Risks and Methods Flashcards

Understanding Risks and Methods of Financial Crime e-Learning (77 cards)

1
Q

Sanctions Evasion

A

Predicate Crime Circumventing or avoiding penalties imposed by governments or international bodies to restrict activities with specific countries, entities, or individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Bribery and Corruption

A

Predicate Crime Bribery: involves offering, giving, receiving, or soliciting something of value to influence the actions of another
Corruption: encompasses various forms of unethical behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Tax Evasion

A

Predicate Crime - Not paying taxes owed to the government by underreporting income, inflating deductions, or withholding information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cyber-enabled Crime

A

Predicate Crime - Criminal activities facilitated or enhanced by the use of digital technology and the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Human Trafficking

A

Predicate crime - The exploitation of individuals through coercion, force, fraud, or deception for various purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Drug Trafficking

A

Predicate Crime - The illegal trade of controlled substances or illicit drugs, which involves the production, distribution, and sale of these substances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Environmental Crime

A

Predicate Crime- Illegal acts that cause harm to the environment or violate environmental regulations, laws, and treaties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Fraud

A

Predicate Crime - The deliberate deception intended to secure an unfair or unlawful gain, typically involving financial or personal benefits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Common General Red Flags

A

-Cash-intensive business
-Dormant account reactivation
-Increase in cash deposits
-Cross-border payments despite no overseas presence
-Use of shell companies
-Nervousness or reluctant to provide information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Consequences of Financial Crime on FIs

A

-Direct Losses
-Regulatory fines
-legal and compliance costs
-Reputational damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Consequences of Financial Crime on individuals

A

-Victims might experience psychological distress, depression, and loss of security.
-Compliance professionals held accountable might face prosecution.
-Law enforcement prosecutes the perpetrators of crime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

MLRO

A

senior compliance professional in a financial firm responsible for overseeing the company’s anti-money laundering (AML) and counter-terrorism financing (CTF) defenses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Three Stages of Money Laundering Cycle

A

-Placement
-Layering
-integration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Placement

A

When “dirty money” is placed into the financial system. One common method is to divide large amounts of cash into less suspicious smaller sums, which can then be deposited into a single bank account or several bank accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Integration

A

When criminals return illicit money to themselves, in a way that appears “clean” without drawing attention. Examples might include purchasing property, art, jewelry, or luxury automobiles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Layering

A

Separating illicit money from its source and creating “layers” of transactions to confuse an audit. Common examples include investing in real estate, reselling high-value goods, and transferring funds between countries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Examples of Placement

A

Frequent small deposits, extensive personal loan history, structured transactions, and frequent bulk cash deposits at a bank are all associated with the placement stage of the money laundering process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Examples of Layering

A

Frequent transfers between accounts, rapid movement of funds, complex corporate structures, cross-border fund transfers, and over- or under- invoicing are all associated with the layering stage of the money laundering process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Examples of Integration

A

Early settlement of loans or credit, large cash withdrawals, and purchase/resale of high-value assets are all associated with the integration stage of the money laundering process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Increased risk in the banking sector:

Volume and Scale

A

The volume of transactions makes it challenging for banks to identify and investigate suspicious transactions, increasing the risk of money laundering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Increased risk in the banking sector:

Global reach

A

The global reach of banks complicates enforcement and regulatory efforts, as different countries have varying AML laws and standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Increased risk in the banking sector:

Complex Products

A

Criminals take advantage of complex products to layer transactions, making it harder for authorities to trace illicit funds and understand the financial flow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Increased risk in the banking sector:

Customer Relationships

A

Good customer relationships can create opportunities for criminals to operate undetected, as trust can overshadow necessary due diligence processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Money laundering risks in banking

A

-Shell/Shelf Companies
-PEPs - Politically exposed persons
-Concentration Accounts
-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Beneficial Owners
Individuals or entities that have ownership of a legal entity
26
UBO (Ultimate beneficial owners)
A natural person owning a large percentage of a legal entity - usually 20% or more ownership must be reported
27
Money Laundering Risks in Retail Banking
-Remote onboarding -Biometrics -Diverse backgrounds
28
Money Laundering Risks in commercial Banking
-Volume and value -Complex structures
29
Additional Retail and commercial banking risks
-Synthetic Identity -Front Companies -Complex ownership structure -Mule Accounts --Trade-based money laundering (TBML) -
30
Trade-based money Laundering (TBML) practices: Pre-arranged trading
re-arranged trading refers to situations where traders, often in coordination with other parties, engage in transactions designed to move illicit funds through the guise of legitimate trade.
31
Trade-based money Laundering (TBML) practices: Over- and under-invoicing
Over- and under-invoicing is a discrepancy between goods that are shipped and the declared value, quantity, or description on the invoices.
32
Trade-based money Laundering (TBML) practices: Phantom shipping
Phantom shipping refers to a situation where a transaction is presented as a legitimate sale and shipment of goods, but no actual goods are shipped.
33
Trade-based money Laundering (TBML) practices: Over- and under-valuation
Over- and under-valuation is the deliberate misrepresentation of the value of goods to enable the transfer of excess funds to foreign suppliers or the receipt of extra funds from foreign buyers.
34
Trade-based money Laundering (TBML) practices: Multiple unusual transactions with the same counterparty
These are repeated transactions that deviate from normal patterns or involve unusual terms and conditions with the same counterparty.
35
Activity: Money laundering risks associated with private banking and wealth management
-Reluctance to provide documentation -Unusual transaction patterns -Complex structures -Refusal to meet in person -Use of cash or untraceable payment methods -Lack of business credibility -Overseas beneficiaries or accounts
36
Corporate Banking Risks
-Identifying beneficial owners -Can complicate AML and KYC compliance
37
Investment Banking Risks
Market manipulation Insider trading
38
Traditional Correspondent Banking
The relationships and services provided by banks to other banks typically in different jurisdictions, allowing them to conduct international transactions and access overseas financial markets where they do not maintain a physical presence themselves
39
Risks of Traditional Correspondent Banking
-Money Laundering - complex networks to obscure the origin of illicit funds -Terrorist financing- anonymous transactions enable to transfer of funds to terrorist groups -Sanctions evasion - transactions with sanctioned group-s or individuals -KYC deficiencies and reliance - one bank relies on the others to manage KYC requirements
40
Nested correspondent banking
When an FI (a nested or indirect correspondent) uses the services of another correspondent bank to conduct transactions on behalf of its customers
41
Risks of nested Correspondent Banking
-Increased complexity and opacity -Heightened money laundering risk -KYC and due diligence limitations
42
Money Services Business (MSB)
A type of nonbank financial institution that provides financial services involving the transfer of money or value. An entity that holds funds on behalf of another person or entity. MSBs are typically regulated by government authorities to ensure compliance with AML and consumer protection laws.
43
Payment Service Provider
Facilitate digital payments across various industries, offering products and services based on their business models and types of transactions they process. They offer businesses a variety of payment processing services, enabling them to accept electronic payments from customers. PSPs facilitate online and offline transactions through various payment methods, including credit and debit cards, bank transfers, digital wallets, and other electronic payment systems.
44
E-commerce platforms
Online systems that facilitate the buying and selling of goods and services over the internet. These platforms provide the necessary tools and features to facilitate online shopping experiences for customers and streamline the management of e-commerce operations for businesses.
45
Key Risks of an Ecommerce Platform
-Use of fake or stolen identities -Use of stolen or prepaid cards -Overpayment and refund schemes -Use of shell companies or fake merchants -Cross-border transactions -Use of drop shipping and third-party fulfillment -Lack of transaction monitoring
46
Ways to mitigate Key Risks of an Ecommerce Platform
-Implement robust KYC and AML policies. -Monitor for suspicious transaction patterns. -Use AI and machine learning to detect anomalies. -Conduct merchant due diligence. -Collaborate with financial institutions and regulators.
47
Securities and brokerage risks: High transaction volumes
Increased risk of money laundering through a large number of transactions that can mask illicit activities. High transaction volumes might conceal illicit activities within legitimate transactions. Criminals can exploit the high volume of transactions to avoid detection, making it essential for financial institutions to implement robust monitoring systems.
48
Securities and brokerage risks: Anonymity of customers
Challenges in verifying customer identities, leading to potential exploitation by criminals. Anonymity can create opportunities for criminals to exploit financial systems. Without adequate KYC procedures, it becomes difficult to trace the true identities behind transactions, increasing the potential for money laundering.
49
Securities and brokerage risks: Complex financial products
Increased risk of money laundering through sophisticated instruments that can obscure the origin of funds. Complex financial instruments can obscure the origins of funds, making it challenging to identify and trace illicit financial activities. This complexity necessitates that financial institutions enhance their understanding of the products they offer and implement thorough scrutiny to prevent misuse.
50
Securities and brokerage risks: Use of technology
Potential for cyber-attacks and data breaches, compromising sensitive information. The increased reliance on technology within financial services introduces risks such as cyber-attacks and data breaches. Protecting sensitive information is crucial for any organization to maintain trust and comply with regulations.
51
Securities and brokerage risks: Third-party relationships
Risk of inadequate AML controls and oversight in external partnerships. Ensuring that third-party vendors, such as contractors or intermediaries, adhere to the relevant and applicable AML standards is essential to mitigate this risk and maintain overall compliance.
52
Bitcoin and Ethereum
Bitcoin (BTC) was the first and most widely recognized cryptocurrency, created in 2009 by an anonymous person or group of people using the pseudonym Satoshi Nakamoto. It operates on a decentralized peer-to-peer network and utilizes blockchain technology to enable secure, transparent transactions. Bitcoin is primarily used as a digital currency and a store of value, often referred to as “digital gold.” Ethereum (ETH) launched in 2015 and is a decentralized blockchain platform that enables developers to create and deploy smart contracts and decentralized applications (dApps). Ether (ETH) is the native cryptocurrency of the Ethereum network, and it supports a wide range of use cases beyond currency, including decentralized finance (DeFi) and non-fungible tokens (NFTs).
53
Virtual Asset Service Providers (Vasps)
VASPs include cryptocurrency exchanges, wallet providers, and other entities that facilitate activities involving virtual assets. They are subject to strict regulations to prevent money laundering and other illicit activities. Key features: AML/CFT compliance, CDD, transaction monitoring, and reporting obligations
53
Stablecoins
Stablecoins are a type of cryptocurrency designed to maintain a stable value relative to a specific asset or asset class, typically fiat currencies such as the US dollar or commodities like gold. They were created to address the volatility common with traditional cryptocurrencies, making them more suitable for transactions and as a store of value. Key features: Pegged to fiat currencies or commodities, reduced price volatility, and use in everyday transactions and as a store of value
54
Wallet Providers
Digital wallets allow users to store, send, and receive cryptoassets. They come in two forms: hot wallets, which are connected to the internet for easy access, and cold wallets, which are offline and provide enhanced security. Key features: Encryption, multi-signature support, transaction history, and integration with various cryptocurrencies
55
Cryptocurrency exchanges
Cryptocurrency exchanges facilitate the buying, selling, and trading of cryptoassets. These platforms can be centralized, where a single entity controls the exchange, or decentralized, where transactions occur directly between users without intermediaries. Key features: User-friendly interfaces, security measures, low transaction fees, and support for multiple cryptocurrencies
56
Cryptocurrency ATMs
Cryptocurrency ATMs, or crypto ATMs, allow users to exchange cryptocurrencies for fiat currency (and vice versa) at physical locations. These machines can be used for facilitating peer-to-peer crypto transactions. Key features: User-friendly interface, support for multiple cryptocurrencies, compliance with KYC/AML regulations, and real-time transaction processing
57
Miners
Miners validate transactions on blockchain networks by solving complex mathematical problems, a process called mining. In return, miners earn newly created cryptoassets for mining a block. Key features: Proof of Work (PoW) mechanism, significant computational power, and economic incentives, such as mining rewards and transaction fees
58
Blockchains
Blockchains are a form of distributed ledger technology (DLT). They provide the infrastructure for the development and deployment of applications and smart contracts. Blockchain platforms offer a secure, transparent, and immutable ledger for recording transactions. Not all open blockchains are decentralized. Public blockchains offer differing levels of decentralization. Open blockchains such as Bitcoin are highly decentralized, but others are less so due to factors such as their governance arrangements. Key features: Smart contract functionality, scalability, security, and support for various programming
59
Cryptoassets industry ecosystem mitigation strategies: Blockchain platforms
Develop secure and scalable infrastructure to prevent system failures and promote cybersecurity. This is essential for blockchain platforms to minimize the risk of systemic failures. Strong infrastructure can enhance security, prevent downtime, and support the integrity of transactions, which is critical in maintaining trust within the blockchain ecosystem.
60
Cryptoassets industry ecosystem mitigation strategies: Cryptocurrency exchanges
Adopt stringent KYC procedures and transaction limits to prevent fraud. This is crucial for cryptocurrency exchanges to verify user identities and mitigate the risks of fraud and money laundering. Transaction limits can also help control suspicious activities, providing an additional layer of security.
61
Cryptoassets industry ecosystem mitigation strategies: Miners:
Conduct KYC at onboarding and on an ongoing basis. KYC processes are essential to ensure compliance with regulatory requirements and to mitigate financial crime risks. Ensuring that miners adhere to compliance standards is essential for maintaining a legitimate and secure blockchain environment.
62
Cryptoassets industry ecosystem mitigation strategies: VASPs
Ensure compliance with AML/CFT regulations and conduct regular audits. VASPs must do this to prevent misuse of their services. Regular audits are vital for assessing compliance and identifying potential vulnerabilities within their operations.
63
Cryptoassets industry ecosystem mitigation strategies: Wallet providers
Implement robust encryption and multi-signature support to enhance security. This significantly enhances the security of wallet providers. These measures protect users' assets from unauthorized access and potential theft, contributing to the overall security of cryptocurrency transactions.
64
Cryptoassets industry ecosystem mitigation strategies: Crypto ATMs
Use advanced transaction monitoring systems to detect suspicious activities. This is essential for detecting and preventing suspicious activities. These systems can analyze transaction patterns and identify irregularities, allowing for timely intervention to mitigate potential risks.
65
Chain-hopping
The organization conducts multiple transactions. Blockchain records the activity but hides identities behind the wallets. The organization transfers coins through wallets across different blockchains.
66
Designated nonfinancial businesses and professions (DNFBP)
-Are not financial institutions, but are still subject to AML regulations. -Are targeted by criminals due to vulnerabilities and the nature of operations. -Should implement robust AML measures.
67
Key risks in accounting and audit sectors: Auditors
Auditors are at risk of overlooking financial discrepancies during reviews that might conceal suspicious activities. An auditor's primary function is to examine financial statements to ensure compliance with accounting standards and laws.
68
Key risks in accounting and audit sectors: Consultants
Consultants might inadvertently aid in facilitating money laundering through transaction structuring. They provide advice on financial strategies and operational efficiencies.
69
Key risks in accounting and audit sectors: Risk advisors
Risk advisors might fail to identify money laundering risks that could facilitate illicit activities. They help organizations identify and manage financial and compliance risks.
70
Key risks in accounting and audit sectors: Tax advisors
Tax advisors must manage the thin line between legal tax avoidance and illegal tax evasion, risking facilitation of money laundering. They advise on tax planning and compliance with regulations.
71
Risks in legal services: Case Handling
Case handling, or litigation services, involves law firms representing clients in legal disputes, including civil, criminal, and commercial cases. They handle litigation, negotiations, or settlements. Law firms might be exposed to suspicious transactions, particularly if large sums of money are involved when representing clients.
72
Risks in legal services: Due Diligence
Law firms conduct due diligence for transactions, investments, mergers, or acquisitions by undertaking investigations into business partners to verify deal legitimacy. Money laundering risks arise if a client provides false information, as undetected discrepancies could lead to fraudulent deals.
73
Risks in legal services: Notary Public Services
Notaries provide services such as witnessing document signing to ensure the legitimacy of documents used in legal transactions. Law firms might unknowingly participate in money laundering if they fail to verify identities or allow fraudulent documents to be notarized, enabling criminals to legitimize documents that conceal illicit activities.
74
Risks in legal services: Verification of Assets
Law firms can assist in verifying the legitimacy of assets such as property sales. Money launderers often use the purchase and sale of assets to legitimize illicit funds. Lawyers risk involvement if they do not thoroughly assess the origin of funds or the ownership history of assets.
75
Risks in legal services: Advisory Services
Law firms provide legal guidance on matters such as business formation, mergers, estate planning, and tax matters. They ensure adherence to legal regulations. There is a risk of unintentionally facilitating transactions that mask illicit activities, such as recommending the use of offshore accounts or trusts that obscure the true ownership of assets.
76
Money Laundering risks of high-value assets
-Obscured ownership -Complex transactions -Use of shell companies -Global nature