why it is a significant step in
companies’ and governments’ AML /CFT programs. With transaction monitoring, you
can detect crimes before their occurrence or in their early stages. Timely
detection saves you from the repercussions.
The objectives of AML Transaction Monitoring
- Firstly, it aims to ensure compliance with regulatory obligations imposed by authorities to combat money laundering and terrorist financing. By monitoring transactions, financial institutions can demonstrate their commitment to due diligence and contribute to global efforts against financial crimes.
- Secondly, AML transaction monitoring aims to protect the financial system's integrity by detecting and preventing illicit activities. Institutions can take appropriate measures by identifying suspicious transactions, such as reporting to regulatory authorities or initiating internal investigations, to mitigate risks and safeguard their customers and the broader financial ecosystem.
A key pillar of any AML compliance program is to monitor transactions for suspicious activity.
The scope of AML Transaction Monitoring
The scope of AML transaction monitoring extends to
various types of financial transactions, including electronic fund transfers,
cash deposits and withdrawals, wire transfers, and credit card transactions, and
payments. It encompasses monitoring activities
across multiple channels, such as online banking, mobile banking, and
point-of-sale transactions.
Typically,
monitoring starts with a rules-based system that scans customer transactions
for red flags consistent with money laundering. When a transaction matches a
predetermined rule, an alert is generated and the case is referred to the
bank’s internal investigation team for manual review. If the investigators
conclude the behavior is indicative of money laundering, then the bank will
file a Suspicious Transaction
Report(STR) with FIU-Ind on FINnet.portal.
A sting operation that was conducted
by reporters of an online media portal named "Cobrapost.com"
(hereafter 'Cobrapost'). Sometime in the year 2012- 13 (dates on which
the sting operation was conducted are not on record),
the reporters of the media portal, Cobrapost, conducted a sting operation
called "Operation Red Spider" (hereafter "the sting operation").
The sting operation, inter alia, entailed undercover
reporters approaching employees of various banks representing themselves to be
customers who required to open accounts to deposit black money belonging to
"a Minister" and for laundering the same. The sting operation
was designed to expose the role of banks in money laundering.
The tribunal held that the transcripts and videos were edited versions and could not be considered proof of actual conversations. Cobrapost had recorded some bank executives supposedly offering to convert unaccounted money.
It alleged in March 2013 that banks were
systematically and deliberately violating provisions of various laws, including
the Income Tax Act, Prevention of Money Laundering Act and know-your-customer
norms, driven by their desire to boost deposits and and increase profit.
The FIU found banks guilty for not reporting
suspicious transactions and levied fines on 15 banks, including Rs 26 lakh on
HDFC Bank, Rs 14 lakh on ICICI Bank, Rs 5 lakh on State Bank of India and Rs 13
lakh on Axis Bank. The Financial Intelligence Unit also issued an order
finding Axis Bank guilty of violating Section 12 of the Act, as well as Rules
2,3,5, and 7, and imposing a fine of Rs 13 lakhs for 13 instances of failure.
Axis Bank, enraged by the aforementioned, filed an appeal with the Appellate
Tribunal.
The banks
challenged the penalties in the appellate tribunal.
The tribunal pulled up the banks for not
reporting these attempted suspicious transactions and held that in future, they
and their employees should be careful and report such discussions.
The challenged judgement dismissed the aforementioned appeal, holding that non-compliances did not justify the application of the maximum penalty and that this was a case where a penalty of warning, as allowed under Section 13(2)(a) of the Act, should have been given
Benefits to Financial Institutions and Their
Customers
Beyond regulatory compliance, transaction monitoring offers several
benefits to financial institutions and their customers. By effectively
monitoring transactions, institutions can:
- Protect Customers: Safeguard customer accounts from unauthorized transactions and fraudulent activities, thereby enhancing customer trust and loyalty.
- Reduce Financial Losses: Prevent significant financial losses by detecting and mitigating fraudulent activities early in the transaction process.
- Improve Operational Efficiency: Streamline compliance processes and reduce the manual workload on compliance teams by automating the detection of suspicious transactions.
- Enhance Reputation: Build a reputation as a trustworthy and secure institution, which can attract more customers and business opportunities.
Ultimately, effective transaction monitoring is not just about
compliance; it is about creating a safer and more secure financial environment
for everyone involved.
Transaction Screening vs.
Transaction Monitoring:
Transaction screening and transaction monitoring are two
critical functions within the realm of anti-money laundering (AML) and fraud
prevention. While they share the common goal of identifying suspicious
activities, the two have distinct differences. Understanding these differences
is crucial for implementing effective risk management strategies.
Transaction
Screening
Transaction screening involves the real-time scanning of individual
transactions against predefined lists or databases, such as sanctions lists,
politically exposed persons (PEP) lists, or internal watchlists. It aims to
quickly flag any transactions involving prohibited entities or individuals.
Transaction screening is a proactive measure that helps prevent transactions
with high-risk entities and ensures compliance with regulatory requirements. It
acts as an initial filter, allowing financial institutions to block or review
transactions that raise red flags.
Transaction
Monitoring
Transaction monitoring, on the other hand, focuses on the continuous
surveillance of customer transactions and activities over a period of time. It
deals with analysing customers’ transactional data in real-time or near
real-time to identify patterns, trends and anomalies that may indicate
potential money laundering, terrorist financing, or other illicit activities.
Transaction monitoring enables the identification of complex and evolving
patterns of suspicious behaviour that may not be captured through transaction
screening alone. It provides a comprehensive view of customer activity and
helps in establishing a risk-based approach to monitoring.
The steps in Transaction Monitoring
Effective
TM is predicated on FIs’ sound understanding of their customers, which provides
the necessary context for FIs to identify unusual/anomalous transactions and
assess whether customers’ activity or behavioural patterns may pose reasonable
suspicion. Before establishing business relations, FIs are required to perform
customer due diligence (“CDD”) checks and assess the level of ML/TF risks posed
by their prospective customers. In this regard, FIs should ensure that (i)
their risk assessment frameworks and methodologies and (ii) the scope and
extent of CDD measures that they apply are aligned with the requirements in
RBI's AML/CFT Guidances, and more importantly enable them to detect and address
risks posed by their customers.
After
establishing a business relationship, FIs are required to maintain current and
accurate knowledge of their customers through the performance of periodic
reviews and/or reviews based on trigger events, and where appropriate enhance
the frequency and intensity of customer engagement where the risks are assessed
to be greater. Further guidance on the conduct of risk assessments and CDD will
be set out in MAS’ upcoming Guidance Paper on the findings and best practices
from its AML/CFT inspections on capital markets intermediaries.
1. Identification of Suspicious Activity/Behavior
1.1 Sources of Unusual Activity Identification
- Employee Identification
- Law Enforcement Requests
- National Security Letters
- Transaction Monitoring
- Surveillance Monitoring
Employee Identification
- Activity identified by employees during day-to-day operations
- Training to staff
- Employees need method to report suspicious activity to appropriate personnel
- Worksheet, e-mail, phone
- Central point of contact
- Documentation
Law Enforcement
Inquiries and Requests
As per information received from the Reserve Bank of
India (RBI), according to the publicly available information on the Bank of
International Settlement’s website, the Basel Committee on Banking Supervision
issued a Statement on ‘prevention of criminal use of the banking system for the
purpose of money-laundering’ in December 1988, which included a principle on
‘Cooperation with law enforcement authorities’. In terms of this Statement, the
banks should cooperate fully with National Law Enforcement Authorities to the
extent permitted by specific Local Regulations relating to customer
confidentiality. Further, where banks become aware of facts which lead to the
presumption that money held on deposit derives from criminal activity or that
transactions entered into are themselves criminal in purpose, appropriate
measures, consistent with law, should be taken.
- RBI has issued Know Your Customer (KYC) Direction, 2016 in which guidelines have been laid down in terms of the provisions of Prevention of Money-Laundering Act, 2002 and the Prevention of Money-Laundering (Maintenance of Records) Rules, 2005, as per which Regulated Entities, including banks are required to follow certain customer identification procedures while undertaking a transaction either by establishing an account-based relationship or otherwise and to monitor their transactions.
- RBI has issued Master Directions on Frauds ― Classification and Reporting which require banks to report frauds beyond a threshold amount to the police, monitoring and follow-up of cases by a special committee, quarterly placement of information before Audit Committees of bank Boards, and annual review of frauds by bank Boards. These cover, inter alia, preventive measures, fraud detection systems, systemic lacunae, remedial action, monitoring of progress of investigation and recovery, and staff accountability.
- Government has issued “Framework for timely detection, reporting, investigation etc. relating to large value bank frauds” to Public Sector Banks (PSBs), which provides, inter-alia, that¾
- PSBs at the time of lodging a complaint with the CBI would also lodge a complaint with the Enforcement Directorate in those accounts where money laundering and Foreign Exchange Management Act violations also appear to be there. Similarly where the fraud also appears to involve violations in the export and/ or import of goods and services, a report will also be lodged with Directorate of Revenue Intelligence; and
- Examination be initiated for willful default immediately upon reporting fraud to RBI.
- RBI has issued a circular to all banks in February 2018 to implement security and operational controls such as straight-through process between the Core Banking Solution / accounting system and the SWIFT messaging system, enable time-based restrictions in SWIFT, review logs at regular intervals, undertake reconciliation, etc. in a time-bound manner.
- RBI has instructed banks to report deficient third- party services (such as legal search reports, property valuers’ reports etc.) and ineffective action against collusion of these providers with fraudsters to the Indian Banks’ Association, which maintains a caution list of such service providers.
Combating Financing of Terrorism
As and when list of individuals and
entities, approved by Security Council Committee established pursuant to
various United Nations' Security Council Resolutions (UNSCRs), are received
from Government of India, Reserve Bank circulates these to all banks and
financial institutions. Banks/Financial Institutions should ensure to update
the lists of individuals and entities as circulated by Reserve Bank. The UN Security
Council has adopted Resolutions 1988 (2011) and 1989 (2011) which have resulted
in splitting of the 1267 Committee's Consolidated List into two separate lists,
namely:
1.
“Al-Qaida
Sanctions List”, which is maintained by the 1267 / 1989 Committee.
This list shall include only the names of those individuals, groups,
undertakings and entities associated with Al-Qaida. The Updated Al-Qaida
Sanctions List is available at http://www.un.org/sc/committees/1267/aq_sanctions_list.shtml
2.
“1988
Sanctions List”, which is maintained by the 1988 Committee. This
list consists of names previously included in Sections A (“Individuals
associated with the Taliban”) and B (“Entities and other groups and
undertakings associated with the Taliban”) of the Consolidated List. The
Updated 1988 Sanctions list is available at http://www.un.org/sc/committees/ 1988/list.shtml
It may be noted that both “Al-Qaida
Sanctions List” and “1988 Sanctions List” are to be taken into account for the
purpose of implementation of Section 51A of the Unlawful Activities
(Prevention) Act, 1967.
Banks are required on receipt of the list of individuals and entities subject to UN sanctions (referred to as designated lists) from the Reserve Bank, they should ensure expeditious and effective implementation of the procedure prescribed under Section 51 A of UAPA in regard to freezing /unfreezing of financial assets of the designated individuals/entities enlisted in the UNSCRs and especially in regard to funds, financial assets or economic resources or related services held in the form of bank accounts.
Banks are expected to disclose information to LEAs under PMLA2002 and no tipping off to the account holder.
Transaction Monitoring: Monitory Instruments
RBI MD dated 25 Feb 2016 updated as on 04 Jan 2024 prescribes that transactions
involving rupees fifty thousand and above shall be undertaken only by:
- Debit to customers’ account or against cheques; and
- Obtaining and verifying the PAN given by the account-based as well as walk-in customers.
The instruction above shall
also apply to sale of REs’ own products, payment of dues of credit cards/sale
and reloading of prepaid/travel cards and any other product for rupees fifty
thousand and above.
So look for transactions that are structured below threshold level, Common Payees, Common Purchasers and also Consecutively numbered monetary instruments to arrive at Suspicious Transactions.
National Security Letters
NETRA (NEtworking
TRaffic Analysis) is a software network developed by India's Centre for Artificial
Intelligence and Robotics (CAIR), a Defence Research and Development Organisation (DRDO) laboratory, and is used by
the Intelligence Bureau, India's domestic intelligence
agency, and the Research and Analysis Wing (R&AW), the country's external
intelligence agency to intercept and analyse internet traffic using pre-defined
filters. The program was tested at smaller scales by various national security
agencies, and is reported to be deployed nationwide as of 2022.
The letters issued by Intelligence
Bureau as well as that issued by Research and Analysis Wing are to be given due importance by banks.
Transaction Monitoring
Also called Manual Transaction Monitoring system targets specific types of transactions. Manual review of various individual reports generated by institution’s host or other systems to identify unusual activity
For Example:
- Cash, Wire, or Monetary Instrument Sales Reports
- Significant Balance Change Reports
- Nonsufficient Funds (NSF) reports
- Structured Transaction Reports
Review of daily or monthly reports etc.. are decided on risk based approach and cover institution’s higher-risk products, services, customers, entities, and geographic locations; it may also use a discretionary dollar threshold. The thresholds selected should enable you to detect unusual activity
After review, if
unusual activity is identified, evaluate all relevant information to determine
whether the activity is really suspicious
Transaction Monitoring - Cash Reviews
In case of transactions carried out by a non-account based customer, that is a walk-in customer, where the amount of transaction is equal to or exceeds rupees fifty thousand, whether conducted as a single transaction or several transactions that appear to be connected, the customer's identity and address should be verified. if a bank has reason to believe that a customer is intentionally structuring a transaction into a series of transactions below the threshold of Rs.50,000/- the bank should verify identity and address of the customer and also consider filing a suspicious transaction report (STR) to FIU-IND.
Transaction Monitoring - Funds Reviews
International Transaction
In terms of Clause (b) (ii)
of sub-Rule (1) of Rule 9 of the PML Rules, 2005 banks and financial
institutions are required to verify the identity of the customers for all
international money transfer operations
All types of Transactions
All cash transactions of the value of more than Rupees Ten Lakh or its
equivalent
in foreign currency;
All series of cash transactions integrally
connected to each other which have been valued below Rupees Ten Lakh or its
equivalent in foreign currency where such series of transactions have taken
place within a month and the aggregate value of such transactions exceeds
Rupees Ten Lakh;
CDD for even occasional transactions are required from 2023 onwards.Thus, the scope of CDD measures expands from just account-based relationships to occasional transactions to effectively detect the financial crime activities attempted through occasional transactions or international money transfers.
Identification of Suspicious Transactions
- Review for patterns of unusual activity
- Periodic review for institutions with low activity is usually sufficient to identify anything unusual
- For more significant activity, spreadsheets or software is needed to identify unusual patterns
- Reports may focus on identifying higher-risk geographic locations and larger dollar funds transfer transactions
- Establish filtering criteria for both individuals and businesses.
- Review noncustomer transactions and payable upon proper identification (PUPID) transactions.
- Activities identified should be subjected to additional research to ensure that activity is consistent with stated account purpose and expected activity.
- When inconsistencies are identified, the institution may need to conduct a global relationship review to determine if a STR is warranted.
The notification
modifies Rule 8(2) of the PMLR, removing the timeline of seven (7) days earlier
prescribed for filing STR with the Financial Intelligence Unit.
Now, the reporting
entities are required to promptly submit the STR
once the activity or transaction is identified as suspicious.
The revised PMLR provides that the reporting entity and
its employees must maintain the AML records and the AML reports filed with FIU
with the utmost confidentiality. However, relaxation is granted around this
when such information is necessary to be shared with the group entities for
analysis or evaluation of unusual or suspicious activities.
Surveillance Monitoring: Also called Automated Account Monitoring System
- Combines multiple types of transactions
- Use various rules
- Identify individual transactions, patterns of activity, or deviations from expected activity
- Can capture a wide range of account activity, such as cash activity, funds transfers, ACH, and ATM transactions and monetary instruments
- May include rule-based and intelligent systems to detect unusual or higher-risk transactions
- More sophisticated than transaction monitoring, which only filters on one rule (e.g., transaction greater than $10,000[USA, Australia], Rs 50,000[India])
- May apply multiple rules, overlapping rules, and filters or “alerts” that are more complex
- May include adaptive-filter transactions, based on historical account activity (for example, spikes from average activity)
- Capabilities and thresholds refer to the parameters or alert filters used in the monitoring process
- Parameters and filters:
- Reasonable and tailored to activity that institution is trying to identify or control;
- Should be reviewed before implementation to identify any gaps (common money laundering techniques or frauds) that may not have been addressed
Example: Institution may have set their filters for cash structuring to only be triggered by a daily cash transaction aggregation in excess of $10,000. (CTR threshold) – USA; In India it is Rs 10,00,0000/
- May need to refine filter to avoid missing potentially suspicious activity because common cash structuring techniques often involve – transactions slightly under the CTR threshold or – are conducted over several days
- Review and test system capabilities and thresholds on a periodic basis
- Focus on specific parameters or filters to ensure that suspicious or unusual activity will be captured
- Are the parameters or filters appropriate for institution’s particular risk profile
- Understanding the filters in your system and how your system works is critical to assessing the effectiveness of your monitoring program
- When developing filters, consider institution’s higher-risk products & services, customers & entities, & geographies
- Filters should be based on what is reasonable & expected for each type of account
- Monitoring based solely on historical activity can be misleading if the activity is not consistent with similar types of accounts & customers
- Account may have historical activity that is substantially different from what would normally be expected from that type of account
EXAMPLE: check-cashing business that deposits large sums of cash instead of withdrawing cash for cashing checks
- Authority to establish or change filters should be clearly defined & should require the approval of PMLA officer or senior management
- Document and be able to explain filtering criteria, thresholds used, & how both are appropriate for your risks
- Management should periodically review filtering criteria & thresholds established
- Are they still effective & appropriate for the risk
- Methodology & effectiveness should be independently reviewed & evaluated – To ensure that you are detecting potentially suspicious activity – Are there any gaps
Changes in CDD for Indian banks wef 17 Oct 2023
- Verifying the identity of the customer and the beneficial owners using reliable and independent sources
- Making necessary efforts to understand the nature of the customer’s business
- Understanding the customer’s legal structure – ownership and control
Others:
- The window of two days, as available earlier, to obtain the CDD details from a third party or from the Central KYC registry (when reliance is placed on such a third party to carry out the CDD process) has not been removed, making mandatory for the reporting entity to get these details on immediate basis.
- When the customer is a Trust, it is now required to obtain the identification details of the trust’s protector.
- Inserted a phrase to mandate the reporting entities to maintain the customer’s profile up-to-date and relevant, specifically when the customer is identified as “high-risk”.
The entity’s Customer Due Diligence
program must be aligned with its exposure to ML/FT and the nature and size of
the business.
2. Red Flags/Alerts Generation
The word red flag represents a metaphor. This is usually used as a warning or cause of concern that a particular situation is having a problem. There may be red flags in business which alert investors and analysts about a company or stock's financial future and/or health. Economic red flags also indicate economic issues looming.
In Anti-Money Laundering (AML) compliance, a red flag describes a warning sign that indicates the possibility of money laundering or other criminal activity. Red flags can include transactions involving companies in sanctioned jurisdictions, large volumes, or funds being transmitted from unknown or opaque sources.
This concept is used to detect and report suspicious activities by identifying any transaction, activity, or customer behavior and associating it with a certain level of risk. This identification makes it easier for financial institutions to detect and report suspicious activity. Leveraging advanced sanction screening software and staying updated on list-based sanctions can further enhance their capabilities in this regard.
The red flag concept serves as a tool for financial institutions to fight financial crimes by tracking customers' transactions and detecting and reporting suspicious activities. However, financial institutions must have an adequate understanding of money laundering and terrorist financing and operate an effective AML/CFT program to make the most of the red flag concept. Leveraging advanced sanction screening software, staying updated on list-based sanctions, and conducting regular sanction checks can further enhance their capabilities in this regard.
All the activities and transactions that fall outside the expected customer activity or certain predefined threshold should generate a “red flag” or alert, for review and investigation by the MLRO or AML team, in coordination with other relevant staff. MLRO must ensure that the red flag mechanism incorporates the possible risk factors considering the customers’ risk profiles.
Red alert thresholds are set for transaction monitoring purposes and are marked in the automated transaction monitoring system. Alerts are generated on the breach of the thresholds or occurrence of unusual transactions or activity. The AML analyst investigates such transactions and activity generating an alert.
Transaction monitoring is an essential process used by financial institutions to detect and prevent money laundering, terrorist financing, fraud, and other financial crimes. Red flags are specific indicators or patterns in financial transactions that suggest potential illegal activity. Effective transaction monitoring systems use a combination of automated tools and human analysis to identify and investigate suspicious transactions.
AML red flags are warning signs, such as unusually large transactions, which indicate signs of money laundering activity. If a company detects one or more red flags in a customer's activity, it should pay closer attention. Identifying red flags is a key component of any AML strategy and regulated businesses need to have a clear process for doing so and then adequately investigating identified issues further. In some cases and jurisdictions, regulated businesses will also need to submit Suspicious Transaction Reports (STRs) to relevant authorities following the identification of a red flag among their clients.
Red Flags to be Considered in Transaction Monitoring
Responses are sought from the customer on the alert generation and the satisfactory provision of information from the respective customer. Then, the AML Analyst or reviewer marks the alert as closed.
The number of alerts generated within each bank varies based on several factors, including the number of transactions running through the monitoring system, as well as the rules and thresholds the bank employs within the system to generate the alerts. Banks typically score alerts based on elements contained in the alert, which determines the alert’s priority.
Banks typically review and re-optimize their alert programs every 12-18 months. Banks noted that many alerts are ultimately determined to be “noise” generated by the software. One bank noted that it is working continuously to reduce the “noise” generated by the software and to develop typologies to enrich the data and reveal the most critical information.
The IBA Working Group report 2010 has listed examples of red flags in its Annexures. The Financial Action Task Force (FATF) has outlined 42 specific red flags for companies to monitor in relation to suspicious financial activities. These red flags are grouped into four key categories that help businesses identify potential money laundering and compliance risks: Client, Source of Funds, Choice of Lawyer and Retainer.
FATF has also compiled a list of red flags related to the Virtual Asset industry, which it has separated into six broad categories:
Red flags related to
transactions: for example, large transaction volumes or multiple
transactions of small volumes
Red flags related to transaction
patterns: irregular, unusual or uncommon transaction patterns
Red flags in the source of funds
or wealth: when the source of funds is opaque or obscured by multiple
ownership layers and the lack of a tax record — or associated with known
criminal networks
Red flags related to anonymity:
when transactions are originating or being sent to unknown or non-identifiable
individuals or entities
Red flag indicators about
senders or recipients: when there are irregularities detected in the Known
Your Customer (KYC) process, such as multiple accounts being created for the
same person
Red flag indicators related to
geographical risks: if a transaction party is located in geographic areas
that have a high rate of money laundering activity, or are in sanctioned
countries.
Other FATF warnings
The FATF provides extensive
insights into the methods used by criminals to launder illegally-obtained
financial proceeds, both using VAs and VASPs as well as through the traditional
financial industry (FI). The FATF warns that criminals can use one or a
combination of the following methods in order to attempt to integrate their
illegal proceeds into the legal financial system. These include:
Misusing or exploiting client
accounts: using apparently legitimate business/corporate accounts to carry
out personal financial functions
Property acquisitions:
investing illegally-obtained funds in hard assets such as real estate
Shell company and trust creation:
often used to obscure ownership of assets obtained illegally, or used to carry
out transactions and/or moeny laundering with illegal funds.
Use of bogus
representatives: creating false identities in order to manage funds
and deflect attention away from true perpetrators of financial crime
Lending: companies can often
be used to provide loans to other in return for real assets
3. Alert Management
Alert Management is the process used to investigate & evaluate any unusual activity identified. Consider all methods of identification & ensure that your suspicious activity monitoring program includes the process to evaluate any unusual activity identified, regardless of method of identification. Bank should have board approved policies & procedures in place for referring unusual activity from all areas of the bank or business lines to the personnel responsible for evaluation. It should establish a clear & defined escalation process from the point of initial detection to conclusion of the investigation.
Resources for Alert Management
Assign adequate staff to identification, evaluation, & reporting of potentially suspicious activities. Factors to be considered are:
- Consider overall risk and volume of transactions
- Experience levels and ongoing training to maintain expertise
- Sufficient internal & external tools to allow them to properly research activities & formulate conclusions
Internal & External research
tools
Both Internal & External research tools are needed for supporting trained staff.
Internal Research Tools
- Access to account systems & account information (Employee Accounts too)
- CDD and EDD information – Assist in evaluating if the unusual activity is considered suspicious
External research
tools
Available Internet
media search tools, as well those accessible by subscription find application here.
i. Level 1 alerts: The first stage of AML Transaction
Monitoring entails Identifying and validating an alert, and checking whether
the alert can be discounted or confirming the alert is “true” and requires a
thorough investigation.
ii. Level 2 alerts: Reviewing and validating alerts
sent by the Level 1 team. Based on the alert, Level 2 investigators create a
case to determine the nature of the alert activity (such as anomalous activity
or high-risk transfer) and ascertain whether to report the activity to MLROs
for SAR/STR filing or close the alert. Activities at this level will include a
holistic investigation of the customer, transaction activity and other
associated entities which forms the second stage of AML Monitoring.
iii. Level 3 alerts: Reviewing the cases from Level 2
investigators and validating their findings. After ensuring the cases are
accurate and compliant, supporting with compiling STRs.
Detailed version on alert management as per IBA Working Group report 2010 is provided in the link given at the end of this post.
Document Conclusions
After research
& analysis investigators should establish the Document Conclusions (including
recommendation regarding to file or not to file)
When multiple
departments are responsible for researching unusual activities, lines of
communication must remain open
This will allow multiple
departments to gain efficiencies by sharing information at the same time reducing
redundancies as well as ensuring all suspicious activity is identified, evaluated, &
reported
Whitelisting
When repeatedly low risk transactions are listed in the process, technically it is called false positive. To ensure a risk -based approach , such names/entities are moved to another list and appropriate due diligence is carried out before classifying them as Low Risk. This process often results in a significant number of alerts that require manual resolution, consequently creating substantial backlogs and overwhelming workloads. FIs, in their quest to mitigate these challenges, have adopted a practice known as “whitelisting”. This involves clearing a name or entity as “verified,” after which it is exempted from future screening processes, including those against updated data.
Imagine, for example, a ‘single originator to multiple
beneficiaries’ situation. This is sometimes referred to as the terrorism rule.
This describes one person or entity sending money from a bank account to
multiple people or entities. This is a transaction behavior common among
financers of terror. But it’s also common legitimate behavior for some
corporate accounts. Without whitelisting, AML software might flag a
longstanding and trusted corporate account for the ‘terrorism rule’—creating a
false positive.
Secondary evaluation for details like matching phone
numbers, addresses, and company affiliations can pick out the needle in the
haystack of false positives. And a good software solution can do that
automatically. Whitelisting conserves valuable resources.
4. STR Decision Making
After research & analysis is complete, forward findings to final decision maker – May be individual or committee
REs should have group-wide policies
& procedures for referring unusual activity from all business lines to
personnel responsible
Within procedures,
establish clear & defined escalation process from point of initial
detection to conclusion of investigation
Decision maker should have the authority to make the final STR filing decision. If committee, should be a clearly defined process to resolve differences of opinion on filing decisions
Document STR decisions, including the specific reason for filing or not filing a STR. Thorough documentation provides record of STR decision-making process, including final decisions not to file a STR and is made available during the audit.
The STR Decision may be an inherently subjective judgment. The examiners focus on whether there’s an effective STR decision-making process, not individual decisions. They review individual STR decisions as a way to test effectiveness of monitoring, reporting, & decision making processes
However in
instances where the institution has an established decision-making process and it has followed existing policies, procedures, & processes , and has
determined not to file a STR, it should not be criticized for failure to file
unless significant or accompanied by evidence of bad faith
5. STR Completion & Filing
The most critical part of Transaction Monitoring is the STR completion and Filing. Policies & procedures to ensure STR forms are filed in a timely manner , complete and accurate as well as the narrative provides a sufficient description of activity as well as the reason for filing.
There are altogether five reporting
formats prescribed for a banking company viz. i) Manual reporting of cash
transactions ii) Manual reporting of suspicious transactions iii) Consolidated
reporting of cash transactions by Principal Officer of the bank iv) Electronic
data structure for cash transaction reporting and v) Electronic data structure
for suspicious transaction reporting which are enclosed to this circular. The
reporting formats contain detailed guidelines on the compilation and
manner/procedure of submission of the reports to FIU-IND.
TIMING:
PMLR 2005 requires
filing promptly, and in any case not later than 7 days on confirmation of
suspicion. RE may need to research
transaction, account activity, or other circumstances in order to determine
whether to file or not. The need for a review of a customer or transactions
does not necessarily indicate a need to file a STR
Time period for
filing starts when organization, during its review or because of other factors,
knows or has reason to suspect that the activity or transactions under review
meet one or more of the definitions of suspicious activity
The phrase "initial detection" should not be interpreted as meaning the moment a transaction is highlighted for review for calculating time limit for reporting. A variety of legitimate transactions could raise a red flag simply because they are inconsistent with account holder’s normal account activity
For example, a real estate purchase or sale, or an inheritance, or a stock sale, may cause an account to have a significant credit or debit that would be inconsistent with typical account activity
The bank’s monitoring system, alerts, or initial discovery of information on a report may flag the transaction; however, this should not be considered initial detection of potential suspicious activity. The applicable time limit does not begin until an appropriate review is conducted and a determination is made that the transaction under review is “suspicious.”
An expeditious review is recommended & helps law enforcement and a complete reviews in a reasonable period of time.
What is "reasonable" will vary according to facts & circumstances of what is being reviewed & the effectiveness of the STR monitoring, reporting, & decision-making process
Key factor is whether there are established & adequate procedures for reviewing & assessing facts & circumstances identified as potentially suspicious, & are they being followed
For situations requiring immediate attention, in addition to a timely STR, immediately notify, by phone, "appropriate law enforcement authority" &, as necessary, your primary regulator. “Appropriate law enforcement authority" is generally the local office of Enforcement Directorate. Notifying law enforcement of a suspicious activity does not relieve an institution of its obligation to file a STR.
The STR Quality
REs required to
file STRs that are complete, thorough, & timely. So include all known
subject information and importance of accuracy cannot be overstated; inaccurate
information, or an incomplete or disorganized narrative, may make further
analysis difficult, if not impossible.
May be legitimate
reasons why info is not provided in STR, such as when filer does not have the
information (missing birth date or Aadhar Number, etc)
Thorough &
complete narrative may make the difference in determining whether possible
criminal nature is clearly understood by law enforcement
STR narrative
section is the only area summarizing suspicious activity, this section is
critical
Failure to adequately
describe the factors making a transaction or activity suspicious undermines the
purpose of the STR
STR Narratives:
The STR narratives are subjective in nature and examiners generally will not criticize interpretation of facts
Ensure narratives
are complete & thoroughly describe the extent & nature of the
suspicious activity
No attachments can
be sent or stored in the BSA-reporting database (regardless of paper filing or
e-filing)
Guidance available
in https://rbidocs.rbi.org.in/rdocs/content/Pdfs/68787.pdf
Repetitive STRs (STR Renewals)/STR Filing on Continuing Activity
One purpose of filing is to identify potential violations of law to appropriate law enforcement for investigation. Objective is accomplished by filing the STR that identifies the activity of concern.
If this activity continues over a period of time, this needs to be made known to law enforcement and federal banking agencies. FinCEN’s (USA) guidelines suggest that institutions should report continuing suspicious activity by filing a report at least every 90 days.
This practice will notify law enforcement of the continuing nature of the activity. STR renewals remind the institution that it should continue to review the activity to determine whether other actions may be appropriate, such as determining that it is necessary to terminate a relationship with a customer or employee who is the subject of the filing
Law enforcement may want accounts to remain open even if there is suspicious or potential criminal activity in connection with those accounts. If they request that account remains open, institution should ask for a written request. The request should indicate that agency has requested the account remain open & the purpose & duration. The ultimate decision to maintain or close an account should be made by each financial institution in accordance with its own standards and guidelines. So it needs to add to current policies and procedures when to escalate issues or problems identified as the result of repeat STR filings on accounts.
Procedures should
include a review by senior management & legal staff (e.g., PMLA compliance
officer or STR committee) . The criteria for when analysis of the overall customer
relationship is necessary as well as the criteria for whether &, if so, when, to close
the account including that for when to notify law enforcement
Record Retention
Retention & Supporting Documentation
The RE needs to retain copy of STR & supporting documentation for 5 years from date of filing: Electronic or Paper. Provide all documentation supporting the filing of a STR upon request to FIU-Ind or appropriate law enforcement or RBI. “Supporting documentation” refers to all documents or records that assisted the institution in making the determination that a STR was required. No legal process is required for FIU-Ind or appropriate law enforcement or RBI to obtain copies of the supporting documentation.
Sharing STRs
Notify Board of
Directors:
Notify board of directors or appropriate board committee as per group policy. The dynamic nature of purpose requires no mandated format or frequency; monthly, quarterly; may, but not required to, provide actual copies of STRs or provide summaries, tables of STRs filed for specific violation types, or other forms of notification
Regardless of
format, sufficient & timely information must be provided on STR filings to
the board or appropriate committee in order for them to fulfill their fiduciary
duties
Sharing with Head
Offices & Controlling
Companies
Institutions may share STRs with head offices & controlling companies,
whether in India or abroad . The controlling company defined as:
Bank holding
company (BHC)
Savings & loan
holding company
Company having the
power, directly or indirectly, to direct management policies of an industrial
loan company or a parent company or to vote 10% or more of any class of voting
shares of an industrial loan company or parent company
Companies:
Indian branch or
agency of a foreign bank may share STR with head office outside India
Indian bank may
share STR with controlling companies whether domestic or foreign
Maintain appropriate arrangements to protect the confidentiality of STRs. According to the Prevention of Money Laundering Act (PMLA), 2002, a group company is a company, firm, association, or body of individuals that owns, controls, or manages a payment system in India, directly or indirectly. This includes companies, firms, associations, or bodies of individuals that are incorporated or registered outside of India.
No institution,
director, officer, employee, or agent of a bank that reports a suspicious
transaction may notify any person involved in the transaction that the
transaction has been reported
Frank Mendoza, former Chase Bank official, faces up to 95 years in prison, convicted of disclosing the existence of a suspicious activity report to the suspect. Mendoza, a loss mitigation specialist, approached subject of the SAR & disclosed existence of SAR & suggested suspect pay him $25K for more information about the investigation. Both agencies FIU-Ind and RBI should take the position that banks’ internal controls for the filing of STRs should minimize the risks of disclosure.
REs are required to report activity that may involve money laundering, PMLA violations, terrorist financing, & certain other crimes
However, RE is not obligated to investigate or confirm the underlying crime (e.g., terrorist financing, money laundering, tax evasion, identity theft, & various types of fraud)
Investigation is the responsibility of law enforcement. When evaluating & completing STR, the RE has to do it to the best of their ability, identify the characteristics of the suspicious activity
7. Review
The review step involves the ongoing evaluation of the effectiveness of the transaction monitoring software. This includes reviewing the parameters and alerts to ensure they are still relevant and practical and reviewing any false positives or negatives to identify areas for improvement. All predetermined rules get evaluated for their relevance and threshold limits.
8.Audit
Financial institutions must establish a clear audit trial for monitoring and investigations.
This helps demonstrate compliance with regulatory requirements and aids in
identifying any potential gaps in the transaction monitoring process.
Furthermore, if any discrepancies or suspicious activity is
detected, it is essential to notify regulators or increase the vigilance of
specific accounts. This is crucial in preventing money laundering and other
financial crimes from occurring.
One of the major inputs is STRs in the AML/CFT audit. The establishing of suspicion based on transaction analysis and customer profiling exercises must be appropriately documented and preserved for producing before auditors, RBI and FIU-Ind.
Reports to FIU-Ind
The role and responsibilities of the Principal
Officer include overseeing and ensuring overall compliance with regulatory
guidelines on KYC/AML/CFT issued from time to time and obligations under the
Prevention of Money Laundering Act, 2002, rules and regulations made
thereunder, as amended form time to time. The Principal Officer will also be
responsible for timely submission of CTR, STR and reporting of counterfeit
notes and all transactions involving receipts by non-profit
organisations of value more than rupees ten lakh or its equivalent in
foreign currency to FIU-IND.
The Cash Transaction Report (CTR) for each month should be submitted by NBFCs to FIU‑IND by 15th of the succeeding month. Cash transaction reporting by branches to their Principal Officer / controlling offices should, therefore, invariably be submitted on monthly basis and banks should ensure to submit CTR for every month to FIU-IND within the prescribed time schedule. In regard to CTR the cut off limit of Rs10 lakh is applicable to integrally connected cash transactions also.
As per ‘Prevention of Money Laundering (Maintenance of Records) Rules, 2005’ amended through issuance of the notification no. 12 of 2013 dated 27 th August, 2013, all cross border wire transfers of value more than rupees five lakh or its equivalent in foreign currency where either the origin or destination is in India needs to be reported every month by the 15th of the succeeding month. Hence, all transactions whether these are for Trade, Non trade or merchant are to be reported if it involves cross border transfers and exceeds the threshold of rupees five lakh.
The Prevention of Money-laundering Act, 2002, and rule thereunder require every banking company, financial institution and intermediary, to furnish to FIU-IND information relating to - All cash transactions of the value of more than rupees ten lakhs or its equivalent in foreign currency; All series of cash transactions integrally connected to each other which have been valued below rupees ten lakhs or its equivalent in foreign currency where such series of transactions have taken place within a month.
The
Prevention of Money-laundering Act, 2002, and rule thereunder require every
banking company, financial institution and intermediary, to furnish to
Financial Intelligence Unit India information relating to all cash transactions
where forged or counterfeit currency notes or bank notes have been used as
genuine or where any forgery of a valuable security or a document has taken
place facilitating the transactions.
Monitoring of Small Accounts
A ‘Small Account' means a savings account which is opened in
terms of sub-rule (5) of rule 9 of the PML Rules, 2005. Details of
the operation of a small account and controls to be exercised for such account
are specified in Section 23.
Notwithstanding anything contained in Section 16 and as an
alternative thereto, in case an individual who desires to open a bank
account, banks shall open a ‘Small Account’, which entails the following
limitations:
i.
the aggregate of all credits in a financial year does
not exceed rupees one lakh;
ii.
the aggregate of all withdrawals and transfers in a
month does not exceed rupees ten thousand; and
iii.
the balance at any point of time does not exceed rupees
fifty thousand.
Provided, that this limit on balance shall not be considered
while making deposits through Government grants, welfare benefits and payment
against procurements.
Further, small accounts are subject to the following
conditions:
a.
The bank shall obtain a self-attested photograph from
the customer.
b.
The designated officer of the bank certifies under his
signature that the person opening the account has affixed his signature or
thumb impression in his presence.
Provided that where the
individual is a prisoner in a jail, the signature or thumb print shall be
affixed in presence of the officer in-charge of the jail and the said officer
shall certify the same under his signature and the account shall remain
operational on annual submission of certificate of proof of address issued by
the officer in-charge of the jail.
c.
Such accounts are opened only at Core Banking Solution
(CBS) linked branches or in a branch where it is possible to manually monitor
and ensure that foreign remittances are not credited to the account.
d.
Banks shall ensure that the stipulated monthly and
annual limits on aggregate of transactions and balance requirements in such
accounts are not breached, before a transaction is allowed to take place.
e. The account shall remain operational initially for a
period of twelve months which can be extended for a further period of twelve
months, provided the account holder applies and furnishes evidence of having
applied for any of the OVDs during the first twelve months of the opening of
the said account.
f.
The entire relaxation provisions shall be reviewed
after twenty-four months.
g.
Notwithstanding anything
contained in clauses (e) and (f) above, the small account shall remain
operational between April 1, 2020 and June 30, 2020 and such other periods as
may be notified by the Central Government.
h. The account shall be monitored
and when there is suspicion of money laundering or financing of terrorism
activities or other high-risk scenarios, the identity of the customer shall be
established as per Section 16 or Section 18.
i. Foreign remittance shall not be
allowed to be credited into the account unless the identity of the customer is
fully established as per Section 16 or Section 18.
Simplified procedure for opening accounts by Non-Banking
Finance Companies (NBFCs): In case a person who desires to open an
account is not able to produce documents, as specified in Section 16,
NBFCs may at their discretion open accounts subject to the following
conditions:
a.
The NBFC shall obtain a self-attested photograph from
the customer.
b.
The designated officer of the NBFC certifies under his
signature that the person opening the account has affixed his signature or
thumb impression in his presence.
c. The
account shall remain operational initially for a period of twelve months,
within which CDD as per Section 16 or Section 18 shall be carried
out.
d.
Balances in all their accounts taken together shall not
exceed rupees fifty thousand at any point of time.
e.
The total credit in all the accounts taken together
shall not exceed rupees one lakh in a year.
f. The customer shall be made aware that no further
transactions will be permitted until the full KYC procedure is completed in
case Directions (d) and (e) above are breached by him.
g. The customer shall be notified when the balance reaches
rupees forty thousand or the total credit in a year reaches rupees eighty
thousand that appropriate documents for conducting the KYC must be submitted
otherwise the operations in the account shall be stopped when the total balance
in all the accounts taken together exceeds the limits prescribed in direction
(d) and (e) above.
h. The
account shall be monitored and when there is suspicion of ML/TF activities or
other high-risk scenarios, the identity of the customer shall be established as
per Section 16 or Section 18.
Walk-in Customers
In case of transactions carried out by a non-account based
customer, that is a walk-in customer, where the amount of transaction is equal
to or exceeds rupees fifty thousand, whether conducted as a single transaction
or several transactions that appear to be connected, the customer's identity
and address should be verified. However, if a bank has reason to believe that a
customer is intentionally structuring a transaction into a series of
transactions below the threshold of Rs.50,000/- the bank should verify the
identity and address of the customer and also consider filing a suspicious
transaction report (STR) to FIUIND.
NOTE:
In terms of Clause (b) (ii) of sub-Rule (1) of Rule 9 of the PML Rules, 2005
banks and financial institutions are required to verify the identity of the
customers for all international money transfer operations
AML software capable of capturing, generating and analysing alerts for the purpose of filing CTR/STR in respect of transactions relating to third party products with customers including walk-in customers shall be available.
Transactions involving rupees fifty thousand and above shall be undertaken only by:
· debit to customers’ account or against cheques; and
· obtaining and verifying the PAN given by the account-based as well as walk-in customers.
These instruction shall also apply to sale of REs’ own products, payment of dues of credit cards/sale and reloading of prepaid/travel cards and any other product for rupees fifty thousand and above.
Operation of Bank
Accounts & Money Mules
The instructions on opening of accounts and monitoring of
transactions shall be strictly adhered to, in order to minimise the operations
of “Money Mules” which are used to launder the proceeds of fraud schemes (e.g.,
phishing and identity theft) by criminals who gain illegal access to deposit
accounts by recruiting third parties which act as “money mules.” Banks
shall undertake diligence measures and meticulous monitoring to identify
accounts which are operated as Money Mules and take appropriate action, including
reporting of suspicious transactions to FIU-IND. Further, if it is
established that an account opened and operated is that of a Money Mule, but
no STR was filed by the concerned bank, it shall then be deemed
that the bank has not complied with these directions.
UAPA Cases/UNSCR etc..
In case, the match of any of the customers with the
particulars of designated individuals/entities is beyond doubt, the banks,
stock exchanges/depositories, intermediaries regulated by SEBI and insurance
companies shall prevent such designated persons from conducting financial
transactions, under intimation to the Central [designated] Nodal Officer for
the UAPA at Fax No.011-23092551 and also convey over telephone No.011-23092548.
The particulars apart from being sent by post should necessarily be conveyed on
e-mail id: jsctcr-mha@gov.in,
without delay.
The banks, stock exchanges/depositories, intermediaries
regulated by SEBI, and insurance companies shall file a Suspicious Transaction
Report (STR) with FIU-IND covering all transactions in the accounts, covered
under Paragraph 5.1(ii) above, carried through or attempted as per the
prescribed format.
The reporting formats and comprehensive reporting format
guide, prescribed/ released by FIU-IND and Report Generation Utility and Report
Validation Utility developed to assist reporting entities in the preparation of
prescribed reports shall be taken note of. The editable electronic utilities to
file electronic Cash Transaction Reports (CTR) / Suspicious Transaction Reports
(STR) which FIU-IND has placed on its website shall be made use of by REs which
are yet to install/adopt suitable technological tools for extracting CTR/STR
from their live transaction data. The Principal Officers of those REs, whose
all branches are not fully computerized, shall have suitable arrangement to
cull out the transaction details from branches which are not yet computerized
and to feed the data into an electronic file with the help of the editable electronic
utilities of CTR/STR as have been made available by FIU-IND on its
website http://fiuindia.gov.in.
While furnishing
information to the Director, FIU-IND, delay of each day in not reporting a
transaction or delay of each day in rectifying a mis-represented transaction
beyond the time limit as specified in the Rule shall be constituted as a
separate violation. REs shall not put any restriction on operations in the
accounts merely on the basis of the STR filed.
Every RE, its directors, officers, and all employees shall ensure that
the fact of maintenance of records referred to in rule 3 of the PML
(Maintenance of Records) Rules, 2005 and furnishing of the information to the
Director is confidential. However, such confidentiality requirement shall not
inhibit sharing of information under Section 4(b) of this Master Direction of
any analysis of transactions and activities which appear unusual, if any such
analysis has been done.
Happy Reading,
Those who read this, also read:
1. RBI Guidelines on Transaction Analysis
2. IBA WGR on AML/CFT 2010: Alert Management
3. Obligations by RE under PMLA 2002.
Comments
Post a Comment