SlideShare a Scribd company logo
2
Most read
8
Most read
10
Most read
AML/CTF Basics
Understanding Ant-Money Laundering and Counter-Terrorism Financing (AML /CFT)
David F Amakobe
13 December 2016
Money Laundering
The processes by which criminals
conceal:
The Origin,
The Possession, and
The Control
of the proceeds of criminal behavior
(Cassara, 2016; Christensen, 2011;
Olatunde Julius & Lauwo, 2012).
Methods of Money Laundering
The misuse of the international
financial system (both formal and
alternate),
The physical movement of cash
(cash smuggling)
 The abuse of trade transactions
and their financing (APG, 2012).
Trade Based Money Laundering
The misuse of business and their funding include:
Over/under invoicing of goods,
Multiple invoicing of goods,
Over/under shipments of goods and
False description of goods.
Above activities may be combined with
 Cash inflow based payment,
 Third party payment,
Segmental modes of payment and
Alternative remittance payment (APG, 2012).
Banking Based Money Laundering
The misuse of the international financial system involves three
independent steps:
 Placement: A process for transferring the proceeds from illegal
activities into the financial institutions or converting cash into
instruments.
 Layering: It is a process in which a launderer may conduct a series of
financial transactions to distance the proceeds from illegal source.
 Integration: It is the final stage in the laundering process; illicit funds
are integrated with monies from legitimate commercial activities as
they enter the mainstream economy (Moustafa, Abd El-Megied,
Sobh, & Shafea, 2015)
Terrorism
The use or threat of action with a political motivation, which involves:
Serious violence against a person,
Serious damage to property and
Grave danger to the health and safety of the public.
Article 2 of the 1999 International Convention for the suppression of
terrorist Bombings states that a person commits an offence within the
meaning of the Convention if they cause
Damage to public or government property intending
Death or Serious bodily injury
Significant economic loss, (Grozdanova, 2014).
Terrorism Financing
Intentional collection or provision of funds to support an act or
acts of terrorism. Terrorist organizations raise funding from
legitimate sources, including
The abuse of charitable entities
Legitimate businesses or
Self-financing by the terrorists themselves.
Terrorists also derive funding from a variety of criminal activities
ranging in scale and sophistication from
Low-level crime to systematic fraud or narcotics smuggling,
 State sponsors
Events in failed states and other safe havens.
Proliferation of Weapons of Mass Destruction (WMD)
Proliferation is the
production,
 storage,
transmission,
trade and
Use or threat of use
of weapons of mass destruction, whose spread and their
delivery systems could have incalculable consequences for
global stability and prosperity. Financing of these operations
is illegal and notifiable. Financial institutions have a
responsibility to enforce sanctions imposed by the UN, the US
and their allies.
Financial Action Task Force (FATF)
FATF is an independent inter-governmental body that develops
and promotes policies to protect the global financial system
against
Money laundering,
Terrorist financing and
The financing of proliferation of weapons of mass destruction.
The FATF Recommendations are recognized as the global anti-
money laundering (AML) and counter-terrorist financing (CFT)
standard ((FATF), 2012).
Financial Crimes Enforcement Network
The mission of the FinCEN is
To safeguard the financial system from illicit
use and
Combat money laundering
Promote national security through
The collection, analysis, and
Dissemination of financial intelligence for
strategic use by financial authorities
Financial Institutions AML/CTF
 Know Your Customer (KYC)
 CDD
 Enhanced CDD for PEPs
 Correspondence banking
 Natural and Legal persons, legal arrangements and Ultimate beneficial ownership
 Continuously monitor new and persisting relationships
 Currency activity reports,
 Funds transfer reports,
 Monetary instrument sales reports,
 Larger item reports,
 Significant balance change reports,
 ATM transaction reports, and
 Nonsufficient funds (NSF) reports
 Report to FINCEN
 Suspicious Activity Report SAR
 Bank Secrecy Act Currency Transaction Report (BCTR)
Summary
 Financial institutions play a key role in the detection,
prevention and control of criminal intention to hide the
origin, possession and control of proceeds of crime
 The continuous monitoring of both prospective and
persisting relationships ensure the integrity and security of
the financial system
 Timely detection and reporting to FinCEN ensure that Law
enforcement has the necessary information to maintain
security
References
 (FATF), F. A. T. F. (2012). INTERNATIONAL STANDARDS ON COMBATING MONEY LAUNDERING
AND THE FINANCING OF TERRORISM & PROLIFERATION. Retrieved from February 2012:
www.fatf-gafi.org/recommendations.html
 APG. (2012). APG Typology Report on Trade Based Money Laundering. Retrieved from
http://www.apgml.org/documents/default.aspx?pcPage=10
 Cassara, J. A. (2016). Trade-based money laundering: the next frontier in international money
laundering enforcement. Hoboken, New Jersey: John Wiley & Sons.
 Christensen, J. (2011). The looting continues tax havens and corruption. Critical Perspectives on
International Business, 7(2), 177-196. doi:http://dx.doi.org/10.1108/17422041111128249
 Grozdanova, R. (2014). 'Terrorism' - Too Elusive a Term for an International Legal Definition?
Netherlands International Law Review, 61(3), 305-334.
doi:http://dx.doi.org/10.1017/S0165070X14001351
 Moustafa, T. H., Abd El-Megied, M. Z., Sobh, T. S., & Shafea, K. M. (2015). Anti money laundering
using a two-phase system. Journal of Money Laundering Control, 18(3), 304-329.
 Olatunde Julius, O., & Lauwo, S. (2012). The role of offshore financial centres in elite money
laundering practices: evidence from Nigeria. Journal of Money Laundering Control, 15(3), 336-
361. doi:http://dx.doi.org/10.1108/13685201211238070

More Related Content

PPTX
ANTI MONEY LAUNDERING REGULATIONS, UAE
PPTX
AML Presentation 2.pptx
PPT
Aml cft training programme
PPTX
Money laundering
PPTX
Basics of Anti-Money Laundering : A Really Quick Primer
PPT
Anti-money laundering presentation
PPT
Presentation AML
PPTX
Money Laundering
ANTI MONEY LAUNDERING REGULATIONS, UAE
AML Presentation 2.pptx
Aml cft training programme
Money laundering
Basics of Anti-Money Laundering : A Really Quick Primer
Anti-money laundering presentation
Presentation AML
Money Laundering

What's hot (20)

PPTX
AML presentation
PPTX
Money laundering
PPT
Anti Money Laundering Presentation
PPTX
The ANTI-MONEYLAUNDERING LEGAL FRAMEWORK
PDF
Anti Money Laundering
PPTX
Anti-money Laundering
PPTX
Money laundering
PPTX
Anti money laundering
PPT
PPTX
Money Laundering by Vivek Singh,Aryan College
PPTX
Anti-Money Laundering (AML) Risk Assessment Process
PDF
Money Laundering and Terrorist Financing in a Nutshell: Chapter One
PPT
Know your customer guidelines
PPTX
Anti-Money Laundering and Counter Financing of Terrorism
PPT
Money Laundering and Corruption
PPTX
Presentation on Money laundering
PPTX
Anti Money Laundering Framework
PPTX
Anti-Money Laundering
DOCX
Anti Money Laundering
PPTX
Money laundering
AML presentation
Money laundering
Anti Money Laundering Presentation
The ANTI-MONEYLAUNDERING LEGAL FRAMEWORK
Anti Money Laundering
Anti-money Laundering
Money laundering
Anti money laundering
Money Laundering by Vivek Singh,Aryan College
Anti-Money Laundering (AML) Risk Assessment Process
Money Laundering and Terrorist Financing in a Nutshell: Chapter One
Know your customer guidelines
Anti-Money Laundering and Counter Financing of Terrorism
Money Laundering and Corruption
Presentation on Money laundering
Anti Money Laundering Framework
Anti-Money Laundering
Anti Money Laundering
Money laundering
Ad

Viewers also liked (20)

PDF
Payments and AML CFT KYC
PDF
StubbsGazette AML/CFT EBook for Credit Unions
PPTX
Anti-Money Laundering and Countering the Financing of Terrorism - StubbsGazet...
PDF
AML and CTF 12-13 May 2016
PPT
goAML
PPT
Money Laundering
PDF
4. op risk and aml
PPTX
Virtual Currency Compliance: Anti-Money Laundering
PPTX
Anti Money Laundering Typologies
PDF
anti money laundering certificate
PDF
Indian Regulators & AML Actions
PDF
Financial crime anti-money laundering - bovill briefing
PDF
AML/CTF Compliance Presentation - Gaming
PDF
Cost-Volume-Profit Analysis by Paulino Silva
PPT
Cost volume profit analysis.
PPTX
Cost volume profit analysis
PPT
Combating money laundering in India
PPTX
KYC/AML 2016
PPTX
6. Cost Volume-Profit Analysis
Payments and AML CFT KYC
StubbsGazette AML/CFT EBook for Credit Unions
Anti-Money Laundering and Countering the Financing of Terrorism - StubbsGazet...
AML and CTF 12-13 May 2016
goAML
Money Laundering
4. op risk and aml
Virtual Currency Compliance: Anti-Money Laundering
Anti Money Laundering Typologies
anti money laundering certificate
Indian Regulators & AML Actions
Financial crime anti-money laundering - bovill briefing
AML/CTF Compliance Presentation - Gaming
Cost-Volume-Profit Analysis by Paulino Silva
Cost volume profit analysis.
Cost volume profit analysis
Combating money laundering in India
KYC/AML 2016
6. Cost Volume-Profit Analysis
Ad

Similar to Aml basics (20)

PPTX
1_Overview on AML_CFT_KYC and Money Laundering .pptx
PDF
Threat finance and financial intelligence
PPTX
Internal control principles and practices
PPT
International Standards & Action to Combat Money Laundering 11- Legal Aspects...
PPTX
New Zealand | Anti Money Laundering (Aaron Lloyd)
PDF
Aml eng full_version
PPTX
Presentation Materials don't load Branch.pptx
PPTX
Presentation Materials. Don't load -HQ.pptx
PPTX
Anti Money Laundering act amla malaysia.pptx
DOCX
The 3rd Directive in the UK
PDF
Preventing Money Laundering and Combating the Financing of Terrorism (2006)
PPTX
AML Presentation 2 - Nigeria.pptx
PPTX
AML Presentation 2 - Nigeria.pptx
PPTX
FIS Insurance_AML Training Presentation.pptx
PDF
WHY SIERRA LEONE GOVERNMENT TO ENACT ANTI MONEY LAUNDERING LAWS 121.pdf
PPTX
PPT
Money Laundering.ppt 12345678901234567890
PPTX
Aml / anti money laundering
PDF
LEARNING TO RECONGNIZE MONEY LAUNDERING TYPOLOGIES - 2023
PDF
2014 10-05 juan llanos presentation (inside bitcoins)
1_Overview on AML_CFT_KYC and Money Laundering .pptx
Threat finance and financial intelligence
Internal control principles and practices
International Standards & Action to Combat Money Laundering 11- Legal Aspects...
New Zealand | Anti Money Laundering (Aaron Lloyd)
Aml eng full_version
Presentation Materials don't load Branch.pptx
Presentation Materials. Don't load -HQ.pptx
Anti Money Laundering act amla malaysia.pptx
The 3rd Directive in the UK
Preventing Money Laundering and Combating the Financing of Terrorism (2006)
AML Presentation 2 - Nigeria.pptx
AML Presentation 2 - Nigeria.pptx
FIS Insurance_AML Training Presentation.pptx
WHY SIERRA LEONE GOVERNMENT TO ENACT ANTI MONEY LAUNDERING LAWS 121.pdf
Money Laundering.ppt 12345678901234567890
Aml / anti money laundering
LEARNING TO RECONGNIZE MONEY LAUNDERING TYPOLOGIES - 2023
2014 10-05 juan llanos presentation (inside bitcoins)

Recently uploaded (20)

PPTX
The discussion on the Economic in transportation .pptx
PPTX
social-studies-subject-for-high-school-globalization.pptx
PPTX
Introduction to Essence of Indian traditional knowledge.pptx
PDF
Why Ignoring Passive Income for Retirees Could Cost You Big.pdf
PDF
Understanding University Research Expenditures (1)_compressed.pdf
PDF
Predicting Customer Bankruptcy Using Machine Learning Algorithm research pape...
DOCX
marketing plan Elkhabiry............docx
PPTX
Basic Concepts of Economics.pvhjkl;vbjkl;ptx
PDF
how_to_earn_50k_monthly_investment_guide.pdf
PPTX
4.5.1 Financial Governance_Appropriation & Finance.pptx
PDF
ABriefOverviewComparisonUCP600_ISP8_URDG_758.pdf
PDF
Dr Tran Quoc Bao the first Vietnamese speaker at GITEX DigiHealth Conference ...
PDF
Spending, Allocation Choices, and Aging THROUGH Retirement. Are all of these ...
PPT
E commerce busin and some important issues
PDF
final_dropping_the_baton_-_how_america_is_failing_to_use_russia_sanctions_and...
PPTX
Introduction to Managemeng Chapter 1..pptx
PDF
Is Retirement Income a Three Dimensional (3-D) problem_ What is the differenc...
PDF
Corporate Finance Fundamentals - Course Presentation.pdf
PPTX
Session 14-16. Capital Structure Theories.pptx
PDF
Copia de Minimal 3D Technology Consulting Presentation.pdf
The discussion on the Economic in transportation .pptx
social-studies-subject-for-high-school-globalization.pptx
Introduction to Essence of Indian traditional knowledge.pptx
Why Ignoring Passive Income for Retirees Could Cost You Big.pdf
Understanding University Research Expenditures (1)_compressed.pdf
Predicting Customer Bankruptcy Using Machine Learning Algorithm research pape...
marketing plan Elkhabiry............docx
Basic Concepts of Economics.pvhjkl;vbjkl;ptx
how_to_earn_50k_monthly_investment_guide.pdf
4.5.1 Financial Governance_Appropriation & Finance.pptx
ABriefOverviewComparisonUCP600_ISP8_URDG_758.pdf
Dr Tran Quoc Bao the first Vietnamese speaker at GITEX DigiHealth Conference ...
Spending, Allocation Choices, and Aging THROUGH Retirement. Are all of these ...
E commerce busin and some important issues
final_dropping_the_baton_-_how_america_is_failing_to_use_russia_sanctions_and...
Introduction to Managemeng Chapter 1..pptx
Is Retirement Income a Three Dimensional (3-D) problem_ What is the differenc...
Corporate Finance Fundamentals - Course Presentation.pdf
Session 14-16. Capital Structure Theories.pptx
Copia de Minimal 3D Technology Consulting Presentation.pdf

Aml basics

  • 1. AML/CTF Basics Understanding Ant-Money Laundering and Counter-Terrorism Financing (AML /CFT) David F Amakobe 13 December 2016
  • 2. Money Laundering The processes by which criminals conceal: The Origin, The Possession, and The Control of the proceeds of criminal behavior (Cassara, 2016; Christensen, 2011; Olatunde Julius & Lauwo, 2012).
  • 3. Methods of Money Laundering The misuse of the international financial system (both formal and alternate), The physical movement of cash (cash smuggling)  The abuse of trade transactions and their financing (APG, 2012).
  • 4. Trade Based Money Laundering The misuse of business and their funding include: Over/under invoicing of goods, Multiple invoicing of goods, Over/under shipments of goods and False description of goods. Above activities may be combined with  Cash inflow based payment,  Third party payment, Segmental modes of payment and Alternative remittance payment (APG, 2012).
  • 5. Banking Based Money Laundering The misuse of the international financial system involves three independent steps:  Placement: A process for transferring the proceeds from illegal activities into the financial institutions or converting cash into instruments.  Layering: It is a process in which a launderer may conduct a series of financial transactions to distance the proceeds from illegal source.  Integration: It is the final stage in the laundering process; illicit funds are integrated with monies from legitimate commercial activities as they enter the mainstream economy (Moustafa, Abd El-Megied, Sobh, & Shafea, 2015)
  • 6. Terrorism The use or threat of action with a political motivation, which involves: Serious violence against a person, Serious damage to property and Grave danger to the health and safety of the public. Article 2 of the 1999 International Convention for the suppression of terrorist Bombings states that a person commits an offence within the meaning of the Convention if they cause Damage to public or government property intending Death or Serious bodily injury Significant economic loss, (Grozdanova, 2014).
  • 7. Terrorism Financing Intentional collection or provision of funds to support an act or acts of terrorism. Terrorist organizations raise funding from legitimate sources, including The abuse of charitable entities Legitimate businesses or Self-financing by the terrorists themselves. Terrorists also derive funding from a variety of criminal activities ranging in scale and sophistication from Low-level crime to systematic fraud or narcotics smuggling,  State sponsors Events in failed states and other safe havens.
  • 8. Proliferation of Weapons of Mass Destruction (WMD) Proliferation is the production,  storage, transmission, trade and Use or threat of use of weapons of mass destruction, whose spread and their delivery systems could have incalculable consequences for global stability and prosperity. Financing of these operations is illegal and notifiable. Financial institutions have a responsibility to enforce sanctions imposed by the UN, the US and their allies.
  • 9. Financial Action Task Force (FATF) FATF is an independent inter-governmental body that develops and promotes policies to protect the global financial system against Money laundering, Terrorist financing and The financing of proliferation of weapons of mass destruction. The FATF Recommendations are recognized as the global anti- money laundering (AML) and counter-terrorist financing (CFT) standard ((FATF), 2012).
  • 10. Financial Crimes Enforcement Network The mission of the FinCEN is To safeguard the financial system from illicit use and Combat money laundering Promote national security through The collection, analysis, and Dissemination of financial intelligence for strategic use by financial authorities
  • 11. Financial Institutions AML/CTF  Know Your Customer (KYC)  CDD  Enhanced CDD for PEPs  Correspondence banking  Natural and Legal persons, legal arrangements and Ultimate beneficial ownership  Continuously monitor new and persisting relationships  Currency activity reports,  Funds transfer reports,  Monetary instrument sales reports,  Larger item reports,  Significant balance change reports,  ATM transaction reports, and  Nonsufficient funds (NSF) reports  Report to FINCEN  Suspicious Activity Report SAR  Bank Secrecy Act Currency Transaction Report (BCTR)
  • 12. Summary  Financial institutions play a key role in the detection, prevention and control of criminal intention to hide the origin, possession and control of proceeds of crime  The continuous monitoring of both prospective and persisting relationships ensure the integrity and security of the financial system  Timely detection and reporting to FinCEN ensure that Law enforcement has the necessary information to maintain security
  • 13. References  (FATF), F. A. T. F. (2012). INTERNATIONAL STANDARDS ON COMBATING MONEY LAUNDERING AND THE FINANCING OF TERRORISM & PROLIFERATION. Retrieved from February 2012: www.fatf-gafi.org/recommendations.html  APG. (2012). APG Typology Report on Trade Based Money Laundering. Retrieved from http://www.apgml.org/documents/default.aspx?pcPage=10  Cassara, J. A. (2016). Trade-based money laundering: the next frontier in international money laundering enforcement. Hoboken, New Jersey: John Wiley & Sons.  Christensen, J. (2011). The looting continues tax havens and corruption. Critical Perspectives on International Business, 7(2), 177-196. doi:http://dx.doi.org/10.1108/17422041111128249  Grozdanova, R. (2014). 'Terrorism' - Too Elusive a Term for an International Legal Definition? Netherlands International Law Review, 61(3), 305-334. doi:http://dx.doi.org/10.1017/S0165070X14001351  Moustafa, T. H., Abd El-Megied, M. Z., Sobh, T. S., & Shafea, K. M. (2015). Anti money laundering using a two-phase system. Journal of Money Laundering Control, 18(3), 304-329.  Olatunde Julius, O., & Lauwo, S. (2012). The role of offshore financial centres in elite money laundering practices: evidence from Nigeria. Journal of Money Laundering Control, 15(3), 336- 361. doi:http://dx.doi.org/10.1108/13685201211238070

Editor's Notes

  • #3: Money laundering is the processes by which criminals conceal the origin, possession, and control of the proceeds of criminal behaviour by making such profits appear to have been derived from legitimate sources (Cassara, 2016; Christensen, 2011; Olatunde Julius & Lauwo, 2012).
  • #4: There are three primary methods of money laundering. The misuse of the international financial system (both formal and alternate), the physical movement of cash (cash smuggling) and the abuse of trade transactions and their financing (APG, 2012).
  • #5: The misuse of business transactions and their funding include activites such as over/under invoicing of goods, multiple invoicing of goods, over/under shipments of goods and false description of goods. These activities are combined with cash inflow based payment, third party payment, segmental modes of payment and alternative remittance payment (APG, 2012).
  • #6: The misuse of the international financial system involves three independent steps as reported in the Background Intelligence Brief Money Laundering, 2005 by Molander et al., (1998) as cited by Moustafa et al.,. ((2015): Placement: It is the first stage in the money laundering process, and it is a process for transferring the proceeds from illegal activities into the financial institutions or converting cash into instruments. Layering: It is a process in which a launderer may conduct a series of financial transactions to distance the proceeds from illegal source. Integration: It is the final stage in the laundering process; illicit funds are integrated with monies from legitimate commercial activities as they enter the mainstream economy. The integration of illicit monies into a legal economy is tough to detect unless an audit trail had been established during the previous stages (Moustafa, Abd El-Megied, Sobh, & Shafea, 2015).
  • #7: Terrorism is the use or threat of action with a political motivation, which involves serious violence against a person, serious damage to property and grave danger to the health and safety of the public. Alternatively going by the international convension, Article 2 of the 1999 International Convention for the suppression of terrorist Bombings provides a definition. The Article states that a person commits an offence within the meaning of the Convention if they cause damage to public or government property intending to cause death or serious bodily injury and results in significant economic loss, which arguably amount to political motivation (Grozdanova, 2014).
  • #8: Terrorism financing is intentionally collecting or providing funds to support a act or acts of terrorism. Terrorist organizations raise funding from legitimate sources, including the abuse of charitable entities or legitimate businesses or self-financing by the terrorists themselves. Terrorists also derive funding from a variety of criminal activities ranging in scale and sophistication from low-level crime to systematic fraud or narcotics smuggling, or from state sponsors and events in failed states and other safe havens.
  • #9: Proliferation is the production, storage, transmission, trade and use of weapons of mass destruction. The spread of nuclear weapons and other weapons of mass destruction (WMD), and their delivery systems could have incalculable consequences for global stability and prosperity. During the next decade, proliferation will be most acute in some of the world’s most volatile regions. Financing of these operations is illegal and notifiable. Financial institutions have a responsibility to enforce sanctions imposed by the UN, the US and their allies.
  • #10: The Financial Action Task Force (FATF) is an independent inter-governmental body that develops and promotes policies to protect the global financial system against money laundering, terrorist financing and the financing of proliferation of weapons of mass destruction. The FATF Recommendations are recognised as the global anti-money laundering (AML) and counter-terrorist financing (CFT) standard ((FATF), 2012). The 25 recommendations that concern the operations of financial institutions are listed below. The rest of the 48 are concern with regulation and enforcement ((FATF), 2012). International Statrndards on compacting money laundering and the financing of terrorism & proliferation. The FATF Recommendations, published in February 2012 and updated June 2016, these are: 1. Assessing risks & applying a risk-based approach 2.National cooperation and coordination 3. Money Laundering offence 4.Seizure and provision measure 5. Terrorist financing ofference 6 Targeted financial sactions related to terrorism & terrorism fiinancing 7.Targeted financial sactions related to proliferations 8. Non-profit organizations 9. Financial institutions secrecy laws 10. Customer due diligince 11. Record keeping 12. Politically exposed persons The measures to be taken are as follows: Imposes specific CDD obligations, either through law of Identifying the customer and verifying tthrough independent source documents, data or information customer’s identity using reliable, Identifying the beneficial owner, and taking reasonable measures to verify the identity of the beneficial owner, such that the financial institution is satisfied that it knows whco the beneficial owner is. For legal persons and arrangements, this should include financial institutions understanding the ownership and control structure of the customer natural persons, legal persons or legal arrangements. Understanding and, as appropriate, obtaining information on the purpose and intended nature of the business relationship. (d) Conducting ongoing due diligence on the business relationship and scrutiny of transactions undertaken throughout the course of that relationship to ensure that the transactions being conducted are consistent with the institution’s knowledge of the customer, their business, and risk profile, including, where necessary, the source of funds. 13. Correspondence banking 14. money or value transfer 15. New technologies 16.Wire transfers 17. Reliance on third parties 18.Internal controls, foreign branches, and subsidiaries 19. High risk countries 20. Reporting sucspicious activities 21 Tipping-off and confidentiality 22. Desginated non-financial business and professions (DNFBPs): Customer Due Diligence (CDD) The measures to be taken are as follows: (a) imposes specific CDD obligations, either through law or Identifying the customer and verifying that independent source documents, data or information of customer’s identity using reliable, (b) Identifying the beneficial owner, and taking reasonable measures to check the identity of the beneficial owner, such that the financial institution is satisfied that it knows who the beneficial owner is. For legal persons and arrangements, this should include financial institutions understanding the ownership and control structure of the customer. (c) Understanding and, as appropriate, obtaining information on the purpose and intended nature of the business relationship. (d) Conducting ongoing due diligence on the business relationship and scrutiny of transactions undertaken throughout the course of that relationship to ensure that the transactions being conducted are consistent with the institution’s knowledge of the customer, their business, and risk profile, including, where necessary, the source of funds. 23. DNFBPs: Other measures 24. Transparency and beneficial ownership of legal persons 25. Transparency and legal ownership of legal arranements  
  • #12: Know your customer in new and persisting relationships. Understand the legal arrangements, know the ultimate beneficial ownership of any relationships. Continouslly monitor relationships against the known facts and ask questions. Report to FinCEN
  • #13: Financial institutions play a key role in the detection, prevention and control of criminal intention to hide the origin, possession and control of proceeds of crime The continuous monitoring of both prospective and persisting relationships ensure the integrity and security of the financial system Timely detection and reporting to FinCEN ensure that Law enforcement has the necessary information to maintain security