An investigator is reviewing an alert for unusual activity. System scanning detected a text string within a company customer's account transactions that indicates the account may have been used for a drug or drug paraphernalia purchase Based on the KYC profile, the investigator determines the customer's company name and business type are marketed as a gardening supplies company. The investigator reviews the account activity and notes an online purchase transaction that leads the investigator to a website that sells various strains of marijuan
a. Additional account review detects cash deposits into the account at the branch teller lines, so the investigator reaches out to the teller staff regarding the transactions. The teller staff member reports that the business customers have frequently deposited cash in lower amounts. The teller, without prompting, adds that one of the transactors would occasionally smell of a distinct scent of marijuana smoke.
Which are the best next steps for the investigator to take? (Select Three.)
Answer : A, C, E
The best next steps for the investigator to take are:
A . Review the customer's transaction history. This can help the investigator identify any patterns or anomalies in the customer's account activity, such as changes in transaction volume, frequency, amount, source, destination, purpose, etc. The investigator can also compare the customer's transaction history with their KYC profile and risk rating to assess if there are any discrepancies or inconsistencies.
C . Check internal KYC information. This can help the investigator verify the customer's identity, business nature, ownership structure, expected activity, source of funds, etc. The investigator can also update or enhance the customer's KYC information based on any new or relevant information obtained from other sources.
E Conduct adverse media and open-source searches on the customer's background. This can help the investigator find out if there is any negative or adverse information about the customer in public data sources, such as news articles, social media posts, blogs, forums, etc. Adverse media and open-source searches can also provide additional context and insight into the customer's reputation, behavior, associations, etc. The other options are incorrect because:
B . Request information from the internet service provider who hosts the website is not feasible, as it may require a legal process or a court order to obtain such information. Moreover, the internet service provider may not have or disclose any useful information about the website or its owner.
D . Research other customer accounts for transactions to the same website is not relevant, as it may not provide any meaningful information about the customer under investigation. Furthermore, it may violate the privacy and confidentiality of other customers who are not related to the investigation.
F . Identify if the customer has opened accounts in an urban city area is not helpful, as it may not have any bearing on the customer's involvement in a drug or drug paraphernalia purchase. Additionally, it may not be possible to access or verify such information without the customer's consent or authorization.
Advanced CAMS-FCI Certification | ACAMS, Section 2: Investigating Financial Crimes, page 11
Leading Complex Investigations Certificate | ACAMS, Module 3: Conducting Research and Analysis, page 6
Adverse Media Screening - Using AI to Mitigate Risk
Legal requirements for adverse media screening - Thomson Reuters
Electronic client due diligence | Ethics helpsheets | ICAEW
6AMLD & FATF: Where Adverse Media Screening Fits In
Free Adverse Media Check | NameScan
Which information is it best practice to share at the very beginning of a well-written SAR/STR narrative?
Answer : B
The best information to share at the very beginning of a well-written SAR/STR narrative is the purpose of the SAR/STR narrative and a general description of the known or alleged violation. This is because this information provides an overview of why the SAR/STR is being filed and what type of suspicious activity or transaction is involved. It also helps to capture the attention of the reader and set the tone for the rest of the narrative.
In a SAR/STR narrative concerning Individual
Answer : B
A product of analysis is a conclusion or inference that is derived from facts or judgments, using analytical techniques or tools. Option B is a product of analysis because it implies that the investigator has used a tool or technique, such as a threshold analysis, to identify a pattern of structured cash deposits that may indicate an attempt to evade reporting requirements. The other options are facts or judgments that can be verified by evidence or observation.
A financial institution
Answer : C
The correct answer is C because the FI is unable to obtain evidence of required licensing or registration despite suspicion of money transmitting, which is a red flag for money laundering and a violation of federal and state laws. Option A is incorrect because making several deposits in one month that appear to exceed their expected monthly income might not be indicative of suspicious activity, depending on the customer's profile and source of funds. Option B is incorrect because receiving a large, one-time wire from a law firm might not be indicative of suspicious activity, depending on the customer's relationship with the law firm and the purpose of the wire. Option D is incorrect because discovering a large number of securities transactions that appear to be related to day trading might not be indicative of suspicious activity, depending on the customer's investment strategy and risk tolerance.
Online payments from a customer's account to three foreign entities trigger an investigation. The investigator knows the funds originated from family real estate after an investment company approached the customer online. Funds were remitted for pre-lPO shares. Which should now occur in the investigation?
Answer : C
The correct answer is C because reviewing the structure of the transactions to the three entities can help the investigator to identify any red flags or indicators of fraud, such as unusual amounts, frequency, destinations, or beneficiaries. The other options are not as relevant or effective in this scenario. Option A is not necessary because the investigator already knows the source of funds for the customer. Option B is not advisable because contacting the customer directly may alert them to the investigation and compromise its integrity. Option D is not helpful because inspecting electronic banking login records does not provide any information about the nature or purpose of the transactions.
Advanced CAMS-FCI Study Guide, page 281
Financial Crime Typologies - Intermediate Certificate Course, Module 32
During a review, an analyst notices discrepancies between a customer's nature of business listed on the business registry and what was stated on the customers application. The analyst should:
Answer : A
The analyst should clarify discrepancies noted in the customer's declared profile given the downstream impact on the risk assessment. This is because discrepancies between the customer's nature of business and the information on the business registry may indicate that the customer is not operating a legitimate business or is trying to conceal its true activities. The analyst should verify the customer's identity, source of funds, and purpose of transactions to ensure that the customer's risk profile is accurate and consistent with the Fl's risk appetite.
Law enforcement (LE) suspects human trafficking to occur during a major sporting event LE officers asked several financial institutions (FIs) to monitor financial transactions occurring before, during, and after the event.
An investigator identified a pattern linked to a business. The business' account received multiple even dollar deposits between midnight and 4:00 AM. They occurred each day for several days prior to the date of the sporting event. Also, large cash deposits, typically between 2,000 USD and 3,000 USD. made by a person to the business' account occurred in many branches in the days after the sports event.
There was little information about the company. The company did not have any history of employee payroll expenses or paying taxes. Expenses from the business account included air travel and hotel expenses. Searches about the person making cash deposits showed little. An online social media platform webpage with the individual's name showed ads for dates1' and "companionship."
The Fl wants to create an automated alert for human trafficking money laundering after this investigation. Which activity type should they target?
Answer : B
The activity type that the FI should target for creating an automated alert for human trafficking money laundering is multiple deposits between midnight and 4:00 AM (B). This is because this pattern is consistent with the indicators of human trafficking identified by the Financial Action Task Force (FATF) and the Egmont Group1, which include:
Frequent cash deposits, often in round amounts, outside of normal business hours
Deposits made at different branches or ATMs in various locations
Lack of information about the nature and purpose of the business
Involvement in online platforms that advertise sexual services
Expenses related to travel and accommodation
The other options are not as relevant or specific as option B. Payments made to multiple hotels in the same city (A) could be a legitimate business expense or a sign of other types of money laundering, such as tax evasion or fraud. Deposits made within days of major sporting events could also be explained by other factors, such as increased tourism or gambling. Payments made for virtual currency (D) are not directly related to human trafficking, although they could be used to facilitate money laundering in general.
Which are some of the negative impacts from illegal wildlife trade and environmental crimes? (Select Two.)
Answer : B, D, D
Some of the negative impacts of illegal wildlife trade and environmental crimes are loss of potential tax proceeds and threats to biodiversity. Loss of potential tax proceeds occurs when illegal wildlife trade and environmental crimes evade taxation and customs duties, depriving governments of revenues that could be used for public services and development. Threats to biodiversity occur when illegal wildlife trade and environmental crimes endanger species, habitats, and ecosystems, reducing their resilience and ability to provide essential services for human well-being. Public health consequences and threats to a country's political stability are not directly related to illegal wildlife trade and environmental crimes, but rather to other types of financial crimes such as money laundering, terrorism financing, or corruption.
A criminal is engaged in chain hopping while trying to launder ransomware payments. The criminal will likely:
Answer : B
Chain hopping is a technique used by criminals to obscure the traceability of cryptocurrency transactions by converting the funds to a different type of cryptocurrency, often using multiple exchanges or platforms. The other options are not related to chain hopping. Reference: Advanced CAMS-FCI Study Guide, page 38.
Why is a more robust supervisory approach needed by regulators when overseeing small- and medium-sized money service businesses (MSBs) compared to larger MSBs for combatting terrorist financing (TF)?
Answer : D
A more robust supervisory approach is needed by regulators when overseeing small- and medium-sized MSBs compared to larger MSBs for combatting TF because small- and medium-sized MSBs are more at risk of allowing transactions linked to TF due to the lack of skilled compliance resources. Small- and medium-sized MSBs may face challenges in implementing effective AML/CFT controls, such as conducting risk assessments, applying customer due diligence measures, monitoring transactions, detecting suspicious activities, and reporting to the authorities. They may also have limited access to training, guidance, and tools to enhance their compliance capabilities. Therefore, regulators need to provide more supervision and support to small- and medium-sized MSBs to ensure that they comply with the AML/CFT requirements and mitigate the TF risks.
Sustainable Growth for Small and Medium-Sized Enterprises ... - MDPI
Lessons on Resilience for Small and Midsize Businesses - HBR
Each month the automated transaction monitoring system generates alerts based on predetermined scenarios. An alert was generated in relation to the account activity of ABC Foundation. Below is the transaction history for ABC Foundation (dates are in DD/MM/YYYY format).

The relationship manager for ABC Foundation contacts the client to request more information on the beneficiary of the transfer in Turkey. ABC Foundation advises that this is a not-for-profit charity group called 'Forever Free." Which is the best next step in the investigation?
Answer : C
The best next step in the investigation is to check the jurisdiction's list of known charities with connections to terrorist activity . This is because the FI has a responsibility to verify the legitimacy and reputation of the beneficiary of the funds, especially if it is a charity or non-profit organization that operates in a high-risk jurisdiction or sector. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should conduct enhanced due diligence on all parties involved in the investigation, including checking various sources of information, such as watch lists, sanctions lists, negative news, and official registries'' (p. 24). The FI should also check if the beneficiary is consistent with the customer's profile and expected activity.
The other options are not as appropriate or effective as option C. Contacting the financial institution in Turkey that has a relationship with Forever Free and advising them of the investigation (A) could violate confidentiality or data protection laws, as well as compromise the investigation or alert the customer or beneficiary of the suspicion. Updating the customer profile to include Forever Free as the recipient of the funds (B) could be premature or inaccurate, as it does not verify the nature and purpose of the transfer or the identity and legitimacy of the beneficiary. Filing a SAR/STR with the new information learned about the beneficiary (D) could also be premature or incomplete, as it does not confirm if there is any suspicious or criminal activity involved in the transfer or if there are any other red flags or indicators.
Which might suggest misuse of crowdfunding resources by a terrorist?
Answer : D
The purchase of airplane tickets after receiving multiple small deposits from a crowdfunding platform might suggest that the funds are being used to facilitate travel for terrorist purposes. The other options are not necessarily indicative of terrorist financing, as they could be explained by legitimate reasons or other types of financial crimes.
Law enforcement (LE) suspects human trafficking to occur during a major sporting event LE officers asked several financial institutions (FIs) to monitor financial transactions occurring before, during, and after the event.
An investigator identified a pattern linked to a business. The business' account received multiple even dollar deposits between midnight and 4:00 AM. They occurred each day for several days prior to the date of the sporting event. Also, large cash deposits, typically between 2,000 USD and 3,000 USD. made by a person to the business' account occurred in many branches in the days after the sports event.
There was little information about the company. The company did not have any history of employee payroll expenses or paying taxes. Expenses from the business account included air travel and hotel expenses. Searches about the person making cash deposits showed little. An online social media platform webpage with the individual's name showed ads for dates1' and "companionship."
The Fl wants to create an automated alert for human trafficking money laundering after this investigation. Which activity type should they target?
Answer : B
The activity type that the FI should target for creating an automated alert for human trafficking money laundering is multiple deposits between midnight and 4:00 AM (B). This is because this pattern is consistent with the indicators of human trafficking identified by the Financial Action Task Force (FATF) and the Egmont Group1, which include:
Frequent cash deposits, often in round amounts, outside of normal business hours
Deposits made at different branches or ATMs in various locations
Lack of information about the nature and purpose of the business
Involvement in online platforms that advertise sexual services
Expenses related to travel and accommodation
The other options are not as relevant or specific as option B. Payments made to multiple hotels in the same city (A) could be a legitimate business expense or a sign of other types of money laundering, such as tax evasion or fraud. Deposits made within days of major sporting events could also be explained by other factors, such as increased tourism or gambling. Payments made for virtual currency (D) are not directly related to human trafficking, although they could be used to facilitate money laundering in general.
Due to an ever-diversifying business model and multi-jurisdictional footprint, a casino has decided to outsource the source of funds and wealth checks to a third-party provider. Why is it important for the casino to maintain control of the output from the provider?
Answer : C
The reason why it is important for the casino to maintain control of the output from the provider is that the casino maintains ultimate responsibility for this activity and should maintain control to avoid non-compliance . This is because the casino is accountable for its own AML/CFT obligations and cannot delegate or outsource them to a third-party provider. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should ensure that it has adequate oversight and control over any third-party providers that it engages for AML/CFT purposes, such as conducting due diligence, verifying information, or monitoring transactions'' (p. 25). The FI should also ''review and evaluate the performance and quality of the third-party providers on a regular basis, and address any issues or gaps that may arise'' (p. 25).
The other options are not as relevant or accurate as option C. The clients of the casino prefer to know that the casino is keeping their information secure when being held by a third-party (A) is not a reason why the casino should maintain control of the output from the provider, but rather a customer expectation or preference. As with all third-party relationships, proper control must be maintained to ensure profitability (B) is not a reason why the casino should maintain control of the output from the provider, but rather a general business principle or objective. Other casinos are frequently looking to reduce costs and share ideas, so if this relationship is successful, the model can be used by other businesses (D) is not a reason why the casino should maintain control of the output from the provider, but rather a potential benefit or outcome.
Which scenarios are common to money laundering through online marketplaces and trade-based money laundering? (Select Two.)
Answer : A, C
Money laundering through online marketplaces and trade-based money laundering both involve the manipulation of the value or quantity of goods to disguise the illicit origin of funds. Over-valuation of the stated price of goods and no evidence of delivery of goods or shipping expenses are two common indicators of such schemes. The other options are not specific to these methods of money laundering.
Which statement most accurately characterizes the methods used by transnational criminal organizations?
Answer : C
The statement that most accurately characterizes the methods used by transnational criminal organizations is that they routinely engage in many different types of criminal activities as long as they think it will benefit them . This is because transnational criminal organizations are flexible and adaptable, and they exploit opportunities and vulnerabilities in different markets and jurisdictions. According to ACAMS2, ''Transnational criminal organizations are involved in a wide range of illicit activities, such as drug trafficking, human trafficking, arms trafficking, money laundering, cybercrime, environmental crime, fraud, corruption, and terrorism'' (p. 3). They also ''operate across borders and regions, using complex networks and structures to evade detection and prosecution'' (p. 3).
The other statements are not as accurate or comprehensive as option C. Transnational criminal organizations are unlikely to associate with known terrorist organizations due to the reputational risks (A) is false, as transnational criminal organizations may collaborate or cooperate with terrorist organizations for mutual benefit or convenience, such as sharing resources, routes, or contacts. Transnational criminal organizations are likely to specialize in one particular method and continue to refine that method to escape detection (B) is false, as transnational criminal organizations may diversify or change their methods depending on the circumstances or opportunities, such as shifting products, markets, or modus operandi. Transnational criminal organizations see each other as competitors and rarely cooperate (D) is false, as transnational criminal organizations may form alliances or partnerships with other criminal groups for strategic or tactical reasons, such as sharing information, expertise, or influence.
An analyst reviews an alert for high volume Automated Clearing House (ACH) activity in an account. The analyst's initial research finds the account is for a commercial daycare account that receives high volumes of large government-funded ACH transactions to support the programs. The account activity consists of checks (cheques) made payable to individual names in varying dollar amounts. One check indicates rent to another business.
An Internet search finds that the daycare company owner has previous government-issued violations for safety and classroom size needs, such as not having enough chairs and tables per enrollee. These violations were issued to a different daycare name.
Simultaneous to this investigation, another analyst sends an email about negative news articles referencing local child/adult daycare companies misusing governmental grants. This prompts the financial institution (Fl) to search all businesses for names containing daycare' or care*. Text searches return a number of facilities as customers at the Fl and detects that three of these businesses have a similar transaction flow of high volume government ACH funding with little to no daycare expenses.
The analyst determines that site visits should be conducted for the three daycare businesses. Which observations at the on-site visits would justify writing a SAR/STR? (Select Three.)
Answer : A, C, F
The observations at the on-site visits that would justify writing a SAR/STR are signs of severe wear and poor maintenance at the site (A), lights turned off at the site during operational hours , and a full parking lot of cars with no staff at the site (F). These observations suggest that the daycare businesses are not operating legitimately or providing adequate services to their customers, and that they may be misusing governmental grants or laundering money through their accounts. These observations are consistent with some of the red flags for fraud identified by ACAMS2, such as:
Inadequate facilities or equipment for the type of business
Lack of visible activity or customers at the business location
Discrepancy between reported income and expenses
Unusual volume or frequency of transactions
The other observations are not as relevant or indicative of fraud as options A, C, and F. A site located in a commercial building (B) could be a normal or legitimate choice for a daycare business, depending on its size, location, and availability. Visible attendance with children being dropped off by parents (D) could show that the daycare business is providing genuine services to its customers, although it does not rule out possible fraud or money laundering. Visible signage indicating the purpose of building (E) could also show that the daycare business is transparent and legitimate, although it does not guarantee its quality or compliance.
Law enforcement (LE) suspects human trafficking to occur during a major spotting event. LE officers asked several financial institutions (FIs) to monitor financial transactions occurring before, during, and after the event.
An investigator identified a pattern linked to a business. The business* account received multiple even dollar deposits between midnight and 4:00 AM. They occurred each day for several days prior to the date of the sporting event. Also, large cash deposits, typically between 2,000 USD and 3.000 USD. made by a person to the business' account occurred in many branches in the days alter the sports event.
There was little information about the company. The company did not have any history of employee payroll expenses or paying taxes. Expenses from the business account included air travel and hotel expenses. Searches about the person making cash deposits showed little. An online social media platform webpage with the individual's name showed ads for dates" and "companionship."
Which fact should not be included in (he SAR/STR narrative?
Answer : B
The fact that should not be included in the SAR/STR narrative is the request by law enforcement (D). This is because the request by law enforcement is confidential and should not be disclosed to the customer or anyone else who is not authorized to know it. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should not include any reference to the LE request in the SAR/STR narrative, as this could compromise the LE investigation or alert the customer of the suspicion'' (p. 35). The FI should also not inform the customer of the LE request or delay filing the SAR/STR because of it.
The other facts should be included in the SAR/STR narrative, as they are relevant and indicative of human trafficking money laundering. The air travel and hotel expenses (A) show that the customer is involved in moving people across different locations, which could be a sign of human smuggling or trafficking. The time of the cash deposits (B) shows that the customer is receiving cash payments during unusual hours, which could be a sign of illicit activities or services. The sporting event shows that the customer is exploiting a high-demand situation for their business, which could be a sign of opportunistic or organized crime.
An analyst reviews an alert for high volume Automated Clearing House (ACH) activity in an account. The analyst's initial research finds the account is for a commercial daycare account that receives high volumes of large government-funded ACH transactions to support the programs. The account activity consists of checks (cheques) made payable to individual names in varying dollar amounts. One check indicates rent to another business.
An Internet search finds that the daycare company owner has previous government-issued violations for safety and classroom size needs, such as not having enough chairs and tables per enrollee. These violations were issued to a different daycare name.
Simultaneous to this investigation, another analyst sends an email about negative news articles referencing local child/adult daycare companies misusing governmental grants. This prompts the financial institution (Fl) to search all businesses for names containing 'daycare' or *care'. Text searches return a number of facilities as customers at the Fl and detects that three of these businesses have a similar transaction flow of high volume government ACH funding with little to no daycare expenses.
Which red flags would be an indicator that activity is connected to a corruption/bribery typology? (Select Two.)
Answer : A, B
The red flags that would be an indicator that activity is connected to a corruption/bribery typology are large checks issued to various individuals with the memos noting ''gift'', ''thank you'', ''favor'' (A) and negative news found on the customer related to government-issued violations for safety (B). These red flags suggest that the customer is involved in paying or receiving bribes or kickbacks to or from government officials or other parties in exchange for favorable treatment or contracts. These red flags are consistent with some of the indicators of corruption/bribery identified by ACAMS1, such as:
Payments made to or from third parties that are not directly related to the business
Payments made to or from high-risk jurisdictions or sectors
Payments made with vague or incomplete descriptions or justifications
Negative news or reputation of the customer or its associates
The other options are not as relevant or indicative of corruption/bribery as options A and B. Checks issued to an unrelated entity referencing ''rent'' and ''utilities'' in the memos could be a legitimate business expense or a sign of other types of fraud or money laundering, such as tax evasion or shell company schemes. Multiple daycare locations with no active business operations or related account activity (D) could also be a sign of other types of fraud or money laundering, such as embezzlement or front company schemes. The same beneficial owner owning several daycare centers in different locations (E) could be a normal or legitimate business practice, depending on the size, location, and profitability of the centers.
The investigative department of a financial institution (Fl) receives an internal escalation notice from the remittance department for a SWIFT message requesting a refund due to potential fraud. The notice indicates that a total of three international incoming remittances were transferred to a corporate customer from Country A, in the amount of approximately 5 million EUR for each. The first two incoming remittances had been exchanged into currency B and transferred out to Country B a few days ago. The third incoming remittance has been held by the remittance department.
As noted from the KYC profile, the corporate customer is working in the wood industry. with the last account review completed 3 months ago. Since the account's opening. there has been no history of a large amount of funds flowing through the account. The investigator conducts an Internet search and finds that the remitter is a food beverage company.
The same morning, the investigator receives a call from a financial intelligence unit (FIU) inquiring about the same incident. The FIU states that it will issue a warrant to freeze the account on the same day.
Which steps for documenting the final investigation decision are appropriate for the investigator in this scenario?
Answer : C
The investigator should document the investigation process and retain all relevant documents in the case management system. This is because documenting the investigation process is a good practice to ensure the quality and consistency of the investigation, as well as to facilitate the review and audit of the investigation. Retaining all relevant documents is also important to support the evidence and findings of the investigation, as well as to comply with the record-keeping requirements of the relevant authorities. The other options are incorrect because:
A . Excluding any open-source information from record-keeping is not advisable, as open-source information can provide valuable insights and context for the investigation, and may not be easily retrievable in the future.
B . Adding all of the information the FI has about the subject, their account(s) activity, research results, KYC information, etc. to the SAR/STR is not necessary, as the SAR/STR should only contain the essential information that is relevant and material to the suspicious activity. Adding too much information may obscure the main points and make the SAR/STR less effective.
D . Not documenting the investigation process if a SAR/STR is not filed is not acceptable, as the investigation process should be documented regardless of the outcome. Documenting the investigation process can help justify why a SAR/STR was not filed, and also provide a reference for future investigations involving the same subject or activity.
Advanced CAMS-FCI Certification | ACAMS, Section 3: Reporting Suspicious Activity, page 14
Leading Complex Investigations Certificate | ACAMS, Module 4: Documenting Your Investigation, page 4
When crafting internal procedures on writing and submitting SARs/STRs, one should:
Answer : B
When writing and submitting SARs/STRs, one should consider the guidelines issued by the national financial intelligence unit (FIU) and local regulator and incorporate any country-specific requirements. This ensures that the reports are compliant with the relevant laws and regulations and provide useful information to the authorities. The other options are either incorrect or not best practices.
Which information is it best practice to share at the very beginning of a well-written SAR/STR narrative?
Answer : B
The best information to share at the very beginning of a well-written SAR/STR narrative is the purpose of the SAR/STR narrative and a general description of the known or alleged violation. This is because this information provides an overview of why the SAR/STR is being filed and what type of suspicious activity or transaction is involved. It also helps to capture the attention of the reader and set the tone for the rest of the narrative.
How does the Financial Action Task Force (FATF) measure the effectiveness of a country's efforts to combat money laundering and terrorist financing?
Answer : A
'The FATF measures the effectiveness of a country's efforts to combat money laundering and terrorist financing through a mutual evaluation process. During a mutual evaluation, the FATF assesses a country's legal and institutional framework, its implementation of measures to combat money laundering and terrorist financing, and the effectiveness of its efforts. The FATF then issues a report with recommendations for improvement' [CAMS Study Guide 6th edition, page 15-16].
A SAR/STR on cash activity is filed for a company registered in the Marshall Islands operating a Mediterranean beach bar and hotel. The company has three nominee directors, one nominee shareholder, and another individual declared as both the beneficial owner and authorized signatory. Which information is key for law enforcement's physical surveillance of cash activity? (Select Two.)
Answer : B, C
The identification details of the beneficial owner and authorized signatory are key for law enforcement's physical surveillance of cash activity, as they would help identify the person who controls and operates the company and who is responsible for its financial transactions. The company's operating address is also key, as it would help locate the premises where the cash activity takes place and observe any suspicious movements or behaviors. The identification details of the nominee shareholder and directors are not relevant, as they are not involved in the management or operation of the company. The company's registered address is also not relevant, as it is likely to be a shell or mailbox address that does not reflect the actual location of the business.
A client at a financial institution deposits large amounts of money into an account, and almost immediately, the funds are then distributed to numerous individuals' accounts. The transaction activity described in the scenario is a pattern of:
Answer : B
Deposit trading is a pattern of suspicious activity where a client deposits large amounts of money into an account, and then transfers the funds to other accounts, often in different jurisdictions or countries. This could be an attempt to disguise the source or destination of the funds, or to avoid reporting requirements. Deposit trading is also known as layering, which is the second stage of money laundering.
A criminal is engaged in chain hopping while trying to launder ransomware payments. The criminal will likely:
Answer : B
Chain hopping is a technique used by criminals to obscure the traceability of cryptocurrency transactions by converting the funds to a different type of cryptocurrency, often using multiple exchanges or platforms. The other options are not related to chain hopping. Reference: Advanced CAMS-FCI Study Guide, page 38.
An investigator at a corporate bank is conducting transaction monitoring alerts clearance.
KYC profile background: An entity customer, doing business offshore in Hong Kong, established a banking business relationship with the bank in 2017 for deposit and loan purposes. It acts as an offshore investment holding company. The customer declared that the ongoing source of funds to this account comes from group-related companies.
* X is the UBO. and owns 97% shares of this entity customer;
* Y is the authorized signatory of this entity customer. This entity customer was previously the subject of a SAR/STR.
KYC PROFILE
Customer Name: AAA International Company. Ltd
Customer ID: 123456
Account Opened: June 2017
Last KYC review date: 15 Nov 2020
Country and Year of Incorporation: The British Virgin Islands, May 2017
AML risk level: High
Account opening and purpose: Deposits, Loans and Trade Finance
Anticipated account activities: 1 to 5 transactions per year and around 1 million per
transaction amount
During the investigation, the investigator reviewed remittance transactions activities for the period from Jul 2019 to Sep 2021 and noted the following transactions pattern:
TRANSACTION JOURNAL
Review dates: from July 2019 to Sept 2021
For Hong Kong Dollars (HKD) currency:
Incoming transactions: 2 inward remittances of around 1.88 million HKD in total from
different third parties
Outgoing transactions: 24 outward remittances of around 9 4 million HKD in total to
different third parties
For United States Dollars (USD) currency:
Incoming transactions: 13 inward remittances of around 3.3 million USD in total from
different third parties
Outgoing transactions: 10 outward remittances of around 9.4 million USD in total to
different third parties.
RFI Information and Supporting documents:
According to the RFI reply received on 26 May 2021, the customer provided the bank
with the information below:
1) All incoming funds received in HKD & USD currencies were monies lent from non-customers of the bank. Copies of loan agreements had been provided as supporting documents. All of the loan agreements were in the same format and all the lenders are engaged in trading business.
2) Some loan agreements were signed among four parties, including among lenders. borrower (the bank's customer), guarantor, and guardian with supplemental agreements, which stated that the customer, as a borrower, who failed to repay the loan
Based on the KYC profile and the transaction journal, the pattern of activity shows a deviation in:
Answer : A
The correct answer is A because the expected account activities were 1 to 5 transactions per year and around 1 million per transaction amount, but the actual activity showed much more frequent and varied transactions in different currencies and amounts. This indicates a deviation from the customer's profile and risk level.
An investigator receives an alert documenting a series of transactions. A limited liability corporation (LLC) wired 59.000,000 USD to an overseas account associated with a state-run oil company. A second account associated with the state-run oil company wired 600,000,000 USD to the LLC. The LLC then wired money to other accounts, a money brokerage firm, and real estate purchases.
The investigator initiated an enhanced KYC investigation on the LLC. The financial institution opened the LLC account a couple of weeks prior to the series of transactions. The names associated with the LLC had changed multiple times since the account opened. A search of those names revealed relations with multiple LLCs. Public records about the LLCs did not show any identifiable business activities.
Open-source research identified mixed reports about the brokerage firm. The firm indicated it purchased mutual funds for its clients and dispensed returns to clients.
Media reports claimed the firm laundered money by holding for a fee before returning it to investors.
The investigator discovers that the bank has no records pertaining to ownership of the LLC. What would this mean for the bank and/or investigator?
Answer : C
The bank is out of compliance with CIP regulations because it did not obtain the minimum identifying information from the customer prior to opening the account, as required by 31 CFR 1020.220(a)(2)(i)(A). The bank should have obtained the name, date of birth, address, and identification number of the customer, as well as verified the identity of the customer to the extent reasonable and practicable. The lack of ownership data may also indicate a violation of beneficial ownership regulations, but that is not the primary issue in this case.
Due to an ever-diversifying business model and multi-jurisdictional footprint, a casino has decided to outsource the source of funds and wealth checks to a third-party provider. Why is it important for the casino to maintain control of the output from the provider?
Answer : C
The reason why it is important for the casino to maintain control of the output from the provider is that the casino maintains ultimate responsibility for this activity and should maintain control to avoid non-compliance . This is because the casino is accountable for its own AML/CFT obligations and cannot delegate or outsource them to a third-party provider. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should ensure that it has adequate oversight and control over any third-party providers that it engages for AML/CFT purposes, such as conducting due diligence, verifying information, or monitoring transactions'' (p. 25). The FI should also ''review and evaluate the performance and quality of the third-party providers on a regular basis, and address any issues or gaps that may arise'' (p. 25).
The other options are not as relevant or accurate as option C. The clients of the casino prefer to know that the casino is keeping their information secure when being held by a third-party (A) is not a reason why the casino should maintain control of the output from the provider, but rather a customer expectation or preference. As with all third-party relationships, proper control must be maintained to ensure profitability (B) is not a reason why the casino should maintain control of the output from the provider, but rather a general business principle or objective. Other casinos are frequently looking to reduce costs and share ideas, so if this relationship is successful, the model can be used by other businesses (D) is not a reason why the casino should maintain control of the output from the provider, but rather a potential benefit or outcome.
Law enforcement (LE) suspects human trafficking to occur during a major sporting event LE officers asked several financial institutions (FIs) to monitor financial transactions occurring before, during, and after the event.
An investigator identified a pattern linked to a business. The business' account received multiple even dollar deposits between midnight and 4:00 AM. They occurred each day for several days prior to the date of the sporting event. Also, large cash deposits, typically between 2,000 USD and 3,000 USD. made by a person to the business' account occurred in many branches in the days after the sports event.
There was little information about the company. The company did not have any history of employee payroll expenses or paying taxes. Expenses from the business account included air travel and hotel expenses. Searches about the person making cash deposits showed little. An online social media platform webpage with the individual's name showed ads for dates1' and "companionship."
The Fl wants to create an automated alert for human trafficking money laundering after this investigation. Which activity type should they target?
Answer : B
The activity type that the FI should target for creating an automated alert for human trafficking money laundering is multiple deposits between midnight and 4:00 AM (B). This is because this pattern is consistent with the indicators of human trafficking identified by the Financial Action Task Force (FATF) and the Egmont Group1, which include:
Frequent cash deposits, often in round amounts, outside of normal business hours
Deposits made at different branches or ATMs in various locations
Lack of information about the nature and purpose of the business
Involvement in online platforms that advertise sexual services
Expenses related to travel and accommodation
The other options are not as relevant or specific as option B. Payments made to multiple hotels in the same city (A) could be a legitimate business expense or a sign of other types of money laundering, such as tax evasion or fraud. Deposits made within days of major sporting events could also be explained by other factors, such as increased tourism or gambling. Payments made for virtual currency (D) are not directly related to human trafficking, although they could be used to facilitate money laundering in general.
SAR/STR NARRATIVE
A SAR/STR has been submitted on five transactions conducted on the correspondent banking relationship with ABC Bank.
Client Information:
Remitter information: DEF Oil Resource Ltd. is the oldest member of the DEF Group. It was founded in 1977 as a general trading business with a primary focus on exports from Africa and North Americ
a. The group has business activities that span the entire energy value chain. Their core field of endeavor is centered within the oil and gas industry and its associated sub-sectors.
Beneficiary Information:
As per the response received from ABC Bank, it was determined that the beneficiaries are related to DEF Oil Resource Ltd. These were created by DEF Oil Resource Ltd. to purchase property in a foreign country on behalf of their senior management as part of a bonus scheme. The purpose behind this payment was for the purchase of property in another country.
Payment Reference:
ABCXXXXX31PZFG2H
ABCXXXXXX51PQGEH
ABCXXXXXX214QWVG
ABCXXXXXX41PSXA2
ABCXXXXXX815QWS3
Concerns:
* We are unsure about the country of incorporation of the beneficiaries.
* We are concerned about the transactional activity since the payment made towards entities (conducted on behalf of individuals) appears to be possible tax evasion.
* There appears to be an attempt to conceal the identity of individuals (senior management), which again raises concerns about the source of funds.
* Referring to the response received from ABC Bank, we are unclear about the ultimate beneficiary of funds.
* The remitter is involved in a high-risk business, (i.e., oil and crude products trading), and the beneficiary is involved in real estate business which again poses a higher risk.
While reviewing the account activity, it is noted that several transfers are sent to a company located in an offshore jurisdiction. Which step should the investigator take next?
Answer : C
The best step for the investigator to take next is to request information about the beneficiaries related to the company. This will help to identify the ultimate beneficial owners of the funds and the purpose of the transactions. Requesting information from the company or filing a SAR/STR to the FIU where the company is located may not be feasible or effective, as the company may not cooperate or the FIU may not have jurisdiction over the offshore entity. Conducting an open-source search may provide some information about the ownership and registration of the company, but it may not be sufficient or reliable to determine the nature and legitimacy of the transactions.
SAR Narrative Guidance Package
Best Practices for Drafting an STR or SAR
In which case should an investigator avoid escalating a suspicious event to the chief compliance officer and pursue other channels?
Answer : B
An investigator should avoid escalating a suspicious event to the chief compliance officer if there is a potential conflict of interest, such as when a close family member of the officer is involved in the transaction. In such a case, the investigator should pursue other channels, such as reporting to a higher authority or an independent committee. The other options do not present a conflict of interest and should be escalated to the chief compliance officer as part of the normal procedure.
An analyst reviews an alert for high volume Automated Clearing House (ACH) activity in an account. The analyst's initial research finds the account is for a commercial daycare account that receives high volumes of large government-funded ACH transactions to support the programs. The account activity consists of checks (cheques) made payable to individual names in varying dollar amounts. One check indicates rent to another business.
An Internet search finds that the daycare company owner has previous government-issued violations for safety and classroom size needs, such as not having enough chairs and tables per enrollee. These violations were issued to a different daycare name.
Simultaneous to this investigation, another analyst sends an email about negative news articles referencing local child/adult daycare companies misusing governmental grants. This prompts the financial institution (Fl) to search all businesses for names containing daycare' or care*. Text searches return a number of facilities as customers at the Fl and detects that three of these businesses have a similar transaction flow of high volume government ACH funding with little to no daycare expenses.
The analyst determines that site visits should be conducted for the three daycare businesses. Which observations at the on-site visits would justify writing a SAR/STR? (Select Three.)
Answer : A, C, F
The observations at the on-site visits that would justify writing a SAR/STR are signs of severe wear and poor maintenance at the site (A), lights turned off at the site during operational hours , and a full parking lot of cars with no staff at the site (F). These observations suggest that the daycare businesses are not operating legitimately or providing adequate services to their customers, and that they may be misusing governmental grants or laundering money through their accounts. These observations are consistent with some of the red flags for fraud identified by ACAMS2, such as:
Inadequate facilities or equipment for the type of business
Lack of visible activity or customers at the business location
Discrepancy between reported income and expenses
Unusual volume or frequency of transactions
The other observations are not as relevant or indicative of fraud as options A, C, and F. A site located in a commercial building (B) could be a normal or legitimate choice for a daycare business, depending on its size, location, and availability. Visible attendance with children being dropped off by parents (D) could show that the daycare business is providing genuine services to its customers, although it does not rule out possible fraud or money laundering. Visible signage indicating the purpose of building (E) could also show that the daycare business is transparent and legitimate, although it does not guarantee its quality or compliance.
Why is a more robust supervisory approach needed by regulators when overseeing small- and medium-sized money service businesses (MSBs) compared to larger MSBs for combatting terrorist financing (TF)?
Answer : D
A more robust supervisory approach is needed by regulators when overseeing small- and medium-sized MSBs compared to larger MSBs for combatting TF because small- and medium-sized MSBs are more at risk of allowing transactions linked to TF due to the lack of skilled compliance resources. Small- and medium-sized MSBs may face challenges in implementing effective AML/CFT controls, such as conducting risk assessments, applying customer due diligence measures, monitoring transactions, detecting suspicious activities, and reporting to the authorities. They may also have limited access to training, guidance, and tools to enhance their compliance capabilities. Therefore, regulators need to provide more supervision and support to small- and medium-sized MSBs to ensure that they comply with the AML/CFT requirements and mitigate the TF risks.
Sustainable Growth for Small and Medium-Sized Enterprises ... - MDPI
Lessons on Resilience for Small and Midsize Businesses - HBR
CLIENT INFORMATION FORM Client Name: ABC Tech Corp Client I.D. Number: 08125 Name: ABC Tech Corp Registered Address: Mumbai, India Work Address: Mumbai. India Cell Phone: ***"--- Alt Phone: Email: ********
Client Profile Information:
Sector: Financial
Engaged in business from (date): 02 Jan 2020
Sub-sector: Software-Cryptocurrency Exchange
Expected Annual Transaction Amount: 125.000 USD
Payment Nature: Transfer received from client's fund
Received from: Clients
Received for: Sale of digital assets
The client identified themselves as "Cryptocurrency Exchange" Client has submitted the limited liability partnership deed. However, the bank's auditing team is unable to identify the client's exact business profile as the cryptocurrency exchange specified by the client as their major business awaits clearance from the country's regulator. The client has submitted documents/communications exchanged with the regulator and has cited the lack of governing laws in the country of their operation as the reason for the delay.
Investigators determine the ultimate beneficial owner of ABC Tech Corp is a high-net-worth client. The client owns a real estate agency left to her when her spouse died. The spouse provided seed capital for ABC Tech Corp through a direct 1,000.000 Great British Pound (GBP) deposit.
What additional information would trigger filing a SAR/STR?
Answer : D
The additional information that would trigger filing a SAR/STR is the fact that the funds for the seed capital were in the form of 50 cashier's checks of 10,000 GBP each and 50 money orders of 10,000 GBP. This is because this indicates a possible attempt to avoid the reporting threshold of 10,000 GBP for cash transactions, which is a common money laundering technique known as structuring or smurfing12. The other options are not necessarily suspicious, as they do not involve cash transactions or indicate any illicit source of funds. The fact that the client's spouse was a PEP does not automatically make the transaction suspicious unless there are other red flags or risk factors associated with the PEP34
Each month the automated transaction monitoring system generates alerts based on predetermined scenarios. An alert was generated in relation to the account activity of ABC Foundation. Below is the transaction history for ABC Foundation (dates are in DD/MM/YYYY format).

The relationship manager for ABC Foundation contacts the client to request more information on the beneficiary of the transfer in Turkey. ABC Foundation advises that this is a not-for-profit charity group called 'Forever Free." Which is the best next step in the investigation?
Answer : C
The best next step in the investigation is to check the jurisdiction's list of known charities with connections to terrorist activity . This is because the FI has a responsibility to verify the legitimacy and reputation of the beneficiary of the funds, especially if it is a charity or non-profit organization that operates in a high-risk jurisdiction or sector. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should conduct enhanced due diligence on all parties involved in the investigation, including checking various sources of information, such as watch lists, sanctions lists, negative news, and official registries'' (p. 24). The FI should also check if the beneficiary is consistent with the customer's profile and expected activity.
The other options are not as appropriate or effective as option C. Contacting the financial institution in Turkey that has a relationship with Forever Free and advising them of the investigation (A) could violate confidentiality or data protection laws, as well as compromise the investigation or alert the customer or beneficiary of the suspicion. Updating the customer profile to include Forever Free as the recipient of the funds (B) could be premature or inaccurate, as it does not verify the nature and purpose of the transfer or the identity and legitimacy of the beneficiary. Filing a SAR/STR with the new information learned about the beneficiary (D) could also be premature or incomplete, as it does not confirm if there is any suspicious or criminal activity involved in the transfer or if there are any other red flags or indicators.
Which action is part of the enhanced due diligence process?
Answer : A
One of the actions that is part of the enhanced due diligence process is collecting beneficial ownership details regarding the client's account. This is important to identify the natural persons who ultimately own or control the client, and to assess the potential risks associated with them. According to the Financial Action Task Force (FATF), beneficial ownership information should include1:
The name, nationality, and country of residence of each beneficial owner.
The date of birth or incorporation of each beneficial owner.
The nature and extent of the beneficial interest held by each beneficial owner.
The means by which the beneficial ownership or control is exercised.
FATF Guidance on Transparency and Beneficial Ownership
Which is a key characteristic of the Financial Action Task Force (FATF) Regional Style Bodies for combatting money laundering/terrorist financing?
Answer : B
According to the CAMS study guide, the Financial Action Task Force (FATF) Regional Style Bodies are organizations created by the FATF to promote the implementation of anti-money laundering and countering the financing of terrorism (AML/CFT) measures in specific regions. One of the key characteristics of these bodies is the implementation of regional mutual evaluation procedures.
Regional mutual evaluations involve member countries evaluating each other's AML/CFT regimes to identify strengths and weaknesses and to develop best practices for improvement. This process allows for greater cooperation between countries and can help to identify and address regional AML/CFT risks more effectively. It also promotes consistency in AML/CFT standards and practices within the region.
Which information is it best practice to share at the very beginning of a well-written SAR/STR narrative?
Answer : B
The best information to share at the very beginning of a well-written SAR/STR narrative is the purpose of the SAR/STR narrative and a general description of the known or alleged violation. This is because this information provides an overview of why the SAR/STR is being filed and what type of suspicious activity or transaction is involved. It also helps to capture the attention of the reader and set the tone for the rest of the narrative.
The investigative department of a financial institution (Fl) receives an internal escalation notice from the remittance department for a SWIFT message requesting a refund due to potential fraud. The notice indicates that a total of three international incoming remittances were transferred to a corporate customer from Country A, in the amount of approximately 5 million EUR for each. The first two incoming remittances had been exchanged into currency B and transferred out to Country B a few days ago. The third incoming remittance has been held by the remittance department.
As noted from the KYC profile, the corporate customer is working in the wood industry. with the last account review completed 3 months ago. Since the account's opening. there has been no history of a large amount of funds flowing through the account. The investigator conducts an Internet search and finds that the remitter is a food beverage company.
The same morning, the investigator receives a call from a financial intelligence unit (FIU) inquiring about the same incident. The FIU states that it will issue a warrant to freeze the account on the same day.
After further review, the decision is made that transactions appear suspicious. Which are the next steps the investigator should take? (Select Two.)
Answer : C, E
The correct answer is C and E. The investigator should provide additional information to the LE upon receiving a formal request, and gather all the information that would be useful for LE and recommend filing a SAR/STR. These steps are consistent with the best practices of conducting financial crime investigations and reporting suspicious activity. The investigator should not close the customer's accounts or the investigation, as this may interfere with the ongoing LE inquiry and violate the FI's policies and procedures. The investigator should also not contact local LE directly, as this may compromise the confidentiality of the investigation and the FIU's authority. Reference:
Advanced CAMS-FCI Study Guide, Chapter 4: Reporting Suspicious Activity, pages 40-411
Advanced CAMS-FCI Study Guide, Chapter 5: Governance of an AFC Investigations Unit, pages 48-491
Advanced CAMS-FCI Certification | ACAMS
During transaction monitoring. Bank A learns that one of their customers. Med Supplies 123, is attempting to make a payment via wire totaling 382,500 USD to PPE Business LLC located in Mexico to purchase a large order of personal protective equipment. specifically surgical masks and face shields. Upon further verification. Bank A decides to escalate and refers the case to investigators.
Bank A notes that, days prior to the above transaction, the same customer went to a Bank A location to wire 1,215,280 USD to Breath Well LTD located in Singapore. Breath Well was acting as an intermediary to purchase both 3-ply surgical masks and face shields from Chin
a. Bank A decided not to complete the transaction due to concerns with the involved supplier in China. Moreover, the customer is attempting to send a third wire in the amount of 350,000 USD for the purchase of these items, this time using a different vendor in China. The investigator must determine next steps in the investigation and what actions, if any. should be taken against relevant parties.
Upon further investigation. Bank As investigator learns that both the Mexico- and Singapore-based companies are linked to the alleged suppliers in China. Which additional indicators would the investigator need to identify to determine if this fits a fentanyl (drug) trafficking typology? (Select Two.)
Answer : A, C
A financial institution
Answer : C
The correct answer is C because the FI is unable to obtain evidence of required licensing or registration despite suspicion of money transmitting, which is a red flag for money laundering and a violation of federal and state laws. Option A is incorrect because making several deposits in one month that appear to exceed their expected monthly income might not be indicative of suspicious activity, depending on the customer's profile and source of funds. Option B is incorrect because receiving a large, one-time wire from a law firm might not be indicative of suspicious activity, depending on the customer's relationship with the law firm and the purpose of the wire. Option D is incorrect because discovering a large number of securities transactions that appear to be related to day trading might not be indicative of suspicious activity, depending on the customer's investment strategy and risk tolerance.
A client that runs a non-profit organization that aids refugees in leaving their home countries received a remittance from a money services business that was ten times the average. The client was recently detained for providing falsified passports to illegal immigrants. Which predicate offenses could be considered in the SAR/STR? (Select Two.)
Answer : A, B
The correct answer is A and B because human smuggling/trafficking and terrorist financing are both predicate offenses for money laundering that could be related to the client's activities. Option C is incorrect because there is no indication of narcotics trafficking in the scenario. Option D is incorrect because there is no indication of antiques smuggling in the scenario. Option E is incorrect because there is no indication of tax evasion in the scenario.
Which payment method for purchasing luxury items is a red flag for potential money laundering?
Answer : B
According to the Financial Action Task Force (FATF), the use of large amounts of cash is a common method for money launderers to move illicit funds [1]. Purchasing luxury items with cash can indicate an attempt to convert illegal funds into tangible assets that can be easily resold or moved across borders. As a result, businesses that deal with luxury items are required to implement enhanced due diligence measures, including monitoring transactions involving large amounts of cash [1].
A criminal is engaged in chain hopping while trying to launder ransomware payments. The criminal will likely:
Answer : B
Chain hopping is a technique used by criminals to obscure the traceability of cryptocurrency transactions by converting the funds to a different type of cryptocurrency, often using multiple exchanges or platforms. The other options are not related to chain hopping. Reference: Advanced CAMS-FCI Study Guide, page 38.
An investigator is reviewing an alert for unusual activity. System scanning detected a text string within a company customer's account transactions that indicates the account may have been used for a drug or drug paraphernalia purchase Based on the KYC profile, the investigator determines the customer's company name and business type are marketed as a gardening supplies company. The investigator reviews the account activity and notes an online purchase transaction that leads the investigator to a website that sells various strains of marijuan
a. Additional account review detects cash deposits into the account at the branch teller lines, so the investigator reaches out to the teller staff regarding the transactions. The teller staff member reports that the business customers have frequently deposited cash in lower amounts. The teller, without prompting, adds that one of the transactors would occasionally smell of a distinct scent of marijuana smoke.
Which are the best next steps for the investigator to take? (Select Three.)
Answer : A, C, E
The best next steps for the investigator to take are:
A . Review the customer's transaction history. This can help the investigator identify any patterns or anomalies in the customer's account activity, such as changes in transaction volume, frequency, amount, source, destination, purpose, etc. The investigator can also compare the customer's transaction history with their KYC profile and risk rating to assess if there are any discrepancies or inconsistencies.
C . Check internal KYC information. This can help the investigator verify the customer's identity, business nature, ownership structure, expected activity, source of funds, etc. The investigator can also update or enhance the customer's KYC information based on any new or relevant information obtained from other sources.
E Conduct adverse media and open-source searches on the customer's background. This can help the investigator find out if there is any negative or adverse information about the customer in public data sources, such as news articles, social media posts, blogs, forums, etc. Adverse media and open-source searches can also provide additional context and insight into the customer's reputation, behavior, associations, etc. The other options are incorrect because:
B . Request information from the internet service provider who hosts the website is not feasible, as it may require a legal process or a court order to obtain such information. Moreover, the internet service provider may not have or disclose any useful information about the website or its owner.
D . Research other customer accounts for transactions to the same website is not relevant, as it may not provide any meaningful information about the customer under investigation. Furthermore, it may violate the privacy and confidentiality of other customers who are not related to the investigation.
F . Identify if the customer has opened accounts in an urban city area is not helpful, as it may not have any bearing on the customer's involvement in a drug or drug paraphernalia purchase. Additionally, it may not be possible to access or verify such information without the customer's consent or authorization.
Advanced CAMS-FCI Certification | ACAMS, Section 2: Investigating Financial Crimes, page 11
Leading Complex Investigations Certificate | ACAMS, Module 3: Conducting Research and Analysis, page 6
Adverse Media Screening - Using AI to Mitigate Risk
Legal requirements for adverse media screening - Thomson Reuters
Electronic client due diligence | Ethics helpsheets | ICAEW
6AMLD & FATF: Where Adverse Media Screening Fits In
Free Adverse Media Check | NameScan
Due to an ever-diversifying business model and multi-jurisdictional footprint, a casino has decided to outsource the source of funds and wealth checks to a third-party provider. Why is it important for the casino to maintain control of the output from the provider?
Answer : C
The reason why it is important for the casino to maintain control of the output from the provider is that the casino maintains ultimate responsibility for this activity and should maintain control to avoid non-compliance . This is because the casino is accountable for its own AML/CFT obligations and cannot delegate or outsource them to a third-party provider. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should ensure that it has adequate oversight and control over any third-party providers that it engages for AML/CFT purposes, such as conducting due diligence, verifying information, or monitoring transactions'' (p. 25). The FI should also ''review and evaluate the performance and quality of the third-party providers on a regular basis, and address any issues or gaps that may arise'' (p. 25).
The other options are not as relevant or accurate as option C. The clients of the casino prefer to know that the casino is keeping their information secure when being held by a third-party (A) is not a reason why the casino should maintain control of the output from the provider, but rather a customer expectation or preference. As with all third-party relationships, proper control must be maintained to ensure profitability (B) is not a reason why the casino should maintain control of the output from the provider, but rather a general business principle or objective. Other casinos are frequently looking to reduce costs and share ideas, so if this relationship is successful, the model can be used by other businesses (D) is not a reason why the casino should maintain control of the output from the provider, but rather a potential benefit or outcome.
A client at a financial institution deposits large amounts of money into an account, and almost immediately, the funds are then distributed to numerous individuals' accounts. The transaction activity described in the scenario is a pattern of:
Answer : B
Deposit trading is a pattern of suspicious activity where a client deposits large amounts of money into an account, and then transfers the funds to other accounts, often in different jurisdictions or countries. This could be an attempt to disguise the source or destination of the funds, or to avoid reporting requirements. Deposit trading is also known as layering, which is the second stage of money laundering.
Law enforcement (LE) suspects human trafficking to occur during a major spotting event. LE officers asked several financial institutions (FIs) to monitor financial transactions occurring before, during, and after the event.
An investigator identified a pattern linked to a business. The business* account received multiple even dollar deposits between midnight and 4:00 AM. They occurred each day for several days prior to the date of the sporting event. Also, large cash deposits, typically between 2,000 USD and 3.000 USD. made by a person to the business' account occurred in many branches in the days alter the sports event.
There was little information about the company. The company did not have any history of employee payroll expenses or paying taxes. Expenses from the business account included air travel and hotel expenses. Searches about the person making cash deposits showed little. An online social media platform webpage with the individual's name showed ads for dates" and "companionship."
Which fact should not be included in (he SAR/STR narrative?
Answer : B
The fact that should not be included in the SAR/STR narrative is the request by law enforcement (D). This is because the request by law enforcement is confidential and should not be disclosed to the customer or anyone else who is not authorized to know it. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should not include any reference to the LE request in the SAR/STR narrative, as this could compromise the LE investigation or alert the customer of the suspicion'' (p. 35). The FI should also not inform the customer of the LE request or delay filing the SAR/STR because of it.
The other facts should be included in the SAR/STR narrative, as they are relevant and indicative of human trafficking money laundering. The air travel and hotel expenses (A) show that the customer is involved in moving people across different locations, which could be a sign of human smuggling or trafficking. The time of the cash deposits (B) shows that the customer is receiving cash payments during unusual hours, which could be a sign of illicit activities or services. The sporting event shows that the customer is exploiting a high-demand situation for their business, which could be a sign of opportunistic or organized crime.
An investigator is reviewing an alert for unusual activity. System scanning detected a text string within a company customer's account transactions that indicates the account may have been used for a drug or drug paraphernalia purchase. Based on the KYC profile, the investigator determines the customer's company name and business type are marketed as a gardening supplies company. The investigator reviews the account activity and notes an online purchase transaction that leads the investigator to a website that sells various strains of marijuan
a. Additional account review detects cash deposits into the account at the branch teller lines, so the investigator reaches out to the teller staff regarding the transactions. The teller staff member reports that the business customers have frequently deposited cash in lower amounts. The teller, without prompting, adds that one of the transactors would occasionally smell of a distinct scent of marijuana smoke.
Which information should be included in the SAR/STR?
Answer : C
The SAR/STR should include any information that is relevant to the suspicious activity, such as the customer information, the transaction details, and any other indicators of potential money laundering or criminal activity. The fact that one of the transactors occasionally smelled of marijuana smoke is an indicator that the customer may be involved in the illicit drug trade, which is a predicate offense for money laundering. Therefore, this information should be included in the SAR/STR. Reference: Advanced CAMS-FCI Study Guide, page 25.
Law enforcement agents arrive at a broker-dealer's premises with a search warrant. In addition to cooperation with the warrant, which instructions should the person in charge of the broker-dealer provide to their employees?
Answer : A
The instruction that the person in charge of the broker-dealer should provide to their employees is to take notes on the questions and comments made by the agents (A). This is because taking notes can help the employees to recall and document what happened during the search warrant execution, which can be useful for legal or regulatory purposes. According to ACAMS3, ''the FI should instruct its staff to cooperate with LE agents during a search warrant execution, but also to take notes of what is being searched, seized, or asked by the agents'' (p. 35). The FI should also ''keep copies of any documents or records that are taken by LE agents'' (p. 35).
The other instructions are not correct. The person in charge of the broker-dealer should not instruct their employees to sign consent forms permitting the agents to search employees' offices (B), as this is unnecessary and potentially risky, as the agents already have a valid search warrant that authorizes them to search the premises. The person in charge of the broker-dealer should not instruct their employees to provide agents with unlimited access to customers' personal data , as this could violate privacy or data protection laws, as well as compromise customer trust and confidentiality. The person in charge of the broker-dealer should not instruct their employees to volunteer information not requested by the agents that they think may be useful (D), as this could interfere with the LE investigation or expose them to legal or regulatory risks.
Introduction to Transnational Organized Crime
ACAMS Law Enforcement and Financial Crimes Investigations eLearning Course Module
Law Enforcement Requests and Actions
Which most likely indicates that a business email compromise attack has occurred?
Answer : A
When writing or reviewing a SAR/STR, it is important to ensure that the narrative is kept to the point; easy to read; and addresses the who, what, when, where, why, and how. This is because the narrative is the most crucial part of the SAR/STR, as it provides a clear and concise summary of the suspicious activity or transaction that triggered the report. The narrative should include all the relevant information that would help law enforcement or regulators to understand the nature and context of the activity or transaction, such as123:
The who: The names, addresses, account numbers, and other identifying information of the parties involved in the activity or transaction, such as customers, beneficiaries, intermediaries, or third parties.
The what: The type, amount, frequency, and purpose of the activity or transaction, such as cash deposits, wire transfers, check payments, or purchases of goods or services.
The when: The date, time, and duration of the activity or transaction, and whether it was a one-time occurrence or part of a pattern or trend.
The where: The location or channel of the activity or transaction, such as branches, ATMs, online platforms, or mobile applications.
The why: The reason or rationale for the activity or transaction, and why it was considered suspicious or unusual based on the customer's profile, behavior, or expected activity.
The how: The method or mechanism of the activity or transaction, such as cash, check, debit card, credit card, cryptocurrency, or prepaid card.
How to write the perfect ''Suspicious Activity Reports'' (SAR)? | i-AML
Writing for Prosecution: Best Practices For Composing SAR Narratives That Assist Prosecutors | ACAMS
SAR Writing Examples and Proper Formatting: Write for Your Reader - Alessa
A SAR/STR on cash activity is filed for a company registered in the Marshall Islands operating a Mediterranean beach bar and hotel. The company has three nominee directors, one nominee shareholder, and another individual declared as both the beneficial owner and authorized signatory. Which information is key for law enforcement's physical surveillance of cash activity? (Select Two.)
Answer : B, C
The identification details of the beneficial owner and authorized signatory are key for law enforcement's physical surveillance of cash activity, as they would help identify the person who controls and operates the company and who is responsible for its financial transactions. The company's operating address is also key, as it would help locate the premises where the cash activity takes place and observe any suspicious movements or behaviors. The identification details of the nominee shareholder and directors are not relevant, as they are not involved in the management or operation of the company. The company's registered address is also not relevant, as it is likely to be a shell or mailbox address that does not reflect the actual location of the business.
When writing or reviewing a SAR/STR, it is important to:
Answer : A
The correct answer is A because a SAR/STR narrative should be concise, clear, and complete, addressing the who, what, when, where, why, and how of the suspicious activity. Option B is incorrect because providing too much information can make the narrative confusing and irrelevant. Option C is incorrect because the introduction should provide a summary of the suspicious activity, not the conclusion. Option D is incorrect because suspect names should be mentioned in the narrative to identify the parties involved in the suspicious activity.
An AML investigator at a bank identifies an unusually high number of deposits from a few customers resulting from the encashment of multiple gambling tickets from a legitimate gambling company. It is noted that the transactions are inconsistent with the customers' profiles and that reverse (corrective) transactions did not occur. Which suspicious activity is most likely?
Answer : A
The correct answer is A because this scenario describes a possible case of ticket laundering, which is a form of money laundering where criminals use gambling tickets to disguise the source of their illicit funds. The customers who deposit the tickets are either complicit or unaware of the scheme, and they receive a commission or a fee for their service. The other options are not likely because they do not explain why the customers would deposit multiple tickets from the same gambling company and withdraw cash the next day.
The training department is conducting awareness training for unusual customer identification scenarios. Which two indicators should be included? (Select Two.)
Answer : A, B
This information can be found in the Certified Anti-Money Laundering Specialist (CAMS) study guide, 6th edition, under the section on Unusual Customer Identification Scenarios. The guide explains that two indicators that should be included in awareness training for unusual customer identification scenarios are:
A . The customer opens the account in the name of a family member who begins making large deposits.
This is an indicator of potential structuring, where a customer may be attempting to avoid triggering reporting thresholds by depositing funds in smaller amounts over time. It is important for staff to be aware of this scenario and to monitor accounts for potential suspicious activity.
B . The customer's name and home address cannot be verified.
This is an indicator of potential identity theft or other fraudulent activity. If a customer's identifying information cannot be verified, it is important for staff to conduct additional due diligence to ensure that the customer is legitimate and that the account is not being used for illicit purposes.
A client that runs a non-profit organization that aids refugees in leaving their home countries received a remittance from a money services business that was ten times the average. The client was recently detained for providing falsified passports to illegal immigrants. Which predicate offenses could be considered in the SAR/STR? (Select Two.)
Answer : A, B
The correct answer is A and B because human smuggling/trafficking and terrorist financing are both predicate offenses for money laundering that could be related to the client's activities. Option C is incorrect because there is no indication of narcotics trafficking in the scenario. Option D is incorrect because there is no indication of antiques smuggling in the scenario. Option E is incorrect because there is no indication of tax evasion in the scenario.
An investigator at a corporate bank is conducting transaction monitoring alerts clearance.
KYC profile background: An entity customer, doing business offshore in Hong Kong, established a banking business relationship with the bank in 2017 for deposit and loan purposes. It acts as an offshore investment holding company. The customer declared that the ongoing source of funds to this account comes from group-related companies.
* X is the UBO. and owns 97% shares of this entity customer;
* Y is the authorized signatory of this entity customer. This entity customer was previously the subject of a SAR/STR.
KYC PROFILE
Customer Name: AAA International Company. Ltd
Customer ID: 123456
Account Opened: June 2017
Last KYC review date: 15 Nov 2020
Country and Year of Incorporation: The British Virgin Islands, May 2017
AML risk level: High
Account opening and purpose: Deposits, Loans and Trade Finance
Anticipated account activities: 1 to 5 transactions per year and around 1 million per
transaction amount
During the investigation, the investigator reviewed remittance transactions activities for the period from Jul 2019 to Sep 2021 and noted the following transactions pattern:
TRANSACTION JOURNAL
Review dates: from July 2019 to Sept 2021
For Hong Kong Dollars (HKD) currency:
Incoming transactions: 2 inward remittances of around 1.88 million HKD in total from
different third parties
Outgoing transactions: 24 outward remittances of around 9 4 million HKD in total to
different third parties
For United States Dollars (USD) currency:
Incoming transactions: 13 inward remittances of around 3.3 million USD in total from
different third parties
Outgoing transactions: 10 outward remittances of around 9.4 million USD in total to
different third parties.
RFI Information and Supporting documents:
According to the RFI reply received on 26 May 2021, the customer provided the bank
with the information below:
1) All incoming funds received in HKD & USD currencies were monies lent from non-customers of the bank. Copies of loan agreements had been provided as supporting documents. All of the loan agreements were in the same format and all the lenders are engaged in trading business.
2) Some loan agreements were signed among four parties, including among lenders. borrower (the bank's customer), guarantor, and guardian with supplemental agreements, which stated that the customer, as a borrower, who failed to repay the loan
Based on the KYC profile and the transaction journal, the pattern of activity shows a deviation in:
Answer : A
The correct answer is A because the expected account activities were 1 to 5 transactions per year and around 1 million per transaction amount, but the actual activity showed much more frequent and varied transactions in different currencies and amounts. This indicates a deviation from the customer's profile and risk level.
A U.S. financial institution (Fl) receives a grand jury subpoena for a corporate client's account. The Fl should:
Answer : B
The Fl should review the corporate account's activity and transactions. This is because a grand jury subpoena is a legal request for information or testimony that may be used in a criminal investigation or prosecution. The Fl should review the account for any suspicious or unusual activity that may be related to the subpoena or indicate money laundering, terrorist financing, or other financial crimes. The Fl should also document its review and retain any relevant records.
During transaction monitoring. Bank A learns that one of their customers. Med Supplies 123, is attempting to make a payment via wire totaling 382,500 USD to PPE Business LLC located in Mexico to purchase a large order of personal protective equipment. specifically surgical masks and face shields. Upon further verification. Bank A decides to escalate and refers the case to investigators.
Bank A notes that, days prior to the above transaction, the same customer went to a Bank A location to wire 1,215,280 USD to Breath Well LTD located in Singapore. Breath Well was acting as an intermediary to purchase both 3-ply surgical masks and face shields from Chin
a. Bank A decided not to complete the transaction due to concerns with the involved supplier in China. Moreover, the customer is attempting to send a third wire in the amount of 350,000 USD for the purchase of these items, this time using a different vendor in China. The investigator must determine next steps in the investigation and what actions, if any. should be taken against relevant parties.
Upon further investigation. Bank As investigator learns that both the Mexico- and Singapore-based companies are linked to the alleged suppliers in China. Which additional indicators would the investigator need to identify to determine if this fits a fentanyl (drug) trafficking typology? (Select Two.)
Answer : A, C
Due to an ever-diversifying business model and multi-jurisdictional footprint, a casino has decided to outsource the source of funds and wealth checks to a third-party provider. Why is it important for the casino to maintain control of the output from the provider?
Answer : C
The reason why it is important for the casino to maintain control of the output from the provider is that the casino maintains ultimate responsibility for this activity and should maintain control to avoid non-compliance . This is because the casino is accountable for its own AML/CFT obligations and cannot delegate or outsource them to a third-party provider. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should ensure that it has adequate oversight and control over any third-party providers that it engages for AML/CFT purposes, such as conducting due diligence, verifying information, or monitoring transactions'' (p. 25). The FI should also ''review and evaluate the performance and quality of the third-party providers on a regular basis, and address any issues or gaps that may arise'' (p. 25).
The other options are not as relevant or accurate as option C. The clients of the casino prefer to know that the casino is keeping their information secure when being held by a third-party (A) is not a reason why the casino should maintain control of the output from the provider, but rather a customer expectation or preference. As with all third-party relationships, proper control must be maintained to ensure profitability (B) is not a reason why the casino should maintain control of the output from the provider, but rather a general business principle or objective. Other casinos are frequently looking to reduce costs and share ideas, so if this relationship is successful, the model can be used by other businesses (D) is not a reason why the casino should maintain control of the output from the provider, but rather a potential benefit or outcome.
Which is a key characteristic of the Financial Action Task Force (FATF) Regional Style Bodies for combatting money laundering/terrorist financing?
Answer : B
According to the CAMS study guide, the Financial Action Task Force (FATF) Regional Style Bodies are organizations created by the FATF to promote the implementation of anti-money laundering and countering the financing of terrorism (AML/CFT) measures in specific regions. One of the key characteristics of these bodies is the implementation of regional mutual evaluation procedures.
Regional mutual evaluations involve member countries evaluating each other's AML/CFT regimes to identify strengths and weaknesses and to develop best practices for improvement. This process allows for greater cooperation between countries and can help to identify and address regional AML/CFT risks more effectively. It also promotes consistency in AML/CFT standards and practices within the region.
During onboarding al Private Bank A, client C indicated that the account would be initially funded with a transfer from Bank B totaling 50 million USD. On which source of funds should Bank A conduct additional scrutiny? (Select Two.)
Answer : B, D
The sources of funds that Bank A should conduct additional scrutiny on are the third-party transfer and the transfer from Bank B. This is because these sources may pose higher risks of money laundering, terrorist financing, fraud, or other illicit activities. Some of the reasons why these sources require more scrutiny are23:
Third-party transfers may involve unknown or unrelated parties that may have ulterior motives or hidden agendas. They may also be used to obscure the origin or destination of funds, or to circumvent sanctions or other regulatory restrictions.
Transfers from Bank B may involve jurisdictions that have weak anti-money laundering and counter-terrorist financing (AML/CFT) regimes, high levels of corruption, or significant criminal activity. They may also involve banks that have poor reputation, compliance, or transparency standards.
Third Party Payments - Wolfsberg Group
Guidance on Correspondent Banking Services - FATF
Law enforcement (LE) suspects human trafficking to occur during a major sporting event LE officers asked several financial institutions (FIs) to monitor financial transactions occurring before, during, and after the event.
An investigator identified a pattern linked to a business. The business' account received multiple even dollar deposits between midnight and 4:00 AM. They occurred each day for several days prior to the date of the sporting event. Also, large cash deposits, typically between 2,000 USD and 3,000 USD. made by a person to the business' account occurred in many branches in the days after the sports event.
There was little information about the company. The company did not have any history of employee payroll expenses or paying taxes. Expenses from the business account included air travel and hotel expenses. Searches about the person making cash deposits showed little. An online social media platform webpage with the individual's name showed ads for dates1' and "companionship."
The Fl wants to create an automated alert for human trafficking money laundering after this investigation. Which activity type should they target?
Answer : B
The activity type that the FI should target for creating an automated alert for human trafficking money laundering is multiple deposits between midnight and 4:00 AM (B). This is because this pattern is consistent with the indicators of human trafficking identified by the Financial Action Task Force (FATF) and the Egmont Group1, which include:
Frequent cash deposits, often in round amounts, outside of normal business hours
Deposits made at different branches or ATMs in various locations
Lack of information about the nature and purpose of the business
Involvement in online platforms that advertise sexual services
Expenses related to travel and accommodation
The other options are not as relevant or specific as option B. Payments made to multiple hotels in the same city (A) could be a legitimate business expense or a sign of other types of money laundering, such as tax evasion or fraud. Deposits made within days of major sporting events could also be explained by other factors, such as increased tourism or gambling. Payments made for virtual currency (D) are not directly related to human trafficking, although they could be used to facilitate money laundering in general.
SAR/STR NARRATIVE
A SAR/STR has been submitted on five transactions conducted on the correspondent banking relationship with ABC Bank.
Client Information:
Remitter information: DEF Oil Resource Ltd. is the oldest member of the DEF Group. It was founded in 1977 as a general trading business with a primary focus on exports from Africa and North Americ
a. The group has business activities that span the entire energy value chain. Their core field of endeavor is centered within the oil and gas industry and its associated sub-sectors.
Beneficiary Information:
As per the response received from ABC Bank, it was determined that the beneficiaries are related to DEF Oil Resource Ltd. These were created by DEF Oil Resource Ltd. to purchase property in a foreign country on behalf of their senior management as part of a bonus scheme. The purpose behind this payment was for the purchase of property in another country.
Payment Reference:
ABCXXXXX31PZFG2H
ABCXXXXXX51PQGEH
ABCXXXXXX214QWVG
ABCXXXXXX41PSXA2
ABCXXXXXX815QWS3
Concerns:
* We are unsure about the country of incorporation of the beneficiaries.
* We are concerned about the transactional activity since the payment made towards entities (conducted on behalf of individuals) appears to be possible tax evasion.
* There appears to be an attempt to conceal the identity of individuals (senior management), which again raises concerns about the source of funds.
* Referring to the response received from ABC Bank, we are unclear about the ultimate beneficiary of funds.
* The remitter is involved in a high-risk business, (i.e., oil and crude products trading), and the beneficiary is involved in real estate business which again poses a higher risk.
While reviewing the account activity, it is noted that several transfers are sent to a company located in an offshore jurisdiction. Which step should the investigator take next?
Answer : C
The best step for the investigator to take next is to request information about the beneficiaries related to the company. This will help to identify the ultimate beneficial owners of the funds and the purpose of the transactions. Requesting information from the company or filing a SAR/STR to the FIU where the company is located may not be feasible or effective, as the company may not cooperate or the FIU may not have jurisdiction over the offshore entity. Conducting an open-source search may provide some information about the ownership and registration of the company, but it may not be sufficient or reliable to determine the nature and legitimacy of the transactions.
SAR Narrative Guidance Package
Best Practices for Drafting an STR or SAR
An analyst reviews an alert for high volume Automated Clearing House (ACH) activity in an account. The analyst's initial research finds the account is for a commercial daycare account that receives high volumes of large government-funded ACH transactions to support the programs. The account activity consists of checks (cheques) made payable to individual names in varying dollar amounts. One check indicates rent to another business.
An Internet search finds that the daycare company owner has previous government-issued violations for safety and classroom size needs, such as not having enough chairs and tables per enrollee. These violations were issued to a different daycare name.
Simultaneous to this investigation, another analyst sends an email about negative news articles referencing local child/adult daycare companies misusing governmental grants. This prompts the financial institution (Fl) to search all businesses for names containing 'daycare' or *care'. Text searches return a number of facilities as customers at the Fl and detects that three of these businesses have a similar transaction flow of high volume government ACH funding with little to no daycare expenses.
Which red flags would be an indicator that activity is connected to a corruption/bribery typology? (Select Two.)
Answer : A, B
The red flags that would be an indicator that activity is connected to a corruption/bribery typology are large checks issued to various individuals with the memos noting ''gift'', ''thank you'', ''favor'' (A) and negative news found on the customer related to government-issued violations for safety (B). These red flags suggest that the customer is involved in paying or receiving bribes or kickbacks to or from government officials or other parties in exchange for favorable treatment or contracts. These red flags are consistent with some of the indicators of corruption/bribery identified by ACAMS1, such as:
Payments made to or from third parties that are not directly related to the business
Payments made to or from high-risk jurisdictions or sectors
Payments made with vague or incomplete descriptions or justifications
Negative news or reputation of the customer or its associates
The other options are not as relevant or indicative of corruption/bribery as options A and B. Checks issued to an unrelated entity referencing ''rent'' and ''utilities'' in the memos could be a legitimate business expense or a sign of other types of fraud or money laundering, such as tax evasion or shell company schemes. Multiple daycare locations with no active business operations or related account activity (D) could also be a sign of other types of fraud or money laundering, such as embezzlement or front company schemes. The same beneficial owner owning several daycare centers in different locations (E) could be a normal or legitimate business practice, depending on the size, location, and profitability of the centers.
When crafting internal procedures on writing and submitting SARs/STRs, one should:
Answer : B
When writing and submitting SARs/STRs, one should consider the guidelines issued by the national financial intelligence unit (FIU) and local regulator and incorporate any country-specific requirements. This ensures that the reports are compliant with the relevant laws and regulations and provide useful information to the authorities. The other options are either incorrect or not best practices.
Which statement most accurately characterizes the methods used by transnational criminal organizations?
Answer : C
The statement that most accurately characterizes the methods used by transnational criminal organizations is that they routinely engage in many different types of criminal activities as long as they think it will benefit them . This is because transnational criminal organizations are flexible and adaptable, and they exploit opportunities and vulnerabilities in different markets and jurisdictions. According to ACAMS2, ''Transnational criminal organizations are involved in a wide range of illicit activities, such as drug trafficking, human trafficking, arms trafficking, money laundering, cybercrime, environmental crime, fraud, corruption, and terrorism'' (p. 3). They also ''operate across borders and regions, using complex networks and structures to evade detection and prosecution'' (p. 3).
The other statements are not as accurate or comprehensive as option C. Transnational criminal organizations are unlikely to associate with known terrorist organizations due to the reputational risks (A) is false, as transnational criminal organizations may collaborate or cooperate with terrorist organizations for mutual benefit or convenience, such as sharing resources, routes, or contacts. Transnational criminal organizations are likely to specialize in one particular method and continue to refine that method to escape detection (B) is false, as transnational criminal organizations may diversify or change their methods depending on the circumstances or opportunities, such as shifting products, markets, or modus operandi. Transnational criminal organizations see each other as competitors and rarely cooperate (D) is false, as transnational criminal organizations may form alliances or partnerships with other criminal groups for strategic or tactical reasons, such as sharing information, expertise, or influence.
Refer to the exhibit.

During a review of the accounts related to Richard Aston, an investigator notices a high number of incoming payments from various individuals. They also notice that these incoming payments typically occur during large sporting events or conferences. As a result of the account review, of which illegal activity does the investigator have reasonable grounds to suspect Richard Aston?
Answer : B
The illegal activity that the investigator has reasonable grounds to suspect Richard Aston of is aftermarket sales of entertainment admission tickets. This is because aftermarket sales of entertainment admission tickets involve reselling tickets for events, concerts, festivals, etc. at a higher price than their face value, often through online platforms or scalpers. This practice can be illegal or unethical, depending on the jurisdiction and the terms and conditions of the original ticket seller. The investigator should look for indicators of aftermarket sales of entertainment admission tickets, such as high volume or frequency of incoming payments from various individuals, correlation between incoming payments and major events or conferences, and discrepancy between the customer's profile and the nature of the transactions. The other options are incorrect because:
A . Embezzling from the hotel is not likely, as it would involve stealing money or property from the hotel by an employee or a person in a position of trust. There is no evidence that Richard Aston works for or has access to the hotel's assets.
C . Human trafficking is not probable, as it would involve exploiting people for forced labor or commercial sexual exploitation. There is no indication that Richard Aston is involved in any form of human trafficking or has any connection to victims or perpetrators.
D . Sports betting is not plausible, as it would involve wagering money on the outcome of sporting events or games. There is no sign that Richard Aston is engaged in any sports betting activity or has any association with bookmakers or gamblers.
Advanced CAMS-FCI Certification | ACAMS, Section 2: Investigating Financial Crimes, page 10
TicketSwap: The safest way to buy and sell tickets
Ticketing 101 | Ticketmaster
10 Types of Tickets For Events (+ Why & When To Use Them) - Eventbrite
Which action is part of the enhanced due diligence process?
Answer : A
One of the actions that is part of the enhanced due diligence process is collecting beneficial ownership details regarding the client's account. This is important to identify the natural persons who ultimately own or control the client, and to assess the potential risks associated with them. According to the Financial Action Task Force (FATF), beneficial ownership information should include1:
The name, nationality, and country of residence of each beneficial owner.
The date of birth or incorporation of each beneficial owner.
The nature and extent of the beneficial interest held by each beneficial owner.
The means by which the beneficial ownership or control is exercised.
FATF Guidance on Transparency and Beneficial Ownership
A client with many personal and business deposits with the financial institution (Fl) seeks a business loan. The client wants to guarantee the loan with a trust for which they are the beneficiary.
An investigator examines the trust. The trust has many layers, including shell companies in known tax havens. The client's ultimate beneficial ownership claim cannot be validated, and the loan is denied.
Two months later, the Fl receives a law enforcement (LE) request on one of the client's business accounts. While reviewing the business account, the Fl receives another LE request on the same account from another agency. The requested information is shared.
Three months later, a branch manager receives a request to open a business deposit account related to a complex trust. The manager forwarded the request because of the complexity. The trust was the same as the previously examined trust, but the request came from a different client. The second client also has many accounts with the Fl. Further inspection finds links between the second client and the Paradise Papers. The Papers state the client led illegal activities and committed tax evasion.
What steps should the investigator perform in reference to the first client's existing accounts? (Select Three.)
Answer : A, D, F
The investigator should review all client-signed documents relating to all accounts (A) to check for any discrepancies or red flags. The investigator should also perform secondary scans of the client's other owners/authorized signers (D) to identify any possible connections or associations with the second client or the Paradise Papers. Additionally, the investigator should prepare a relationship flow chart of all existing accounts (F) to better understand the client's activities and patterns. These steps are consistent with the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, which states that investigators should ''review all relevant documentation, including account opening documents, transaction records, and customer correspondence'' (p. 23), ''conduct enhanced due diligence on all parties involved in the investigation'' (p. 24), and ''use data visualization tools to map out complex relationships and transactions'' (p. 25).
The investigative department of a financial institution (Fl) receives an internal escalation notice from the remittance department for a SWIFT message requesting a refund due to potential fraud. The notice indicates that a total of three international incoming remittances were transferred to a corporate customer from Country A, in the amount of approximately 5 million EUR for each. The first two incoming remittances had been exchanged into currency B and transferred out to Country B a few days ago. The third incoming remittance has been held by the remittance department.
As noted from the KYC profile, the corporate customer is working in the wood industry. with the last account review completed 3 months ago. Since the account's opening. there has been no history of a large amount of funds flowing through the account. The investigator conducts an Internet search and finds that the remitter is a food beverage company.
The same morning, the investigator receives a call from a financial intelligence unit (FIU) inquiring about the same incident. The FIU states that it will issue a warrant to freeze the account on the same day.
Which steps for documenting the final investigation decision are appropriate for the investigator in this scenario?
Answer : C
The investigator should document the investigation process and retain all relevant documents in the case management system. This is because documenting the investigation process is a good practice to ensure the quality and consistency of the investigation, as well as to facilitate the review and audit of the investigation. Retaining all relevant documents is also important to support the evidence and findings of the investigation, as well as to comply with the record-keeping requirements of the relevant authorities. The other options are incorrect because:
A . Excluding any open-source information from record-keeping is not advisable, as open-source information can provide valuable insights and context for the investigation, and may not be easily retrievable in the future.
B . Adding all of the information the FI has about the subject, their account(s) activity, research results, KYC information, etc. to the SAR/STR is not necessary, as the SAR/STR should only contain the essential information that is relevant and material to the suspicious activity. Adding too much information may obscure the main points and make the SAR/STR less effective.
D . Not documenting the investigation process if a SAR/STR is not filed is not acceptable, as the investigation process should be documented regardless of the outcome. Documenting the investigation process can help justify why a SAR/STR was not filed, and also provide a reference for future investigations involving the same subject or activity.
Advanced CAMS-FCI Certification | ACAMS, Section 3: Reporting Suspicious Activity, page 14
Leading Complex Investigations Certificate | ACAMS, Module 4: Documenting Your Investigation, page 4
An investigator is reviewing an alert for unusual activity. System scanning detected a text string within a company customer's account transactions that indicates the account may have been used for a drug or drug paraphernalia purchase. Based on the KYC profile, the investigator determines the customer's company name and business type are marketed as a gardening supplies company. The investigator reviews the account activity and notes an online purchase transaction that leads the investigator to a website that sells various strains of marijuan
a. Additional account review detects cash deposits into the account at the branch teller lines, so the investigator reaches out to the teller staff regarding the transactions. The teller staff member reports that the business customers have frequently deposited cash in lower amounts. The teller, without prompting, adds that one of the transactors would occasionally smell of a distinct scent of marijuana smoke.
Which information should be included in the SAR/STR?
Answer : C
The SAR/STR should include any information that is relevant to the suspicious activity, such as the customer information, the transaction details, and any other indicators of potential money laundering or criminal activity. The fact that one of the transactors occasionally smelled of marijuana smoke is an indicator that the customer may be involved in the illicit drug trade, which is a predicate offense for money laundering. Therefore, this information should be included in the SAR/STR. Reference: Advanced CAMS-FCI Study Guide, page 25.
A bank investigator notices an account receiving multiple deposits from the same employer under different employees' names. A cash withdrawal occurs one day after each deposit. The outcome of this investigation will likely uncover which crime typology?
Answer : D
The correct answer is A because this scenario describes a possible case of human trafficking, which is a crime where people are exploited for labor or sexual services against their will. Human traffickers may use bank accounts to launder their proceeds and pay their victims, and they may use fake or stolen identities to avoid detection. The other options are not likely because they do not explain why multiple deposits from the same employer under different employees' names would occur, nor why cash withdrawals would follow each deposit.
Due to an ever-diversifying business model and multi-jurisdictional footprint, a casino has decided to outsource the source of funds and wealth checks to a third-party provider. Why is it important for the casino to maintain control of the output from the provider?
Answer : C
The reason why it is important for the casino to maintain control of the output from the provider is that the casino maintains ultimate responsibility for this activity and should maintain control to avoid non-compliance . This is because the casino is accountable for its own AML/CFT obligations and cannot delegate or outsource them to a third-party provider. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should ensure that it has adequate oversight and control over any third-party providers that it engages for AML/CFT purposes, such as conducting due diligence, verifying information, or monitoring transactions'' (p. 25). The FI should also ''review and evaluate the performance and quality of the third-party providers on a regular basis, and address any issues or gaps that may arise'' (p. 25).
The other options are not as relevant or accurate as option C. The clients of the casino prefer to know that the casino is keeping their information secure when being held by a third-party (A) is not a reason why the casino should maintain control of the output from the provider, but rather a customer expectation or preference. As with all third-party relationships, proper control must be maintained to ensure profitability (B) is not a reason why the casino should maintain control of the output from the provider, but rather a general business principle or objective. Other casinos are frequently looking to reduce costs and share ideas, so if this relationship is successful, the model can be used by other businesses (D) is not a reason why the casino should maintain control of the output from the provider, but rather a potential benefit or outcome.
A SAR/STR on cash activity is filed for a company registered in the Marshall Islands operating a Mediterranean beach bar and hotel. The company has three nominee directors, one nominee shareholder, and another individual declared as both the beneficial owner and authorized signatory. Which information is key for law enforcement's physical surveillance of cash activity? (Select Two.)
Answer : B, C
The identification details of the beneficial owner and authorized signatory are key for law enforcement's physical surveillance of cash activity, as they would help identify the person who controls and operates the company and who is responsible for its financial transactions. The company's operating address is also key, as it would help locate the premises where the cash activity takes place and observe any suspicious movements or behaviors. The identification details of the nominee shareholder and directors are not relevant, as they are not involved in the management or operation of the company. The company's registered address is also not relevant, as it is likely to be a shell or mailbox address that does not reflect the actual location of the business.
An investigator at a bank triggered a review in relation to potential misuse of legal persons and a complex network of corporate entities owned by customer
Answer : D
The initial focus of the investigation should be to review the customer due diligence documents of each entity and examine the year of incorporation and onboarding channel, as this would help identify the beneficial owners, the source of funds, and the purpose of the business relationship. This would also help determine if the entities are shell companies or have any red flags that indicate potential misuse of legal persons. Using data analytics to extract and analyze the linkages between the different entities would be a subsequent step, not the initial one. Conducting a network link analysis on all customers of the bank would be too broad and time-consuming. Finding out whether customer A has relationships with other financial institutions would be relevant, but not the initial focus. Reference: [Advanced CAMS-FCI Study Guide], page 44-45; [FATF Guidance on Transparency and Beneficial Ownership], page 12-13.
A client that runs a non-profit organization that aids refugees in leaving their home countries received a remittance from a money services business that was ten times the average. The client was recently detained for providing falsified passports to illegal immigrants. Which predicate offenses could be considered in the SAR/STR? (Select Two.)
Answer : A, B
The correct answer is A and B because human smuggling/trafficking and terrorist financing are both predicate offenses for money laundering that could be related to the client's activities. Option C is incorrect because there is no indication of narcotics trafficking in the scenario. Option D is incorrect because there is no indication of antiques smuggling in the scenario. Option E is incorrect because there is no indication of tax evasion in the scenario.
SAR/STR NARRATIVE
A SAR/STR has been submitted on five transactions conducted on the correspondent banking relationship with ABC Bank.
Client Information:
Remitter information: DEF Oil Resource Ltd. is the oldest member of the DEF Group. It was founded in 1977 as a general trading business with a primary focus on exports from Africa and North Americ
a. The group has business activities that span the entire energy value chain. Their core field of endeavor is centered within the oil and gas industry and its associated sub-sectors.
Beneficiary Information:
As per the response received from ABC Bank, it was determined that the beneficiaries are related to DEF Oil Resource Ltd. These were created by DEF Oil Resource Ltd. to purchase property in a foreign country on behalf of their senior management as part of a bonus scheme. The purpose behind this payment was for the purchase of property in another country.
Payment Reference:
ABCXXXXX31PZFG2H
ABCXXXXXX51PQGEH
ABCXXXXXX214QWVG
ABCXXXXXX41PSXA2
ABCXXXXXX815QWS3
Concerns:
* We are unsure about the country of incorporation of the beneficiaries.
* We are concerned about the transactional activity since the payment made towards entities (conducted on behalf of individuals) appears to be possible tax evasion.
* There appears to be an attempt to conceal the identity of individuals (senior management), which again raises concerns about the source of funds.
* Referring to the response received from ABC Bank, we are unclear about the ultimate beneficiary of funds.
* The remitter is involved in a high-risk business, (i.e., oil and crude products trading), and the beneficiary is involved in real estate business which again poses a higher risk.
While reviewing the account activity, it is noted that several transfers are sent to a company located in an offshore jurisdiction. Which step should the investigator take next?
Answer : C
The best step for the investigator to take next is to request information about the beneficiaries related to the company. This will help to identify the ultimate beneficial owners of the funds and the purpose of the transactions. Requesting information from the company or filing a SAR/STR to the FIU where the company is located may not be feasible or effective, as the company may not cooperate or the FIU may not have jurisdiction over the offshore entity. Conducting an open-source search may provide some information about the ownership and registration of the company, but it may not be sufficient or reliable to determine the nature and legitimacy of the transactions.
SAR Narrative Guidance Package
Best Practices for Drafting an STR or SAR
An investigator receives an alert documenting a series of transactions. A limited liability corporation (LLC) wired 59.000,000 USD to an overseas account associated with a state-run oil company. A second account associated with the state-run oil company wired 600,000,000 USD to the LLC. The LLC then wired money to other accounts, a money brokerage firm, and real estate purchases.
The investigator initiated an enhanced KYC investigation on the LLC. The financial institution opened the LLC account a couple of weeks prior to the series of transactions. The names associated with the LLC had changed multiple times since the account opened. A search of those names revealed relations with multiple LLCs. Public records about the LLCs did not show any identifiable business activities.
Open-source research identified mixed reports about the brokerage firm. The firm indicated it purchased mutual funds for its clients and dispensed returns to clients.
Media reports claimed the firm laundered money by holding for a fee before returning it to investors.
The investigator discovers that the bank has no records pertaining to ownership of the LLC. What would this mean for the bank and/or investigator?
Answer : C
The bank is out of compliance with CIP regulations because it did not obtain the minimum identifying information from the customer prior to opening the account, as required by 31 CFR 1020.220(a)(2)(i)(A). The bank should have obtained the name, date of birth, address, and identification number of the customer, as well as verified the identity of the customer to the extent reasonable and practicable. The lack of ownership data may also indicate a violation of beneficial ownership regulations, but that is not the primary issue in this case.
A financial regulator is evaluating the effectiveness of a financial institution's (Fl) anti-financial crime program. Which condition should be met to satisfy the regulator?
Answer : D
The condition that should be met to satisfy the regulator is that the program is drafted using a risk-based approach to avoid the FI being used as a conduit for criminal activities. A risk-based approach means that the FI identifies, assesses, and understands its exposure to financial crime risks and applies appropriate measures to mitigate them. This is consistent with the international standards and best practices for anti-financial crime compliance. The program being aligned with the financial industry's anti-financial crime priorities, meeting the minimum requirements of anti-financial crime standards published by a financial industry association, or having no high-severity issues in internal auditing results are not sufficient to satisfy the regulator, as they do not necessarily reflect the specific risks faced by the FI or demonstrate its effectiveness in preventing and detecting financial crimes.
Which payment method for purchasing luxury items is a red flag for potential money laundering?
Answer : B
According to the Financial Action Task Force (FATF), the use of large amounts of cash is a common method for money launderers to move illicit funds [1]. Purchasing luxury items with cash can indicate an attempt to convert illegal funds into tangible assets that can be easily resold or moved across borders. As a result, businesses that deal with luxury items are required to implement enhanced due diligence measures, including monitoring transactions involving large amounts of cash [1].
A financial institution
Answer : C
The correct answer is C because the FI is unable to obtain evidence of required licensing or registration despite suspicion of money transmitting, which is a red flag for money laundering and a violation of federal and state laws. Option A is incorrect because making several deposits in one month that appear to exceed their expected monthly income might not be indicative of suspicious activity, depending on the customer's profile and source of funds. Option B is incorrect because receiving a large, one-time wire from a law firm might not be indicative of suspicious activity, depending on the customer's relationship with the law firm and the purpose of the wire. Option D is incorrect because discovering a large number of securities transactions that appear to be related to day trading might not be indicative of suspicious activity, depending on the customer's investment strategy and risk tolerance.
An investigator is reviewing a case generated from the transaction monitoring system, with two large amounts of incoming remittance (IR) to an individual customer. Based on the KYC profile, the customer is a plant manager of a famous multi-national electronics manufacturing firm. As the customer has no similarly large transaction patterns for the past 2 years, the investigator sends an inquiry to the relationship manager (RM) about the nature of the transaction. The RM replies that the transaction is a consultancy fee provided from two different electronics companies with a debit note provided However, there is no detail of service provided on the debit note, and the remitters are two individuals.
Which actions should the investigator recommend to mitigate risk? (Select Two.)
Answer : D, E
The actions that the investigator should recommend to mitigate risk are conducting enhanced due diligence (D) and re-evaluating the customer risk profile (E). These actions are appropriate and prudent, as they allow the investigator to obtain more information and evidence about the nature and purpose of the transactions, the source and destination of the funds, and the identity and legitimacy of the parties involved. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should conduct enhanced due diligence on all parties involved in the investigation, including checking various sources of information, such as watch lists, sanctions lists, negative news, and official registries'' (p. 24). The FI should also ''re-assess the customer risk profile based on any new information obtained during the investigation, and adjust the customer due diligence and monitoring requirements accordingly'' (p. 25).
The other options are not as appropriate or effective as options D and E. The investigator should not recommend exiting the relationship with the customer (A), as this could be premature or disproportionate, as well as potentially discriminatory or illegal. The investigator should not recommend documenting and maintaining a file with the investigative findings (B), as this is not an action to mitigate risk, but rather a standard procedure for any investigation. The investigator should not recommend discussing the investigation findings with the customer , as this could compromise the integrity and objectivity of the investigation, as well as expose the FI to legal or regulatory risks.
During transaction monitoring. Bank A learns that one of its customers. Med Supplies 123, is attempting to make a payment via wire totaling 382.500 USD to PPE Business LLC located in Mexico to purchase a large order of personal protective equipment. specifically surgical masks and face shields. Upon further verification. Bank A decides to escalate and refers the case to investigators.
Bank A notes that days prior to the above transaction, the same customer went to a Bank A location to wire 1,215,280 USD to Breath Well LTD located in Singapore. Breath Well was acting as an intermediary to purchase both 3-ply surgical masks and face shields from Chin
a. Bank A decided not to complete the transaction due to concerns with the involved supplier in China. Moreover, the customer is attempting to send a third wire in the amount of 350,000 USD for the purchase of these items, this time using a different vendor in China. The investigator must determine the next steps in the investigation and what actions, if any. should be taken against relevant parties.
The investigator is gathering more information to determine if a SAR/STR filing is needed. Which steps are the correct ways of collecting the additional information? (Select Two.)
Answer : A, D
The correct answer is A and C because these indicators suggest that the customer is using fraudulent documents and misrepresenting the goods to conceal the illicit nature of the transactions. Fentanyl traffickers often use front companies and falsified invoices to disguise their shipments as legitimate products, such as medical supplies or chemicals. Reviewing the invoices and transportation documents, as well as the FDA product certifications, can help to identify discrepancies or anomalies that indicate fraud or deception.
An analyst reviews an alert for high volume Automated Clearing House (ACH) activity in an account. The analyst's initial research finds the account is for a commercial daycare account that receives high volumes of large government-funded ACH transactions to support the programs. The account activity consists of checks (cheques) made payable to individual names in varying dollar amounts. One check indicates rent to another business.
An Internet search finds that the daycare company owner has previous government-issued violations for safety and classroom size needs, such as not having enough chairs and tables per enrollee. These violations were issued to a different daycare name.
Simultaneous to this investigation, another analyst sends an email about negative news articles referencing local child/adult daycare companies misusing governmental grants. This prompts the financial institution (Fl) to search all businesses for names containing daycare' or care*. Text searches return a number of facilities as customers at the Fl and detects that three of these businesses have a similar transaction flow of high volume government ACH funding with little to no daycare expenses.
The analyst determines that site visits should be conducted for the three daycare businesses. Which observations at the on-site visits would justify writing a SAR/STR? (Select Three.)
Answer : A, C, F
The observations at the on-site visits that would justify writing a SAR/STR are signs of severe wear and poor maintenance at the site (A), lights turned off at the site during operational hours , and a full parking lot of cars with no staff at the site (F). These observations suggest that the daycare businesses are not operating legitimately or providing adequate services to their customers, and that they may be misusing governmental grants or laundering money through their accounts. These observations are consistent with some of the red flags for fraud identified by ACAMS2, such as:
Inadequate facilities or equipment for the type of business
Lack of visible activity or customers at the business location
Discrepancy between reported income and expenses
Unusual volume or frequency of transactions
The other observations are not as relevant or indicative of fraud as options A, C, and F. A site located in a commercial building (B) could be a normal or legitimate choice for a daycare business, depending on its size, location, and availability. Visible attendance with children being dropped off by parents (D) could show that the daycare business is providing genuine services to its customers, although it does not rule out possible fraud or money laundering. Visible signage indicating the purpose of building (E) could also show that the daycare business is transparent and legitimate, although it does not guarantee its quality or compliance.
An investigator at a bank triggered a review in relation to potential misuse of legal persons and a complex network of corporate entities owned by customer
Answer : D
The initial focus of the investigation should be to review the customer due diligence documents of each entity and examine the year of incorporation and onboarding channel, as this would help identify the beneficial owners, the source of funds, and the purpose of the business relationship. This would also help determine if the entities are shell companies or have any red flags that indicate potential misuse of legal persons. Using data analytics to extract and analyze the linkages between the different entities would be a subsequent step, not the initial one. Conducting a network link analysis on all customers of the bank would be too broad and time-consuming. Finding out whether customer A has relationships with other financial institutions would be relevant, but not the initial focus. Reference: [Advanced CAMS-FCI Study Guide], page 44-45; [FATF Guidance on Transparency and Beneficial Ownership], page 12-13.
CLIENT INFORMATION FORM Client Name: ABC Tech Corp Client I.D. Number: 08125 Name: ABC Tech Corp Registered Address: Mumbai, India Work Address: Mumbai. India Cell Phone: ***"--- Alt Phone: Email: ********
Client Profile Information:
Sector: Financial
Engaged in business from (date): 02 Jan 2020
Sub-sector: Software-Cryptocurrency Exchange
Expected Annual Transaction Amount: 125.000 USD
Payment Nature: Transfer received from client's fund
Received from: Clients
Received for: Sale of digital assets
The client identified themselves as "Cryptocurrency Exchange" Client has submitted the limited liability partnership deed. However, the bank's auditing team is unable to identify the client's exact business profile as the cryptocurrency exchange specified by the client as their major business awaits clearance from the country's regulator. The client has submitted documents/communications exchanged with the regulator and has cited the lack of governing laws in the country of their operation as the reason for the delay.
Investigators determine the ultimate beneficial owner of ABC Tech Corp is a high-net-worth client. The client owns a real estate agency left to her when her spouse died. The spouse provided seed capital for ABC Tech Corp through a direct 1,000.000 Great British Pound (GBP) deposit.
What additional information would trigger filing a SAR/STR?
Answer : D
The additional information that would trigger filing a SAR/STR is the fact that the funds for the seed capital were in the form of 50 cashier's checks of 10,000 GBP each and 50 money orders of 10,000 GBP. This is because this indicates a possible attempt to avoid the reporting threshold of 10,000 GBP for cash transactions, which is a common money laundering technique known as structuring or smurfing12. The other options are not necessarily suspicious, as they do not involve cash transactions or indicate any illicit source of funds. The fact that the client's spouse was a PEP does not automatically make the transaction suspicious unless there are other red flags or risk factors associated with the PEP34
In which case should an investigator avoid escalating a suspicious event to the chief compliance officer and pursue other channels?
Answer : B
An investigator should avoid escalating a suspicious event to the chief compliance officer if there is a potential conflict of interest, such as when a close family member of the officer is involved in the transaction. In such a case, the investigator should pursue other channels, such as reporting to a higher authority or an independent committee. The other options do not present a conflict of interest and should be escalated to the chief compliance officer as part of the normal procedure.
A client at a financial institution deposits large amounts of money into an account, and almost immediately, the funds are then distributed to numerous individuals' accounts. The transaction activity described in the scenario is a pattern of:
Answer : B
Deposit trading is a pattern of suspicious activity where a client deposits large amounts of money into an account, and then transfers the funds to other accounts, often in different jurisdictions or countries. This could be an attempt to disguise the source or destination of the funds, or to avoid reporting requirements. Deposit trading is also known as layering, which is the second stage of money laundering.
A client with many personal and business deposits with the financial institution (Fl) seeks a business loan. The client wants to guarantee the loan with a trust for which they are the beneficiary.
An investigator examines the trust. The trust has many layers, including shell companies in known tax havens. The client's ultimate beneficial ownership claim cannot be validated, and the loan is denied.
Two months later, the Fl receives a law enforcement (LE) request on one of the client's business accounts. While reviewing the business account, the Fl receives another LE request on the same account from another agency. The requested information is shared.
Three months later, a branch manager receives a request to open a business deposit account related to a complex trust. The manager forwarded the request because of the complexity. The trust was the same as the previously examined trust, but the request came from a different client. The second client also has many accounts with the Fl. Further inspection finds links between the second client and the Paradise Papers. The Papers state the client led illegal activities and committed tax evasion.
What steps should the investigator take to review the accounts held by the second client who is listed in the Paradise Papers? (Select Two.)
Answer : A, D, D
The investigator should recommend a SAR/STR be filed regarding the second client's use of a questionable trust to open an account, as this could indicate an attempt to conceal the source and ownership of funds, and to evade taxes and sanctions. The investigator should also monitor all accounts and entities related to the second client, as they may be involved in illegal activities or pose a high risk to the FI. The investigator should not review all accounts that have opened trust accounts, as this would be too broad and inefficient. The investigator should not inform FI management of deficiencies in their AML program, as this is not their role or responsibility. The investigator should not inform FI management of the start of a serious risk-based investigation, as this may compromise the confidentiality and integrity of the investigation.
Which statement most accurately characterizes the methods used by transnational criminal organizations?
Answer : C
The statement that most accurately characterizes the methods used by transnational criminal organizations is that they routinely engage in many different types of criminal activities as long as they think it will benefit them . This is because transnational criminal organizations are flexible and adaptable, and they exploit opportunities and vulnerabilities in different markets and jurisdictions. According to ACAMS2, ''Transnational criminal organizations are involved in a wide range of illicit activities, such as drug trafficking, human trafficking, arms trafficking, money laundering, cybercrime, environmental crime, fraud, corruption, and terrorism'' (p. 3). They also ''operate across borders and regions, using complex networks and structures to evade detection and prosecution'' (p. 3).
The other statements are not as accurate or comprehensive as option C. Transnational criminal organizations are unlikely to associate with known terrorist organizations due to the reputational risks (A) is false, as transnational criminal organizations may collaborate or cooperate with terrorist organizations for mutual benefit or convenience, such as sharing resources, routes, or contacts. Transnational criminal organizations are likely to specialize in one particular method and continue to refine that method to escape detection (B) is false, as transnational criminal organizations may diversify or change their methods depending on the circumstances or opportunities, such as shifting products, markets, or modus operandi. Transnational criminal organizations see each other as competitors and rarely cooperate (D) is false, as transnational criminal organizations may form alliances or partnerships with other criminal groups for strategic or tactical reasons, such as sharing information, expertise, or influence.
Law enforcement (LE) suspects human trafficking to occur during a major spotting event. LE officers asked several financial institutions (FIs) to monitor financial transactions occurring before, during, and after the event.
An investigator identified a pattern linked to a business. The business* account received multiple even dollar deposits between midnight and 4:00 AM. They occurred each day for several days prior to the date of the sporting event. Also, large cash deposits, typically between 2,000 USD and 3.000 USD. made by a person to the business' account occurred in many branches in the days alter the sports event.
There was little information about the company. The company did not have any history of employee payroll expenses or paying taxes. Expenses from the business account included air travel and hotel expenses. Searches about the person making cash deposits showed little. An online social media platform webpage with the individual's name showed ads for dates" and "companionship."
Which fact should not be included in (he SAR/STR narrative?
Answer : B
The fact that should not be included in the SAR/STR narrative is the request by law enforcement (D). This is because the request by law enforcement is confidential and should not be disclosed to the customer or anyone else who is not authorized to know it. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should not include any reference to the LE request in the SAR/STR narrative, as this could compromise the LE investigation or alert the customer of the suspicion'' (p. 35). The FI should also not inform the customer of the LE request or delay filing the SAR/STR because of it.
The other facts should be included in the SAR/STR narrative, as they are relevant and indicative of human trafficking money laundering. The air travel and hotel expenses (A) show that the customer is involved in moving people across different locations, which could be a sign of human smuggling or trafficking. The time of the cash deposits (B) shows that the customer is receiving cash payments during unusual hours, which could be a sign of illicit activities or services. The sporting event shows that the customer is exploiting a high-demand situation for their business, which could be a sign of opportunistic or organized crime.
Law enforcement (LE) suspects human trafficking to occur during a major spotting event. LE officers asked several financial institutions (FIs) to monitor financial transactions occurring before, during, and after the event.
An investigator identified a pattern linked to a business. The business* account received multiple even dollar deposits between midnight and 4:00 AM. They occurred each day for several days prior to the date of the sporting event. Also, large cash deposits, typically between 2,000 USD and 3.000 USD. made by a person to the business' account occurred in many branches in the days after the sports event
There was little information about the company. The company did not have any history of employee payroll expenses or paying taxes. Expenses from the business account included air travel and hotel expenses. Searches about the person making cash deposits showed little. An online social media platform webpage with the individual's name showed ads for dates" and "companionship."
If the investigator uncovers evidence that foreign nationals are involved in this activity, they should also note the possible presence of:
Answer : D
If the investigator uncovers evidence that foreign nationals are involved in this activity, they should also note the possible presence of human smuggling (D). This is because human smuggling is the illegal movement of people across borders, often facilitated by criminal networks that exploit vulnerable migrants. According to the FATF and Egmont Group report on Financial Flows from Human Trafficking2, ''human smuggling can be closely linked to human trafficking, as smuggled migrants may become victims of trafficking along their journey or at their destination'' (p. 9). The report also states that some indicators of human smuggling are similar to those of human trafficking, such as:
Frequent cash deposits or withdrawals in different locations
Use of false or fraudulent identification documents
Expenses related to travel and accommodation
Involvement in online platforms that advertise sexual services
The other options are not as relevant or specific as option D. Tax fraud (A) is the evasion of taxes by individuals or businesses, which may or may not be related to human trafficking or smuggling. Black market peso exchange (B) is a money laundering scheme that involves exchanging illicit proceeds in one currency for another currency at a discounted rate, which is more commonly associated with drug trafficking or trade-based laundering. Trade-based laundering is the manipulation of trade transactions to disguise the origin and ownership of illicit funds, which is also more likely to be linked to drug trafficking or other types of fraud.
The investigative department of a financial institution (Fl) receives an internal escalation notice from the remittance department for a SWIFT message requesting a refund due to potential fraud. The notice indicates that a total of three international incoming remittances were transferred to a corporate customer from Country A, in the amount of approximately 5 million EUR for each. The first two incoming remittances had been exchanged into currency B and transferred out to Country B a few days ago. The third incoming remittance has been held by the remittance department.
As noted from the KYC profile, the corporate customer is working in the wood industry. with the last account review completed 3 months ago. Since the account's opening. there has been no history of a large amount of funds flowing through the account. The investigator conducts an Internet search and finds that the remitter is a food beverage company.
The same morning, the investigator receives a call from a financial intelligence unit (FIU) inquiring about the same incident. The FIU states that it will issue a warrant to freeze the account on the same day.
After further review, the decision is made that transactions appear suspicious. Which are the next steps the investigator should take? (Select Two.)
Answer : C, E
The correct answer is C and E. The investigator should provide additional information to the LE upon receiving a formal request, and gather all the information that would be useful for LE and recommend filing a SAR/STR. These steps are consistent with the best practices of conducting financial crime investigations and reporting suspicious activity. The investigator should not close the customer's accounts or the investigation, as this may interfere with the ongoing LE inquiry and violate the FI's policies and procedures. The investigator should also not contact local LE directly, as this may compromise the confidentiality of the investigation and the FIU's authority. Reference:
Advanced CAMS-FCI Study Guide, Chapter 4: Reporting Suspicious Activity, pages 40-411
Advanced CAMS-FCI Study Guide, Chapter 5: Governance of an AFC Investigations Unit, pages 48-491
Advanced CAMS-FCI Certification | ACAMS
A national financial intelligence unit (FIU) is undertaking the country risk assessment for the financing of the proliferation of weapons of mass destruction (WMD). The evaluation involves determining the exposure that financial institutions (FIs) have to operations that evade sanctions. Which should be performed by the FIU to assess proliferation financing risk? (Select Two.)
Answer : B, D
The FIU should cross-reference the databases of international commerce/logistics transactions between the country and WMD proliferation sanctioned states with the corresponding international financial operations of those transactions, as this would help identify any discrepancies or anomalies that could indicate sanctions evasion. The FIU should also evaluate a sample of the amount of false-positive and false-negative alerts that FIs have regarding proliferation sanctions evasion to determine root causes of non-detection, such as inadequate screening systems, lack of training, or human error. These actions would help the FIU assess the proliferation financing risk and provide feedback and guidance to FIs on how to improve their detection and prevention capabilities.
An investigator is reviewing an alert for unusual activity. System scanning detected a text string within a company customer's account transactions that indicates the account may have been used for a drug or drug paraphernalia purchase. Based on the KYC profile, the investigator determines the customer's company name and business type are marketed as a gardening supplies company. The investigator reviews the account activity and notes an online purchase transaction that leads the investigator to a website that sells various strains of marijuan
a. Additional account review detects cash deposits into the account at the branch teller lines, so the investigator reaches out to the teller staff regarding the transactions. The teller staff member reports that the business customers have frequently deposited cash in lower amounts. The teller, without prompting, adds that one of the transactors would occasionally smell of a distinct scent of marijuana smoke.
Which information should be included in the SAR/STR?
Answer : C
The SAR/STR should include any information that is relevant to the suspicious activity, such as the customer information, the transaction details, and any other indicators of potential money laundering or criminal activity. The fact that one of the transactors occasionally smelled of marijuana smoke is an indicator that the customer may be involved in the illicit drug trade, which is a predicate offense for money laundering. Therefore, this information should be included in the SAR/STR. Reference: Advanced CAMS-FCI Study Guide, page 25.
When writing or reviewing a SAR/STR, it is important to:
Answer : A
The correct answer is A because a SAR/STR narrative should be concise, clear, and complete, addressing the who, what, when, where, why, and how of the suspicious activity. Option B is incorrect because providing too much information can make the narrative confusing and irrelevant. Option C is incorrect because the introduction should provide a summary of the suspicious activity, not the conclusion. Option D is incorrect because suspect names should be mentioned in the narrative to identify the parties involved in the suspicious activity.
Which actions should financial institutions perform to ensure proper data governance? (Select Three.)
Answer : A, B, D
Financial institutions should perform the following actions to ensure proper data governance:
Establish an appropriate data management method for collecting and storing information. This is important to ensure that the data is consistent, reliable, and accessible for various purposes, such as risk assessment, compliance reporting, and customer service. Data management methods may include defining data standards, policies, and procedures; implementing data quality controls and validation checks; and using appropriate data storage systems and formats.
Ensure the accuracy of customer identification records and transaction records and appropriately manage data as a prerequisite for the effective use of IT systems. This is important to comply with the anti-money laundering and counter-terrorist financing (AML/CFT) requirements, such as customer due diligence, transaction monitoring, and suspicious activity reporting. Accurate and complete customer and transaction data also enables financial institutions to use IT systems more effectively for data analysis, risk management, and decision making.
Periodically validate integrity and accuracy of information used for IT systems such as customer information, customer identification records, and transaction records. This is important to ensure that the data remains up-to-date, relevant, and reliable over time. Data validation may include verifying the source and quality of the data; identifying and correcting any errors or inconsistencies; and updating or deleting any obsolete or redundant data.
Data Governance for Financial Institutions - Capgemini
Small and Medium-Sized Deposit-Taking Institutions (SMSBs) Capital and Liquidity Requirements - OSFI
Each month the automated transaction monitoring system generates alerts based on predetermined scenarios. An alert was generated in relation to the account activity of ABC Foundation. Below is the transaction history for ABC Foundation (dates are in DD/MM/YYYY format).

The relationship manager for ABC Foundation contacts the client to request more information on the beneficiary of the transfer in Turkey. ABC Foundation advises that this is a not-for-profit charity group called 'Forever Free." Which is the best next step in the investigation?
Answer : C
The best next step in the investigation is to check the jurisdiction's list of known charities with connections to terrorist activity . This is because the FI has a responsibility to verify the legitimacy and reputation of the beneficiary of the funds, especially if it is a charity or non-profit organization that operates in a high-risk jurisdiction or sector. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should conduct enhanced due diligence on all parties involved in the investigation, including checking various sources of information, such as watch lists, sanctions lists, negative news, and official registries'' (p. 24). The FI should also check if the beneficiary is consistent with the customer's profile and expected activity.
The other options are not as appropriate or effective as option C. Contacting the financial institution in Turkey that has a relationship with Forever Free and advising them of the investigation (A) could violate confidentiality or data protection laws, as well as compromise the investigation or alert the customer or beneficiary of the suspicion. Updating the customer profile to include Forever Free as the recipient of the funds (B) could be premature or inaccurate, as it does not verify the nature and purpose of the transfer or the identity and legitimacy of the beneficiary. Filing a SAR/STR with the new information learned about the beneficiary (D) could also be premature or incomplete, as it does not confirm if there is any suspicious or criminal activity involved in the transfer or if there are any other red flags or indicators.
During transaction monitoring. Bank A learns that one of their customers. Med Supplies 123, is attempting to make a payment via wire totaling 382,500 USD to PPE Business LLC located in Mexico to purchase a large order of personal protective equipment. specifically surgical masks and face shields. Upon further verification. Bank A decides to escalate and refers the case to investigators.
Bank A notes that, days prior to the above transaction, the same customer went to a Bank A location to wire 1,215,280 USD to Breath Well LTD located in Singapore. Breath Well was acting as an intermediary to purchase both 3-ply surgical masks and face shields from Chin
a. Bank A decided not to complete the transaction due to concerns with the involved supplier in China. Moreover, the customer is attempting to send a third wire in the amount of 350,000 USD for the purchase of these items, this time using a different vendor in China. The investigator must determine next steps in the investigation and what actions, if any. should be taken against relevant parties.
Upon further investigation. Bank As investigator learns that both the Mexico- and Singapore-based companies are linked to the alleged suppliers in China. Which additional indicators would the investigator need to identify to determine if this fits a fentanyl (drug) trafficking typology? (Select Two.)
Answer : A, C
Which scenarios are common to money laundering through online marketplaces and trade-based money laundering? (Select Two.)
Answer : A, C
Money laundering through online marketplaces and trade-based money laundering both involve the manipulation of the value or quantity of goods to disguise the illicit origin of funds. Over-valuation of the stated price of goods and no evidence of delivery of goods or shipping expenses are two common indicators of such schemes. The other options are not specific to these methods of money laundering.
In which case should an investigator avoid escalating a suspicious event to the chief compliance officer and pursue other channels?
Answer : B
An investigator should avoid escalating a suspicious event to the chief compliance officer if there is a potential conflict of interest, such as when a close family member of the officer is involved in the transaction. In such a case, the investigator should pursue other channels, such as reporting to a higher authority or an independent committee. The other options do not present a conflict of interest and should be escalated to the chief compliance officer as part of the normal procedure.
In a SAR/STR narrative concerning Individual
Answer : B
A product of analysis is a conclusion or inference that is derived from facts or judgments, using analytical techniques or tools. Option B is a product of analysis because it implies that the investigator has used a tool or technique, such as a threshold analysis, to identify a pattern of structured cash deposits that may indicate an attempt to evade reporting requirements. The other options are facts or judgments that can be verified by evidence or observation.
Due to an ever-diversifying business model and multi-jurisdictional footprint, a casino has decided to outsource the source of funds and wealth checks to a third-party provider. Why is it important for the casino to maintain control of the output from the provider?
Answer : C
The reason why it is important for the casino to maintain control of the output from the provider is that the casino maintains ultimate responsibility for this activity and should maintain control to avoid non-compliance . This is because the casino is accountable for its own AML/CFT obligations and cannot delegate or outsource them to a third-party provider. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should ensure that it has adequate oversight and control over any third-party providers that it engages for AML/CFT purposes, such as conducting due diligence, verifying information, or monitoring transactions'' (p. 25). The FI should also ''review and evaluate the performance and quality of the third-party providers on a regular basis, and address any issues or gaps that may arise'' (p. 25).
The other options are not as relevant or accurate as option C. The clients of the casino prefer to know that the casino is keeping their information secure when being held by a third-party (A) is not a reason why the casino should maintain control of the output from the provider, but rather a customer expectation or preference. As with all third-party relationships, proper control must be maintained to ensure profitability (B) is not a reason why the casino should maintain control of the output from the provider, but rather a general business principle or objective. Other casinos are frequently looking to reduce costs and share ideas, so if this relationship is successful, the model can be used by other businesses (D) is not a reason why the casino should maintain control of the output from the provider, but rather a potential benefit or outcome.
A criminal is engaged in chain hopping while trying to launder ransomware payments. The criminal will likely:
Answer : B
Chain hopping is a technique used by criminals to obscure the traceability of cryptocurrency transactions by converting the funds to a different type of cryptocurrency, often using multiple exchanges or platforms. The other options are not related to chain hopping. Reference: Advanced CAMS-FCI Study Guide, page 38.
While each is potentially important, which allows an investigations analyst to better write a SAR/STR narrative that is useful to law enforcement? (Select Two.)
Answer : D, E
A SAR/STR narrative that is useful to law enforcement should include a detailed description of the known or suspected criminal violation or suspicious activity, as well as ensure that all information in the SAR/STR is complete and accurate based on what the institution knows. These elements help law enforcement to understand the nature and scope of the suspicious activity, and to follow up with further investigation if needed. The other options are not essential for a useful SAR/STR narrative, as they either provide irrelevant or redundant information, or could compromise the confidentiality of the report.
A client at a financial institution deposits large amounts of money into an account, and almost immediately, the funds are then distributed to numerous individuals' accounts. The transaction activity described in the scenario is a pattern of:
Answer : B
Deposit trading is a pattern of suspicious activity where a client deposits large amounts of money into an account, and then transfers the funds to other accounts, often in different jurisdictions or countries. This could be an attempt to disguise the source or destination of the funds, or to avoid reporting requirements. Deposit trading is also known as layering, which is the second stage of money laundering.
Law enforcement (LE) suspects human trafficking to occur during a major spotting event. LE officers asked several financial institutions (FIs) to monitor financial transactions occurring before, during, and after the event.
An investigator identified a pattern linked to a business. The business* account received multiple even dollar deposits between midnight and 4:00 AM. They occurred each day for several days prior to the date of the sporting event. Also, large cash deposits, typically between 2,000 USD and 3.000 USD. made by a person to the business' account occurred in many branches in the days after the sports event
There was little information about the company. The company did not have any history of employee payroll expenses or paying taxes. Expenses from the business account included air travel and hotel expenses. Searches about the person making cash deposits showed little. An online social media platform webpage with the individual's name showed ads for dates" and "companionship."
If the investigator uncovers evidence that foreign nationals are involved in this activity, they should also note the possible presence of:
Answer : D
If the investigator uncovers evidence that foreign nationals are involved in this activity, they should also note the possible presence of human smuggling (D). This is because human smuggling is the illegal movement of people across borders, often facilitated by criminal networks that exploit vulnerable migrants. According to the FATF and Egmont Group report on Financial Flows from Human Trafficking2, ''human smuggling can be closely linked to human trafficking, as smuggled migrants may become victims of trafficking along their journey or at their destination'' (p. 9). The report also states that some indicators of human smuggling are similar to those of human trafficking, such as:
Frequent cash deposits or withdrawals in different locations
Use of false or fraudulent identification documents
Expenses related to travel and accommodation
Involvement in online platforms that advertise sexual services
The other options are not as relevant or specific as option D. Tax fraud (A) is the evasion of taxes by individuals or businesses, which may or may not be related to human trafficking or smuggling. Black market peso exchange (B) is a money laundering scheme that involves exchanging illicit proceeds in one currency for another currency at a discounted rate, which is more commonly associated with drug trafficking or trade-based laundering. Trade-based laundering is the manipulation of trade transactions to disguise the origin and ownership of illicit funds, which is also more likely to be linked to drug trafficking or other types of fraud.
An investigator at a corporate bank is conducting transaction monitoring alerts clearance.
KYC profile background: An entity customer, doing business offshore in Hong Kong, established a banking business relationship with the bank in 2017 for deposit and loan purposes. It acts as an offshore investment holding company. The customer declared that the ongoing source of funds to this account comes from group-related companies.
* X is the UBO. and owns 97% shares of this entity customer;
* Y is the authorized signatory of this entity customer. This entity customer was previously the subject of a SAR/STR.
KYC PROFILE
Customer Name: AAA International Company. Ltd
Customer ID: 123456
Account Opened: June 2017
Last KYC review date: 15 Nov 2020
Country and Year of Incorporation: The British Virgin Islands, May 2017
AML risk level: High
Account opening and purpose: Deposits, Loans and Trade Finance
Anticipated account activities: 1 to 5 transactions per year and around 1 million per
transaction amount
During the investigation, the investigator reviewed remittance transactions activities for the period from Jul 2019 to Sep 2021 and noted the following transactions pattern:
TRANSACTION JOURNAL
Review dates: from July 2019 to Sept 2021
For Hong Kong Dollars (HKD) currency:
Incoming transactions: 2 inward remittances of around 1.88 million HKD in total from
different third parties
Outgoing transactions: 24 outward remittances of around 9 4 million HKD in total to
different third parties
For United States Dollars (USD) currency:
Incoming transactions: 13 inward remittances of around 3.3 million USD in total from
different third parties
Outgoing transactions: 10 outward remittances of around 9.4 million USD in total to
different third parties.
RFI Information and Supporting documents:
According to the RFI reply received on 26 May 2021, the customer provided the bank
with the information below:
1) All incoming funds received in HKD & USD currencies were monies lent from non-customers of the bank. Copies of loan agreements had been provided as supporting documents. All of the loan agreements were in the same format and all the lenders are engaged in trading business.
2) Some loan agreements were signed among four parties, including among lenders. borrower (the bank's customer), guarantor, and guardian with supplemental agreements, which stated that the customer, as a borrower, who failed to repay the loan
Based on the KYC profile and the transaction journal, the pattern of activity shows a deviation in:
Answer : A
The correct answer is A because the expected account activities were 1 to 5 transactions per year and around 1 million per transaction amount, but the actual activity showed much more frequent and varied transactions in different currencies and amounts. This indicates a deviation from the customer's profile and risk level.
How does the Financial Action Task Force (FATF) measure the effectiveness of a country's efforts to combat money laundering and terrorist financing?
Answer : A
'The FATF measures the effectiveness of a country's efforts to combat money laundering and terrorist financing through a mutual evaluation process. During a mutual evaluation, the FATF assesses a country's legal and institutional framework, its implementation of measures to combat money laundering and terrorist financing, and the effectiveness of its efforts. The FATF then issues a report with recommendations for improvement' [CAMS Study Guide 6th edition, page 15-16].
Why is a more robust supervisory approach needed by regulators when overseeing small- and medium-sized money service businesses (MSBs) compared to larger MSBs for combatting terrorist financing (TF)?
Answer : D
A more robust supervisory approach is needed by regulators when overseeing small- and medium-sized MSBs compared to larger MSBs for combatting TF because small- and medium-sized MSBs are more at risk of allowing transactions linked to TF due to the lack of skilled compliance resources. Small- and medium-sized MSBs may face challenges in implementing effective AML/CFT controls, such as conducting risk assessments, applying customer due diligence measures, monitoring transactions, detecting suspicious activities, and reporting to the authorities. They may also have limited access to training, guidance, and tools to enhance their compliance capabilities. Therefore, regulators need to provide more supervision and support to small- and medium-sized MSBs to ensure that they comply with the AML/CFT requirements and mitigate the TF risks.
Sustainable Growth for Small and Medium-Sized Enterprises ... - MDPI
Lessons on Resilience for Small and Midsize Businesses - HBR
During transaction monitoring. Bank A learns that one of its customers. Med Supplies 123, is attempting to make a payment via wire totaling 382.500 USD to PPE Business LLC located in Mexico to purchase a large order of personal protective equipment. specifically surgical masks and face shields. Upon further verification. Bank A decides to escalate and refers the case to investigators.
Bank A notes that days prior to the above transaction, the same customer went to a Bank A location to wire 1,215,280 USD to Breath Well LTD located in Singapore. Breath Well was acting as an intermediary to purchase both 3-ply surgical masks and face shields from Chin
a. Bank A decided not to complete the transaction due to concerns with the involved supplier in China. Moreover, the customer is attempting to send a third wire in the amount of 350,000 USD for the purchase of these items, this time using a different vendor in China. The investigator must determine the next steps in the investigation and what actions, if any. should be taken against relevant parties.
The investigator is gathering more information to determine if a SAR/STR filing is needed. Which steps are the correct ways of collecting the additional information? (Select Two.)
Answer : A, D
The correct answer is A and C because these indicators suggest that the customer is using fraudulent documents and misrepresenting the goods to conceal the illicit nature of the transactions. Fentanyl traffickers often use front companies and falsified invoices to disguise their shipments as legitimate products, such as medical supplies or chemicals. Reviewing the invoices and transportation documents, as well as the FDA product certifications, can help to identify discrepancies or anomalies that indicate fraud or deception.
During transaction monitoring. Bank A learns that one of their customers. Med Supplies 123. is attempting to make a payment via wire totaling 382,500 USD to PPE Business LLC located in Mexico to purchase a large order of personal protective equipment. specifically surgical masks and face shields. Upon further verification. Bank A decides to escalate and refers the case to investigators.
Bank A notes that, days prior to the above transaction, the same customer went to a Bank A location to wire 1,215,280 USD to Breath Well LTD located in Singapore. Breath Well was acting as an intermediary to purchase both 3-ply surgical masks and face shields from Chin
a. Bank A decided not to complete the transaction due to concerns with the involved supplier in China. Moreover, the customer is attempting to send a third wire in the amount of 350,000 USD for the purchase of these items, this time using a different vendor in China. The investigator must determine next steps in the investigation and what actions, if any. should be taken against relevant parties.
During the investigation, Bank A receives a USA PATRIOT Act Section 314(a) request related to Med Supplies 123. Which steps should the investigator take when fulfilling the request? (Select Three.)
Answer : D, E, F
According to the FinCEN's 314(a) Fact Sheet1, the steps that the investigator should take when fulfilling the request are:
Search its records expeditiously to determine whether it maintains(ed) any accounts for the subject(s) listed in the request. This is option F.
Report back to the Financial Crimes Enforcement Network (FinCEN) within 15 days of receipt of the request via a secure internet website. This is option E.
Report to Financial Crimes Enforcement Network (FinCEN) that a match was found without revealing any other details. This is option D.
The other options are incorrect because:
Exiting the relationship with the business since it appears that customer is under investigation is not required by the 314(a) program and may interfere with law enforcement's investigation. This is option A.
Not responding to Financial Crimes Enforcement Network (FinCEN) if the requested information is not present in the financial institution's system of records is contrary to the 314(a) program, which requires financial institutions to respond whether or not they have a match. This is option B.
Reviewing the account(s) activity and proactively filing a SAR/STR using the 314(a) request as the basis for the filing is not appropriate, as the 314(a) request itself is not a sufficient reason to file a SAR/STR. The financial institution should only file a SAR/STR if it has its own independent suspicion of money laundering or terrorist financing. This is option C.
An investigator at a corporate bank is conducting transaction monitoring alerts clearance.
KYC profile background: An entity customer, doing business offshore in Hong Kong, established a banking business relationship with the bank since 2017 for deposit and loan purposes. It acts as an offshore investment holding company. The customer declared that the ongoing source of funds to this account comes from group-related companies.
* X is the UBO. and owns 97% shares of this entity customer;
* Y is is the authorized signatory of this entity customer. This entity customer was previously the subject of a SAR/STR.
KYC PROFILE
Customer Name: AAA International Company. Ltd
Customer ID: 123456
Account Opened: June 2017
Last KYC review date: 15 Nov 2020
Country and Year of Incorporation: The British Virgin Islands, May 2017
AML risk level: High
Account opening and purpose: Deposits, Loans, and Trade Finance
Anticipated account activities: 1 to 5 transactions per year and around 1 million per
transaction amount
During the investigation, the investigator reviewed remittance transactions activities for the period from Jul 2019 to Sep 2021 and noted the following transactions pattern:
TRANSACTION JOURNAL
Review dates: from July 2019 to Sept 2021
For Hong Kong Dollars (HKD) currency:
Incoming transactions: 2 inward remittances of around 1.88 million HKD in total from
different third parties
Outgoing transactions: 24 outward remittances of around 9 4 million HKD in total to
different third parties
For United States Dollars (USD) currency:
Incoming transactions: 13 inward remittances of around 3.3 million USD in total from
different third parties
Outgoing transactions: 10 outward remittances of around 9.4 million USD in total to
different third parties.
RFI Information and Supporting documents:
According to the RFI reply received on 26 May 2021, the customer provided the bank
with the information below:
1J All incoming funds received in HKD & USD currencies were monies lent from non-customers of the bank. Copies of loan agreements had been provided as supporting documents. All of the loan agreements were in the same format and all the lenders are engaged in trading business.
2) Some loan agreements were signed among four parties, including among lenders. borrower (the bank's customer), guarantor, and guardian with supplemental agreements, which stated that the customer, as a borrower, who failed to repay a loan
Which suspicious activity should the investigator identify during the review of the loan agreements?
Answer : D
The correct answer is D because it is a suspicious activity that Y, who is the authorized signatory of the customer, also signed on behalf of the lenders. This indicates a possible conflict of interest, collusion, or fraud. The other options are not suspicious activities based on the information given.
Which most likely indicates that a business email compromise attack has occurred?
Answer : A
When writing or reviewing a SAR/STR, it is important to ensure that the narrative is kept to the point; easy to read; and addresses the who, what, when, where, why, and how. This is because the narrative is the most crucial part of the SAR/STR, as it provides a clear and concise summary of the suspicious activity or transaction that triggered the report. The narrative should include all the relevant information that would help law enforcement or regulators to understand the nature and context of the activity or transaction, such as123:
The who: The names, addresses, account numbers, and other identifying information of the parties involved in the activity or transaction, such as customers, beneficiaries, intermediaries, or third parties.
The what: The type, amount, frequency, and purpose of the activity or transaction, such as cash deposits, wire transfers, check payments, or purchases of goods or services.
The when: The date, time, and duration of the activity or transaction, and whether it was a one-time occurrence or part of a pattern or trend.
The where: The location or channel of the activity or transaction, such as branches, ATMs, online platforms, or mobile applications.
The why: The reason or rationale for the activity or transaction, and why it was considered suspicious or unusual based on the customer's profile, behavior, or expected activity.
The how: The method or mechanism of the activity or transaction, such as cash, check, debit card, credit card, cryptocurrency, or prepaid card.
How to write the perfect ''Suspicious Activity Reports'' (SAR)? | i-AML
Writing for Prosecution: Best Practices For Composing SAR Narratives That Assist Prosecutors | ACAMS
SAR Writing Examples and Proper Formatting: Write for Your Reader - Alessa
Which scenarios are common to money laundering through online marketplaces and trade-based money laundering? (Select Two.)
Answer : A, C
Money laundering through online marketplaces and trade-based money laundering both involve the manipulation of the value or quantity of goods to disguise the illicit origin of funds. Over-valuation of the stated price of goods and no evidence of delivery of goods or shipping expenses are two common indicators of such schemes. The other options are not specific to these methods of money laundering.
CLIENT INFORMATION FORM Client Name: ABC Tech Corp Client I.D. Number: 08125 Name: ABC Tech Corp Registered Address: Mumbai, India Work Address: Mumbai. India Cell Phone: ***"--- Alt Phone: Email: ********
Client Profile Information:
Sector: Financial
Engaged in business from (date): 02 Jan 2020
Sub-sector: Software-Cryptocurrency Exchange
Expected Annual Transaction Amount: 125.000 USD
Payment Nature: Transfer received from client's fund
Received from: Clients
Received for: Sale of digital assets
The client identified themselves as "Cryptocurrency Exchange" Client has submitted the limited liability partnership deed. However, the bank's auditing team is unable to identify the client's exact business profile as the cryptocurrency exchange specified by the client as their major business awaits clearance from the country's regulator. The client has submitted documents/communications exchanged with the regulator and has cited the lack of governing laws in the country of their operation as the reason for the delay.
Investigators determine the ultimate beneficial owner of ABC Tech Corp is a high-net-worth client. The client owns a real estate agency left to her when her spouse died. The spouse provided seed capital for ABC Tech Corp through a direct 1,000.000 Great British Pound (GBP) deposit.
What additional information would trigger filing a SAR/STR?
Answer : D
The additional information that would trigger filing a SAR/STR is the fact that the funds for the seed capital were in the form of 50 cashier's checks of 10,000 GBP each and 50 money orders of 10,000 GBP. This is because this indicates a possible attempt to avoid the reporting threshold of 10,000 GBP for cash transactions, which is a common money laundering technique known as structuring or smurfing12. The other options are not necessarily suspicious, as they do not involve cash transactions or indicate any illicit source of funds. The fact that the client's spouse was a PEP does not automatically make the transaction suspicious unless there are other red flags or risk factors associated with the PEP34
An investigator is reviewing an alert for unusual activity. System scanning detected a text string within a company customer's account transactions that indicates the account may have been used for a drug or drug paraphernalia purchase Based on the KYC profile, the investigator determines the customer's company name and business type are marketed as a gardening supplies company. The investigator reviews the account activity and notes an online purchase transaction that leads the investigator to a website that sells various strains of marijuan
a. Additional account review detects cash deposits into the account at the branch teller lines, so the investigator reaches out to the teller staff regarding the transactions. The teller staff member reports that the business customers have frequently deposited cash in lower amounts. The teller, without prompting, adds that one of the transactors would occasionally smell of a distinct scent of marijuana smoke.
Which are the best next steps for the investigator to take? (Select Three.)
Answer : A, C, E
The best next steps for the investigator to take are:
A . Review the customer's transaction history. This can help the investigator identify any patterns or anomalies in the customer's account activity, such as changes in transaction volume, frequency, amount, source, destination, purpose, etc. The investigator can also compare the customer's transaction history with their KYC profile and risk rating to assess if there are any discrepancies or inconsistencies.
C . Check internal KYC information. This can help the investigator verify the customer's identity, business nature, ownership structure, expected activity, source of funds, etc. The investigator can also update or enhance the customer's KYC information based on any new or relevant information obtained from other sources.
E Conduct adverse media and open-source searches on the customer's background. This can help the investigator find out if there is any negative or adverse information about the customer in public data sources, such as news articles, social media posts, blogs, forums, etc. Adverse media and open-source searches can also provide additional context and insight into the customer's reputation, behavior, associations, etc. The other options are incorrect because:
B . Request information from the internet service provider who hosts the website is not feasible, as it may require a legal process or a court order to obtain such information. Moreover, the internet service provider may not have or disclose any useful information about the website or its owner.
D . Research other customer accounts for transactions to the same website is not relevant, as it may not provide any meaningful information about the customer under investigation. Furthermore, it may violate the privacy and confidentiality of other customers who are not related to the investigation.
F . Identify if the customer has opened accounts in an urban city area is not helpful, as it may not have any bearing on the customer's involvement in a drug or drug paraphernalia purchase. Additionally, it may not be possible to access or verify such information without the customer's consent or authorization.
Advanced CAMS-FCI Certification | ACAMS, Section 2: Investigating Financial Crimes, page 11
Leading Complex Investigations Certificate | ACAMS, Module 3: Conducting Research and Analysis, page 6
Adverse Media Screening - Using AI to Mitigate Risk
Legal requirements for adverse media screening - Thomson Reuters
Electronic client due diligence | Ethics helpsheets | ICAEW
6AMLD & FATF: Where Adverse Media Screening Fits In
Free Adverse Media Check | NameScan
Which statement most accurately characterizes the methods used by transnational criminal organizations?
Answer : C
The statement that most accurately characterizes the methods used by transnational criminal organizations is that they routinely engage in many different types of criminal activities as long as they think it will benefit them . This is because transnational criminal organizations are flexible and adaptable, and they exploit opportunities and vulnerabilities in different markets and jurisdictions. According to ACAMS2, ''Transnational criminal organizations are involved in a wide range of illicit activities, such as drug trafficking, human trafficking, arms trafficking, money laundering, cybercrime, environmental crime, fraud, corruption, and terrorism'' (p. 3). They also ''operate across borders and regions, using complex networks and structures to evade detection and prosecution'' (p. 3).
The other statements are not as accurate or comprehensive as option C. Transnational criminal organizations are unlikely to associate with known terrorist organizations due to the reputational risks (A) is false, as transnational criminal organizations may collaborate or cooperate with terrorist organizations for mutual benefit or convenience, such as sharing resources, routes, or contacts. Transnational criminal organizations are likely to specialize in one particular method and continue to refine that method to escape detection (B) is false, as transnational criminal organizations may diversify or change their methods depending on the circumstances or opportunities, such as shifting products, markets, or modus operandi. Transnational criminal organizations see each other as competitors and rarely cooperate (D) is false, as transnational criminal organizations may form alliances or partnerships with other criminal groups for strategic or tactical reasons, such as sharing information, expertise, or influence.
During onboarding al Private Bank A, client C indicated that the account would be initially funded with a transfer from Bank B totaling 50 million USD. On which source of funds should Bank A conduct additional scrutiny? (Select Two.)
Answer : B, D
The sources of funds that Bank A should conduct additional scrutiny on are the third-party transfer and the transfer from Bank B. This is because these sources may pose higher risks of money laundering, terrorist financing, fraud, or other illicit activities. Some of the reasons why these sources require more scrutiny are23:
Third-party transfers may involve unknown or unrelated parties that may have ulterior motives or hidden agendas. They may also be used to obscure the origin or destination of funds, or to circumvent sanctions or other regulatory restrictions.
Transfers from Bank B may involve jurisdictions that have weak anti-money laundering and counter-terrorist financing (AML/CFT) regimes, high levels of corruption, or significant criminal activity. They may also involve banks that have poor reputation, compliance, or transparency standards.
Third Party Payments - Wolfsberg Group
Guidance on Correspondent Banking Services - FATF
In which case should an investigator avoid escalating a suspicious event to the chief compliance officer and pursue other channels?
Answer : B
An investigator should avoid escalating a suspicious event to the chief compliance officer if there is a potential conflict of interest, such as when a close family member of the officer is involved in the transaction. In such a case, the investigator should pursue other channels, such as reporting to a higher authority or an independent committee. The other options do not present a conflict of interest and should be escalated to the chief compliance officer as part of the normal procedure.
In a SAR/STR narrative concerning Individual
Answer : B
A product of analysis is a conclusion or inference that is derived from facts or judgments, using analytical techniques or tools. Option B is a product of analysis because it implies that the investigator has used a tool or technique, such as a threshold analysis, to identify a pattern of structured cash deposits that may indicate an attempt to evade reporting requirements. The other options are facts or judgments that can be verified by evidence or observation.
Which actions should financial institutions perform to ensure proper data governance? (Select Three.)
Answer : A, B, D
Financial institutions should perform the following actions to ensure proper data governance:
Establish an appropriate data management method for collecting and storing information. This is important to ensure that the data is consistent, reliable, and accessible for various purposes, such as risk assessment, compliance reporting, and customer service. Data management methods may include defining data standards, policies, and procedures; implementing data quality controls and validation checks; and using appropriate data storage systems and formats.
Ensure the accuracy of customer identification records and transaction records and appropriately manage data as a prerequisite for the effective use of IT systems. This is important to comply with the anti-money laundering and counter-terrorist financing (AML/CFT) requirements, such as customer due diligence, transaction monitoring, and suspicious activity reporting. Accurate and complete customer and transaction data also enables financial institutions to use IT systems more effectively for data analysis, risk management, and decision making.
Periodically validate integrity and accuracy of information used for IT systems such as customer information, customer identification records, and transaction records. This is important to ensure that the data remains up-to-date, relevant, and reliable over time. Data validation may include verifying the source and quality of the data; identifying and correcting any errors or inconsistencies; and updating or deleting any obsolete or redundant data.
Data Governance for Financial Institutions - Capgemini
Small and Medium-Sized Deposit-Taking Institutions (SMSBs) Capital and Liquidity Requirements - OSFI
How does the Financial Action Task Force (FATF) measure the effectiveness of a country's efforts to combat money laundering and terrorist financing?
Answer : A
'The FATF measures the effectiveness of a country's efforts to combat money laundering and terrorist financing through a mutual evaluation process. During a mutual evaluation, the FATF assesses a country's legal and institutional framework, its implementation of measures to combat money laundering and terrorist financing, and the effectiveness of its efforts. The FATF then issues a report with recommendations for improvement' [CAMS Study Guide 6th edition, page 15-16].
An unusual spike in activity has occurred for a customer who is a supplier of aviation parts to a military force. The customer's current line of business is consistent with the banks records, and no adverse media hits have occurred. Which is the best reason for an investigator to continue an investigation?
Answer : A
The best reason for an investigator to continue an investigation is that the end-user is a military force. This is because supplying aviation parts to a military force may involve sanctions risk, export control risk, or human rights risk, depending on the nature and destination of the military force. The investigator should conduct further due diligence to determine if the customer is complying with the relevant laws and regulations, and if the bank is exposed to any reputational or legal risk by providing services to the customer.
Former Airline Employee and Aircraft Part Sellers Charged in Kickback ...
Former Airline Employee and Aircraft Part Sellers Charged in Kickback ...
Former airline employee and aircraft part sellers charged in kickback ...
A client with many personal and business deposits with the financial institution (Fl) seeks a business loan. The client wants to guarantee the loan with a trust for which they are the beneficiary.
An investigator examines the trust. The trust has many layers, including shell companies in known tax havens. The client's ultimate beneficial ownership claim cannot be validated, and the loan is denied.
Two months later, the Fl receives a law enforcement (LE) request on one of the client's business accounts. While reviewing the business account, the Fl receives another LE request on the same account from another agency. The requested information is shared.
Three months later, a branch manager receives a request to open a business deposit account related to a complex trust. The manager forwarded the request because of the complexity. The trust was the same as the previously examined trust, but the request came from a different client. The second client also has many accounts with the Fl. Further inspection finds links between the second client and the Paradise Papers. The Papers state the client led illegal activities and committed tax evasion.
What steps should the investigator take to review the accounts held by the second client who is listed in the Paradise Papers? (Select Two.)
Answer : A, D, D
The investigator should recommend a SAR/STR be filed regarding the second client's use of a questionable trust to open an account, as this could indicate an attempt to conceal the source and ownership of funds, and to evade taxes and sanctions. The investigator should also monitor all accounts and entities related to the second client, as they may be involved in illegal activities or pose a high risk to the FI. The investigator should not review all accounts that have opened trust accounts, as this would be too broad and inefficient. The investigator should not inform FI management of deficiencies in their AML program, as this is not their role or responsibility. The investigator should not inform FI management of the start of a serious risk-based investigation, as this may compromise the confidentiality and integrity of the investigation.
During a review, an analyst notices discrepancies between a customer's nature of business listed on the business registry and what was stated on the customers application. The analyst should:
Answer : A
The analyst should clarify discrepancies noted in the customer's declared profile given the downstream impact on the risk assessment. This is because discrepancies between the customer's nature of business and the information on the business registry may indicate that the customer is not operating a legitimate business or is trying to conceal its true activities. The analyst should verify the customer's identity, source of funds, and purpose of transactions to ensure that the customer's risk profile is accurate and consistent with the Fl's risk appetite.
Which action is part of the enhanced due diligence process?
Answer : A
One of the actions that is part of the enhanced due diligence process is collecting beneficial ownership details regarding the client's account. This is important to identify the natural persons who ultimately own or control the client, and to assess the potential risks associated with them. According to the Financial Action Task Force (FATF), beneficial ownership information should include1:
The name, nationality, and country of residence of each beneficial owner.
The date of birth or incorporation of each beneficial owner.
The nature and extent of the beneficial interest held by each beneficial owner.
The means by which the beneficial ownership or control is exercised.
FATF Guidance on Transparency and Beneficial Ownership
The investigative department of a financial institution (Fl) receives an internal escalation notice from the remittance department for a SWIFT message requesting a refund due to potential fraud. The notice indicates that a total of three international incoming remittances were transferred to a corporate customer from Country A, in the amount of approximately 5 million EUR for each. The first two incoming remittances had been exchanged into currency B and transferred out to Country B a few days ago. The third incoming remittance has been held by the remittance department.
As noted from the KYC profile, the corporate customer is working in the wood industry. with the last account review completed 3 months ago. Since the account's opening. there has been no history of a large amount of funds flowing through the account. The investigator conducts an Internet search and finds that the remitter is a food beverage company.
The same morning, the investigator receives a call from a financial intelligence unit (FIU) inquiring about the same incident. The FIU states that it will issue a warrant to freeze the account on the same day.
After further review, the decision is made that transactions appear suspicious. Which are the next steps the investigator should take? (Select Two.)
Answer : C, E
The correct answer is C and E. The investigator should provide additional information to the LE upon receiving a formal request, and gather all the information that would be useful for LE and recommend filing a SAR/STR. These steps are consistent with the best practices of conducting financial crime investigations and reporting suspicious activity. The investigator should not close the customer's accounts or the investigation, as this may interfere with the ongoing LE inquiry and violate the FI's policies and procedures. The investigator should also not contact local LE directly, as this may compromise the confidentiality of the investigation and the FIU's authority. Reference:
Advanced CAMS-FCI Study Guide, Chapter 4: Reporting Suspicious Activity, pages 40-411
Advanced CAMS-FCI Study Guide, Chapter 5: Governance of an AFC Investigations Unit, pages 48-491
Advanced CAMS-FCI Certification | ACAMS
Why is a more robust supervisory approach needed by regulators when overseeing small- and medium-sized money service businesses (MSBs) compared to larger MSBs for combatting terrorist financing (TF)?
Answer : D
A more robust supervisory approach is needed by regulators when overseeing small- and medium-sized MSBs compared to larger MSBs for combatting TF because small- and medium-sized MSBs are more at risk of allowing transactions linked to TF due to the lack of skilled compliance resources. Small- and medium-sized MSBs may face challenges in implementing effective AML/CFT controls, such as conducting risk assessments, applying customer due diligence measures, monitoring transactions, detecting suspicious activities, and reporting to the authorities. They may also have limited access to training, guidance, and tools to enhance their compliance capabilities. Therefore, regulators need to provide more supervision and support to small- and medium-sized MSBs to ensure that they comply with the AML/CFT requirements and mitigate the TF risks.
Sustainable Growth for Small and Medium-Sized Enterprises ... - MDPI
Lessons on Resilience for Small and Midsize Businesses - HBR
An analyst reviews an alert for high volume Automated Clearing House (ACH) activity in an account. The analyst's initial research finds the account is for a commercial daycare account that receives high volumes of large government-funded ACH transactions to support the programs. The account activity consists of checks (cheques) made payable to individual names in varying dollar amounts. One check indicates rent to another business.
An Internet search finds that the daycare company owner has previous government-issued violations for safety and classroom size needs, such as not having enough chairs and tables per enrollee. These violations were issued to a different daycare name.
Simultaneous to this investigation, another analyst sends an email about negative news articles referencing local child/adult daycare companies misusing governmental grants. This prompts the financial institution (Fl) to search all businesses for names containing 'daycare' or *care'. Text searches return a number of facilities as customers at the Fl and detects that three of these businesses have a similar transaction flow of high volume government ACH funding with little to no daycare expenses.
Which red flags would be an indicator that activity is connected to a corruption/bribery typology? (Select Two.)
Answer : A, B
The red flags that would be an indicator that activity is connected to a corruption/bribery typology are large checks issued to various individuals with the memos noting ''gift'', ''thank you'', ''favor'' (A) and negative news found on the customer related to government-issued violations for safety (B). These red flags suggest that the customer is involved in paying or receiving bribes or kickbacks to or from government officials or other parties in exchange for favorable treatment or contracts. These red flags are consistent with some of the indicators of corruption/bribery identified by ACAMS1, such as:
Payments made to or from third parties that are not directly related to the business
Payments made to or from high-risk jurisdictions or sectors
Payments made with vague or incomplete descriptions or justifications
Negative news or reputation of the customer or its associates
The other options are not as relevant or indicative of corruption/bribery as options A and B. Checks issued to an unrelated entity referencing ''rent'' and ''utilities'' in the memos could be a legitimate business expense or a sign of other types of fraud or money laundering, such as tax evasion or shell company schemes. Multiple daycare locations with no active business operations or related account activity (D) could also be a sign of other types of fraud or money laundering, such as embezzlement or front company schemes. The same beneficial owner owning several daycare centers in different locations (E) could be a normal or legitimate business practice, depending on the size, location, and profitability of the centers.
Which payment method for purchasing luxury items is a red flag for potential money laundering?
Answer : B
According to the Financial Action Task Force (FATF), the use of large amounts of cash is a common method for money launderers to move illicit funds [1]. Purchasing luxury items with cash can indicate an attempt to convert illegal funds into tangible assets that can be easily resold or moved across borders. As a result, businesses that deal with luxury items are required to implement enhanced due diligence measures, including monitoring transactions involving large amounts of cash [1].
Which might suggest misuse of crowdfunding resources by a terrorist?
Answer : D
The purchase of airplane tickets after receiving multiple small deposits from a crowdfunding platform might suggest that the funds are being used to facilitate travel for terrorist purposes. The other options are not necessarily indicative of terrorist financing, as they could be explained by legitimate reasons or other types of financial crimes.
While each is potentially important, which allows an investigations analyst to better write a SAR/STR narrative that is useful to law enforcement? (Select Two.)
Answer : D, E
A SAR/STR narrative that is useful to law enforcement should include a detailed description of the known or suspected criminal violation or suspicious activity, as well as ensure that all information in the SAR/STR is complete and accurate based on what the institution knows. These elements help law enforcement to understand the nature and scope of the suspicious activity, and to follow up with further investigation if needed. The other options are not essential for a useful SAR/STR narrative, as they either provide irrelevant or redundant information, or could compromise the confidentiality of the report.
Which scenarios are common to money laundering through online marketplaces and trade-based money laundering? (Select Two.)
Answer : A, C
Money laundering through online marketplaces and trade-based money laundering both involve the manipulation of the value or quantity of goods to disguise the illicit origin of funds. Over-valuation of the stated price of goods and no evidence of delivery of goods or shipping expenses are two common indicators of such schemes. The other options are not specific to these methods of money laundering.
The training department is conducting awareness training for unusual customer identification scenarios. Which two indicators should be included? (Select Two.)
Answer : A, B
This information can be found in the Certified Anti-Money Laundering Specialist (CAMS) study guide, 6th edition, under the section on Unusual Customer Identification Scenarios. The guide explains that two indicators that should be included in awareness training for unusual customer identification scenarios are:
A . The customer opens the account in the name of a family member who begins making large deposits.
This is an indicator of potential structuring, where a customer may be attempting to avoid triggering reporting thresholds by depositing funds in smaller amounts over time. It is important for staff to be aware of this scenario and to monitor accounts for potential suspicious activity.
B . The customer's name and home address cannot be verified.
This is an indicator of potential identity theft or other fraudulent activity. If a customer's identifying information cannot be verified, it is important for staff to conduct additional due diligence to ensure that the customer is legitimate and that the account is not being used for illicit purposes.
A client at a financial institution deposits large amounts of money into an account, and almost immediately, the funds are then distributed to numerous individuals' accounts. The transaction activity described in the scenario is a pattern of:
Answer : B
Deposit trading is a pattern of suspicious activity where a client deposits large amounts of money into an account, and then transfers the funds to other accounts, often in different jurisdictions or countries. This could be an attempt to disguise the source or destination of the funds, or to avoid reporting requirements. Deposit trading is also known as layering, which is the second stage of money laundering.
Refer to the exhibit.

During a review of the accounts related to Richard Aston, an investigator notices a high number of incoming payments from various individuals. They also notice that these incoming payments typically occur during large sporting events or conferences. As a result of the account review, of which illegal activity does the investigator have reasonable grounds to suspect Richard Aston?
Answer : B
The illegal activity that the investigator has reasonable grounds to suspect Richard Aston of is aftermarket sales of entertainment admission tickets. This is because aftermarket sales of entertainment admission tickets involve reselling tickets for events, concerts, festivals, etc. at a higher price than their face value, often through online platforms or scalpers. This practice can be illegal or unethical, depending on the jurisdiction and the terms and conditions of the original ticket seller. The investigator should look for indicators of aftermarket sales of entertainment admission tickets, such as high volume or frequency of incoming payments from various individuals, correlation between incoming payments and major events or conferences, and discrepancy between the customer's profile and the nature of the transactions. The other options are incorrect because:
A . Embezzling from the hotel is not likely, as it would involve stealing money or property from the hotel by an employee or a person in a position of trust. There is no evidence that Richard Aston works for or has access to the hotel's assets.
C . Human trafficking is not probable, as it would involve exploiting people for forced labor or commercial sexual exploitation. There is no indication that Richard Aston is involved in any form of human trafficking or has any connection to victims or perpetrators.
D . Sports betting is not plausible, as it would involve wagering money on the outcome of sporting events or games. There is no sign that Richard Aston is engaged in any sports betting activity or has any association with bookmakers or gamblers.
Advanced CAMS-FCI Certification | ACAMS, Section 2: Investigating Financial Crimes, page 10
TicketSwap: The safest way to buy and sell tickets
Ticketing 101 | Ticketmaster
10 Types of Tickets For Events (+ Why & When To Use Them) - Eventbrite
An investigator is reviewing an alert for unusual activity. System scanning detected a text string within a company customer's account transactions that indicates the account may have been used for a drug or drug paraphernalia purchase. Based on the KYC profile, the investigator determines the customer's company name and business type are marketed as a gardening supplies company. The investigator reviews the account activity and notes an online purchase transaction that leads the investigator to a website that sells various strains of marijuan
a. Additional account review detects cash deposits into the account at the branch teller lines, so the investigator reaches out to the teller staff regarding the transactions. The teller staff member reports that the business customers have frequently deposited cash in lower amounts. The teller, without prompting, adds that one of the transactors would occasionally smell of a distinct scent of marijuana smoke.
Which information should be included in the SAR/STR?
Answer : C
The SAR/STR should include any information that is relevant to the suspicious activity, such as the customer information, the transaction details, and any other indicators of potential money laundering or criminal activity. The fact that one of the transactors occasionally smelled of marijuana smoke is an indicator that the customer may be involved in the illicit drug trade, which is a predicate offense for money laundering. Therefore, this information should be included in the SAR/STR. Reference: Advanced CAMS-FCI Study Guide, page 25.
A financial institution (Fl) receives an urgent request for information from the financial intelligence unit (Fl country. According to FATF recommendations, which is the best action for the FI to take?
Answer : B
The correct answer is B because the FATF recommendations state that financial institutions should provide feedback to the FIU as quickly as possible, especially in cases involving the financing of terrorism that could imply an imminent threat to the country. Option A is incorrect because requesting an official court subpoena would delay the response and might not be necessary for the FIU to access the information. Option C is incorrect because establishing a committee would also delay the response and might not be in compliance with the FIU's request. Option D is incorrect because informing the public relations department is irrelevant to the question and might compromise the confidentiality of the investigation.
Law enforcement agents arrive at a broker-dealer's premises with a search warrant. In addition to cooperation with the warrant, which instructions should the person in charge of the broker-dealer provide to their employees?
Answer : A
The instruction that the person in charge of the broker-dealer should provide to their employees is to take notes on the questions and comments made by the agents (A). This is because taking notes can help the employees to recall and document what happened during the search warrant execution, which can be useful for legal or regulatory purposes. According to ACAMS3, ''the FI should instruct its staff to cooperate with LE agents during a search warrant execution, but also to take notes of what is being searched, seized, or asked by the agents'' (p. 35). The FI should also ''keep copies of any documents or records that are taken by LE agents'' (p. 35).
The other instructions are not correct. The person in charge of the broker-dealer should not instruct their employees to sign consent forms permitting the agents to search employees' offices (B), as this is unnecessary and potentially risky, as the agents already have a valid search warrant that authorizes them to search the premises. The person in charge of the broker-dealer should not instruct their employees to provide agents with unlimited access to customers' personal data , as this could violate privacy or data protection laws, as well as compromise customer trust and confidentiality. The person in charge of the broker-dealer should not instruct their employees to volunteer information not requested by the agents that they think may be useful (D), as this could interfere with the LE investigation or expose them to legal or regulatory risks.
Introduction to Transnational Organized Crime
ACAMS Law Enforcement and Financial Crimes Investigations eLearning Course Module
Law Enforcement Requests and Actions
An analyst reviews an alert for high volume Automated Clearing House (ACH) activity in an account. The analyst's initial research finds the account is for a commercial daycare account that receives high volumes of large government-funded ACH transactions to support the programs. The account activity consists of checks (cheques) made payable to individual names in varying dollar amounts. One check indicates rent to another business.
An Internet search finds that the daycare company owner has previous government-issued violations for safety and classroom size needs, such as not having enough chairs and tables per enrollee. These violations were issued to a different daycare name.
Simultaneous to this investigation, another analyst sends an email about negative news articles referencing local child/adult daycare companies misusing governmental grants. This prompts the financial institution (Fl) to search all businesses for names containing 'daycare' or *care'. Text searches return a number of facilities as customers at the Fl and detects that three of these businesses have a similar transaction flow of high volume government ACH funding with little to no daycare expenses.
Which red flags would be an indicator that activity is connected to a corruption/bribery typology? (Select Two.)
Answer : A, B
The red flags that would be an indicator that activity is connected to a corruption/bribery typology are large checks issued to various individuals with the memos noting ''gift'', ''thank you'', ''favor'' (A) and negative news found on the customer related to government-issued violations for safety (B). These red flags suggest that the customer is involved in paying or receiving bribes or kickbacks to or from government officials or other parties in exchange for favorable treatment or contracts. These red flags are consistent with some of the indicators of corruption/bribery identified by ACAMS1, such as:
Payments made to or from third parties that are not directly related to the business
Payments made to or from high-risk jurisdictions or sectors
Payments made with vague or incomplete descriptions or justifications
Negative news or reputation of the customer or its associates
The other options are not as relevant or indicative of corruption/bribery as options A and B. Checks issued to an unrelated entity referencing ''rent'' and ''utilities'' in the memos could be a legitimate business expense or a sign of other types of fraud or money laundering, such as tax evasion or shell company schemes. Multiple daycare locations with no active business operations or related account activity (D) could also be a sign of other types of fraud or money laundering, such as embezzlement or front company schemes. The same beneficial owner owning several daycare centers in different locations (E) could be a normal or legitimate business practice, depending on the size, location, and profitability of the centers.
An investigator receives an alert documenting a series of transactions. A limited liability corporation (LLC) wired 59.000,000 USD to an overseas account associated with a state-run oil company. A second account associated with the state-run oil company wired 600,000,000 USD to the LLC. The LLC then wired money to other accounts, a money brokerage firm, and real estate purchases.
The investigator initiated an enhanced KYC investigation on the LLC. The financial institution opened the LLC account a couple of weeks prior to the series of transactions. The names associated with the LLC had changed multiple times since the account opened. A search of those names revealed relations with multiple LLCs. Public records about the LLCs did not show any identifiable business activities.
Open-source research identified mixed reports about the brokerage firm. The firm indicated it purchased mutual funds for its clients and dispensed returns to clients.
Media reports claimed the firm laundered money by holding for a fee before returning it to investors.
The investigator discovers that the bank has no records pertaining to ownership of the LLC. What would this mean for the bank and/or investigator?
Answer : C
The bank is out of compliance with CIP regulations because it did not obtain the minimum identifying information from the customer prior to opening the account, as required by 31 CFR 1020.220(a)(2)(i)(A). The bank should have obtained the name, date of birth, address, and identification number of the customer, as well as verified the identity of the customer to the extent reasonable and practicable. The lack of ownership data may also indicate a violation of beneficial ownership regulations, but that is not the primary issue in this case.
A client that runs a non-profit organization that aids refugees in leaving their home countries received a remittance from a money services business that was ten times the average. The client was recently detained for providing falsified passports to illegal immigrants. Which predicate offenses could be considered in the SAR/STR? (Select Two.)
Answer : A, B
The correct answer is A and B because human smuggling/trafficking and terrorist financing are both predicate offenses for money laundering that could be related to the client's activities. Option C is incorrect because there is no indication of narcotics trafficking in the scenario. Option D is incorrect because there is no indication of antiques smuggling in the scenario. Option E is incorrect because there is no indication of tax evasion in the scenario.
Law enforcement (LE) suspects human trafficking to occur during a major sporting event LE officers asked several financial institutions (FIs) to monitor financial transactions occurring before, during, and after the event.
An investigator identified a pattern linked to a business. The business' account received multiple even dollar deposits between midnight and 4:00 AM. They occurred each day for several days prior to the date of the sporting event. Also, large cash deposits, typically between 2,000 USD and 3,000 USD. made by a person to the business' account occurred in many branches in the days after the sports event.
There was little information about the company. The company did not have any history of employee payroll expenses or paying taxes. Expenses from the business account included air travel and hotel expenses. Searches about the person making cash deposits showed little. An online social media platform webpage with the individual's name showed ads for dates1' and "companionship."
The Fl wants to create an automated alert for human trafficking money laundering after this investigation. Which activity type should they target?
Answer : B
The activity type that the FI should target for creating an automated alert for human trafficking money laundering is multiple deposits between midnight and 4:00 AM (B). This is because this pattern is consistent with the indicators of human trafficking identified by the Financial Action Task Force (FATF) and the Egmont Group1, which include:
Frequent cash deposits, often in round amounts, outside of normal business hours
Deposits made at different branches or ATMs in various locations
Lack of information about the nature and purpose of the business
Involvement in online platforms that advertise sexual services
Expenses related to travel and accommodation
The other options are not as relevant or specific as option B. Payments made to multiple hotels in the same city (A) could be a legitimate business expense or a sign of other types of money laundering, such as tax evasion or fraud. Deposits made within days of major sporting events could also be explained by other factors, such as increased tourism or gambling. Payments made for virtual currency (D) are not directly related to human trafficking, although they could be used to facilitate money laundering in general.
Which pattern of activity most strongly indicates an individual is a foreign terrorist fighter?
Answer : B
The pattern of activity that most strongly indicates an individual is a foreign terrorist fighter is a large cash advance on a credit card and purchases at travel and sporting goods websites. This is because this pattern may suggest that the individual is preparing to travel to a conflict zone and purchase equipment or supplies for terrorist activities. According to the United Nations Office on Drugs and Crime, some of the indicators of foreign terrorist fighters include1:
Sudden or increased financial activity, such as cash withdrawals, transfers, or deposits, especially in large amounts or involving foreign currency or locations.
Purchases of travel-related items, such as airline tickets, passports, visas, luggage, or clothing, especially to or from high-risk destinations or transit hubs.
Purchases of items that could be used for terrorist purposes, such as weapons, explosives, chemicals, communication devices, or survival gear.
Changes in behavior, such as expressing radical views, cutting ties with family or friends, joining extremist groups, or displaying signs of emotional distress.
Foreign Terrorist Fighters - United Nations Office on Drugs and Crime
Why is a more robust supervisory approach needed by regulators when overseeing small- and medium-sized money service businesses (MSBs) compared to larger MSBs for combatting terrorist financing (TF)?
Answer : D
A more robust supervisory approach is needed by regulators when overseeing small- and medium-sized MSBs compared to larger MSBs for combatting TF because small- and medium-sized MSBs are more at risk of allowing transactions linked to TF due to the lack of skilled compliance resources. Small- and medium-sized MSBs may face challenges in implementing effective AML/CFT controls, such as conducting risk assessments, applying customer due diligence measures, monitoring transactions, detecting suspicious activities, and reporting to the authorities. They may also have limited access to training, guidance, and tools to enhance their compliance capabilities. Therefore, regulators need to provide more supervision and support to small- and medium-sized MSBs to ensure that they comply with the AML/CFT requirements and mitigate the TF risks.
Sustainable Growth for Small and Medium-Sized Enterprises ... - MDPI
Lessons on Resilience for Small and Midsize Businesses - HBR
During transaction monitoring. Bank A learns that one of their customers. Med Supplies 123. is attempting to make a payment via wire totaling 382,500 USD to PPE Business LLC located in Mexico to purchase a large order of personal protective equipment. specifically surgical masks and face shields. Upon further verification. Bank A decides to escalate and refers the case to investigators.
Bank A notes that, days prior to the above transaction, the same customer went to a Bank A location to wire 1,215,280 USD to Breath Well LTD located in Singapore. Breath Well was acting as an intermediary to purchase both 3-ply surgical masks and face shields from Chin
a. Bank A decided not to complete the transaction due to concerns with the involved supplier in China. Moreover, the customer is attempting to send a third wire in the amount of 350,000 USD for the purchase of these items, this time using a different vendor in China. The investigator must determine next steps in the investigation and what actions, if any. should be taken against relevant parties.
During the investigation, Bank A receives a USA PATRIOT Act Section 314(a) request related to Med Supplies 123. Which steps should the investigator take when fulfilling the request? (Select Three.)
Answer : D, E, F
According to the FinCEN's 314(a) Fact Sheet1, the steps that the investigator should take when fulfilling the request are:
Search its records expeditiously to determine whether it maintains(ed) any accounts for the subject(s) listed in the request. This is option F.
Report back to the Financial Crimes Enforcement Network (FinCEN) within 15 days of receipt of the request via a secure internet website. This is option E.
Report to Financial Crimes Enforcement Network (FinCEN) that a match was found without revealing any other details. This is option D.
The other options are incorrect because:
Exiting the relationship with the business since it appears that customer is under investigation is not required by the 314(a) program and may interfere with law enforcement's investigation. This is option A.
Not responding to Financial Crimes Enforcement Network (FinCEN) if the requested information is not present in the financial institution's system of records is contrary to the 314(a) program, which requires financial institutions to respond whether or not they have a match. This is option B.
Reviewing the account(s) activity and proactively filing a SAR/STR using the 314(a) request as the basis for the filing is not appropriate, as the 314(a) request itself is not a sufficient reason to file a SAR/STR. The financial institution should only file a SAR/STR if it has its own independent suspicion of money laundering or terrorist financing. This is option C.
Which information is it best practice to share at the very beginning of a well-written SAR/STR narrative?
Answer : B
The best information to share at the very beginning of a well-written SAR/STR narrative is the purpose of the SAR/STR narrative and a general description of the known or alleged violation. This is because this information provides an overview of why the SAR/STR is being filed and what type of suspicious activity or transaction is involved. It also helps to capture the attention of the reader and set the tone for the rest of the narrative.
A criminal is engaged in chain hopping while trying to launder ransomware payments. The criminal will likely:
Answer : B
Chain hopping is a technique used by criminals to obscure the traceability of cryptocurrency transactions by converting the funds to a different type of cryptocurrency, often using multiple exchanges or platforms. The other options are not related to chain hopping. Reference: Advanced CAMS-FCI Study Guide, page 38.
A national financial intelligence unit (FIU) is undertaking the country risk assessment for the financing of the proliferation of weapons of mass destruction (WMD). The evaluation involves determining the exposure that financial institutions (FIs) have to operations that evade sanctions. Which should be performed by the FIU to assess proliferation financing risk? (Select Two.)
Answer : B, D
The FIU should cross-reference the databases of international commerce/logistics transactions between the country and WMD proliferation sanctioned states with the corresponding international financial operations of those transactions, as this would help identify any discrepancies or anomalies that could indicate sanctions evasion. The FIU should also evaluate a sample of the amount of false-positive and false-negative alerts that FIs have regarding proliferation sanctions evasion to determine root causes of non-detection, such as inadequate screening systems, lack of training, or human error. These actions would help the FIU assess the proliferation financing risk and provide feedback and guidance to FIs on how to improve their detection and prevention capabilities.
The investigative department of a financial institution (Fl) receives an internal escalation notice from the remittance department for a SWIFT message requesting a refund due to potential fraud. The notice indicates that a total of three international incoming remittances were transferred to a corporate customer from Country A, in the amount of approximately 5 million EUR for each. The first two incoming remittances had been exchanged into currency B and transferred out to Country B a few days ago. The third incoming remittance has been held by the remittance department.
As noted from the KYC profile, the corporate customer is working in the wood industry. with the last account review completed 3 months ago. Since the account's opening. there has been no history of a large amount of funds flowing through the account. The investigator conducts an Internet search and finds that the remitter is a food beverage company.
The same morning, the investigator receives a call from a financial intelligence unit (FIU) inquiring about the same incident. The FIU states that it will issue a warrant to freeze the account on the same day.
After further review, the decision is made that transactions appear suspicious. Which are the next steps the investigator should take? (Select Two.)
Answer : C, E
The correct answer is C and E. The investigator should provide additional information to the LE upon receiving a formal request, and gather all the information that would be useful for LE and recommend filing a SAR/STR. These steps are consistent with the best practices of conducting financial crime investigations and reporting suspicious activity. The investigator should not close the customer's accounts or the investigation, as this may interfere with the ongoing LE inquiry and violate the FI's policies and procedures. The investigator should also not contact local LE directly, as this may compromise the confidentiality of the investigation and the FIU's authority. Reference:
Advanced CAMS-FCI Study Guide, Chapter 4: Reporting Suspicious Activity, pages 40-411
Advanced CAMS-FCI Study Guide, Chapter 5: Governance of an AFC Investigations Unit, pages 48-491
Advanced CAMS-FCI Certification | ACAMS
Law enforcement (LE) suspects human trafficking to occur during a major spotting event. LE officers asked several financial institutions (FIs) to monitor financial transactions occurring before, during, and after the event.
An investigator identified a pattern linked to a business. The business* account received multiple even dollar deposits between midnight and 4:00 AM. They occurred each day for several days prior to the date of the sporting event. Also, large cash deposits, typically between 2,000 USD and 3.000 USD. made by a person to the business' account occurred in many branches in the days alter the sports event.
There was little information about the company. The company did not have any history of employee payroll expenses or paying taxes. Expenses from the business account included air travel and hotel expenses. Searches about the person making cash deposits showed little. An online social media platform webpage with the individual's name showed ads for dates" and "companionship."
Which fact should not be included in (he SAR/STR narrative?
Answer : B
The fact that should not be included in the SAR/STR narrative is the request by law enforcement (D). This is because the request by law enforcement is confidential and should not be disclosed to the customer or anyone else who is not authorized to know it. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should not include any reference to the LE request in the SAR/STR narrative, as this could compromise the LE investigation or alert the customer of the suspicion'' (p. 35). The FI should also not inform the customer of the LE request or delay filing the SAR/STR because of it.
The other facts should be included in the SAR/STR narrative, as they are relevant and indicative of human trafficking money laundering. The air travel and hotel expenses (A) show that the customer is involved in moving people across different locations, which could be a sign of human smuggling or trafficking. The time of the cash deposits (B) shows that the customer is receiving cash payments during unusual hours, which could be a sign of illicit activities or services. The sporting event shows that the customer is exploiting a high-demand situation for their business, which could be a sign of opportunistic or organized crime.
Which are some of the negative impacts from illegal wildlife trade and environmental crimes? (Select Two.)
Answer : B, D, D
Some of the negative impacts of illegal wildlife trade and environmental crimes are loss of potential tax proceeds and threats to biodiversity. Loss of potential tax proceeds occurs when illegal wildlife trade and environmental crimes evade taxation and customs duties, depriving governments of revenues that could be used for public services and development. Threats to biodiversity occur when illegal wildlife trade and environmental crimes endanger species, habitats, and ecosystems, reducing their resilience and ability to provide essential services for human well-being. Public health consequences and threats to a country's political stability are not directly related to illegal wildlife trade and environmental crimes, but rather to other types of financial crimes such as money laundering, terrorism financing, or corruption.
An investigator at a corporate bank is conducting transaction monitoring alerts clearance.
KYC profile background: An entity customer, doing business offshore in Hong Kong, established a banking business relationship with the bank in 2017 for deposit and loan purposes. It acts as an offshore investment holding company. The customer declared that the ongoing source of funds to this account comes from group-related companies.
* X is the UBO. and owns 97% shares of this entity customer;
* Y is the authorized signatory of this entity customer. This entity customer was previously the subject of a SAR/STR.
KYC PROFILE
Customer Name: AAA International Company. Ltd
Customer ID: 123456
Account Opened: June 2017
Last KYC review date: 15 Nov 2020
Country and Year of Incorporation: The British Virgin Islands, May 2017
AML risk level: High
Account opening and purpose: Deposits, Loans and Trade Finance
Anticipated account activities: 1 to 5 transactions per year and around 1 million per
transaction amount
During the investigation, the investigator reviewed remittance transactions activities for the period from Jul 2019 to Sep 2021 and noted the following transactions pattern:
TRANSACTION JOURNAL
Review dates: from July 2019 to Sept 2021
For Hong Kong Dollars (HKD) currency:
Incoming transactions: 2 inward remittances of around 1.88 million HKD in total from
different third parties
Outgoing transactions: 24 outward remittances of around 9 4 million HKD in total to
different third parties
For United States Dollars (USD) currency:
Incoming transactions: 13 inward remittances of around 3.3 million USD in total from
different third parties
Outgoing transactions: 10 outward remittances of around 9.4 million USD in total to
different third parties.
RFI Information and Supporting documents:
According to the RFI reply received on 26 May 2021, the customer provided the bank
with the information below:
1) All incoming funds received in HKD & USD currencies were monies lent from non-customers of the bank. Copies of loan agreements had been provided as supporting documents. All of the loan agreements were in the same format and all the lenders are engaged in trading business.
2) Some loan agreements were signed among four parties, including among lenders. borrower (the bank's customer), guarantor, and guardian with supplemental agreements, which stated that the customer, as a borrower, who failed to repay the loan
Based on the KYC profile and the transaction journal, the pattern of activity shows a deviation in:
Answer : A
The correct answer is A because the expected account activities were 1 to 5 transactions per year and around 1 million per transaction amount, but the actual activity showed much more frequent and varied transactions in different currencies and amounts. This indicates a deviation from the customer's profile and risk level.
A client at a financial institution deposits large amounts of money into an account, and almost immediately, the funds are then distributed to numerous individuals' accounts. The transaction activity described in the scenario is a pattern of:
Answer : B
Deposit trading is a pattern of suspicious activity where a client deposits large amounts of money into an account, and then transfers the funds to other accounts, often in different jurisdictions or countries. This could be an attempt to disguise the source or destination of the funds, or to avoid reporting requirements. Deposit trading is also known as layering, which is the second stage of money laundering.
An investigator at a corporate bank is conducting transaction monitoring alerts clearance.
KYC profile background: An entity customer, doing business offshore in Hong Kong, established a banking business relationship with the bank since 2017 for deposit and loan purposes. It acts as an offshore investment holding company. The customer declared that the ongoing source of funds to this account comes from group-related companies.
* X is the UBO. and owns 97% shares of this entity customer;
* Y is is the authorized signatory of this entity customer. This entity customer was previously the subject of a SAR/STR.
KYC PROFILE
Customer Name: AAA International Company. Ltd
Customer ID: 123456
Account Opened: June 2017
Last KYC review date: 15 Nov 2020
Country and Year of Incorporation: The British Virgin Islands, May 2017
AML risk level: High
Account opening and purpose: Deposits, Loans, and Trade Finance
Anticipated account activities: 1 to 5 transactions per year and around 1 million per
transaction amount
During the investigation, the investigator reviewed remittance transactions activities for the period from Jul 2019 to Sep 2021 and noted the following transactions pattern:
TRANSACTION JOURNAL
Review dates: from July 2019 to Sept 2021
For Hong Kong Dollars (HKD) currency:
Incoming transactions: 2 inward remittances of around 1.88 million HKD in total from
different third parties
Outgoing transactions: 24 outward remittances of around 9 4 million HKD in total to
different third parties
For United States Dollars (USD) currency:
Incoming transactions: 13 inward remittances of around 3.3 million USD in total from
different third parties
Outgoing transactions: 10 outward remittances of around 9.4 million USD in total to
different third parties.
RFI Information and Supporting documents:
According to the RFI reply received on 26 May 2021, the customer provided the bank
with the information below:
1J All incoming funds received in HKD & USD currencies were monies lent from non-customers of the bank. Copies of loan agreements had been provided as supporting documents. All of the loan agreements were in the same format and all the lenders are engaged in trading business.
2) Some loan agreements were signed among four parties, including among lenders. borrower (the bank's customer), guarantor, and guardian with supplemental agreements, which stated that the customer, as a borrower, who failed to repay a loan
Which suspicious activity should the investigator identify during the review of the loan agreements?
Answer : D
The correct answer is D because it is a suspicious activity that Y, who is the authorized signatory of the customer, also signed on behalf of the lenders. This indicates a possible conflict of interest, collusion, or fraud. The other options are not suspicious activities based on the information given.
A financial institution (Fl) receives an urgent request for information from the financial intelligence unit (Fl country. According to FATF recommendations, which is the best action for the FI to take?
Answer : B
The correct answer is B because the FATF recommendations state that financial institutions should provide feedback to the FIU as quickly as possible, especially in cases involving the financing of terrorism that could imply an imminent threat to the country. Option A is incorrect because requesting an official court subpoena would delay the response and might not be necessary for the FIU to access the information. Option C is incorrect because establishing a committee would also delay the response and might not be in compliance with the FIU's request. Option D is incorrect because informing the public relations department is irrelevant to the question and might compromise the confidentiality of the investigation.
The investigative department of a financial institution (Fl) receives an internal escalation notice from the remittance department for a SWIFT message requesting a refund due to potential fraud. The notice indicates that a total of three international incoming remittances were transferred to a corporate customer from Country A, in the amount of approximately 5 million EUR for each. The first two incoming remittances had been exchanged into currency B and transferred out to Country B a few days ago. The third incoming remittance has been held by the remittance department.
As noted from the KYC profile, the corporate customer is working in the wood industry. with the last account review completed 3 months ago. Since the account's opening. there has been no history of a large amount of funds flowing through the account. The investigator conducts an Internet search and finds that the remitter is a food beverage company.
The same morning, the investigator receives a call from a financial intelligence unit (FIU) inquiring about the same incident. The FIU states that it will issue a warrant to freeze the account on the same day.
Which steps for documenting the final investigation decision are appropriate for the investigator in this scenario?
Answer : C
The investigator should document the investigation process and retain all relevant documents in the case management system. This is because documenting the investigation process is a good practice to ensure the quality and consistency of the investigation, as well as to facilitate the review and audit of the investigation. Retaining all relevant documents is also important to support the evidence and findings of the investigation, as well as to comply with the record-keeping requirements of the relevant authorities. The other options are incorrect because:
A . Excluding any open-source information from record-keeping is not advisable, as open-source information can provide valuable insights and context for the investigation, and may not be easily retrievable in the future.
B . Adding all of the information the FI has about the subject, their account(s) activity, research results, KYC information, etc. to the SAR/STR is not necessary, as the SAR/STR should only contain the essential information that is relevant and material to the suspicious activity. Adding too much information may obscure the main points and make the SAR/STR less effective.
D . Not documenting the investigation process if a SAR/STR is not filed is not acceptable, as the investigation process should be documented regardless of the outcome. Documenting the investigation process can help justify why a SAR/STR was not filed, and also provide a reference for future investigations involving the same subject or activity.
Advanced CAMS-FCI Certification | ACAMS, Section 3: Reporting Suspicious Activity, page 14
Leading Complex Investigations Certificate | ACAMS, Module 4: Documenting Your Investigation, page 4
Which payment method for purchasing luxury items is a red flag for potential money laundering?
Answer : B
According to the Financial Action Task Force (FATF), the use of large amounts of cash is a common method for money launderers to move illicit funds [1]. Purchasing luxury items with cash can indicate an attempt to convert illegal funds into tangible assets that can be easily resold or moved across borders. As a result, businesses that deal with luxury items are required to implement enhanced due diligence measures, including monitoring transactions involving large amounts of cash [1].
SAR/STR NARRATIVE
A SAR/STR has been submitted on five transactions conducted on the correspondent banking relationship with ABC Bank.
Client Information:
Remitter information: DEF Oil Resource Ltd. is the oldest member of the DEF Group. It was founded in 1977 as a general trading business with a primary focus on exports from Africa and North Americ
a. The group has business activities that span the entire energy value chain. Their core field of endeavor is centered within the oil and gas industry and its associated sub-sectors.
Beneficiary Information:
As per the response received from ABC Bank, it was determined that the beneficiaries are related to DEF Oil Resource Ltd. These were created by DEF Oil Resource Ltd. to purchase property in a foreign country on behalf of their senior management as part of a bonus scheme. The purpose behind this payment was for the purchase of property in another country.
Payment Reference:
ABCXXXXX31PZFG2H
ABCXXXXXX51PQGEH
ABCXXXXXX214QWVG
ABCXXXXXX41PSXA2
ABCXXXXXX815QWS3
Concerns:
* We are unsure about the country of incorporation of the beneficiaries.
* We are concerned about the transactional activity since the payment made towards entities (conducted on behalf of individuals) appears to be possible tax evasion.
* There appears to be an attempt to conceal the identity of individuals (senior management), which again raises concerns about the source of funds.
* Referring to the response received from ABC Bank, we are unclear about the ultimate beneficiary of funds.
* The remitter is involved in a high-risk business, (i.e., oil and crude products trading), and the beneficiary is involved in real estate business which again poses a higher risk.
While reviewing the account activity, it is noted that several transfers are sent to a company located in an offshore jurisdiction. Which step should the investigator take next?
Answer : C
The best step for the investigator to take next is to request information about the beneficiaries related to the company. This will help to identify the ultimate beneficial owners of the funds and the purpose of the transactions. Requesting information from the company or filing a SAR/STR to the FIU where the company is located may not be feasible or effective, as the company may not cooperate or the FIU may not have jurisdiction over the offshore entity. Conducting an open-source search may provide some information about the ownership and registration of the company, but it may not be sufficient or reliable to determine the nature and legitimacy of the transactions.
SAR Narrative Guidance Package
Best Practices for Drafting an STR or SAR
A financial regulator is evaluating the effectiveness of a financial institution's (Fl) anti-financial crime program. Which condition should be met to satisfy the regulator?
Answer : D
The condition that should be met to satisfy the regulator is that the program is drafted using a risk-based approach to avoid the FI being used as a conduit for criminal activities. A risk-based approach means that the FI identifies, assesses, and understands its exposure to financial crime risks and applies appropriate measures to mitigate them. This is consistent with the international standards and best practices for anti-financial crime compliance. The program being aligned with the financial industry's anti-financial crime priorities, meeting the minimum requirements of anti-financial crime standards published by a financial industry association, or having no high-severity issues in internal auditing results are not sufficient to satisfy the regulator, as they do not necessarily reflect the specific risks faced by the FI or demonstrate its effectiveness in preventing and detecting financial crimes.
During transaction monitoring. Bank A learns that one of its customers. Med Supplies 123, is attempting to make a payment via wire totaling 382.500 USD to PPE Business LLC located in Mexico to purchase a large order of personal protective equipment. specifically surgical masks and face shields. Upon further verification. Bank A decides to escalate and refers the case to investigators.
Bank A notes that days prior to the above transaction, the same customer went to a Bank A location to wire 1,215,280 USD to Breath Well LTD located in Singapore. Breath Well was acting as an intermediary to purchase both 3-ply surgical masks and face shields from Chin
a. Bank A decided not to complete the transaction due to concerns with the involved supplier in China. Moreover, the customer is attempting to send a third wire in the amount of 350,000 USD for the purchase of these items, this time using a different vendor in China. The investigator must determine the next steps in the investigation and what actions, if any. should be taken against relevant parties.
The investigator is gathering more information to determine if a SAR/STR filing is needed. Which steps are the correct ways of collecting the additional information? (Select Two.)
Answer : A, D
The correct answer is A and C because these indicators suggest that the customer is using fraudulent documents and misrepresenting the goods to conceal the illicit nature of the transactions. Fentanyl traffickers often use front companies and falsified invoices to disguise their shipments as legitimate products, such as medical supplies or chemicals. Reviewing the invoices and transportation documents, as well as the FDA product certifications, can help to identify discrepancies or anomalies that indicate fraud or deception.
Law enforcement (LE) suspects human trafficking to occur during a major spotting event. LE officers asked several financial institutions (FIs) to monitor financial transactions occurring before, during, and after the event.
An investigator identified a pattern linked to a business. The business* account received multiple even dollar deposits between midnight and 4:00 AM. They occurred each day for several days prior to the date of the sporting event. Also, large cash deposits, typically between 2,000 USD and 3.000 USD. made by a person to the business' account occurred in many branches in the days alter the sports event.
There was little information about the company. The company did not have any history of employee payroll expenses or paying taxes. Expenses from the business account included air travel and hotel expenses. Searches about the person making cash deposits showed little. An online social media platform webpage with the individual's name showed ads for dates" and "companionship."
Which fact should not be included in (he SAR/STR narrative?
Answer : B
The fact that should not be included in the SAR/STR narrative is the request by law enforcement (D). This is because the request by law enforcement is confidential and should not be disclosed to the customer or anyone else who is not authorized to know it. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should not include any reference to the LE request in the SAR/STR narrative, as this could compromise the LE investigation or alert the customer of the suspicion'' (p. 35). The FI should also not inform the customer of the LE request or delay filing the SAR/STR because of it.
The other facts should be included in the SAR/STR narrative, as they are relevant and indicative of human trafficking money laundering. The air travel and hotel expenses (A) show that the customer is involved in moving people across different locations, which could be a sign of human smuggling or trafficking. The time of the cash deposits (B) shows that the customer is receiving cash payments during unusual hours, which could be a sign of illicit activities or services. The sporting event shows that the customer is exploiting a high-demand situation for their business, which could be a sign of opportunistic or organized crime.
A criminal is engaged in chain hopping while trying to launder ransomware payments. The criminal will likely:
Answer : B
Chain hopping is a technique used by criminals to obscure the traceability of cryptocurrency transactions by converting the funds to a different type of cryptocurrency, often using multiple exchanges or platforms. The other options are not related to chain hopping. Reference: Advanced CAMS-FCI Study Guide, page 38.
A U.S. financial institution (Fl) receives a grand jury subpoena for a corporate client's account. The Fl should:
Answer : B
The Fl should review the corporate account's activity and transactions. This is because a grand jury subpoena is a legal request for information or testimony that may be used in a criminal investigation or prosecution. The Fl should review the account for any suspicious or unusual activity that may be related to the subpoena or indicate money laundering, terrorist financing, or other financial crimes. The Fl should also document its review and retain any relevant records.
Which most likely indicates that a business email compromise attack has occurred?
Answer : A
When writing or reviewing a SAR/STR, it is important to ensure that the narrative is kept to the point; easy to read; and addresses the who, what, when, where, why, and how. This is because the narrative is the most crucial part of the SAR/STR, as it provides a clear and concise summary of the suspicious activity or transaction that triggered the report. The narrative should include all the relevant information that would help law enforcement or regulators to understand the nature and context of the activity or transaction, such as123:
The who: The names, addresses, account numbers, and other identifying information of the parties involved in the activity or transaction, such as customers, beneficiaries, intermediaries, or third parties.
The what: The type, amount, frequency, and purpose of the activity or transaction, such as cash deposits, wire transfers, check payments, or purchases of goods or services.
The when: The date, time, and duration of the activity or transaction, and whether it was a one-time occurrence or part of a pattern or trend.
The where: The location or channel of the activity or transaction, such as branches, ATMs, online platforms, or mobile applications.
The why: The reason or rationale for the activity or transaction, and why it was considered suspicious or unusual based on the customer's profile, behavior, or expected activity.
The how: The method or mechanism of the activity or transaction, such as cash, check, debit card, credit card, cryptocurrency, or prepaid card.
How to write the perfect ''Suspicious Activity Reports'' (SAR)? | i-AML
Writing for Prosecution: Best Practices For Composing SAR Narratives That Assist Prosecutors | ACAMS
SAR Writing Examples and Proper Formatting: Write for Your Reader - Alessa
CLIENT INFORMATION FORM Client Name: ABC Tech Corp Client I.D. Number: 08125 Name: ABC Tech Corp Registered Address: Mumbai, India Work Address: Mumbai. India Cell Phone: ***"--- Alt Phone: Email: ********
Client Profile Information:
Sector: Financial
Engaged in business from (date): 02 Jan 2020
Sub-sector: Software-Cryptocurrency Exchange
Expected Annual Transaction Amount: 125.000 USD
Payment Nature: Transfer received from client's fund
Received from: Clients
Received for: Sale of digital assets
The client identified themselves as "Cryptocurrency Exchange" Client has submitted the limited liability partnership deed. However, the bank's auditing team is unable to identify the client's exact business profile as the cryptocurrency exchange specified by the client as their major business awaits clearance from the country's regulator. The client has submitted documents/communications exchanged with the regulator and has cited the lack of governing laws in the country of their operation as the reason for the delay.
Investigators determine the ultimate beneficial owner of ABC Tech Corp is a high-net-worth client. The client owns a real estate agency left to her when her spouse died. The spouse provided seed capital for ABC Tech Corp through a direct 1,000.000 Great British Pound (GBP) deposit.
What additional information would trigger filing a SAR/STR?
Answer : D
The additional information that would trigger filing a SAR/STR is the fact that the funds for the seed capital were in the form of 50 cashier's checks of 10,000 GBP each and 50 money orders of 10,000 GBP. This is because this indicates a possible attempt to avoid the reporting threshold of 10,000 GBP for cash transactions, which is a common money laundering technique known as structuring or smurfing12. The other options are not necessarily suspicious, as they do not involve cash transactions or indicate any illicit source of funds. The fact that the client's spouse was a PEP does not automatically make the transaction suspicious unless there are other red flags or risk factors associated with the PEP34
An investigator is reviewing a case generated from the transaction monitoring system, with two large amounts of incoming remittance (IR) to an individual customer. Based on the KYC profile, the customer is a plant manager of a famous multi-national electronics manufacturing firm. As the customer has no similarly large transaction patterns for the past 2 years, the investigator sends an inquiry to the relationship manager (RM) about the nature of the transaction. The RM replies that the transaction is a consultancy fee provided from two different electronics companies with a debit note provided However, there is no detail of service provided on the debit note, and the remitters are two individuals.
Which actions should the investigator recommend to mitigate risk? (Select Two.)
Answer : D, E
The actions that the investigator should recommend to mitigate risk are conducting enhanced due diligence (D) and re-evaluating the customer risk profile (E). These actions are appropriate and prudent, as they allow the investigator to obtain more information and evidence about the nature and purpose of the transactions, the source and destination of the funds, and the identity and legitimacy of the parties involved. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should conduct enhanced due diligence on all parties involved in the investigation, including checking various sources of information, such as watch lists, sanctions lists, negative news, and official registries'' (p. 24). The FI should also ''re-assess the customer risk profile based on any new information obtained during the investigation, and adjust the customer due diligence and monitoring requirements accordingly'' (p. 25).
The other options are not as appropriate or effective as options D and E. The investigator should not recommend exiting the relationship with the customer (A), as this could be premature or disproportionate, as well as potentially discriminatory or illegal. The investigator should not recommend documenting and maintaining a file with the investigative findings (B), as this is not an action to mitigate risk, but rather a standard procedure for any investigation. The investigator should not recommend discussing the investigation findings with the customer , as this could compromise the integrity and objectivity of the investigation, as well as expose the FI to legal or regulatory risks.
An analyst reviews an alert for high volume Automated Clearing House (ACH) activity in an account. The analyst's initial research finds the account is for a commercial daycare account that receives high volumes of large government-funded ACH transactions to support the programs. The account activity consists of checks (cheques) made payable to individual names in varying dollar amounts. One check indicates rent to another business.
An Internet search finds that the daycare company owner has previous government-issued violations for safety and classroom size needs, such as not having enough chairs and tables per enrollee. These violations were issued to a different daycare name.
Simultaneous to this investigation, another analyst sends an email about negative news articles referencing local child/adult daycare companies misusing governmental grants. This prompts the financial institution (Fl) to search all businesses for names containing daycare' or care*. Text searches return a number of facilities as customers at the Fl and detects that three of these businesses have a similar transaction flow of high volume government ACH funding with little to no daycare expenses.
The analyst determines that site visits should be conducted for the three daycare businesses. Which observations at the on-site visits would justify writing a SAR/STR? (Select Three.)
Answer : A, C, F
The observations at the on-site visits that would justify writing a SAR/STR are signs of severe wear and poor maintenance at the site (A), lights turned off at the site during operational hours , and a full parking lot of cars with no staff at the site (F). These observations suggest that the daycare businesses are not operating legitimately or providing adequate services to their customers, and that they may be misusing governmental grants or laundering money through their accounts. These observations are consistent with some of the red flags for fraud identified by ACAMS2, such as:
Inadequate facilities or equipment for the type of business
Lack of visible activity or customers at the business location
Discrepancy between reported income and expenses
Unusual volume or frequency of transactions
The other observations are not as relevant or indicative of fraud as options A, C, and F. A site located in a commercial building (B) could be a normal or legitimate choice for a daycare business, depending on its size, location, and availability. Visible attendance with children being dropped off by parents (D) could show that the daycare business is providing genuine services to its customers, although it does not rule out possible fraud or money laundering. Visible signage indicating the purpose of building (E) could also show that the daycare business is transparent and legitimate, although it does not guarantee its quality or compliance.
The training department is conducting awareness training for unusual customer identification scenarios. Which two indicators should be included? (Select Two.)
Answer : A, B
This information can be found in the Certified Anti-Money Laundering Specialist (CAMS) study guide, 6th edition, under the section on Unusual Customer Identification Scenarios. The guide explains that two indicators that should be included in awareness training for unusual customer identification scenarios are:
A . The customer opens the account in the name of a family member who begins making large deposits.
This is an indicator of potential structuring, where a customer may be attempting to avoid triggering reporting thresholds by depositing funds in smaller amounts over time. It is important for staff to be aware of this scenario and to monitor accounts for potential suspicious activity.
B . The customer's name and home address cannot be verified.
This is an indicator of potential identity theft or other fraudulent activity. If a customer's identifying information cannot be verified, it is important for staff to conduct additional due diligence to ensure that the customer is legitimate and that the account is not being used for illicit purposes.
When writing or reviewing a SAR/STR, it is important to:
Answer : A
The correct answer is A because a SAR/STR narrative should be concise, clear, and complete, addressing the who, what, when, where, why, and how of the suspicious activity. Option B is incorrect because providing too much information can make the narrative confusing and irrelevant. Option C is incorrect because the introduction should provide a summary of the suspicious activity, not the conclusion. Option D is incorrect because suspect names should be mentioned in the narrative to identify the parties involved in the suspicious activity.
Which are some of the negative impacts from illegal wildlife trade and environmental crimes? (Select Two.)
Answer : B, D, D
Some of the negative impacts of illegal wildlife trade and environmental crimes are loss of potential tax proceeds and threats to biodiversity. Loss of potential tax proceeds occurs when illegal wildlife trade and environmental crimes evade taxation and customs duties, depriving governments of revenues that could be used for public services and development. Threats to biodiversity occur when illegal wildlife trade and environmental crimes endanger species, habitats, and ecosystems, reducing their resilience and ability to provide essential services for human well-being. Public health consequences and threats to a country's political stability are not directly related to illegal wildlife trade and environmental crimes, but rather to other types of financial crimes such as money laundering, terrorism financing, or corruption.
A SAR/STR on cash activity is filed for a company registered in the Marshall Islands operating a Mediterranean beach bar and hotel. The company has three nominee directors, one nominee shareholder, and another individual declared as both the beneficial owner and authorized signatory. Which information is key for law enforcement's physical surveillance of cash activity? (Select Two.)
Answer : B, C
The identification details of the beneficial owner and authorized signatory are key for law enforcement's physical surveillance of cash activity, as they would help identify the person who controls and operates the company and who is responsible for its financial transactions. The company's operating address is also key, as it would help locate the premises where the cash activity takes place and observe any suspicious movements or behaviors. The identification details of the nominee shareholder and directors are not relevant, as they are not involved in the management or operation of the company. The company's registered address is also not relevant, as it is likely to be a shell or mailbox address that does not reflect the actual location of the business.
In a SAR/STR narrative concerning Individual
Answer : B
A product of analysis is a conclusion or inference that is derived from facts or judgments, using analytical techniques or tools. Option B is a product of analysis because it implies that the investigator has used a tool or technique, such as a threshold analysis, to identify a pattern of structured cash deposits that may indicate an attempt to evade reporting requirements. The other options are facts or judgments that can be verified by evidence or observation.
A client at a financial institution deposits large amounts of money into an account, and almost immediately, the funds are then distributed to numerous individuals' accounts. The transaction activity described in the scenario is a pattern of:
Answer : B
Deposit trading is a pattern of suspicious activity where a client deposits large amounts of money into an account, and then transfers the funds to other accounts, often in different jurisdictions or countries. This could be an attempt to disguise the source or destination of the funds, or to avoid reporting requirements. Deposit trading is also known as layering, which is the second stage of money laundering.
An analyst reviews an alert for high volume Automated Clearing House (ACH) activity in an account. The analyst's initial research finds the account is for a commercial daycare account that receives high volumes of large government-funded ACH transactions to support the programs. The account activity consists of checks (cheques) made payable to individual names in varying dollar amounts. One check indicates rent to another business.
An Internet search finds that the daycare company owner has previous government-issued violations for safety and classroom size needs, such as not having enough chairs and tables per enrollee. These violations were issued to a different daycare name.
Simultaneous to this investigation, another analyst sends an email about negative news articles referencing local child/adult daycare companies misusing governmental grants. This prompts the financial institution (Fl) to search all businesses for names containing 'daycare' or *care'. Text searches return a number of facilities as customers at the Fl and detects that three of these businesses have a similar transaction flow of high volume government ACH funding with little to no daycare expenses.
Which red flags would be an indicator that activity is connected to a corruption/bribery typology? (Select Two.)
Answer : A, B
The red flags that would be an indicator that activity is connected to a corruption/bribery typology are large checks issued to various individuals with the memos noting ''gift'', ''thank you'', ''favor'' (A) and negative news found on the customer related to government-issued violations for safety (B). These red flags suggest that the customer is involved in paying or receiving bribes or kickbacks to or from government officials or other parties in exchange for favorable treatment or contracts. These red flags are consistent with some of the indicators of corruption/bribery identified by ACAMS1, such as:
Payments made to or from third parties that are not directly related to the business
Payments made to or from high-risk jurisdictions or sectors
Payments made with vague or incomplete descriptions or justifications
Negative news or reputation of the customer or its associates
The other options are not as relevant or indicative of corruption/bribery as options A and B. Checks issued to an unrelated entity referencing ''rent'' and ''utilities'' in the memos could be a legitimate business expense or a sign of other types of fraud or money laundering, such as tax evasion or shell company schemes. Multiple daycare locations with no active business operations or related account activity (D) could also be a sign of other types of fraud or money laundering, such as embezzlement or front company schemes. The same beneficial owner owning several daycare centers in different locations (E) could be a normal or legitimate business practice, depending on the size, location, and profitability of the centers.
Each month the automated transaction monitoring system generates alerts based on predetermined scenarios. An alert was generated in relation to the account activity of ABC Foundation. Below is the transaction history for ABC Foundation (dates are in DD/MM/YYYY format).

The relationship manager for ABC Foundation contacts the client to request more information on the beneficiary of the transfer in Turkey. ABC Foundation advises that this is a not-for-profit charity group called 'Forever Free." Which is the best next step in the investigation?
Answer : C
The best next step in the investigation is to check the jurisdiction's list of known charities with connections to terrorist activity . This is because the FI has a responsibility to verify the legitimacy and reputation of the beneficiary of the funds, especially if it is a charity or non-profit organization that operates in a high-risk jurisdiction or sector. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should conduct enhanced due diligence on all parties involved in the investigation, including checking various sources of information, such as watch lists, sanctions lists, negative news, and official registries'' (p. 24). The FI should also check if the beneficiary is consistent with the customer's profile and expected activity.
The other options are not as appropriate or effective as option C. Contacting the financial institution in Turkey that has a relationship with Forever Free and advising them of the investigation (A) could violate confidentiality or data protection laws, as well as compromise the investigation or alert the customer or beneficiary of the suspicion. Updating the customer profile to include Forever Free as the recipient of the funds (B) could be premature or inaccurate, as it does not verify the nature and purpose of the transfer or the identity and legitimacy of the beneficiary. Filing a SAR/STR with the new information learned about the beneficiary (D) could also be premature or incomplete, as it does not confirm if there is any suspicious or criminal activity involved in the transfer or if there are any other red flags or indicators.
Which information is it best practice to share at the very beginning of a well-written SAR/STR narrative?
Answer : B
The best information to share at the very beginning of a well-written SAR/STR narrative is the purpose of the SAR/STR narrative and a general description of the known or alleged violation. This is because this information provides an overview of why the SAR/STR is being filed and what type of suspicious activity or transaction is involved. It also helps to capture the attention of the reader and set the tone for the rest of the narrative.
Law enforcement agents arrive at a broker-dealer's premises with a search warrant. In addition to cooperation with the warrant, which instructions should the person in charge of the broker-dealer provide to their employees?
Answer : A
The instruction that the person in charge of the broker-dealer should provide to their employees is to take notes on the questions and comments made by the agents (A). This is because taking notes can help the employees to recall and document what happened during the search warrant execution, which can be useful for legal or regulatory purposes. According to ACAMS3, ''the FI should instruct its staff to cooperate with LE agents during a search warrant execution, but also to take notes of what is being searched, seized, or asked by the agents'' (p. 35). The FI should also ''keep copies of any documents or records that are taken by LE agents'' (p. 35).
The other instructions are not correct. The person in charge of the broker-dealer should not instruct their employees to sign consent forms permitting the agents to search employees' offices (B), as this is unnecessary and potentially risky, as the agents already have a valid search warrant that authorizes them to search the premises. The person in charge of the broker-dealer should not instruct their employees to provide agents with unlimited access to customers' personal data , as this could violate privacy or data protection laws, as well as compromise customer trust and confidentiality. The person in charge of the broker-dealer should not instruct their employees to volunteer information not requested by the agents that they think may be useful (D), as this could interfere with the LE investigation or expose them to legal or regulatory risks.
Introduction to Transnational Organized Crime
ACAMS Law Enforcement and Financial Crimes Investigations eLearning Course Module
Law Enforcement Requests and Actions
An analyst reviews an alert for high volume Automated Clearing House (ACH) activity in an account. The analyst's initial research finds the account is for a commercial daycare account that receives high volumes of large government-funded ACH transactions to support the programs. The account activity consists of checks (cheques) made payable to individual names in varying dollar amounts. One check indicates rent to another business.
An Internet search finds that the daycare company owner has previous government-issued violations for safety and classroom size needs, such as not having enough chairs and tables per enrollee. These violations were issued to a different daycare name.
Simultaneous to this investigation, another analyst sends an email about negative news articles referencing local child/adult daycare companies misusing governmental grants. This prompts the financial institution (Fl) to search all businesses for names containing daycare' or "care*. Text searches return a number of facilities as customers at the Fl and detects that three of these businesses have a similar transaction flow of high volume government ACH funding with little to no daycare expenses.
During the investigation, new suspicious patterns and trends related to check cashing are observed. The Fl decides to conduct a training to ensure that 1) the AML program is robust and 2) the training program is relevant and appropriate. Which parties should be trained on emerging trends and red flags? (Select Two.)
Answer : A, C
The parties that should be trained on emerging trends and red flags are the financial crimes investigation unit (A) and the branch personnel . These parties are directly involved in detecting, investigating, and reporting suspicious activity related to check cashing or other types of fraud or money laundering. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should provide regular and relevant training to its staff on the AML program, policies, procedures, and systems, as well as on the latest typologies, indicators, and best practices for financial crimes investigations'' (p. 36). The FI should also ''ensure that the training is tailored to the specific roles and responsibilities of the staff, and that it is updated and evaluated periodically'' (p. 36).
The other parties are not as relevant or appropriate as options A and C. The loan department (B) is not directly related to check cashing or other types of fraud or money laundering, although it may have some exposure to credit or identity fraud. The senior management (D) is responsible for overseeing and supporting the AML program, but not for conducting or supervising financial crimes investigations. The board of directors (E) is responsible for approving and reviewing the AML program, but not for implementing or monitoring it.
SAR/STR NARRATIVE
A SAR/STR has been submitted on five transactions conducted on the correspondent banking relationship with ABC Bank.
Client Information:
Remitter information: DEF Oil Resource Ltd. is the oldest member of the DEF Group. It was founded in 1977 as a general trading business with a primary focus on exports from Africa and North Americ
a. The group has business activities that span the entire energy value chain. Their core field of endeavor is centered within the oil and gas industry and its associated sub-sectors.
Beneficiary Information:
As per the response received from ABC Bank, it was determined that the beneficiaries are related to DEF Oil Resource Ltd. These were created by DEF Oil Resource Ltd. to purchase property in a foreign country on behalf of their senior management as part of a bonus scheme. The purpose behind this payment was for the purchase of property in another country.
Payment Reference:
ABCXXXXX31PZFG2H
ABCXXXXXX51PQGEH
ABCXXXXXX214QWVG
ABCXXXXXX41PSXA2
ABCXXXXXX815QWS3
Concerns:
* We are unsure about the country of incorporation of the beneficiaries.
* We are concerned about the transactional activity since the payment made towards entities (conducted on behalf of individuals) appears to be possible tax evasion.
* There appears to be an attempt to conceal the identity of individuals (senior management), which again raises concerns about the source of funds.
* Referring to the response received from ABC Bank, we are unclear about the ultimate beneficiary of funds.
* The remitter is involved in a high-risk business, (i.e., oil and crude products trading), and the beneficiary is involved in real estate business which again poses a higher risk.
While reviewing the account activity, it is noted that several transfers are sent to a company located in an offshore jurisdiction. Which step should the investigator take next?
Answer : C
The best step for the investigator to take next is to request information about the beneficiaries related to the company. This will help to identify the ultimate beneficial owners of the funds and the purpose of the transactions. Requesting information from the company or filing a SAR/STR to the FIU where the company is located may not be feasible or effective, as the company may not cooperate or the FIU may not have jurisdiction over the offshore entity. Conducting an open-source search may provide some information about the ownership and registration of the company, but it may not be sufficient or reliable to determine the nature and legitimacy of the transactions.
SAR Narrative Guidance Package
Best Practices for Drafting an STR or SAR
According to the Financial Action Task Force, as part of their risk assessment, which are important data and information that a Trust and Company Service Provider must understand when establishing and administering a trust? (Select Two.)
Answer : A, D
Here is the exact information from the Financial Action Task Force (FATF) Guidance for a Risk-Based Approach for Trust and Company Service Providers:
'Understanding the management and ownership structure of a trust is crucial in assessing the ML/TF risk it poses. This includes the identity of all settlors, trustees and beneficiaries, and their respective roles and responsibilities, as well as the nature and purpose of the trust.'
'TCSPs should obtain and maintain up-to-date information on the purpose and intended nature of the business relationship, the source of funds and wealth, and where relevant, the source of funds or wealth of the settlor and beneficiaries.'
Based on this information, the correct answers are A and D. Trust and Company Service Providers must understand the responsibility and authority in the structure, as well as the general purpose behind the structure in order to assess the overall risk of the trust and ensure that any transactions with the trust are legitimate.
Law enforcement (LE) suspects human trafficking to occur during a major spotting event. LE officers asked several financial institutions (FIs) to monitor financial transactions occurring before, during, and after the event.
An investigator identified a pattern linked to a business. The business* account received multiple even dollar deposits between midnight and 4:00 AM. They occurred each day for several days prior to the date of the sporting event. Also, large cash deposits, typically between 2,000 USD and 3.000 USD. made by a person to the business' account occurred in many branches in the days alter the sports event.
There was little information about the company. The company did not have any history of employee payroll expenses or paying taxes. Expenses from the business account included air travel and hotel expenses. Searches about the person making cash deposits showed little. An online social media platform webpage with the individual's name showed ads for dates" and "companionship."
Which fact should not be included in (he SAR/STR narrative?
Answer : B
The fact that should not be included in the SAR/STR narrative is the request by law enforcement (D). This is because the request by law enforcement is confidential and should not be disclosed to the customer or anyone else who is not authorized to know it. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should not include any reference to the LE request in the SAR/STR narrative, as this could compromise the LE investigation or alert the customer of the suspicion'' (p. 35). The FI should also not inform the customer of the LE request or delay filing the SAR/STR because of it.
The other facts should be included in the SAR/STR narrative, as they are relevant and indicative of human trafficking money laundering. The air travel and hotel expenses (A) show that the customer is involved in moving people across different locations, which could be a sign of human smuggling or trafficking. The time of the cash deposits (B) shows that the customer is receiving cash payments during unusual hours, which could be a sign of illicit activities or services. The sporting event shows that the customer is exploiting a high-demand situation for their business, which could be a sign of opportunistic or organized crime.
An investigator at a corporate bank is conducting transaction monitoring alerts clearance.
KYC profile background: An entity customer, doing business offshore in Hong Kong, established a banking business relationship with the bank in 2017 for deposit and loan purposes. It acts as an offshore investment holding company. The customer declared that the ongoing source of funds to this account comes from group-related companies.
* X is the UBO. and owns 97% shares of this entity customer;
* Y is the authorized signatory of this entity customer. This entity customer was previously the subject of a SAR/STR.
KYC PROFILE
Customer Name: AAA International Company. Ltd
Customer ID: 123456
Account Opened: June 2017
Last KYC review date: 15 Nov 2020
Country and Year of Incorporation: The British Virgin Islands, May 2017
AML risk level: High
Account opening and purpose: Deposits, Loans and Trade Finance
Anticipated account activities: 1 to 5 transactions per year and around 1 million per
transaction amount
During the investigation, the investigator reviewed remittance transactions activities for the period from Jul 2019 to Sep 2021 and noted the following transactions pattern:
TRANSACTION JOURNAL
Review dates: from July 2019 to Sept 2021
For Hong Kong Dollars (HKD) currency:
Incoming transactions: 2 inward remittances of around 1.88 million HKD in total from
different third parties
Outgoing transactions: 24 outward remittances of around 9 4 million HKD in total to
different third parties
For United States Dollars (USD) currency:
Incoming transactions: 13 inward remittances of around 3.3 million USD in total from
different third parties
Outgoing transactions: 10 outward remittances of around 9.4 million USD in total to
different third parties.
RFI Information and Supporting documents:
According to the RFI reply received on 26 May 2021, the customer provided the bank
with the information below:
1) All incoming funds received in HKD & USD currencies were monies lent from non-customers of the bank. Copies of loan agreements had been provided as supporting documents. All of the loan agreements were in the same format and all the lenders are engaged in trading business.
2) Some loan agreements were signed among four parties, including among lenders. borrower (the bank's customer), guarantor, and guardian with supplemental agreements, which stated that the customer, as a borrower, who failed to repay the loan
Based on the KYC profile and the transaction journal, the pattern of activity shows a deviation in:
Answer : A
The correct answer is A because the expected account activities were 1 to 5 transactions per year and around 1 million per transaction amount, but the actual activity showed much more frequent and varied transactions in different currencies and amounts. This indicates a deviation from the customer's profile and risk level.
While each is potentially important, which allows an investigations analyst to better write a SAR/STR narrative that is useful to law enforcement? (Select Two.)
Answer : D, E
A SAR/STR narrative that is useful to law enforcement should include a detailed description of the known or suspected criminal violation or suspicious activity, as well as ensure that all information in the SAR/STR is complete and accurate based on what the institution knows. These elements help law enforcement to understand the nature and scope of the suspicious activity, and to follow up with further investigation if needed. The other options are not essential for a useful SAR/STR narrative, as they either provide irrelevant or redundant information, or could compromise the confidentiality of the report.
The investigative department of a financial institution (Fl) receives an internal escalation notice from the remittance department for a SWIFT message requesting a refund due to potential fraud. The notice indicates that a total of three international incoming remittances were transferred to a corporate customer from Country A, in the amount of approximately 5 million EUR for each. The first two incoming remittances had been exchanged into currency B and transferred out to Country B a few days ago. The third incoming remittance has been held by the remittance department.
As noted from the KYC profile, the corporate customer is working in the wood industry. with the last account review completed 3 months ago. Since the account's opening. there has been no history of a large amount of funds flowing through the account. The investigator conducts an Internet search and finds that the remitter is a food beverage company.
The same morning, the investigator receives a call from a financial intelligence unit (FIU) inquiring about the same incident. The FIU states that it will issue a warrant to freeze the account on the same day.
Which steps for documenting the final investigation decision are appropriate for the investigator in this scenario?
Answer : C
The investigator should document the investigation process and retain all relevant documents in the case management system. This is because documenting the investigation process is a good practice to ensure the quality and consistency of the investigation, as well as to facilitate the review and audit of the investigation. Retaining all relevant documents is also important to support the evidence and findings of the investigation, as well as to comply with the record-keeping requirements of the relevant authorities. The other options are incorrect because:
A . Excluding any open-source information from record-keeping is not advisable, as open-source information can provide valuable insights and context for the investigation, and may not be easily retrievable in the future.
B . Adding all of the information the FI has about the subject, their account(s) activity, research results, KYC information, etc. to the SAR/STR is not necessary, as the SAR/STR should only contain the essential information that is relevant and material to the suspicious activity. Adding too much information may obscure the main points and make the SAR/STR less effective.
D . Not documenting the investigation process if a SAR/STR is not filed is not acceptable, as the investigation process should be documented regardless of the outcome. Documenting the investigation process can help justify why a SAR/STR was not filed, and also provide a reference for future investigations involving the same subject or activity.
Advanced CAMS-FCI Certification | ACAMS, Section 3: Reporting Suspicious Activity, page 14
Leading Complex Investigations Certificate | ACAMS, Module 4: Documenting Your Investigation, page 4
Refer to the exhibit.

During a review of the accounts related to Richard Aston, an investigator notices a high number of incoming payments from various individuals. They also notice that these incoming payments typically occur during large sporting events or conferences. As a result of the account review, of which illegal activity does the investigator have reasonable grounds to suspect Richard Aston?
Answer : B
The illegal activity that the investigator has reasonable grounds to suspect Richard Aston of is aftermarket sales of entertainment admission tickets. This is because aftermarket sales of entertainment admission tickets involve reselling tickets for events, concerts, festivals, etc. at a higher price than their face value, often through online platforms or scalpers. This practice can be illegal or unethical, depending on the jurisdiction and the terms and conditions of the original ticket seller. The investigator should look for indicators of aftermarket sales of entertainment admission tickets, such as high volume or frequency of incoming payments from various individuals, correlation between incoming payments and major events or conferences, and discrepancy between the customer's profile and the nature of the transactions. The other options are incorrect because:
A . Embezzling from the hotel is not likely, as it would involve stealing money or property from the hotel by an employee or a person in a position of trust. There is no evidence that Richard Aston works for or has access to the hotel's assets.
C . Human trafficking is not probable, as it would involve exploiting people for forced labor or commercial sexual exploitation. There is no indication that Richard Aston is involved in any form of human trafficking or has any connection to victims or perpetrators.
D . Sports betting is not plausible, as it would involve wagering money on the outcome of sporting events or games. There is no sign that Richard Aston is engaged in any sports betting activity or has any association with bookmakers or gamblers.
Advanced CAMS-FCI Certification | ACAMS, Section 2: Investigating Financial Crimes, page 10
TicketSwap: The safest way to buy and sell tickets
Ticketing 101 | Ticketmaster
10 Types of Tickets For Events (+ Why & When To Use Them) - Eventbrite
Each month the automated transaction monitoring system generates alerts based on predetermined scenarios. An alert was generated in relation to the account activity of ABC Foundation. Below is the transaction history for ABC Foundation (dates are in DD/MM/YYYY format).

The relationship manager for ABC Foundation contacts the client to request more information on the beneficiary of the transfer in Turkey. ABC Foundation advises that this is a not-for-profit charity group called 'Forever Free." Which is the best next step in the investigation?
Answer : C
The best next step in the investigation is to check the jurisdiction's list of known charities with connections to terrorist activity . This is because the FI has a responsibility to verify the legitimacy and reputation of the beneficiary of the funds, especially if it is a charity or non-profit organization that operates in a high-risk jurisdiction or sector. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should conduct enhanced due diligence on all parties involved in the investigation, including checking various sources of information, such as watch lists, sanctions lists, negative news, and official registries'' (p. 24). The FI should also check if the beneficiary is consistent with the customer's profile and expected activity.
The other options are not as appropriate or effective as option C. Contacting the financial institution in Turkey that has a relationship with Forever Free and advising them of the investigation (A) could violate confidentiality or data protection laws, as well as compromise the investigation or alert the customer or beneficiary of the suspicion. Updating the customer profile to include Forever Free as the recipient of the funds (B) could be premature or inaccurate, as it does not verify the nature and purpose of the transfer or the identity and legitimacy of the beneficiary. Filing a SAR/STR with the new information learned about the beneficiary (D) could also be premature or incomplete, as it does not confirm if there is any suspicious or criminal activity involved in the transfer or if there are any other red flags or indicators.
A financial institution (Fl) banks a money transmitter business (MTB) located in Miami. The MTB regularly initiates wire transfers with the ultimate beneficiary in Cuba and legally sells travel packages to Cub
a. The wire transfers for money remittances comply with the country's economic sanctions policies. A Fl investigator on the sanctions team reviews each wire transfer to ensure compliance with sanctions and to monitor transfer details.
An airline located in Cuba, unrelated to the business, legally sells airline tickets in Cuba to Cuban citizens wanting to travel outside of Cuba. The airline tickets are purchased using Cuban currency (CUC).
The MTB wants 100,000 USD worth of CUC. Purchasing CUC from a Cuban bank includes a 4% fee. The MTB contacts the airline to ask if the airline will trade its CUC for USD at a lower exchange fee than the Cuban bank. The airline agrees to a 1% fee. The MTB initiates a wire transfer to the airline which appears as normal activity in the monitoring system because of the business' travel package sales.
Which investigative actions should the investigator take concerning the 100.000 USD wire transfer? (Select Three.)
Answer : A, E, F
The investigator should take the following investigative actions concerning the 100,000 USD wire transfer:
Review the wire transfer protocols for this customer. This will help the investigator to determine if the wire transfer is consistent with the customer's normal business activity and risk profile, or if it deviates from the established patterns or thresholds.
Review regulations applicable to foreign currency trading transactions. This will help the investigator to assess if the wire transfer violates any laws or regulations related to currency exchange, such as reporting requirements, licensing requirements, or sanctions compliance.
Locate and review licenses, registrations, and account operating agreements associated with the MTB account. This will help the investigator to verify if the MTB has the necessary authorization and documentation to conduct currency exchange transactions and if it has disclosed this activity to the FI. Reference: Advanced CAMS-FCI Study Guide, pages 32-33.
The intended benefits of section 314(b) of the USA PATRIOT Act include: (Select Three.)
Answer : B, E, F
Section 314(b) of the USA PATRIOT Act allows financial institutions to share information with each other, under a safe harbor that offers protection from liability, in order to better identify and report potential money laundering or terrorist financing activities. The intended benefits of this information sharing include:
Participating financial institutions sharing information about suspicious activity by customers that may have otherwise gone unnoticed. For example, if a customer is conducting transactions with multiple financial institutions that individually do not appear suspicious, but collectively indicate a pattern of money laundering or terrorist financing, the financial institutions can share this information and report it to the authorities.
Detecting money laundering and terrorist financing approaches and schemes across multiple financial institutions. For example, if a financial institution identifies a new typology or modus operandi of money laundering or terrorist financing, it can share this information with other financial institutions to help them prevent or detect similar activities by their customers.
Obtaining additional information on customers or transactions regarding potential money laundering or terrorist financing. For example, if a financial institution has incomplete or insufficient information on a customer or a transaction that raises suspicion, it can request more information from another financial institution that may have dealt with the same customer or transaction.
Section 314(b) | FinCEN.gov
Section 314(b) Fact Sheet - FinCEN.gov
Which are some of the negative impacts from illegal wildlife trade and environmental crimes? (Select Two.)
Answer : B, D, D
Some of the negative impacts of illegal wildlife trade and environmental crimes are loss of potential tax proceeds and threats to biodiversity. Loss of potential tax proceeds occurs when illegal wildlife trade and environmental crimes evade taxation and customs duties, depriving governments of revenues that could be used for public services and development. Threats to biodiversity occur when illegal wildlife trade and environmental crimes endanger species, habitats, and ecosystems, reducing their resilience and ability to provide essential services for human well-being. Public health consequences and threats to a country's political stability are not directly related to illegal wildlife trade and environmental crimes, but rather to other types of financial crimes such as money laundering, terrorism financing, or corruption.
A financial institution
Answer : C
The correct answer is C because the FI is unable to obtain evidence of required licensing or registration despite suspicion of money transmitting, which is a red flag for money laundering and a violation of federal and state laws. Option A is incorrect because making several deposits in one month that appear to exceed their expected monthly income might not be indicative of suspicious activity, depending on the customer's profile and source of funds. Option B is incorrect because receiving a large, one-time wire from a law firm might not be indicative of suspicious activity, depending on the customer's relationship with the law firm and the purpose of the wire. Option D is incorrect because discovering a large number of securities transactions that appear to be related to day trading might not be indicative of suspicious activity, depending on the customer's investment strategy and risk tolerance.
Which is a key characteristic of the Financial Action Task Force (FATF) Regional Style Bodies for combatting money laundering/terrorist financing?
Answer : B
According to the CAMS study guide, the Financial Action Task Force (FATF) Regional Style Bodies are organizations created by the FATF to promote the implementation of anti-money laundering and countering the financing of terrorism (AML/CFT) measures in specific regions. One of the key characteristics of these bodies is the implementation of regional mutual evaluation procedures.
Regional mutual evaluations involve member countries evaluating each other's AML/CFT regimes to identify strengths and weaknesses and to develop best practices for improvement. This process allows for greater cooperation between countries and can help to identify and address regional AML/CFT risks more effectively. It also promotes consistency in AML/CFT standards and practices within the region.
Which information is it best practice to share at the very beginning of a well-written SAR/STR narrative?
Answer : B
The best information to share at the very beginning of a well-written SAR/STR narrative is the purpose of the SAR/STR narrative and a general description of the known or alleged violation. This is because this information provides an overview of why the SAR/STR is being filed and what type of suspicious activity or transaction is involved. It also helps to capture the attention of the reader and set the tone for the rest of the narrative.
Which payment method for purchasing luxury items is a red flag for potential money laundering?
Answer : B
According to the Financial Action Task Force (FATF), the use of large amounts of cash is a common method for money launderers to move illicit funds [1]. Purchasing luxury items with cash can indicate an attempt to convert illegal funds into tangible assets that can be easily resold or moved across borders. As a result, businesses that deal with luxury items are required to implement enhanced due diligence measures, including monitoring transactions involving large amounts of cash [1].
An investigator at a corporate bank is conducting transaction monitoring alerts clearance.
KYC profile background: An entity customer, doing business offshore in Hong Kong, established a banking business relationship with the bank since 2017 for deposit and loan purposes. It acts as an offshore investment holding company. The customer declared that the ongoing source of funds to this account comes from group-related companies.
* X is the UBO. and owns 97% shares of this entity customer;
* Y is is the authorized signatory of this entity customer. This entity customer was previously the subject of a SAR/STR.
KYC PROFILE
Customer Name: AAA International Company. Ltd
Customer ID: 123456
Account Opened: June 2017
Last KYC review date: 15 Nov 2020
Country and Year of Incorporation: The British Virgin Islands, May 2017
AML risk level: High
Account opening and purpose: Deposits, Loans, and Trade Finance
Anticipated account activities: 1 to 5 transactions per year and around 1 million per
transaction amount
During the investigation, the investigator reviewed remittance transactions activities for the period from Jul 2019 to Sep 2021 and noted the following transactions pattern:
TRANSACTION JOURNAL
Review dates: from July 2019 to Sept 2021
For Hong Kong Dollars (HKD) currency:
Incoming transactions: 2 inward remittances of around 1.88 million HKD in total from
different third parties
Outgoing transactions: 24 outward remittances of around 9 4 million HKD in total to
different third parties
For United States Dollars (USD) currency:
Incoming transactions: 13 inward remittances of around 3.3 million USD in total from
different third parties
Outgoing transactions: 10 outward remittances of around 9.4 million USD in total to
different third parties.
RFI Information and Supporting documents:
According to the RFI reply received on 26 May 2021, the customer provided the bank
with the information below:
1J All incoming funds received in HKD & USD currencies were monies lent from non-customers of the bank. Copies of loan agreements had been provided as supporting documents. All of the loan agreements were in the same format and all the lenders are engaged in trading business.
2) Some loan agreements were signed among four parties, including among lenders. borrower (the bank's customer), guarantor, and guardian with supplemental agreements, which stated that the customer, as a borrower, who failed to repay a loan
Which suspicious activity should the investigator identify during the review of the loan agreements?
Answer : D
The correct answer is D because it is a suspicious activity that Y, who is the authorized signatory of the customer, also signed on behalf of the lenders. This indicates a possible conflict of interest, collusion, or fraud. The other options are not suspicious activities based on the information given.
An investigator receives an alert documenting a series of transactions. A limited liability corporation (LLC) wired 59.000,000 USD to an overseas account associated with a state-run oil company. A second account associated with the state-run oil company wired 600,000,000 USD to the LLC. The LLC then wired money to other accounts, a money brokerage firm, and real estate purchases.
The investigator initiated an enhanced KYC investigation on the LLC. The financial institution opened the LLC account a couple of weeks prior to the series of transactions. The names associated with the LLC had changed multiple times since the account opened. A search of those names revealed relations with multiple LLCs. Public records about the LLCs did not show any identifiable business activities.
Open-source research identified mixed reports about the brokerage firm. The firm indicated it purchased mutual funds for its clients and dispensed returns to clients.
Media reports claimed the firm laundered money by holding for a fee before returning it to investors.
The investigator discovers that the bank has no records pertaining to ownership of the LLC. What would this mean for the bank and/or investigator?
Answer : C
The bank is out of compliance with CIP regulations because it did not obtain the minimum identifying information from the customer prior to opening the account, as required by 31 CFR 1020.220(a)(2)(i)(A). The bank should have obtained the name, date of birth, address, and identification number of the customer, as well as verified the identity of the customer to the extent reasonable and practicable. The lack of ownership data may also indicate a violation of beneficial ownership regulations, but that is not the primary issue in this case.
Law enforcement agents arrive at a broker-dealer's premises with a search warrant. In addition to cooperation with the warrant, which instructions should the person in charge of the broker-dealer provide to their employees?
Answer : A
The instruction that the person in charge of the broker-dealer should provide to their employees is to take notes on the questions and comments made by the agents (A). This is because taking notes can help the employees to recall and document what happened during the search warrant execution, which can be useful for legal or regulatory purposes. According to ACAMS3, ''the FI should instruct its staff to cooperate with LE agents during a search warrant execution, but also to take notes of what is being searched, seized, or asked by the agents'' (p. 35). The FI should also ''keep copies of any documents or records that are taken by LE agents'' (p. 35).
The other instructions are not correct. The person in charge of the broker-dealer should not instruct their employees to sign consent forms permitting the agents to search employees' offices (B), as this is unnecessary and potentially risky, as the agents already have a valid search warrant that authorizes them to search the premises. The person in charge of the broker-dealer should not instruct their employees to provide agents with unlimited access to customers' personal data , as this could violate privacy or data protection laws, as well as compromise customer trust and confidentiality. The person in charge of the broker-dealer should not instruct their employees to volunteer information not requested by the agents that they think may be useful (D), as this could interfere with the LE investigation or expose them to legal or regulatory risks.
Introduction to Transnational Organized Crime
ACAMS Law Enforcement and Financial Crimes Investigations eLearning Course Module
Law Enforcement Requests and Actions
SAR/STR NARRATIVE
A SAR/STR has been submitted on five transactions conducted on the correspondent banking relationship with ABC Bank.
Client Information:
Remitter information: DEF Oil Resource Ltd. is the oldest member of the DEF Group. It was founded in 1977 as a general trading business with a primary focus on exports from Africa and North Americ
a. The group has business activities that span the entire energy value chain. Their core field of endeavor is centered within the oil and gas industry and its associated sub-sectors.
Beneficiary Information:
As per the response received from ABC Bank, it was determined that the beneficiaries are related to DEF Oil Resource Ltd. These were created by DEF Oil Resource Ltd. to purchase property in a foreign country on behalf of their senior management as part of a bonus scheme. The purpose behind this payment was for the purchase of property in another country.
Payment Reference:
ABCXXXXX31PZFG2H
ABCXXXXXX51PQGEH
ABCXXXXXX214QWVG
ABCXXXXXX41PSXA2
ABCXXXXXX815QWS3
Concerns:
* We are unsure about the country of incorporation of the beneficiaries.
* We are concerned about the transactional activity since the payment made towards entities (conducted on behalf of individuals) appears to be possible tax evasion.
* There appears to be an attempt to conceal the identity of individuals (senior management), which again raises concerns about the source of funds.
* Referring to the response received from ABC Bank, we are unclear about the ultimate beneficiary of funds.
* The remitter is involved in a high-risk business, (i.e., oil and crude products trading), and the beneficiary is involved in real estate business which again poses a higher risk.
While reviewing the account activity, it is noted that several transfers are sent to a company located in an offshore jurisdiction. Which step should the investigator take next?
Answer : C
The best step for the investigator to take next is to request information about the beneficiaries related to the company. This will help to identify the ultimate beneficial owners of the funds and the purpose of the transactions. Requesting information from the company or filing a SAR/STR to the FIU where the company is located may not be feasible or effective, as the company may not cooperate or the FIU may not have jurisdiction over the offshore entity. Conducting an open-source search may provide some information about the ownership and registration of the company, but it may not be sufficient or reliable to determine the nature and legitimacy of the transactions.
SAR Narrative Guidance Package
Best Practices for Drafting an STR or SAR
While each is potentially important, which allows an investigations analyst to better write a SAR/STR narrative that is useful to law enforcement? (Select Two.)
Answer : D, E
A SAR/STR narrative that is useful to law enforcement should include a detailed description of the known or suspected criminal violation or suspicious activity, as well as ensure that all information in the SAR/STR is complete and accurate based on what the institution knows. These elements help law enforcement to understand the nature and scope of the suspicious activity, and to follow up with further investigation if needed. The other options are not essential for a useful SAR/STR narrative, as they either provide irrelevant or redundant information, or could compromise the confidentiality of the report.
In which case should an investigator avoid escalating a suspicious event to the chief compliance officer and pursue other channels?
Answer : B
An investigator should avoid escalating a suspicious event to the chief compliance officer if there is a potential conflict of interest, such as when a close family member of the officer is involved in the transaction. In such a case, the investigator should pursue other channels, such as reporting to a higher authority or an independent committee. The other options do not present a conflict of interest and should be escalated to the chief compliance officer as part of the normal procedure.
Why is a more robust supervisory approach needed by regulators when overseeing small- and medium-sized money service businesses (MSBs) compared to larger MSBs for combatting terrorist financing (TF)?
Answer : D
A more robust supervisory approach is needed by regulators when overseeing small- and medium-sized MSBs compared to larger MSBs for combatting TF because small- and medium-sized MSBs are more at risk of allowing transactions linked to TF due to the lack of skilled compliance resources. Small- and medium-sized MSBs may face challenges in implementing effective AML/CFT controls, such as conducting risk assessments, applying customer due diligence measures, monitoring transactions, detecting suspicious activities, and reporting to the authorities. They may also have limited access to training, guidance, and tools to enhance their compliance capabilities. Therefore, regulators need to provide more supervision and support to small- and medium-sized MSBs to ensure that they comply with the AML/CFT requirements and mitigate the TF risks.
Sustainable Growth for Small and Medium-Sized Enterprises ... - MDPI
Lessons on Resilience for Small and Midsize Businesses - HBR
The intended benefits of section 314(b) of the USA PATRIOT Act include: (Select Three.)
Answer : B, E, F
Section 314(b) of the USA PATRIOT Act allows financial institutions to share information with each other, under a safe harbor that offers protection from liability, in order to better identify and report potential money laundering or terrorist financing activities. The intended benefits of this information sharing include:
Participating financial institutions sharing information about suspicious activity by customers that may have otherwise gone unnoticed. For example, if a customer is conducting transactions with multiple financial institutions that individually do not appear suspicious, but collectively indicate a pattern of money laundering or terrorist financing, the financial institutions can share this information and report it to the authorities.
Detecting money laundering and terrorist financing approaches and schemes across multiple financial institutions. For example, if a financial institution identifies a new typology or modus operandi of money laundering or terrorist financing, it can share this information with other financial institutions to help them prevent or detect similar activities by their customers.
Obtaining additional information on customers or transactions regarding potential money laundering or terrorist financing. For example, if a financial institution has incomplete or insufficient information on a customer or a transaction that raises suspicion, it can request more information from another financial institution that may have dealt with the same customer or transaction.
Section 314(b) | FinCEN.gov
Section 314(b) Fact Sheet - FinCEN.gov
A client at a financial institution deposits large amounts of money into an account, and almost immediately, the funds are then distributed to numerous individuals' accounts. The transaction activity described in the scenario is a pattern of:
Answer : B
Deposit trading is a pattern of suspicious activity where a client deposits large amounts of money into an account, and then transfers the funds to other accounts, often in different jurisdictions or countries. This could be an attempt to disguise the source or destination of the funds, or to avoid reporting requirements. Deposit trading is also known as layering, which is the second stage of money laundering.
A financial institution (Fl) receives an urgent request for information from the financial intelligence unit (Fl country. According to FATF recommendations, which is the best action for the FI to take?
Answer : B
The correct answer is B because the FATF recommendations state that financial institutions should provide feedback to the FIU as quickly as possible, especially in cases involving the financing of terrorism that could imply an imminent threat to the country. Option A is incorrect because requesting an official court subpoena would delay the response and might not be necessary for the FIU to access the information. Option C is incorrect because establishing a committee would also delay the response and might not be in compliance with the FIU's request. Option D is incorrect because informing the public relations department is irrelevant to the question and might compromise the confidentiality of the investigation.
An AML investigator at a bank identifies an unusually high number of deposits from a few customers resulting from the encashment of multiple gambling tickets from a legitimate gambling company. It is noted that the transactions are inconsistent with the customers' profiles and that reverse (corrective) transactions did not occur. Which suspicious activity is most likely?
Answer : A
The correct answer is A because this scenario describes a possible case of ticket laundering, which is a form of money laundering where criminals use gambling tickets to disguise the source of their illicit funds. The customers who deposit the tickets are either complicit or unaware of the scheme, and they receive a commission or a fee for their service. The other options are not likely because they do not explain why the customers would deposit multiple tickets from the same gambling company and withdraw cash the next day.
An investigator is reviewing an alert for unusual activity. System scanning detected a text string within a company customer's account transactions that indicates the account may have been used for a drug or drug paraphernalia purchase. Based on the KYC profile, the investigator determines the customer's company name and business type are marketed as a gardening supplies company. The investigator reviews the account activity and notes an online purchase transaction that leads the investigator to a website that sells various strains of marijuan
a. Additional account review detects cash deposits into the account at the branch teller lines, so the investigator reaches out to the teller staff regarding the transactions. The teller staff member reports that the business customers have frequently deposited cash in lower amounts. The teller, without prompting, adds that one of the transactors would occasionally smell of a distinct scent of marijuana smoke.
Which information should be included in the SAR/STR?
Answer : C
The SAR/STR should include any information that is relevant to the suspicious activity, such as the customer information, the transaction details, and any other indicators of potential money laundering or criminal activity. The fact that one of the transactors occasionally smelled of marijuana smoke is an indicator that the customer may be involved in the illicit drug trade, which is a predicate offense for money laundering. Therefore, this information should be included in the SAR/STR. Reference: Advanced CAMS-FCI Study Guide, page 25.
Law enforcement (LE) suspects human trafficking to occur during a major spotting event. LE officers asked several financial institutions (FIs) to monitor financial transactions occurring before, during, and after the event.
An investigator identified a pattern linked to a business. The business* account received multiple even dollar deposits between midnight and 4:00 AM. They occurred each day for several days prior to the date of the sporting event. Also, large cash deposits, typically between 2,000 USD and 3.000 USD. made by a person to the business' account occurred in many branches in the days after the sports event
There was little information about the company. The company did not have any history of employee payroll expenses or paying taxes. Expenses from the business account included air travel and hotel expenses. Searches about the person making cash deposits showed little. An online social media platform webpage with the individual's name showed ads for dates" and "companionship."
If the investigator uncovers evidence that foreign nationals are involved in this activity, they should also note the possible presence of:
Answer : D
If the investigator uncovers evidence that foreign nationals are involved in this activity, they should also note the possible presence of human smuggling (D). This is because human smuggling is the illegal movement of people across borders, often facilitated by criminal networks that exploit vulnerable migrants. According to the FATF and Egmont Group report on Financial Flows from Human Trafficking2, ''human smuggling can be closely linked to human trafficking, as smuggled migrants may become victims of trafficking along their journey or at their destination'' (p. 9). The report also states that some indicators of human smuggling are similar to those of human trafficking, such as:
Frequent cash deposits or withdrawals in different locations
Use of false or fraudulent identification documents
Expenses related to travel and accommodation
Involvement in online platforms that advertise sexual services
The other options are not as relevant or specific as option D. Tax fraud (A) is the evasion of taxes by individuals or businesses, which may or may not be related to human trafficking or smuggling. Black market peso exchange (B) is a money laundering scheme that involves exchanging illicit proceeds in one currency for another currency at a discounted rate, which is more commonly associated with drug trafficking or trade-based laundering. Trade-based laundering is the manipulation of trade transactions to disguise the origin and ownership of illicit funds, which is also more likely to be linked to drug trafficking or other types of fraud.
Each month the automated transaction monitoring system generates alerts based on predetermined scenarios. An alert was generated in relation to the account activity of ABC Foundation. Below is the transaction history for ABC Foundation (dates are in DD/MM/YYYY format).

The relationship manager for ABC Foundation contacts the client to request more information on the beneficiary of the transfer in Turkey. ABC Foundation advises that this is a not-for-profit charity group called 'Forever Free." Which is the best next step in the investigation?
Answer : C
The best next step in the investigation is to check the jurisdiction's list of known charities with connections to terrorist activity . This is because the FI has a responsibility to verify the legitimacy and reputation of the beneficiary of the funds, especially if it is a charity or non-profit organization that operates in a high-risk jurisdiction or sector. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should conduct enhanced due diligence on all parties involved in the investigation, including checking various sources of information, such as watch lists, sanctions lists, negative news, and official registries'' (p. 24). The FI should also check if the beneficiary is consistent with the customer's profile and expected activity.
The other options are not as appropriate or effective as option C. Contacting the financial institution in Turkey that has a relationship with Forever Free and advising them of the investigation (A) could violate confidentiality or data protection laws, as well as compromise the investigation or alert the customer or beneficiary of the suspicion. Updating the customer profile to include Forever Free as the recipient of the funds (B) could be premature or inaccurate, as it does not verify the nature and purpose of the transfer or the identity and legitimacy of the beneficiary. Filing a SAR/STR with the new information learned about the beneficiary (D) could also be premature or incomplete, as it does not confirm if there is any suspicious or criminal activity involved in the transfer or if there are any other red flags or indicators.
How does the Financial Action Task Force (FATF) measure the effectiveness of a country's efforts to combat money laundering and terrorist financing?
Answer : A
'The FATF measures the effectiveness of a country's efforts to combat money laundering and terrorist financing through a mutual evaluation process. During a mutual evaluation, the FATF assesses a country's legal and institutional framework, its implementation of measures to combat money laundering and terrorist financing, and the effectiveness of its efforts. The FATF then issues a report with recommendations for improvement' [CAMS Study Guide 6th edition, page 15-16].
Law enforcement (LE) suspects human trafficking to occur during a major spotting event. LE officers asked several financial institutions (FIs) to monitor financial transactions occurring before, during, and after the event.
An investigator identified a pattern linked to a business. The business* account received multiple even dollar deposits between midnight and 4:00 AM. They occurred each day for several days prior to the date of the sporting event. Also, large cash deposits, typically between 2,000 USD and 3.000 USD. made by a person to the business' account occurred in many branches in the days alter the sports event.
There was little information about the company. The company did not have any history of employee payroll expenses or paying taxes. Expenses from the business account included air travel and hotel expenses. Searches about the person making cash deposits showed little. An online social media platform webpage with the individual's name showed ads for dates" and "companionship."
Which fact should not be included in (he SAR/STR narrative?
Answer : B
The fact that should not be included in the SAR/STR narrative is the request by law enforcement (D). This is because the request by law enforcement is confidential and should not be disclosed to the customer or anyone else who is not authorized to know it. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should not include any reference to the LE request in the SAR/STR narrative, as this could compromise the LE investigation or alert the customer of the suspicion'' (p. 35). The FI should also not inform the customer of the LE request or delay filing the SAR/STR because of it.
The other facts should be included in the SAR/STR narrative, as they are relevant and indicative of human trafficking money laundering. The air travel and hotel expenses (A) show that the customer is involved in moving people across different locations, which could be a sign of human smuggling or trafficking. The time of the cash deposits (B) shows that the customer is receiving cash payments during unusual hours, which could be a sign of illicit activities or services. The sporting event shows that the customer is exploiting a high-demand situation for their business, which could be a sign of opportunistic or organized crime.
While each is potentially important, which allows an investigations analyst to better write a SAR/STR narrative that is useful to law enforcement? (Select Two.)
Answer : D, E
A SAR/STR narrative that is useful to law enforcement should include a detailed description of the known or suspected criminal violation or suspicious activity, as well as ensure that all information in the SAR/STR is complete and accurate based on what the institution knows. These elements help law enforcement to understand the nature and scope of the suspicious activity, and to follow up with further investigation if needed. The other options are not essential for a useful SAR/STR narrative, as they either provide irrelevant or redundant information, or could compromise the confidentiality of the report.
In a SAR/STR narrative concerning Individual
Answer : B
A product of analysis is a conclusion or inference that is derived from facts or judgments, using analytical techniques or tools. Option B is a product of analysis because it implies that the investigator has used a tool or technique, such as a threshold analysis, to identify a pattern of structured cash deposits that may indicate an attempt to evade reporting requirements. The other options are facts or judgments that can be verified by evidence or observation.
An investigator at a corporate bank is conducting transaction monitoring alerts clearance.
KYC profile background: An entity customer, doing business offshore in Hong Kong, established a banking business relationship with the bank in 2017 for deposit and loan purposes. It acts as an offshore investment holding company. The customer declared that the ongoing source of funds to this account comes from group-related companies.
* X is the UBO. and owns 97% shares of this entity customer;
* Y is the authorized signatory of this entity customer. This entity customer was previously the subject of a SAR/STR.
KYC PROFILE
Customer Name: AAA International Company. Ltd
Customer ID: 123456
Account Opened: June 2017
Last KYC review date: 15 Nov 2020
Country and Year of Incorporation: The British Virgin Islands, May 2017
AML risk level: High
Account opening and purpose: Deposits, Loans and Trade Finance
Anticipated account activities: 1 to 5 transactions per year and around 1 million per
transaction amount
During the investigation, the investigator reviewed remittance transactions activities for the period from Jul 2019 to Sep 2021 and noted the following transactions pattern:
TRANSACTION JOURNAL
Review dates: from July 2019 to Sept 2021
For Hong Kong Dollars (HKD) currency:
Incoming transactions: 2 inward remittances of around 1.88 million HKD in total from
different third parties
Outgoing transactions: 24 outward remittances of around 9 4 million HKD in total to
different third parties
For United States Dollars (USD) currency:
Incoming transactions: 13 inward remittances of around 3.3 million USD in total from
different third parties
Outgoing transactions: 10 outward remittances of around 9.4 million USD in total to
different third parties.
RFI Information and Supporting documents:
According to the RFI reply received on 26 May 2021, the customer provided the bank
with the information below:
1) All incoming funds received in HKD & USD currencies were monies lent from non-customers of the bank. Copies of loan agreements had been provided as supporting documents. All of the loan agreements were in the same format and all the lenders are engaged in trading business.
2) Some loan agreements were signed among four parties, including among lenders. borrower (the bank's customer), guarantor, and guardian with supplemental agreements, which stated that the customer, as a borrower, who failed to repay the loan
Based on the KYC profile and the transaction journal, the pattern of activity shows a deviation in:
Answer : A
The correct answer is A because the expected account activities were 1 to 5 transactions per year and around 1 million per transaction amount, but the actual activity showed much more frequent and varied transactions in different currencies and amounts. This indicates a deviation from the customer's profile and risk level.
An analyst reviews an alert for high volume Automated Clearing House (ACH) activity in an account. The analyst's initial research finds the account is for a commercial daycare account that receives high volumes of large government-funded ACH transactions to support the programs. The account activity consists of checks (cheques) made payable to individual names in varying dollar amounts. One check indicates rent to another business.
An Internet search finds that the daycare company owner has previous government-issued violations for safety and classroom size needs, such as not having enough chairs and tables per enrollee. These violations were issued to a different daycare name.
Simultaneous to this investigation, another analyst sends an email about negative news articles referencing local child/adult daycare companies misusing governmental grants. This prompts the financial institution (Fl) to search all businesses for names containing 'daycare' or *care'. Text searches return a number of facilities as customers at the Fl and detects that three of these businesses have a similar transaction flow of high volume government ACH funding with little to no daycare expenses.
Which red flags would be an indicator that activity is connected to a corruption/bribery typology? (Select Two.)
Answer : A, B
The red flags that would be an indicator that activity is connected to a corruption/bribery typology are large checks issued to various individuals with the memos noting ''gift'', ''thank you'', ''favor'' (A) and negative news found on the customer related to government-issued violations for safety (B). These red flags suggest that the customer is involved in paying or receiving bribes or kickbacks to or from government officials or other parties in exchange for favorable treatment or contracts. These red flags are consistent with some of the indicators of corruption/bribery identified by ACAMS1, such as:
Payments made to or from third parties that are not directly related to the business
Payments made to or from high-risk jurisdictions or sectors
Payments made with vague or incomplete descriptions or justifications
Negative news or reputation of the customer or its associates
The other options are not as relevant or indicative of corruption/bribery as options A and B. Checks issued to an unrelated entity referencing ''rent'' and ''utilities'' in the memos could be a legitimate business expense or a sign of other types of fraud or money laundering, such as tax evasion or shell company schemes. Multiple daycare locations with no active business operations or related account activity (D) could also be a sign of other types of fraud or money laundering, such as embezzlement or front company schemes. The same beneficial owner owning several daycare centers in different locations (E) could be a normal or legitimate business practice, depending on the size, location, and profitability of the centers.
An analyst reviews an alert for high volume Automated Clearing House (ACH) activity in an account. The analyst's initial research finds the account is for a commercial daycare account that receives high volumes of large government-funded ACH transactions to support the programs. The account activity consists of checks (cheques) made payable to individual names in varying dollar amounts. One check indicates rent to another business.
An Internet search finds that the daycare company owner has previous government-issued violations for safety and classroom size needs, such as not having enough chairs and tables per enrollee. These violations were issued to a different daycare name.
Simultaneous to this investigation, another analyst sends an email about negative news articles referencing local child/adult daycare companies misusing governmental grants. This prompts the financial institution (Fl) to search all businesses for names containing daycare' or care*. Text searches return a number of facilities as customers at the Fl and detects that three of these businesses have a similar transaction flow of high volume government ACH funding with little to no daycare expenses.
The analyst determines that site visits should be conducted for the three daycare businesses. Which observations at the on-site visits would justify writing a SAR/STR? (Select Three.)
Answer : A, C, F
The observations at the on-site visits that would justify writing a SAR/STR are signs of severe wear and poor maintenance at the site (A), lights turned off at the site during operational hours , and a full parking lot of cars with no staff at the site (F). These observations suggest that the daycare businesses are not operating legitimately or providing adequate services to their customers, and that they may be misusing governmental grants or laundering money through their accounts. These observations are consistent with some of the red flags for fraud identified by ACAMS2, such as:
Inadequate facilities or equipment for the type of business
Lack of visible activity or customers at the business location
Discrepancy between reported income and expenses
Unusual volume or frequency of transactions
The other observations are not as relevant or indicative of fraud as options A, C, and F. A site located in a commercial building (B) could be a normal or legitimate choice for a daycare business, depending on its size, location, and availability. Visible attendance with children being dropped off by parents (D) could show that the daycare business is providing genuine services to its customers, although it does not rule out possible fraud or money laundering. Visible signage indicating the purpose of building (E) could also show that the daycare business is transparent and legitimate, although it does not guarantee its quality or compliance.
A financial regulator is evaluating the effectiveness of a financial institution's (Fl) anti-financial crime program. Which condition should be met to satisfy the regulator?
Answer : D
The condition that should be met to satisfy the regulator is that the program is drafted using a risk-based approach to avoid the FI being used as a conduit for criminal activities. A risk-based approach means that the FI identifies, assesses, and understands its exposure to financial crime risks and applies appropriate measures to mitigate them. This is consistent with the international standards and best practices for anti-financial crime compliance. The program being aligned with the financial industry's anti-financial crime priorities, meeting the minimum requirements of anti-financial crime standards published by a financial industry association, or having no high-severity issues in internal auditing results are not sufficient to satisfy the regulator, as they do not necessarily reflect the specific risks faced by the FI or demonstrate its effectiveness in preventing and detecting financial crimes.
Law enforcement (LE) suspects human trafficking to occur during a major spotting event. LE officers asked several financial institutions (FIs) to monitor financial transactions occurring before, during, and after the event.
An investigator identified a pattern linked to a business. The business* account received multiple even dollar deposits between midnight and 4:00 AM. They occurred each day for several days prior to the date of the sporting event. Also, large cash deposits, typically between 2,000 USD and 3.000 USD. made by a person to the business' account occurred in many branches in the days after the sports event
There was little information about the company. The company did not have any history of employee payroll expenses or paying taxes. Expenses from the business account included air travel and hotel expenses. Searches about the person making cash deposits showed little. An online social media platform webpage with the individual's name showed ads for dates" and "companionship."
If the investigator uncovers evidence that foreign nationals are involved in this activity, they should also note the possible presence of:
Answer : D
If the investigator uncovers evidence that foreign nationals are involved in this activity, they should also note the possible presence of human smuggling (D). This is because human smuggling is the illegal movement of people across borders, often facilitated by criminal networks that exploit vulnerable migrants. According to the FATF and Egmont Group report on Financial Flows from Human Trafficking2, ''human smuggling can be closely linked to human trafficking, as smuggled migrants may become victims of trafficking along their journey or at their destination'' (p. 9). The report also states that some indicators of human smuggling are similar to those of human trafficking, such as:
Frequent cash deposits or withdrawals in different locations
Use of false or fraudulent identification documents
Expenses related to travel and accommodation
Involvement in online platforms that advertise sexual services
The other options are not as relevant or specific as option D. Tax fraud (A) is the evasion of taxes by individuals or businesses, which may or may not be related to human trafficking or smuggling. Black market peso exchange (B) is a money laundering scheme that involves exchanging illicit proceeds in one currency for another currency at a discounted rate, which is more commonly associated with drug trafficking or trade-based laundering. Trade-based laundering is the manipulation of trade transactions to disguise the origin and ownership of illicit funds, which is also more likely to be linked to drug trafficking or other types of fraud.
A criminal is engaged in chain hopping while trying to launder ransomware payments. The criminal will likely:
Answer : B
Chain hopping is a technique used by criminals to obscure the traceability of cryptocurrency transactions by converting the funds to a different type of cryptocurrency, often using multiple exchanges or platforms. The other options are not related to chain hopping. Reference: Advanced CAMS-FCI Study Guide, page 38.
The training department is conducting awareness training for unusual customer identification scenarios. Which two indicators should be included? (Select Two.)
Answer : A, B
This information can be found in the Certified Anti-Money Laundering Specialist (CAMS) study guide, 6th edition, under the section on Unusual Customer Identification Scenarios. The guide explains that two indicators that should be included in awareness training for unusual customer identification scenarios are:
A . The customer opens the account in the name of a family member who begins making large deposits.
This is an indicator of potential structuring, where a customer may be attempting to avoid triggering reporting thresholds by depositing funds in smaller amounts over time. It is important for staff to be aware of this scenario and to monitor accounts for potential suspicious activity.
B . The customer's name and home address cannot be verified.
This is an indicator of potential identity theft or other fraudulent activity. If a customer's identifying information cannot be verified, it is important for staff to conduct additional due diligence to ensure that the customer is legitimate and that the account is not being used for illicit purposes.
Which scenarios are common to money laundering through online marketplaces and trade-based money laundering? (Select Two.)
Answer : A, C
Money laundering through online marketplaces and trade-based money laundering both involve the manipulation of the value or quantity of goods to disguise the illicit origin of funds. Over-valuation of the stated price of goods and no evidence of delivery of goods or shipping expenses are two common indicators of such schemes. The other options are not specific to these methods of money laundering.
According to the Financial Action Task Force, as part of their risk assessment, which are important data and information that a Trust and Company Service Provider must understand when establishing and administering a trust? (Select Two.)
Answer : A, D
Here is the exact information from the Financial Action Task Force (FATF) Guidance for a Risk-Based Approach for Trust and Company Service Providers:
'Understanding the management and ownership structure of a trust is crucial in assessing the ML/TF risk it poses. This includes the identity of all settlors, trustees and beneficiaries, and their respective roles and responsibilities, as well as the nature and purpose of the trust.'
'TCSPs should obtain and maintain up-to-date information on the purpose and intended nature of the business relationship, the source of funds and wealth, and where relevant, the source of funds or wealth of the settlor and beneficiaries.'
Based on this information, the correct answers are A and D. Trust and Company Service Providers must understand the responsibility and authority in the structure, as well as the general purpose behind the structure in order to assess the overall risk of the trust and ensure that any transactions with the trust are legitimate.
A financial institution
Answer : C
The correct answer is C because the FI is unable to obtain evidence of required licensing or registration despite suspicion of money transmitting, which is a red flag for money laundering and a violation of federal and state laws. Option A is incorrect because making several deposits in one month that appear to exceed their expected monthly income might not be indicative of suspicious activity, depending on the customer's profile and source of funds. Option B is incorrect because receiving a large, one-time wire from a law firm might not be indicative of suspicious activity, depending on the customer's relationship with the law firm and the purpose of the wire. Option D is incorrect because discovering a large number of securities transactions that appear to be related to day trading might not be indicative of suspicious activity, depending on the customer's investment strategy and risk tolerance.
A client at a financial institution deposits large amounts of money into an account, and almost immediately, the funds are then distributed to numerous individuals' accounts. The transaction activity described in the scenario is a pattern of:
Answer : B
Deposit trading is a pattern of suspicious activity where a client deposits large amounts of money into an account, and then transfers the funds to other accounts, often in different jurisdictions or countries. This could be an attempt to disguise the source or destination of the funds, or to avoid reporting requirements. Deposit trading is also known as layering, which is the second stage of money laundering.
An investigator receives an alert documenting a series of transactions. A limited liability corporation (LLC) wired 59.000,000 USD to an overseas account associated with a state-run oil company. A second account associated with the state-run oil company wired 600,000,000 USD to the LLC. The LLC then wired money to other accounts, a money brokerage firm, and real estate purchases.
The investigator initiated an enhanced KYC investigation on the LLC. The financial institution opened the LLC account a couple of weeks prior to the series of transactions. The names associated with the LLC had changed multiple times since the account opened. A search of those names revealed relations with multiple LLCs. Public records about the LLCs did not show any identifiable business activities.
Open-source research identified mixed reports about the brokerage firm. The firm indicated it purchased mutual funds for its clients and dispensed returns to clients.
Media reports claimed the firm laundered money by holding for a fee before returning it to investors.
The investigator discovers that the bank has no records pertaining to ownership of the LLC. What would this mean for the bank and/or investigator?
Answer : C
The bank is out of compliance with CIP regulations because it did not obtain the minimum identifying information from the customer prior to opening the account, as required by 31 CFR 1020.220(a)(2)(i)(A). The bank should have obtained the name, date of birth, address, and identification number of the customer, as well as verified the identity of the customer to the extent reasonable and practicable. The lack of ownership data may also indicate a violation of beneficial ownership regulations, but that is not the primary issue in this case.
An analyst reviews an alert for high volume Automated Clearing House (ACH) activity in an account. The analyst's initial research finds the account is for a commercial daycare account that receives high volumes of large government-funded ACH transactions to support the programs. The account activity consists of checks (cheques) made payable to individual names in varying dollar amounts. One check indicates rent to another business.
An Internet search finds that the daycare company owner has previous government-issued violations for safety and classroom size needs, such as not having enough chairs and tables per enrollee. These violations were issued to a different daycare name.
Simultaneous to this investigation, another analyst sends an email about negative news articles referencing local child/adult daycare companies misusing governmental grants. This prompts the financial institution (Fl) to search all businesses for names containing daycare' or "care*. Text searches return a number of facilities as customers at the Fl and detects that three of these businesses have a similar transaction flow of high volume government ACH funding with little to no daycare expenses.
During the investigation, new suspicious patterns and trends related to check cashing are observed. The Fl decides to conduct a training to ensure that 1) the AML program is robust and 2) the training program is relevant and appropriate. Which parties should be trained on emerging trends and red flags? (Select Two.)
Answer : A, C
The parties that should be trained on emerging trends and red flags are the financial crimes investigation unit (A) and the branch personnel . These parties are directly involved in detecting, investigating, and reporting suspicious activity related to check cashing or other types of fraud or money laundering. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should provide regular and relevant training to its staff on the AML program, policies, procedures, and systems, as well as on the latest typologies, indicators, and best practices for financial crimes investigations'' (p. 36). The FI should also ''ensure that the training is tailored to the specific roles and responsibilities of the staff, and that it is updated and evaluated periodically'' (p. 36).
The other parties are not as relevant or appropriate as options A and C. The loan department (B) is not directly related to check cashing or other types of fraud or money laundering, although it may have some exposure to credit or identity fraud. The senior management (D) is responsible for overseeing and supporting the AML program, but not for conducting or supervising financial crimes investigations. The board of directors (E) is responsible for approving and reviewing the AML program, but not for implementing or monitoring it.
A bank investigator notices an account receiving multiple deposits from the same employer under different employees' names. A cash withdrawal occurs one day after each deposit. The outcome of this investigation will likely uncover which crime typology?
Answer : D
The correct answer is A because this scenario describes a possible case of human trafficking, which is a crime where people are exploited for labor or sexual services against their will. Human traffickers may use bank accounts to launder their proceeds and pay their victims, and they may use fake or stolen identities to avoid detection. The other options are not likely because they do not explain why multiple deposits from the same employer under different employees' names would occur, nor why cash withdrawals would follow each deposit.
Why is a more robust supervisory approach needed by regulators when overseeing small- and medium-sized money service businesses (MSBs) compared to larger MSBs for combatting terrorist financing (TF)?
Answer : D
A more robust supervisory approach is needed by regulators when overseeing small- and medium-sized MSBs compared to larger MSBs for combatting TF because small- and medium-sized MSBs are more at risk of allowing transactions linked to TF due to the lack of skilled compliance resources. Small- and medium-sized MSBs may face challenges in implementing effective AML/CFT controls, such as conducting risk assessments, applying customer due diligence measures, monitoring transactions, detecting suspicious activities, and reporting to the authorities. They may also have limited access to training, guidance, and tools to enhance their compliance capabilities. Therefore, regulators need to provide more supervision and support to small- and medium-sized MSBs to ensure that they comply with the AML/CFT requirements and mitigate the TF risks.
Sustainable Growth for Small and Medium-Sized Enterprises ... - MDPI
Lessons on Resilience for Small and Midsize Businesses - HBR
Law enforcement (LE) suspects human trafficking to occur during a major sporting event LE officers asked several financial institutions (FIs) to monitor financial transactions occurring before, during, and after the event.
An investigator identified a pattern linked to a business. The business' account received multiple even dollar deposits between midnight and 4:00 AM. They occurred each day for several days prior to the date of the sporting event. Also, large cash deposits, typically between 2,000 USD and 3,000 USD. made by a person to the business' account occurred in many branches in the days after the sports event.
There was little information about the company. The company did not have any history of employee payroll expenses or paying taxes. Expenses from the business account included air travel and hotel expenses. Searches about the person making cash deposits showed little. An online social media platform webpage with the individual's name showed ads for dates1' and "companionship."
The Fl wants to create an automated alert for human trafficking money laundering after this investigation. Which activity type should they target?
Answer : B
The activity type that the FI should target for creating an automated alert for human trafficking money laundering is multiple deposits between midnight and 4:00 AM (B). This is because this pattern is consistent with the indicators of human trafficking identified by the Financial Action Task Force (FATF) and the Egmont Group1, which include:
Frequent cash deposits, often in round amounts, outside of normal business hours
Deposits made at different branches or ATMs in various locations
Lack of information about the nature and purpose of the business
Involvement in online platforms that advertise sexual services
Expenses related to travel and accommodation
The other options are not as relevant or specific as option B. Payments made to multiple hotels in the same city (A) could be a legitimate business expense or a sign of other types of money laundering, such as tax evasion or fraud. Deposits made within days of major sporting events could also be explained by other factors, such as increased tourism or gambling. Payments made for virtual currency (D) are not directly related to human trafficking, although they could be used to facilitate money laundering in general.
Which is a key characteristic of the Financial Action Task Force (FATF) Regional Style Bodies for combatting money laundering/terrorist financing?
Answer : B
According to the CAMS study guide, the Financial Action Task Force (FATF) Regional Style Bodies are organizations created by the FATF to promote the implementation of anti-money laundering and countering the financing of terrorism (AML/CFT) measures in specific regions. One of the key characteristics of these bodies is the implementation of regional mutual evaluation procedures.
Regional mutual evaluations involve member countries evaluating each other's AML/CFT regimes to identify strengths and weaknesses and to develop best practices for improvement. This process allows for greater cooperation between countries and can help to identify and address regional AML/CFT risks more effectively. It also promotes consistency in AML/CFT standards and practices within the region.
While each is potentially important, which allows an investigations analyst to better write a SAR/STR narrative that is useful to law enforcement? (Select Two.)
Answer : D, E
A SAR/STR narrative that is useful to law enforcement should include a detailed description of the known or suspected criminal violation or suspicious activity, as well as ensure that all information in the SAR/STR is complete and accurate based on what the institution knows. These elements help law enforcement to understand the nature and scope of the suspicious activity, and to follow up with further investigation if needed. The other options are not essential for a useful SAR/STR narrative, as they either provide irrelevant or redundant information, or could compromise the confidentiality of the report.
A financial institution (Fl) banks a money transmitter business (MTB) located in Miami. The MTB regularly initiates wire transfers with the ultimate beneficiary in Cuba and legally sells travel packages to Cub
a. The wire transfers for money remittances comply with the country's economic sanctions policies. A Fl investigator on the sanctions team reviews each wire transfer to ensure compliance with sanctions and to monitor transfer details.
An airline located in Cuba, unrelated to the business, legally sells airline tickets in Cuba to Cuban citizens wanting to travel outside of Cuba. The airline tickets are purchased using Cuban currency (CUC).
The MTB wants 100,000 USD worth of CUC. Purchasing CUC from a Cuban bank includes a 4% fee. The MTB contacts the airline to ask if the airline will trade its CUC for USD at a lower exchange fee than the Cuban bank. The airline agrees to a 1% fee. The MTB initiates a wire transfer to the airline which appears as normal activity in the monitoring system because of the business' travel package sales.
Which investigative actions should the investigator take concerning the 100.000 USD wire transfer? (Select Three.)
Answer : A, E, F
The investigator should take the following investigative actions concerning the 100,000 USD wire transfer:
Review the wire transfer protocols for this customer. This will help the investigator to determine if the wire transfer is consistent with the customer's normal business activity and risk profile, or if it deviates from the established patterns or thresholds.
Review regulations applicable to foreign currency trading transactions. This will help the investigator to assess if the wire transfer violates any laws or regulations related to currency exchange, such as reporting requirements, licensing requirements, or sanctions compliance.
Locate and review licenses, registrations, and account operating agreements associated with the MTB account. This will help the investigator to verify if the MTB has the necessary authorization and documentation to conduct currency exchange transactions and if it has disclosed this activity to the FI. Reference: Advanced CAMS-FCI Study Guide, pages 32-33.
The investigative department of a financial institution (Fl) receives an internal escalation notice from the remittance department for a SWIFT message requesting a refund due to potential fraud. The notice indicates that a total of three international incoming remittances were transferred to a corporate customer from Country A, in the amount of approximately 5 million EUR for each. The first two incoming remittances had been exchanged into currency B and transferred out to Country B a few days ago. The third incoming remittance has been held by the remittance department.
As noted from the KYC profile, the corporate customer is working in the wood industry. with the last account review completed 3 months ago. Since the account's opening. there has been no history of a large amount of funds flowing through the account. The investigator conducts an Internet search and finds that the remitter is a food beverage company.
The same morning, the investigator receives a call from a financial intelligence unit (FIU) inquiring about the same incident. The FIU states that it will issue a warrant to freeze the account on the same day.
Which steps for documenting the final investigation decision are appropriate for the investigator in this scenario?
Answer : C
The investigator should document the investigation process and retain all relevant documents in the case management system. This is because documenting the investigation process is a good practice to ensure the quality and consistency of the investigation, as well as to facilitate the review and audit of the investigation. Retaining all relevant documents is also important to support the evidence and findings of the investigation, as well as to comply with the record-keeping requirements of the relevant authorities. The other options are incorrect because:
A . Excluding any open-source information from record-keeping is not advisable, as open-source information can provide valuable insights and context for the investigation, and may not be easily retrievable in the future.
B . Adding all of the information the FI has about the subject, their account(s) activity, research results, KYC information, etc. to the SAR/STR is not necessary, as the SAR/STR should only contain the essential information that is relevant and material to the suspicious activity. Adding too much information may obscure the main points and make the SAR/STR less effective.
D . Not documenting the investigation process if a SAR/STR is not filed is not acceptable, as the investigation process should be documented regardless of the outcome. Documenting the investigation process can help justify why a SAR/STR was not filed, and also provide a reference for future investigations involving the same subject or activity.
Advanced CAMS-FCI Certification | ACAMS, Section 3: Reporting Suspicious Activity, page 14
Leading Complex Investigations Certificate | ACAMS, Module 4: Documenting Your Investigation, page 4
CLIENT INFORMATION FORM Client Name: ABC Tech Corp Client I.D. Number: 08125 Name: ABC Tech Corp Registered Address: Mumbai, India Work Address: Mumbai. India Cell Phone: ***"--- Alt Phone: Email: ********
Client Profile Information:
Sector: Financial
Engaged in business from (date): 02 Jan 2020
Sub-sector: Software-Cryptocurrency Exchange
Expected Annual Transaction Amount: 125.000 USD
Payment Nature: Transfer received from client's fund
Received from: Clients
Received for: Sale of digital assets
The client identified themselves as "Cryptocurrency Exchange" Client has submitted the limited liability partnership deed. However, the bank's auditing team is unable to identify the client's exact business profile as the cryptocurrency exchange specified by the client as their major business awaits clearance from the country's regulator. The client has submitted documents/communications exchanged with the regulator and has cited the lack of governing laws in the country of their operation as the reason for the delay.
Investigators determine the ultimate beneficial owner of ABC Tech Corp is a high-net-worth client. The client owns a real estate agency left to her when her spouse died. The spouse provided seed capital for ABC Tech Corp through a direct 1,000.000 Great British Pound (GBP) deposit.
What additional information would trigger filing a SAR/STR?
Answer : D
The additional information that would trigger filing a SAR/STR is the fact that the funds for the seed capital were in the form of 50 cashier's checks of 10,000 GBP each and 50 money orders of 10,000 GBP. This is because this indicates a possible attempt to avoid the reporting threshold of 10,000 GBP for cash transactions, which is a common money laundering technique known as structuring or smurfing12. The other options are not necessarily suspicious, as they do not involve cash transactions or indicate any illicit source of funds. The fact that the client's spouse was a PEP does not automatically make the transaction suspicious unless there are other red flags or risk factors associated with the PEP34
Which most likely indicates that a business email compromise attack has occurred?
Answer : A
When writing or reviewing a SAR/STR, it is important to ensure that the narrative is kept to the point; easy to read; and addresses the who, what, when, where, why, and how. This is because the narrative is the most crucial part of the SAR/STR, as it provides a clear and concise summary of the suspicious activity or transaction that triggered the report. The narrative should include all the relevant information that would help law enforcement or regulators to understand the nature and context of the activity or transaction, such as123:
The who: The names, addresses, account numbers, and other identifying information of the parties involved in the activity or transaction, such as customers, beneficiaries, intermediaries, or third parties.
The what: The type, amount, frequency, and purpose of the activity or transaction, such as cash deposits, wire transfers, check payments, or purchases of goods or services.
The when: The date, time, and duration of the activity or transaction, and whether it was a one-time occurrence or part of a pattern or trend.
The where: The location or channel of the activity or transaction, such as branches, ATMs, online platforms, or mobile applications.
The why: The reason or rationale for the activity or transaction, and why it was considered suspicious or unusual based on the customer's profile, behavior, or expected activity.
The how: The method or mechanism of the activity or transaction, such as cash, check, debit card, credit card, cryptocurrency, or prepaid card.
How to write the perfect ''Suspicious Activity Reports'' (SAR)? | i-AML
Writing for Prosecution: Best Practices For Composing SAR Narratives That Assist Prosecutors | ACAMS
SAR Writing Examples and Proper Formatting: Write for Your Reader - Alessa
A client with many personal and business deposits with the financial institution (Fl) seeks a business loan. The client wants to guarantee the loan with a trust for which they are the beneficiary.
An investigator examines the trust. The trust has many layers, including shell companies in known tax havens. The client's ultimate beneficial ownership claim cannot be validated, and the loan is denied.
Two months later, the Fl receives a law enforcement (LE) request on one of the client's business accounts. While reviewing the business account, the Fl receives another LE request on the same account from another agency. The requested information is shared.
Three months later, a branch manager receives a request to open a business deposit account related to a complex trust. The manager forwarded the request because of the complexity. The trust was the same as the previously examined trust, but the request came from a different client. The second client also has many accounts with the Fl. Further inspection finds links between the second client and the Paradise Papers. The Papers state the client led illegal activities and committed tax evasion.
What steps should the investigator perform in reference to the first client's existing accounts? (Select Three.)
Answer : A, D, F
The investigator should review all client-signed documents relating to all accounts (A) to check for any discrepancies or red flags. The investigator should also perform secondary scans of the client's other owners/authorized signers (D) to identify any possible connections or associations with the second client or the Paradise Papers. Additionally, the investigator should prepare a relationship flow chart of all existing accounts (F) to better understand the client's activities and patterns. These steps are consistent with the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, which states that investigators should ''review all relevant documentation, including account opening documents, transaction records, and customer correspondence'' (p. 23), ''conduct enhanced due diligence on all parties involved in the investigation'' (p. 24), and ''use data visualization tools to map out complex relationships and transactions'' (p. 25).
Law enforcement agents arrive at a broker-dealer's premises with a search warrant. In addition to cooperation with the warrant, which instructions should the person in charge of the broker-dealer provide to their employees?
Answer : A
The instruction that the person in charge of the broker-dealer should provide to their employees is to take notes on the questions and comments made by the agents (A). This is because taking notes can help the employees to recall and document what happened during the search warrant execution, which can be useful for legal or regulatory purposes. According to ACAMS3, ''the FI should instruct its staff to cooperate with LE agents during a search warrant execution, but also to take notes of what is being searched, seized, or asked by the agents'' (p. 35). The FI should also ''keep copies of any documents or records that are taken by LE agents'' (p. 35).
The other instructions are not correct. The person in charge of the broker-dealer should not instruct their employees to sign consent forms permitting the agents to search employees' offices (B), as this is unnecessary and potentially risky, as the agents already have a valid search warrant that authorizes them to search the premises. The person in charge of the broker-dealer should not instruct their employees to provide agents with unlimited access to customers' personal data , as this could violate privacy or data protection laws, as well as compromise customer trust and confidentiality. The person in charge of the broker-dealer should not instruct their employees to volunteer information not requested by the agents that they think may be useful (D), as this could interfere with the LE investigation or expose them to legal or regulatory risks.
Introduction to Transnational Organized Crime
ACAMS Law Enforcement and Financial Crimes Investigations eLearning Course Module
Law Enforcement Requests and Actions
A bank investigator notices an account receiving multiple deposits from the same employer under different employees' names. A cash withdrawal occurs one day after each deposit. The outcome of this investigation will likely uncover which crime typology?
Answer : D
The correct answer is A because this scenario describes a possible case of human trafficking, which is a crime where people are exploited for labor or sexual services against their will. Human traffickers may use bank accounts to launder their proceeds and pay their victims, and they may use fake or stolen identities to avoid detection. The other options are not likely because they do not explain why multiple deposits from the same employer under different employees' names would occur, nor why cash withdrawals would follow each deposit.
How does the Financial Action Task Force (FATF) measure the effectiveness of a country's efforts to combat money laundering and terrorist financing?
Answer : A
'The FATF measures the effectiveness of a country's efforts to combat money laundering and terrorist financing through a mutual evaluation process. During a mutual evaluation, the FATF assesses a country's legal and institutional framework, its implementation of measures to combat money laundering and terrorist financing, and the effectiveness of its efforts. The FATF then issues a report with recommendations for improvement' [CAMS Study Guide 6th edition, page 15-16].
Which actions should financial institutions perform to ensure proper data governance? (Select Three.)
Answer : A, B, D
Financial institutions should perform the following actions to ensure proper data governance:
Establish an appropriate data management method for collecting and storing information. This is important to ensure that the data is consistent, reliable, and accessible for various purposes, such as risk assessment, compliance reporting, and customer service. Data management methods may include defining data standards, policies, and procedures; implementing data quality controls and validation checks; and using appropriate data storage systems and formats.
Ensure the accuracy of customer identification records and transaction records and appropriately manage data as a prerequisite for the effective use of IT systems. This is important to comply with the anti-money laundering and counter-terrorist financing (AML/CFT) requirements, such as customer due diligence, transaction monitoring, and suspicious activity reporting. Accurate and complete customer and transaction data also enables financial institutions to use IT systems more effectively for data analysis, risk management, and decision making.
Periodically validate integrity and accuracy of information used for IT systems such as customer information, customer identification records, and transaction records. This is important to ensure that the data remains up-to-date, relevant, and reliable over time. Data validation may include verifying the source and quality of the data; identifying and correcting any errors or inconsistencies; and updating or deleting any obsolete or redundant data.
Data Governance for Financial Institutions - Capgemini
Small and Medium-Sized Deposit-Taking Institutions (SMSBs) Capital and Liquidity Requirements - OSFI
Which are some of the negative impacts from illegal wildlife trade and environmental crimes? (Select Two.)
Answer : B, D, D
Some of the negative impacts of illegal wildlife trade and environmental crimes are loss of potential tax proceeds and threats to biodiversity. Loss of potential tax proceeds occurs when illegal wildlife trade and environmental crimes evade taxation and customs duties, depriving governments of revenues that could be used for public services and development. Threats to biodiversity occur when illegal wildlife trade and environmental crimes endanger species, habitats, and ecosystems, reducing their resilience and ability to provide essential services for human well-being. Public health consequences and threats to a country's political stability are not directly related to illegal wildlife trade and environmental crimes, but rather to other types of financial crimes such as money laundering, terrorism financing, or corruption.
An investigator at a corporate bank is conducting transaction monitoring alerts clearance.
KYC profile background: An entity customer, doing business offshore in Hong Kong, established a banking business relationship with the bank in 2017 for deposit and loan purposes. It acts as an offshore investment holding company. The customer declared that the ongoing source of funds to this account comes from group-related companies.
* X is the UBO. and owns 97% shares of this entity customer;
* Y is the authorized signatory of this entity customer. This entity customer was previously the subject of a SAR/STR.
KYC PROFILE
Customer Name: AAA International Company. Ltd
Customer ID: 123456
Account Opened: June 2017
Last KYC review date: 15 Nov 2020
Country and Year of Incorporation: The British Virgin Islands, May 2017
AML risk level: High
Account opening and purpose: Deposits, Loans and Trade Finance
Anticipated account activities: 1 to 5 transactions per year and around 1 million per
transaction amount
During the investigation, the investigator reviewed remittance transactions activities for the period from Jul 2019 to Sep 2021 and noted the following transactions pattern:
TRANSACTION JOURNAL
Review dates: from July 2019 to Sept 2021
For Hong Kong Dollars (HKD) currency:
Incoming transactions: 2 inward remittances of around 1.88 million HKD in total from
different third parties
Outgoing transactions: 24 outward remittances of around 9 4 million HKD in total to
different third parties
For United States Dollars (USD) currency:
Incoming transactions: 13 inward remittances of around 3.3 million USD in total from
different third parties
Outgoing transactions: 10 outward remittances of around 9.4 million USD in total to
different third parties.
RFI Information and Supporting documents:
According to the RFI reply received on 26 May 2021, the customer provided the bank
with the information below:
1) All incoming funds received in HKD & USD currencies were monies lent from non-customers of the bank. Copies of loan agreements had been provided as supporting documents. All of the loan agreements were in the same format and all the lenders are engaged in trading business.
2) Some loan agreements were signed among four parties, including among lenders. borrower (the bank's customer), guarantor, and guardian with supplemental agreements, which stated that the customer, as a borrower, who failed to repay the loan
Based on the KYC profile and the transaction journal, the pattern of activity shows a deviation in:
Answer : A
The correct answer is A because the expected account activities were 1 to 5 transactions per year and around 1 million per transaction amount, but the actual activity showed much more frequent and varied transactions in different currencies and amounts. This indicates a deviation from the customer's profile and risk level.
Law enforcement (LE) suspects human trafficking to occur during a major spotting event. LE officers asked several financial institutions (FIs) to monitor financial transactions occurring before, during, and after the event.
An investigator identified a pattern linked to a business. The business* account received multiple even dollar deposits between midnight and 4:00 AM. They occurred each day for several days prior to the date of the sporting event. Also, large cash deposits, typically between 2,000 USD and 3.000 USD. made by a person to the business' account occurred in many branches in the days alter the sports event.
There was little information about the company. The company did not have any history of employee payroll expenses or paying taxes. Expenses from the business account included air travel and hotel expenses. Searches about the person making cash deposits showed little. An online social media platform webpage with the individual's name showed ads for dates" and "companionship."
Which fact should not be included in (he SAR/STR narrative?
Answer : B
The fact that should not be included in the SAR/STR narrative is the request by law enforcement (D). This is because the request by law enforcement is confidential and should not be disclosed to the customer or anyone else who is not authorized to know it. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should not include any reference to the LE request in the SAR/STR narrative, as this could compromise the LE investigation or alert the customer of the suspicion'' (p. 35). The FI should also not inform the customer of the LE request or delay filing the SAR/STR because of it.
The other facts should be included in the SAR/STR narrative, as they are relevant and indicative of human trafficking money laundering. The air travel and hotel expenses (A) show that the customer is involved in moving people across different locations, which could be a sign of human smuggling or trafficking. The time of the cash deposits (B) shows that the customer is receiving cash payments during unusual hours, which could be a sign of illicit activities or services. The sporting event shows that the customer is exploiting a high-demand situation for their business, which could be a sign of opportunistic or organized crime.
Online payments from a customer's account to three foreign entities trigger an investigation. The investigator knows the funds originated from family real estate after an investment company approached the customer online. Funds were remitted for pre-lPO shares. Which should now occur in the investigation?
Answer : C
The correct answer is C because reviewing the structure of the transactions to the three entities can help the investigator to identify any red flags or indicators of fraud, such as unusual amounts, frequency, destinations, or beneficiaries. The other options are not as relevant or effective in this scenario. Option A is not necessary because the investigator already knows the source of funds for the customer. Option B is not advisable because contacting the customer directly may alert them to the investigation and compromise its integrity. Option D is not helpful because inspecting electronic banking login records does not provide any information about the nature or purpose of the transactions.
Advanced CAMS-FCI Study Guide, page 281
Financial Crime Typologies - Intermediate Certificate Course, Module 32
During transaction monitoring. Bank A learns that one of their customers. Med Supplies 123. is attempting to make a payment via wire totaling 382,500 USD to PPE Business LLC located in Mexico to purchase a large order of personal protective equipment. specifically surgical masks and face shields. Upon further verification. Bank A decides to escalate and refers the case to investigators.
Bank A notes that, days prior to the above transaction, the same customer went to a Bank A location to wire 1,215,280 USD to Breath Well LTD located in Singapore. Breath Well was acting as an intermediary to purchase both 3-ply surgical masks and face shields from Chin
a. Bank A decided not to complete the transaction due to concerns with the involved supplier in China. Moreover, the customer is attempting to send a third wire in the amount of 350,000 USD for the purchase of these items, this time using a different vendor in China. The investigator must determine next steps in the investigation and what actions, if any. should be taken against relevant parties.
During the investigation, Bank A receives a USA PATRIOT Act Section 314(a) request related to Med Supplies 123. Which steps should the investigator take when fulfilling the request? (Select Three.)
Answer : D, E, F
According to the FinCEN's 314(a) Fact Sheet1, the steps that the investigator should take when fulfilling the request are:
Search its records expeditiously to determine whether it maintains(ed) any accounts for the subject(s) listed in the request. This is option F.
Report back to the Financial Crimes Enforcement Network (FinCEN) within 15 days of receipt of the request via a secure internet website. This is option E.
Report to Financial Crimes Enforcement Network (FinCEN) that a match was found without revealing any other details. This is option D.
The other options are incorrect because:
Exiting the relationship with the business since it appears that customer is under investigation is not required by the 314(a) program and may interfere with law enforcement's investigation. This is option A.
Not responding to Financial Crimes Enforcement Network (FinCEN) if the requested information is not present in the financial institution's system of records is contrary to the 314(a) program, which requires financial institutions to respond whether or not they have a match. This is option B.
Reviewing the account(s) activity and proactively filing a SAR/STR using the 314(a) request as the basis for the filing is not appropriate, as the 314(a) request itself is not a sufficient reason to file a SAR/STR. The financial institution should only file a SAR/STR if it has its own independent suspicion of money laundering or terrorist financing. This is option C.
While each is potentially important, which allows an investigations analyst to better write a SAR/STR narrative that is useful to law enforcement? (Select Two.)
Answer : D, E
A SAR/STR narrative that is useful to law enforcement should include a detailed description of the known or suspected criminal violation or suspicious activity, as well as ensure that all information in the SAR/STR is complete and accurate based on what the institution knows. These elements help law enforcement to understand the nature and scope of the suspicious activity, and to follow up with further investigation if needed. The other options are not essential for a useful SAR/STR narrative, as they either provide irrelevant or redundant information, or could compromise the confidentiality of the report.
A client at a financial institution deposits large amounts of money into an account, and almost immediately, the funds are then distributed to numerous individuals' accounts. The transaction activity described in the scenario is a pattern of:
Answer : B
Deposit trading is a pattern of suspicious activity where a client deposits large amounts of money into an account, and then transfers the funds to other accounts, often in different jurisdictions or countries. This could be an attempt to disguise the source or destination of the funds, or to avoid reporting requirements. Deposit trading is also known as layering, which is the second stage of money laundering.
An investigator is reviewing an alert for unusual activity. System scanning detected a text string within a company customer's account transactions that indicates the account may have been used for a drug or drug paraphernalia purchase Based on the KYC profile, the investigator determines the customer's company name and business type are marketed as a gardening supplies company. The investigator reviews the account activity and notes an online purchase transaction that leads the investigator to a website that sells various strains of marijuan
a. Additional account review detects cash deposits into the account at the branch teller lines, so the investigator reaches out to the teller staff regarding the transactions. The teller staff member reports that the business customers have frequently deposited cash in lower amounts. The teller, without prompting, adds that one of the transactors would occasionally smell of a distinct scent of marijuana smoke.
Which are the best next steps for the investigator to take? (Select Three.)
Answer : A, C, E
The best next steps for the investigator to take are:
A . Review the customer's transaction history. This can help the investigator identify any patterns or anomalies in the customer's account activity, such as changes in transaction volume, frequency, amount, source, destination, purpose, etc. The investigator can also compare the customer's transaction history with their KYC profile and risk rating to assess if there are any discrepancies or inconsistencies.
C . Check internal KYC information. This can help the investigator verify the customer's identity, business nature, ownership structure, expected activity, source of funds, etc. The investigator can also update or enhance the customer's KYC information based on any new or relevant information obtained from other sources.
E Conduct adverse media and open-source searches on the customer's background. This can help the investigator find out if there is any negative or adverse information about the customer in public data sources, such as news articles, social media posts, blogs, forums, etc. Adverse media and open-source searches can also provide additional context and insight into the customer's reputation, behavior, associations, etc. The other options are incorrect because:
B . Request information from the internet service provider who hosts the website is not feasible, as it may require a legal process or a court order to obtain such information. Moreover, the internet service provider may not have or disclose any useful information about the website or its owner.
D . Research other customer accounts for transactions to the same website is not relevant, as it may not provide any meaningful information about the customer under investigation. Furthermore, it may violate the privacy and confidentiality of other customers who are not related to the investigation.
F . Identify if the customer has opened accounts in an urban city area is not helpful, as it may not have any bearing on the customer's involvement in a drug or drug paraphernalia purchase. Additionally, it may not be possible to access or verify such information without the customer's consent or authorization.
Advanced CAMS-FCI Certification | ACAMS, Section 2: Investigating Financial Crimes, page 11
Leading Complex Investigations Certificate | ACAMS, Module 3: Conducting Research and Analysis, page 6
Adverse Media Screening - Using AI to Mitigate Risk
Legal requirements for adverse media screening - Thomson Reuters
Electronic client due diligence | Ethics helpsheets | ICAEW
6AMLD & FATF: Where Adverse Media Screening Fits In
Free Adverse Media Check | NameScan
An analyst reviews an alert for high volume Automated Clearing House (ACH) activity in an account. The analyst's initial research finds the account is for a commercial daycare account that receives high volumes of large government-funded ACH transactions to support the programs. The account activity consists of checks (cheques) made payable to individual names in varying dollar amounts. One check indicates rent to another business.
An Internet search finds that the daycare company owner has previous government-issued violations for safety and classroom size needs, such as not having enough chairs and tables per enrollee. These violations were issued to a different daycare name.
Simultaneous to this investigation, another analyst sends an email about negative news articles referencing local child/adult daycare companies misusing governmental grants. This prompts the financial institution (Fl) to search all businesses for names containing 'daycare' or *care'. Text searches return a number of facilities as customers at the Fl and detects that three of these businesses have a similar transaction flow of high volume government ACH funding with little to no daycare expenses.
Which red flags would be an indicator that activity is connected to a corruption/bribery typology? (Select Two.)
Answer : A, B
The red flags that would be an indicator that activity is connected to a corruption/bribery typology are large checks issued to various individuals with the memos noting ''gift'', ''thank you'', ''favor'' (A) and negative news found on the customer related to government-issued violations for safety (B). These red flags suggest that the customer is involved in paying or receiving bribes or kickbacks to or from government officials or other parties in exchange for favorable treatment or contracts. These red flags are consistent with some of the indicators of corruption/bribery identified by ACAMS1, such as:
Payments made to or from third parties that are not directly related to the business
Payments made to or from high-risk jurisdictions or sectors
Payments made with vague or incomplete descriptions or justifications
Negative news or reputation of the customer or its associates
The other options are not as relevant or indicative of corruption/bribery as options A and B. Checks issued to an unrelated entity referencing ''rent'' and ''utilities'' in the memos could be a legitimate business expense or a sign of other types of fraud or money laundering, such as tax evasion or shell company schemes. Multiple daycare locations with no active business operations or related account activity (D) could also be a sign of other types of fraud or money laundering, such as embezzlement or front company schemes. The same beneficial owner owning several daycare centers in different locations (E) could be a normal or legitimate business practice, depending on the size, location, and profitability of the centers.
The investigative department of a financial institution (Fl) receives an internal escalation notice from the remittance department for a SWIFT message requesting a refund due to potential fraud. The notice indicates that a total of three international incoming remittances were transferred to a corporate customer from Country A, in the amount of approximately 5 million EUR for each. The first two incoming remittances had been exchanged into currency B and transferred out to Country B a few days ago. The third incoming remittance has been held by the remittance department.
As noted from the KYC profile, the corporate customer is working in the wood industry. with the last account review completed 3 months ago. Since the account's opening. there has been no history of a large amount of funds flowing through the account. The investigator conducts an Internet search and finds that the remitter is a food beverage company.
The same morning, the investigator receives a call from a financial intelligence unit (FIU) inquiring about the same incident. The FIU states that it will issue a warrant to freeze the account on the same day.
Which steps for documenting the final investigation decision are appropriate for the investigator in this scenario?
Answer : C
The investigator should document the investigation process and retain all relevant documents in the case management system. This is because documenting the investigation process is a good practice to ensure the quality and consistency of the investigation, as well as to facilitate the review and audit of the investigation. Retaining all relevant documents is also important to support the evidence and findings of the investigation, as well as to comply with the record-keeping requirements of the relevant authorities. The other options are incorrect because:
A . Excluding any open-source information from record-keeping is not advisable, as open-source information can provide valuable insights and context for the investigation, and may not be easily retrievable in the future.
B . Adding all of the information the FI has about the subject, their account(s) activity, research results, KYC information, etc. to the SAR/STR is not necessary, as the SAR/STR should only contain the essential information that is relevant and material to the suspicious activity. Adding too much information may obscure the main points and make the SAR/STR less effective.
D . Not documenting the investigation process if a SAR/STR is not filed is not acceptable, as the investigation process should be documented regardless of the outcome. Documenting the investigation process can help justify why a SAR/STR was not filed, and also provide a reference for future investigations involving the same subject or activity.
Advanced CAMS-FCI Certification | ACAMS, Section 3: Reporting Suspicious Activity, page 14
Leading Complex Investigations Certificate | ACAMS, Module 4: Documenting Your Investigation, page 4
CLIENT INFORMATION FORM Client Name: ABC Tech Corp Client I.D. Number: 08125 Name: ABC Tech Corp Registered Address: Mumbai, India Work Address: Mumbai. India Cell Phone: ***"--- Alt Phone: Email: ********
Client Profile Information:
Sector: Financial
Engaged in business from (date): 02 Jan 2020
Sub-sector: Software-Cryptocurrency Exchange
Expected Annual Transaction Amount: 125.000 USD
Payment Nature: Transfer received from client's fund
Received from: Clients
Received for: Sale of digital assets
The client identified themselves as "Cryptocurrency Exchange" Client has submitted the limited liability partnership deed. However, the bank's auditing team is unable to identify the client's exact business profile as the cryptocurrency exchange specified by the client as their major business awaits clearance from the country's regulator. The client has submitted documents/communications exchanged with the regulator and has cited the lack of governing laws in the country of their operation as the reason for the delay.
Investigators determine the ultimate beneficial owner of ABC Tech Corp is a high-net-worth client. The client owns a real estate agency left to her when her spouse died. The spouse provided seed capital for ABC Tech Corp through a direct 1,000.000 Great British Pound (GBP) deposit.
What additional information would trigger filing a SAR/STR?
Answer : D
The additional information that would trigger filing a SAR/STR is the fact that the funds for the seed capital were in the form of 50 cashier's checks of 10,000 GBP each and 50 money orders of 10,000 GBP. This is because this indicates a possible attempt to avoid the reporting threshold of 10,000 GBP for cash transactions, which is a common money laundering technique known as structuring or smurfing12. The other options are not necessarily suspicious, as they do not involve cash transactions or indicate any illicit source of funds. The fact that the client's spouse was a PEP does not automatically make the transaction suspicious unless there are other red flags or risk factors associated with the PEP34
Which action is part of the enhanced due diligence process?
Answer : A
One of the actions that is part of the enhanced due diligence process is collecting beneficial ownership details regarding the client's account. This is important to identify the natural persons who ultimately own or control the client, and to assess the potential risks associated with them. According to the Financial Action Task Force (FATF), beneficial ownership information should include1:
The name, nationality, and country of residence of each beneficial owner.
The date of birth or incorporation of each beneficial owner.
The nature and extent of the beneficial interest held by each beneficial owner.
The means by which the beneficial ownership or control is exercised.
FATF Guidance on Transparency and Beneficial Ownership
Which scenarios are common to money laundering through online marketplaces and trade-based money laundering? (Select Two.)
Answer : A, C
Money laundering through online marketplaces and trade-based money laundering both involve the manipulation of the value or quantity of goods to disguise the illicit origin of funds. Over-valuation of the stated price of goods and no evidence of delivery of goods or shipping expenses are two common indicators of such schemes. The other options are not specific to these methods of money laundering.
Which pattern of activity most strongly indicates an individual is a foreign terrorist fighter?
Answer : B
The pattern of activity that most strongly indicates an individual is a foreign terrorist fighter is a large cash advance on a credit card and purchases at travel and sporting goods websites. This is because this pattern may suggest that the individual is preparing to travel to a conflict zone and purchase equipment or supplies for terrorist activities. According to the United Nations Office on Drugs and Crime, some of the indicators of foreign terrorist fighters include1:
Sudden or increased financial activity, such as cash withdrawals, transfers, or deposits, especially in large amounts or involving foreign currency or locations.
Purchases of travel-related items, such as airline tickets, passports, visas, luggage, or clothing, especially to or from high-risk destinations or transit hubs.
Purchases of items that could be used for terrorist purposes, such as weapons, explosives, chemicals, communication devices, or survival gear.
Changes in behavior, such as expressing radical views, cutting ties with family or friends, joining extremist groups, or displaying signs of emotional distress.
Foreign Terrorist Fighters - United Nations Office on Drugs and Crime
How does the Financial Action Task Force (FATF) measure the effectiveness of a country's efforts to combat money laundering and terrorist financing?
Answer : A
'The FATF measures the effectiveness of a country's efforts to combat money laundering and terrorist financing through a mutual evaluation process. During a mutual evaluation, the FATF assesses a country's legal and institutional framework, its implementation of measures to combat money laundering and terrorist financing, and the effectiveness of its efforts. The FATF then issues a report with recommendations for improvement' [CAMS Study Guide 6th edition, page 15-16].
Why is a more robust supervisory approach needed by regulators when overseeing small- and medium-sized money service businesses (MSBs) compared to larger MSBs for combatting terrorist financing (TF)?
Answer : D
A more robust supervisory approach is needed by regulators when overseeing small- and medium-sized MSBs compared to larger MSBs for combatting TF because small- and medium-sized MSBs are more at risk of allowing transactions linked to TF due to the lack of skilled compliance resources. Small- and medium-sized MSBs may face challenges in implementing effective AML/CFT controls, such as conducting risk assessments, applying customer due diligence measures, monitoring transactions, detecting suspicious activities, and reporting to the authorities. They may also have limited access to training, guidance, and tools to enhance their compliance capabilities. Therefore, regulators need to provide more supervision and support to small- and medium-sized MSBs to ensure that they comply with the AML/CFT requirements and mitigate the TF risks.
Sustainable Growth for Small and Medium-Sized Enterprises ... - MDPI
Lessons on Resilience for Small and Midsize Businesses - HBR
A financial institution (Fl) receives an urgent request for information from the financial intelligence unit (Fl country. According to FATF recommendations, which is the best action for the FI to take?
Answer : B
The correct answer is B because the FATF recommendations state that financial institutions should provide feedback to the FIU as quickly as possible, especially in cases involving the financing of terrorism that could imply an imminent threat to the country. Option A is incorrect because requesting an official court subpoena would delay the response and might not be necessary for the FIU to access the information. Option C is incorrect because establishing a committee would also delay the response and might not be in compliance with the FIU's request. Option D is incorrect because informing the public relations department is irrelevant to the question and might compromise the confidentiality of the investigation.
An analyst reviews an alert for high volume Automated Clearing House (ACH) activity in an account. The analyst's initial research finds the account is for a commercial daycare account that receives high volumes of large government-funded ACH transactions to support the programs. The account activity consists of checks (cheques) made payable to individual names in varying dollar amounts. One check indicates rent to another business.
An Internet search finds that the daycare company owner has previous government-issued violations for safety and classroom size needs, such as not having enough chairs and tables per enrollee. These violations were issued to a different daycare name.
Simultaneous to this investigation, another analyst sends an email about negative news articles referencing local child/adult daycare companies misusing governmental grants. This prompts the financial institution (Fl) to search all businesses for names containing 'daycare' or *care'. Text searches return a number of facilities as customers at the Fl and detects that three of these businesses have a similar transaction flow of high volume government ACH funding with little to no daycare expenses.
Which red flags would be an indicator that activity is connected to a corruption/bribery typology? (Select Two.)
Answer : A, B
The red flags that would be an indicator that activity is connected to a corruption/bribery typology are large checks issued to various individuals with the memos noting ''gift'', ''thank you'', ''favor'' (A) and negative news found on the customer related to government-issued violations for safety (B). These red flags suggest that the customer is involved in paying or receiving bribes or kickbacks to or from government officials or other parties in exchange for favorable treatment or contracts. These red flags are consistent with some of the indicators of corruption/bribery identified by ACAMS1, such as:
Payments made to or from third parties that are not directly related to the business
Payments made to or from high-risk jurisdictions or sectors
Payments made with vague or incomplete descriptions or justifications
Negative news or reputation of the customer or its associates
The other options are not as relevant or indicative of corruption/bribery as options A and B. Checks issued to an unrelated entity referencing ''rent'' and ''utilities'' in the memos could be a legitimate business expense or a sign of other types of fraud or money laundering, such as tax evasion or shell company schemes. Multiple daycare locations with no active business operations or related account activity (D) could also be a sign of other types of fraud or money laundering, such as embezzlement or front company schemes. The same beneficial owner owning several daycare centers in different locations (E) could be a normal or legitimate business practice, depending on the size, location, and profitability of the centers.
A financial institution (Fl) banks a money transmitter business (MTB) located in Miami. The MTB regularly initiates wire transfers with the ultimate beneficiary in Cuba and legally sells travel packages to Cub
a. The wire transfers for money remittances comply with the country's economic sanctions policies. A Fl investigator on the sanctions team reviews each wire transfer to ensure compliance with sanctions and to monitor transfer details.
An airline located in Cuba, unrelated to the business, legally sells airline tickets in Cuba to Cuban citizens wanting to travel outside of Cuba. The airline tickets are purchased using Cuban currency (CUC).
The MTB wants 100,000 USD worth of CUC. Purchasing CUC from a Cuban bank includes a 4% fee. The MTB contacts the airline to ask if the airline will trade its CUC for USD at a lower exchange fee than the Cuban bank. The airline agrees to a 1% fee. The MTB initiates a wire transfer to the airline which appears as normal activity in the monitoring system because of the business' travel package sales.
Which investigative actions should the investigator take concerning the 100.000 USD wire transfer? (Select Three.)
Answer : A, E, F
The investigator should take the following investigative actions concerning the 100,000 USD wire transfer:
Review the wire transfer protocols for this customer. This will help the investigator to determine if the wire transfer is consistent with the customer's normal business activity and risk profile, or if it deviates from the established patterns or thresholds.
Review regulations applicable to foreign currency trading transactions. This will help the investigator to assess if the wire transfer violates any laws or regulations related to currency exchange, such as reporting requirements, licensing requirements, or sanctions compliance.
Locate and review licenses, registrations, and account operating agreements associated with the MTB account. This will help the investigator to verify if the MTB has the necessary authorization and documentation to conduct currency exchange transactions and if it has disclosed this activity to the FI. Reference: Advanced CAMS-FCI Study Guide, pages 32-33.
SAR/STR NARRATIVE
A SAR/STR has been submitted on five transactions conducted on the correspondent banking relationship with ABC Bank.
Client Information:
Remitter information: DEF Oil Resource Ltd. is the oldest member of the DEF Group. It was founded in 1977 as a general trading business with a primary focus on exports from Africa and North Americ
a. The group has business activities that span the entire energy value chain. Their core field of endeavor is centered within the oil and gas industry and its associated sub-sectors.
Beneficiary Information:
As per the response received from ABC Bank, it was determined that the beneficiaries are related to DEF Oil Resource Ltd. These were created by DEF Oil Resource Ltd. to purchase property in a foreign country on behalf of their senior management as part of a bonus scheme. The purpose behind this payment was for the purchase of property in another country.
Payment Reference:
ABCXXXXX31PZFG2H
ABCXXXXXX51PQGEH
ABCXXXXXX214QWVG
ABCXXXXXX41PSXA2
ABCXXXXXX815QWS3
Concerns:
* We are unsure about the country of incorporation of the beneficiaries.
* We are concerned about the transactional activity since the payment made towards entities (conducted on behalf of individuals) appears to be possible tax evasion.
* There appears to be an attempt to conceal the identity of individuals (senior management), which again raises concerns about the source of funds.
* Referring to the response received from ABC Bank, we are unclear about the ultimate beneficiary of funds.
* The remitter is involved in a high-risk business, (i.e., oil and crude products trading), and the beneficiary is involved in real estate business which again poses a higher risk.
While reviewing the account activity, it is noted that several transfers are sent to a company located in an offshore jurisdiction. Which step should the investigator take next?
Answer : C
The best step for the investigator to take next is to request information about the beneficiaries related to the company. This will help to identify the ultimate beneficial owners of the funds and the purpose of the transactions. Requesting information from the company or filing a SAR/STR to the FIU where the company is located may not be feasible or effective, as the company may not cooperate or the FIU may not have jurisdiction over the offshore entity. Conducting an open-source search may provide some information about the ownership and registration of the company, but it may not be sufficient or reliable to determine the nature and legitimacy of the transactions.
SAR Narrative Guidance Package
Best Practices for Drafting an STR or SAR
A national financial intelligence unit (FIU) is undertaking the country risk assessment for the financing of the proliferation of weapons of mass destruction (WMD). The evaluation involves determining the exposure that financial institutions (FIs) have to operations that evade sanctions. Which should be performed by the FIU to assess proliferation financing risk? (Select Two.)
Answer : B, D
The FIU should cross-reference the databases of international commerce/logistics transactions between the country and WMD proliferation sanctioned states with the corresponding international financial operations of those transactions, as this would help identify any discrepancies or anomalies that could indicate sanctions evasion. The FIU should also evaluate a sample of the amount of false-positive and false-negative alerts that FIs have regarding proliferation sanctions evasion to determine root causes of non-detection, such as inadequate screening systems, lack of training, or human error. These actions would help the FIU assess the proliferation financing risk and provide feedback and guidance to FIs on how to improve their detection and prevention capabilities.
Which payment method for purchasing luxury items is a red flag for potential money laundering?
Answer : B
According to the Financial Action Task Force (FATF), the use of large amounts of cash is a common method for money launderers to move illicit funds [1]. Purchasing luxury items with cash can indicate an attempt to convert illegal funds into tangible assets that can be easily resold or moved across borders. As a result, businesses that deal with luxury items are required to implement enhanced due diligence measures, including monitoring transactions involving large amounts of cash [1].
During onboarding al Private Bank A, client C indicated that the account would be initially funded with a transfer from Bank B totaling 50 million USD. On which source of funds should Bank A conduct additional scrutiny? (Select Two.)
Answer : B, D
The sources of funds that Bank A should conduct additional scrutiny on are the third-party transfer and the transfer from Bank B. This is because these sources may pose higher risks of money laundering, terrorist financing, fraud, or other illicit activities. Some of the reasons why these sources require more scrutiny are23:
Third-party transfers may involve unknown or unrelated parties that may have ulterior motives or hidden agendas. They may also be used to obscure the origin or destination of funds, or to circumvent sanctions or other regulatory restrictions.
Transfers from Bank B may involve jurisdictions that have weak anti-money laundering and counter-terrorist financing (AML/CFT) regimes, high levels of corruption, or significant criminal activity. They may also involve banks that have poor reputation, compliance, or transparency standards.
Third Party Payments - Wolfsberg Group
Guidance on Correspondent Banking Services - FATF
An investigator is reviewing a case generated from the transaction monitoring system, with two large amounts of incoming remittance (IR) to an individual customer. Based on the KYC profile, the customer is a plant manager of a famous multi-national electronics manufacturing firm. As the customer has no similarly large transaction patterns for the past 2 years, the investigator sends an inquiry to the relationship manager (RM) about the nature of the transaction. The RM replies that the transaction is a consultancy fee provided from two different electronics companies with a debit note provided However, there is no detail of service provided on the debit note, and the remitters are two individuals.
Which actions should the investigator recommend to mitigate risk? (Select Two.)
Answer : D, E
The actions that the investigator should recommend to mitigate risk are conducting enhanced due diligence (D) and re-evaluating the customer risk profile (E). These actions are appropriate and prudent, as they allow the investigator to obtain more information and evidence about the nature and purpose of the transactions, the source and destination of the funds, and the identity and legitimacy of the parties involved. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should conduct enhanced due diligence on all parties involved in the investigation, including checking various sources of information, such as watch lists, sanctions lists, negative news, and official registries'' (p. 24). The FI should also ''re-assess the customer risk profile based on any new information obtained during the investigation, and adjust the customer due diligence and monitoring requirements accordingly'' (p. 25).
The other options are not as appropriate or effective as options D and E. The investigator should not recommend exiting the relationship with the customer (A), as this could be premature or disproportionate, as well as potentially discriminatory or illegal. The investigator should not recommend documenting and maintaining a file with the investigative findings (B), as this is not an action to mitigate risk, but rather a standard procedure for any investigation. The investigator should not recommend discussing the investigation findings with the customer , as this could compromise the integrity and objectivity of the investigation, as well as expose the FI to legal or regulatory risks.
A SAR/STR on cash activity is filed for a company registered in the Marshall Islands operating a Mediterranean beach bar and hotel. The company has three nominee directors, one nominee shareholder, and another individual declared as both the beneficial owner and authorized signatory. Which information is key for law enforcement's physical surveillance of cash activity? (Select Two.)
Answer : B, C
The identification details of the beneficial owner and authorized signatory are key for law enforcement's physical surveillance of cash activity, as they would help identify the person who controls and operates the company and who is responsible for its financial transactions. The company's operating address is also key, as it would help locate the premises where the cash activity takes place and observe any suspicious movements or behaviors. The identification details of the nominee shareholder and directors are not relevant, as they are not involved in the management or operation of the company. The company's registered address is also not relevant, as it is likely to be a shell or mailbox address that does not reflect the actual location of the business.
How does the Financial Action Task Force (FATF) measure the effectiveness of a country's efforts to combat money laundering and terrorist financing?
Answer : A
'The FATF measures the effectiveness of a country's efforts to combat money laundering and terrorist financing through a mutual evaluation process. During a mutual evaluation, the FATF assesses a country's legal and institutional framework, its implementation of measures to combat money laundering and terrorist financing, and the effectiveness of its efforts. The FATF then issues a report with recommendations for improvement' [CAMS Study Guide 6th edition, page 15-16].
Which most likely indicates that a business email compromise attack has occurred?
Answer : A
When writing or reviewing a SAR/STR, it is important to ensure that the narrative is kept to the point; easy to read; and addresses the who, what, when, where, why, and how. This is because the narrative is the most crucial part of the SAR/STR, as it provides a clear and concise summary of the suspicious activity or transaction that triggered the report. The narrative should include all the relevant information that would help law enforcement or regulators to understand the nature and context of the activity or transaction, such as123:
The who: The names, addresses, account numbers, and other identifying information of the parties involved in the activity or transaction, such as customers, beneficiaries, intermediaries, or third parties.
The what: The type, amount, frequency, and purpose of the activity or transaction, such as cash deposits, wire transfers, check payments, or purchases of goods or services.
The when: The date, time, and duration of the activity or transaction, and whether it was a one-time occurrence or part of a pattern or trend.
The where: The location or channel of the activity or transaction, such as branches, ATMs, online platforms, or mobile applications.
The why: The reason or rationale for the activity or transaction, and why it was considered suspicious or unusual based on the customer's profile, behavior, or expected activity.
The how: The method or mechanism of the activity or transaction, such as cash, check, debit card, credit card, cryptocurrency, or prepaid card.
How to write the perfect ''Suspicious Activity Reports'' (SAR)? | i-AML
Writing for Prosecution: Best Practices For Composing SAR Narratives That Assist Prosecutors | ACAMS
SAR Writing Examples and Proper Formatting: Write for Your Reader - Alessa
Online payments from a customer's account to three foreign entities trigger an investigation. The investigator knows the funds originated from family real estate after an investment company approached the customer online. Funds were remitted for pre-lPO shares. Which should now occur in the investigation?
Answer : C
The correct answer is C because reviewing the structure of the transactions to the three entities can help the investigator to identify any red flags or indicators of fraud, such as unusual amounts, frequency, destinations, or beneficiaries. The other options are not as relevant or effective in this scenario. Option A is not necessary because the investigator already knows the source of funds for the customer. Option B is not advisable because contacting the customer directly may alert them to the investigation and compromise its integrity. Option D is not helpful because inspecting electronic banking login records does not provide any information about the nature or purpose of the transactions.
Advanced CAMS-FCI Study Guide, page 281
Financial Crime Typologies - Intermediate Certificate Course, Module 32
An investigator at a bank triggered a review in relation to potential misuse of legal persons and a complex network of corporate entities owned by customer
Answer : D
The initial focus of the investigation should be to review the customer due diligence documents of each entity and examine the year of incorporation and onboarding channel, as this would help identify the beneficial owners, the source of funds, and the purpose of the business relationship. This would also help determine if the entities are shell companies or have any red flags that indicate potential misuse of legal persons. Using data analytics to extract and analyze the linkages between the different entities would be a subsequent step, not the initial one. Conducting a network link analysis on all customers of the bank would be too broad and time-consuming. Finding out whether customer A has relationships with other financial institutions would be relevant, but not the initial focus. Reference: [Advanced CAMS-FCI Study Guide], page 44-45; [FATF Guidance on Transparency and Beneficial Ownership], page 12-13.
Each month the automated transaction monitoring system generates alerts based on predetermined scenarios. An alert was generated in relation to the account activity of ABC Foundation. Below is the transaction history for ABC Foundation (dates are in DD/MM/YYYY format).

The relationship manager for ABC Foundation contacts the client to request more information on the beneficiary of the transfer in Turkey. ABC Foundation advises that this is a not-for-profit charity group called 'Forever Free." Which is the best next step in the investigation?
Answer : C
The best next step in the investigation is to check the jurisdiction's list of known charities with connections to terrorist activity . This is because the FI has a responsibility to verify the legitimacy and reputation of the beneficiary of the funds, especially if it is a charity or non-profit organization that operates in a high-risk jurisdiction or sector. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should conduct enhanced due diligence on all parties involved in the investigation, including checking various sources of information, such as watch lists, sanctions lists, negative news, and official registries'' (p. 24). The FI should also check if the beneficiary is consistent with the customer's profile and expected activity.
The other options are not as appropriate or effective as option C. Contacting the financial institution in Turkey that has a relationship with Forever Free and advising them of the investigation (A) could violate confidentiality or data protection laws, as well as compromise the investigation or alert the customer or beneficiary of the suspicion. Updating the customer profile to include Forever Free as the recipient of the funds (B) could be premature or inaccurate, as it does not verify the nature and purpose of the transfer or the identity and legitimacy of the beneficiary. Filing a SAR/STR with the new information learned about the beneficiary (D) could also be premature or incomplete, as it does not confirm if there is any suspicious or criminal activity involved in the transfer or if there are any other red flags or indicators.
An AML investigator at a bank identifies an unusually high number of deposits from a few customers resulting from the encashment of multiple gambling tickets from a legitimate gambling company. It is noted that the transactions are inconsistent with the customers' profiles and that reverse (corrective) transactions did not occur. Which suspicious activity is most likely?
Answer : A
The correct answer is A because this scenario describes a possible case of ticket laundering, which is a form of money laundering where criminals use gambling tickets to disguise the source of their illicit funds. The customers who deposit the tickets are either complicit or unaware of the scheme, and they receive a commission or a fee for their service. The other options are not likely because they do not explain why the customers would deposit multiple tickets from the same gambling company and withdraw cash the next day.
An investigator at a corporate bank is conducting transaction monitoring alerts clearance.
KYC profile background: An entity customer, doing business offshore in Hong Kong, established a banking business relationship with the bank since 2017 for deposit and loan purposes. It acts as an offshore investment holding company. The customer declared that the ongoing source of funds to this account comes from group-related companies.
* X is the UBO. and owns 97% shares of this entity customer;
* Y is is the authorized signatory of this entity customer. This entity customer was previously the subject of a SAR/STR.
KYC PROFILE
Customer Name: AAA International Company. Ltd
Customer ID: 123456
Account Opened: June 2017
Last KYC review date: 15 Nov 2020
Country and Year of Incorporation: The British Virgin Islands, May 2017
AML risk level: High
Account opening and purpose: Deposits, Loans, and Trade Finance
Anticipated account activities: 1 to 5 transactions per year and around 1 million per
transaction amount
During the investigation, the investigator reviewed remittance transactions activities for the period from Jul 2019 to Sep 2021 and noted the following transactions pattern:
TRANSACTION JOURNAL
Review dates: from July 2019 to Sept 2021
For Hong Kong Dollars (HKD) currency:
Incoming transactions: 2 inward remittances of around 1.88 million HKD in total from
different third parties
Outgoing transactions: 24 outward remittances of around 9 4 million HKD in total to
different third parties
For United States Dollars (USD) currency:
Incoming transactions: 13 inward remittances of around 3.3 million USD in total from
different third parties
Outgoing transactions: 10 outward remittances of around 9.4 million USD in total to
different third parties.
RFI Information and Supporting documents:
According to the RFI reply received on 26 May 2021, the customer provided the bank
with the information below:
1J All incoming funds received in HKD & USD currencies were monies lent from non-customers of the bank. Copies of loan agreements had been provided as supporting documents. All of the loan agreements were in the same format and all the lenders are engaged in trading business.
2) Some loan agreements were signed among four parties, including among lenders. borrower (the bank's customer), guarantor, and guardian with supplemental agreements, which stated that the customer, as a borrower, who failed to repay a loan
Which suspicious activity should the investigator identify during the review of the loan agreements?
Answer : D
The correct answer is D because it is a suspicious activity that Y, who is the authorized signatory of the customer, also signed on behalf of the lenders. This indicates a possible conflict of interest, collusion, or fraud. The other options are not suspicious activities based on the information given.
A client that runs a non-profit organization that aids refugees in leaving their home countries received a remittance from a money services business that was ten times the average. The client was recently detained for providing falsified passports to illegal immigrants. Which predicate offenses could be considered in the SAR/STR? (Select Two.)
Answer : A, B
The correct answer is A and B because human smuggling/trafficking and terrorist financing are both predicate offenses for money laundering that could be related to the client's activities. Option C is incorrect because there is no indication of narcotics trafficking in the scenario. Option D is incorrect because there is no indication of antiques smuggling in the scenario. Option E is incorrect because there is no indication of tax evasion in the scenario.
Which is a key characteristic of the Financial Action Task Force (FATF) Regional Style Bodies for combatting money laundering/terrorist financing?
Answer : B
According to the CAMS study guide, the Financial Action Task Force (FATF) Regional Style Bodies are organizations created by the FATF to promote the implementation of anti-money laundering and countering the financing of terrorism (AML/CFT) measures in specific regions. One of the key characteristics of these bodies is the implementation of regional mutual evaluation procedures.
Regional mutual evaluations involve member countries evaluating each other's AML/CFT regimes to identify strengths and weaknesses and to develop best practices for improvement. This process allows for greater cooperation between countries and can help to identify and address regional AML/CFT risks more effectively. It also promotes consistency in AML/CFT standards and practices within the region.
The investigative department of a financial institution (Fl) receives an internal escalation notice from the remittance department for a SWIFT message requesting a refund due to potential fraud. The notice indicates that a total of three international incoming remittances were transferred to a corporate customer from Country A, in the amount of approximately 5 million EUR for each. The first two incoming remittances had been exchanged into currency B and transferred out to Country B a few days ago. The third incoming remittance has been held by the remittance department.
As noted from the KYC profile, the corporate customer is working in the wood industry. with the last account review completed 3 months ago. Since the account's opening. there has been no history of a large amount of funds flowing through the account. The investigator conducts an Internet search and finds that the remitter is a food beverage company.
The same morning, the investigator receives a call from a financial intelligence unit (FIU) inquiring about the same incident. The FIU states that it will issue a warrant to freeze the account on the same day.
After further review, the decision is made that transactions appear suspicious. Which are the next steps the investigator should take? (Select Two.)
Answer : C, E
The correct answer is C and E. The investigator should provide additional information to the LE upon receiving a formal request, and gather all the information that would be useful for LE and recommend filing a SAR/STR. These steps are consistent with the best practices of conducting financial crime investigations and reporting suspicious activity. The investigator should not close the customer's accounts or the investigation, as this may interfere with the ongoing LE inquiry and violate the FI's policies and procedures. The investigator should also not contact local LE directly, as this may compromise the confidentiality of the investigation and the FIU's authority. Reference:
Advanced CAMS-FCI Study Guide, Chapter 4: Reporting Suspicious Activity, pages 40-411
Advanced CAMS-FCI Study Guide, Chapter 5: Governance of an AFC Investigations Unit, pages 48-491
Advanced CAMS-FCI Certification | ACAMS
During onboarding al Private Bank A, client C indicated that the account would be initially funded with a transfer from Bank B totaling 50 million USD. On which source of funds should Bank A conduct additional scrutiny? (Select Two.)
Answer : B, D
The sources of funds that Bank A should conduct additional scrutiny on are the third-party transfer and the transfer from Bank B. This is because these sources may pose higher risks of money laundering, terrorist financing, fraud, or other illicit activities. Some of the reasons why these sources require more scrutiny are23:
Third-party transfers may involve unknown or unrelated parties that may have ulterior motives or hidden agendas. They may also be used to obscure the origin or destination of funds, or to circumvent sanctions or other regulatory restrictions.
Transfers from Bank B may involve jurisdictions that have weak anti-money laundering and counter-terrorist financing (AML/CFT) regimes, high levels of corruption, or significant criminal activity. They may also involve banks that have poor reputation, compliance, or transparency standards.
Third Party Payments - Wolfsberg Group
Guidance on Correspondent Banking Services - FATF
A client with many personal and business deposits with the financial institution (Fl) seeks a business loan. The client wants to guarantee the loan with a trust for which they are the beneficiary.
An investigator examines the trust. The trust has many layers, including shell companies in known tax havens. The client's ultimate beneficial ownership claim cannot be validated, and the loan is denied.
Two months later, the Fl receives a law enforcement (LE) request on one of the client's business accounts. While reviewing the business account, the Fl receives another LE request on the same account from another agency. The requested information is shared.
Three months later, a branch manager receives a request to open a business deposit account related to a complex trust. The manager forwarded the request because of the complexity. The trust was the same as the previously examined trust, but the request came from a different client. The second client also has many accounts with the Fl. Further inspection finds links between the second client and the Paradise Papers. The Papers state the client led illegal activities and committed tax evasion.
What steps should the investigator take to review the accounts held by the second client who is listed in the Paradise Papers? (Select Two.)
Answer : A, D, D
The investigator should recommend a SAR/STR be filed regarding the second client's use of a questionable trust to open an account, as this could indicate an attempt to conceal the source and ownership of funds, and to evade taxes and sanctions. The investigator should also monitor all accounts and entities related to the second client, as they may be involved in illegal activities or pose a high risk to the FI. The investigator should not review all accounts that have opened trust accounts, as this would be too broad and inefficient. The investigator should not inform FI management of deficiencies in their AML program, as this is not their role or responsibility. The investigator should not inform FI management of the start of a serious risk-based investigation, as this may compromise the confidentiality and integrity of the investigation.
A financial institution
Answer : C
The correct answer is C because the FI is unable to obtain evidence of required licensing or registration despite suspicion of money transmitting, which is a red flag for money laundering and a violation of federal and state laws. Option A is incorrect because making several deposits in one month that appear to exceed their expected monthly income might not be indicative of suspicious activity, depending on the customer's profile and source of funds. Option B is incorrect because receiving a large, one-time wire from a law firm might not be indicative of suspicious activity, depending on the customer's relationship with the law firm and the purpose of the wire. Option D is incorrect because discovering a large number of securities transactions that appear to be related to day trading might not be indicative of suspicious activity, depending on the customer's investment strategy and risk tolerance.
An unusual spike in activity has occurred for a customer who is a supplier of aviation parts to a military force. The customer's current line of business is consistent with the banks records, and no adverse media hits have occurred. Which is the best reason for an investigator to continue an investigation?
Answer : A
The best reason for an investigator to continue an investigation is that the end-user is a military force. This is because supplying aviation parts to a military force may involve sanctions risk, export control risk, or human rights risk, depending on the nature and destination of the military force. The investigator should conduct further due diligence to determine if the customer is complying with the relevant laws and regulations, and if the bank is exposed to any reputational or legal risk by providing services to the customer.
Former Airline Employee and Aircraft Part Sellers Charged in Kickback ...
Former Airline Employee and Aircraft Part Sellers Charged in Kickback ...
Former airline employee and aircraft part sellers charged in kickback ...
During transaction monitoring. Bank A learns that one of its customers. Med Supplies 123, is attempting to make a payment via wire totaling 382.500 USD to PPE Business LLC located in Mexico to purchase a large order of personal protective equipment. specifically surgical masks and face shields. Upon further verification. Bank A decides to escalate and refers the case to investigators.
Bank A notes that days prior to the above transaction, the same customer went to a Bank A location to wire 1,215,280 USD to Breath Well LTD located in Singapore. Breath Well was acting as an intermediary to purchase both 3-ply surgical masks and face shields from Chin
a. Bank A decided not to complete the transaction due to concerns with the involved supplier in China. Moreover, the customer is attempting to send a third wire in the amount of 350,000 USD for the purchase of these items, this time using a different vendor in China. The investigator must determine the next steps in the investigation and what actions, if any. should be taken against relevant parties.
The investigator is gathering more information to determine if a SAR/STR filing is needed. Which steps are the correct ways of collecting the additional information? (Select Two.)
Answer : A, D
The correct answer is A and C because these indicators suggest that the customer is using fraudulent documents and misrepresenting the goods to conceal the illicit nature of the transactions. Fentanyl traffickers often use front companies and falsified invoices to disguise their shipments as legitimate products, such as medical supplies or chemicals. Reviewing the invoices and transportation documents, as well as the FDA product certifications, can help to identify discrepancies or anomalies that indicate fraud or deception.
A financial institution (Fl) receives an urgent request for information from the financial intelligence unit (Fl country. According to FATF recommendations, which is the best action for the FI to take?
Answer : B
The correct answer is B because the FATF recommendations state that financial institutions should provide feedback to the FIU as quickly as possible, especially in cases involving the financing of terrorism that could imply an imminent threat to the country. Option A is incorrect because requesting an official court subpoena would delay the response and might not be necessary for the FIU to access the information. Option C is incorrect because establishing a committee would also delay the response and might not be in compliance with the FIU's request. Option D is incorrect because informing the public relations department is irrelevant to the question and might compromise the confidentiality of the investigation.
Due to an ever-diversifying business model and multi-jurisdictional footprint, a casino has decided to outsource the source of funds and wealth checks to a third-party provider. Why is it important for the casino to maintain control of the output from the provider?
Answer : C
The reason why it is important for the casino to maintain control of the output from the provider is that the casino maintains ultimate responsibility for this activity and should maintain control to avoid non-compliance . This is because the casino is accountable for its own AML/CFT obligations and cannot delegate or outsource them to a third-party provider. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should ensure that it has adequate oversight and control over any third-party providers that it engages for AML/CFT purposes, such as conducting due diligence, verifying information, or monitoring transactions'' (p. 25). The FI should also ''review and evaluate the performance and quality of the third-party providers on a regular basis, and address any issues or gaps that may arise'' (p. 25).
The other options are not as relevant or accurate as option C. The clients of the casino prefer to know that the casino is keeping their information secure when being held by a third-party (A) is not a reason why the casino should maintain control of the output from the provider, but rather a customer expectation or preference. As with all third-party relationships, proper control must be maintained to ensure profitability (B) is not a reason why the casino should maintain control of the output from the provider, but rather a general business principle or objective. Other casinos are frequently looking to reduce costs and share ideas, so if this relationship is successful, the model can be used by other businesses (D) is not a reason why the casino should maintain control of the output from the provider, but rather a potential benefit or outcome.
Which might suggest misuse of crowdfunding resources by a terrorist?
Answer : D
The purchase of airplane tickets after receiving multiple small deposits from a crowdfunding platform might suggest that the funds are being used to facilitate travel for terrorist purposes. The other options are not necessarily indicative of terrorist financing, as they could be explained by legitimate reasons or other types of financial crimes.
Which scenarios are common to money laundering through online marketplaces and trade-based money laundering? (Select Two.)
Answer : A, C
Money laundering through online marketplaces and trade-based money laundering both involve the manipulation of the value or quantity of goods to disguise the illicit origin of funds. Over-valuation of the stated price of goods and no evidence of delivery of goods or shipping expenses are two common indicators of such schemes. The other options are not specific to these methods of money laundering.
A national financial intelligence unit (FIU) is undertaking the country risk assessment for the financing of the proliferation of weapons of mass destruction (WMD). The evaluation involves determining the exposure that financial institutions (FIs) have to operations that evade sanctions. Which should be performed by the FIU to assess proliferation financing risk? (Select Two.)
Answer : B, D
The FIU should cross-reference the databases of international commerce/logistics transactions between the country and WMD proliferation sanctioned states with the corresponding international financial operations of those transactions, as this would help identify any discrepancies or anomalies that could indicate sanctions evasion. The FIU should also evaluate a sample of the amount of false-positive and false-negative alerts that FIs have regarding proliferation sanctions evasion to determine root causes of non-detection, such as inadequate screening systems, lack of training, or human error. These actions would help the FIU assess the proliferation financing risk and provide feedback and guidance to FIs on how to improve their detection and prevention capabilities.
A bank investigator notices an account receiving multiple deposits from the same employer under different employees' names. A cash withdrawal occurs one day after each deposit. The outcome of this investigation will likely uncover which crime typology?
Answer : D
The correct answer is A because this scenario describes a possible case of human trafficking, which is a crime where people are exploited for labor or sexual services against their will. Human traffickers may use bank accounts to launder their proceeds and pay their victims, and they may use fake or stolen identities to avoid detection. The other options are not likely because they do not explain why multiple deposits from the same employer under different employees' names would occur, nor why cash withdrawals would follow each deposit.
While each is potentially important, which allows an investigations analyst to better write a SAR/STR narrative that is useful to law enforcement? (Select Two.)
Answer : D, E
A SAR/STR narrative that is useful to law enforcement should include a detailed description of the known or suspected criminal violation or suspicious activity, as well as ensure that all information in the SAR/STR is complete and accurate based on what the institution knows. These elements help law enforcement to understand the nature and scope of the suspicious activity, and to follow up with further investigation if needed. The other options are not essential for a useful SAR/STR narrative, as they either provide irrelevant or redundant information, or could compromise the confidentiality of the report.
Which actions should financial institutions perform to ensure proper data governance? (Select Three.)
Answer : A, B, D
Financial institutions should perform the following actions to ensure proper data governance:
Establish an appropriate data management method for collecting and storing information. This is important to ensure that the data is consistent, reliable, and accessible for various purposes, such as risk assessment, compliance reporting, and customer service. Data management methods may include defining data standards, policies, and procedures; implementing data quality controls and validation checks; and using appropriate data storage systems and formats.
Ensure the accuracy of customer identification records and transaction records and appropriately manage data as a prerequisite for the effective use of IT systems. This is important to comply with the anti-money laundering and counter-terrorist financing (AML/CFT) requirements, such as customer due diligence, transaction monitoring, and suspicious activity reporting. Accurate and complete customer and transaction data also enables financial institutions to use IT systems more effectively for data analysis, risk management, and decision making.
Periodically validate integrity and accuracy of information used for IT systems such as customer information, customer identification records, and transaction records. This is important to ensure that the data remains up-to-date, relevant, and reliable over time. Data validation may include verifying the source and quality of the data; identifying and correcting any errors or inconsistencies; and updating or deleting any obsolete or redundant data.
Data Governance for Financial Institutions - Capgemini
Small and Medium-Sized Deposit-Taking Institutions (SMSBs) Capital and Liquidity Requirements - OSFI
A criminal is engaged in chain hopping while trying to launder ransomware payments. The criminal will likely:
Answer : B
Chain hopping is a technique used by criminals to obscure the traceability of cryptocurrency transactions by converting the funds to a different type of cryptocurrency, often using multiple exchanges or platforms. The other options are not related to chain hopping. Reference: Advanced CAMS-FCI Study Guide, page 38.
In a SAR/STR narrative concerning Individual
Answer : B
A product of analysis is a conclusion or inference that is derived from facts or judgments, using analytical techniques or tools. Option B is a product of analysis because it implies that the investigator has used a tool or technique, such as a threshold analysis, to identify a pattern of structured cash deposits that may indicate an attempt to evade reporting requirements. The other options are facts or judgments that can be verified by evidence or observation.
When crafting internal procedures on writing and submitting SARs/STRs, one should:
Answer : B
When writing and submitting SARs/STRs, one should consider the guidelines issued by the national financial intelligence unit (FIU) and local regulator and incorporate any country-specific requirements. This ensures that the reports are compliant with the relevant laws and regulations and provide useful information to the authorities. The other options are either incorrect or not best practices.
A client that runs a non-profit organization that aids refugees in leaving their home countries received a remittance from a money services business that was ten times the average. The client was recently detained for providing falsified passports to illegal immigrants. Which predicate offenses could be considered in the SAR/STR? (Select Two.)
Answer : A, B
The correct answer is A and B because human smuggling/trafficking and terrorist financing are both predicate offenses for money laundering that could be related to the client's activities. Option C is incorrect because there is no indication of narcotics trafficking in the scenario. Option D is incorrect because there is no indication of antiques smuggling in the scenario. Option E is incorrect because there is no indication of tax evasion in the scenario.
Each month the automated transaction monitoring system generates alerts based on predetermined scenarios. An alert was generated in relation to the account activity of ABC Foundation. Below is the transaction history for ABC Foundation (dates are in DD/MM/YYYY format).

The relationship manager for ABC Foundation contacts the client to request more information on the beneficiary of the transfer in Turkey. ABC Foundation advises that this is a not-for-profit charity group called 'Forever Free." Which is the best next step in the investigation?
Answer : C
The best next step in the investigation is to check the jurisdiction's list of known charities with connections to terrorist activity . This is because the FI has a responsibility to verify the legitimacy and reputation of the beneficiary of the funds, especially if it is a charity or non-profit organization that operates in a high-risk jurisdiction or sector. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should conduct enhanced due diligence on all parties involved in the investigation, including checking various sources of information, such as watch lists, sanctions lists, negative news, and official registries'' (p. 24). The FI should also check if the beneficiary is consistent with the customer's profile and expected activity.
The other options are not as appropriate or effective as option C. Contacting the financial institution in Turkey that has a relationship with Forever Free and advising them of the investigation (A) could violate confidentiality or data protection laws, as well as compromise the investigation or alert the customer or beneficiary of the suspicion. Updating the customer profile to include Forever Free as the recipient of the funds (B) could be premature or inaccurate, as it does not verify the nature and purpose of the transfer or the identity and legitimacy of the beneficiary. Filing a SAR/STR with the new information learned about the beneficiary (D) could also be premature or incomplete, as it does not confirm if there is any suspicious or criminal activity involved in the transfer or if there are any other red flags or indicators.
How does the Financial Action Task Force (FATF) measure the effectiveness of a country's efforts to combat money laundering and terrorist financing?
Answer : A
'The FATF measures the effectiveness of a country's efforts to combat money laundering and terrorist financing through a mutual evaluation process. During a mutual evaluation, the FATF assesses a country's legal and institutional framework, its implementation of measures to combat money laundering and terrorist financing, and the effectiveness of its efforts. The FATF then issues a report with recommendations for improvement' [CAMS Study Guide 6th edition, page 15-16].
According to the Financial Action Task Force, as part of their risk assessment, which are important data and information that a Trust and Company Service Provider must understand when establishing and administering a trust? (Select Two.)
Answer : A, D
Here is the exact information from the Financial Action Task Force (FATF) Guidance for a Risk-Based Approach for Trust and Company Service Providers:
'Understanding the management and ownership structure of a trust is crucial in assessing the ML/TF risk it poses. This includes the identity of all settlors, trustees and beneficiaries, and their respective roles and responsibilities, as well as the nature and purpose of the trust.'
'TCSPs should obtain and maintain up-to-date information on the purpose and intended nature of the business relationship, the source of funds and wealth, and where relevant, the source of funds or wealth of the settlor and beneficiaries.'
Based on this information, the correct answers are A and D. Trust and Company Service Providers must understand the responsibility and authority in the structure, as well as the general purpose behind the structure in order to assess the overall risk of the trust and ensure that any transactions with the trust are legitimate.
An unusual spike in activity has occurred for a customer who is a supplier of aviation parts to a military force. The customer's current line of business is consistent with the banks records, and no adverse media hits have occurred. Which is the best reason for an investigator to continue an investigation?
Answer : A
The best reason for an investigator to continue an investigation is that the end-user is a military force. This is because supplying aviation parts to a military force may involve sanctions risk, export control risk, or human rights risk, depending on the nature and destination of the military force. The investigator should conduct further due diligence to determine if the customer is complying with the relevant laws and regulations, and if the bank is exposed to any reputational or legal risk by providing services to the customer.
Former Airline Employee and Aircraft Part Sellers Charged in Kickback ...
Former Airline Employee and Aircraft Part Sellers Charged in Kickback ...
Former airline employee and aircraft part sellers charged in kickback ...
Which is a key characteristic of the Financial Action Task Force (FATF) Regional Style Bodies for combatting money laundering/terrorist financing?
Answer : B
According to the CAMS study guide, the Financial Action Task Force (FATF) Regional Style Bodies are organizations created by the FATF to promote the implementation of anti-money laundering and countering the financing of terrorism (AML/CFT) measures in specific regions. One of the key characteristics of these bodies is the implementation of regional mutual evaluation procedures.
Regional mutual evaluations involve member countries evaluating each other's AML/CFT regimes to identify strengths and weaknesses and to develop best practices for improvement. This process allows for greater cooperation between countries and can help to identify and address regional AML/CFT risks more effectively. It also promotes consistency in AML/CFT standards and practices within the region.
Law enforcement (LE) suspects human trafficking to occur during a major sporting event LE officers asked several financial institutions (FIs) to monitor financial transactions occurring before, during, and after the event.
An investigator identified a pattern linked to a business. The business' account received multiple even dollar deposits between midnight and 4:00 AM. They occurred each day for several days prior to the date of the sporting event. Also, large cash deposits, typically between 2,000 USD and 3,000 USD. made by a person to the business' account occurred in many branches in the days after the sports event.
There was little information about the company. The company did not have any history of employee payroll expenses or paying taxes. Expenses from the business account included air travel and hotel expenses. Searches about the person making cash deposits showed little. An online social media platform webpage with the individual's name showed ads for dates1' and "companionship."
The Fl wants to create an automated alert for human trafficking money laundering after this investigation. Which activity type should they target?
Answer : B
The activity type that the FI should target for creating an automated alert for human trafficking money laundering is multiple deposits between midnight and 4:00 AM (B). This is because this pattern is consistent with the indicators of human trafficking identified by the Financial Action Task Force (FATF) and the Egmont Group1, which include:
Frequent cash deposits, often in round amounts, outside of normal business hours
Deposits made at different branches or ATMs in various locations
Lack of information about the nature and purpose of the business
Involvement in online platforms that advertise sexual services
Expenses related to travel and accommodation
The other options are not as relevant or specific as option B. Payments made to multiple hotels in the same city (A) could be a legitimate business expense or a sign of other types of money laundering, such as tax evasion or fraud. Deposits made within days of major sporting events could also be explained by other factors, such as increased tourism or gambling. Payments made for virtual currency (D) are not directly related to human trafficking, although they could be used to facilitate money laundering in general.
A financial institution
Answer : C
The correct answer is C because the FI is unable to obtain evidence of required licensing or registration despite suspicion of money transmitting, which is a red flag for money laundering and a violation of federal and state laws. Option A is incorrect because making several deposits in one month that appear to exceed their expected monthly income might not be indicative of suspicious activity, depending on the customer's profile and source of funds. Option B is incorrect because receiving a large, one-time wire from a law firm might not be indicative of suspicious activity, depending on the customer's relationship with the law firm and the purpose of the wire. Option D is incorrect because discovering a large number of securities transactions that appear to be related to day trading might not be indicative of suspicious activity, depending on the customer's investment strategy and risk tolerance.
In which case should an investigator avoid escalating a suspicious event to the chief compliance officer and pursue other channels?
Answer : B
An investigator should avoid escalating a suspicious event to the chief compliance officer if there is a potential conflict of interest, such as when a close family member of the officer is involved in the transaction. In such a case, the investigator should pursue other channels, such as reporting to a higher authority or an independent committee. The other options do not present a conflict of interest and should be escalated to the chief compliance officer as part of the normal procedure.
Why is a more robust supervisory approach needed by regulators when overseeing small- and medium-sized money service businesses (MSBs) compared to larger MSBs for combatting terrorist financing (TF)?
Answer : D
A more robust supervisory approach is needed by regulators when overseeing small- and medium-sized MSBs compared to larger MSBs for combatting TF because small- and medium-sized MSBs are more at risk of allowing transactions linked to TF due to the lack of skilled compliance resources. Small- and medium-sized MSBs may face challenges in implementing effective AML/CFT controls, such as conducting risk assessments, applying customer due diligence measures, monitoring transactions, detecting suspicious activities, and reporting to the authorities. They may also have limited access to training, guidance, and tools to enhance their compliance capabilities. Therefore, regulators need to provide more supervision and support to small- and medium-sized MSBs to ensure that they comply with the AML/CFT requirements and mitigate the TF risks.
Sustainable Growth for Small and Medium-Sized Enterprises ... - MDPI
Lessons on Resilience for Small and Midsize Businesses - HBR
CLIENT INFORMATION FORM Client Name: ABC Tech Corp Client I.D. Number: 08125 Name: ABC Tech Corp Registered Address: Mumbai, India Work Address: Mumbai. India Cell Phone: ***"--- Alt Phone: Email: ********
Client Profile Information:
Sector: Financial
Engaged in business from (date): 02 Jan 2020
Sub-sector: Software-Cryptocurrency Exchange
Expected Annual Transaction Amount: 125.000 USD
Payment Nature: Transfer received from client's fund
Received from: Clients
Received for: Sale of digital assets
The client identified themselves as "Cryptocurrency Exchange" Client has submitted the limited liability partnership deed. However, the bank's auditing team is unable to identify the client's exact business profile as the cryptocurrency exchange specified by the client as their major business awaits clearance from the country's regulator. The client has submitted documents/communications exchanged with the regulator and has cited the lack of governing laws in the country of their operation as the reason for the delay.
Investigators determine the ultimate beneficial owner of ABC Tech Corp is a high-net-worth client. The client owns a real estate agency left to her when her spouse died. The spouse provided seed capital for ABC Tech Corp through a direct 1,000.000 Great British Pound (GBP) deposit.
What additional information would trigger filing a SAR/STR?
Answer : D
The additional information that would trigger filing a SAR/STR is the fact that the funds for the seed capital were in the form of 50 cashier's checks of 10,000 GBP each and 50 money orders of 10,000 GBP. This is because this indicates a possible attempt to avoid the reporting threshold of 10,000 GBP for cash transactions, which is a common money laundering technique known as structuring or smurfing12. The other options are not necessarily suspicious, as they do not involve cash transactions or indicate any illicit source of funds. The fact that the client's spouse was a PEP does not automatically make the transaction suspicious unless there are other red flags or risk factors associated with the PEP34
A client at a financial institution deposits large amounts of money into an account, and almost immediately, the funds are then distributed to numerous individuals' accounts. The transaction activity described in the scenario is a pattern of:
Answer : B
Deposit trading is a pattern of suspicious activity where a client deposits large amounts of money into an account, and then transfers the funds to other accounts, often in different jurisdictions or countries. This could be an attempt to disguise the source or destination of the funds, or to avoid reporting requirements. Deposit trading is also known as layering, which is the second stage of money laundering.
The investigative department of a financial institution (Fl) receives an internal escalation notice from the remittance department for a SWIFT message requesting a refund due to potential fraud. The notice indicates that a total of three international incoming remittances were transferred to a corporate customer from Country A, in the amount of approximately 5 million EUR for each. The first two incoming remittances had been exchanged into currency B and transferred out to Country B a few days ago. The third incoming remittance has been held by the remittance department.
As noted from the KYC profile, the corporate customer is working in the wood industry. with the last account review completed 3 months ago. Since the account's opening. there has been no history of a large amount of funds flowing through the account. The investigator conducts an Internet search and finds that the remitter is a food beverage company.
The same morning, the investigator receives a call from a financial intelligence unit (FIU) inquiring about the same incident. The FIU states that it will issue a warrant to freeze the account on the same day.
After further review, the decision is made that transactions appear suspicious. Which are the next steps the investigator should take? (Select Two.)
Answer : C, E
The correct answer is C and E. The investigator should provide additional information to the LE upon receiving a formal request, and gather all the information that would be useful for LE and recommend filing a SAR/STR. These steps are consistent with the best practices of conducting financial crime investigations and reporting suspicious activity. The investigator should not close the customer's accounts or the investigation, as this may interfere with the ongoing LE inquiry and violate the FI's policies and procedures. The investigator should also not contact local LE directly, as this may compromise the confidentiality of the investigation and the FIU's authority. Reference:
Advanced CAMS-FCI Study Guide, Chapter 4: Reporting Suspicious Activity, pages 40-411
Advanced CAMS-FCI Study Guide, Chapter 5: Governance of an AFC Investigations Unit, pages 48-491
Advanced CAMS-FCI Certification | ACAMS
Which might suggest misuse of crowdfunding resources by a terrorist?
Answer : D
The purchase of airplane tickets after receiving multiple small deposits from a crowdfunding platform might suggest that the funds are being used to facilitate travel for terrorist purposes. The other options are not necessarily indicative of terrorist financing, as they could be explained by legitimate reasons or other types of financial crimes.
An analyst reviews an alert for high volume Automated Clearing House (ACH) activity in an account. The analyst's initial research finds the account is for a commercial daycare account that receives high volumes of large government-funded ACH transactions to support the programs. The account activity consists of checks (cheques) made payable to individual names in varying dollar amounts. One check indicates rent to another business.
An Internet search finds that the daycare company owner has previous government-issued violations for safety and classroom size needs, such as not having enough chairs and tables per enrollee. These violations were issued to a different daycare name.
Simultaneous to this investigation, another analyst sends an email about negative news articles referencing local child/adult daycare companies misusing governmental grants. This prompts the financial institution (Fl) to search all businesses for names containing daycare' or care*. Text searches return a number of facilities as customers at the Fl and detects that three of these businesses have a similar transaction flow of high volume government ACH funding with little to no daycare expenses.
The analyst determines that site visits should be conducted for the three daycare businesses. Which observations at the on-site visits would justify writing a SAR/STR? (Select Three.)
Answer : A, C, F
The observations at the on-site visits that would justify writing a SAR/STR are signs of severe wear and poor maintenance at the site (A), lights turned off at the site during operational hours , and a full parking lot of cars with no staff at the site (F). These observations suggest that the daycare businesses are not operating legitimately or providing adequate services to their customers, and that they may be misusing governmental grants or laundering money through their accounts. These observations are consistent with some of the red flags for fraud identified by ACAMS2, such as:
Inadequate facilities or equipment for the type of business
Lack of visible activity or customers at the business location
Discrepancy between reported income and expenses
Unusual volume or frequency of transactions
The other observations are not as relevant or indicative of fraud as options A, C, and F. A site located in a commercial building (B) could be a normal or legitimate choice for a daycare business, depending on its size, location, and availability. Visible attendance with children being dropped off by parents (D) could show that the daycare business is providing genuine services to its customers, although it does not rule out possible fraud or money laundering. Visible signage indicating the purpose of building (E) could also show that the daycare business is transparent and legitimate, although it does not guarantee its quality or compliance.
While each is potentially important, which allows an investigations analyst to better write a SAR/STR narrative that is useful to law enforcement? (Select Two.)
Answer : D, E
A SAR/STR narrative that is useful to law enforcement should include a detailed description of the known or suspected criminal violation or suspicious activity, as well as ensure that all information in the SAR/STR is complete and accurate based on what the institution knows. These elements help law enforcement to understand the nature and scope of the suspicious activity, and to follow up with further investigation if needed. The other options are not essential for a useful SAR/STR narrative, as they either provide irrelevant or redundant information, or could compromise the confidentiality of the report.
A client with many personal and business deposits with the financial institution (Fl) seeks a business loan. The client wants to guarantee the loan with a trust for which they are the beneficiary.
An investigator examines the trust. The trust has many layers, including shell companies in known tax havens. The client's ultimate beneficial ownership claim cannot be validated, and the loan is denied.
Two months later, the Fl receives a law enforcement (LE) request on one of the client's business accounts. While reviewing the business account, the Fl receives another LE request on the same account from another agency. The requested information is shared.
Three months later, a branch manager receives a request to open a business deposit account related to a complex trust. The manager forwarded the request because of the complexity. The trust was the same as the previously examined trust, but the request came from a different client. The second client also has many accounts with the Fl. Further inspection finds links between the second client and the Paradise Papers. The Papers state the client led illegal activities and committed tax evasion.
What steps should the investigator perform in reference to the first client's existing accounts? (Select Three.)
Answer : A, D, F
The investigator should review all client-signed documents relating to all accounts (A) to check for any discrepancies or red flags. The investigator should also perform secondary scans of the client's other owners/authorized signers (D) to identify any possible connections or associations with the second client or the Paradise Papers. Additionally, the investigator should prepare a relationship flow chart of all existing accounts (F) to better understand the client's activities and patterns. These steps are consistent with the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, which states that investigators should ''review all relevant documentation, including account opening documents, transaction records, and customer correspondence'' (p. 23), ''conduct enhanced due diligence on all parties involved in the investigation'' (p. 24), and ''use data visualization tools to map out complex relationships and transactions'' (p. 25).
Which most likely indicates that a business email compromise attack has occurred?
Answer : A
When writing or reviewing a SAR/STR, it is important to ensure that the narrative is kept to the point; easy to read; and addresses the who, what, when, where, why, and how. This is because the narrative is the most crucial part of the SAR/STR, as it provides a clear and concise summary of the suspicious activity or transaction that triggered the report. The narrative should include all the relevant information that would help law enforcement or regulators to understand the nature and context of the activity or transaction, such as123:
The who: The names, addresses, account numbers, and other identifying information of the parties involved in the activity or transaction, such as customers, beneficiaries, intermediaries, or third parties.
The what: The type, amount, frequency, and purpose of the activity or transaction, such as cash deposits, wire transfers, check payments, or purchases of goods or services.
The when: The date, time, and duration of the activity or transaction, and whether it was a one-time occurrence or part of a pattern or trend.
The where: The location or channel of the activity or transaction, such as branches, ATMs, online platforms, or mobile applications.
The why: The reason or rationale for the activity or transaction, and why it was considered suspicious or unusual based on the customer's profile, behavior, or expected activity.
The how: The method or mechanism of the activity or transaction, such as cash, check, debit card, credit card, cryptocurrency, or prepaid card.
How to write the perfect ''Suspicious Activity Reports'' (SAR)? | i-AML
Writing for Prosecution: Best Practices For Composing SAR Narratives That Assist Prosecutors | ACAMS
SAR Writing Examples and Proper Formatting: Write for Your Reader - Alessa
Each month the automated transaction monitoring system generates alerts based on predetermined scenarios. An alert was generated in relation to the account activity of ABC Foundation. Below is the transaction history for ABC Foundation (dates are in DD/MM/YYYY format).

The relationship manager for ABC Foundation contacts the client to request more information on the beneficiary of the transfer in Turkey. ABC Foundation advises that this is a not-for-profit charity group called 'Forever Free." Which is the best next step in the investigation?
Answer : C
The best next step in the investigation is to check the jurisdiction's list of known charities with connections to terrorist activity . This is because the FI has a responsibility to verify the legitimacy and reputation of the beneficiary of the funds, especially if it is a charity or non-profit organization that operates in a high-risk jurisdiction or sector. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should conduct enhanced due diligence on all parties involved in the investigation, including checking various sources of information, such as watch lists, sanctions lists, negative news, and official registries'' (p. 24). The FI should also check if the beneficiary is consistent with the customer's profile and expected activity.
The other options are not as appropriate or effective as option C. Contacting the financial institution in Turkey that has a relationship with Forever Free and advising them of the investigation (A) could violate confidentiality or data protection laws, as well as compromise the investigation or alert the customer or beneficiary of the suspicion. Updating the customer profile to include Forever Free as the recipient of the funds (B) could be premature or inaccurate, as it does not verify the nature and purpose of the transfer or the identity and legitimacy of the beneficiary. Filing a SAR/STR with the new information learned about the beneficiary (D) could also be premature or incomplete, as it does not confirm if there is any suspicious or criminal activity involved in the transfer or if there are any other red flags or indicators.
Law enforcement (LE) suspects human trafficking to occur during a major spotting event. LE officers asked several financial institutions (FIs) to monitor financial transactions occurring before, during, and after the event.
An investigator identified a pattern linked to a business. The business* account received multiple even dollar deposits between midnight and 4:00 AM. They occurred each day for several days prior to the date of the sporting event. Also, large cash deposits, typically between 2,000 USD and 3.000 USD. made by a person to the business' account occurred in many branches in the days alter the sports event.
There was little information about the company. The company did not have any history of employee payroll expenses or paying taxes. Expenses from the business account included air travel and hotel expenses. Searches about the person making cash deposits showed little. An online social media platform webpage with the individual's name showed ads for dates" and "companionship."
Which fact should not be included in (he SAR/STR narrative?
Answer : B
The fact that should not be included in the SAR/STR narrative is the request by law enforcement (D). This is because the request by law enforcement is confidential and should not be disclosed to the customer or anyone else who is not authorized to know it. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should not include any reference to the LE request in the SAR/STR narrative, as this could compromise the LE investigation or alert the customer of the suspicion'' (p. 35). The FI should also not inform the customer of the LE request or delay filing the SAR/STR because of it.
The other facts should be included in the SAR/STR narrative, as they are relevant and indicative of human trafficking money laundering. The air travel and hotel expenses (A) show that the customer is involved in moving people across different locations, which could be a sign of human smuggling or trafficking. The time of the cash deposits (B) shows that the customer is receiving cash payments during unusual hours, which could be a sign of illicit activities or services. The sporting event shows that the customer is exploiting a high-demand situation for their business, which could be a sign of opportunistic or organized crime.
A client with many personal and business deposits with the financial institution (Fl) seeks a business loan. The client wants to guarantee the loan with a trust for which they are the beneficiary.
An investigator examines the trust. The trust has many layers, including shell companies in known tax havens. The client's ultimate beneficial ownership claim cannot be validated, and the loan is denied.
Two months later, the Fl receives a law enforcement (LE) request on one of the client's business accounts. While reviewing the business account, the Fl receives another LE request on the same account from another agency. The requested information is shared.
Three months later, a branch manager receives a request to open a business deposit account related to a complex trust. The manager forwarded the request because of the complexity. The trust was the same as the previously examined trust, but the request came from a different client. The second client also has many accounts with the Fl. Further inspection finds links between the second client and the Paradise Papers. The Papers state the client led illegal activities and committed tax evasion.
What steps should the investigator take to review the accounts held by the second client who is listed in the Paradise Papers? (Select Two.)
Answer : A, D, D
The investigator should recommend a SAR/STR be filed regarding the second client's use of a questionable trust to open an account, as this could indicate an attempt to conceal the source and ownership of funds, and to evade taxes and sanctions. The investigator should also monitor all accounts and entities related to the second client, as they may be involved in illegal activities or pose a high risk to the FI. The investigator should not review all accounts that have opened trust accounts, as this would be too broad and inefficient. The investigator should not inform FI management of deficiencies in their AML program, as this is not their role or responsibility. The investigator should not inform FI management of the start of a serious risk-based investigation, as this may compromise the confidentiality and integrity of the investigation.
Law enforcement (LE) suspects human trafficking to occur during a major spotting event. LE officers asked several financial institutions (FIs) to monitor financial transactions occurring before, during, and after the event.
An investigator identified a pattern linked to a business. The business* account received multiple even dollar deposits between midnight and 4:00 AM. They occurred each day for several days prior to the date of the sporting event. Also, large cash deposits, typically between 2,000 USD and 3.000 USD. made by a person to the business' account occurred in many branches in the days after the sports event
There was little information about the company. The company did not have any history of employee payroll expenses or paying taxes. Expenses from the business account included air travel and hotel expenses. Searches about the person making cash deposits showed little. An online social media platform webpage with the individual's name showed ads for dates" and "companionship."
If the investigator uncovers evidence that foreign nationals are involved in this activity, they should also note the possible presence of:
Answer : D
If the investigator uncovers evidence that foreign nationals are involved in this activity, they should also note the possible presence of human smuggling (D). This is because human smuggling is the illegal movement of people across borders, often facilitated by criminal networks that exploit vulnerable migrants. According to the FATF and Egmont Group report on Financial Flows from Human Trafficking2, ''human smuggling can be closely linked to human trafficking, as smuggled migrants may become victims of trafficking along their journey or at their destination'' (p. 9). The report also states that some indicators of human smuggling are similar to those of human trafficking, such as:
Frequent cash deposits or withdrawals in different locations
Use of false or fraudulent identification documents
Expenses related to travel and accommodation
Involvement in online platforms that advertise sexual services
The other options are not as relevant or specific as option D. Tax fraud (A) is the evasion of taxes by individuals or businesses, which may or may not be related to human trafficking or smuggling. Black market peso exchange (B) is a money laundering scheme that involves exchanging illicit proceeds in one currency for another currency at a discounted rate, which is more commonly associated with drug trafficking or trade-based laundering. Trade-based laundering is the manipulation of trade transactions to disguise the origin and ownership of illicit funds, which is also more likely to be linked to drug trafficking or other types of fraud.
During transaction monitoring. Bank A learns that one of their customers. Med Supplies 123, is attempting to make a payment via wire totaling 382,500 USD to PPE Business LLC located in Mexico to purchase a large order of personal protective equipment. specifically surgical masks and face shields. Upon further verification. Bank A decides to escalate and refers the case to investigators.
Bank A notes that, days prior to the above transaction, the same customer went to a Bank A location to wire 1,215,280 USD to Breath Well LTD located in Singapore. Breath Well was acting as an intermediary to purchase both 3-ply surgical masks and face shields from Chin
a. Bank A decided not to complete the transaction due to concerns with the involved supplier in China. Moreover, the customer is attempting to send a third wire in the amount of 350,000 USD for the purchase of these items, this time using a different vendor in China. The investigator must determine next steps in the investigation and what actions, if any. should be taken against relevant parties.
Upon further investigation. Bank As investigator learns that both the Mexico- and Singapore-based companies are linked to the alleged suppliers in China. Which additional indicators would the investigator need to identify to determine if this fits a fentanyl (drug) trafficking typology? (Select Two.)
Answer : A, C
An investigator at a corporate bank is conducting transaction monitoring alerts clearance.
KYC profile background: An entity customer, doing business offshore in Hong Kong, established a banking business relationship with the bank in 2017 for deposit and loan purposes. It acts as an offshore investment holding company. The customer declared that the ongoing source of funds to this account comes from group-related companies.
* X is the UBO. and owns 97% shares of this entity customer;
* Y is the authorized signatory of this entity customer. This entity customer was previously the subject of a SAR/STR.
KYC PROFILE
Customer Name: AAA International Company. Ltd
Customer ID: 123456
Account Opened: June 2017
Last KYC review date: 15 Nov 2020
Country and Year of Incorporation: The British Virgin Islands, May 2017
AML risk level: High
Account opening and purpose: Deposits, Loans and Trade Finance
Anticipated account activities: 1 to 5 transactions per year and around 1 million per
transaction amount
During the investigation, the investigator reviewed remittance transactions activities for the period from Jul 2019 to Sep 2021 and noted the following transactions pattern:
TRANSACTION JOURNAL
Review dates: from July 2019 to Sept 2021
For Hong Kong Dollars (HKD) currency:
Incoming transactions: 2 inward remittances of around 1.88 million HKD in total from
different third parties
Outgoing transactions: 24 outward remittances of around 9 4 million HKD in total to
different third parties
For United States Dollars (USD) currency:
Incoming transactions: 13 inward remittances of around 3.3 million USD in total from
different third parties
Outgoing transactions: 10 outward remittances of around 9.4 million USD in total to
different third parties.
RFI Information and Supporting documents:
According to the RFI reply received on 26 May 2021, the customer provided the bank
with the information below:
1) All incoming funds received in HKD & USD currencies were monies lent from non-customers of the bank. Copies of loan agreements had been provided as supporting documents. All of the loan agreements were in the same format and all the lenders are engaged in trading business.
2) Some loan agreements were signed among four parties, including among lenders. borrower (the bank's customer), guarantor, and guardian with supplemental agreements, which stated that the customer, as a borrower, who failed to repay the loan
Based on the KYC profile and the transaction journal, the pattern of activity shows a deviation in:
Answer : A
The correct answer is A because the expected account activities were 1 to 5 transactions per year and around 1 million per transaction amount, but the actual activity showed much more frequent and varied transactions in different currencies and amounts. This indicates a deviation from the customer's profile and risk level.
An analyst reviews an alert for high volume Automated Clearing House (ACH) activity in an account. The analyst's initial research finds the account is for a commercial daycare account that receives high volumes of large government-funded ACH transactions to support the programs. The account activity consists of checks (cheques) made payable to individual names in varying dollar amounts. One check indicates rent to another business.
An Internet search finds that the daycare company owner has previous government-issued violations for safety and classroom size needs, such as not having enough chairs and tables per enrollee. These violations were issued to a different daycare name.
Simultaneous to this investigation, another analyst sends an email about negative news articles referencing local child/adult daycare companies misusing governmental grants. This prompts the financial institution (Fl) to search all businesses for names containing 'daycare' or *care'. Text searches return a number of facilities as customers at the Fl and detects that three of these businesses have a similar transaction flow of high volume government ACH funding with little to no daycare expenses.
Which red flags would be an indicator that activity is connected to a corruption/bribery typology? (Select Two.)
Answer : A, B
The red flags that would be an indicator that activity is connected to a corruption/bribery typology are large checks issued to various individuals with the memos noting ''gift'', ''thank you'', ''favor'' (A) and negative news found on the customer related to government-issued violations for safety (B). These red flags suggest that the customer is involved in paying or receiving bribes or kickbacks to or from government officials or other parties in exchange for favorable treatment or contracts. These red flags are consistent with some of the indicators of corruption/bribery identified by ACAMS1, such as:
Payments made to or from third parties that are not directly related to the business
Payments made to or from high-risk jurisdictions or sectors
Payments made with vague or incomplete descriptions or justifications
Negative news or reputation of the customer or its associates
The other options are not as relevant or indicative of corruption/bribery as options A and B. Checks issued to an unrelated entity referencing ''rent'' and ''utilities'' in the memos could be a legitimate business expense or a sign of other types of fraud or money laundering, such as tax evasion or shell company schemes. Multiple daycare locations with no active business operations or related account activity (D) could also be a sign of other types of fraud or money laundering, such as embezzlement or front company schemes. The same beneficial owner owning several daycare centers in different locations (E) could be a normal or legitimate business practice, depending on the size, location, and profitability of the centers.
The investigative department of a financial institution (Fl) receives an internal escalation notice from the remittance department for a SWIFT message requesting a refund due to potential fraud. The notice indicates that a total of three international incoming remittances were transferred to a corporate customer from Country A, in the amount of approximately 5 million EUR for each. The first two incoming remittances had been exchanged into currency B and transferred out to Country B a few days ago. The third incoming remittance has been held by the remittance department.
As noted from the KYC profile, the corporate customer is working in the wood industry. with the last account review completed 3 months ago. Since the account's opening. there has been no history of a large amount of funds flowing through the account. The investigator conducts an Internet search and finds that the remitter is a food beverage company.
The same morning, the investigator receives a call from a financial intelligence unit (FIU) inquiring about the same incident. The FIU states that it will issue a warrant to freeze the account on the same day.
After further review, the decision is made that transactions appear suspicious. Which are the next steps the investigator should take? (Select Two.)
Answer : C, E
The correct answer is C and E. The investigator should provide additional information to the LE upon receiving a formal request, and gather all the information that would be useful for LE and recommend filing a SAR/STR. These steps are consistent with the best practices of conducting financial crime investigations and reporting suspicious activity. The investigator should not close the customer's accounts or the investigation, as this may interfere with the ongoing LE inquiry and violate the FI's policies and procedures. The investigator should also not contact local LE directly, as this may compromise the confidentiality of the investigation and the FIU's authority. Reference:
Advanced CAMS-FCI Study Guide, Chapter 4: Reporting Suspicious Activity, pages 40-411
Advanced CAMS-FCI Study Guide, Chapter 5: Governance of an AFC Investigations Unit, pages 48-491
Advanced CAMS-FCI Certification | ACAMS
A U.S. financial institution (Fl) receives a grand jury subpoena for a corporate client's account. The Fl should:
Answer : B
The Fl should review the corporate account's activity and transactions. This is because a grand jury subpoena is a legal request for information or testimony that may be used in a criminal investigation or prosecution. The Fl should review the account for any suspicious or unusual activity that may be related to the subpoena or indicate money laundering, terrorist financing, or other financial crimes. The Fl should also document its review and retain any relevant records.
A client that runs a non-profit organization that aids refugees in leaving their home countries received a remittance from a money services business that was ten times the average. The client was recently detained for providing falsified passports to illegal immigrants. Which predicate offenses could be considered in the SAR/STR? (Select Two.)
Answer : A, B
The correct answer is A and B because human smuggling/trafficking and terrorist financing are both predicate offenses for money laundering that could be related to the client's activities. Option C is incorrect because there is no indication of narcotics trafficking in the scenario. Option D is incorrect because there is no indication of antiques smuggling in the scenario. Option E is incorrect because there is no indication of tax evasion in the scenario.
How does the Financial Action Task Force (FATF) measure the effectiveness of a country's efforts to combat money laundering and terrorist financing?
Answer : A
'The FATF measures the effectiveness of a country's efforts to combat money laundering and terrorist financing through a mutual evaluation process. During a mutual evaluation, the FATF assesses a country's legal and institutional framework, its implementation of measures to combat money laundering and terrorist financing, and the effectiveness of its efforts. The FATF then issues a report with recommendations for improvement' [CAMS Study Guide 6th edition, page 15-16].
Which scenarios are common to money laundering through online marketplaces and trade-based money laundering? (Select Two.)
Answer : A, C
Money laundering through online marketplaces and trade-based money laundering both involve the manipulation of the value or quantity of goods to disguise the illicit origin of funds. Over-valuation of the stated price of goods and no evidence of delivery of goods or shipping expenses are two common indicators of such schemes. The other options are not specific to these methods of money laundering.
CLIENT INFORMATION FORM Client Name: ABC Tech Corp Client I.D. Number: 08125 Name: ABC Tech Corp Registered Address: Mumbai, India Work Address: Mumbai. India Cell Phone: ***"--- Alt Phone: Email: ********
Client Profile Information:
Sector: Financial
Engaged in business from (date): 02 Jan 2020
Sub-sector: Software-Cryptocurrency Exchange
Expected Annual Transaction Amount: 125.000 USD
Payment Nature: Transfer received from client's fund
Received from: Clients
Received for: Sale of digital assets
The client identified themselves as "Cryptocurrency Exchange" Client has submitted the limited liability partnership deed. However, the bank's auditing team is unable to identify the client's exact business profile as the cryptocurrency exchange specified by the client as their major business awaits clearance from the country's regulator. The client has submitted documents/communications exchanged with the regulator and has cited the lack of governing laws in the country of their operation as the reason for the delay.
Investigators determine the ultimate beneficial owner of ABC Tech Corp is a high-net-worth client. The client owns a real estate agency left to her when her spouse died. The spouse provided seed capital for ABC Tech Corp through a direct 1,000.000 Great British Pound (GBP) deposit.
What additional information would trigger filing a SAR/STR?
Answer : D
The additional information that would trigger filing a SAR/STR is the fact that the funds for the seed capital were in the form of 50 cashier's checks of 10,000 GBP each and 50 money orders of 10,000 GBP. This is because this indicates a possible attempt to avoid the reporting threshold of 10,000 GBP for cash transactions, which is a common money laundering technique known as structuring or smurfing12. The other options are not necessarily suspicious, as they do not involve cash transactions or indicate any illicit source of funds. The fact that the client's spouse was a PEP does not automatically make the transaction suspicious unless there are other red flags or risk factors associated with the PEP34
Which pattern of activity most strongly indicates an individual is a foreign terrorist fighter?
Answer : B
The pattern of activity that most strongly indicates an individual is a foreign terrorist fighter is a large cash advance on a credit card and purchases at travel and sporting goods websites. This is because this pattern may suggest that the individual is preparing to travel to a conflict zone and purchase equipment or supplies for terrorist activities. According to the United Nations Office on Drugs and Crime, some of the indicators of foreign terrorist fighters include1:
Sudden or increased financial activity, such as cash withdrawals, transfers, or deposits, especially in large amounts or involving foreign currency or locations.
Purchases of travel-related items, such as airline tickets, passports, visas, luggage, or clothing, especially to or from high-risk destinations or transit hubs.
Purchases of items that could be used for terrorist purposes, such as weapons, explosives, chemicals, communication devices, or survival gear.
Changes in behavior, such as expressing radical views, cutting ties with family or friends, joining extremist groups, or displaying signs of emotional distress.
Foreign Terrorist Fighters - United Nations Office on Drugs and Crime
While each is potentially important, which allows an investigations analyst to better write a SAR/STR narrative that is useful to law enforcement? (Select Two.)
Answer : D, E
A SAR/STR narrative that is useful to law enforcement should include a detailed description of the known or suspected criminal violation or suspicious activity, as well as ensure that all information in the SAR/STR is complete and accurate based on what the institution knows. These elements help law enforcement to understand the nature and scope of the suspicious activity, and to follow up with further investigation if needed. The other options are not essential for a useful SAR/STR narrative, as they either provide irrelevant or redundant information, or could compromise the confidentiality of the report.
The investigative department of a financial institution (Fl) receives an internal escalation notice from the remittance department for a SWIFT message requesting a refund due to potential fraud. The notice indicates that a total of three international incoming remittances were transferred to a corporate customer from Country A, in the amount of approximately 5 million EUR for each. The first two incoming remittances had been exchanged into currency B and transferred out to Country B a few days ago. The third incoming remittance has been held by the remittance department.
As noted from the KYC profile, the corporate customer is working in the wood industry. with the last account review completed 3 months ago. Since the account's opening. there has been no history of a large amount of funds flowing through the account. The investigator conducts an Internet search and finds that the remitter is a food beverage company.
The same morning, the investigator receives a call from a financial intelligence unit (FIU) inquiring about the same incident. The FIU states that it will issue a warrant to freeze the account on the same day.
Which steps for documenting the final investigation decision are appropriate for the investigator in this scenario?
Answer : C
The investigator should document the investigation process and retain all relevant documents in the case management system. This is because documenting the investigation process is a good practice to ensure the quality and consistency of the investigation, as well as to facilitate the review and audit of the investigation. Retaining all relevant documents is also important to support the evidence and findings of the investigation, as well as to comply with the record-keeping requirements of the relevant authorities. The other options are incorrect because:
A . Excluding any open-source information from record-keeping is not advisable, as open-source information can provide valuable insights and context for the investigation, and may not be easily retrievable in the future.
B . Adding all of the information the FI has about the subject, their account(s) activity, research results, KYC information, etc. to the SAR/STR is not necessary, as the SAR/STR should only contain the essential information that is relevant and material to the suspicious activity. Adding too much information may obscure the main points and make the SAR/STR less effective.
D . Not documenting the investigation process if a SAR/STR is not filed is not acceptable, as the investigation process should be documented regardless of the outcome. Documenting the investigation process can help justify why a SAR/STR was not filed, and also provide a reference for future investigations involving the same subject or activity.
Advanced CAMS-FCI Certification | ACAMS, Section 3: Reporting Suspicious Activity, page 14
Leading Complex Investigations Certificate | ACAMS, Module 4: Documenting Your Investigation, page 4
A bank investigator notices an account receiving multiple deposits from the same employer under different employees' names. A cash withdrawal occurs one day after each deposit. The outcome of this investigation will likely uncover which crime typology?
Answer : D
The correct answer is A because this scenario describes a possible case of human trafficking, which is a crime where people are exploited for labor or sexual services against their will. Human traffickers may use bank accounts to launder their proceeds and pay their victims, and they may use fake or stolen identities to avoid detection. The other options are not likely because they do not explain why multiple deposits from the same employer under different employees' names would occur, nor why cash withdrawals would follow each deposit.
An investigator at a corporate bank is conducting transaction monitoring alerts clearance.
KYC profile background: An entity customer, doing business offshore in Hong Kong, established a banking business relationship with the bank since 2017 for deposit and loan purposes. It acts as an offshore investment holding company. The customer declared that the ongoing source of funds to this account comes from group-related companies.
* X is the UBO. and owns 97% shares of this entity customer;
* Y is is the authorized signatory of this entity customer. This entity customer was previously the subject of a SAR/STR.
KYC PROFILE
Customer Name: AAA International Company. Ltd
Customer ID: 123456
Account Opened: June 2017
Last KYC review date: 15 Nov 2020
Country and Year of Incorporation: The British Virgin Islands, May 2017
AML risk level: High
Account opening and purpose: Deposits, Loans, and Trade Finance
Anticipated account activities: 1 to 5 transactions per year and around 1 million per
transaction amount
During the investigation, the investigator reviewed remittance transactions activities for the period from Jul 2019 to Sep 2021 and noted the following transactions pattern:
TRANSACTION JOURNAL
Review dates: from July 2019 to Sept 2021
For Hong Kong Dollars (HKD) currency:
Incoming transactions: 2 inward remittances of around 1.88 million HKD in total from
different third parties
Outgoing transactions: 24 outward remittances of around 9 4 million HKD in total to
different third parties
For United States Dollars (USD) currency:
Incoming transactions: 13 inward remittances of around 3.3 million USD in total from
different third parties
Outgoing transactions: 10 outward remittances of around 9.4 million USD in total to
different third parties.
RFI Information and Supporting documents:
According to the RFI reply received on 26 May 2021, the customer provided the bank
with the information below:
1J All incoming funds received in HKD & USD currencies were monies lent from non-customers of the bank. Copies of loan agreements had been provided as supporting documents. All of the loan agreements were in the same format and all the lenders are engaged in trading business.
2) Some loan agreements were signed among four parties, including among lenders. borrower (the bank's customer), guarantor, and guardian with supplemental agreements, which stated that the customer, as a borrower, who failed to repay a loan
Which suspicious activity should the investigator identify during the review of the loan agreements?
Answer : D
The correct answer is D because it is a suspicious activity that Y, who is the authorized signatory of the customer, also signed on behalf of the lenders. This indicates a possible conflict of interest, collusion, or fraud. The other options are not suspicious activities based on the information given.
Which is a key characteristic of the Financial Action Task Force (FATF) Regional Style Bodies for combatting money laundering/terrorist financing?
Answer : B
According to the CAMS study guide, the Financial Action Task Force (FATF) Regional Style Bodies are organizations created by the FATF to promote the implementation of anti-money laundering and countering the financing of terrorism (AML/CFT) measures in specific regions. One of the key characteristics of these bodies is the implementation of regional mutual evaluation procedures.
Regional mutual evaluations involve member countries evaluating each other's AML/CFT regimes to identify strengths and weaknesses and to develop best practices for improvement. This process allows for greater cooperation between countries and can help to identify and address regional AML/CFT risks more effectively. It also promotes consistency in AML/CFT standards and practices within the region.
During transaction monitoring. Bank A learns that one of its customers. Med Supplies 123, is attempting to make a payment via wire totaling 382.500 USD to PPE Business LLC located in Mexico to purchase a large order of personal protective equipment. specifically surgical masks and face shields. Upon further verification. Bank A decides to escalate and refers the case to investigators.
Bank A notes that days prior to the above transaction, the same customer went to a Bank A location to wire 1,215,280 USD to Breath Well LTD located in Singapore. Breath Well was acting as an intermediary to purchase both 3-ply surgical masks and face shields from Chin
a. Bank A decided not to complete the transaction due to concerns with the involved supplier in China. Moreover, the customer is attempting to send a third wire in the amount of 350,000 USD for the purchase of these items, this time using a different vendor in China. The investigator must determine the next steps in the investigation and what actions, if any. should be taken against relevant parties.
The investigator is gathering more information to determine if a SAR/STR filing is needed. Which steps are the correct ways of collecting the additional information? (Select Two.)
Answer : A, D
The correct answer is A and C because these indicators suggest that the customer is using fraudulent documents and misrepresenting the goods to conceal the illicit nature of the transactions. Fentanyl traffickers often use front companies and falsified invoices to disguise their shipments as legitimate products, such as medical supplies or chemicals. Reviewing the invoices and transportation documents, as well as the FDA product certifications, can help to identify discrepancies or anomalies that indicate fraud or deception.
Which action is part of the enhanced due diligence process?
Answer : A
One of the actions that is part of the enhanced due diligence process is collecting beneficial ownership details regarding the client's account. This is important to identify the natural persons who ultimately own or control the client, and to assess the potential risks associated with them. According to the Financial Action Task Force (FATF), beneficial ownership information should include1:
The name, nationality, and country of residence of each beneficial owner.
The date of birth or incorporation of each beneficial owner.
The nature and extent of the beneficial interest held by each beneficial owner.
The means by which the beneficial ownership or control is exercised.
FATF Guidance on Transparency and Beneficial Ownership
A SAR/STR on cash activity is filed for a company registered in the Marshall Islands operating a Mediterranean beach bar and hotel. The company has three nominee directors, one nominee shareholder, and another individual declared as both the beneficial owner and authorized signatory. Which information is key for law enforcement's physical surveillance of cash activity? (Select Two.)
Answer : B, C
The identification details of the beneficial owner and authorized signatory are key for law enforcement's physical surveillance of cash activity, as they would help identify the person who controls and operates the company and who is responsible for its financial transactions. The company's operating address is also key, as it would help locate the premises where the cash activity takes place and observe any suspicious movements or behaviors. The identification details of the nominee shareholder and directors are not relevant, as they are not involved in the management or operation of the company. The company's registered address is also not relevant, as it is likely to be a shell or mailbox address that does not reflect the actual location of the business.
A U.S. financial institution (Fl) receives a grand jury subpoena for a corporate client's account. The Fl should:
Answer : B
The Fl should review the corporate account's activity and transactions. This is because a grand jury subpoena is a legal request for information or testimony that may be used in a criminal investigation or prosecution. The Fl should review the account for any suspicious or unusual activity that may be related to the subpoena or indicate money laundering, terrorist financing, or other financial crimes. The Fl should also document its review and retain any relevant records.
Which are some of the negative impacts from illegal wildlife trade and environmental crimes? (Select Two.)
Answer : B, D, D
Some of the negative impacts of illegal wildlife trade and environmental crimes are loss of potential tax proceeds and threats to biodiversity. Loss of potential tax proceeds occurs when illegal wildlife trade and environmental crimes evade taxation and customs duties, depriving governments of revenues that could be used for public services and development. Threats to biodiversity occur when illegal wildlife trade and environmental crimes endanger species, habitats, and ecosystems, reducing their resilience and ability to provide essential services for human well-being. Public health consequences and threats to a country's political stability are not directly related to illegal wildlife trade and environmental crimes, but rather to other types of financial crimes such as money laundering, terrorism financing, or corruption.
During transaction monitoring. Bank A learns that one of their customers. Med Supplies 123. is attempting to make a payment via wire totaling 382,500 USD to PPE Business LLC located in Mexico to purchase a large order of personal protective equipment. specifically surgical masks and face shields. Upon further verification. Bank A decides to escalate and refers the case to investigators.
Bank A notes that, days prior to the above transaction, the same customer went to a Bank A location to wire 1,215,280 USD to Breath Well LTD located in Singapore. Breath Well was acting as an intermediary to purchase both 3-ply surgical masks and face shields from Chin
a. Bank A decided not to complete the transaction due to concerns with the involved supplier in China. Moreover, the customer is attempting to send a third wire in the amount of 350,000 USD for the purchase of these items, this time using a different vendor in China. The investigator must determine next steps in the investigation and what actions, if any. should be taken against relevant parties.
During the investigation, Bank A receives a USA PATRIOT Act Section 314(a) request related to Med Supplies 123. Which steps should the investigator take when fulfilling the request? (Select Three.)
Answer : D, E, F
According to the FinCEN's 314(a) Fact Sheet1, the steps that the investigator should take when fulfilling the request are:
Search its records expeditiously to determine whether it maintains(ed) any accounts for the subject(s) listed in the request. This is option F.
Report back to the Financial Crimes Enforcement Network (FinCEN) within 15 days of receipt of the request via a secure internet website. This is option E.
Report to Financial Crimes Enforcement Network (FinCEN) that a match was found without revealing any other details. This is option D.
The other options are incorrect because:
Exiting the relationship with the business since it appears that customer is under investigation is not required by the 314(a) program and may interfere with law enforcement's investigation. This is option A.
Not responding to Financial Crimes Enforcement Network (FinCEN) if the requested information is not present in the financial institution's system of records is contrary to the 314(a) program, which requires financial institutions to respond whether or not they have a match. This is option B.
Reviewing the account(s) activity and proactively filing a SAR/STR using the 314(a) request as the basis for the filing is not appropriate, as the 314(a) request itself is not a sufficient reason to file a SAR/STR. The financial institution should only file a SAR/STR if it has its own independent suspicion of money laundering or terrorist financing. This is option C.
Refer to the exhibit.

During a review of the accounts related to Richard Aston, an investigator notices a high number of incoming payments from various individuals. They also notice that these incoming payments typically occur during large sporting events or conferences. As a result of the account review, of which illegal activity does the investigator have reasonable grounds to suspect Richard Aston?
Answer : B
The illegal activity that the investigator has reasonable grounds to suspect Richard Aston of is aftermarket sales of entertainment admission tickets. This is because aftermarket sales of entertainment admission tickets involve reselling tickets for events, concerts, festivals, etc. at a higher price than their face value, often through online platforms or scalpers. This practice can be illegal or unethical, depending on the jurisdiction and the terms and conditions of the original ticket seller. The investigator should look for indicators of aftermarket sales of entertainment admission tickets, such as high volume or frequency of incoming payments from various individuals, correlation between incoming payments and major events or conferences, and discrepancy between the customer's profile and the nature of the transactions. The other options are incorrect because:
A . Embezzling from the hotel is not likely, as it would involve stealing money or property from the hotel by an employee or a person in a position of trust. There is no evidence that Richard Aston works for or has access to the hotel's assets.
C . Human trafficking is not probable, as it would involve exploiting people for forced labor or commercial sexual exploitation. There is no indication that Richard Aston is involved in any form of human trafficking or has any connection to victims or perpetrators.
D . Sports betting is not plausible, as it would involve wagering money on the outcome of sporting events or games. There is no sign that Richard Aston is engaged in any sports betting activity or has any association with bookmakers or gamblers.
Advanced CAMS-FCI Certification | ACAMS, Section 2: Investigating Financial Crimes, page 10
TicketSwap: The safest way to buy and sell tickets
Ticketing 101 | Ticketmaster
10 Types of Tickets For Events (+ Why & When To Use Them) - Eventbrite
A financial institution
Answer : C
The correct answer is C because the FI is unable to obtain evidence of required licensing or registration despite suspicion of money transmitting, which is a red flag for money laundering and a violation of federal and state laws. Option A is incorrect because making several deposits in one month that appear to exceed their expected monthly income might not be indicative of suspicious activity, depending on the customer's profile and source of funds. Option B is incorrect because receiving a large, one-time wire from a law firm might not be indicative of suspicious activity, depending on the customer's relationship with the law firm and the purpose of the wire. Option D is incorrect because discovering a large number of securities transactions that appear to be related to day trading might not be indicative of suspicious activity, depending on the customer's investment strategy and risk tolerance.
Which most likely indicates that a business email compromise attack has occurred?
Answer : A
When writing or reviewing a SAR/STR, it is important to ensure that the narrative is kept to the point; easy to read; and addresses the who, what, when, where, why, and how. This is because the narrative is the most crucial part of the SAR/STR, as it provides a clear and concise summary of the suspicious activity or transaction that triggered the report. The narrative should include all the relevant information that would help law enforcement or regulators to understand the nature and context of the activity or transaction, such as123:
The who: The names, addresses, account numbers, and other identifying information of the parties involved in the activity or transaction, such as customers, beneficiaries, intermediaries, or third parties.
The what: The type, amount, frequency, and purpose of the activity or transaction, such as cash deposits, wire transfers, check payments, or purchases of goods or services.
The when: The date, time, and duration of the activity or transaction, and whether it was a one-time occurrence or part of a pattern or trend.
The where: The location or channel of the activity or transaction, such as branches, ATMs, online platforms, or mobile applications.
The why: The reason or rationale for the activity or transaction, and why it was considered suspicious or unusual based on the customer's profile, behavior, or expected activity.
The how: The method or mechanism of the activity or transaction, such as cash, check, debit card, credit card, cryptocurrency, or prepaid card.
How to write the perfect ''Suspicious Activity Reports'' (SAR)? | i-AML
Writing for Prosecution: Best Practices For Composing SAR Narratives That Assist Prosecutors | ACAMS
SAR Writing Examples and Proper Formatting: Write for Your Reader - Alessa
How does the Financial Action Task Force (FATF) measure the effectiveness of a country's efforts to combat money laundering and terrorist financing?
Answer : A
'The FATF measures the effectiveness of a country's efforts to combat money laundering and terrorist financing through a mutual evaluation process. During a mutual evaluation, the FATF assesses a country's legal and institutional framework, its implementation of measures to combat money laundering and terrorist financing, and the effectiveness of its efforts. The FATF then issues a report with recommendations for improvement' [CAMS Study Guide 6th edition, page 15-16].
A bank investigator notices an account receiving multiple deposits from the same employer under different employees' names. A cash withdrawal occurs one day after each deposit. The outcome of this investigation will likely uncover which crime typology?
Answer : D
The correct answer is A because this scenario describes a possible case of human trafficking, which is a crime where people are exploited for labor or sexual services against their will. Human traffickers may use bank accounts to launder their proceeds and pay their victims, and they may use fake or stolen identities to avoid detection. The other options are not likely because they do not explain why multiple deposits from the same employer under different employees' names would occur, nor why cash withdrawals would follow each deposit.
An investigator is reviewing an alert for unusual activity. System scanning detected a text string within a company customer's account transactions that indicates the account may have been used for a drug or drug paraphernalia purchase. Based on the KYC profile, the investigator determines the customer's company name and business type are marketed as a gardening supplies company. The investigator reviews the account activity and notes an online purchase transaction that leads the investigator to a website that sells various strains of marijuan
a. Additional account review detects cash deposits into the account at the branch teller lines, so the investigator reaches out to the teller staff regarding the transactions. The teller staff member reports that the business customers have frequently deposited cash in lower amounts. The teller, without prompting, adds that one of the transactors would occasionally smell of a distinct scent of marijuana smoke.
Which information should be included in the SAR/STR?
Answer : C
The SAR/STR should include any information that is relevant to the suspicious activity, such as the customer information, the transaction details, and any other indicators of potential money laundering or criminal activity. The fact that one of the transactors occasionally smelled of marijuana smoke is an indicator that the customer may be involved in the illicit drug trade, which is a predicate offense for money laundering. Therefore, this information should be included in the SAR/STR. Reference: Advanced CAMS-FCI Study Guide, page 25.
While each is potentially important, which allows an investigations analyst to better write a SAR/STR narrative that is useful to law enforcement? (Select Two.)
Answer : D, E
A SAR/STR narrative that is useful to law enforcement should include a detailed description of the known or suspected criminal violation or suspicious activity, as well as ensure that all information in the SAR/STR is complete and accurate based on what the institution knows. These elements help law enforcement to understand the nature and scope of the suspicious activity, and to follow up with further investigation if needed. The other options are not essential for a useful SAR/STR narrative, as they either provide irrelevant or redundant information, or could compromise the confidentiality of the report.
Due to an ever-diversifying business model and multi-jurisdictional footprint, a casino has decided to outsource the source of funds and wealth checks to a third-party provider. Why is it important for the casino to maintain control of the output from the provider?
Answer : C
The reason why it is important for the casino to maintain control of the output from the provider is that the casino maintains ultimate responsibility for this activity and should maintain control to avoid non-compliance . This is because the casino is accountable for its own AML/CFT obligations and cannot delegate or outsource them to a third-party provider. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should ensure that it has adequate oversight and control over any third-party providers that it engages for AML/CFT purposes, such as conducting due diligence, verifying information, or monitoring transactions'' (p. 25). The FI should also ''review and evaluate the performance and quality of the third-party providers on a regular basis, and address any issues or gaps that may arise'' (p. 25).
The other options are not as relevant or accurate as option C. The clients of the casino prefer to know that the casino is keeping their information secure when being held by a third-party (A) is not a reason why the casino should maintain control of the output from the provider, but rather a customer expectation or preference. As with all third-party relationships, proper control must be maintained to ensure profitability (B) is not a reason why the casino should maintain control of the output from the provider, but rather a general business principle or objective. Other casinos are frequently looking to reduce costs and share ideas, so if this relationship is successful, the model can be used by other businesses (D) is not a reason why the casino should maintain control of the output from the provider, but rather a potential benefit or outcome.
A financial institution (Fl) banks a money transmitter business (MTB) located in Miami. The MTB regularly initiates wire transfers with the ultimate beneficiary in Cuba and legally sells travel packages to Cub
a. The wire transfers for money remittances comply with the country's economic sanctions policies. A Fl investigator on the sanctions team reviews each wire transfer to ensure compliance with sanctions and to monitor transfer details.
An airline located in Cuba, unrelated to the business, legally sells airline tickets in Cuba to Cuban citizens wanting to travel outside of Cuba. The airline tickets are purchased using Cuban currency (CUC).
The MTB wants 100,000 USD worth of CUC. Purchasing CUC from a Cuban bank includes a 4% fee. The MTB contacts the airline to ask if the airline will trade its CUC for USD at a lower exchange fee than the Cuban bank. The airline agrees to a 1% fee. The MTB initiates a wire transfer to the airline which appears as normal activity in the monitoring system because of the business' travel package sales.
Which investigative actions should the investigator take concerning the 100.000 USD wire transfer? (Select Three.)
Answer : A, E, F
The investigator should take the following investigative actions concerning the 100,000 USD wire transfer:
Review the wire transfer protocols for this customer. This will help the investigator to determine if the wire transfer is consistent with the customer's normal business activity and risk profile, or if it deviates from the established patterns or thresholds.
Review regulations applicable to foreign currency trading transactions. This will help the investigator to assess if the wire transfer violates any laws or regulations related to currency exchange, such as reporting requirements, licensing requirements, or sanctions compliance.
Locate and review licenses, registrations, and account operating agreements associated with the MTB account. This will help the investigator to verify if the MTB has the necessary authorization and documentation to conduct currency exchange transactions and if it has disclosed this activity to the FI. Reference: Advanced CAMS-FCI Study Guide, pages 32-33.
During transaction monitoring. Bank A learns that one of its customers. Med Supplies 123, is attempting to make a payment via wire totaling 382.500 USD to PPE Business LLC located in Mexico to purchase a large order of personal protective equipment. specifically surgical masks and face shields. Upon further verification. Bank A decides to escalate and refers the case to investigators.
Bank A notes that days prior to the above transaction, the same customer went to a Bank A location to wire 1,215,280 USD to Breath Well LTD located in Singapore. Breath Well was acting as an intermediary to purchase both 3-ply surgical masks and face shields from Chin
a. Bank A decided not to complete the transaction due to concerns with the involved supplier in China. Moreover, the customer is attempting to send a third wire in the amount of 350,000 USD for the purchase of these items, this time using a different vendor in China. The investigator must determine the next steps in the investigation and what actions, if any. should be taken against relevant parties.
The investigator is gathering more information to determine if a SAR/STR filing is needed. Which steps are the correct ways of collecting the additional information? (Select Two.)
Answer : A, D
The correct answer is A and C because these indicators suggest that the customer is using fraudulent documents and misrepresenting the goods to conceal the illicit nature of the transactions. Fentanyl traffickers often use front companies and falsified invoices to disguise their shipments as legitimate products, such as medical supplies or chemicals. Reviewing the invoices and transportation documents, as well as the FDA product certifications, can help to identify discrepancies or anomalies that indicate fraud or deception.
During transaction monitoring. Bank A learns that one of their customers. Med Supplies 123. is attempting to make a payment via wire totaling 382,500 USD to PPE Business LLC located in Mexico to purchase a large order of personal protective equipment. specifically surgical masks and face shields. Upon further verification. Bank A decides to escalate and refers the case to investigators.
Bank A notes that, days prior to the above transaction, the same customer went to a Bank A location to wire 1,215,280 USD to Breath Well LTD located in Singapore. Breath Well was acting as an intermediary to purchase both 3-ply surgical masks and face shields from Chin
a. Bank A decided not to complete the transaction due to concerns with the involved supplier in China. Moreover, the customer is attempting to send a third wire in the amount of 350,000 USD for the purchase of these items, this time using a different vendor in China. The investigator must determine next steps in the investigation and what actions, if any. should be taken against relevant parties.
During the investigation, Bank A receives a USA PATRIOT Act Section 314(a) request related to Med Supplies 123. Which steps should the investigator take when fulfilling the request? (Select Three.)
Answer : D, E, F
According to the FinCEN's 314(a) Fact Sheet1, the steps that the investigator should take when fulfilling the request are:
Search its records expeditiously to determine whether it maintains(ed) any accounts for the subject(s) listed in the request. This is option F.
Report back to the Financial Crimes Enforcement Network (FinCEN) within 15 days of receipt of the request via a secure internet website. This is option E.
Report to Financial Crimes Enforcement Network (FinCEN) that a match was found without revealing any other details. This is option D.
The other options are incorrect because:
Exiting the relationship with the business since it appears that customer is under investigation is not required by the 314(a) program and may interfere with law enforcement's investigation. This is option A.
Not responding to Financial Crimes Enforcement Network (FinCEN) if the requested information is not present in the financial institution's system of records is contrary to the 314(a) program, which requires financial institutions to respond whether or not they have a match. This is option B.
Reviewing the account(s) activity and proactively filing a SAR/STR using the 314(a) request as the basis for the filing is not appropriate, as the 314(a) request itself is not a sufficient reason to file a SAR/STR. The financial institution should only file a SAR/STR if it has its own independent suspicion of money laundering or terrorist financing. This is option C.
A client that runs a non-profit organization that aids refugees in leaving their home countries received a remittance from a money services business that was ten times the average. The client was recently detained for providing falsified passports to illegal immigrants. Which predicate offenses could be considered in the SAR/STR? (Select Two.)
Answer : A, B
The correct answer is A and B because human smuggling/trafficking and terrorist financing are both predicate offenses for money laundering that could be related to the client's activities. Option C is incorrect because there is no indication of narcotics trafficking in the scenario. Option D is incorrect because there is no indication of antiques smuggling in the scenario. Option E is incorrect because there is no indication of tax evasion in the scenario.
Online payments from a customer's account to three foreign entities trigger an investigation. The investigator knows the funds originated from family real estate after an investment company approached the customer online. Funds were remitted for pre-lPO shares. Which should now occur in the investigation?
Answer : C
The correct answer is C because reviewing the structure of the transactions to the three entities can help the investigator to identify any red flags or indicators of fraud, such as unusual amounts, frequency, destinations, or beneficiaries. The other options are not as relevant or effective in this scenario. Option A is not necessary because the investigator already knows the source of funds for the customer. Option B is not advisable because contacting the customer directly may alert them to the investigation and compromise its integrity. Option D is not helpful because inspecting electronic banking login records does not provide any information about the nature or purpose of the transactions.
Advanced CAMS-FCI Study Guide, page 281
Financial Crime Typologies - Intermediate Certificate Course, Module 32
Which actions should financial institutions perform to ensure proper data governance? (Select Three.)
Answer : A, B, D
Financial institutions should perform the following actions to ensure proper data governance:
Establish an appropriate data management method for collecting and storing information. This is important to ensure that the data is consistent, reliable, and accessible for various purposes, such as risk assessment, compliance reporting, and customer service. Data management methods may include defining data standards, policies, and procedures; implementing data quality controls and validation checks; and using appropriate data storage systems and formats.
Ensure the accuracy of customer identification records and transaction records and appropriately manage data as a prerequisite for the effective use of IT systems. This is important to comply with the anti-money laundering and counter-terrorist financing (AML/CFT) requirements, such as customer due diligence, transaction monitoring, and suspicious activity reporting. Accurate and complete customer and transaction data also enables financial institutions to use IT systems more effectively for data analysis, risk management, and decision making.
Periodically validate integrity and accuracy of information used for IT systems such as customer information, customer identification records, and transaction records. This is important to ensure that the data remains up-to-date, relevant, and reliable over time. Data validation may include verifying the source and quality of the data; identifying and correcting any errors or inconsistencies; and updating or deleting any obsolete or redundant data.
Data Governance for Financial Institutions - Capgemini
Small and Medium-Sized Deposit-Taking Institutions (SMSBs) Capital and Liquidity Requirements - OSFI
Which most likely indicates that a business email compromise attack has occurred?
Answer : A
When writing or reviewing a SAR/STR, it is important to ensure that the narrative is kept to the point; easy to read; and addresses the who, what, when, where, why, and how. This is because the narrative is the most crucial part of the SAR/STR, as it provides a clear and concise summary of the suspicious activity or transaction that triggered the report. The narrative should include all the relevant information that would help law enforcement or regulators to understand the nature and context of the activity or transaction, such as123:
The who: The names, addresses, account numbers, and other identifying information of the parties involved in the activity or transaction, such as customers, beneficiaries, intermediaries, or third parties.
The what: The type, amount, frequency, and purpose of the activity or transaction, such as cash deposits, wire transfers, check payments, or purchases of goods or services.
The when: The date, time, and duration of the activity or transaction, and whether it was a one-time occurrence or part of a pattern or trend.
The where: The location or channel of the activity or transaction, such as branches, ATMs, online platforms, or mobile applications.
The why: The reason or rationale for the activity or transaction, and why it was considered suspicious or unusual based on the customer's profile, behavior, or expected activity.
The how: The method or mechanism of the activity or transaction, such as cash, check, debit card, credit card, cryptocurrency, or prepaid card.
How to write the perfect ''Suspicious Activity Reports'' (SAR)? | i-AML
Writing for Prosecution: Best Practices For Composing SAR Narratives That Assist Prosecutors | ACAMS
SAR Writing Examples and Proper Formatting: Write for Your Reader - Alessa
A financial institution
Answer : C
The correct answer is C because the FI is unable to obtain evidence of required licensing or registration despite suspicion of money transmitting, which is a red flag for money laundering and a violation of federal and state laws. Option A is incorrect because making several deposits in one month that appear to exceed their expected monthly income might not be indicative of suspicious activity, depending on the customer's profile and source of funds. Option B is incorrect because receiving a large, one-time wire from a law firm might not be indicative of suspicious activity, depending on the customer's relationship with the law firm and the purpose of the wire. Option D is incorrect because discovering a large number of securities transactions that appear to be related to day trading might not be indicative of suspicious activity, depending on the customer's investment strategy and risk tolerance.
An analyst reviews an alert for high volume Automated Clearing House (ACH) activity in an account. The analyst's initial research finds the account is for a commercial daycare account that receives high volumes of large government-funded ACH transactions to support the programs. The account activity consists of checks (cheques) made payable to individual names in varying dollar amounts. One check indicates rent to another business.
An Internet search finds that the daycare company owner has previous government-issued violations for safety and classroom size needs, such as not having enough chairs and tables per enrollee. These violations were issued to a different daycare name.
Simultaneous to this investigation, another analyst sends an email about negative news articles referencing local child/adult daycare companies misusing governmental grants. This prompts the financial institution (Fl) to search all businesses for names containing daycare' or care*. Text searches return a number of facilities as customers at the Fl and detects that three of these businesses have a similar transaction flow of high volume government ACH funding with little to no daycare expenses.
The analyst determines that site visits should be conducted for the three daycare businesses. Which observations at the on-site visits would justify writing a SAR/STR? (Select Three.)
Answer : A, C, F
The observations at the on-site visits that would justify writing a SAR/STR are signs of severe wear and poor maintenance at the site (A), lights turned off at the site during operational hours , and a full parking lot of cars with no staff at the site (F). These observations suggest that the daycare businesses are not operating legitimately or providing adequate services to their customers, and that they may be misusing governmental grants or laundering money through their accounts. These observations are consistent with some of the red flags for fraud identified by ACAMS2, such as:
Inadequate facilities or equipment for the type of business
Lack of visible activity or customers at the business location
Discrepancy between reported income and expenses
Unusual volume or frequency of transactions
The other observations are not as relevant or indicative of fraud as options A, C, and F. A site located in a commercial building (B) could be a normal or legitimate choice for a daycare business, depending on its size, location, and availability. Visible attendance with children being dropped off by parents (D) could show that the daycare business is providing genuine services to its customers, although it does not rule out possible fraud or money laundering. Visible signage indicating the purpose of building (E) could also show that the daycare business is transparent and legitimate, although it does not guarantee its quality or compliance.
Each month the automated transaction monitoring system generates alerts based on predetermined scenarios. An alert was generated in relation to the account activity of ABC Foundation. Below is the transaction history for ABC Foundation (dates are in DD/MM/YYYY format).

The relationship manager for ABC Foundation contacts the client to request more information on the beneficiary of the transfer in Turkey. ABC Foundation advises that this is a not-for-profit charity group called 'Forever Free." Which is the best next step in the investigation?
Answer : C
The best next step in the investigation is to check the jurisdiction's list of known charities with connections to terrorist activity . This is because the FI has a responsibility to verify the legitimacy and reputation of the beneficiary of the funds, especially if it is a charity or non-profit organization that operates in a high-risk jurisdiction or sector. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should conduct enhanced due diligence on all parties involved in the investigation, including checking various sources of information, such as watch lists, sanctions lists, negative news, and official registries'' (p. 24). The FI should also check if the beneficiary is consistent with the customer's profile and expected activity.
The other options are not as appropriate or effective as option C. Contacting the financial institution in Turkey that has a relationship with Forever Free and advising them of the investigation (A) could violate confidentiality or data protection laws, as well as compromise the investigation or alert the customer or beneficiary of the suspicion. Updating the customer profile to include Forever Free as the recipient of the funds (B) could be premature or inaccurate, as it does not verify the nature and purpose of the transfer or the identity and legitimacy of the beneficiary. Filing a SAR/STR with the new information learned about the beneficiary (D) could also be premature or incomplete, as it does not confirm if there is any suspicious or criminal activity involved in the transfer or if there are any other red flags or indicators.
A bank investigator notices an account receiving multiple deposits from the same employer under different employees' names. A cash withdrawal occurs one day after each deposit. The outcome of this investigation will likely uncover which crime typology?
Answer : D
The correct answer is A because this scenario describes a possible case of human trafficking, which is a crime where people are exploited for labor or sexual services against their will. Human traffickers may use bank accounts to launder their proceeds and pay their victims, and they may use fake or stolen identities to avoid detection. The other options are not likely because they do not explain why multiple deposits from the same employer under different employees' names would occur, nor why cash withdrawals would follow each deposit.
An investigator at a corporate bank is conducting transaction monitoring alerts clearance.
KYC profile background: An entity customer, doing business offshore in Hong Kong, established a banking business relationship with the bank since 2017 for deposit and loan purposes. It acts as an offshore investment holding company. The customer declared that the ongoing source of funds to this account comes from group-related companies.
* X is the UBO. and owns 97% shares of this entity customer;
* Y is is the authorized signatory of this entity customer. This entity customer was previously the subject of a SAR/STR.
KYC PROFILE
Customer Name: AAA International Company. Ltd
Customer ID: 123456
Account Opened: June 2017
Last KYC review date: 15 Nov 2020
Country and Year of Incorporation: The British Virgin Islands, May 2017
AML risk level: High
Account opening and purpose: Deposits, Loans, and Trade Finance
Anticipated account activities: 1 to 5 transactions per year and around 1 million per
transaction amount
During the investigation, the investigator reviewed remittance transactions activities for the period from Jul 2019 to Sep 2021 and noted the following transactions pattern:
TRANSACTION JOURNAL
Review dates: from July 2019 to Sept 2021
For Hong Kong Dollars (HKD) currency:
Incoming transactions: 2 inward remittances of around 1.88 million HKD in total from
different third parties
Outgoing transactions: 24 outward remittances of around 9 4 million HKD in total to
different third parties
For United States Dollars (USD) currency:
Incoming transactions: 13 inward remittances of around 3.3 million USD in total from
different third parties
Outgoing transactions: 10 outward remittances of around 9.4 million USD in total to
different third parties.
RFI Information and Supporting documents:
According to the RFI reply received on 26 May 2021, the customer provided the bank
with the information below:
1J All incoming funds received in HKD & USD currencies were monies lent from non-customers of the bank. Copies of loan agreements had been provided as supporting documents. All of the loan agreements were in the same format and all the lenders are engaged in trading business.
2) Some loan agreements were signed among four parties, including among lenders. borrower (the bank's customer), guarantor, and guardian with supplemental agreements, which stated that the customer, as a borrower, who failed to repay a loan
Which suspicious activity should the investigator identify during the review of the loan agreements?
Answer : D
The correct answer is D because it is a suspicious activity that Y, who is the authorized signatory of the customer, also signed on behalf of the lenders. This indicates a possible conflict of interest, collusion, or fraud. The other options are not suspicious activities based on the information given.
According to the Financial Action Task Force, as part of their risk assessment, which are important data and information that a Trust and Company Service Provider must understand when establishing and administering a trust? (Select Two.)
Answer : A, D
Here is the exact information from the Financial Action Task Force (FATF) Guidance for a Risk-Based Approach for Trust and Company Service Providers:
'Understanding the management and ownership structure of a trust is crucial in assessing the ML/TF risk it poses. This includes the identity of all settlors, trustees and beneficiaries, and their respective roles and responsibilities, as well as the nature and purpose of the trust.'
'TCSPs should obtain and maintain up-to-date information on the purpose and intended nature of the business relationship, the source of funds and wealth, and where relevant, the source of funds or wealth of the settlor and beneficiaries.'
Based on this information, the correct answers are A and D. Trust and Company Service Providers must understand the responsibility and authority in the structure, as well as the general purpose behind the structure in order to assess the overall risk of the trust and ensure that any transactions with the trust are legitimate.
A financial institution (Fl) receives an urgent request for information from the financial intelligence unit (Fl country. According to FATF recommendations, which is the best action for the FI to take?
Answer : B
The correct answer is B because the FATF recommendations state that financial institutions should provide feedback to the FIU as quickly as possible, especially in cases involving the financing of terrorism that could imply an imminent threat to the country. Option A is incorrect because requesting an official court subpoena would delay the response and might not be necessary for the FIU to access the information. Option C is incorrect because establishing a committee would also delay the response and might not be in compliance with the FIU's request. Option D is incorrect because informing the public relations department is irrelevant to the question and might compromise the confidentiality of the investigation.
An analyst reviews an alert for high volume Automated Clearing House (ACH) activity in an account. The analyst's initial research finds the account is for a commercial daycare account that receives high volumes of large government-funded ACH transactions to support the programs. The account activity consists of checks (cheques) made payable to individual names in varying dollar amounts. One check indicates rent to another business.
An Internet search finds that the daycare company owner has previous government-issued violations for safety and classroom size needs, such as not having enough chairs and tables per enrollee. These violations were issued to a different daycare name.
Simultaneous to this investigation, another analyst sends an email about negative news articles referencing local child/adult daycare companies misusing governmental grants. This prompts the financial institution (Fl) to search all businesses for names containing daycare' or "care*. Text searches return a number of facilities as customers at the Fl and detects that three of these businesses have a similar transaction flow of high volume government ACH funding with little to no daycare expenses.
During the investigation, new suspicious patterns and trends related to check cashing are observed. The Fl decides to conduct a training to ensure that 1) the AML program is robust and 2) the training program is relevant and appropriate. Which parties should be trained on emerging trends and red flags? (Select Two.)
Answer : A, C
The parties that should be trained on emerging trends and red flags are the financial crimes investigation unit (A) and the branch personnel . These parties are directly involved in detecting, investigating, and reporting suspicious activity related to check cashing or other types of fraud or money laundering. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should provide regular and relevant training to its staff on the AML program, policies, procedures, and systems, as well as on the latest typologies, indicators, and best practices for financial crimes investigations'' (p. 36). The FI should also ''ensure that the training is tailored to the specific roles and responsibilities of the staff, and that it is updated and evaluated periodically'' (p. 36).
The other parties are not as relevant or appropriate as options A and C. The loan department (B) is not directly related to check cashing or other types of fraud or money laundering, although it may have some exposure to credit or identity fraud. The senior management (D) is responsible for overseeing and supporting the AML program, but not for conducting or supervising financial crimes investigations. The board of directors (E) is responsible for approving and reviewing the AML program, but not for implementing or monitoring it.
A client with many personal and business deposits with the financial institution (Fl) seeks a business loan. The client wants to guarantee the loan with a trust for which they are the beneficiary.
An investigator examines the trust. The trust has many layers, including shell companies in known tax havens. The client's ultimate beneficial ownership claim cannot be validated, and the loan is denied.
Two months later, the Fl receives a law enforcement (LE) request on one of the client's business accounts. While reviewing the business account, the Fl receives another LE request on the same account from another agency. The requested information is shared.
Three months later, a branch manager receives a request to open a business deposit account related to a complex trust. The manager forwarded the request because of the complexity. The trust was the same as the previously examined trust, but the request came from a different client. The second client also has many accounts with the Fl. Further inspection finds links between the second client and the Paradise Papers. The Papers state the client led illegal activities and committed tax evasion.
What steps should the investigator perform in reference to the first client's existing accounts? (Select Three.)
Answer : A, D, F
The investigator should review all client-signed documents relating to all accounts (A) to check for any discrepancies or red flags. The investigator should also perform secondary scans of the client's other owners/authorized signers (D) to identify any possible connections or associations with the second client or the Paradise Papers. Additionally, the investigator should prepare a relationship flow chart of all existing accounts (F) to better understand the client's activities and patterns. These steps are consistent with the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, which states that investigators should ''review all relevant documentation, including account opening documents, transaction records, and customer correspondence'' (p. 23), ''conduct enhanced due diligence on all parties involved in the investigation'' (p. 24), and ''use data visualization tools to map out complex relationships and transactions'' (p. 25).
During transaction monitoring. Bank A learns that one of their customers. Med Supplies 123, is attempting to make a payment via wire totaling 382,500 USD to PPE Business LLC located in Mexico to purchase a large order of personal protective equipment. specifically surgical masks and face shields. Upon further verification. Bank A decides to escalate and refers the case to investigators.
Bank A notes that, days prior to the above transaction, the same customer went to a Bank A location to wire 1,215,280 USD to Breath Well LTD located in Singapore. Breath Well was acting as an intermediary to purchase both 3-ply surgical masks and face shields from Chin
a. Bank A decided not to complete the transaction due to concerns with the involved supplier in China. Moreover, the customer is attempting to send a third wire in the amount of 350,000 USD for the purchase of these items, this time using a different vendor in China. The investigator must determine next steps in the investigation and what actions, if any. should be taken against relevant parties.
Upon further investigation. Bank As investigator learns that both the Mexico- and Singapore-based companies are linked to the alleged suppliers in China. Which additional indicators would the investigator need to identify to determine if this fits a fentanyl (drug) trafficking typology? (Select Two.)
Answer : A, C
An investigator is reviewing an alert for unusual activity. System scanning detected a text string within a company customer's account transactions that indicates the account may have been used for a drug or drug paraphernalia purchase. Based on the KYC profile, the investigator determines the customer's company name and business type are marketed as a gardening supplies company. The investigator reviews the account activity and notes an online purchase transaction that leads the investigator to a website that sells various strains of marijuan
a. Additional account review detects cash deposits into the account at the branch teller lines, so the investigator reaches out to the teller staff regarding the transactions. The teller staff member reports that the business customers have frequently deposited cash in lower amounts. The teller, without prompting, adds that one of the transactors would occasionally smell of a distinct scent of marijuana smoke.
Which information should be included in the SAR/STR?
Answer : C
The SAR/STR should include any information that is relevant to the suspicious activity, such as the customer information, the transaction details, and any other indicators of potential money laundering or criminal activity. The fact that one of the transactors occasionally smelled of marijuana smoke is an indicator that the customer may be involved in the illicit drug trade, which is a predicate offense for money laundering. Therefore, this information should be included in the SAR/STR. Reference: Advanced CAMS-FCI Study Guide, page 25.
A national financial intelligence unit (FIU) is undertaking the country risk assessment for the financing of the proliferation of weapons of mass destruction (WMD). The evaluation involves determining the exposure that financial institutions (FIs) have to operations that evade sanctions. Which should be performed by the FIU to assess proliferation financing risk? (Select Two.)
Answer : B, D
The FIU should cross-reference the databases of international commerce/logistics transactions between the country and WMD proliferation sanctioned states with the corresponding international financial operations of those transactions, as this would help identify any discrepancies or anomalies that could indicate sanctions evasion. The FIU should also evaluate a sample of the amount of false-positive and false-negative alerts that FIs have regarding proliferation sanctions evasion to determine root causes of non-detection, such as inadequate screening systems, lack of training, or human error. These actions would help the FIU assess the proliferation financing risk and provide feedback and guidance to FIs on how to improve their detection and prevention capabilities.
During transaction monitoring. Bank A learns that one of its customers. Med Supplies 123, is attempting to make a payment via wire totaling 382.500 USD to PPE Business LLC located in Mexico to purchase a large order of personal protective equipment. specifically surgical masks and face shields. Upon further verification. Bank A decides to escalate and refers the case to investigators.
Bank A notes that days prior to the above transaction, the same customer went to a Bank A location to wire 1,215,280 USD to Breath Well LTD located in Singapore. Breath Well was acting as an intermediary to purchase both 3-ply surgical masks and face shields from Chin
a. Bank A decided not to complete the transaction due to concerns with the involved supplier in China. Moreover, the customer is attempting to send a third wire in the amount of 350,000 USD for the purchase of these items, this time using a different vendor in China. The investigator must determine the next steps in the investigation and what actions, if any. should be taken against relevant parties.
The investigator is gathering more information to determine if a SAR/STR filing is needed. Which steps are the correct ways of collecting the additional information? (Select Two.)
Answer : A, D
The correct answer is A and C because these indicators suggest that the customer is using fraudulent documents and misrepresenting the goods to conceal the illicit nature of the transactions. Fentanyl traffickers often use front companies and falsified invoices to disguise their shipments as legitimate products, such as medical supplies or chemicals. Reviewing the invoices and transportation documents, as well as the FDA product certifications, can help to identify discrepancies or anomalies that indicate fraud or deception.
SAR/STR NARRATIVE
A SAR/STR has been submitted on five transactions conducted on the correspondent banking relationship with ABC Bank.
Client Information:
Remitter information: DEF Oil Resource Ltd. is the oldest member of the DEF Group. It was founded in 1977 as a general trading business with a primary focus on exports from Africa and North Americ
a. The group has business activities that span the entire energy value chain. Their core field of endeavor is centered within the oil and gas industry and its associated sub-sectors.
Beneficiary Information:
As per the response received from ABC Bank, it was determined that the beneficiaries are related to DEF Oil Resource Ltd. These were created by DEF Oil Resource Ltd. to purchase property in a foreign country on behalf of their senior management as part of a bonus scheme. The purpose behind this payment was for the purchase of property in another country.
Payment Reference:
ABCXXXXX31PZFG2H
ABCXXXXXX51PQGEH
ABCXXXXXX214QWVG
ABCXXXXXX41PSXA2
ABCXXXXXX815QWS3
Concerns:
* We are unsure about the country of incorporation of the beneficiaries.
* We are concerned about the transactional activity since the payment made towards entities (conducted on behalf of individuals) appears to be possible tax evasion.
* There appears to be an attempt to conceal the identity of individuals (senior management), which again raises concerns about the source of funds.
* Referring to the response received from ABC Bank, we are unclear about the ultimate beneficiary of funds.
* The remitter is involved in a high-risk business, (i.e., oil and crude products trading), and the beneficiary is involved in real estate business which again poses a higher risk.
While reviewing the account activity, it is noted that several transfers are sent to a company located in an offshore jurisdiction. Which step should the investigator take next?
Answer : C
The best step for the investigator to take next is to request information about the beneficiaries related to the company. This will help to identify the ultimate beneficial owners of the funds and the purpose of the transactions. Requesting information from the company or filing a SAR/STR to the FIU where the company is located may not be feasible or effective, as the company may not cooperate or the FIU may not have jurisdiction over the offshore entity. Conducting an open-source search may provide some information about the ownership and registration of the company, but it may not be sufficient or reliable to determine the nature and legitimacy of the transactions.
SAR Narrative Guidance Package
Best Practices for Drafting an STR or SAR
Which pattern of activity most strongly indicates an individual is a foreign terrorist fighter?
Answer : B
The pattern of activity that most strongly indicates an individual is a foreign terrorist fighter is a large cash advance on a credit card and purchases at travel and sporting goods websites. This is because this pattern may suggest that the individual is preparing to travel to a conflict zone and purchase equipment or supplies for terrorist activities. According to the United Nations Office on Drugs and Crime, some of the indicators of foreign terrorist fighters include1:
Sudden or increased financial activity, such as cash withdrawals, transfers, or deposits, especially in large amounts or involving foreign currency or locations.
Purchases of travel-related items, such as airline tickets, passports, visas, luggage, or clothing, especially to or from high-risk destinations or transit hubs.
Purchases of items that could be used for terrorist purposes, such as weapons, explosives, chemicals, communication devices, or survival gear.
Changes in behavior, such as expressing radical views, cutting ties with family or friends, joining extremist groups, or displaying signs of emotional distress.
Foreign Terrorist Fighters - United Nations Office on Drugs and Crime
A U.S. financial institution (Fl) receives a grand jury subpoena for a corporate client's account. The Fl should:
Answer : B
The Fl should review the corporate account's activity and transactions. This is because a grand jury subpoena is a legal request for information or testimony that may be used in a criminal investigation or prosecution. The Fl should review the account for any suspicious or unusual activity that may be related to the subpoena or indicate money laundering, terrorist financing, or other financial crimes. The Fl should also document its review and retain any relevant records.
An investigator is reviewing an alert for unusual activity. System scanning detected a text string within a company customer's account transactions that indicates the account may have been used for a drug or drug paraphernalia purchase Based on the KYC profile, the investigator determines the customer's company name and business type are marketed as a gardening supplies company. The investigator reviews the account activity and notes an online purchase transaction that leads the investigator to a website that sells various strains of marijuan
a. Additional account review detects cash deposits into the account at the branch teller lines, so the investigator reaches out to the teller staff regarding the transactions. The teller staff member reports that the business customers have frequently deposited cash in lower amounts. The teller, without prompting, adds that one of the transactors would occasionally smell of a distinct scent of marijuana smoke.
Which are the best next steps for the investigator to take? (Select Three.)
Answer : A, C, E
The best next steps for the investigator to take are:
A . Review the customer's transaction history. This can help the investigator identify any patterns or anomalies in the customer's account activity, such as changes in transaction volume, frequency, amount, source, destination, purpose, etc. The investigator can also compare the customer's transaction history with their KYC profile and risk rating to assess if there are any discrepancies or inconsistencies.
C . Check internal KYC information. This can help the investigator verify the customer's identity, business nature, ownership structure, expected activity, source of funds, etc. The investigator can also update or enhance the customer's KYC information based on any new or relevant information obtained from other sources.
E Conduct adverse media and open-source searches on the customer's background. This can help the investigator find out if there is any negative or adverse information about the customer in public data sources, such as news articles, social media posts, blogs, forums, etc. Adverse media and open-source searches can also provide additional context and insight into the customer's reputation, behavior, associations, etc. The other options are incorrect because:
B . Request information from the internet service provider who hosts the website is not feasible, as it may require a legal process or a court order to obtain such information. Moreover, the internet service provider may not have or disclose any useful information about the website or its owner.
D . Research other customer accounts for transactions to the same website is not relevant, as it may not provide any meaningful information about the customer under investigation. Furthermore, it may violate the privacy and confidentiality of other customers who are not related to the investigation.
F . Identify if the customer has opened accounts in an urban city area is not helpful, as it may not have any bearing on the customer's involvement in a drug or drug paraphernalia purchase. Additionally, it may not be possible to access or verify such information without the customer's consent or authorization.
Advanced CAMS-FCI Certification | ACAMS, Section 2: Investigating Financial Crimes, page 11
Leading Complex Investigations Certificate | ACAMS, Module 3: Conducting Research and Analysis, page 6
Adverse Media Screening - Using AI to Mitigate Risk
Legal requirements for adverse media screening - Thomson Reuters
Electronic client due diligence | Ethics helpsheets | ICAEW
6AMLD & FATF: Where Adverse Media Screening Fits In
Free Adverse Media Check | NameScan
Law enforcement (LE) suspects human trafficking to occur during a major spotting event. LE officers asked several financial institutions (FIs) to monitor financial transactions occurring before, during, and after the event.
An investigator identified a pattern linked to a business. The business* account received multiple even dollar deposits between midnight and 4:00 AM. They occurred each day for several days prior to the date of the sporting event. Also, large cash deposits, typically between 2,000 USD and 3.000 USD. made by a person to the business' account occurred in many branches in the days after the sports event
There was little information about the company. The company did not have any history of employee payroll expenses or paying taxes. Expenses from the business account included air travel and hotel expenses. Searches about the person making cash deposits showed little. An online social media platform webpage with the individual's name showed ads for dates" and "companionship."
If the investigator uncovers evidence that foreign nationals are involved in this activity, they should also note the possible presence of:
Answer : D
If the investigator uncovers evidence that foreign nationals are involved in this activity, they should also note the possible presence of human smuggling (D). This is because human smuggling is the illegal movement of people across borders, often facilitated by criminal networks that exploit vulnerable migrants. According to the FATF and Egmont Group report on Financial Flows from Human Trafficking2, ''human smuggling can be closely linked to human trafficking, as smuggled migrants may become victims of trafficking along their journey or at their destination'' (p. 9). The report also states that some indicators of human smuggling are similar to those of human trafficking, such as:
Frequent cash deposits or withdrawals in different locations
Use of false or fraudulent identification documents
Expenses related to travel and accommodation
Involvement in online platforms that advertise sexual services
The other options are not as relevant or specific as option D. Tax fraud (A) is the evasion of taxes by individuals or businesses, which may or may not be related to human trafficking or smuggling. Black market peso exchange (B) is a money laundering scheme that involves exchanging illicit proceeds in one currency for another currency at a discounted rate, which is more commonly associated with drug trafficking or trade-based laundering. Trade-based laundering is the manipulation of trade transactions to disguise the origin and ownership of illicit funds, which is also more likely to be linked to drug trafficking or other types of fraud.
Why is a more robust supervisory approach needed by regulators when overseeing small- and medium-sized money service businesses (MSBs) compared to larger MSBs for combatting terrorist financing (TF)?
Answer : D
A more robust supervisory approach is needed by regulators when overseeing small- and medium-sized MSBs compared to larger MSBs for combatting TF because small- and medium-sized MSBs are more at risk of allowing transactions linked to TF due to the lack of skilled compliance resources. Small- and medium-sized MSBs may face challenges in implementing effective AML/CFT controls, such as conducting risk assessments, applying customer due diligence measures, monitoring transactions, detecting suspicious activities, and reporting to the authorities. They may also have limited access to training, guidance, and tools to enhance their compliance capabilities. Therefore, regulators need to provide more supervision and support to small- and medium-sized MSBs to ensure that they comply with the AML/CFT requirements and mitigate the TF risks.
Sustainable Growth for Small and Medium-Sized Enterprises ... - MDPI
Lessons on Resilience for Small and Midsize Businesses - HBR
Due to an ever-diversifying business model and multi-jurisdictional footprint, a casino has decided to outsource the source of funds and wealth checks to a third-party provider. Why is it important for the casino to maintain control of the output from the provider?
Answer : C
The reason why it is important for the casino to maintain control of the output from the provider is that the casino maintains ultimate responsibility for this activity and should maintain control to avoid non-compliance . This is because the casino is accountable for its own AML/CFT obligations and cannot delegate or outsource them to a third-party provider. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should ensure that it has adequate oversight and control over any third-party providers that it engages for AML/CFT purposes, such as conducting due diligence, verifying information, or monitoring transactions'' (p. 25). The FI should also ''review and evaluate the performance and quality of the third-party providers on a regular basis, and address any issues or gaps that may arise'' (p. 25).
The other options are not as relevant or accurate as option C. The clients of the casino prefer to know that the casino is keeping their information secure when being held by a third-party (A) is not a reason why the casino should maintain control of the output from the provider, but rather a customer expectation or preference. As with all third-party relationships, proper control must be maintained to ensure profitability (B) is not a reason why the casino should maintain control of the output from the provider, but rather a general business principle or objective. Other casinos are frequently looking to reduce costs and share ideas, so if this relationship is successful, the model can be used by other businesses (D) is not a reason why the casino should maintain control of the output from the provider, but rather a potential benefit or outcome.
Which scenarios are common to money laundering through online marketplaces and trade-based money laundering? (Select Two.)
Answer : A, C
Money laundering through online marketplaces and trade-based money laundering both involve the manipulation of the value or quantity of goods to disguise the illicit origin of funds. Over-valuation of the stated price of goods and no evidence of delivery of goods or shipping expenses are two common indicators of such schemes. The other options are not specific to these methods of money laundering.
An unusual spike in activity has occurred for a customer who is a supplier of aviation parts to a military force. The customer's current line of business is consistent with the banks records, and no adverse media hits have occurred. Which is the best reason for an investigator to continue an investigation?
Answer : A
The best reason for an investigator to continue an investigation is that the end-user is a military force. This is because supplying aviation parts to a military force may involve sanctions risk, export control risk, or human rights risk, depending on the nature and destination of the military force. The investigator should conduct further due diligence to determine if the customer is complying with the relevant laws and regulations, and if the bank is exposed to any reputational or legal risk by providing services to the customer.
Former Airline Employee and Aircraft Part Sellers Charged in Kickback ...
Former Airline Employee and Aircraft Part Sellers Charged in Kickback ...
Former airline employee and aircraft part sellers charged in kickback ...
Which action is part of the enhanced due diligence process?
Answer : A
One of the actions that is part of the enhanced due diligence process is collecting beneficial ownership details regarding the client's account. This is important to identify the natural persons who ultimately own or control the client, and to assess the potential risks associated with them. According to the Financial Action Task Force (FATF), beneficial ownership information should include1:
The name, nationality, and country of residence of each beneficial owner.
The date of birth or incorporation of each beneficial owner.
The nature and extent of the beneficial interest held by each beneficial owner.
The means by which the beneficial ownership or control is exercised.
FATF Guidance on Transparency and Beneficial Ownership
A bank investigator notices an account receiving multiple deposits from the same employer under different employees' names. A cash withdrawal occurs one day after each deposit. The outcome of this investigation will likely uncover which crime typology?
Answer : D
The correct answer is A because this scenario describes a possible case of human trafficking, which is a crime where people are exploited for labor or sexual services against their will. Human traffickers may use bank accounts to launder their proceeds and pay their victims, and they may use fake or stolen identities to avoid detection. The other options are not likely because they do not explain why multiple deposits from the same employer under different employees' names would occur, nor why cash withdrawals would follow each deposit.
An analyst reviews an alert for high volume Automated Clearing House (ACH) activity in an account. The analyst's initial research finds the account is for a commercial daycare account that receives high volumes of large government-funded ACH transactions to support the programs. The account activity consists of checks (cheques) made payable to individual names in varying dollar amounts. One check indicates rent to another business.
An Internet search finds that the daycare company owner has previous government-issued violations for safety and classroom size needs, such as not having enough chairs and tables per enrollee. These violations were issued to a different daycare name.
Simultaneous to this investigation, another analyst sends an email about negative news articles referencing local child/adult daycare companies misusing governmental grants. This prompts the financial institution (Fl) to search all businesses for names containing daycare' or "care*. Text searches return a number of facilities as customers at the Fl and detects that three of these businesses have a similar transaction flow of high volume government ACH funding with little to no daycare expenses.
During the investigation, new suspicious patterns and trends related to check cashing are observed. The Fl decides to conduct a training to ensure that 1) the AML program is robust and 2) the training program is relevant and appropriate. Which parties should be trained on emerging trends and red flags? (Select Two.)
Answer : A, C
The parties that should be trained on emerging trends and red flags are the financial crimes investigation unit (A) and the branch personnel . These parties are directly involved in detecting, investigating, and reporting suspicious activity related to check cashing or other types of fraud or money laundering. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should provide regular and relevant training to its staff on the AML program, policies, procedures, and systems, as well as on the latest typologies, indicators, and best practices for financial crimes investigations'' (p. 36). The FI should also ''ensure that the training is tailored to the specific roles and responsibilities of the staff, and that it is updated and evaluated periodically'' (p. 36).
The other parties are not as relevant or appropriate as options A and C. The loan department (B) is not directly related to check cashing or other types of fraud or money laundering, although it may have some exposure to credit or identity fraud. The senior management (D) is responsible for overseeing and supporting the AML program, but not for conducting or supervising financial crimes investigations. The board of directors (E) is responsible for approving and reviewing the AML program, but not for implementing or monitoring it.
A client with many personal and business deposits with the financial institution (Fl) seeks a business loan. The client wants to guarantee the loan with a trust for which they are the beneficiary.
An investigator examines the trust. The trust has many layers, including shell companies in known tax havens. The client's ultimate beneficial ownership claim cannot be validated, and the loan is denied.
Two months later, the Fl receives a law enforcement (LE) request on one of the client's business accounts. While reviewing the business account, the Fl receives another LE request on the same account from another agency. The requested information is shared.
Three months later, a branch manager receives a request to open a business deposit account related to a complex trust. The manager forwarded the request because of the complexity. The trust was the same as the previously examined trust, but the request came from a different client. The second client also has many accounts with the Fl. Further inspection finds links between the second client and the Paradise Papers. The Papers state the client led illegal activities and committed tax evasion.
What steps should the investigator take to review the accounts held by the second client who is listed in the Paradise Papers? (Select Two.)
Answer : A, D, D
The investigator should recommend a SAR/STR be filed regarding the second client's use of a questionable trust to open an account, as this could indicate an attempt to conceal the source and ownership of funds, and to evade taxes and sanctions. The investigator should also monitor all accounts and entities related to the second client, as they may be involved in illegal activities or pose a high risk to the FI. The investigator should not review all accounts that have opened trust accounts, as this would be too broad and inefficient. The investigator should not inform FI management of deficiencies in their AML program, as this is not their role or responsibility. The investigator should not inform FI management of the start of a serious risk-based investigation, as this may compromise the confidentiality and integrity of the investigation.
When crafting internal procedures on writing and submitting SARs/STRs, one should:
Answer : B
When writing and submitting SARs/STRs, one should consider the guidelines issued by the national financial intelligence unit (FIU) and local regulator and incorporate any country-specific requirements. This ensures that the reports are compliant with the relevant laws and regulations and provide useful information to the authorities. The other options are either incorrect or not best practices.
Law enforcement (LE) suspects human trafficking to occur during a major spotting event. LE officers asked several financial institutions (FIs) to monitor financial transactions occurring before, during, and after the event.
An investigator identified a pattern linked to a business. The business* account received multiple even dollar deposits between midnight and 4:00 AM. They occurred each day for several days prior to the date of the sporting event. Also, large cash deposits, typically between 2,000 USD and 3.000 USD. made by a person to the business' account occurred in many branches in the days alter the sports event.
There was little information about the company. The company did not have any history of employee payroll expenses or paying taxes. Expenses from the business account included air travel and hotel expenses. Searches about the person making cash deposits showed little. An online social media platform webpage with the individual's name showed ads for dates" and "companionship."
Which fact should not be included in (he SAR/STR narrative?
Answer : B
The fact that should not be included in the SAR/STR narrative is the request by law enforcement (D). This is because the request by law enforcement is confidential and should not be disclosed to the customer or anyone else who is not authorized to know it. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should not include any reference to the LE request in the SAR/STR narrative, as this could compromise the LE investigation or alert the customer of the suspicion'' (p. 35). The FI should also not inform the customer of the LE request or delay filing the SAR/STR because of it.
The other facts should be included in the SAR/STR narrative, as they are relevant and indicative of human trafficking money laundering. The air travel and hotel expenses (A) show that the customer is involved in moving people across different locations, which could be a sign of human smuggling or trafficking. The time of the cash deposits (B) shows that the customer is receiving cash payments during unusual hours, which could be a sign of illicit activities or services. The sporting event shows that the customer is exploiting a high-demand situation for their business, which could be a sign of opportunistic or organized crime.
The investigative department of a financial institution (Fl) receives an internal escalation notice from the remittance department for a SWIFT message requesting a refund due to potential fraud. The notice indicates that a total of three international incoming remittances were transferred to a corporate customer from Country A, in the amount of approximately 5 million EUR for each. The first two incoming remittances had been exchanged into currency B and transferred out to Country B a few days ago. The third incoming remittance has been held by the remittance department.
As noted from the KYC profile, the corporate customer is working in the wood industry. with the last account review completed 3 months ago. Since the account's opening. there has been no history of a large amount of funds flowing through the account. The investigator conducts an Internet search and finds that the remitter is a food beverage company.
The same morning, the investigator receives a call from a financial intelligence unit (FIU) inquiring about the same incident. The FIU states that it will issue a warrant to freeze the account on the same day.
After further review, the decision is made that transactions appear suspicious. Which are the next steps the investigator should take? (Select Two.)
Answer : C, E
The correct answer is C and E. The investigator should provide additional information to the LE upon receiving a formal request, and gather all the information that would be useful for LE and recommend filing a SAR/STR. These steps are consistent with the best practices of conducting financial crime investigations and reporting suspicious activity. The investigator should not close the customer's accounts or the investigation, as this may interfere with the ongoing LE inquiry and violate the FI's policies and procedures. The investigator should also not contact local LE directly, as this may compromise the confidentiality of the investigation and the FIU's authority. Reference:
Advanced CAMS-FCI Study Guide, Chapter 4: Reporting Suspicious Activity, pages 40-411
Advanced CAMS-FCI Study Guide, Chapter 5: Governance of an AFC Investigations Unit, pages 48-491
Advanced CAMS-FCI Certification | ACAMS
A client with many personal and business deposits with the financial institution (Fl) seeks a business loan. The client wants to guarantee the loan with a trust for which they are the beneficiary.
An investigator examines the trust. The trust has many layers, including shell companies in known tax havens. The client's ultimate beneficial ownership claim cannot be validated, and the loan is denied.
Two months later, the Fl receives a law enforcement (LE) request on one of the client's business accounts. While reviewing the business account, the Fl receives another LE request on the same account from another agency. The requested information is shared.
Three months later, a branch manager receives a request to open a business deposit account related to a complex trust. The manager forwarded the request because of the complexity. The trust was the same as the previously examined trust, but the request came from a different client. The second client also has many accounts with the Fl. Further inspection finds links between the second client and the Paradise Papers. The Papers state the client led illegal activities and committed tax evasion.
What steps should the investigator perform in reference to the first client's existing accounts? (Select Three.)
Answer : A, D, F
The investigator should review all client-signed documents relating to all accounts (A) to check for any discrepancies or red flags. The investigator should also perform secondary scans of the client's other owners/authorized signers (D) to identify any possible connections or associations with the second client or the Paradise Papers. Additionally, the investigator should prepare a relationship flow chart of all existing accounts (F) to better understand the client's activities and patterns. These steps are consistent with the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, which states that investigators should ''review all relevant documentation, including account opening documents, transaction records, and customer correspondence'' (p. 23), ''conduct enhanced due diligence on all parties involved in the investigation'' (p. 24), and ''use data visualization tools to map out complex relationships and transactions'' (p. 25).
Law enforcement agents arrive at a broker-dealer's premises with a search warrant. In addition to cooperation with the warrant, which instructions should the person in charge of the broker-dealer provide to their employees?
Answer : A
The instruction that the person in charge of the broker-dealer should provide to their employees is to take notes on the questions and comments made by the agents (A). This is because taking notes can help the employees to recall and document what happened during the search warrant execution, which can be useful for legal or regulatory purposes. According to ACAMS3, ''the FI should instruct its staff to cooperate with LE agents during a search warrant execution, but also to take notes of what is being searched, seized, or asked by the agents'' (p. 35). The FI should also ''keep copies of any documents or records that are taken by LE agents'' (p. 35).
The other instructions are not correct. The person in charge of the broker-dealer should not instruct their employees to sign consent forms permitting the agents to search employees' offices (B), as this is unnecessary and potentially risky, as the agents already have a valid search warrant that authorizes them to search the premises. The person in charge of the broker-dealer should not instruct their employees to provide agents with unlimited access to customers' personal data , as this could violate privacy or data protection laws, as well as compromise customer trust and confidentiality. The person in charge of the broker-dealer should not instruct their employees to volunteer information not requested by the agents that they think may be useful (D), as this could interfere with the LE investigation or expose them to legal or regulatory risks.
Introduction to Transnational Organized Crime
ACAMS Law Enforcement and Financial Crimes Investigations eLearning Course Module
Law Enforcement Requests and Actions
During transaction monitoring. Bank A learns that one of their customers. Med Supplies 123, is attempting to make a payment via wire totaling 382,500 USD to PPE Business LLC located in Mexico to purchase a large order of personal protective equipment. specifically surgical masks and face shields. Upon further verification. Bank A decides to escalate and refers the case to investigators.
Bank A notes that, days prior to the above transaction, the same customer went to a Bank A location to wire 1,215,280 USD to Breath Well LTD located in Singapore. Breath Well was acting as an intermediary to purchase both 3-ply surgical masks and face shields from Chin
a. Bank A decided not to complete the transaction due to concerns with the involved supplier in China. Moreover, the customer is attempting to send a third wire in the amount of 350,000 USD for the purchase of these items, this time using a different vendor in China. The investigator must determine next steps in the investigation and what actions, if any. should be taken against relevant parties.
Upon further investigation. Bank As investigator learns that both the Mexico- and Singapore-based companies are linked to the alleged suppliers in China. Which additional indicators would the investigator need to identify to determine if this fits a fentanyl (drug) trafficking typology? (Select Two.)
Answer : A, C
A criminal is engaged in chain hopping while trying to launder ransomware payments. The criminal will likely:
Answer : B
Chain hopping is a technique used by criminals to obscure the traceability of cryptocurrency transactions by converting the funds to a different type of cryptocurrency, often using multiple exchanges or platforms. The other options are not related to chain hopping. Reference: Advanced CAMS-FCI Study Guide, page 38.
Why is a more robust supervisory approach needed by regulators when overseeing small- and medium-sized money service businesses (MSBs) compared to larger MSBs for combatting terrorist financing (TF)?
Answer : D
A more robust supervisory approach is needed by regulators when overseeing small- and medium-sized MSBs compared to larger MSBs for combatting TF because small- and medium-sized MSBs are more at risk of allowing transactions linked to TF due to the lack of skilled compliance resources. Small- and medium-sized MSBs may face challenges in implementing effective AML/CFT controls, such as conducting risk assessments, applying customer due diligence measures, monitoring transactions, detecting suspicious activities, and reporting to the authorities. They may also have limited access to training, guidance, and tools to enhance their compliance capabilities. Therefore, regulators need to provide more supervision and support to small- and medium-sized MSBs to ensure that they comply with the AML/CFT requirements and mitigate the TF risks.
Sustainable Growth for Small and Medium-Sized Enterprises ... - MDPI
Lessons on Resilience for Small and Midsize Businesses - HBR
Which might suggest misuse of crowdfunding resources by a terrorist?
Answer : D
The purchase of airplane tickets after receiving multiple small deposits from a crowdfunding platform might suggest that the funds are being used to facilitate travel for terrorist purposes. The other options are not necessarily indicative of terrorist financing, as they could be explained by legitimate reasons or other types of financial crimes.
Which actions should financial institutions perform to ensure proper data governance? (Select Three.)
Answer : A, B, D
Financial institutions should perform the following actions to ensure proper data governance:
Establish an appropriate data management method for collecting and storing information. This is important to ensure that the data is consistent, reliable, and accessible for various purposes, such as risk assessment, compliance reporting, and customer service. Data management methods may include defining data standards, policies, and procedures; implementing data quality controls and validation checks; and using appropriate data storage systems and formats.
Ensure the accuracy of customer identification records and transaction records and appropriately manage data as a prerequisite for the effective use of IT systems. This is important to comply with the anti-money laundering and counter-terrorist financing (AML/CFT) requirements, such as customer due diligence, transaction monitoring, and suspicious activity reporting. Accurate and complete customer and transaction data also enables financial institutions to use IT systems more effectively for data analysis, risk management, and decision making.
Periodically validate integrity and accuracy of information used for IT systems such as customer information, customer identification records, and transaction records. This is important to ensure that the data remains up-to-date, relevant, and reliable over time. Data validation may include verifying the source and quality of the data; identifying and correcting any errors or inconsistencies; and updating or deleting any obsolete or redundant data.
Data Governance for Financial Institutions - Capgemini
Small and Medium-Sized Deposit-Taking Institutions (SMSBs) Capital and Liquidity Requirements - OSFI
Which are some of the negative impacts from illegal wildlife trade and environmental crimes? (Select Two.)
Answer : B, D, D
Some of the negative impacts of illegal wildlife trade and environmental crimes are loss of potential tax proceeds and threats to biodiversity. Loss of potential tax proceeds occurs when illegal wildlife trade and environmental crimes evade taxation and customs duties, depriving governments of revenues that could be used for public services and development. Threats to biodiversity occur when illegal wildlife trade and environmental crimes endanger species, habitats, and ecosystems, reducing their resilience and ability to provide essential services for human well-being. Public health consequences and threats to a country's political stability are not directly related to illegal wildlife trade and environmental crimes, but rather to other types of financial crimes such as money laundering, terrorism financing, or corruption.
An investigator at a corporate bank is conducting transaction monitoring alerts clearance.
KYC profile background: An entity customer, doing business offshore in Hong Kong, established a banking business relationship with the bank in 2017 for deposit and loan purposes. It acts as an offshore investment holding company. The customer declared that the ongoing source of funds to this account comes from group-related companies.
* X is the UBO. and owns 97% shares of this entity customer;
* Y is the authorized signatory of this entity customer. This entity customer was previously the subject of a SAR/STR.
KYC PROFILE
Customer Name: AAA International Company. Ltd
Customer ID: 123456
Account Opened: June 2017
Last KYC review date: 15 Nov 2020
Country and Year of Incorporation: The British Virgin Islands, May 2017
AML risk level: High
Account opening and purpose: Deposits, Loans and Trade Finance
Anticipated account activities: 1 to 5 transactions per year and around 1 million per
transaction amount
During the investigation, the investigator reviewed remittance transactions activities for the period from Jul 2019 to Sep 2021 and noted the following transactions pattern:
TRANSACTION JOURNAL
Review dates: from July 2019 to Sept 2021
For Hong Kong Dollars (HKD) currency:
Incoming transactions: 2 inward remittances of around 1.88 million HKD in total from
different third parties
Outgoing transactions: 24 outward remittances of around 9 4 million HKD in total to
different third parties
For United States Dollars (USD) currency:
Incoming transactions: 13 inward remittances of around 3.3 million USD in total from
different third parties
Outgoing transactions: 10 outward remittances of around 9.4 million USD in total to
different third parties.
RFI Information and Supporting documents:
According to the RFI reply received on 26 May 2021, the customer provided the bank
with the information below:
1) All incoming funds received in HKD & USD currencies were monies lent from non-customers of the bank. Copies of loan agreements had been provided as supporting documents. All of the loan agreements were in the same format and all the lenders are engaged in trading business.
2) Some loan agreements were signed among four parties, including among lenders. borrower (the bank's customer), guarantor, and guardian with supplemental agreements, which stated that the customer, as a borrower, who failed to repay the loan
Based on the KYC profile and the transaction journal, the pattern of activity shows a deviation in:
Answer : A
The correct answer is A because the expected account activities were 1 to 5 transactions per year and around 1 million per transaction amount, but the actual activity showed much more frequent and varied transactions in different currencies and amounts. This indicates a deviation from the customer's profile and risk level.
Due to an ever-diversifying business model and multi-jurisdictional footprint, a casino has decided to outsource the source of funds and wealth checks to a third-party provider. Why is it important for the casino to maintain control of the output from the provider?
Answer : C
The reason why it is important for the casino to maintain control of the output from the provider is that the casino maintains ultimate responsibility for this activity and should maintain control to avoid non-compliance . This is because the casino is accountable for its own AML/CFT obligations and cannot delegate or outsource them to a third-party provider. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should ensure that it has adequate oversight and control over any third-party providers that it engages for AML/CFT purposes, such as conducting due diligence, verifying information, or monitoring transactions'' (p. 25). The FI should also ''review and evaluate the performance and quality of the third-party providers on a regular basis, and address any issues or gaps that may arise'' (p. 25).
The other options are not as relevant or accurate as option C. The clients of the casino prefer to know that the casino is keeping their information secure when being held by a third-party (A) is not a reason why the casino should maintain control of the output from the provider, but rather a customer expectation or preference. As with all third-party relationships, proper control must be maintained to ensure profitability (B) is not a reason why the casino should maintain control of the output from the provider, but rather a general business principle or objective. Other casinos are frequently looking to reduce costs and share ideas, so if this relationship is successful, the model can be used by other businesses (D) is not a reason why the casino should maintain control of the output from the provider, but rather a potential benefit or outcome.
An investigator at a bank triggered a review in relation to potential misuse of legal persons and a complex network of corporate entities owned by customer
Answer : D
The initial focus of the investigation should be to review the customer due diligence documents of each entity and examine the year of incorporation and onboarding channel, as this would help identify the beneficial owners, the source of funds, and the purpose of the business relationship. This would also help determine if the entities are shell companies or have any red flags that indicate potential misuse of legal persons. Using data analytics to extract and analyze the linkages between the different entities would be a subsequent step, not the initial one. Conducting a network link analysis on all customers of the bank would be too broad and time-consuming. Finding out whether customer A has relationships with other financial institutions would be relevant, but not the initial focus. Reference: [Advanced CAMS-FCI Study Guide], page 44-45; [FATF Guidance on Transparency and Beneficial Ownership], page 12-13.
Which is a key characteristic of the Financial Action Task Force (FATF) Regional Style Bodies for combatting money laundering/terrorist financing?
Answer : B
According to the CAMS study guide, the Financial Action Task Force (FATF) Regional Style Bodies are organizations created by the FATF to promote the implementation of anti-money laundering and countering the financing of terrorism (AML/CFT) measures in specific regions. One of the key characteristics of these bodies is the implementation of regional mutual evaluation procedures.
Regional mutual evaluations involve member countries evaluating each other's AML/CFT regimes to identify strengths and weaknesses and to develop best practices for improvement. This process allows for greater cooperation between countries and can help to identify and address regional AML/CFT risks more effectively. It also promotes consistency in AML/CFT standards and practices within the region.
Each month the automated transaction monitoring system generates alerts based on predetermined scenarios. An alert was generated in relation to the account activity of ABC Foundation. Below is the transaction history for ABC Foundation (dates are in DD/MM/YYYY format).

The relationship manager for ABC Foundation contacts the client to request more information on the beneficiary of the transfer in Turkey. ABC Foundation advises that this is a not-for-profit charity group called 'Forever Free." Which is the best next step in the investigation?
Answer : C
The best next step in the investigation is to check the jurisdiction's list of known charities with connections to terrorist activity . This is because the FI has a responsibility to verify the legitimacy and reputation of the beneficiary of the funds, especially if it is a charity or non-profit organization that operates in a high-risk jurisdiction or sector. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should conduct enhanced due diligence on all parties involved in the investigation, including checking various sources of information, such as watch lists, sanctions lists, negative news, and official registries'' (p. 24). The FI should also check if the beneficiary is consistent with the customer's profile and expected activity.
The other options are not as appropriate or effective as option C. Contacting the financial institution in Turkey that has a relationship with Forever Free and advising them of the investigation (A) could violate confidentiality or data protection laws, as well as compromise the investigation or alert the customer or beneficiary of the suspicion. Updating the customer profile to include Forever Free as the recipient of the funds (B) could be premature or inaccurate, as it does not verify the nature and purpose of the transfer or the identity and legitimacy of the beneficiary. Filing a SAR/STR with the new information learned about the beneficiary (D) could also be premature or incomplete, as it does not confirm if there is any suspicious or criminal activity involved in the transfer or if there are any other red flags or indicators.
According to the Financial Action Task Force, as part of their risk assessment, which are important data and information that a Trust and Company Service Provider must understand when establishing and administering a trust? (Select Two.)
Answer : A, D
Here is the exact information from the Financial Action Task Force (FATF) Guidance for a Risk-Based Approach for Trust and Company Service Providers:
'Understanding the management and ownership structure of a trust is crucial in assessing the ML/TF risk it poses. This includes the identity of all settlors, trustees and beneficiaries, and their respective roles and responsibilities, as well as the nature and purpose of the trust.'
'TCSPs should obtain and maintain up-to-date information on the purpose and intended nature of the business relationship, the source of funds and wealth, and where relevant, the source of funds or wealth of the settlor and beneficiaries.'
Based on this information, the correct answers are A and D. Trust and Company Service Providers must understand the responsibility and authority in the structure, as well as the general purpose behind the structure in order to assess the overall risk of the trust and ensure that any transactions with the trust are legitimate.
During a review, an analyst notices discrepancies between a customer's nature of business listed on the business registry and what was stated on the customers application. The analyst should:
Answer : A
The analyst should clarify discrepancies noted in the customer's declared profile given the downstream impact on the risk assessment. This is because discrepancies between the customer's nature of business and the information on the business registry may indicate that the customer is not operating a legitimate business or is trying to conceal its true activities. The analyst should verify the customer's identity, source of funds, and purpose of transactions to ensure that the customer's risk profile is accurate and consistent with the Fl's risk appetite.
A financial institution (Fl) banks a money transmitter business (MTB) located in Miami. The MTB regularly initiates wire transfers with the ultimate beneficiary in Cuba and legally sells travel packages to Cub
a. The wire transfers for money remittances comply with the country's economic sanctions policies. A Fl investigator on the sanctions team reviews each wire transfer to ensure compliance with sanctions and to monitor transfer details.
An airline located in Cuba, unrelated to the business, legally sells airline tickets in Cuba to Cuban citizens wanting to travel outside of Cuba. The airline tickets are purchased using Cuban currency (CUC).
The MTB wants 100,000 USD worth of CUC. Purchasing CUC from a Cuban bank includes a 4% fee. The MTB contacts the airline to ask if the airline will trade its CUC for USD at a lower exchange fee than the Cuban bank. The airline agrees to a 1% fee. The MTB initiates a wire transfer to the airline which appears as normal activity in the monitoring system because of the business' travel package sales.
Which investigative actions should the investigator take concerning the 100.000 USD wire transfer? (Select Three.)
Answer : A, E, F
The investigator should take the following investigative actions concerning the 100,000 USD wire transfer:
Review the wire transfer protocols for this customer. This will help the investigator to determine if the wire transfer is consistent with the customer's normal business activity and risk profile, or if it deviates from the established patterns or thresholds.
Review regulations applicable to foreign currency trading transactions. This will help the investigator to assess if the wire transfer violates any laws or regulations related to currency exchange, such as reporting requirements, licensing requirements, or sanctions compliance.
Locate and review licenses, registrations, and account operating agreements associated with the MTB account. This will help the investigator to verify if the MTB has the necessary authorization and documentation to conduct currency exchange transactions and if it has disclosed this activity to the FI. Reference: Advanced CAMS-FCI Study Guide, pages 32-33.
Online payments from a customer's account to three foreign entities trigger an investigation. The investigator knows the funds originated from family real estate after an investment company approached the customer online. Funds were remitted for pre-lPO shares. Which should now occur in the investigation?
Answer : C
The correct answer is C because reviewing the structure of the transactions to the three entities can help the investigator to identify any red flags or indicators of fraud, such as unusual amounts, frequency, destinations, or beneficiaries. The other options are not as relevant or effective in this scenario. Option A is not necessary because the investigator already knows the source of funds for the customer. Option B is not advisable because contacting the customer directly may alert them to the investigation and compromise its integrity. Option D is not helpful because inspecting electronic banking login records does not provide any information about the nature or purpose of the transactions.
Advanced CAMS-FCI Study Guide, page 281
Financial Crime Typologies - Intermediate Certificate Course, Module 32
Which action is part of the enhanced due diligence process?
Answer : A
One of the actions that is part of the enhanced due diligence process is collecting beneficial ownership details regarding the client's account. This is important to identify the natural persons who ultimately own or control the client, and to assess the potential risks associated with them. According to the Financial Action Task Force (FATF), beneficial ownership information should include1:
The name, nationality, and country of residence of each beneficial owner.
The date of birth or incorporation of each beneficial owner.
The nature and extent of the beneficial interest held by each beneficial owner.
The means by which the beneficial ownership or control is exercised.
FATF Guidance on Transparency and Beneficial Ownership
During transaction monitoring. Bank A learns that one of their customers. Med Supplies 123. is attempting to make a payment via wire totaling 382,500 USD to PPE Business LLC located in Mexico to purchase a large order of personal protective equipment. specifically surgical masks and face shields. Upon further verification. Bank A decides to escalate and refers the case to investigators.
Bank A notes that, days prior to the above transaction, the same customer went to a Bank A location to wire 1,215,280 USD to Breath Well LTD located in Singapore. Breath Well was acting as an intermediary to purchase both 3-ply surgical masks and face shields from Chin
a. Bank A decided not to complete the transaction due to concerns with the involved supplier in China. Moreover, the customer is attempting to send a third wire in the amount of 350,000 USD for the purchase of these items, this time using a different vendor in China. The investigator must determine next steps in the investigation and what actions, if any. should be taken against relevant parties.
During the investigation, Bank A receives a USA PATRIOT Act Section 314(a) request related to Med Supplies 123. Which steps should the investigator take when fulfilling the request? (Select Three.)
Answer : D, E, F
According to the FinCEN's 314(a) Fact Sheet1, the steps that the investigator should take when fulfilling the request are:
Search its records expeditiously to determine whether it maintains(ed) any accounts for the subject(s) listed in the request. This is option F.
Report back to the Financial Crimes Enforcement Network (FinCEN) within 15 days of receipt of the request via a secure internet website. This is option E.
Report to Financial Crimes Enforcement Network (FinCEN) that a match was found without revealing any other details. This is option D.
The other options are incorrect because:
Exiting the relationship with the business since it appears that customer is under investigation is not required by the 314(a) program and may interfere with law enforcement's investigation. This is option A.
Not responding to Financial Crimes Enforcement Network (FinCEN) if the requested information is not present in the financial institution's system of records is contrary to the 314(a) program, which requires financial institutions to respond whether or not they have a match. This is option B.
Reviewing the account(s) activity and proactively filing a SAR/STR using the 314(a) request as the basis for the filing is not appropriate, as the 314(a) request itself is not a sufficient reason to file a SAR/STR. The financial institution should only file a SAR/STR if it has its own independent suspicion of money laundering or terrorist financing. This is option C.
An investigator is reviewing an alert for unusual activity. System scanning detected a text string within a company customer's account transactions that indicates the account may have been used for a drug or drug paraphernalia purchase. Based on the KYC profile, the investigator determines the customer's company name and business type are marketed as a gardening supplies company. The investigator reviews the account activity and notes an online purchase transaction that leads the investigator to a website that sells various strains of marijuan
a. Additional account review detects cash deposits into the account at the branch teller lines, so the investigator reaches out to the teller staff regarding the transactions. The teller staff member reports that the business customers have frequently deposited cash in lower amounts. The teller, without prompting, adds that one of the transactors would occasionally smell of a distinct scent of marijuana smoke.
Which information should be included in the SAR/STR?
Answer : C
The SAR/STR should include any information that is relevant to the suspicious activity, such as the customer information, the transaction details, and any other indicators of potential money laundering or criminal activity. The fact that one of the transactors occasionally smelled of marijuana smoke is an indicator that the customer may be involved in the illicit drug trade, which is a predicate offense for money laundering. Therefore, this information should be included in the SAR/STR. Reference: Advanced CAMS-FCI Study Guide, page 25.
Refer to the exhibit.

During a review of the accounts related to Richard Aston, an investigator notices a high number of incoming payments from various individuals. They also notice that these incoming payments typically occur during large sporting events or conferences. As a result of the account review, of which illegal activity does the investigator have reasonable grounds to suspect Richard Aston?
Answer : B
The illegal activity that the investigator has reasonable grounds to suspect Richard Aston of is aftermarket sales of entertainment admission tickets. This is because aftermarket sales of entertainment admission tickets involve reselling tickets for events, concerts, festivals, etc. at a higher price than their face value, often through online platforms or scalpers. This practice can be illegal or unethical, depending on the jurisdiction and the terms and conditions of the original ticket seller. The investigator should look for indicators of aftermarket sales of entertainment admission tickets, such as high volume or frequency of incoming payments from various individuals, correlation between incoming payments and major events or conferences, and discrepancy between the customer's profile and the nature of the transactions. The other options are incorrect because:
A . Embezzling from the hotel is not likely, as it would involve stealing money or property from the hotel by an employee or a person in a position of trust. There is no evidence that Richard Aston works for or has access to the hotel's assets.
C . Human trafficking is not probable, as it would involve exploiting people for forced labor or commercial sexual exploitation. There is no indication that Richard Aston is involved in any form of human trafficking or has any connection to victims or perpetrators.
D . Sports betting is not plausible, as it would involve wagering money on the outcome of sporting events or games. There is no sign that Richard Aston is engaged in any sports betting activity or has any association with bookmakers or gamblers.
Advanced CAMS-FCI Certification | ACAMS, Section 2: Investigating Financial Crimes, page 10
TicketSwap: The safest way to buy and sell tickets
Ticketing 101 | Ticketmaster
10 Types of Tickets For Events (+ Why & When To Use Them) - Eventbrite
A client that runs a non-profit organization that aids refugees in leaving their home countries received a remittance from a money services business that was ten times the average. The client was recently detained for providing falsified passports to illegal immigrants. Which predicate offenses could be considered in the SAR/STR? (Select Two.)
Answer : A, B
The correct answer is A and B because human smuggling/trafficking and terrorist financing are both predicate offenses for money laundering that could be related to the client's activities. Option C is incorrect because there is no indication of narcotics trafficking in the scenario. Option D is incorrect because there is no indication of antiques smuggling in the scenario. Option E is incorrect because there is no indication of tax evasion in the scenario.
Which most likely indicates that a business email compromise attack has occurred?
Answer : A
When writing or reviewing a SAR/STR, it is important to ensure that the narrative is kept to the point; easy to read; and addresses the who, what, when, where, why, and how. This is because the narrative is the most crucial part of the SAR/STR, as it provides a clear and concise summary of the suspicious activity or transaction that triggered the report. The narrative should include all the relevant information that would help law enforcement or regulators to understand the nature and context of the activity or transaction, such as123:
The who: The names, addresses, account numbers, and other identifying information of the parties involved in the activity or transaction, such as customers, beneficiaries, intermediaries, or third parties.
The what: The type, amount, frequency, and purpose of the activity or transaction, such as cash deposits, wire transfers, check payments, or purchases of goods or services.
The when: The date, time, and duration of the activity or transaction, and whether it was a one-time occurrence or part of a pattern or trend.
The where: The location or channel of the activity or transaction, such as branches, ATMs, online platforms, or mobile applications.
The why: The reason or rationale for the activity or transaction, and why it was considered suspicious or unusual based on the customer's profile, behavior, or expected activity.
The how: The method or mechanism of the activity or transaction, such as cash, check, debit card, credit card, cryptocurrency, or prepaid card.
How to write the perfect ''Suspicious Activity Reports'' (SAR)? | i-AML
Writing for Prosecution: Best Practices For Composing SAR Narratives That Assist Prosecutors | ACAMS
SAR Writing Examples and Proper Formatting: Write for Your Reader - Alessa
A SAR/STR on cash activity is filed for a company registered in the Marshall Islands operating a Mediterranean beach bar and hotel. The company has three nominee directors, one nominee shareholder, and another individual declared as both the beneficial owner and authorized signatory. Which information is key for law enforcement's physical surveillance of cash activity? (Select Two.)
Answer : B, C
The identification details of the beneficial owner and authorized signatory are key for law enforcement's physical surveillance of cash activity, as they would help identify the person who controls and operates the company and who is responsible for its financial transactions. The company's operating address is also key, as it would help locate the premises where the cash activity takes place and observe any suspicious movements or behaviors. The identification details of the nominee shareholder and directors are not relevant, as they are not involved in the management or operation of the company. The company's registered address is also not relevant, as it is likely to be a shell or mailbox address that does not reflect the actual location of the business.
Which pattern of activity most strongly indicates an individual is a foreign terrorist fighter?
Answer : B
The pattern of activity that most strongly indicates an individual is a foreign terrorist fighter is a large cash advance on a credit card and purchases at travel and sporting goods websites. This is because this pattern may suggest that the individual is preparing to travel to a conflict zone and purchase equipment or supplies for terrorist activities. According to the United Nations Office on Drugs and Crime, some of the indicators of foreign terrorist fighters include1:
Sudden or increased financial activity, such as cash withdrawals, transfers, or deposits, especially in large amounts or involving foreign currency or locations.
Purchases of travel-related items, such as airline tickets, passports, visas, luggage, or clothing, especially to or from high-risk destinations or transit hubs.
Purchases of items that could be used for terrorist purposes, such as weapons, explosives, chemicals, communication devices, or survival gear.
Changes in behavior, such as expressing radical views, cutting ties with family or friends, joining extremist groups, or displaying signs of emotional distress.
Foreign Terrorist Fighters - United Nations Office on Drugs and Crime
A client with many personal and business deposits with the financial institution (Fl) seeks a business loan. The client wants to guarantee the loan with a trust for which they are the beneficiary.
An investigator examines the trust. The trust has many layers, including shell companies in known tax havens. The client's ultimate beneficial ownership claim cannot be validated, and the loan is denied.
Two months later, the Fl receives a law enforcement (LE) request on one of the client's business accounts. While reviewing the business account, the Fl receives another LE request on the same account from another agency. The requested information is shared.
Three months later, a branch manager receives a request to open a business deposit account related to a complex trust. The manager forwarded the request because of the complexity. The trust was the same as the previously examined trust, but the request came from a different client. The second client also has many accounts with the Fl. Further inspection finds links between the second client and the Paradise Papers. The Papers state the client led illegal activities and committed tax evasion.
What steps should the investigator perform in reference to the first client's existing accounts? (Select Three.)
Answer : A, D, F
The investigator should review all client-signed documents relating to all accounts (A) to check for any discrepancies or red flags. The investigator should also perform secondary scans of the client's other owners/authorized signers (D) to identify any possible connections or associations with the second client or the Paradise Papers. Additionally, the investigator should prepare a relationship flow chart of all existing accounts (F) to better understand the client's activities and patterns. These steps are consistent with the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, which states that investigators should ''review all relevant documentation, including account opening documents, transaction records, and customer correspondence'' (p. 23), ''conduct enhanced due diligence on all parties involved in the investigation'' (p. 24), and ''use data visualization tools to map out complex relationships and transactions'' (p. 25).
During transaction monitoring. Bank A learns that one of its customers. Med Supplies 123, is attempting to make a payment via wire totaling 382.500 USD to PPE Business LLC located in Mexico to purchase a large order of personal protective equipment. specifically surgical masks and face shields. Upon further verification. Bank A decides to escalate and refers the case to investigators.
Bank A notes that days prior to the above transaction, the same customer went to a Bank A location to wire 1,215,280 USD to Breath Well LTD located in Singapore. Breath Well was acting as an intermediary to purchase both 3-ply surgical masks and face shields from Chin
a. Bank A decided not to complete the transaction due to concerns with the involved supplier in China. Moreover, the customer is attempting to send a third wire in the amount of 350,000 USD for the purchase of these items, this time using a different vendor in China. The investigator must determine the next steps in the investigation and what actions, if any. should be taken against relevant parties.
The investigator is gathering more information to determine if a SAR/STR filing is needed. Which steps are the correct ways of collecting the additional information? (Select Two.)
Answer : A, D
The correct answer is A and C because these indicators suggest that the customer is using fraudulent documents and misrepresenting the goods to conceal the illicit nature of the transactions. Fentanyl traffickers often use front companies and falsified invoices to disguise their shipments as legitimate products, such as medical supplies or chemicals. Reviewing the invoices and transportation documents, as well as the FDA product certifications, can help to identify discrepancies or anomalies that indicate fraud or deception.
Law enforcement agents arrive at a broker-dealer's premises with a search warrant. In addition to cooperation with the warrant, which instructions should the person in charge of the broker-dealer provide to their employees?
Answer : A
The instruction that the person in charge of the broker-dealer should provide to their employees is to take notes on the questions and comments made by the agents (A). This is because taking notes can help the employees to recall and document what happened during the search warrant execution, which can be useful for legal or regulatory purposes. According to ACAMS3, ''the FI should instruct its staff to cooperate with LE agents during a search warrant execution, but also to take notes of what is being searched, seized, or asked by the agents'' (p. 35). The FI should also ''keep copies of any documents or records that are taken by LE agents'' (p. 35).
The other instructions are not correct. The person in charge of the broker-dealer should not instruct their employees to sign consent forms permitting the agents to search employees' offices (B), as this is unnecessary and potentially risky, as the agents already have a valid search warrant that authorizes them to search the premises. The person in charge of the broker-dealer should not instruct their employees to provide agents with unlimited access to customers' personal data , as this could violate privacy or data protection laws, as well as compromise customer trust and confidentiality. The person in charge of the broker-dealer should not instruct their employees to volunteer information not requested by the agents that they think may be useful (D), as this could interfere with the LE investigation or expose them to legal or regulatory risks.
Introduction to Transnational Organized Crime
ACAMS Law Enforcement and Financial Crimes Investigations eLearning Course Module
Law Enforcement Requests and Actions
Which are some of the negative impacts from illegal wildlife trade and environmental crimes? (Select Two.)
Answer : B, D, D
Some of the negative impacts of illegal wildlife trade and environmental crimes are loss of potential tax proceeds and threats to biodiversity. Loss of potential tax proceeds occurs when illegal wildlife trade and environmental crimes evade taxation and customs duties, depriving governments of revenues that could be used for public services and development. Threats to biodiversity occur when illegal wildlife trade and environmental crimes endanger species, habitats, and ecosystems, reducing their resilience and ability to provide essential services for human well-being. Public health consequences and threats to a country's political stability are not directly related to illegal wildlife trade and environmental crimes, but rather to other types of financial crimes such as money laundering, terrorism financing, or corruption.
Which payment method for purchasing luxury items is a red flag for potential money laundering?
Answer : B
According to the Financial Action Task Force (FATF), the use of large amounts of cash is a common method for money launderers to move illicit funds [1]. Purchasing luxury items with cash can indicate an attempt to convert illegal funds into tangible assets that can be easily resold or moved across borders. As a result, businesses that deal with luxury items are required to implement enhanced due diligence measures, including monitoring transactions involving large amounts of cash [1].
An investigator is reviewing a case generated from the transaction monitoring system, with two large amounts of incoming remittance (IR) to an individual customer. Based on the KYC profile, the customer is a plant manager of a famous multi-national electronics manufacturing firm. As the customer has no similarly large transaction patterns for the past 2 years, the investigator sends an inquiry to the relationship manager (RM) about the nature of the transaction. The RM replies that the transaction is a consultancy fee provided from two different electronics companies with a debit note provided However, there is no detail of service provided on the debit note, and the remitters are two individuals.
Which actions should the investigator recommend to mitigate risk? (Select Two.)
Answer : D, E
The actions that the investigator should recommend to mitigate risk are conducting enhanced due diligence (D) and re-evaluating the customer risk profile (E). These actions are appropriate and prudent, as they allow the investigator to obtain more information and evidence about the nature and purpose of the transactions, the source and destination of the funds, and the identity and legitimacy of the parties involved. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should conduct enhanced due diligence on all parties involved in the investigation, including checking various sources of information, such as watch lists, sanctions lists, negative news, and official registries'' (p. 24). The FI should also ''re-assess the customer risk profile based on any new information obtained during the investigation, and adjust the customer due diligence and monitoring requirements accordingly'' (p. 25).
The other options are not as appropriate or effective as options D and E. The investigator should not recommend exiting the relationship with the customer (A), as this could be premature or disproportionate, as well as potentially discriminatory or illegal. The investigator should not recommend documenting and maintaining a file with the investigative findings (B), as this is not an action to mitigate risk, but rather a standard procedure for any investigation. The investigator should not recommend discussing the investigation findings with the customer , as this could compromise the integrity and objectivity of the investigation, as well as expose the FI to legal or regulatory risks.
An investigator at a corporate bank is conducting transaction monitoring alerts clearance.
KYC profile background: An entity customer, doing business offshore in Hong Kong, established a banking business relationship with the bank in 2017 for deposit and loan purposes. It acts as an offshore investment holding company. The customer declared that the ongoing source of funds to this account comes from group-related companies.
* X is the UBO. and owns 97% shares of this entity customer;
* Y is the authorized signatory of this entity customer. This entity customer was previously the subject of a SAR/STR.
KYC PROFILE
Customer Name: AAA International Company. Ltd
Customer ID: 123456
Account Opened: June 2017
Last KYC review date: 15 Nov 2020
Country and Year of Incorporation: The British Virgin Islands, May 2017
AML risk level: High
Account opening and purpose: Deposits, Loans and Trade Finance
Anticipated account activities: 1 to 5 transactions per year and around 1 million per
transaction amount
During the investigation, the investigator reviewed remittance transactions activities for the period from Jul 2019 to Sep 2021 and noted the following transactions pattern:
TRANSACTION JOURNAL
Review dates: from July 2019 to Sept 2021
For Hong Kong Dollars (HKD) currency:
Incoming transactions: 2 inward remittances of around 1.88 million HKD in total from
different third parties
Outgoing transactions: 24 outward remittances of around 9 4 million HKD in total to
different third parties
For United States Dollars (USD) currency:
Incoming transactions: 13 inward remittances of around 3.3 million USD in total from
different third parties
Outgoing transactions: 10 outward remittances of around 9.4 million USD in total to
different third parties.
RFI Information and Supporting documents:
According to the RFI reply received on 26 May 2021, the customer provided the bank
with the information below:
1) All incoming funds received in HKD & USD currencies were monies lent from non-customers of the bank. Copies of loan agreements had been provided as supporting documents. All of the loan agreements were in the same format and all the lenders are engaged in trading business.
2) Some loan agreements were signed among four parties, including among lenders. borrower (the bank's customer), guarantor, and guardian with supplemental agreements, which stated that the customer, as a borrower, who failed to repay the loan
Based on the KYC profile and the transaction journal, the pattern of activity shows a deviation in:
Answer : A
The correct answer is A because the expected account activities were 1 to 5 transactions per year and around 1 million per transaction amount, but the actual activity showed much more frequent and varied transactions in different currencies and amounts. This indicates a deviation from the customer's profile and risk level.
SAR/STR NARRATIVE
A SAR/STR has been submitted on five transactions conducted on the correspondent banking relationship with ABC Bank.
Client Information:
Remitter information: DEF Oil Resource Ltd. is the oldest member of the DEF Group. It was founded in 1977 as a general trading business with a primary focus on exports from Africa and North Americ
a. The group has business activities that span the entire energy value chain. Their core field of endeavor is centered within the oil and gas industry and its associated sub-sectors.
Beneficiary Information:
As per the response received from ABC Bank, it was determined that the beneficiaries are related to DEF Oil Resource Ltd. These were created by DEF Oil Resource Ltd. to purchase property in a foreign country on behalf of their senior management as part of a bonus scheme. The purpose behind this payment was for the purchase of property in another country.
Payment Reference:
ABCXXXXX31PZFG2H
ABCXXXXXX51PQGEH
ABCXXXXXX214QWVG
ABCXXXXXX41PSXA2
ABCXXXXXX815QWS3
Concerns:
* We are unsure about the country of incorporation of the beneficiaries.
* We are concerned about the transactional activity since the payment made towards entities (conducted on behalf of individuals) appears to be possible tax evasion.
* There appears to be an attempt to conceal the identity of individuals (senior management), which again raises concerns about the source of funds.
* Referring to the response received from ABC Bank, we are unclear about the ultimate beneficiary of funds.
* The remitter is involved in a high-risk business, (i.e., oil and crude products trading), and the beneficiary is involved in real estate business which again poses a higher risk.
While reviewing the account activity, it is noted that several transfers are sent to a company located in an offshore jurisdiction. Which step should the investigator take next?
Answer : C
The best step for the investigator to take next is to request information about the beneficiaries related to the company. This will help to identify the ultimate beneficial owners of the funds and the purpose of the transactions. Requesting information from the company or filing a SAR/STR to the FIU where the company is located may not be feasible or effective, as the company may not cooperate or the FIU may not have jurisdiction over the offshore entity. Conducting an open-source search may provide some information about the ownership and registration of the company, but it may not be sufficient or reliable to determine the nature and legitimacy of the transactions.
SAR Narrative Guidance Package
Best Practices for Drafting an STR or SAR
An investigator is reviewing an alert for unusual activity. System scanning detected a text string within a company customer's account transactions that indicates the account may have been used for a drug or drug paraphernalia purchase. Based on the KYC profile, the investigator determines the customer's company name and business type are marketed as a gardening supplies company. The investigator reviews the account activity and notes an online purchase transaction that leads the investigator to a website that sells various strains of marijuan
a. Additional account review detects cash deposits into the account at the branch teller lines, so the investigator reaches out to the teller staff regarding the transactions. The teller staff member reports that the business customers have frequently deposited cash in lower amounts. The teller, without prompting, adds that one of the transactors would occasionally smell of a distinct scent of marijuana smoke.
Which information should be included in the SAR/STR?
Answer : C
The SAR/STR should include any information that is relevant to the suspicious activity, such as the customer information, the transaction details, and any other indicators of potential money laundering or criminal activity. The fact that one of the transactors occasionally smelled of marijuana smoke is an indicator that the customer may be involved in the illicit drug trade, which is a predicate offense for money laundering. Therefore, this information should be included in the SAR/STR. Reference: Advanced CAMS-FCI Study Guide, page 25.
A client with many personal and business deposits with the financial institution (Fl) seeks a business loan. The client wants to guarantee the loan with a trust for which they are the beneficiary.
An investigator examines the trust. The trust has many layers, including shell companies in known tax havens. The client's ultimate beneficial ownership claim cannot be validated, and the loan is denied.
Two months later, the Fl receives a law enforcement (LE) request on one of the client's business accounts. While reviewing the business account, the Fl receives another LE request on the same account from another agency. The requested information is shared.
Three months later, a branch manager receives a request to open a business deposit account related to a complex trust. The manager forwarded the request because of the complexity. The trust was the same as the previously examined trust, but the request came from a different client. The second client also has many accounts with the Fl. Further inspection finds links between the second client and the Paradise Papers. The Papers state the client led illegal activities and committed tax evasion.
What steps should the investigator perform in reference to the first client's existing accounts? (Select Three.)
Answer : A, D, F
The investigator should review all client-signed documents relating to all accounts (A) to check for any discrepancies or red flags. The investigator should also perform secondary scans of the client's other owners/authorized signers (D) to identify any possible connections or associations with the second client or the Paradise Papers. Additionally, the investigator should prepare a relationship flow chart of all existing accounts (F) to better understand the client's activities and patterns. These steps are consistent with the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, which states that investigators should ''review all relevant documentation, including account opening documents, transaction records, and customer correspondence'' (p. 23), ''conduct enhanced due diligence on all parties involved in the investigation'' (p. 24), and ''use data visualization tools to map out complex relationships and transactions'' (p. 25).
An investigator receives an alert documenting a series of transactions. A limited liability corporation (LLC) wired 59.000,000 USD to an overseas account associated with a state-run oil company. A second account associated with the state-run oil company wired 600,000,000 USD to the LLC. The LLC then wired money to other accounts, a money brokerage firm, and real estate purchases.
The investigator initiated an enhanced KYC investigation on the LLC. The financial institution opened the LLC account a couple of weeks prior to the series of transactions. The names associated with the LLC had changed multiple times since the account opened. A search of those names revealed relations with multiple LLCs. Public records about the LLCs did not show any identifiable business activities.
Open-source research identified mixed reports about the brokerage firm. The firm indicated it purchased mutual funds for its clients and dispensed returns to clients.
Media reports claimed the firm laundered money by holding for a fee before returning it to investors.
The investigator discovers that the bank has no records pertaining to ownership of the LLC. What would this mean for the bank and/or investigator?
Answer : C
The bank is out of compliance with CIP regulations because it did not obtain the minimum identifying information from the customer prior to opening the account, as required by 31 CFR 1020.220(a)(2)(i)(A). The bank should have obtained the name, date of birth, address, and identification number of the customer, as well as verified the identity of the customer to the extent reasonable and practicable. The lack of ownership data may also indicate a violation of beneficial ownership regulations, but that is not the primary issue in this case.
An investigator at a corporate bank is conducting transaction monitoring alerts clearance.
KYC profile background: An entity customer, doing business offshore in Hong Kong, established a banking business relationship with the bank since 2017 for deposit and loan purposes. It acts as an offshore investment holding company. The customer declared that the ongoing source of funds to this account comes from group-related companies.
* X is the UBO. and owns 97% shares of this entity customer;
* Y is is the authorized signatory of this entity customer. This entity customer was previously the subject of a SAR/STR.
KYC PROFILE
Customer Name: AAA International Company. Ltd
Customer ID: 123456
Account Opened: June 2017
Last KYC review date: 15 Nov 2020
Country and Year of Incorporation: The British Virgin Islands, May 2017
AML risk level: High
Account opening and purpose: Deposits, Loans and Trade Finance
Anticipated account activities: 1 to 5 transactions per year and around 1 million per
transaction amount
During the investigation, the investigator reviewed remittance transactions activities for the period from Jul 2019 to Sep 2021 and noted the following transactions pattern:
TRANSACTION JOURNAL
Review dates: from July 2019 to Sept 2021
For Hong Kong Dollars (HKD) currency:
Incoming transactions: 2 inward remittances of around 1.88 million HKD in total from
different third parties
Outgoing transactions: 24 outward remittances of around 9 4 million HKD in total to
different third parties
For United States Dollars (USD) currency:
Incoming transactions: 13 inward remittances of around 3.3 million USD in total from
different third parties
Outgoing transactions: 10 outward remittances of around 9.4 million USD in total to
different third parties.
RFI Information and Supporting documents:
According to the RFI reply received on 26 May 2021, the customer provided the bank
with the information below:
1) All incoming funds received in HKD & USD currencies were monies lent from non-customers of the bank. Copies of loan agreements had been provided as supporting documents. All of the loan agreements were in the same format and all the lenders are engaged in trading business.
2) Some loan agreements were signed among four parties, including among lenders. borrower (the bank's customer), guarantor, and guardian with supplemental agreements, which stated that the customer, as a borrower, who failed to repay the loan
After reviewing the transaction journal, request for information response, and supporting documentation, the investigator determines that additional information is needed. Which additional information should the investigator request?
Answer : C
The additional information that the investigator should request is the source of the incoming funds to the group-related companies. This is because the customer declared that the ongoing source of funds to this account comes from group-related companies, but the transaction journal shows that the customer received funds from different third parties, not from group-related companies. Therefore, the investigator should verify the relationship and legitimacy of these third parties and their funds with the customer and the group-related companies. The other options are not relevant or necessary for this investigation.
Law enforcement (LE) suspects human trafficking to occur during a major sporting event LE officers asked several financial institutions (FIs) to monitor financial transactions occurring before, during, and after the event.
An investigator identified a pattern linked to a business. The business' account received multiple even dollar deposits between midnight and 4:00 AM. They occurred each day for several days prior to the date of the sporting event. Also, large cash deposits, typically between 2,000 USD and 3,000 USD. made by a person to the business' account occurred in many branches in the days after the sports event.
There was little information about the company. The company did not have any history of employee payroll expenses or paying taxes. Expenses from the business account included air travel and hotel expenses. Searches about the person making cash deposits showed little. An online social media platform webpage with the individual's name showed ads for dates1' and "companionship."
The Fl wants to create an automated alert for human trafficking money laundering after this investigation. Which activity type should they target?
Answer : B
The activity type that the FI should target for creating an automated alert for human trafficking money laundering is multiple deposits between midnight and 4:00 AM (B). This is because this pattern is consistent with the indicators of human trafficking identified by the Financial Action Task Force (FATF) and the Egmont Group1, which include:
Frequent cash deposits, often in round amounts, outside of normal business hours
Deposits made at different branches or ATMs in various locations
Lack of information about the nature and purpose of the business
Involvement in online platforms that advertise sexual services
Expenses related to travel and accommodation
The other options are not as relevant or specific as option B. Payments made to multiple hotels in the same city (A) could be a legitimate business expense or a sign of other types of money laundering, such as tax evasion or fraud. Deposits made within days of major sporting events could also be explained by other factors, such as increased tourism or gambling. Payments made for virtual currency (D) are not directly related to human trafficking, although they could be used to facilitate money laundering in general.
During transaction monitoring. Bank A learns that one of their customers. Med Supplies 123. is attempting to make a payment via wire totaling 382,500 USD to PPE Business LLC located in Mexico to purchase a large order of personal protective equipment. specifically surgical masks and face shields. Upon further verification. Bank A decides to escalate and refers the case to investigators.
Bank A notes that, days prior to the above transaction, the same customer went to a Bank A location to wire 1,215,280 USD to Breath Well LTD located in Singapore. Breath Well was acting as an intermediary to purchase both 3-ply surgical masks and face shields from Chin
a. Bank A decided not to complete the transaction due to concerns with the involved supplier in China. Moreover, the customer is attempting to send a third wire in the amount of 350,000 USD for the purchase of these items, this time using a different vendor in China. The investigator must determine next steps in the investigation and what actions, if any. should be taken against relevant parties.
During the investigation, Bank A receives a USA PATRIOT Act Section 314(a) request related to Med Supplies 123. Which steps should the investigator take when fulfilling the request? (Select Three.)
Answer : D, E, F
According to the FinCEN's 314(a) Fact Sheet1, the steps that the investigator should take when fulfilling the request are:
Search its records expeditiously to determine whether it maintains(ed) any accounts for the subject(s) listed in the request. This is option F.
Report back to the Financial Crimes Enforcement Network (FinCEN) within 15 days of receipt of the request via a secure internet website. This is option E.
Report to Financial Crimes Enforcement Network (FinCEN) that a match was found without revealing any other details. This is option D.
The other options are incorrect because:
Exiting the relationship with the business since it appears that customer is under investigation is not required by the 314(a) program and may interfere with law enforcement's investigation. This is option A.
Not responding to Financial Crimes Enforcement Network (FinCEN) if the requested information is not present in the financial institution's system of records is contrary to the 314(a) program, which requires financial institutions to respond whether or not they have a match. This is option B.
Reviewing the account(s) activity and proactively filing a SAR/STR using the 314(a) request as the basis for the filing is not appropriate, as the 314(a) request itself is not a sufficient reason to file a SAR/STR. The financial institution should only file a SAR/STR if it has its own independent suspicion of money laundering or terrorist financing. This is option C.
A financial institution
Answer : C
The correct answer is C because the FI is unable to obtain evidence of required licensing or registration despite suspicion of money transmitting, which is a red flag for money laundering and a violation of federal and state laws. Option A is incorrect because making several deposits in one month that appear to exceed their expected monthly income might not be indicative of suspicious activity, depending on the customer's profile and source of funds. Option B is incorrect because receiving a large, one-time wire from a law firm might not be indicative of suspicious activity, depending on the customer's relationship with the law firm and the purpose of the wire. Option D is incorrect because discovering a large number of securities transactions that appear to be related to day trading might not be indicative of suspicious activity, depending on the customer's investment strategy and risk tolerance.
An investigator is reviewing an alert for unusual activity. System scanning detected a text string within a company customer's account transactions that indicates the account may have been used for a drug or drug paraphernalia purchase Based on the KYC profile, the investigator determines the customer's company name and business type are marketed as a gardening supplies company. The investigator reviews the account activity and notes an online purchase transaction that leads the investigator to a website that sells various strains of marijuan
a. Additional account review detects cash deposits into the account at the branch teller lines, so the investigator reaches out to the teller staff regarding the transactions. The teller staff member reports that the business customers have frequently deposited cash in lower amounts. The teller, without prompting, adds that one of the transactors would occasionally smell of a distinct scent of marijuana smoke.
Which are the best next steps for the investigator to take? (Select Three.)
Answer : A, C, E
The best next steps for the investigator to take are:
A . Review the customer's transaction history. This can help the investigator identify any patterns or anomalies in the customer's account activity, such as changes in transaction volume, frequency, amount, source, destination, purpose, etc. The investigator can also compare the customer's transaction history with their KYC profile and risk rating to assess if there are any discrepancies or inconsistencies.
C . Check internal KYC information. This can help the investigator verify the customer's identity, business nature, ownership structure, expected activity, source of funds, etc. The investigator can also update or enhance the customer's KYC information based on any new or relevant information obtained from other sources.
E Conduct adverse media and open-source searches on the customer's background. This can help the investigator find out if there is any negative or adverse information about the customer in public data sources, such as news articles, social media posts, blogs, forums, etc. Adverse media and open-source searches can also provide additional context and insight into the customer's reputation, behavior, associations, etc. The other options are incorrect because:
B . Request information from the internet service provider who hosts the website is not feasible, as it may require a legal process or a court order to obtain such information. Moreover, the internet service provider may not have or disclose any useful information about the website or its owner.
D . Research other customer accounts for transactions to the same website is not relevant, as it may not provide any meaningful information about the customer under investigation. Furthermore, it may violate the privacy and confidentiality of other customers who are not related to the investigation.
F . Identify if the customer has opened accounts in an urban city area is not helpful, as it may not have any bearing on the customer's involvement in a drug or drug paraphernalia purchase. Additionally, it may not be possible to access or verify such information without the customer's consent or authorization.
Advanced CAMS-FCI Certification | ACAMS, Section 2: Investigating Financial Crimes, page 11
Leading Complex Investigations Certificate | ACAMS, Module 3: Conducting Research and Analysis, page 6
Adverse Media Screening - Using AI to Mitigate Risk
Legal requirements for adverse media screening - Thomson Reuters
Electronic client due diligence | Ethics helpsheets | ICAEW
6AMLD & FATF: Where Adverse Media Screening Fits In
Free Adverse Media Check | NameScan
A criminal is engaged in chain hopping while trying to launder ransomware payments. The criminal will likely:
Answer : B
Chain hopping is a technique used by criminals to obscure the traceability of cryptocurrency transactions by converting the funds to a different type of cryptocurrency, often using multiple exchanges or platforms. The other options are not related to chain hopping. Reference: Advanced CAMS-FCI Study Guide, page 38.
When writing or reviewing a SAR/STR, it is important to:
Answer : A
The correct answer is A because a SAR/STR narrative should be concise, clear, and complete, addressing the who, what, when, where, why, and how of the suspicious activity. Option B is incorrect because providing too much information can make the narrative confusing and irrelevant. Option C is incorrect because the introduction should provide a summary of the suspicious activity, not the conclusion. Option D is incorrect because suspect names should be mentioned in the narrative to identify the parties involved in the suspicious activity.
Which actions should financial institutions perform to ensure proper data governance? (Select Three.)
Answer : A, B, D
Financial institutions should perform the following actions to ensure proper data governance:
Establish an appropriate data management method for collecting and storing information. This is important to ensure that the data is consistent, reliable, and accessible for various purposes, such as risk assessment, compliance reporting, and customer service. Data management methods may include defining data standards, policies, and procedures; implementing data quality controls and validation checks; and using appropriate data storage systems and formats.
Ensure the accuracy of customer identification records and transaction records and appropriately manage data as a prerequisite for the effective use of IT systems. This is important to comply with the anti-money laundering and counter-terrorist financing (AML/CFT) requirements, such as customer due diligence, transaction monitoring, and suspicious activity reporting. Accurate and complete customer and transaction data also enables financial institutions to use IT systems more effectively for data analysis, risk management, and decision making.
Periodically validate integrity and accuracy of information used for IT systems such as customer information, customer identification records, and transaction records. This is important to ensure that the data remains up-to-date, relevant, and reliable over time. Data validation may include verifying the source and quality of the data; identifying and correcting any errors or inconsistencies; and updating or deleting any obsolete or redundant data.
Data Governance for Financial Institutions - Capgemini
Small and Medium-Sized Deposit-Taking Institutions (SMSBs) Capital and Liquidity Requirements - OSFI
During transaction monitoring. Bank A learns that one of their customers. Med Supplies 123, is attempting to make a payment via wire totaling 382,500 USD to PPE Business LLC located in Mexico to purchase a large order of personal protective equipment. specifically surgical masks and face shields. Upon further verification. Bank A decides to escalate and refers the case to investigators.
Bank A notes that, days prior to the above transaction, the same customer went to a Bank A location to wire 1,215,280 USD to Breath Well LTD located in Singapore. Breath Well was acting as an intermediary to purchase both 3-ply surgical masks and face shields from Chin
a. Bank A decided not to complete the transaction due to concerns with the involved supplier in China. Moreover, the customer is attempting to send a third wire in the amount of 350,000 USD for the purchase of these items, this time using a different vendor in China. The investigator must determine next steps in the investigation and what actions, if any. should be taken against relevant parties.
Upon further investigation. Bank As investigator learns that both the Mexico- and Singapore-based companies are linked to the alleged suppliers in China. Which additional indicators would the investigator need to identify to determine if this fits a fentanyl (drug) trafficking typology? (Select Two.)
Answer : A, C
Refer to the exhibit.

During a review of the accounts related to Richard Aston, an investigator notices a high number of incoming payments from various individuals. They also notice that these incoming payments typically occur during large sporting events or conferences. As a result of the account review, of which illegal activity does the investigator have reasonable grounds to suspect Richard Aston?
Answer : B
The illegal activity that the investigator has reasonable grounds to suspect Richard Aston of is aftermarket sales of entertainment admission tickets. This is because aftermarket sales of entertainment admission tickets involve reselling tickets for events, concerts, festivals, etc. at a higher price than their face value, often through online platforms or scalpers. This practice can be illegal or unethical, depending on the jurisdiction and the terms and conditions of the original ticket seller. The investigator should look for indicators of aftermarket sales of entertainment admission tickets, such as high volume or frequency of incoming payments from various individuals, correlation between incoming payments and major events or conferences, and discrepancy between the customer's profile and the nature of the transactions. The other options are incorrect because:
A . Embezzling from the hotel is not likely, as it would involve stealing money or property from the hotel by an employee or a person in a position of trust. There is no evidence that Richard Aston works for or has access to the hotel's assets.
C . Human trafficking is not probable, as it would involve exploiting people for forced labor or commercial sexual exploitation. There is no indication that Richard Aston is involved in any form of human trafficking or has any connection to victims or perpetrators.
D . Sports betting is not plausible, as it would involve wagering money on the outcome of sporting events or games. There is no sign that Richard Aston is engaged in any sports betting activity or has any association with bookmakers or gamblers.
Advanced CAMS-FCI Certification | ACAMS, Section 2: Investigating Financial Crimes, page 10
TicketSwap: The safest way to buy and sell tickets
Ticketing 101 | Ticketmaster
10 Types of Tickets For Events (+ Why & When To Use Them) - Eventbrite
Which pattern of activity most strongly indicates an individual is a foreign terrorist fighter?
Answer : B
The pattern of activity that most strongly indicates an individual is a foreign terrorist fighter is a large cash advance on a credit card and purchases at travel and sporting goods websites. This is because this pattern may suggest that the individual is preparing to travel to a conflict zone and purchase equipment or supplies for terrorist activities. According to the United Nations Office on Drugs and Crime, some of the indicators of foreign terrorist fighters include1:
Sudden or increased financial activity, such as cash withdrawals, transfers, or deposits, especially in large amounts or involving foreign currency or locations.
Purchases of travel-related items, such as airline tickets, passports, visas, luggage, or clothing, especially to or from high-risk destinations or transit hubs.
Purchases of items that could be used for terrorist purposes, such as weapons, explosives, chemicals, communication devices, or survival gear.
Changes in behavior, such as expressing radical views, cutting ties with family or friends, joining extremist groups, or displaying signs of emotional distress.
Foreign Terrorist Fighters - United Nations Office on Drugs and Crime
The investigative department of a financial institution (Fl) receives an internal escalation notice from the remittance department for a SWIFT message requesting a refund due to potential fraud. The notice indicates that a total of three international incoming remittances were transferred to a corporate customer from Country A, in the amount of approximately 5 million EUR for each. The first two incoming remittances had been exchanged into currency B and transferred out to Country B a few days ago. The third incoming remittance has been held by the remittance department.
As noted from the KYC profile, the corporate customer is working in the wood industry. with the last account review completed 3 months ago. Since the account's opening. there has been no history of a large amount of funds flowing through the account. The investigator conducts an Internet search and finds that the remitter is a food beverage company.
The same morning, the investigator receives a call from a financial intelligence unit (FIU) inquiring about the same incident. The FIU states that it will issue a warrant to freeze the account on the same day.
After further review, the decision is made that transactions appear suspicious. Which are the next steps the investigator should take? (Select Two.)
Answer : C, E
The correct answer is C and E. The investigator should provide additional information to the LE upon receiving a formal request, and gather all the information that would be useful for LE and recommend filing a SAR/STR. These steps are consistent with the best practices of conducting financial crime investigations and reporting suspicious activity. The investigator should not close the customer's accounts or the investigation, as this may interfere with the ongoing LE inquiry and violate the FI's policies and procedures. The investigator should also not contact local LE directly, as this may compromise the confidentiality of the investigation and the FIU's authority. Reference:
Advanced CAMS-FCI Study Guide, Chapter 4: Reporting Suspicious Activity, pages 40-411
Advanced CAMS-FCI Study Guide, Chapter 5: Governance of an AFC Investigations Unit, pages 48-491
Advanced CAMS-FCI Certification | ACAMS
A client with many personal and business deposits with the financial institution (Fl) seeks a business loan. The client wants to guarantee the loan with a trust for which they are the beneficiary.
An investigator examines the trust. The trust has many layers, including shell companies in known tax havens. The client's ultimate beneficial ownership claim cannot be validated, and the loan is denied.
Two months later, the Fl receives a law enforcement (LE) request on one of the client's business accounts. While reviewing the business account, the Fl receives another LE request on the same account from another agency. The requested information is shared.
Three months later, a branch manager receives a request to open a business deposit account related to a complex trust. The manager forwarded the request because of the complexity. The trust was the same as the previously examined trust, but the request came from a different client. The second client also has many accounts with the Fl. Further inspection finds links between the second client and the Paradise Papers. The Papers state the client led illegal activities and committed tax evasion.
What steps should the investigator take to review the accounts held by the second client who is listed in the Paradise Papers? (Select Two.)
Answer : A, D, D
The investigator should recommend a SAR/STR be filed regarding the second client's use of a questionable trust to open an account, as this could indicate an attempt to conceal the source and ownership of funds, and to evade taxes and sanctions. The investigator should also monitor all accounts and entities related to the second client, as they may be involved in illegal activities or pose a high risk to the FI. The investigator should not review all accounts that have opened trust accounts, as this would be too broad and inefficient. The investigator should not inform FI management of deficiencies in their AML program, as this is not their role or responsibility. The investigator should not inform FI management of the start of a serious risk-based investigation, as this may compromise the confidentiality and integrity of the investigation.
A client with many personal and business deposits with the financial institution (Fl) seeks a business loan. The client wants to guarantee the loan with a trust for which they are the beneficiary.
An investigator examines the trust. The trust has many layers, including shell companies in known tax havens. The client's ultimate beneficial ownership claim cannot be validated, and the loan is denied.
Two months later, the Fl receives a law enforcement (LE) request on one of the client's business accounts. While reviewing the business account, the Fl receives another LE request on the same account from another agency. The requested information is shared.
Three months later, a branch manager receives a request to open a business deposit account related to a complex trust. The manager forwarded the request because of the complexity. The trust was the same as the previously examined trust, but the request came from a different client. The second client also has many accounts with the Fl. Further inspection finds links between the second client and the Paradise Papers. The Papers state the client led illegal activities and committed tax evasion.
What steps should the investigator perform in reference to the first client's existing accounts? (Select Three.)
Answer : A, D, F
The investigator should review all client-signed documents relating to all accounts (A) to check for any discrepancies or red flags. The investigator should also perform secondary scans of the client's other owners/authorized signers (D) to identify any possible connections or associations with the second client or the Paradise Papers. Additionally, the investigator should prepare a relationship flow chart of all existing accounts (F) to better understand the client's activities and patterns. These steps are consistent with the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, which states that investigators should ''review all relevant documentation, including account opening documents, transaction records, and customer correspondence'' (p. 23), ''conduct enhanced due diligence on all parties involved in the investigation'' (p. 24), and ''use data visualization tools to map out complex relationships and transactions'' (p. 25).
Which is a key characteristic of the Financial Action Task Force (FATF) Regional Style Bodies for combatting money laundering/terrorist financing?
Answer : B
According to the CAMS study guide, the Financial Action Task Force (FATF) Regional Style Bodies are organizations created by the FATF to promote the implementation of anti-money laundering and countering the financing of terrorism (AML/CFT) measures in specific regions. One of the key characteristics of these bodies is the implementation of regional mutual evaluation procedures.
Regional mutual evaluations involve member countries evaluating each other's AML/CFT regimes to identify strengths and weaknesses and to develop best practices for improvement. This process allows for greater cooperation between countries and can help to identify and address regional AML/CFT risks more effectively. It also promotes consistency in AML/CFT standards and practices within the region.
Law enforcement (LE) suspects human trafficking to occur during a major sporting event LE officers asked several financial institutions (FIs) to monitor financial transactions occurring before, during, and after the event.
An investigator identified a pattern linked to a business. The business' account received multiple even dollar deposits between midnight and 4:00 AM. They occurred each day for several days prior to the date of the sporting event. Also, large cash deposits, typically between 2,000 USD and 3,000 USD. made by a person to the business' account occurred in many branches in the days after the sports event.
There was little information about the company. The company did not have any history of employee payroll expenses or paying taxes. Expenses from the business account included air travel and hotel expenses. Searches about the person making cash deposits showed little. An online social media platform webpage with the individual's name showed ads for dates1' and "companionship."
The Fl wants to create an automated alert for human trafficking money laundering after this investigation. Which activity type should they target?
Answer : B
The activity type that the FI should target for creating an automated alert for human trafficking money laundering is multiple deposits between midnight and 4:00 AM (B). This is because this pattern is consistent with the indicators of human trafficking identified by the Financial Action Task Force (FATF) and the Egmont Group1, which include:
Frequent cash deposits, often in round amounts, outside of normal business hours
Deposits made at different branches or ATMs in various locations
Lack of information about the nature and purpose of the business
Involvement in online platforms that advertise sexual services
Expenses related to travel and accommodation
The other options are not as relevant or specific as option B. Payments made to multiple hotels in the same city (A) could be a legitimate business expense or a sign of other types of money laundering, such as tax evasion or fraud. Deposits made within days of major sporting events could also be explained by other factors, such as increased tourism or gambling. Payments made for virtual currency (D) are not directly related to human trafficking, although they could be used to facilitate money laundering in general.
Law enforcement agents arrive at a broker-dealer's premises with a search warrant. In addition to cooperation with the warrant, which instructions should the person in charge of the broker-dealer provide to their employees?
Answer : A
The instruction that the person in charge of the broker-dealer should provide to their employees is to take notes on the questions and comments made by the agents (A). This is because taking notes can help the employees to recall and document what happened during the search warrant execution, which can be useful for legal or regulatory purposes. According to ACAMS3, ''the FI should instruct its staff to cooperate with LE agents during a search warrant execution, but also to take notes of what is being searched, seized, or asked by the agents'' (p. 35). The FI should also ''keep copies of any documents or records that are taken by LE agents'' (p. 35).
The other instructions are not correct. The person in charge of the broker-dealer should not instruct their employees to sign consent forms permitting the agents to search employees' offices (B), as this is unnecessary and potentially risky, as the agents already have a valid search warrant that authorizes them to search the premises. The person in charge of the broker-dealer should not instruct their employees to provide agents with unlimited access to customers' personal data , as this could violate privacy or data protection laws, as well as compromise customer trust and confidentiality. The person in charge of the broker-dealer should not instruct their employees to volunteer information not requested by the agents that they think may be useful (D), as this could interfere with the LE investigation or expose them to legal or regulatory risks.
Introduction to Transnational Organized Crime
ACAMS Law Enforcement and Financial Crimes Investigations eLearning Course Module
Law Enforcement Requests and Actions
An analyst reviews an alert for high volume Automated Clearing House (ACH) activity in an account. The analyst's initial research finds the account is for a commercial daycare account that receives high volumes of large government-funded ACH transactions to support the programs. The account activity consists of checks (cheques) made payable to individual names in varying dollar amounts. One check indicates rent to another business.
An Internet search finds that the daycare company owner has previous government-issued violations for safety and classroom size needs, such as not having enough chairs and tables per enrollee. These violations were issued to a different daycare name.
Simultaneous to this investigation, another analyst sends an email about negative news articles referencing local child/adult daycare companies misusing governmental grants. This prompts the financial institution (Fl) to search all businesses for names containing 'daycare' or *care'. Text searches return a number of facilities as customers at the Fl and detects that three of these businesses have a similar transaction flow of high volume government ACH funding with little to no daycare expenses.
Which red flags would be an indicator that activity is connected to a corruption/bribery typology? (Select Two.)
Answer : A, B
The red flags that would be an indicator that activity is connected to a corruption/bribery typology are large checks issued to various individuals with the memos noting ''gift'', ''thank you'', ''favor'' (A) and negative news found on the customer related to government-issued violations for safety (B). These red flags suggest that the customer is involved in paying or receiving bribes or kickbacks to or from government officials or other parties in exchange for favorable treatment or contracts. These red flags are consistent with some of the indicators of corruption/bribery identified by ACAMS1, such as:
Payments made to or from third parties that are not directly related to the business
Payments made to or from high-risk jurisdictions or sectors
Payments made with vague or incomplete descriptions or justifications
Negative news or reputation of the customer or its associates
The other options are not as relevant or indicative of corruption/bribery as options A and B. Checks issued to an unrelated entity referencing ''rent'' and ''utilities'' in the memos could be a legitimate business expense or a sign of other types of fraud or money laundering, such as tax evasion or shell company schemes. Multiple daycare locations with no active business operations or related account activity (D) could also be a sign of other types of fraud or money laundering, such as embezzlement or front company schemes. The same beneficial owner owning several daycare centers in different locations (E) could be a normal or legitimate business practice, depending on the size, location, and profitability of the centers.
Which actions should financial institutions perform to ensure proper data governance? (Select Three.)
Answer : A, B, D
Financial institutions should perform the following actions to ensure proper data governance:
Establish an appropriate data management method for collecting and storing information. This is important to ensure that the data is consistent, reliable, and accessible for various purposes, such as risk assessment, compliance reporting, and customer service. Data management methods may include defining data standards, policies, and procedures; implementing data quality controls and validation checks; and using appropriate data storage systems and formats.
Ensure the accuracy of customer identification records and transaction records and appropriately manage data as a prerequisite for the effective use of IT systems. This is important to comply with the anti-money laundering and counter-terrorist financing (AML/CFT) requirements, such as customer due diligence, transaction monitoring, and suspicious activity reporting. Accurate and complete customer and transaction data also enables financial institutions to use IT systems more effectively for data analysis, risk management, and decision making.
Periodically validate integrity and accuracy of information used for IT systems such as customer information, customer identification records, and transaction records. This is important to ensure that the data remains up-to-date, relevant, and reliable over time. Data validation may include verifying the source and quality of the data; identifying and correcting any errors or inconsistencies; and updating or deleting any obsolete or redundant data.
Data Governance for Financial Institutions - Capgemini
Small and Medium-Sized Deposit-Taking Institutions (SMSBs) Capital and Liquidity Requirements - OSFI
How does the Financial Action Task Force (FATF) measure the effectiveness of a country's efforts to combat money laundering and terrorist financing?
Answer : A
'The FATF measures the effectiveness of a country's efforts to combat money laundering and terrorist financing through a mutual evaluation process. During a mutual evaluation, the FATF assesses a country's legal and institutional framework, its implementation of measures to combat money laundering and terrorist financing, and the effectiveness of its efforts. The FATF then issues a report with recommendations for improvement' [CAMS Study Guide 6th edition, page 15-16].
The investigative department of a financial institution (Fl) receives an internal escalation notice from the remittance department for a SWIFT message requesting a refund due to potential fraud. The notice indicates that a total of three international incoming remittances were transferred to a corporate customer from Country A, in the amount of approximately 5 million EUR for each. The first two incoming remittances had been exchanged into currency B and transferred out to Country B a few days ago. The third incoming remittance has been held by the remittance department.
As noted from the KYC profile, the corporate customer is working in the wood industry. with the last account review completed 3 months ago. Since the account's opening. there has been no history of a large amount of funds flowing through the account. The investigator conducts an Internet search and finds that the remitter is a food beverage company.
The same morning, the investigator receives a call from a financial intelligence unit (FIU) inquiring about the same incident. The FIU states that it will issue a warrant to freeze the account on the same day.
Which steps for documenting the final investigation decision are appropriate for the investigator in this scenario?
Answer : C
The investigator should document the investigation process and retain all relevant documents in the case management system. This is because documenting the investigation process is a good practice to ensure the quality and consistency of the investigation, as well as to facilitate the review and audit of the investigation. Retaining all relevant documents is also important to support the evidence and findings of the investigation, as well as to comply with the record-keeping requirements of the relevant authorities. The other options are incorrect because:
A . Excluding any open-source information from record-keeping is not advisable, as open-source information can provide valuable insights and context for the investigation, and may not be easily retrievable in the future.
B . Adding all of the information the FI has about the subject, their account(s) activity, research results, KYC information, etc. to the SAR/STR is not necessary, as the SAR/STR should only contain the essential information that is relevant and material to the suspicious activity. Adding too much information may obscure the main points and make the SAR/STR less effective.
D . Not documenting the investigation process if a SAR/STR is not filed is not acceptable, as the investigation process should be documented regardless of the outcome. Documenting the investigation process can help justify why a SAR/STR was not filed, and also provide a reference for future investigations involving the same subject or activity.
Advanced CAMS-FCI Certification | ACAMS, Section 3: Reporting Suspicious Activity, page 14
Leading Complex Investigations Certificate | ACAMS, Module 4: Documenting Your Investigation, page 4
An investigator at a corporate bank is conducting transaction monitoring alerts clearance.
KYC profile background: An entity customer, doing business offshore in Hong Kong, established a banking business relationship with the bank since 2017 for deposit and loan purposes. It acts as an offshore investment holding company. The customer declared that the ongoing source of funds to this account comes from group-related companies.
* X is the UBO. and owns 97% shares of this entity customer;
* Y is is the authorized signatory of this entity customer. This entity customer was previously the subject of a SAR/STR.
KYC PROFILE
Customer Name: AAA International Company. Ltd
Customer ID: 123456
Account Opened: June 2017
Last KYC review date: 15 Nov 2020
Country and Year of Incorporation: The British Virgin Islands, May 2017
AML risk level: High
Account opening and purpose: Deposits, Loans and Trade Finance
Anticipated account activities: 1 to 5 transactions per year and around 1 million per
transaction amount
During the investigation, the investigator reviewed remittance transactions activities for the period from Jul 2019 to Sep 2021 and noted the following transactions pattern:
TRANSACTION JOURNAL
Review dates: from July 2019 to Sept 2021
For Hong Kong Dollars (HKD) currency:
Incoming transactions: 2 inward remittances of around 1.88 million HKD in total from
different third parties
Outgoing transactions: 24 outward remittances of around 9 4 million HKD in total to
different third parties
For United States Dollars (USD) currency:
Incoming transactions: 13 inward remittances of around 3.3 million USD in total from
different third parties
Outgoing transactions: 10 outward remittances of around 9.4 million USD in total to
different third parties.
RFI Information and Supporting documents:
According to the RFI reply received on 26 May 2021, the customer provided the bank
with the information below:
1) All incoming funds received in HKD & USD currencies were monies lent from non-customers of the bank. Copies of loan agreements had been provided as supporting documents. All of the loan agreements were in the same format and all the lenders are engaged in trading business.
2) Some loan agreements were signed among four parties, including among lenders. borrower (the bank's customer), guarantor, and guardian with supplemental agreements, which stated that the customer, as a borrower, who failed to repay the loan
After reviewing the transaction journal, request for information response, and supporting documentation, the investigator determines that additional information is needed. Which additional information should the investigator request?
Answer : C
The additional information that the investigator should request is the source of the incoming funds to the group-related companies. This is because the customer declared that the ongoing source of funds to this account comes from group-related companies, but the transaction journal shows that the customer received funds from different third parties, not from group-related companies. Therefore, the investigator should verify the relationship and legitimacy of these third parties and their funds with the customer and the group-related companies. The other options are not relevant or necessary for this investigation.
When crafting internal procedures on writing and submitting SARs/STRs, one should:
Answer : B
When writing and submitting SARs/STRs, one should consider the guidelines issued by the national financial intelligence unit (FIU) and local regulator and incorporate any country-specific requirements. This ensures that the reports are compliant with the relevant laws and regulations and provide useful information to the authorities. The other options are either incorrect or not best practices.
Which statement most accurately characterizes the methods used by transnational criminal organizations?
Answer : C
The statement that most accurately characterizes the methods used by transnational criminal organizations is that they routinely engage in many different types of criminal activities as long as they think it will benefit them . This is because transnational criminal organizations are flexible and adaptable, and they exploit opportunities and vulnerabilities in different markets and jurisdictions. According to ACAMS2, ''Transnational criminal organizations are involved in a wide range of illicit activities, such as drug trafficking, human trafficking, arms trafficking, money laundering, cybercrime, environmental crime, fraud, corruption, and terrorism'' (p. 3). They also ''operate across borders and regions, using complex networks and structures to evade detection and prosecution'' (p. 3).
The other statements are not as accurate or comprehensive as option C. Transnational criminal organizations are unlikely to associate with known terrorist organizations due to the reputational risks (A) is false, as transnational criminal organizations may collaborate or cooperate with terrorist organizations for mutual benefit or convenience, such as sharing resources, routes, or contacts. Transnational criminal organizations are likely to specialize in one particular method and continue to refine that method to escape detection (B) is false, as transnational criminal organizations may diversify or change their methods depending on the circumstances or opportunities, such as shifting products, markets, or modus operandi. Transnational criminal organizations see each other as competitors and rarely cooperate (D) is false, as transnational criminal organizations may form alliances or partnerships with other criminal groups for strategic or tactical reasons, such as sharing information, expertise, or influence.
An AML investigator at a bank identifies an unusually high number of deposits from a few customers resulting from the encashment of multiple gambling tickets from a legitimate gambling company. It is noted that the transactions are inconsistent with the customers' profiles and that reverse (corrective) transactions did not occur. Which suspicious activity is most likely?
Answer : A
The correct answer is A because this scenario describes a possible case of ticket laundering, which is a form of money laundering where criminals use gambling tickets to disguise the source of their illicit funds. The customers who deposit the tickets are either complicit or unaware of the scheme, and they receive a commission or a fee for their service. The other options are not likely because they do not explain why the customers would deposit multiple tickets from the same gambling company and withdraw cash the next day.
CLIENT INFORMATION FORM Client Name: ABC Tech Corp Client I.D. Number: 08125 Name: ABC Tech Corp Registered Address: Mumbai, India Work Address: Mumbai. India Cell Phone: ***"--- Alt Phone: Email: ********
Client Profile Information:
Sector: Financial
Engaged in business from (date): 02 Jan 2020
Sub-sector: Software-Cryptocurrency Exchange
Expected Annual Transaction Amount: 125.000 USD
Payment Nature: Transfer received from client's fund
Received from: Clients
Received for: Sale of digital assets
The client identified themselves as "Cryptocurrency Exchange" Client has submitted the limited liability partnership deed. However, the bank's auditing team is unable to identify the client's exact business profile as the cryptocurrency exchange specified by the client as their major business awaits clearance from the country's regulator. The client has submitted documents/communications exchanged with the regulator and has cited the lack of governing laws in the country of their operation as the reason for the delay.
Investigators determine the ultimate beneficial owner of ABC Tech Corp is a high-net-worth client. The client owns a real estate agency left to her when her spouse died. The spouse provided seed capital for ABC Tech Corp through a direct 1,000.000 Great British Pound (GBP) deposit.
What additional information would trigger filing a SAR/STR?
Answer : D
The additional information that would trigger filing a SAR/STR is the fact that the funds for the seed capital were in the form of 50 cashier's checks of 10,000 GBP each and 50 money orders of 10,000 GBP. This is because this indicates a possible attempt to avoid the reporting threshold of 10,000 GBP for cash transactions, which is a common money laundering technique known as structuring or smurfing12. The other options are not necessarily suspicious, as they do not involve cash transactions or indicate any illicit source of funds. The fact that the client's spouse was a PEP does not automatically make the transaction suspicious unless there are other red flags or risk factors associated with the PEP34
The intended benefits of section 314(b) of the USA PATRIOT Act include: (Select Three.)
Answer : B, E, F
Section 314(b) of the USA PATRIOT Act allows financial institutions to share information with each other, under a safe harbor that offers protection from liability, in order to better identify and report potential money laundering or terrorist financing activities. The intended benefits of this information sharing include:
Participating financial institutions sharing information about suspicious activity by customers that may have otherwise gone unnoticed. For example, if a customer is conducting transactions with multiple financial institutions that individually do not appear suspicious, but collectively indicate a pattern of money laundering or terrorist financing, the financial institutions can share this information and report it to the authorities.
Detecting money laundering and terrorist financing approaches and schemes across multiple financial institutions. For example, if a financial institution identifies a new typology or modus operandi of money laundering or terrorist financing, it can share this information with other financial institutions to help them prevent or detect similar activities by their customers.
Obtaining additional information on customers or transactions regarding potential money laundering or terrorist financing. For example, if a financial institution has incomplete or insufficient information on a customer or a transaction that raises suspicion, it can request more information from another financial institution that may have dealt with the same customer or transaction.
Section 314(b) | FinCEN.gov
Section 314(b) Fact Sheet - FinCEN.gov
During transaction monitoring. Bank A learns that one of their customers. Med Supplies 123. is attempting to make a payment via wire totaling 382,500 USD to PPE Business LLC located in Mexico to purchase a large order of personal protective equipment. specifically surgical masks and face shields. Upon further verification. Bank A decides to escalate and refers the case to investigators.
Bank A notes that, days prior to the above transaction, the same customer went to a Bank A location to wire 1,215,280 USD to Breath Well LTD located in Singapore. Breath Well was acting as an intermediary to purchase both 3-ply surgical masks and face shields from Chin
a. Bank A decided not to complete the transaction due to concerns with the involved supplier in China. Moreover, the customer is attempting to send a third wire in the amount of 350,000 USD for the purchase of these items, this time using a different vendor in China. The investigator must determine next steps in the investigation and what actions, if any. should be taken against relevant parties.
During the investigation, Bank A receives a USA PATRIOT Act Section 314(a) request related to Med Supplies 123. Which steps should the investigator take when fulfilling the request? (Select Three.)
Answer : D, E, F
According to the FinCEN's 314(a) Fact Sheet1, the steps that the investigator should take when fulfilling the request are:
Search its records expeditiously to determine whether it maintains(ed) any accounts for the subject(s) listed in the request. This is option F.
Report back to the Financial Crimes Enforcement Network (FinCEN) within 15 days of receipt of the request via a secure internet website. This is option E.
Report to Financial Crimes Enforcement Network (FinCEN) that a match was found without revealing any other details. This is option D.
The other options are incorrect because:
Exiting the relationship with the business since it appears that customer is under investigation is not required by the 314(a) program and may interfere with law enforcement's investigation. This is option A.
Not responding to Financial Crimes Enforcement Network (FinCEN) if the requested information is not present in the financial institution's system of records is contrary to the 314(a) program, which requires financial institutions to respond whether or not they have a match. This is option B.
Reviewing the account(s) activity and proactively filing a SAR/STR using the 314(a) request as the basis for the filing is not appropriate, as the 314(a) request itself is not a sufficient reason to file a SAR/STR. The financial institution should only file a SAR/STR if it has its own independent suspicion of money laundering or terrorist financing. This is option C.
An analyst reviews an alert for high volume Automated Clearing House (ACH) activity in an account. The analyst's initial research finds the account is for a commercial daycare account that receives high volumes of large government-funded ACH transactions to support the programs. The account activity consists of checks (cheques) made payable to individual names in varying dollar amounts. One check indicates rent to another business.
An Internet search finds that the daycare company owner has previous government-issued violations for safety and classroom size needs, such as not having enough chairs and tables per enrollee. These violations were issued to a different daycare name.
Simultaneous to this investigation, another analyst sends an email about negative news articles referencing local child/adult daycare companies misusing governmental grants. This prompts the financial institution (Fl) to search all businesses for names containing daycare' or care*. Text searches return a number of facilities as customers at the Fl and detects that three of these businesses have a similar transaction flow of high volume government ACH funding with little to no daycare expenses.
The analyst determines that site visits should be conducted for the three daycare businesses. Which observations at the on-site visits would justify writing a SAR/STR? (Select Three.)
Answer : A, C, F
The observations at the on-site visits that would justify writing a SAR/STR are signs of severe wear and poor maintenance at the site (A), lights turned off at the site during operational hours , and a full parking lot of cars with no staff at the site (F). These observations suggest that the daycare businesses are not operating legitimately or providing adequate services to their customers, and that they may be misusing governmental grants or laundering money through their accounts. These observations are consistent with some of the red flags for fraud identified by ACAMS2, such as:
Inadequate facilities or equipment for the type of business
Lack of visible activity or customers at the business location
Discrepancy between reported income and expenses
Unusual volume or frequency of transactions
The other observations are not as relevant or indicative of fraud as options A, C, and F. A site located in a commercial building (B) could be a normal or legitimate choice for a daycare business, depending on its size, location, and availability. Visible attendance with children being dropped off by parents (D) could show that the daycare business is providing genuine services to its customers, although it does not rule out possible fraud or money laundering. Visible signage indicating the purpose of building (E) could also show that the daycare business is transparent and legitimate, although it does not guarantee its quality or compliance.
A bank investigator notices an account receiving multiple deposits from the same employer under different employees' names. A cash withdrawal occurs one day after each deposit. The outcome of this investigation will likely uncover which crime typology?
Answer : D
The correct answer is A because this scenario describes a possible case of human trafficking, which is a crime where people are exploited for labor or sexual services against their will. Human traffickers may use bank accounts to launder their proceeds and pay their victims, and they may use fake or stolen identities to avoid detection. The other options are not likely because they do not explain why multiple deposits from the same employer under different employees' names would occur, nor why cash withdrawals would follow each deposit.
Law enforcement (LE) suspects human trafficking to occur during a major spotting event. LE officers asked several financial institutions (FIs) to monitor financial transactions occurring before, during, and after the event.
An investigator identified a pattern linked to a business. The business* account received multiple even dollar deposits between midnight and 4:00 AM. They occurred each day for several days prior to the date of the sporting event. Also, large cash deposits, typically between 2,000 USD and 3.000 USD. made by a person to the business' account occurred in many branches in the days alter the sports event.
There was little information about the company. The company did not have any history of employee payroll expenses or paying taxes. Expenses from the business account included air travel and hotel expenses. Searches about the person making cash deposits showed little. An online social media platform webpage with the individual's name showed ads for dates" and "companionship."
Which fact should not be included in (he SAR/STR narrative?
Answer : B
The fact that should not be included in the SAR/STR narrative is the request by law enforcement (D). This is because the request by law enforcement is confidential and should not be disclosed to the customer or anyone else who is not authorized to know it. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should not include any reference to the LE request in the SAR/STR narrative, as this could compromise the LE investigation or alert the customer of the suspicion'' (p. 35). The FI should also not inform the customer of the LE request or delay filing the SAR/STR because of it.
The other facts should be included in the SAR/STR narrative, as they are relevant and indicative of human trafficking money laundering. The air travel and hotel expenses (A) show that the customer is involved in moving people across different locations, which could be a sign of human smuggling or trafficking. The time of the cash deposits (B) shows that the customer is receiving cash payments during unusual hours, which could be a sign of illicit activities or services. The sporting event shows that the customer is exploiting a high-demand situation for their business, which could be a sign of opportunistic or organized crime.
Law enforcement (LE) suspects human trafficking to occur during a major sporting event LE officers asked several financial institutions (FIs) to monitor financial transactions occurring before, during, and after the event.
An investigator identified a pattern linked to a business. The business' account received multiple even dollar deposits between midnight and 4:00 AM. They occurred each day for several days prior to the date of the sporting event. Also, large cash deposits, typically between 2,000 USD and 3,000 USD. made by a person to the business' account occurred in many branches in the days after the sports event.
There was little information about the company. The company did not have any history of employee payroll expenses or paying taxes. Expenses from the business account included air travel and hotel expenses. Searches about the person making cash deposits showed little. An online social media platform webpage with the individual's name showed ads for dates1' and "companionship."
The Fl wants to create an automated alert for human trafficking money laundering after this investigation. Which activity type should they target?
Answer : B
The activity type that the FI should target for creating an automated alert for human trafficking money laundering is multiple deposits between midnight and 4:00 AM (B). This is because this pattern is consistent with the indicators of human trafficking identified by the Financial Action Task Force (FATF) and the Egmont Group1, which include:
Frequent cash deposits, often in round amounts, outside of normal business hours
Deposits made at different branches or ATMs in various locations
Lack of information about the nature and purpose of the business
Involvement in online platforms that advertise sexual services
Expenses related to travel and accommodation
The other options are not as relevant or specific as option B. Payments made to multiple hotels in the same city (A) could be a legitimate business expense or a sign of other types of money laundering, such as tax evasion or fraud. Deposits made within days of major sporting events could also be explained by other factors, such as increased tourism or gambling. Payments made for virtual currency (D) are not directly related to human trafficking, although they could be used to facilitate money laundering in general.
Which information is it best practice to share at the very beginning of a well-written SAR/STR narrative?
Answer : B
The best information to share at the very beginning of a well-written SAR/STR narrative is the purpose of the SAR/STR narrative and a general description of the known or alleged violation. This is because this information provides an overview of why the SAR/STR is being filed and what type of suspicious activity or transaction is involved. It also helps to capture the attention of the reader and set the tone for the rest of the narrative.
A client at a financial institution deposits large amounts of money into an account, and almost immediately, the funds are then distributed to numerous individuals' accounts. The transaction activity described in the scenario is a pattern of:
Answer : B
Deposit trading is a pattern of suspicious activity where a client deposits large amounts of money into an account, and then transfers the funds to other accounts, often in different jurisdictions or countries. This could be an attempt to disguise the source or destination of the funds, or to avoid reporting requirements. Deposit trading is also known as layering, which is the second stage of money laundering.
Which might suggest misuse of crowdfunding resources by a terrorist?
Answer : D
The purchase of airplane tickets after receiving multiple small deposits from a crowdfunding platform might suggest that the funds are being used to facilitate travel for terrorist purposes. The other options are not necessarily indicative of terrorist financing, as they could be explained by legitimate reasons or other types of financial crimes.
Refer to the exhibit.

During a review of the accounts related to Richard Aston, an investigator notices a high number of incoming payments from various individuals. They also notice that these incoming payments typically occur during large sporting events or conferences. As a result of the account review, of which illegal activity does the investigator have reasonable grounds to suspect Richard Aston?
Answer : B
The illegal activity that the investigator has reasonable grounds to suspect Richard Aston of is aftermarket sales of entertainment admission tickets. This is because aftermarket sales of entertainment admission tickets involve reselling tickets for events, concerts, festivals, etc. at a higher price than their face value, often through online platforms or scalpers. This practice can be illegal or unethical, depending on the jurisdiction and the terms and conditions of the original ticket seller. The investigator should look for indicators of aftermarket sales of entertainment admission tickets, such as high volume or frequency of incoming payments from various individuals, correlation between incoming payments and major events or conferences, and discrepancy between the customer's profile and the nature of the transactions. The other options are incorrect because:
A . Embezzling from the hotel is not likely, as it would involve stealing money or property from the hotel by an employee or a person in a position of trust. There is no evidence that Richard Aston works for or has access to the hotel's assets.
C . Human trafficking is not probable, as it would involve exploiting people for forced labor or commercial sexual exploitation. There is no indication that Richard Aston is involved in any form of human trafficking or has any connection to victims or perpetrators.
D . Sports betting is not plausible, as it would involve wagering money on the outcome of sporting events or games. There is no sign that Richard Aston is engaged in any sports betting activity or has any association with bookmakers or gamblers.
Advanced CAMS-FCI Certification | ACAMS, Section 2: Investigating Financial Crimes, page 10
TicketSwap: The safest way to buy and sell tickets
Ticketing 101 | Ticketmaster
10 Types of Tickets For Events (+ Why & When To Use Them) - Eventbrite
Which actions should financial institutions perform to ensure proper data governance? (Select Three.)
Answer : A, B, D
Financial institutions should perform the following actions to ensure proper data governance:
Establish an appropriate data management method for collecting and storing information. This is important to ensure that the data is consistent, reliable, and accessible for various purposes, such as risk assessment, compliance reporting, and customer service. Data management methods may include defining data standards, policies, and procedures; implementing data quality controls and validation checks; and using appropriate data storage systems and formats.
Ensure the accuracy of customer identification records and transaction records and appropriately manage data as a prerequisite for the effective use of IT systems. This is important to comply with the anti-money laundering and counter-terrorist financing (AML/CFT) requirements, such as customer due diligence, transaction monitoring, and suspicious activity reporting. Accurate and complete customer and transaction data also enables financial institutions to use IT systems more effectively for data analysis, risk management, and decision making.
Periodically validate integrity and accuracy of information used for IT systems such as customer information, customer identification records, and transaction records. This is important to ensure that the data remains up-to-date, relevant, and reliable over time. Data validation may include verifying the source and quality of the data; identifying and correcting any errors or inconsistencies; and updating or deleting any obsolete or redundant data.
Data Governance for Financial Institutions - Capgemini
Small and Medium-Sized Deposit-Taking Institutions (SMSBs) Capital and Liquidity Requirements - OSFI
When writing or reviewing a SAR/STR, it is important to:
Answer : A
The correct answer is A because a SAR/STR narrative should be concise, clear, and complete, addressing the who, what, when, where, why, and how of the suspicious activity. Option B is incorrect because providing too much information can make the narrative confusing and irrelevant. Option C is incorrect because the introduction should provide a summary of the suspicious activity, not the conclusion. Option D is incorrect because suspect names should be mentioned in the narrative to identify the parties involved in the suspicious activity.
An investigator at a corporate bank is conducting transaction monitoring alerts clearance.
KYC profile background: An entity customer, doing business offshore in Hong Kong, established a banking business relationship with the bank since 2017 for deposit and loan purposes. It acts as an offshore investment holding company. The customer declared that the ongoing source of funds to this account comes from group-related companies.
* X is the UBO. and owns 97% shares of this entity customer;
* Y is is the authorized signatory of this entity customer. This entity customer was previously the subject of a SAR/STR.
KYC PROFILE
Customer Name: AAA International Company. Ltd
Customer ID: 123456
Account Opened: June 2017
Last KYC review date: 15 Nov 2020
Country and Year of Incorporation: The British Virgin Islands, May 2017
AML risk level: High
Account opening and purpose: Deposits, Loans and Trade Finance
Anticipated account activities: 1 to 5 transactions per year and around 1 million per
transaction amount
During the investigation, the investigator reviewed remittance transactions activities for the period from Jul 2019 to Sep 2021 and noted the following transactions pattern:
TRANSACTION JOURNAL
Review dates: from July 2019 to Sept 2021
For Hong Kong Dollars (HKD) currency:
Incoming transactions: 2 inward remittances of around 1.88 million HKD in total from
different third parties
Outgoing transactions: 24 outward remittances of around 9 4 million HKD in total to
different third parties
For United States Dollars (USD) currency:
Incoming transactions: 13 inward remittances of around 3.3 million USD in total from
different third parties
Outgoing transactions: 10 outward remittances of around 9.4 million USD in total to
different third parties.
RFI Information and Supporting documents:
According to the RFI reply received on 26 May 2021, the customer provided the bank
with the information below:
1) All incoming funds received in HKD & USD currencies were monies lent from non-customers of the bank. Copies of loan agreements had been provided as supporting documents. All of the loan agreements were in the same format and all the lenders are engaged in trading business.
2) Some loan agreements were signed among four parties, including among lenders. borrower (the bank's customer), guarantor, and guardian with supplemental agreements, which stated that the customer, as a borrower, who failed to repay the loan
After reviewing the transaction journal, request for information response, and supporting documentation, the investigator determines that additional information is needed. Which additional information should the investigator request?
Answer : C
The additional information that the investigator should request is the source of the incoming funds to the group-related companies. This is because the customer declared that the ongoing source of funds to this account comes from group-related companies, but the transaction journal shows that the customer received funds from different third parties, not from group-related companies. Therefore, the investigator should verify the relationship and legitimacy of these third parties and their funds with the customer and the group-related companies. The other options are not relevant or necessary for this investigation.
Which action is part of the enhanced due diligence process?
Answer : A
One of the actions that is part of the enhanced due diligence process is collecting beneficial ownership details regarding the client's account. This is important to identify the natural persons who ultimately own or control the client, and to assess the potential risks associated with them. According to the Financial Action Task Force (FATF), beneficial ownership information should include1:
The name, nationality, and country of residence of each beneficial owner.
The date of birth or incorporation of each beneficial owner.
The nature and extent of the beneficial interest held by each beneficial owner.
The means by which the beneficial ownership or control is exercised.
FATF Guidance on Transparency and Beneficial Ownership
A criminal is engaged in chain hopping while trying to launder ransomware payments. The criminal will likely:
Answer : B
Chain hopping is a technique used by criminals to obscure the traceability of cryptocurrency transactions by converting the funds to a different type of cryptocurrency, often using multiple exchanges or platforms. The other options are not related to chain hopping. Reference: Advanced CAMS-FCI Study Guide, page 38.
Law enforcement (LE) suspects human trafficking to occur during a major sporting event LE officers asked several financial institutions (FIs) to monitor financial transactions occurring before, during, and after the event.
An investigator identified a pattern linked to a business. The business' account received multiple even dollar deposits between midnight and 4:00 AM. They occurred each day for several days prior to the date of the sporting event. Also, large cash deposits, typically between 2,000 USD and 3,000 USD. made by a person to the business' account occurred in many branches in the days after the sports event.
There was little information about the company. The company did not have any history of employee payroll expenses or paying taxes. Expenses from the business account included air travel and hotel expenses. Searches about the person making cash deposits showed little. An online social media platform webpage with the individual's name showed ads for dates1' and "companionship."
The Fl wants to create an automated alert for human trafficking money laundering after this investigation. Which activity type should they target?
Answer : B
The activity type that the FI should target for creating an automated alert for human trafficking money laundering is multiple deposits between midnight and 4:00 AM (B). This is because this pattern is consistent with the indicators of human trafficking identified by the Financial Action Task Force (FATF) and the Egmont Group1, which include:
Frequent cash deposits, often in round amounts, outside of normal business hours
Deposits made at different branches or ATMs in various locations
Lack of information about the nature and purpose of the business
Involvement in online platforms that advertise sexual services
Expenses related to travel and accommodation
The other options are not as relevant or specific as option B. Payments made to multiple hotels in the same city (A) could be a legitimate business expense or a sign of other types of money laundering, such as tax evasion or fraud. Deposits made within days of major sporting events could also be explained by other factors, such as increased tourism or gambling. Payments made for virtual currency (D) are not directly related to human trafficking, although they could be used to facilitate money laundering in general.
An AML investigator at a bank identifies an unusually high number of deposits from a few customers resulting from the encashment of multiple gambling tickets from a legitimate gambling company. It is noted that the transactions are inconsistent with the customers' profiles and that reverse (corrective) transactions did not occur. Which suspicious activity is most likely?
Answer : A
The correct answer is A because this scenario describes a possible case of ticket laundering, which is a form of money laundering where criminals use gambling tickets to disguise the source of their illicit funds. The customers who deposit the tickets are either complicit or unaware of the scheme, and they receive a commission or a fee for their service. The other options are not likely because they do not explain why the customers would deposit multiple tickets from the same gambling company and withdraw cash the next day.
Which most likely indicates that a business email compromise attack has occurred?
Answer : A
When writing or reviewing a SAR/STR, it is important to ensure that the narrative is kept to the point; easy to read; and addresses the who, what, when, where, why, and how. This is because the narrative is the most crucial part of the SAR/STR, as it provides a clear and concise summary of the suspicious activity or transaction that triggered the report. The narrative should include all the relevant information that would help law enforcement or regulators to understand the nature and context of the activity or transaction, such as123:
The who: The names, addresses, account numbers, and other identifying information of the parties involved in the activity or transaction, such as customers, beneficiaries, intermediaries, or third parties.
The what: The type, amount, frequency, and purpose of the activity or transaction, such as cash deposits, wire transfers, check payments, or purchases of goods or services.
The when: The date, time, and duration of the activity or transaction, and whether it was a one-time occurrence or part of a pattern or trend.
The where: The location or channel of the activity or transaction, such as branches, ATMs, online platforms, or mobile applications.
The why: The reason or rationale for the activity or transaction, and why it was considered suspicious or unusual based on the customer's profile, behavior, or expected activity.
The how: The method or mechanism of the activity or transaction, such as cash, check, debit card, credit card, cryptocurrency, or prepaid card.
How to write the perfect ''Suspicious Activity Reports'' (SAR)? | i-AML
Writing for Prosecution: Best Practices For Composing SAR Narratives That Assist Prosecutors | ACAMS
SAR Writing Examples and Proper Formatting: Write for Your Reader - Alessa
An analyst reviews an alert for high volume Automated Clearing House (ACH) activity in an account. The analyst's initial research finds the account is for a commercial daycare account that receives high volumes of large government-funded ACH transactions to support the programs. The account activity consists of checks (cheques) made payable to individual names in varying dollar amounts. One check indicates rent to another business.
An Internet search finds that the daycare company owner has previous government-issued violations for safety and classroom size needs, such as not having enough chairs and tables per enrollee. These violations were issued to a different daycare name.
Simultaneous to this investigation, another analyst sends an email about negative news articles referencing local child/adult daycare companies misusing governmental grants. This prompts the financial institution (Fl) to search all businesses for names containing 'daycare' or *care'. Text searches return a number of facilities as customers at the Fl and detects that three of these businesses have a similar transaction flow of high volume government ACH funding with little to no daycare expenses.
Which red flags would be an indicator that activity is connected to a corruption/bribery typology? (Select Two.)
Answer : A, B
The red flags that would be an indicator that activity is connected to a corruption/bribery typology are large checks issued to various individuals with the memos noting ''gift'', ''thank you'', ''favor'' (A) and negative news found on the customer related to government-issued violations for safety (B). These red flags suggest that the customer is involved in paying or receiving bribes or kickbacks to or from government officials or other parties in exchange for favorable treatment or contracts. These red flags are consistent with some of the indicators of corruption/bribery identified by ACAMS1, such as:
Payments made to or from third parties that are not directly related to the business
Payments made to or from high-risk jurisdictions or sectors
Payments made with vague or incomplete descriptions or justifications
Negative news or reputation of the customer or its associates
The other options are not as relevant or indicative of corruption/bribery as options A and B. Checks issued to an unrelated entity referencing ''rent'' and ''utilities'' in the memos could be a legitimate business expense or a sign of other types of fraud or money laundering, such as tax evasion or shell company schemes. Multiple daycare locations with no active business operations or related account activity (D) could also be a sign of other types of fraud or money laundering, such as embezzlement or front company schemes. The same beneficial owner owning several daycare centers in different locations (E) could be a normal or legitimate business practice, depending on the size, location, and profitability of the centers.
During transaction monitoring. Bank A learns that one of their customers. Med Supplies 123, is attempting to make a payment via wire totaling 382,500 USD to PPE Business LLC located in Mexico to purchase a large order of personal protective equipment. specifically surgical masks and face shields. Upon further verification. Bank A decides to escalate and refers the case to investigators.
Bank A notes that, days prior to the above transaction, the same customer went to a Bank A location to wire 1,215,280 USD to Breath Well LTD located in Singapore. Breath Well was acting as an intermediary to purchase both 3-ply surgical masks and face shields from Chin
a. Bank A decided not to complete the transaction due to concerns with the involved supplier in China. Moreover, the customer is attempting to send a third wire in the amount of 350,000 USD for the purchase of these items, this time using a different vendor in China. The investigator must determine next steps in the investigation and what actions, if any. should be taken against relevant parties.
Upon further investigation. Bank As investigator learns that both the Mexico- and Singapore-based companies are linked to the alleged suppliers in China. Which additional indicators would the investigator need to identify to determine if this fits a fentanyl (drug) trafficking typology? (Select Two.)
Answer : A, C
The intended benefits of section 314(b) of the USA PATRIOT Act include: (Select Three.)
Answer : B, E, F
Section 314(b) of the USA PATRIOT Act allows financial institutions to share information with each other, under a safe harbor that offers protection from liability, in order to better identify and report potential money laundering or terrorist financing activities. The intended benefits of this information sharing include:
Participating financial institutions sharing information about suspicious activity by customers that may have otherwise gone unnoticed. For example, if a customer is conducting transactions with multiple financial institutions that individually do not appear suspicious, but collectively indicate a pattern of money laundering or terrorist financing, the financial institutions can share this information and report it to the authorities.
Detecting money laundering and terrorist financing approaches and schemes across multiple financial institutions. For example, if a financial institution identifies a new typology or modus operandi of money laundering or terrorist financing, it can share this information with other financial institutions to help them prevent or detect similar activities by their customers.
Obtaining additional information on customers or transactions regarding potential money laundering or terrorist financing. For example, if a financial institution has incomplete or insufficient information on a customer or a transaction that raises suspicion, it can request more information from another financial institution that may have dealt with the same customer or transaction.
Section 314(b) | FinCEN.gov
Section 314(b) Fact Sheet - FinCEN.gov
An investigator at a corporate bank is conducting transaction monitoring alerts clearance.
KYC profile background: An entity customer, doing business offshore in Hong Kong, established a banking business relationship with the bank since 2017 for deposit and loan purposes. It acts as an offshore investment holding company. The customer declared that the ongoing source of funds to this account comes from group-related companies.
* X is the UBO. and owns 97% shares of this entity customer;
* Y is is the authorized signatory of this entity customer. This entity customer was previously the subject of a SAR/STR.
KYC PROFILE
Customer Name: AAA International Company. Ltd
Customer ID: 123456
Account Opened: June 2017
Last KYC review date: 15 Nov 2020
Country and Year of Incorporation: The British Virgin Islands, May 2017
AML risk level: High
Account opening and purpose: Deposits, Loans and Trade Finance
Anticipated account activities: 1 to 5 transactions per year and around 1 million per
transaction amount
During the investigation, the investigator reviewed remittance transactions activities for the period from Jul 2019 to Sep 2021 and noted the following transactions pattern:
TRANSACTION JOURNAL
Review dates: from July 2019 to Sept 2021
For Hong Kong Dollars (HKD) currency:
Incoming transactions: 2 inward remittances of around 1.88 million HKD in total from
different third parties
Outgoing transactions: 24 outward remittances of around 9 4 million HKD in total to
different third parties
For United States Dollars (USD) currency:
Incoming transactions: 13 inward remittances of around 3.3 million USD in total from
different third parties
Outgoing transactions: 10 outward remittances of around 9.4 million USD in total to
different third parties.
RFI Information and Supporting documents:
According to the RFI reply received on 26 May 2021, the customer provided the bank
with the information below:
1) All incoming funds received in HKD & USD currencies were monies lent from non-customers of the bank. Copies of loan agreements had been provided as supporting documents. All of the loan agreements were in the same format and all the lenders are engaged in trading business.
2) Some loan agreements were signed among four parties, including among lenders. borrower (the bank's customer), guarantor, and guardian with supplemental agreements, which stated that the customer, as a borrower, who failed to repay the loan
After reviewing the transaction journal, request for information response, and supporting documentation, the investigator determines that additional information is needed. Which additional information should the investigator request?
Answer : C
The additional information that the investigator should request is the source of the incoming funds to the group-related companies. This is because the customer declared that the ongoing source of funds to this account comes from group-related companies, but the transaction journal shows that the customer received funds from different third parties, not from group-related companies. Therefore, the investigator should verify the relationship and legitimacy of these third parties and their funds with the customer and the group-related companies. The other options are not relevant or necessary for this investigation.
The investigative department of a financial institution (Fl) receives an internal escalation notice from the remittance department for a SWIFT message requesting a refund due to potential fraud. The notice indicates that a total of three international incoming remittances were transferred to a corporate customer from Country A, in the amount of approximately 5 million EUR for each. The first two incoming remittances had been exchanged into currency B and transferred out to Country B a few days ago. The third incoming remittance has been held by the remittance department.
As noted from the KYC profile, the corporate customer is working in the wood industry. with the last account review completed 3 months ago. Since the account's opening. there has been no history of a large amount of funds flowing through the account. The investigator conducts an Internet search and finds that the remitter is a food beverage company.
The same morning, the investigator receives a call from a financial intelligence unit (FIU) inquiring about the same incident. The FIU states that it will issue a warrant to freeze the account on the same day.
After further review, the decision is made that transactions appear suspicious. Which are the next steps the investigator should take? (Select Two.)
Answer : C, E
The correct answer is C and E. The investigator should provide additional information to the LE upon receiving a formal request, and gather all the information that would be useful for LE and recommend filing a SAR/STR. These steps are consistent with the best practices of conducting financial crime investigations and reporting suspicious activity. The investigator should not close the customer's accounts or the investigation, as this may interfere with the ongoing LE inquiry and violate the FI's policies and procedures. The investigator should also not contact local LE directly, as this may compromise the confidentiality of the investigation and the FIU's authority. Reference:
Advanced CAMS-FCI Study Guide, Chapter 4: Reporting Suspicious Activity, pages 40-411
Advanced CAMS-FCI Study Guide, Chapter 5: Governance of an AFC Investigations Unit, pages 48-491
Advanced CAMS-FCI Certification | ACAMS
According to the Financial Action Task Force, as part of their risk assessment, which are important data and information that a Trust and Company Service Provider must understand when establishing and administering a trust? (Select Two.)
Answer : A, D
Here is the exact information from the Financial Action Task Force (FATF) Guidance for a Risk-Based Approach for Trust and Company Service Providers:
'Understanding the management and ownership structure of a trust is crucial in assessing the ML/TF risk it poses. This includes the identity of all settlors, trustees and beneficiaries, and their respective roles and responsibilities, as well as the nature and purpose of the trust.'
'TCSPs should obtain and maintain up-to-date information on the purpose and intended nature of the business relationship, the source of funds and wealth, and where relevant, the source of funds or wealth of the settlor and beneficiaries.'
Based on this information, the correct answers are A and D. Trust and Company Service Providers must understand the responsibility and authority in the structure, as well as the general purpose behind the structure in order to assess the overall risk of the trust and ensure that any transactions with the trust are legitimate.
During a review, an analyst notices discrepancies between a customer's nature of business listed on the business registry and what was stated on the customers application. The analyst should:
Answer : A
The analyst should clarify discrepancies noted in the customer's declared profile given the downstream impact on the risk assessment. This is because discrepancies between the customer's nature of business and the information on the business registry may indicate that the customer is not operating a legitimate business or is trying to conceal its true activities. The analyst should verify the customer's identity, source of funds, and purpose of transactions to ensure that the customer's risk profile is accurate and consistent with the Fl's risk appetite.
A client at a financial institution deposits large amounts of money into an account, and almost immediately, the funds are then distributed to numerous individuals' accounts. The transaction activity described in the scenario is a pattern of:
Answer : B
Deposit trading is a pattern of suspicious activity where a client deposits large amounts of money into an account, and then transfers the funds to other accounts, often in different jurisdictions or countries. This could be an attempt to disguise the source or destination of the funds, or to avoid reporting requirements. Deposit trading is also known as layering, which is the second stage of money laundering.
Which actions should financial institutions perform to ensure proper data governance? (Select Three.)
Answer : A, B, D
Financial institutions should perform the following actions to ensure proper data governance:
Establish an appropriate data management method for collecting and storing information. This is important to ensure that the data is consistent, reliable, and accessible for various purposes, such as risk assessment, compliance reporting, and customer service. Data management methods may include defining data standards, policies, and procedures; implementing data quality controls and validation checks; and using appropriate data storage systems and formats.
Ensure the accuracy of customer identification records and transaction records and appropriately manage data as a prerequisite for the effective use of IT systems. This is important to comply with the anti-money laundering and counter-terrorist financing (AML/CFT) requirements, such as customer due diligence, transaction monitoring, and suspicious activity reporting. Accurate and complete customer and transaction data also enables financial institutions to use IT systems more effectively for data analysis, risk management, and decision making.
Periodically validate integrity and accuracy of information used for IT systems such as customer information, customer identification records, and transaction records. This is important to ensure that the data remains up-to-date, relevant, and reliable over time. Data validation may include verifying the source and quality of the data; identifying and correcting any errors or inconsistencies; and updating or deleting any obsolete or redundant data.
Data Governance for Financial Institutions - Capgemini
Small and Medium-Sized Deposit-Taking Institutions (SMSBs) Capital and Liquidity Requirements - OSFI
A financial regulator is evaluating the effectiveness of a financial institution's (Fl) anti-financial crime program. Which condition should be met to satisfy the regulator?
Answer : D
The condition that should be met to satisfy the regulator is that the program is drafted using a risk-based approach to avoid the FI being used as a conduit for criminal activities. A risk-based approach means that the FI identifies, assesses, and understands its exposure to financial crime risks and applies appropriate measures to mitigate them. This is consistent with the international standards and best practices for anti-financial crime compliance. The program being aligned with the financial industry's anti-financial crime priorities, meeting the minimum requirements of anti-financial crime standards published by a financial industry association, or having no high-severity issues in internal auditing results are not sufficient to satisfy the regulator, as they do not necessarily reflect the specific risks faced by the FI or demonstrate its effectiveness in preventing and detecting financial crimes.
A financial institution (Fl) receives an urgent request for information from the financial intelligence unit (Fl country. According to FATF recommendations, which is the best action for the FI to take?
Answer : B
The correct answer is B because the FATF recommendations state that financial institutions should provide feedback to the FIU as quickly as possible, especially in cases involving the financing of terrorism that could imply an imminent threat to the country. Option A is incorrect because requesting an official court subpoena would delay the response and might not be necessary for the FIU to access the information. Option C is incorrect because establishing a committee would also delay the response and might not be in compliance with the FIU's request. Option D is incorrect because informing the public relations department is irrelevant to the question and might compromise the confidentiality of the investigation.
An investigator is reviewing a case generated from the transaction monitoring system, with two large amounts of incoming remittance (IR) to an individual customer. Based on the KYC profile, the customer is a plant manager of a famous multi-national electronics manufacturing firm. As the customer has no similarly large transaction patterns for the past 2 years, the investigator sends an inquiry to the relationship manager (RM) about the nature of the transaction. The RM replies that the transaction is a consultancy fee provided from two different electronics companies with a debit note provided However, there is no detail of service provided on the debit note, and the remitters are two individuals.
Which actions should the investigator recommend to mitigate risk? (Select Two.)
Answer : D, E
The actions that the investigator should recommend to mitigate risk are conducting enhanced due diligence (D) and re-evaluating the customer risk profile (E). These actions are appropriate and prudent, as they allow the investigator to obtain more information and evidence about the nature and purpose of the transactions, the source and destination of the funds, and the identity and legitimacy of the parties involved. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should conduct enhanced due diligence on all parties involved in the investigation, including checking various sources of information, such as watch lists, sanctions lists, negative news, and official registries'' (p. 24). The FI should also ''re-assess the customer risk profile based on any new information obtained during the investigation, and adjust the customer due diligence and monitoring requirements accordingly'' (p. 25).
The other options are not as appropriate or effective as options D and E. The investigator should not recommend exiting the relationship with the customer (A), as this could be premature or disproportionate, as well as potentially discriminatory or illegal. The investigator should not recommend documenting and maintaining a file with the investigative findings (B), as this is not an action to mitigate risk, but rather a standard procedure for any investigation. The investigator should not recommend discussing the investigation findings with the customer , as this could compromise the integrity and objectivity of the investigation, as well as expose the FI to legal or regulatory risks.
An investigator at a corporate bank is conducting transaction monitoring alerts clearance.
KYC profile background: An entity customer, doing business offshore in Hong Kong, established a banking business relationship with the bank since 2017 for deposit and loan purposes. It acts as an offshore investment holding company. The customer declared that the ongoing source of funds to this account comes from group-related companies.
* X is the UBO. and owns 97% shares of this entity customer;
* Y is is the authorized signatory of this entity customer. This entity customer was previously the subject of a SAR/STR.
KYC PROFILE
Customer Name: AAA International Company. Ltd
Customer ID: 123456
Account Opened: June 2017
Last KYC review date: 15 Nov 2020
Country and Year of Incorporation: The British Virgin Islands, May 2017
AML risk level: High
Account opening and purpose: Deposits, Loans, and Trade Finance
Anticipated account activities: 1 to 5 transactions per year and around 1 million per
transaction amount
During the investigation, the investigator reviewed remittance transactions activities for the period from Jul 2019 to Sep 2021 and noted the following transactions pattern:
TRANSACTION JOURNAL
Review dates: from July 2019 to Sept 2021
For Hong Kong Dollars (HKD) currency:
Incoming transactions: 2 inward remittances of around 1.88 million HKD in total from
different third parties
Outgoing transactions: 24 outward remittances of around 9 4 million HKD in total to
different third parties
For United States Dollars (USD) currency:
Incoming transactions: 13 inward remittances of around 3.3 million USD in total from
different third parties
Outgoing transactions: 10 outward remittances of around 9.4 million USD in total to
different third parties.
RFI Information and Supporting documents:
According to the RFI reply received on 26 May 2021, the customer provided the bank
with the information below:
1J All incoming funds received in HKD & USD currencies were monies lent from non-customers of the bank. Copies of loan agreements had been provided as supporting documents. All of the loan agreements were in the same format and all the lenders are engaged in trading business.
2) Some loan agreements were signed among four parties, including among lenders. borrower (the bank's customer), guarantor, and guardian with supplemental agreements, which stated that the customer, as a borrower, who failed to repay a loan
Which suspicious activity should the investigator identify during the review of the loan agreements?
Answer : D
The correct answer is D because it is a suspicious activity that Y, who is the authorized signatory of the customer, also signed on behalf of the lenders. This indicates a possible conflict of interest, collusion, or fraud. The other options are not suspicious activities based on the information given.
When crafting internal procedures on writing and submitting SARs/STRs, one should:
Answer : B
When writing and submitting SARs/STRs, one should consider the guidelines issued by the national financial intelligence unit (FIU) and local regulator and incorporate any country-specific requirements. This ensures that the reports are compliant with the relevant laws and regulations and provide useful information to the authorities. The other options are either incorrect or not best practices.
Law enforcement (LE) suspects human trafficking to occur during a major sporting event LE officers asked several financial institutions (FIs) to monitor financial transactions occurring before, during, and after the event.
An investigator identified a pattern linked to a business. The business' account received multiple even dollar deposits between midnight and 4:00 AM. They occurred each day for several days prior to the date of the sporting event. Also, large cash deposits, typically between 2,000 USD and 3,000 USD. made by a person to the business' account occurred in many branches in the days after the sports event.
There was little information about the company. The company did not have any history of employee payroll expenses or paying taxes. Expenses from the business account included air travel and hotel expenses. Searches about the person making cash deposits showed little. An online social media platform webpage with the individual's name showed ads for dates1' and "companionship."
The Fl wants to create an automated alert for human trafficking money laundering after this investigation. Which activity type should they target?
Answer : B
The activity type that the FI should target for creating an automated alert for human trafficking money laundering is multiple deposits between midnight and 4:00 AM (B). This is because this pattern is consistent with the indicators of human trafficking identified by the Financial Action Task Force (FATF) and the Egmont Group1, which include:
Frequent cash deposits, often in round amounts, outside of normal business hours
Deposits made at different branches or ATMs in various locations
Lack of information about the nature and purpose of the business
Involvement in online platforms that advertise sexual services
Expenses related to travel and accommodation
The other options are not as relevant or specific as option B. Payments made to multiple hotels in the same city (A) could be a legitimate business expense or a sign of other types of money laundering, such as tax evasion or fraud. Deposits made within days of major sporting events could also be explained by other factors, such as increased tourism or gambling. Payments made for virtual currency (D) are not directly related to human trafficking, although they could be used to facilitate money laundering in general.
Which scenarios are common to money laundering through online marketplaces and trade-based money laundering? (Select Two.)
Answer : A, C
Money laundering through online marketplaces and trade-based money laundering both involve the manipulation of the value or quantity of goods to disguise the illicit origin of funds. Over-valuation of the stated price of goods and no evidence of delivery of goods or shipping expenses are two common indicators of such schemes. The other options are not specific to these methods of money laundering.
A client with many personal and business deposits with the financial institution (Fl) seeks a business loan. The client wants to guarantee the loan with a trust for which they are the beneficiary.
An investigator examines the trust. The trust has many layers, including shell companies in known tax havens. The client's ultimate beneficial ownership claim cannot be validated, and the loan is denied.
Two months later, the Fl receives a law enforcement (LE) request on one of the client's business accounts. While reviewing the business account, the Fl receives another LE request on the same account from another agency. The requested information is shared.
Three months later, a branch manager receives a request to open a business deposit account related to a complex trust. The manager forwarded the request because of the complexity. The trust was the same as the previously examined trust, but the request came from a different client. The second client also has many accounts with the Fl. Further inspection finds links between the second client and the Paradise Papers. The Papers state the client led illegal activities and committed tax evasion.
What steps should the investigator take to review the accounts held by the second client who is listed in the Paradise Papers? (Select Two.)
Answer : A, D, D
The investigator should recommend a SAR/STR be filed regarding the second client's use of a questionable trust to open an account, as this could indicate an attempt to conceal the source and ownership of funds, and to evade taxes and sanctions. The investigator should also monitor all accounts and entities related to the second client, as they may be involved in illegal activities or pose a high risk to the FI. The investigator should not review all accounts that have opened trust accounts, as this would be too broad and inefficient. The investigator should not inform FI management of deficiencies in their AML program, as this is not their role or responsibility. The investigator should not inform FI management of the start of a serious risk-based investigation, as this may compromise the confidentiality and integrity of the investigation.
An investigator is reviewing an alert for unusual activity. System scanning detected a text string within a company customer's account transactions that indicates the account may have been used for a drug or drug paraphernalia purchase Based on the KYC profile, the investigator determines the customer's company name and business type are marketed as a gardening supplies company. The investigator reviews the account activity and notes an online purchase transaction that leads the investigator to a website that sells various strains of marijuan
a. Additional account review detects cash deposits into the account at the branch teller lines, so the investigator reaches out to the teller staff regarding the transactions. The teller staff member reports that the business customers have frequently deposited cash in lower amounts. The teller, without prompting, adds that one of the transactors would occasionally smell of a distinct scent of marijuana smoke.
Which are the best next steps for the investigator to take? (Select Three.)
Answer : A, C, E
The best next steps for the investigator to take are:
A . Review the customer's transaction history. This can help the investigator identify any patterns or anomalies in the customer's account activity, such as changes in transaction volume, frequency, amount, source, destination, purpose, etc. The investigator can also compare the customer's transaction history with their KYC profile and risk rating to assess if there are any discrepancies or inconsistencies.
C . Check internal KYC information. This can help the investigator verify the customer's identity, business nature, ownership structure, expected activity, source of funds, etc. The investigator can also update or enhance the customer's KYC information based on any new or relevant information obtained from other sources.
E Conduct adverse media and open-source searches on the customer's background. This can help the investigator find out if there is any negative or adverse information about the customer in public data sources, such as news articles, social media posts, blogs, forums, etc. Adverse media and open-source searches can also provide additional context and insight into the customer's reputation, behavior, associations, etc. The other options are incorrect because:
B . Request information from the internet service provider who hosts the website is not feasible, as it may require a legal process or a court order to obtain such information. Moreover, the internet service provider may not have or disclose any useful information about the website or its owner.
D . Research other customer accounts for transactions to the same website is not relevant, as it may not provide any meaningful information about the customer under investigation. Furthermore, it may violate the privacy and confidentiality of other customers who are not related to the investigation.
F . Identify if the customer has opened accounts in an urban city area is not helpful, as it may not have any bearing on the customer's involvement in a drug or drug paraphernalia purchase. Additionally, it may not be possible to access or verify such information without the customer's consent or authorization.
Advanced CAMS-FCI Certification | ACAMS, Section 2: Investigating Financial Crimes, page 11
Leading Complex Investigations Certificate | ACAMS, Module 3: Conducting Research and Analysis, page 6
Adverse Media Screening - Using AI to Mitigate Risk
Legal requirements for adverse media screening - Thomson Reuters
Electronic client due diligence | Ethics helpsheets | ICAEW
6AMLD & FATF: Where Adverse Media Screening Fits In
Free Adverse Media Check | NameScan
An investigator is reviewing an alert for unusual activity. System scanning detected a text string within a company customer's account transactions that indicates the account may have been used for a drug or drug paraphernalia purchase. Based on the KYC profile, the investigator determines the customer's company name and business type are marketed as a gardening supplies company. The investigator reviews the account activity and notes an online purchase transaction that leads the investigator to a website that sells various strains of marijuan
a. Additional account review detects cash deposits into the account at the branch teller lines, so the investigator reaches out to the teller staff regarding the transactions. The teller staff member reports that the business customers have frequently deposited cash in lower amounts. The teller, without prompting, adds that one of the transactors would occasionally smell of a distinct scent of marijuana smoke.
Which information should be included in the SAR/STR?
Answer : C
The SAR/STR should include any information that is relevant to the suspicious activity, such as the customer information, the transaction details, and any other indicators of potential money laundering or criminal activity. The fact that one of the transactors occasionally smelled of marijuana smoke is an indicator that the customer may be involved in the illicit drug trade, which is a predicate offense for money laundering. Therefore, this information should be included in the SAR/STR. Reference: Advanced CAMS-FCI Study Guide, page 25.
When writing or reviewing a SAR/STR, it is important to:
Answer : A
The correct answer is A because a SAR/STR narrative should be concise, clear, and complete, addressing the who, what, when, where, why, and how of the suspicious activity. Option B is incorrect because providing too much information can make the narrative confusing and irrelevant. Option C is incorrect because the introduction should provide a summary of the suspicious activity, not the conclusion. Option D is incorrect because suspect names should be mentioned in the narrative to identify the parties involved in the suspicious activity.
During transaction monitoring. Bank A learns that one of its customers. Med Supplies 123, is attempting to make a payment via wire totaling 382.500 USD to PPE Business LLC located in Mexico to purchase a large order of personal protective equipment. specifically surgical masks and face shields. Upon further verification. Bank A decides to escalate and refers the case to investigators.
Bank A notes that days prior to the above transaction, the same customer went to a Bank A location to wire 1,215,280 USD to Breath Well LTD located in Singapore. Breath Well was acting as an intermediary to purchase both 3-ply surgical masks and face shields from Chin
a. Bank A decided not to complete the transaction due to concerns with the involved supplier in China. Moreover, the customer is attempting to send a third wire in the amount of 350,000 USD for the purchase of these items, this time using a different vendor in China. The investigator must determine the next steps in the investigation and what actions, if any. should be taken against relevant parties.
The investigator is gathering more information to determine if a SAR/STR filing is needed. Which steps are the correct ways of collecting the additional information? (Select Two.)
Answer : A, D
The correct answer is A and C because these indicators suggest that the customer is using fraudulent documents and misrepresenting the goods to conceal the illicit nature of the transactions. Fentanyl traffickers often use front companies and falsified invoices to disguise their shipments as legitimate products, such as medical supplies or chemicals. Reviewing the invoices and transportation documents, as well as the FDA product certifications, can help to identify discrepancies or anomalies that indicate fraud or deception.
The training department is conducting awareness training for unusual customer identification scenarios. Which two indicators should be included? (Select Two.)
Answer : A, B
This information can be found in the Certified Anti-Money Laundering Specialist (CAMS) study guide, 6th edition, under the section on Unusual Customer Identification Scenarios. The guide explains that two indicators that should be included in awareness training for unusual customer identification scenarios are:
A . The customer opens the account in the name of a family member who begins making large deposits.
This is an indicator of potential structuring, where a customer may be attempting to avoid triggering reporting thresholds by depositing funds in smaller amounts over time. It is important for staff to be aware of this scenario and to monitor accounts for potential suspicious activity.
B . The customer's name and home address cannot be verified.
This is an indicator of potential identity theft or other fraudulent activity. If a customer's identifying information cannot be verified, it is important for staff to conduct additional due diligence to ensure that the customer is legitimate and that the account is not being used for illicit purposes.
During transaction monitoring. Bank A learns that one of their customers. Med Supplies 123. is attempting to make a payment via wire totaling 382,500 USD to PPE Business LLC located in Mexico to purchase a large order of personal protective equipment. specifically surgical masks and face shields. Upon further verification. Bank A decides to escalate and refers the case to investigators.
Bank A notes that, days prior to the above transaction, the same customer went to a Bank A location to wire 1,215,280 USD to Breath Well LTD located in Singapore. Breath Well was acting as an intermediary to purchase both 3-ply surgical masks and face shields from Chin
a. Bank A decided not to complete the transaction due to concerns with the involved supplier in China. Moreover, the customer is attempting to send a third wire in the amount of 350,000 USD for the purchase of these items, this time using a different vendor in China. The investigator must determine next steps in the investigation and what actions, if any. should be taken against relevant parties.
During the investigation, Bank A receives a USA PATRIOT Act Section 314(a) request related to Med Supplies 123. Which steps should the investigator take when fulfilling the request? (Select Three.)
Answer : D, E, F
According to the FinCEN's 314(a) Fact Sheet1, the steps that the investigator should take when fulfilling the request are:
Search its records expeditiously to determine whether it maintains(ed) any accounts for the subject(s) listed in the request. This is option F.
Report back to the Financial Crimes Enforcement Network (FinCEN) within 15 days of receipt of the request via a secure internet website. This is option E.
Report to Financial Crimes Enforcement Network (FinCEN) that a match was found without revealing any other details. This is option D.
The other options are incorrect because:
Exiting the relationship with the business since it appears that customer is under investigation is not required by the 314(a) program and may interfere with law enforcement's investigation. This is option A.
Not responding to Financial Crimes Enforcement Network (FinCEN) if the requested information is not present in the financial institution's system of records is contrary to the 314(a) program, which requires financial institutions to respond whether or not they have a match. This is option B.
Reviewing the account(s) activity and proactively filing a SAR/STR using the 314(a) request as the basis for the filing is not appropriate, as the 314(a) request itself is not a sufficient reason to file a SAR/STR. The financial institution should only file a SAR/STR if it has its own independent suspicion of money laundering or terrorist financing. This is option C.
A financial institution (Fl) banks a money transmitter business (MTB) located in Miami. The MTB regularly initiates wire transfers with the ultimate beneficiary in Cuba and legally sells travel packages to Cub
a. The wire transfers for money remittances comply with the country's economic sanctions policies. A Fl investigator on the sanctions team reviews each wire transfer to ensure compliance with sanctions and to monitor transfer details.
An airline located in Cuba, unrelated to the business, legally sells airline tickets in Cuba to Cuban citizens wanting to travel outside of Cuba. The airline tickets are purchased using Cuban currency (CUC).
The MTB wants 100,000 USD worth of CUC. Purchasing CUC from a Cuban bank includes a 4% fee. The MTB contacts the airline to ask if the airline will trade its CUC for USD at a lower exchange fee than the Cuban bank. The airline agrees to a 1% fee. The MTB initiates a wire transfer to the airline which appears as normal activity in the monitoring system because of the business' travel package sales.
Which investigative actions should the investigator take concerning the 100.000 USD wire transfer? (Select Three.)
Answer : A, E, F
The investigator should take the following investigative actions concerning the 100,000 USD wire transfer:
Review the wire transfer protocols for this customer. This will help the investigator to determine if the wire transfer is consistent with the customer's normal business activity and risk profile, or if it deviates from the established patterns or thresholds.
Review regulations applicable to foreign currency trading transactions. This will help the investigator to assess if the wire transfer violates any laws or regulations related to currency exchange, such as reporting requirements, licensing requirements, or sanctions compliance.
Locate and review licenses, registrations, and account operating agreements associated with the MTB account. This will help the investigator to verify if the MTB has the necessary authorization and documentation to conduct currency exchange transactions and if it has disclosed this activity to the FI. Reference: Advanced CAMS-FCI Study Guide, pages 32-33.
A SAR/STR on cash activity is filed for a company registered in the Marshall Islands operating a Mediterranean beach bar and hotel. The company has three nominee directors, one nominee shareholder, and another individual declared as both the beneficial owner and authorized signatory. Which information is key for law enforcement's physical surveillance of cash activity? (Select Two.)
Answer : B, C
The identification details of the beneficial owner and authorized signatory are key for law enforcement's physical surveillance of cash activity, as they would help identify the person who controls and operates the company and who is responsible for its financial transactions. The company's operating address is also key, as it would help locate the premises where the cash activity takes place and observe any suspicious movements or behaviors. The identification details of the nominee shareholder and directors are not relevant, as they are not involved in the management or operation of the company. The company's registered address is also not relevant, as it is likely to be a shell or mailbox address that does not reflect the actual location of the business.
A client at a financial institution deposits large amounts of money into an account, and almost immediately, the funds are then distributed to numerous individuals' accounts. The transaction activity described in the scenario is a pattern of:
Answer : B
Deposit trading is a pattern of suspicious activity where a client deposits large amounts of money into an account, and then transfers the funds to other accounts, often in different jurisdictions or countries. This could be an attempt to disguise the source or destination of the funds, or to avoid reporting requirements. Deposit trading is also known as layering, which is the second stage of money laundering.
Law enforcement (LE) suspects human trafficking to occur during a major sporting event LE officers asked several financial institutions (FIs) to monitor financial transactions occurring before, during, and after the event.
An investigator identified a pattern linked to a business. The business' account received multiple even dollar deposits between midnight and 4:00 AM. They occurred each day for several days prior to the date of the sporting event. Also, large cash deposits, typically between 2,000 USD and 3,000 USD. made by a person to the business' account occurred in many branches in the days after the sports event.
There was little information about the company. The company did not have any history of employee payroll expenses or paying taxes. Expenses from the business account included air travel and hotel expenses. Searches about the person making cash deposits showed little. An online social media platform webpage with the individual's name showed ads for dates1' and "companionship."
The Fl wants to create an automated alert for human trafficking money laundering after this investigation. Which activity type should they target?
Answer : B
The activity type that the FI should target for creating an automated alert for human trafficking money laundering is multiple deposits between midnight and 4:00 AM (B). This is because this pattern is consistent with the indicators of human trafficking identified by the Financial Action Task Force (FATF) and the Egmont Group1, which include:
Frequent cash deposits, often in round amounts, outside of normal business hours
Deposits made at different branches or ATMs in various locations
Lack of information about the nature and purpose of the business
Involvement in online platforms that advertise sexual services
Expenses related to travel and accommodation
The other options are not as relevant or specific as option B. Payments made to multiple hotels in the same city (A) could be a legitimate business expense or a sign of other types of money laundering, such as tax evasion or fraud. Deposits made within days of major sporting events could also be explained by other factors, such as increased tourism or gambling. Payments made for virtual currency (D) are not directly related to human trafficking, although they could be used to facilitate money laundering in general.
A client that runs a non-profit organization that aids refugees in leaving their home countries received a remittance from a money services business that was ten times the average. The client was recently detained for providing falsified passports to illegal immigrants. Which predicate offenses could be considered in the SAR/STR? (Select Two.)
Answer : A, B
The correct answer is A and B because human smuggling/trafficking and terrorist financing are both predicate offenses for money laundering that could be related to the client's activities. Option C is incorrect because there is no indication of narcotics trafficking in the scenario. Option D is incorrect because there is no indication of antiques smuggling in the scenario. Option E is incorrect because there is no indication of tax evasion in the scenario.
Each month the automated transaction monitoring system generates alerts based on predetermined scenarios. An alert was generated in relation to the account activity of ABC Foundation. Below is the transaction history for ABC Foundation (dates are in DD/MM/YYYY format).

The relationship manager for ABC Foundation contacts the client to request more information on the beneficiary of the transfer in Turkey. ABC Foundation advises that this is a not-for-profit charity group called 'Forever Free." Which is the best next step in the investigation?
Answer : C
The best next step in the investigation is to check the jurisdiction's list of known charities with connections to terrorist activity . This is because the FI has a responsibility to verify the legitimacy and reputation of the beneficiary of the funds, especially if it is a charity or non-profit organization that operates in a high-risk jurisdiction or sector. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should conduct enhanced due diligence on all parties involved in the investigation, including checking various sources of information, such as watch lists, sanctions lists, negative news, and official registries'' (p. 24). The FI should also check if the beneficiary is consistent with the customer's profile and expected activity.
The other options are not as appropriate or effective as option C. Contacting the financial institution in Turkey that has a relationship with Forever Free and advising them of the investigation (A) could violate confidentiality or data protection laws, as well as compromise the investigation or alert the customer or beneficiary of the suspicion. Updating the customer profile to include Forever Free as the recipient of the funds (B) could be premature or inaccurate, as it does not verify the nature and purpose of the transfer or the identity and legitimacy of the beneficiary. Filing a SAR/STR with the new information learned about the beneficiary (D) could also be premature or incomplete, as it does not confirm if there is any suspicious or criminal activity involved in the transfer or if there are any other red flags or indicators.
While each is potentially important, which allows an investigations analyst to better write a SAR/STR narrative that is useful to law enforcement? (Select Two.)
Answer : D, E
A SAR/STR narrative that is useful to law enforcement should include a detailed description of the known or suspected criminal violation or suspicious activity, as well as ensure that all information in the SAR/STR is complete and accurate based on what the institution knows. These elements help law enforcement to understand the nature and scope of the suspicious activity, and to follow up with further investigation if needed. The other options are not essential for a useful SAR/STR narrative, as they either provide irrelevant or redundant information, or could compromise the confidentiality of the report.
SAR/STR NARRATIVE
A SAR/STR has been submitted on five transactions conducted on the correspondent banking relationship with ABC Bank.
Client Information:
Remitter information: DEF Oil Resource Ltd. is the oldest member of the DEF Group. It was founded in 1977 as a general trading business with a primary focus on exports from Africa and North Americ
a. The group has business activities that span the entire energy value chain. Their core field of endeavor is centered within the oil and gas industry and its associated sub-sectors.
Beneficiary Information:
As per the response received from ABC Bank, it was determined that the beneficiaries are related to DEF Oil Resource Ltd. These were created by DEF Oil Resource Ltd. to purchase property in a foreign country on behalf of their senior management as part of a bonus scheme. The purpose behind this payment was for the purchase of property in another country.
Payment Reference:
ABCXXXXX31PZFG2H
ABCXXXXXX51PQGEH
ABCXXXXXX214QWVG
ABCXXXXXX41PSXA2
ABCXXXXXX815QWS3
Concerns:
* We are unsure about the country of incorporation of the beneficiaries.
* We are concerned about the transactional activity since the payment made towards entities (conducted on behalf of individuals) appears to be possible tax evasion.
* There appears to be an attempt to conceal the identity of individuals (senior management), which again raises concerns about the source of funds.
* Referring to the response received from ABC Bank, we are unclear about the ultimate beneficiary of funds.
* The remitter is involved in a high-risk business, (i.e., oil and crude products trading), and the beneficiary is involved in real estate business which again poses a higher risk.
While reviewing the account activity, it is noted that several transfers are sent to a company located in an offshore jurisdiction. Which step should the investigator take next?
Answer : C
The best step for the investigator to take next is to request information about the beneficiaries related to the company. This will help to identify the ultimate beneficial owners of the funds and the purpose of the transactions. Requesting information from the company or filing a SAR/STR to the FIU where the company is located may not be feasible or effective, as the company may not cooperate or the FIU may not have jurisdiction over the offshore entity. Conducting an open-source search may provide some information about the ownership and registration of the company, but it may not be sufficient or reliable to determine the nature and legitimacy of the transactions.
SAR Narrative Guidance Package
Best Practices for Drafting an STR or SAR
Which is a key characteristic of the Financial Action Task Force (FATF) Regional Style Bodies for combatting money laundering/terrorist financing?
Answer : B
According to the CAMS study guide, the Financial Action Task Force (FATF) Regional Style Bodies are organizations created by the FATF to promote the implementation of anti-money laundering and countering the financing of terrorism (AML/CFT) measures in specific regions. One of the key characteristics of these bodies is the implementation of regional mutual evaluation procedures.
Regional mutual evaluations involve member countries evaluating each other's AML/CFT regimes to identify strengths and weaknesses and to develop best practices for improvement. This process allows for greater cooperation between countries and can help to identify and address regional AML/CFT risks more effectively. It also promotes consistency in AML/CFT standards and practices within the region.
An investigator at a corporate bank is conducting transaction monitoring alerts clearance.
KYC profile background: An entity customer, doing business offshore in Hong Kong, established a banking business relationship with the bank in 2017 for deposit and loan purposes. It acts as an offshore investment holding company. The customer declared that the ongoing source of funds to this account comes from group-related companies.
* X is the UBO. and owns 97% shares of this entity customer;
* Y is the authorized signatory of this entity customer. This entity customer was previously the subject of a SAR/STR.
KYC PROFILE
Customer Name: AAA International Company. Ltd
Customer ID: 123456
Account Opened: June 2017
Last KYC review date: 15 Nov 2020
Country and Year of Incorporation: The British Virgin Islands, May 2017
AML risk level: High
Account opening and purpose: Deposits, Loans and Trade Finance
Anticipated account activities: 1 to 5 transactions per year and around 1 million per
transaction amount
During the investigation, the investigator reviewed remittance transactions activities for the period from Jul 2019 to Sep 2021 and noted the following transactions pattern:
TRANSACTION JOURNAL
Review dates: from July 2019 to Sept 2021
For Hong Kong Dollars (HKD) currency:
Incoming transactions: 2 inward remittances of around 1.88 million HKD in total from
different third parties
Outgoing transactions: 24 outward remittances of around 9 4 million HKD in total to
different third parties
For United States Dollars (USD) currency:
Incoming transactions: 13 inward remittances of around 3.3 million USD in total from
different third parties
Outgoing transactions: 10 outward remittances of around 9.4 million USD in total to
different third parties.
RFI Information and Supporting documents:
According to the RFI reply received on 26 May 2021, the customer provided the bank
with the information below:
1) All incoming funds received in HKD & USD currencies were monies lent from non-customers of the bank. Copies of loan agreements had been provided as supporting documents. All of the loan agreements were in the same format and all the lenders are engaged in trading business.
2) Some loan agreements were signed among four parties, including among lenders. borrower (the bank's customer), guarantor, and guardian with supplemental agreements, which stated that the customer, as a borrower, who failed to repay the loan
Based on the KYC profile and the transaction journal, the pattern of activity shows a deviation in:
Answer : A
The correct answer is A because the expected account activities were 1 to 5 transactions per year and around 1 million per transaction amount, but the actual activity showed much more frequent and varied transactions in different currencies and amounts. This indicates a deviation from the customer's profile and risk level.
Which are some of the negative impacts from illegal wildlife trade and environmental crimes? (Select Two.)
Answer : B, D, D
Some of the negative impacts of illegal wildlife trade and environmental crimes are loss of potential tax proceeds and threats to biodiversity. Loss of potential tax proceeds occurs when illegal wildlife trade and environmental crimes evade taxation and customs duties, depriving governments of revenues that could be used for public services and development. Threats to biodiversity occur when illegal wildlife trade and environmental crimes endanger species, habitats, and ecosystems, reducing their resilience and ability to provide essential services for human well-being. Public health consequences and threats to a country's political stability are not directly related to illegal wildlife trade and environmental crimes, but rather to other types of financial crimes such as money laundering, terrorism financing, or corruption.
An analyst reviews an alert for high volume Automated Clearing House (ACH) activity in an account. The analyst's initial research finds the account is for a commercial daycare account that receives high volumes of large government-funded ACH transactions to support the programs. The account activity consists of checks (cheques) made payable to individual names in varying dollar amounts. One check indicates rent to another business.
An Internet search finds that the daycare company owner has previous government-issued violations for safety and classroom size needs, such as not having enough chairs and tables per enrollee. These violations were issued to a different daycare name.
Simultaneous to this investigation, another analyst sends an email about negative news articles referencing local child/adult daycare companies misusing governmental grants. This prompts the financial institution (Fl) to search all businesses for names containing daycare' or care*. Text searches return a number of facilities as customers at the Fl and detects that three of these businesses have a similar transaction flow of high volume government ACH funding with little to no daycare expenses.
The analyst determines that site visits should be conducted for the three daycare businesses. Which observations at the on-site visits would justify writing a SAR/STR? (Select Three.)
Answer : A, C, F
The observations at the on-site visits that would justify writing a SAR/STR are signs of severe wear and poor maintenance at the site (A), lights turned off at the site during operational hours , and a full parking lot of cars with no staff at the site (F). These observations suggest that the daycare businesses are not operating legitimately or providing adequate services to their customers, and that they may be misusing governmental grants or laundering money through their accounts. These observations are consistent with some of the red flags for fraud identified by ACAMS2, such as:
Inadequate facilities or equipment for the type of business
Lack of visible activity or customers at the business location
Discrepancy between reported income and expenses
Unusual volume or frequency of transactions
The other observations are not as relevant or indicative of fraud as options A, C, and F. A site located in a commercial building (B) could be a normal or legitimate choice for a daycare business, depending on its size, location, and availability. Visible attendance with children being dropped off by parents (D) could show that the daycare business is providing genuine services to its customers, although it does not rule out possible fraud or money laundering. Visible signage indicating the purpose of building (E) could also show that the daycare business is transparent and legitimate, although it does not guarantee its quality or compliance.
The intended benefits of section 314(b) of the USA PATRIOT Act include: (Select Three.)
Answer : B, E, F
Section 314(b) of the USA PATRIOT Act allows financial institutions to share information with each other, under a safe harbor that offers protection from liability, in order to better identify and report potential money laundering or terrorist financing activities. The intended benefits of this information sharing include:
Participating financial institutions sharing information about suspicious activity by customers that may have otherwise gone unnoticed. For example, if a customer is conducting transactions with multiple financial institutions that individually do not appear suspicious, but collectively indicate a pattern of money laundering or terrorist financing, the financial institutions can share this information and report it to the authorities.
Detecting money laundering and terrorist financing approaches and schemes across multiple financial institutions. For example, if a financial institution identifies a new typology or modus operandi of money laundering or terrorist financing, it can share this information with other financial institutions to help them prevent or detect similar activities by their customers.
Obtaining additional information on customers or transactions regarding potential money laundering or terrorist financing. For example, if a financial institution has incomplete or insufficient information on a customer or a transaction that raises suspicion, it can request more information from another financial institution that may have dealt with the same customer or transaction.
Section 314(b) | FinCEN.gov
Section 314(b) Fact Sheet - FinCEN.gov
During a review, an analyst notices discrepancies between a customer's nature of business listed on the business registry and what was stated on the customers application. The analyst should:
Answer : A
The analyst should clarify discrepancies noted in the customer's declared profile given the downstream impact on the risk assessment. This is because discrepancies between the customer's nature of business and the information on the business registry may indicate that the customer is not operating a legitimate business or is trying to conceal its true activities. The analyst should verify the customer's identity, source of funds, and purpose of transactions to ensure that the customer's risk profile is accurate and consistent with the Fl's risk appetite.
During transaction monitoring. Bank A learns that one of their customers. Med Supplies 123, is attempting to make a payment via wire totaling 382,500 USD to PPE Business LLC located in Mexico to purchase a large order of personal protective equipment. specifically surgical masks and face shields. Upon further verification. Bank A decides to escalate and refers the case to investigators.
Bank A notes that, days prior to the above transaction, the same customer went to a Bank A location to wire 1,215,280 USD to Breath Well LTD located in Singapore. Breath Well was acting as an intermediary to purchase both 3-ply surgical masks and face shields from Chin
a. Bank A decided not to complete the transaction due to concerns with the involved supplier in China. Moreover, the customer is attempting to send a third wire in the amount of 350,000 USD for the purchase of these items, this time using a different vendor in China. The investigator must determine next steps in the investigation and what actions, if any. should be taken against relevant parties.
Upon further investigation. Bank As investigator learns that both the Mexico- and Singapore-based companies are linked to the alleged suppliers in China. Which additional indicators would the investigator need to identify to determine if this fits a fentanyl (drug) trafficking typology? (Select Two.)
Answer : A, C
The training department is conducting awareness training for unusual customer identification scenarios. Which two indicators should be included? (Select Two.)
Answer : A, B
This information can be found in the Certified Anti-Money Laundering Specialist (CAMS) study guide, 6th edition, under the section on Unusual Customer Identification Scenarios. The guide explains that two indicators that should be included in awareness training for unusual customer identification scenarios are:
A . The customer opens the account in the name of a family member who begins making large deposits.
This is an indicator of potential structuring, where a customer may be attempting to avoid triggering reporting thresholds by depositing funds in smaller amounts over time. It is important for staff to be aware of this scenario and to monitor accounts for potential suspicious activity.
B . The customer's name and home address cannot be verified.
This is an indicator of potential identity theft or other fraudulent activity. If a customer's identifying information cannot be verified, it is important for staff to conduct additional due diligence to ensure that the customer is legitimate and that the account is not being used for illicit purposes.
A client with many personal and business deposits with the financial institution (Fl) seeks a business loan. The client wants to guarantee the loan with a trust for which they are the beneficiary.
An investigator examines the trust. The trust has many layers, including shell companies in known tax havens. The client's ultimate beneficial ownership claim cannot be validated, and the loan is denied.
Two months later, the Fl receives a law enforcement (LE) request on one of the client's business accounts. While reviewing the business account, the Fl receives another LE request on the same account from another agency. The requested information is shared.
Three months later, a branch manager receives a request to open a business deposit account related to a complex trust. The manager forwarded the request because of the complexity. The trust was the same as the previously examined trust, but the request came from a different client. The second client also has many accounts with the Fl. Further inspection finds links between the second client and the Paradise Papers. The Papers state the client led illegal activities and committed tax evasion.
What steps should the investigator take to review the accounts held by the second client who is listed in the Paradise Papers? (Select Two.)
Answer : A, D, D
The investigator should recommend a SAR/STR be filed regarding the second client's use of a questionable trust to open an account, as this could indicate an attempt to conceal the source and ownership of funds, and to evade taxes and sanctions. The investigator should also monitor all accounts and entities related to the second client, as they may be involved in illegal activities or pose a high risk to the FI. The investigator should not review all accounts that have opened trust accounts, as this would be too broad and inefficient. The investigator should not inform FI management of deficiencies in their AML program, as this is not their role or responsibility. The investigator should not inform FI management of the start of a serious risk-based investigation, as this may compromise the confidentiality and integrity of the investigation.
Which actions should financial institutions perform to ensure proper data governance? (Select Three.)
Answer : A, B, D
Financial institutions should perform the following actions to ensure proper data governance:
Establish an appropriate data management method for collecting and storing information. This is important to ensure that the data is consistent, reliable, and accessible for various purposes, such as risk assessment, compliance reporting, and customer service. Data management methods may include defining data standards, policies, and procedures; implementing data quality controls and validation checks; and using appropriate data storage systems and formats.
Ensure the accuracy of customer identification records and transaction records and appropriately manage data as a prerequisite for the effective use of IT systems. This is important to comply with the anti-money laundering and counter-terrorist financing (AML/CFT) requirements, such as customer due diligence, transaction monitoring, and suspicious activity reporting. Accurate and complete customer and transaction data also enables financial institutions to use IT systems more effectively for data analysis, risk management, and decision making.
Periodically validate integrity and accuracy of information used for IT systems such as customer information, customer identification records, and transaction records. This is important to ensure that the data remains up-to-date, relevant, and reliable over time. Data validation may include verifying the source and quality of the data; identifying and correcting any errors or inconsistencies; and updating or deleting any obsolete or redundant data.
Data Governance for Financial Institutions - Capgemini
Small and Medium-Sized Deposit-Taking Institutions (SMSBs) Capital and Liquidity Requirements - OSFI
The investigative department of a financial institution (Fl) receives an internal escalation notice from the remittance department for a SWIFT message requesting a refund due to potential fraud. The notice indicates that a total of three international incoming remittances were transferred to a corporate customer from Country A, in the amount of approximately 5 million EUR for each. The first two incoming remittances had been exchanged into currency B and transferred out to Country B a few days ago. The third incoming remittance has been held by the remittance department.
As noted from the KYC profile, the corporate customer is working in the wood industry. with the last account review completed 3 months ago. Since the account's opening. there has been no history of a large amount of funds flowing through the account. The investigator conducts an Internet search and finds that the remitter is a food beverage company.
The same morning, the investigator receives a call from a financial intelligence unit (FIU) inquiring about the same incident. The FIU states that it will issue a warrant to freeze the account on the same day.
After further review, the decision is made that transactions appear suspicious. Which are the next steps the investigator should take? (Select Two.)
Answer : C, E
The correct answer is C and E. The investigator should provide additional information to the LE upon receiving a formal request, and gather all the information that would be useful for LE and recommend filing a SAR/STR. These steps are consistent with the best practices of conducting financial crime investigations and reporting suspicious activity. The investigator should not close the customer's accounts or the investigation, as this may interfere with the ongoing LE inquiry and violate the FI's policies and procedures. The investigator should also not contact local LE directly, as this may compromise the confidentiality of the investigation and the FIU's authority. Reference:
Advanced CAMS-FCI Study Guide, Chapter 4: Reporting Suspicious Activity, pages 40-411
Advanced CAMS-FCI Study Guide, Chapter 5: Governance of an AFC Investigations Unit, pages 48-491
Advanced CAMS-FCI Certification | ACAMS
In a SAR/STR narrative concerning Individual
Answer : B
A product of analysis is a conclusion or inference that is derived from facts or judgments, using analytical techniques or tools. Option B is a product of analysis because it implies that the investigator has used a tool or technique, such as a threshold analysis, to identify a pattern of structured cash deposits that may indicate an attempt to evade reporting requirements. The other options are facts or judgments that can be verified by evidence or observation.
A financial regulator is evaluating the effectiveness of a financial institution's (Fl) anti-financial crime program. Which condition should be met to satisfy the regulator?
Answer : D
The condition that should be met to satisfy the regulator is that the program is drafted using a risk-based approach to avoid the FI being used as a conduit for criminal activities. A risk-based approach means that the FI identifies, assesses, and understands its exposure to financial crime risks and applies appropriate measures to mitigate them. This is consistent with the international standards and best practices for anti-financial crime compliance. The program being aligned with the financial industry's anti-financial crime priorities, meeting the minimum requirements of anti-financial crime standards published by a financial industry association, or having no high-severity issues in internal auditing results are not sufficient to satisfy the regulator, as they do not necessarily reflect the specific risks faced by the FI or demonstrate its effectiveness in preventing and detecting financial crimes.
Which information is it best practice to share at the very beginning of a well-written SAR/STR narrative?
Answer : B
The best information to share at the very beginning of a well-written SAR/STR narrative is the purpose of the SAR/STR narrative and a general description of the known or alleged violation. This is because this information provides an overview of why the SAR/STR is being filed and what type of suspicious activity or transaction is involved. It also helps to capture the attention of the reader and set the tone for the rest of the narrative.
A bank investigator notices an account receiving multiple deposits from the same employer under different employees' names. A cash withdrawal occurs one day after each deposit. The outcome of this investigation will likely uncover which crime typology?
Answer : D
The correct answer is A because this scenario describes a possible case of human trafficking, which is a crime where people are exploited for labor or sexual services against their will. Human traffickers may use bank accounts to launder their proceeds and pay their victims, and they may use fake or stolen identities to avoid detection. The other options are not likely because they do not explain why multiple deposits from the same employer under different employees' names would occur, nor why cash withdrawals would follow each deposit.
Each month the automated transaction monitoring system generates alerts based on predetermined scenarios. An alert was generated in relation to the account activity of ABC Foundation. Below is the transaction history for ABC Foundation (dates are in DD/MM/YYYY format).

The relationship manager for ABC Foundation contacts the client to request more information on the beneficiary of the transfer in Turkey. ABC Foundation advises that this is a not-for-profit charity group called 'Forever Free." Which is the best next step in the investigation?
Answer : C
The best next step in the investigation is to check the jurisdiction's list of known charities with connections to terrorist activity . This is because the FI has a responsibility to verify the legitimacy and reputation of the beneficiary of the funds, especially if it is a charity or non-profit organization that operates in a high-risk jurisdiction or sector. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should conduct enhanced due diligence on all parties involved in the investigation, including checking various sources of information, such as watch lists, sanctions lists, negative news, and official registries'' (p. 24). The FI should also check if the beneficiary is consistent with the customer's profile and expected activity.
The other options are not as appropriate or effective as option C. Contacting the financial institution in Turkey that has a relationship with Forever Free and advising them of the investigation (A) could violate confidentiality or data protection laws, as well as compromise the investigation or alert the customer or beneficiary of the suspicion. Updating the customer profile to include Forever Free as the recipient of the funds (B) could be premature or inaccurate, as it does not verify the nature and purpose of the transfer or the identity and legitimacy of the beneficiary. Filing a SAR/STR with the new information learned about the beneficiary (D) could also be premature or incomplete, as it does not confirm if there is any suspicious or criminal activity involved in the transfer or if there are any other red flags or indicators.
How does the Financial Action Task Force (FATF) measure the effectiveness of a country's efforts to combat money laundering and terrorist financing?
Answer : A
'The FATF measures the effectiveness of a country's efforts to combat money laundering and terrorist financing through a mutual evaluation process. During a mutual evaluation, the FATF assesses a country's legal and institutional framework, its implementation of measures to combat money laundering and terrorist financing, and the effectiveness of its efforts. The FATF then issues a report with recommendations for improvement' [CAMS Study Guide 6th edition, page 15-16].
SAR/STR NARRATIVE
A SAR/STR has been submitted on five transactions conducted on the correspondent banking relationship with ABC Bank.
Client Information:
Remitter information: DEF Oil Resource Ltd. is the oldest member of the DEF Group. It was founded in 1977 as a general trading business with a primary focus on exports from Africa and North Americ
a. The group has business activities that span the entire energy value chain. Their core field of endeavor is centered within the oil and gas industry and its associated sub-sectors.
Beneficiary Information:
As per the response received from ABC Bank, it was determined that the beneficiaries are related to DEF Oil Resource Ltd. These were created by DEF Oil Resource Ltd. to purchase property in a foreign country on behalf of their senior management as part of a bonus scheme. The purpose behind this payment was for the purchase of property in another country.
Payment Reference:
ABCXXXXX31PZFG2H
ABCXXXXXX51PQGEH
ABCXXXXXX214QWVG
ABCXXXXXX41PSXA2
ABCXXXXXX815QWS3
Concerns:
* We are unsure about the country of incorporation of the beneficiaries.
* We are concerned about the transactional activity since the payment made towards entities (conducted on behalf of individuals) appears to be possible tax evasion.
* There appears to be an attempt to conceal the identity of individuals (senior management), which again raises concerns about the source of funds.
* Referring to the response received from ABC Bank, we are unclear about the ultimate beneficiary of funds.
* The remitter is involved in a high-risk business, (i.e., oil and crude products trading), and the beneficiary is involved in real estate business which again poses a higher risk.
While reviewing the account activity, it is noted that several transfers are sent to a company located in an offshore jurisdiction. Which step should the investigator take next?
Answer : C
The best step for the investigator to take next is to request information about the beneficiaries related to the company. This will help to identify the ultimate beneficial owners of the funds and the purpose of the transactions. Requesting information from the company or filing a SAR/STR to the FIU where the company is located may not be feasible or effective, as the company may not cooperate or the FIU may not have jurisdiction over the offshore entity. Conducting an open-source search may provide some information about the ownership and registration of the company, but it may not be sufficient or reliable to determine the nature and legitimacy of the transactions.
SAR Narrative Guidance Package
Best Practices for Drafting an STR or SAR
A financial institution
Answer : C
The correct answer is C because the FI is unable to obtain evidence of required licensing or registration despite suspicion of money transmitting, which is a red flag for money laundering and a violation of federal and state laws. Option A is incorrect because making several deposits in one month that appear to exceed their expected monthly income might not be indicative of suspicious activity, depending on the customer's profile and source of funds. Option B is incorrect because receiving a large, one-time wire from a law firm might not be indicative of suspicious activity, depending on the customer's relationship with the law firm and the purpose of the wire. Option D is incorrect because discovering a large number of securities transactions that appear to be related to day trading might not be indicative of suspicious activity, depending on the customer's investment strategy and risk tolerance.
Which scenarios are common to money laundering through online marketplaces and trade-based money laundering? (Select Two.)
Answer : A, C
Money laundering through online marketplaces and trade-based money laundering both involve the manipulation of the value or quantity of goods to disguise the illicit origin of funds. Over-valuation of the stated price of goods and no evidence of delivery of goods or shipping expenses are two common indicators of such schemes. The other options are not specific to these methods of money laundering.
When writing or reviewing a SAR/STR, it is important to:
Answer : A
The correct answer is A because a SAR/STR narrative should be concise, clear, and complete, addressing the who, what, when, where, why, and how of the suspicious activity. Option B is incorrect because providing too much information can make the narrative confusing and irrelevant. Option C is incorrect because the introduction should provide a summary of the suspicious activity, not the conclusion. Option D is incorrect because suspect names should be mentioned in the narrative to identify the parties involved in the suspicious activity.
A client at a financial institution deposits large amounts of money into an account, and almost immediately, the funds are then distributed to numerous individuals' accounts. The transaction activity described in the scenario is a pattern of:
Answer : B
Deposit trading is a pattern of suspicious activity where a client deposits large amounts of money into an account, and then transfers the funds to other accounts, often in different jurisdictions or countries. This could be an attempt to disguise the source or destination of the funds, or to avoid reporting requirements. Deposit trading is also known as layering, which is the second stage of money laundering.
The training department is conducting awareness training for unusual customer identification scenarios. Which two indicators should be included? (Select Two.)
Answer : A, B
This information can be found in the Certified Anti-Money Laundering Specialist (CAMS) study guide, 6th edition, under the section on Unusual Customer Identification Scenarios. The guide explains that two indicators that should be included in awareness training for unusual customer identification scenarios are:
A . The customer opens the account in the name of a family member who begins making large deposits.
This is an indicator of potential structuring, where a customer may be attempting to avoid triggering reporting thresholds by depositing funds in smaller amounts over time. It is important for staff to be aware of this scenario and to monitor accounts for potential suspicious activity.
B . The customer's name and home address cannot be verified.
This is an indicator of potential identity theft or other fraudulent activity. If a customer's identifying information cannot be verified, it is important for staff to conduct additional due diligence to ensure that the customer is legitimate and that the account is not being used for illicit purposes.
Which action is part of the enhanced due diligence process?
Answer : A
One of the actions that is part of the enhanced due diligence process is collecting beneficial ownership details regarding the client's account. This is important to identify the natural persons who ultimately own or control the client, and to assess the potential risks associated with them. According to the Financial Action Task Force (FATF), beneficial ownership information should include1:
The name, nationality, and country of residence of each beneficial owner.
The date of birth or incorporation of each beneficial owner.
The nature and extent of the beneficial interest held by each beneficial owner.
The means by which the beneficial ownership or control is exercised.
FATF Guidance on Transparency and Beneficial Ownership
Which actions should financial institutions perform to ensure proper data governance? (Select Three.)
Answer : A, B, D
Financial institutions should perform the following actions to ensure proper data governance:
Establish an appropriate data management method for collecting and storing information. This is important to ensure that the data is consistent, reliable, and accessible for various purposes, such as risk assessment, compliance reporting, and customer service. Data management methods may include defining data standards, policies, and procedures; implementing data quality controls and validation checks; and using appropriate data storage systems and formats.
Ensure the accuracy of customer identification records and transaction records and appropriately manage data as a prerequisite for the effective use of IT systems. This is important to comply with the anti-money laundering and counter-terrorist financing (AML/CFT) requirements, such as customer due diligence, transaction monitoring, and suspicious activity reporting. Accurate and complete customer and transaction data also enables financial institutions to use IT systems more effectively for data analysis, risk management, and decision making.
Periodically validate integrity and accuracy of information used for IT systems such as customer information, customer identification records, and transaction records. This is important to ensure that the data remains up-to-date, relevant, and reliable over time. Data validation may include verifying the source and quality of the data; identifying and correcting any errors or inconsistencies; and updating or deleting any obsolete or redundant data.
Data Governance for Financial Institutions - Capgemini
Small and Medium-Sized Deposit-Taking Institutions (SMSBs) Capital and Liquidity Requirements - OSFI
A client that runs a non-profit organization that aids refugees in leaving their home countries received a remittance from a money services business that was ten times the average. The client was recently detained for providing falsified passports to illegal immigrants. Which predicate offenses could be considered in the SAR/STR? (Select Two.)
Answer : A, B
The correct answer is A and B because human smuggling/trafficking and terrorist financing are both predicate offenses for money laundering that could be related to the client's activities. Option C is incorrect because there is no indication of narcotics trafficking in the scenario. Option D is incorrect because there is no indication of antiques smuggling in the scenario. Option E is incorrect because there is no indication of tax evasion in the scenario.
CLIENT INFORMATION FORM Client Name: ABC Tech Corp Client I.D. Number: 08125 Name: ABC Tech Corp Registered Address: Mumbai, India Work Address: Mumbai. India Cell Phone: ***"--- Alt Phone: Email: ********
Client Profile Information:
Sector: Financial
Engaged in business from (date): 02 Jan 2020
Sub-sector: Software-Cryptocurrency Exchange
Expected Annual Transaction Amount: 125.000 USD
Payment Nature: Transfer received from client's fund
Received from: Clients
Received for: Sale of digital assets
The client identified themselves as "Cryptocurrency Exchange" Client has submitted the limited liability partnership deed. However, the bank's auditing team is unable to identify the client's exact business profile as the cryptocurrency exchange specified by the client as their major business awaits clearance from the country's regulator. The client has submitted documents/communications exchanged with the regulator and has cited the lack of governing laws in the country of their operation as the reason for the delay.
Investigators determine the ultimate beneficial owner of ABC Tech Corp is a high-net-worth client. The client owns a real estate agency left to her when her spouse died. The spouse provided seed capital for ABC Tech Corp through a direct 1,000.000 Great British Pound (GBP) deposit.
What additional information would trigger filing a SAR/STR?
Answer : D
The additional information that would trigger filing a SAR/STR is the fact that the funds for the seed capital were in the form of 50 cashier's checks of 10,000 GBP each and 50 money orders of 10,000 GBP. This is because this indicates a possible attempt to avoid the reporting threshold of 10,000 GBP for cash transactions, which is a common money laundering technique known as structuring or smurfing12. The other options are not necessarily suspicious, as they do not involve cash transactions or indicate any illicit source of funds. The fact that the client's spouse was a PEP does not automatically make the transaction suspicious unless there are other red flags or risk factors associated with the PEP34
The investigative department of a financial institution (Fl) receives an internal escalation notice from the remittance department for a SWIFT message requesting a refund due to potential fraud. The notice indicates that a total of three international incoming remittances were transferred to a corporate customer from Country A, in the amount of approximately 5 million EUR for each. The first two incoming remittances had been exchanged into currency B and transferred out to Country B a few days ago. The third incoming remittance has been held by the remittance department.
As noted from the KYC profile, the corporate customer is working in the wood industry. with the last account review completed 3 months ago. Since the account's opening. there has been no history of a large amount of funds flowing through the account. The investigator conducts an Internet search and finds that the remitter is a food beverage company.
The same morning, the investigator receives a call from a financial intelligence unit (FIU) inquiring about the same incident. The FIU states that it will issue a warrant to freeze the account on the same day.
After further review, the decision is made that transactions appear suspicious. Which are the next steps the investigator should take? (Select Two.)
Answer : C, E
The correct answer is C and E. The investigator should provide additional information to the LE upon receiving a formal request, and gather all the information that would be useful for LE and recommend filing a SAR/STR. These steps are consistent with the best practices of conducting financial crime investigations and reporting suspicious activity. The investigator should not close the customer's accounts or the investigation, as this may interfere with the ongoing LE inquiry and violate the FI's policies and procedures. The investigator should also not contact local LE directly, as this may compromise the confidentiality of the investigation and the FIU's authority. Reference:
Advanced CAMS-FCI Study Guide, Chapter 4: Reporting Suspicious Activity, pages 40-411
Advanced CAMS-FCI Study Guide, Chapter 5: Governance of an AFC Investigations Unit, pages 48-491
Advanced CAMS-FCI Certification | ACAMS
A client with many personal and business deposits with the financial institution (Fl) seeks a business loan. The client wants to guarantee the loan with a trust for which they are the beneficiary.
An investigator examines the trust. The trust has many layers, including shell companies in known tax havens. The client's ultimate beneficial ownership claim cannot be validated, and the loan is denied.
Two months later, the Fl receives a law enforcement (LE) request on one of the client's business accounts. While reviewing the business account, the Fl receives another LE request on the same account from another agency. The requested information is shared.
Three months later, a branch manager receives a request to open a business deposit account related to a complex trust. The manager forwarded the request because of the complexity. The trust was the same as the previously examined trust, but the request came from a different client. The second client also has many accounts with the Fl. Further inspection finds links between the second client and the Paradise Papers. The Papers state the client led illegal activities and committed tax evasion.
What steps should the investigator take to review the accounts held by the second client who is listed in the Paradise Papers? (Select Two.)
Answer : A, D, D
The investigator should recommend a SAR/STR be filed regarding the second client's use of a questionable trust to open an account, as this could indicate an attempt to conceal the source and ownership of funds, and to evade taxes and sanctions. The investigator should also monitor all accounts and entities related to the second client, as they may be involved in illegal activities or pose a high risk to the FI. The investigator should not review all accounts that have opened trust accounts, as this would be too broad and inefficient. The investigator should not inform FI management of deficiencies in their AML program, as this is not their role or responsibility. The investigator should not inform FI management of the start of a serious risk-based investigation, as this may compromise the confidentiality and integrity of the investigation.
During transaction monitoring. Bank A learns that one of their customers. Med Supplies 123. is attempting to make a payment via wire totaling 382,500 USD to PPE Business LLC located in Mexico to purchase a large order of personal protective equipment. specifically surgical masks and face shields. Upon further verification. Bank A decides to escalate and refers the case to investigators.
Bank A notes that, days prior to the above transaction, the same customer went to a Bank A location to wire 1,215,280 USD to Breath Well LTD located in Singapore. Breath Well was acting as an intermediary to purchase both 3-ply surgical masks and face shields from Chin
a. Bank A decided not to complete the transaction due to concerns with the involved supplier in China. Moreover, the customer is attempting to send a third wire in the amount of 350,000 USD for the purchase of these items, this time using a different vendor in China. The investigator must determine next steps in the investigation and what actions, if any. should be taken against relevant parties.
During the investigation, Bank A receives a USA PATRIOT Act Section 314(a) request related to Med Supplies 123. Which steps should the investigator take when fulfilling the request? (Select Three.)
Answer : D, E, F
According to the FinCEN's 314(a) Fact Sheet1, the steps that the investigator should take when fulfilling the request are:
Search its records expeditiously to determine whether it maintains(ed) any accounts for the subject(s) listed in the request. This is option F.
Report back to the Financial Crimes Enforcement Network (FinCEN) within 15 days of receipt of the request via a secure internet website. This is option E.
Report to Financial Crimes Enforcement Network (FinCEN) that a match was found without revealing any other details. This is option D.
The other options are incorrect because:
Exiting the relationship with the business since it appears that customer is under investigation is not required by the 314(a) program and may interfere with law enforcement's investigation. This is option A.
Not responding to Financial Crimes Enforcement Network (FinCEN) if the requested information is not present in the financial institution's system of records is contrary to the 314(a) program, which requires financial institutions to respond whether or not they have a match. This is option B.
Reviewing the account(s) activity and proactively filing a SAR/STR using the 314(a) request as the basis for the filing is not appropriate, as the 314(a) request itself is not a sufficient reason to file a SAR/STR. The financial institution should only file a SAR/STR if it has its own independent suspicion of money laundering or terrorist financing. This is option C.
The investigative department of a financial institution (Fl) receives an internal escalation notice from the remittance department for a SWIFT message requesting a refund due to potential fraud. The notice indicates that a total of three international incoming remittances were transferred to a corporate customer from Country A, in the amount of approximately 5 million EUR for each. The first two incoming remittances had been exchanged into currency B and transferred out to Country B a few days ago. The third incoming remittance has been held by the remittance department.
As noted from the KYC profile, the corporate customer is working in the wood industry. with the last account review completed 3 months ago. Since the account's opening. there has been no history of a large amount of funds flowing through the account. The investigator conducts an Internet search and finds that the remitter is a food beverage company.
The same morning, the investigator receives a call from a financial intelligence unit (FIU) inquiring about the same incident. The FIU states that it will issue a warrant to freeze the account on the same day.
Which steps for documenting the final investigation decision are appropriate for the investigator in this scenario?
Answer : C
The investigator should document the investigation process and retain all relevant documents in the case management system. This is because documenting the investigation process is a good practice to ensure the quality and consistency of the investigation, as well as to facilitate the review and audit of the investigation. Retaining all relevant documents is also important to support the evidence and findings of the investigation, as well as to comply with the record-keeping requirements of the relevant authorities. The other options are incorrect because:
A . Excluding any open-source information from record-keeping is not advisable, as open-source information can provide valuable insights and context for the investigation, and may not be easily retrievable in the future.
B . Adding all of the information the FI has about the subject, their account(s) activity, research results, KYC information, etc. to the SAR/STR is not necessary, as the SAR/STR should only contain the essential information that is relevant and material to the suspicious activity. Adding too much information may obscure the main points and make the SAR/STR less effective.
D . Not documenting the investigation process if a SAR/STR is not filed is not acceptable, as the investigation process should be documented regardless of the outcome. Documenting the investigation process can help justify why a SAR/STR was not filed, and also provide a reference for future investigations involving the same subject or activity.
Advanced CAMS-FCI Certification | ACAMS, Section 3: Reporting Suspicious Activity, page 14
Leading Complex Investigations Certificate | ACAMS, Module 4: Documenting Your Investigation, page 4
A criminal is engaged in chain hopping while trying to launder ransomware payments. The criminal will likely:
Answer : B
Chain hopping is a technique used by criminals to obscure the traceability of cryptocurrency transactions by converting the funds to a different type of cryptocurrency, often using multiple exchanges or platforms. The other options are not related to chain hopping. Reference: Advanced CAMS-FCI Study Guide, page 38.
An analyst reviews an alert for high volume Automated Clearing House (ACH) activity in an account. The analyst's initial research finds the account is for a commercial daycare account that receives high volumes of large government-funded ACH transactions to support the programs. The account activity consists of checks (cheques) made payable to individual names in varying dollar amounts. One check indicates rent to another business.
An Internet search finds that the daycare company owner has previous government-issued violations for safety and classroom size needs, such as not having enough chairs and tables per enrollee. These violations were issued to a different daycare name.
Simultaneous to this investigation, another analyst sends an email about negative news articles referencing local child/adult daycare companies misusing governmental grants. This prompts the financial institution (Fl) to search all businesses for names containing 'daycare' or *care'. Text searches return a number of facilities as customers at the Fl and detects that three of these businesses have a similar transaction flow of high volume government ACH funding with little to no daycare expenses.
Which red flags would be an indicator that activity is connected to a corruption/bribery typology? (Select Two.)
Answer : A, B
The red flags that would be an indicator that activity is connected to a corruption/bribery typology are large checks issued to various individuals with the memos noting ''gift'', ''thank you'', ''favor'' (A) and negative news found on the customer related to government-issued violations for safety (B). These red flags suggest that the customer is involved in paying or receiving bribes or kickbacks to or from government officials or other parties in exchange for favorable treatment or contracts. These red flags are consistent with some of the indicators of corruption/bribery identified by ACAMS1, such as:
Payments made to or from third parties that are not directly related to the business
Payments made to or from high-risk jurisdictions or sectors
Payments made with vague or incomplete descriptions or justifications
Negative news or reputation of the customer or its associates
The other options are not as relevant or indicative of corruption/bribery as options A and B. Checks issued to an unrelated entity referencing ''rent'' and ''utilities'' in the memos could be a legitimate business expense or a sign of other types of fraud or money laundering, such as tax evasion or shell company schemes. Multiple daycare locations with no active business operations or related account activity (D) could also be a sign of other types of fraud or money laundering, such as embezzlement or front company schemes. The same beneficial owner owning several daycare centers in different locations (E) could be a normal or legitimate business practice, depending on the size, location, and profitability of the centers.
Online payments from a customer's account to three foreign entities trigger an investigation. The investigator knows the funds originated from family real estate after an investment company approached the customer online. Funds were remitted for pre-lPO shares. Which should now occur in the investigation?
Answer : C
The correct answer is C because reviewing the structure of the transactions to the three entities can help the investigator to identify any red flags or indicators of fraud, such as unusual amounts, frequency, destinations, or beneficiaries. The other options are not as relevant or effective in this scenario. Option A is not necessary because the investigator already knows the source of funds for the customer. Option B is not advisable because contacting the customer directly may alert them to the investigation and compromise its integrity. Option D is not helpful because inspecting electronic banking login records does not provide any information about the nature or purpose of the transactions.
Advanced CAMS-FCI Study Guide, page 281
Financial Crime Typologies - Intermediate Certificate Course, Module 32
A client with many personal and business deposits with the financial institution (Fl) seeks a business loan. The client wants to guarantee the loan with a trust for which they are the beneficiary.
An investigator examines the trust. The trust has many layers, including shell companies in known tax havens. The client's ultimate beneficial ownership claim cannot be validated, and the loan is denied.
Two months later, the Fl receives a law enforcement (LE) request on one of the client's business accounts. While reviewing the business account, the Fl receives another LE request on the same account from another agency. The requested information is shared.
Three months later, a branch manager receives a request to open a business deposit account related to a complex trust. The manager forwarded the request because of the complexity. The trust was the same as the previously examined trust, but the request came from a different client. The second client also has many accounts with the Fl. Further inspection finds links between the second client and the Paradise Papers. The Papers state the client led illegal activities and committed tax evasion.
What steps should the investigator perform in reference to the first client's existing accounts? (Select Three.)
Answer : A, D, F
The investigator should review all client-signed documents relating to all accounts (A) to check for any discrepancies or red flags. The investigator should also perform secondary scans of the client's other owners/authorized signers (D) to identify any possible connections or associations with the second client or the Paradise Papers. Additionally, the investigator should prepare a relationship flow chart of all existing accounts (F) to better understand the client's activities and patterns. These steps are consistent with the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, which states that investigators should ''review all relevant documentation, including account opening documents, transaction records, and customer correspondence'' (p. 23), ''conduct enhanced due diligence on all parties involved in the investigation'' (p. 24), and ''use data visualization tools to map out complex relationships and transactions'' (p. 25).
An AML investigator at a bank identifies an unusually high number of deposits from a few customers resulting from the encashment of multiple gambling tickets from a legitimate gambling company. It is noted that the transactions are inconsistent with the customers' profiles and that reverse (corrective) transactions did not occur. Which suspicious activity is most likely?
Answer : A
The correct answer is A because this scenario describes a possible case of ticket laundering, which is a form of money laundering where criminals use gambling tickets to disguise the source of their illicit funds. The customers who deposit the tickets are either complicit or unaware of the scheme, and they receive a commission or a fee for their service. The other options are not likely because they do not explain why the customers would deposit multiple tickets from the same gambling company and withdraw cash the next day.
Which most likely indicates that a business email compromise attack has occurred?
Answer : A
When writing or reviewing a SAR/STR, it is important to ensure that the narrative is kept to the point; easy to read; and addresses the who, what, when, where, why, and how. This is because the narrative is the most crucial part of the SAR/STR, as it provides a clear and concise summary of the suspicious activity or transaction that triggered the report. The narrative should include all the relevant information that would help law enforcement or regulators to understand the nature and context of the activity or transaction, such as123:
The who: The names, addresses, account numbers, and other identifying information of the parties involved in the activity or transaction, such as customers, beneficiaries, intermediaries, or third parties.
The what: The type, amount, frequency, and purpose of the activity or transaction, such as cash deposits, wire transfers, check payments, or purchases of goods or services.
The when: The date, time, and duration of the activity or transaction, and whether it was a one-time occurrence or part of a pattern or trend.
The where: The location or channel of the activity or transaction, such as branches, ATMs, online platforms, or mobile applications.
The why: The reason or rationale for the activity or transaction, and why it was considered suspicious or unusual based on the customer's profile, behavior, or expected activity.
The how: The method or mechanism of the activity or transaction, such as cash, check, debit card, credit card, cryptocurrency, or prepaid card.
How to write the perfect ''Suspicious Activity Reports'' (SAR)? | i-AML
Writing for Prosecution: Best Practices For Composing SAR Narratives That Assist Prosecutors | ACAMS
SAR Writing Examples and Proper Formatting: Write for Your Reader - Alessa
Law enforcement (LE) suspects human trafficking to occur during a major spotting event. LE officers asked several financial institutions (FIs) to monitor financial transactions occurring before, during, and after the event.
An investigator identified a pattern linked to a business. The business* account received multiple even dollar deposits between midnight and 4:00 AM. They occurred each day for several days prior to the date of the sporting event. Also, large cash deposits, typically between 2,000 USD and 3.000 USD. made by a person to the business' account occurred in many branches in the days alter the sports event.
There was little information about the company. The company did not have any history of employee payroll expenses or paying taxes. Expenses from the business account included air travel and hotel expenses. Searches about the person making cash deposits showed little. An online social media platform webpage with the individual's name showed ads for dates" and "companionship."
Which fact should not be included in (he SAR/STR narrative?
Answer : B
The fact that should not be included in the SAR/STR narrative is the request by law enforcement (D). This is because the request by law enforcement is confidential and should not be disclosed to the customer or anyone else who is not authorized to know it. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should not include any reference to the LE request in the SAR/STR narrative, as this could compromise the LE investigation or alert the customer of the suspicion'' (p. 35). The FI should also not inform the customer of the LE request or delay filing the SAR/STR because of it.
The other facts should be included in the SAR/STR narrative, as they are relevant and indicative of human trafficking money laundering. The air travel and hotel expenses (A) show that the customer is involved in moving people across different locations, which could be a sign of human smuggling or trafficking. The time of the cash deposits (B) shows that the customer is receiving cash payments during unusual hours, which could be a sign of illicit activities or services. The sporting event shows that the customer is exploiting a high-demand situation for their business, which could be a sign of opportunistic or organized crime.
Which are some of the negative impacts from illegal wildlife trade and environmental crimes? (Select Two.)
Answer : B, D, D
Some of the negative impacts of illegal wildlife trade and environmental crimes are loss of potential tax proceeds and threats to biodiversity. Loss of potential tax proceeds occurs when illegal wildlife trade and environmental crimes evade taxation and customs duties, depriving governments of revenues that could be used for public services and development. Threats to biodiversity occur when illegal wildlife trade and environmental crimes endanger species, habitats, and ecosystems, reducing their resilience and ability to provide essential services for human well-being. Public health consequences and threats to a country's political stability are not directly related to illegal wildlife trade and environmental crimes, but rather to other types of financial crimes such as money laundering, terrorism financing, or corruption.
According to the Financial Action Task Force, as part of their risk assessment, which are important data and information that a Trust and Company Service Provider must understand when establishing and administering a trust? (Select Two.)
Answer : A, D
Here is the exact information from the Financial Action Task Force (FATF) Guidance for a Risk-Based Approach for Trust and Company Service Providers:
'Understanding the management and ownership structure of a trust is crucial in assessing the ML/TF risk it poses. This includes the identity of all settlors, trustees and beneficiaries, and their respective roles and responsibilities, as well as the nature and purpose of the trust.'
'TCSPs should obtain and maintain up-to-date information on the purpose and intended nature of the business relationship, the source of funds and wealth, and where relevant, the source of funds or wealth of the settlor and beneficiaries.'
Based on this information, the correct answers are A and D. Trust and Company Service Providers must understand the responsibility and authority in the structure, as well as the general purpose behind the structure in order to assess the overall risk of the trust and ensure that any transactions with the trust are legitimate.
SAR/STR NARRATIVE
A SAR/STR has been submitted on five transactions conducted on the correspondent banking relationship with ABC Bank.
Client Information:
Remitter information: DEF Oil Resource Ltd. is the oldest member of the DEF Group. It was founded in 1977 as a general trading business with a primary focus on exports from Africa and North Americ
a. The group has business activities that span the entire energy value chain. Their core field of endeavor is centered within the oil and gas industry and its associated sub-sectors.
Beneficiary Information:
As per the response received from ABC Bank, it was determined that the beneficiaries are related to DEF Oil Resource Ltd. These were created by DEF Oil Resource Ltd. to purchase property in a foreign country on behalf of their senior management as part of a bonus scheme. The purpose behind this payment was for purchase of property in another country.
Payment Reference:
ABCXXXXX31PZFG2H
ABCXXXXXX51PQGEH
ABCXXXXXX214QWVG
ABCXXXXXX41PSXA2
ABCXXXXXX815QWS3
Concerns:
* We are unsure about the country of incorporation of the beneficiaries.
* We are concerned about the transactional activity since the payment made towards entities (conducted on behalf of individuals) appears to be possible tax evasion.
* There appears to be an attempt to conceal the identity of individuals (senior management), which again raises concerns about the source of funds.
* Referring to the response received from ABC Bank, we are unclear about the ultimate beneficiary of funds.
* The remitter is involved in a high-risk business, (i.e., oil and crude products trading), and the beneficiary is involved in a real estate business which again poses a higher risk.
The monitoring system of the correspondent institution flags the transaction as suspicious activity. The correspondent bank needs to send a request for information to the respondent bank. Which elements should be included in the request? (Select Three.)
Answer : A, C, E
The request for information should include the following elements:
Details of DEF Oil Resource Ltd parent company and the name(s) of the beneficial owner(s) (Option A): This is necessary to verify the identity and ownership structure of the remitter and to assess the risk level of the customer and the transaction.
The account profile of the customer and their KYC data (Option C): This is necessary to understand the nature and purpose of the customer's business relationship with the respondent bank and to compare it with the observed transactional activity.
The contract pertaining to the purchase of property in another country (Option E): This is necessary to verify the legitimacy and source of funds for the transaction and to identify the ultimate beneficiary of funds.
The other options are not relevant or necessary for the request for information. The full transaction history of the correspondent bank's customer (Option B) is too broad and may not be related to suspicious activity. The respondent bank's customer's senior management bonus plan (Option D) is not relevant to the transaction and may not be available to the respondent bank. The last 6 months of transactional history (Option F) is also too broad and may not be related to the suspicious activity.
Advanced CAMS-FCI Certification Handbook, page 19
A U.S. financial institution (Fl) receives a grand jury subpoena for a corporate client's account. The Fl should:
Answer : B
The Fl should review the corporate account's activity and transactions. This is because a grand jury subpoena is a legal request for information or testimony that may be used in a criminal investigation or prosecution. The Fl should review the account for any suspicious or unusual activity that may be related to the subpoena or indicate money laundering, terrorist financing, or other financial crimes. The Fl should also document its review and retain any relevant records.
An investigator is reviewing an alert for unusual activity. System scanning detected a text string within a company customer's account transactions that indicates the account may have been used for a drug or drug paraphernalia purchase Based on the KYC profile, the investigator determines the customer's company name and business type are marketed as a gardening supplies company. The investigator reviews the account activity and notes an online purchase transaction that leads the investigator to a website that sells various strains of marijuan
a. Additional account review detects cash deposits into the account at the branch teller lines, so the investigator reaches out to the teller staff regarding the transactions. The teller staff member reports that the business customers have frequently deposited cash in lower amounts. The teller, without prompting, adds that one of the transactors would occasionally smell of a distinct scent of marijuana smoke.
Which are the best next steps for the investigator to take? (Select Three.)
Answer : A, C, E
The best next steps for the investigator to take are:
A . Review the customer's transaction history. This can help the investigator identify any patterns or anomalies in the customer's account activity, such as changes in transaction volume, frequency, amount, source, destination, purpose, etc. The investigator can also compare the customer's transaction history with their KYC profile and risk rating to assess if there are any discrepancies or inconsistencies.
C . Check internal KYC information. This can help the investigator verify the customer's identity, business nature, ownership structure, expected activity, source of funds, etc. The investigator can also update or enhance the customer's KYC information based on any new or relevant information obtained from other sources.
E Conduct adverse media and open-source searches on the customer's background. This can help the investigator find out if there is any negative or adverse information about the customer in public data sources, such as news articles, social media posts, blogs, forums, etc. Adverse media and open-source searches can also provide additional context and insight into the customer's reputation, behavior, associations, etc. The other options are incorrect because:
B . Request information from the internet service provider who hosts the website is not feasible, as it may require a legal process or a court order to obtain such information. Moreover, the internet service provider may not have or disclose any useful information about the website or its owner.
D . Research other customer accounts for transactions to the same website is not relevant, as it may not provide any meaningful information about the customer under investigation. Furthermore, it may violate the privacy and confidentiality of other customers who are not related to the investigation.
F . Identify if the customer has opened accounts in an urban city area is not helpful, as it may not have any bearing on the customer's involvement in a drug or drug paraphernalia purchase. Additionally, it may not be possible to access or verify such information without the customer's consent or authorization.
Advanced CAMS-FCI Certification | ACAMS, Section 2: Investigating Financial Crimes, page 11
Leading Complex Investigations Certificate | ACAMS, Module 3: Conducting Research and Analysis, page 6
Adverse Media Screening - Using AI to Mitigate Risk
Legal requirements for adverse media screening - Thomson Reuters
Electronic client due diligence | Ethics helpsheets | ICAEW
6AMLD & FATF: Where Adverse Media Screening Fits In
Free Adverse Media Check | NameScan
Which payment method for purchasing luxury items is a red flag for potential money laundering?
Answer : B
According to the Financial Action Task Force (FATF), the use of large amounts of cash is a common method for money launderers to move illicit funds [1]. Purchasing luxury items with cash can indicate an attempt to convert illegal funds into tangible assets that can be easily resold or moved across borders. As a result, businesses that deal with luxury items are required to implement enhanced due diligence measures, including monitoring transactions involving large amounts of cash [1].
During a review, an analyst notices discrepancies between a customer's nature of business listed on the business registry and what was stated on the customers application. The analyst should:
Answer : A
The analyst should clarify discrepancies noted in the customer's declared profile given the downstream impact on the risk assessment. This is because discrepancies between the customer's nature of business and the information on the business registry may indicate that the customer is not operating a legitimate business or is trying to conceal its true activities. The analyst should verify the customer's identity, source of funds, and purpose of transactions to ensure that the customer's risk profile is accurate and consistent with the Fl's risk appetite.
While each is potentially important, which allows an investigations analyst to better write a SAR/STR narrative that is useful to law enforcement? (Select Two.)
Answer : D, E
A SAR/STR narrative that is useful to law enforcement should include a detailed description of the known or suspected criminal violation or suspicious activity, as well as ensure that all information in the SAR/STR is complete and accurate based on what the institution knows. These elements help law enforcement to understand the nature and scope of the suspicious activity, and to follow up with further investigation if needed. The other options are not essential for a useful SAR/STR narrative, as they either provide irrelevant or redundant information, or could compromise the confidentiality of the report.
Which pattern of activity most strongly indicates an individual is a foreign terrorist fighter?
Answer : B
The pattern of activity that most strongly indicates an individual is a foreign terrorist fighter is a large cash advance on a credit card and purchases at travel and sporting goods websites. This is because this pattern may suggest that the individual is preparing to travel to a conflict zone and purchase equipment or supplies for terrorist activities. According to the United Nations Office on Drugs and Crime, some of the indicators of foreign terrorist fighters include1:
Sudden or increased financial activity, such as cash withdrawals, transfers, or deposits, especially in large amounts or involving foreign currency or locations.
Purchases of travel-related items, such as airline tickets, passports, visas, luggage, or clothing, especially to or from high-risk destinations or transit hubs.
Purchases of items that could be used for terrorist purposes, such as weapons, explosives, chemicals, communication devices, or survival gear.
Changes in behavior, such as expressing radical views, cutting ties with family or friends, joining extremist groups, or displaying signs of emotional distress.
Foreign Terrorist Fighters - United Nations Office on Drugs and Crime
During transaction monitoring. Bank A learns that one of their customers. Med Supplies 123, is attempting to make a payment via wire totaling 382,500 USD to PPE Business LLC located in Mexico to purchase a large order of personal protective equipment. specifically surgical masks and face shields. Upon further verification. Bank A decides to escalate and refers the case to investigators.
Bank A notes that, days prior to the above transaction, the same customer went to a Bank A location to wire 1,215,280 USD to Breath Well LTD located in Singapore. Breath Well was acting as an intermediary to purchase both 3-ply surgical masks and face shields from Chin
a. Bank A decided not to complete the transaction due to concerns with the involved supplier in China. Moreover, the customer is attempting to send a third wire in the amount of 350,000 USD for the purchase of these items, this time using a different vendor in China. The investigator must determine next steps in the investigation and what actions, if any. should be taken against relevant parties.
Upon further investigation. Bank As investigator learns that both the Mexico- and Singapore-based companies are linked to the alleged suppliers in China. Which additional indicators would the investigator need to identify to determine if this fits a fentanyl (drug) trafficking typology? (Select Two.)
Answer : A, C
SAR/STR NARRATIVE
A SAR/STR has been submitted on five transactions conducted on the correspondent banking relationship with ABC Bank.
Client Information:
Remitter information: DEF Oil Resource Ltd. is the oldest member of the DEF Group. It was founded in 1977 as a general trading business with a primary focus on exports from Africa and North Americ
a. The group has business activities that span the entire energy value chain. Their core field of endeavor is centered within the oil and gas industry and its associated sub-sectors.
Beneficiary Information:
As per the response received from ABC Bank, it was determined that the beneficiaries are related to DEF Oil Resource Ltd. These were created by DEF Oil Resource Ltd. to purchase property in a foreign country on behalf of their senior management as part of a bonus scheme. The purpose behind this payment was for the purchase of property in another country.
Payment Reference:
ABCXXXXX31PZFG2H
ABCXXXXXX51PQGEH
ABCXXXXXX214QWVG
ABCXXXXXX41PSXA2
ABCXXXXXX815QWS3
Concerns:
* We are unsure about the country of incorporation of the beneficiaries.
* We are concerned about the transactional activity since the payment made towards entities (conducted on behalf of individuals) appears to be possible tax evasion.
* There appears to be an attempt to conceal the identity of individuals (senior management), which again raises concerns about the source of funds.
* Referring to the response received from ABC Bank, we are unclear about the ultimate beneficiary of funds.
* The remitter is involved in a high-risk business, (i.e., oil and crude products trading), and the beneficiary is involved in real estate business which again poses a higher risk.
While reviewing the account activity, it is noted that several transfers are sent to a company located in an offshore jurisdiction. Which step should the investigator take next?
Answer : C
The best step for the investigator to take next is to request information about the beneficiaries related to the company. This will help to identify the ultimate beneficial owners of the funds and the purpose of the transactions. Requesting information from the company or filing a SAR/STR to the FIU where the company is located may not be feasible or effective, as the company may not cooperate or the FIU may not have jurisdiction over the offshore entity. Conducting an open-source search may provide some information about the ownership and registration of the company, but it may not be sufficient or reliable to determine the nature and legitimacy of the transactions.
SAR Narrative Guidance Package
Best Practices for Drafting an STR or SAR
Refer to the exhibit.

During a review of the accounts related to Richard Aston, an investigator notices a high number of incoming payments from various individuals. They also notice that these incoming payments typically occur during large sporting events or conferences. As a result of the account review, of which illegal activity does the investigator have reasonable grounds to suspect Richard Aston?
Answer : B
The illegal activity that the investigator has reasonable grounds to suspect Richard Aston of is aftermarket sales of entertainment admission tickets. This is because aftermarket sales of entertainment admission tickets involve reselling tickets for events, concerts, festivals, etc. at a higher price than their face value, often through online platforms or scalpers. This practice can be illegal or unethical, depending on the jurisdiction and the terms and conditions of the original ticket seller. The investigator should look for indicators of aftermarket sales of entertainment admission tickets, such as high volume or frequency of incoming payments from various individuals, correlation between incoming payments and major events or conferences, and discrepancy between the customer's profile and the nature of the transactions. The other options are incorrect because:
A . Embezzling from the hotel is not likely, as it would involve stealing money or property from the hotel by an employee or a person in a position of trust. There is no evidence that Richard Aston works for or has access to the hotel's assets.
C . Human trafficking is not probable, as it would involve exploiting people for forced labor or commercial sexual exploitation. There is no indication that Richard Aston is involved in any form of human trafficking or has any connection to victims or perpetrators.
D . Sports betting is not plausible, as it would involve wagering money on the outcome of sporting events or games. There is no sign that Richard Aston is engaged in any sports betting activity or has any association with bookmakers or gamblers.
Advanced CAMS-FCI Certification | ACAMS, Section 2: Investigating Financial Crimes, page 10
TicketSwap: The safest way to buy and sell tickets
Ticketing 101 | Ticketmaster
10 Types of Tickets For Events (+ Why & When To Use Them) - Eventbrite
SAR/STR NARRATIVE
A SAR/STR has been submitted on five transactions conducted on the correspondent banking relationship with ABC Bank.
Client Information:
Remitter information: DEF Oil Resource Ltd. is the oldest member of the DEF Group. It was founded in 1977 as a general trading business with a primary focus on exports from Africa and North Americ
a. The group has business activities that span the entire energy value chain. Their core field of endeavor is centered within the oil and gas industry and its associated sub-sectors.
Beneficiary Information:
As per the response received from ABC Bank, it was determined that the beneficiaries are related to DEF Oil Resource Ltd. These were created by DEF Oil Resource Ltd. to purchase property in a foreign country on behalf of their senior management as part of a bonus scheme. The purpose behind this payment was for purchase of property in another country.
Payment Reference:
ABCXXXXX31PZFG2H
ABCXXXXXX51PQGEH
ABCXXXXXX214QWVG
ABCXXXXXX41PSXA2
ABCXXXXXX815QWS3
Concerns:
* We are unsure about the country of incorporation of the beneficiaries.
* We are concerned about the transactional activity since the payment made towards entities (conducted on behalf of individuals) appears to be possible tax evasion.
* There appears to be an attempt to conceal the identity of individuals (senior management), which again raises concerns about the source of funds.
* Referring to the response received from ABC Bank, we are unclear about the ultimate beneficiary of funds.
* The remitter is involved in a high-risk business, (i.e., oil and crude products trading), and the beneficiary is involved in a real estate business which again poses a higher risk.
The monitoring system of the correspondent institution flags the transaction as suspicious activity. The correspondent bank needs to send a request for information to the respondent bank. Which elements should be included in the request? (Select Three.)
Answer : A, C, E
The request for information should include the following elements:
Details of DEF Oil Resource Ltd parent company and the name(s) of the beneficial owner(s) (Option A): This is necessary to verify the identity and ownership structure of the remitter and to assess the risk level of the customer and the transaction.
The account profile of the customer and their KYC data (Option C): This is necessary to understand the nature and purpose of the customer's business relationship with the respondent bank and to compare it with the observed transactional activity.
The contract pertaining to the purchase of property in another country (Option E): This is necessary to verify the legitimacy and source of funds for the transaction and to identify the ultimate beneficiary of funds.
The other options are not relevant or necessary for the request for information. The full transaction history of the correspondent bank's customer (Option B) is too broad and may not be related to suspicious activity. The respondent bank's customer's senior management bonus plan (Option D) is not relevant to the transaction and may not be available to the respondent bank. The last 6 months of transactional history (Option F) is also too broad and may not be related to the suspicious activity.
Advanced CAMS-FCI Certification Handbook, page 19
Which information is it best practice to share at the very beginning of a well-written SAR/STR narrative?
Answer : B
The best information to share at the very beginning of a well-written SAR/STR narrative is the purpose of the SAR/STR narrative and a general description of the known or alleged violation. This is because this information provides an overview of why the SAR/STR is being filed and what type of suspicious activity or transaction is involved. It also helps to capture the attention of the reader and set the tone for the rest of the narrative.
The investigative department of a financial institution (Fl) receives an internal escalation notice from the remittance department for a SWIFT message requesting a refund due to potential fraud. The notice indicates that a total of three international incoming remittances were transferred to a corporate customer from Country A, in the amount of approximately 5 million EUR for each. The first two incoming remittances had been exchanged into currency B and transferred out to Country B a few days ago. The third incoming remittance has been held by the remittance department.
As noted from the KYC profile, the corporate customer is working in the wood industry. with the last account review completed 3 months ago. Since the account's opening. there has been no history of a large amount of funds flowing through the account. The investigator conducts an Internet search and finds that the remitter is a food beverage company.
The same morning, the investigator receives a call from a financial intelligence unit (FIU) inquiring about the same incident. The FIU states that it will issue a warrant to freeze the account on the same day.
Which steps for documenting the final investigation decision are appropriate for the investigator in this scenario?
Answer : C
The investigator should document the investigation process and retain all relevant documents in the case management system. This is because documenting the investigation process is a good practice to ensure the quality and consistency of the investigation, as well as to facilitate the review and audit of the investigation. Retaining all relevant documents is also important to support the evidence and findings of the investigation, as well as to comply with the record-keeping requirements of the relevant authorities. The other options are incorrect because:
A . Excluding any open-source information from record-keeping is not advisable, as open-source information can provide valuable insights and context for the investigation, and may not be easily retrievable in the future.
B . Adding all of the information the FI has about the subject, their account(s) activity, research results, KYC information, etc. to the SAR/STR is not necessary, as the SAR/STR should only contain the essential information that is relevant and material to the suspicious activity. Adding too much information may obscure the main points and make the SAR/STR less effective.
D . Not documenting the investigation process if a SAR/STR is not filed is not acceptable, as the investigation process should be documented regardless of the outcome. Documenting the investigation process can help justify why a SAR/STR was not filed, and also provide a reference for future investigations involving the same subject or activity.
Advanced CAMS-FCI Certification | ACAMS, Section 3: Reporting Suspicious Activity, page 14
Leading Complex Investigations Certificate | ACAMS, Module 4: Documenting Your Investigation, page 4
A bank investigator notices an account receiving multiple deposits from the same employer under different employees' names. A cash withdrawal occurs one day after each deposit. The outcome of this investigation will likely uncover which crime typology?
Answer : D
The correct answer is A because this scenario describes a possible case of human trafficking, which is a crime where people are exploited for labor or sexual services against their will. Human traffickers may use bank accounts to launder their proceeds and pay their victims, and they may use fake or stolen identities to avoid detection. The other options are not likely because they do not explain why multiple deposits from the same employer under different employees' names would occur, nor why cash withdrawals would follow each deposit.
An investigator at a corporate bank is conducting transaction monitoring alerts clearance.
KYC profile background: An entity customer, doing business offshore in Hong Kong, established a banking business relationship with the bank since 2017 for deposit and loan purposes. It acts as an offshore investment holding company. The customer declared that the ongoing source of funds to this account comes from group-related companies.
* X is the UBO. and owns 97% shares of this entity customer;
* Y is is the authorized signatory of this entity customer. This entity customer was previously the subject of a SAR/STR.
KYC PROFILE
Customer Name: AAA International Company. Ltd
Customer ID: 123456
Account Opened: June 2017
Last KYC review date: 15 Nov 2020
Country and Year of Incorporation: The British Virgin Islands, May 2017
AML risk level: High
Account opening and purpose: Deposits, Loans and Trade Finance
Anticipated account activities: 1 to 5 transactions per year and around 1 million per
transaction amount
During the investigation, the investigator reviewed remittance transactions activities for the period from Jul 2019 to Sep 2021 and noted the following transactions pattern:
TRANSACTION JOURNAL
Review dates: from July 2019 to Sept 2021
For Hong Kong Dollars (HKD) currency:
Incoming transactions: 2 inward remittances of around 1.88 million HKD in total from
different third parties
Outgoing transactions: 24 outward remittances of around 9 4 million HKD in total to
different third parties
For United States Dollars (USD) currency:
Incoming transactions: 13 inward remittances of around 3.3 million USD in total from
different third parties
Outgoing transactions: 10 outward remittances of around 9.4 million USD in total to
different third parties.
RFI Information and Supporting documents:
According to the RFI reply received on 26 May 2021, the customer provided the bank
with the information below:
1) All incoming funds received in HKD & USD currencies were monies lent from non-customers of the bank. Copies of loan agreements had been provided as supporting documents. All of the loan agreements were in the same format and all the lenders are engaged in trading business.
2) Some loan agreements were signed among four parties, including among lenders. borrower (the bank's customer), guarantor, and guardian with supplemental agreements, which stated that the customer, as a borrower, who failed to repay the loan
After reviewing the transaction journal, request for information response, and supporting documentation, the investigator determines that additional information is needed. Which additional information should the investigator request?
Answer : C
The additional information that the investigator should request is the source of the incoming funds to the group-related companies. This is because the customer declared that the ongoing source of funds to this account comes from group-related companies, but the transaction journal shows that the customer received funds from different third parties, not from group-related companies. Therefore, the investigator should verify the relationship and legitimacy of these third parties and their funds with the customer and the group-related companies. The other options are not relevant or necessary for this investigation.
An investigator receives an alert documenting a series of transactions. A limited liability corporation (LLC) wired 59.000,000 USD to an overseas account associated with a state-run oil company. A second account associated with the state-run oil company wired 600,000,000 USD to the LLC. The LLC then wired money to other accounts, a money brokerage firm, and real estate purchases.
The investigator initiated an enhanced KYC investigation on the LLC. The financial institution opened the LLC account a couple of weeks prior to the series of transactions. The names associated with the LLC had changed multiple times since the account opened. A search of those names revealed relations with multiple LLCs. Public records about the LLCs did not show any identifiable business activities.
Open-source research identified mixed reports about the brokerage firm. The firm indicated it purchased mutual funds for its clients and dispensed returns to clients.
Media reports claimed the firm laundered money by holding for a fee before returning it to investors.
The investigator discovers that the bank has no records pertaining to ownership of the LLC. What would this mean for the bank and/or investigator?
Answer : C
The bank is out of compliance with CIP regulations because it did not obtain the minimum identifying information from the customer prior to opening the account, as required by 31 CFR 1020.220(a)(2)(i)(A). The bank should have obtained the name, date of birth, address, and identification number of the customer, as well as verified the identity of the customer to the extent reasonable and practicable. The lack of ownership data may also indicate a violation of beneficial ownership regulations, but that is not the primary issue in this case.
An analyst reviews an alert for high volume Automated Clearing House (ACH) activity in an account. The analyst's initial research finds the account is for a commercial daycare account that receives high volumes of large government-funded ACH transactions to support the programs. The account activity consists of checks (cheques) made payable to individual names in varying dollar amounts. One check indicates rent to another business.
An Internet search finds that the daycare company owner has previous government-issued violations for safety and classroom size needs, such as not having enough chairs and tables per enrollee. These violations were issued to a different daycare name.
Simultaneous to this investigation, another analyst sends an email about negative news articles referencing local child/adult daycare companies misusing governmental grants. This prompts the financial institution (Fl) to search all businesses for names containing daycare' or "care*. Text searches return a number of facilities as customers at the Fl and detects that three of these businesses have a similar transaction flow of high volume government ACH funding with little to no daycare expenses.
During the investigation, new suspicious patterns and trends related to check cashing are observed. The Fl decides to conduct a training to ensure that 1) the AML program is robust and 2) the training program is relevant and appropriate. Which parties should be trained on emerging trends and red flags? (Select Two.)
Answer : A, C
The parties that should be trained on emerging trends and red flags are the financial crimes investigation unit (A) and the branch personnel . These parties are directly involved in detecting, investigating, and reporting suspicious activity related to check cashing or other types of fraud or money laundering. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should provide regular and relevant training to its staff on the AML program, policies, procedures, and systems, as well as on the latest typologies, indicators, and best practices for financial crimes investigations'' (p. 36). The FI should also ''ensure that the training is tailored to the specific roles and responsibilities of the staff, and that it is updated and evaluated periodically'' (p. 36).
The other parties are not as relevant or appropriate as options A and C. The loan department (B) is not directly related to check cashing or other types of fraud or money laundering, although it may have some exposure to credit or identity fraud. The senior management (D) is responsible for overseeing and supporting the AML program, but not for conducting or supervising financial crimes investigations. The board of directors (E) is responsible for approving and reviewing the AML program, but not for implementing or monitoring it.
An investigator is reviewing an alert for unusual activity. System scanning detected a text string within a company customer's account transactions that indicates the account may have been used for a drug or drug paraphernalia purchase Based on the KYC profile, the investigator determines the customer's company name and business type are marketed as a gardening supplies company. The investigator reviews the account activity and notes an online purchase transaction that leads the investigator to a website that sells various strains of marijuan
a. Additional account review detects cash deposits into the account at the branch teller lines, so the investigator reaches out to the teller staff regarding the transactions. The teller staff member reports that the business customers have frequently deposited cash in lower amounts. The teller, without prompting, adds that one of the transactors would occasionally smell of a distinct scent of marijuana smoke.
Which are the best next steps for the investigator to take? (Select Three.)
Answer : A, C, E
The best next steps for the investigator to take are:
A . Review the customer's transaction history. This can help the investigator identify any patterns or anomalies in the customer's account activity, such as changes in transaction volume, frequency, amount, source, destination, purpose, etc. The investigator can also compare the customer's transaction history with their KYC profile and risk rating to assess if there are any discrepancies or inconsistencies.
C . Check internal KYC information. This can help the investigator verify the customer's identity, business nature, ownership structure, expected activity, source of funds, etc. The investigator can also update or enhance the customer's KYC information based on any new or relevant information obtained from other sources.
E Conduct adverse media and open-source searches on the customer's background. This can help the investigator find out if there is any negative or adverse information about the customer in public data sources, such as news articles, social media posts, blogs, forums, etc. Adverse media and open-source searches can also provide additional context and insight into the customer's reputation, behavior, associations, etc. The other options are incorrect because:
B . Request information from the internet service provider who hosts the website is not feasible, as it may require a legal process or a court order to obtain such information. Moreover, the internet service provider may not have or disclose any useful information about the website or its owner.
D . Research other customer accounts for transactions to the same website is not relevant, as it may not provide any meaningful information about the customer under investigation. Furthermore, it may violate the privacy and confidentiality of other customers who are not related to the investigation.
F . Identify if the customer has opened accounts in an urban city area is not helpful, as it may not have any bearing on the customer's involvement in a drug or drug paraphernalia purchase. Additionally, it may not be possible to access or verify such information without the customer's consent or authorization.
Advanced CAMS-FCI Certification | ACAMS, Section 2: Investigating Financial Crimes, page 11
Leading Complex Investigations Certificate | ACAMS, Module 3: Conducting Research and Analysis, page 6
Adverse Media Screening - Using AI to Mitigate Risk
Legal requirements for adverse media screening - Thomson Reuters
Electronic client due diligence | Ethics helpsheets | ICAEW
6AMLD & FATF: Where Adverse Media Screening Fits In
Free Adverse Media Check | NameScan
According to the Financial Action Task Force, as part of their risk assessment, which are important data and information that a Trust and Company Service Provider must understand when establishing and administering a trust? (Select Two.)
Answer : A, D
Here is the exact information from the Financial Action Task Force (FATF) Guidance for a Risk-Based Approach for Trust and Company Service Providers:
'Understanding the management and ownership structure of a trust is crucial in assessing the ML/TF risk it poses. This includes the identity of all settlors, trustees and beneficiaries, and their respective roles and responsibilities, as well as the nature and purpose of the trust.'
'TCSPs should obtain and maintain up-to-date information on the purpose and intended nature of the business relationship, the source of funds and wealth, and where relevant, the source of funds or wealth of the settlor and beneficiaries.'
Based on this information, the correct answers are A and D. Trust and Company Service Providers must understand the responsibility and authority in the structure, as well as the general purpose behind the structure in order to assess the overall risk of the trust and ensure that any transactions with the trust are legitimate.
During transaction monitoring. Bank A learns that one of its customers. Med Supplies 123, is attempting to make a payment via wire totaling 382.500 USD to PPE Business LLC located in Mexico to purchase a large order of personal protective equipment. specifically surgical masks and face shields. Upon further verification. Bank A decides to escalate and refers the case to investigators.
Bank A notes that days prior to the above transaction, the same customer went to a Bank A location to wire 1,215,280 USD to Breath Well LTD located in Singapore. Breath Well was acting as an intermediary to purchase both 3-ply surgical masks and face shields from Chin
a. Bank A decided not to complete the transaction due to concerns with the involved supplier in China. Moreover, the customer is attempting to send a third wire in the amount of 350,000 USD for the purchase of these items, this time using a different vendor in China. The investigator must determine the next steps in the investigation and what actions, if any. should be taken against relevant parties.
The investigator is gathering more information to determine if a SAR/STR filing is needed. Which steps are the correct ways of collecting the additional information? (Select Two.)
Answer : A, D
The correct answer is A and C because these indicators suggest that the customer is using fraudulent documents and misrepresenting the goods to conceal the illicit nature of the transactions. Fentanyl traffickers often use front companies and falsified invoices to disguise their shipments as legitimate products, such as medical supplies or chemicals. Reviewing the invoices and transportation documents, as well as the FDA product certifications, can help to identify discrepancies or anomalies that indicate fraud or deception.
Due to an ever-diversifying business model and multi-jurisdictional footprint, a casino has decided to outsource the source of funds and wealth checks to a third-party provider. Why is it important for the casino to maintain control of the output from the provider?
Answer : C
The reason why it is important for the casino to maintain control of the output from the provider is that the casino maintains ultimate responsibility for this activity and should maintain control to avoid non-compliance . This is because the casino is accountable for its own AML/CFT obligations and cannot delegate or outsource them to a third-party provider. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should ensure that it has adequate oversight and control over any third-party providers that it engages for AML/CFT purposes, such as conducting due diligence, verifying information, or monitoring transactions'' (p. 25). The FI should also ''review and evaluate the performance and quality of the third-party providers on a regular basis, and address any issues or gaps that may arise'' (p. 25).
The other options are not as relevant or accurate as option C. The clients of the casino prefer to know that the casino is keeping their information secure when being held by a third-party (A) is not a reason why the casino should maintain control of the output from the provider, but rather a customer expectation or preference. As with all third-party relationships, proper control must be maintained to ensure profitability (B) is not a reason why the casino should maintain control of the output from the provider, but rather a general business principle or objective. Other casinos are frequently looking to reduce costs and share ideas, so if this relationship is successful, the model can be used by other businesses (D) is not a reason why the casino should maintain control of the output from the provider, but rather a potential benefit or outcome.
An analyst reviews an alert for high volume Automated Clearing House (ACH) activity in an account. The analyst's initial research finds the account is for a commercial daycare account that receives high volumes of large government-funded ACH transactions to support the programs. The account activity consists of checks (cheques) made payable to individual names in varying dollar amounts. One check indicates rent to another business.
An Internet search finds that the daycare company owner has previous government-issued violations for safety and classroom size needs, such as not having enough chairs and tables per enrollee. These violations were issued to a different daycare name.
Simultaneous to this investigation, another analyst sends an email about negative news articles referencing local child/adult daycare companies misusing governmental grants. This prompts the financial institution (Fl) to search all businesses for names containing daycare' or care*. Text searches return a number of facilities as customers at the Fl and detects that three of these businesses have a similar transaction flow of high volume government ACH funding with little to no daycare expenses.
The analyst determines that site visits should be conducted for the three daycare businesses. Which observations at the on-site visits would justify writing a SAR/STR? (Select Three.)
Answer : A, C, F
The observations at the on-site visits that would justify writing a SAR/STR are signs of severe wear and poor maintenance at the site (A), lights turned off at the site during operational hours , and a full parking lot of cars with no staff at the site (F). These observations suggest that the daycare businesses are not operating legitimately or providing adequate services to their customers, and that they may be misusing governmental grants or laundering money through their accounts. These observations are consistent with some of the red flags for fraud identified by ACAMS2, such as:
Inadequate facilities or equipment for the type of business
Lack of visible activity or customers at the business location
Discrepancy between reported income and expenses
Unusual volume or frequency of transactions
The other observations are not as relevant or indicative of fraud as options A, C, and F. A site located in a commercial building (B) could be a normal or legitimate choice for a daycare business, depending on its size, location, and availability. Visible attendance with children being dropped off by parents (D) could show that the daycare business is providing genuine services to its customers, although it does not rule out possible fraud or money laundering. Visible signage indicating the purpose of building (E) could also show that the daycare business is transparent and legitimate, although it does not guarantee its quality or compliance.
Online payments from a customer's account to three foreign entities trigger an investigation. The investigator knows the funds originated from family real estate after an investment company approached the customer online. Funds were remitted for pre-lPO shares. Which should now occur in the investigation?
Answer : C
The correct answer is C because reviewing the structure of the transactions to the three entities can help the investigator to identify any red flags or indicators of fraud, such as unusual amounts, frequency, destinations, or beneficiaries. The other options are not as relevant or effective in this scenario. Option A is not necessary because the investigator already knows the source of funds for the customer. Option B is not advisable because contacting the customer directly may alert them to the investigation and compromise its integrity. Option D is not helpful because inspecting electronic banking login records does not provide any information about the nature or purpose of the transactions.
Advanced CAMS-FCI Study Guide, page 281
Financial Crime Typologies - Intermediate Certificate Course, Module 32
Law enforcement agents arrive at a broker-dealer's premises with a search warrant. In addition to cooperation with the warrant, which instructions should the person in charge of the broker-dealer provide to their employees?
Answer : A
The instruction that the person in charge of the broker-dealer should provide to their employees is to take notes on the questions and comments made by the agents (A). This is because taking notes can help the employees to recall and document what happened during the search warrant execution, which can be useful for legal or regulatory purposes. According to ACAMS3, ''the FI should instruct its staff to cooperate with LE agents during a search warrant execution, but also to take notes of what is being searched, seized, or asked by the agents'' (p. 35). The FI should also ''keep copies of any documents or records that are taken by LE agents'' (p. 35).
The other instructions are not correct. The person in charge of the broker-dealer should not instruct their employees to sign consent forms permitting the agents to search employees' offices (B), as this is unnecessary and potentially risky, as the agents already have a valid search warrant that authorizes them to search the premises. The person in charge of the broker-dealer should not instruct their employees to provide agents with unlimited access to customers' personal data , as this could violate privacy or data protection laws, as well as compromise customer trust and confidentiality. The person in charge of the broker-dealer should not instruct their employees to volunteer information not requested by the agents that they think may be useful (D), as this could interfere with the LE investigation or expose them to legal or regulatory risks.
Introduction to Transnational Organized Crime
ACAMS Law Enforcement and Financial Crimes Investigations eLearning Course Module
Law Enforcement Requests and Actions
The intended benefits of section 314(b) of the USA PATRIOT Act include: (Select Three.)
Answer : B, E, F
Section 314(b) of the USA PATRIOT Act allows financial institutions to share information with each other, under a safe harbor that offers protection from liability, in order to better identify and report potential money laundering or terrorist financing activities. The intended benefits of this information sharing include:
Participating financial institutions sharing information about suspicious activity by customers that may have otherwise gone unnoticed. For example, if a customer is conducting transactions with multiple financial institutions that individually do not appear suspicious, but collectively indicate a pattern of money laundering or terrorist financing, the financial institutions can share this information and report it to the authorities.
Detecting money laundering and terrorist financing approaches and schemes across multiple financial institutions. For example, if a financial institution identifies a new typology or modus operandi of money laundering or terrorist financing, it can share this information with other financial institutions to help them prevent or detect similar activities by their customers.
Obtaining additional information on customers or transactions regarding potential money laundering or terrorist financing. For example, if a financial institution has incomplete or insufficient information on a customer or a transaction that raises suspicion, it can request more information from another financial institution that may have dealt with the same customer or transaction.
Section 314(b) | FinCEN.gov
Section 314(b) Fact Sheet - FinCEN.gov
During transaction monitoring. Bank A learns that one of their customers. Med Supplies 123, is attempting to make a payment via wire totaling 382,500 USD to PPE Business LLC located in Mexico to purchase a large order of personal protective equipment. specifically surgical masks and face shields. Upon further verification. Bank A decides to escalate and refers the case to investigators.
Bank A notes that, days prior to the above transaction, the same customer went to a Bank A location to wire 1,215,280 USD to Breath Well LTD located in Singapore. Breath Well was acting as an intermediary to purchase both 3-ply surgical masks and face shields from Chin
a. Bank A decided not to complete the transaction due to concerns with the involved supplier in China. Moreover, the customer is attempting to send a third wire in the amount of 350,000 USD for the purchase of these items, this time using a different vendor in China. The investigator must determine next steps in the investigation and what actions, if any. should be taken against relevant parties.
Upon further investigation. Bank As investigator learns that both the Mexico- and Singapore-based companies are linked to the alleged suppliers in China. Which additional indicators would the investigator need to identify to determine if this fits a fentanyl (drug) trafficking typology? (Select Two.)
Answer : A, C
A financial regulator is evaluating the effectiveness of a financial institution's (Fl) anti-financial crime program. Which condition should be met to satisfy the regulator?
Answer : D
The condition that should be met to satisfy the regulator is that the program is drafted using a risk-based approach to avoid the FI being used as a conduit for criminal activities. A risk-based approach means that the FI identifies, assesses, and understands its exposure to financial crime risks and applies appropriate measures to mitigate them. This is consistent with the international standards and best practices for anti-financial crime compliance. The program being aligned with the financial industry's anti-financial crime priorities, meeting the minimum requirements of anti-financial crime standards published by a financial industry association, or having no high-severity issues in internal auditing results are not sufficient to satisfy the regulator, as they do not necessarily reflect the specific risks faced by the FI or demonstrate its effectiveness in preventing and detecting financial crimes.
A financial institution
Answer : C
The correct answer is C because the FI is unable to obtain evidence of required licensing or registration despite suspicion of money transmitting, which is a red flag for money laundering and a violation of federal and state laws. Option A is incorrect because making several deposits in one month that appear to exceed their expected monthly income might not be indicative of suspicious activity, depending on the customer's profile and source of funds. Option B is incorrect because receiving a large, one-time wire from a law firm might not be indicative of suspicious activity, depending on the customer's relationship with the law firm and the purpose of the wire. Option D is incorrect because discovering a large number of securities transactions that appear to be related to day trading might not be indicative of suspicious activity, depending on the customer's investment strategy and risk tolerance.
A criminal is engaged in chain hopping while trying to launder ransomware payments. The criminal will likely:
Answer : B
Chain hopping is a technique used by criminals to obscure the traceability of cryptocurrency transactions by converting the funds to a different type of cryptocurrency, often using multiple exchanges or platforms. The other options are not related to chain hopping. Reference: Advanced CAMS-FCI Study Guide, page 38.
An unusual spike in activity has occurred for a customer who is a supplier of aviation parts to a military force. The customer's current line of business is consistent with the banks records, and no adverse media hits have occurred. Which is the best reason for an investigator to continue an investigation?
Answer : A
The best reason for an investigator to continue an investigation is that the end-user is a military force. This is because supplying aviation parts to a military force may involve sanctions risk, export control risk, or human rights risk, depending on the nature and destination of the military force. The investigator should conduct further due diligence to determine if the customer is complying with the relevant laws and regulations, and if the bank is exposed to any reputational or legal risk by providing services to the customer.
Former Airline Employee and Aircraft Part Sellers Charged in Kickback ...
Former Airline Employee and Aircraft Part Sellers Charged in Kickback ...
Former airline employee and aircraft part sellers charged in kickback ...
Which actions should financial institutions perform to ensure proper data governance? (Select Three.)
Answer : A, B, D
Financial institutions should perform the following actions to ensure proper data governance:
Establish an appropriate data management method for collecting and storing information. This is important to ensure that the data is consistent, reliable, and accessible for various purposes, such as risk assessment, compliance reporting, and customer service. Data management methods may include defining data standards, policies, and procedures; implementing data quality controls and validation checks; and using appropriate data storage systems and formats.
Ensure the accuracy of customer identification records and transaction records and appropriately manage data as a prerequisite for the effective use of IT systems. This is important to comply with the anti-money laundering and counter-terrorist financing (AML/CFT) requirements, such as customer due diligence, transaction monitoring, and suspicious activity reporting. Accurate and complete customer and transaction data also enables financial institutions to use IT systems more effectively for data analysis, risk management, and decision making.
Periodically validate integrity and accuracy of information used for IT systems such as customer information, customer identification records, and transaction records. This is important to ensure that the data remains up-to-date, relevant, and reliable over time. Data validation may include verifying the source and quality of the data; identifying and correcting any errors or inconsistencies; and updating or deleting any obsolete or redundant data.
Data Governance for Financial Institutions - Capgemini
Small and Medium-Sized Deposit-Taking Institutions (SMSBs) Capital and Liquidity Requirements - OSFI
Due to an ever-diversifying business model and multi-jurisdictional footprint, a casino has decided to outsource the source of funds and wealth checks to a third-party provider. Why is it important for the casino to maintain control of the output from the provider?
Answer : C
The reason why it is important for the casino to maintain control of the output from the provider is that the casino maintains ultimate responsibility for this activity and should maintain control to avoid non-compliance . This is because the casino is accountable for its own AML/CFT obligations and cannot delegate or outsource them to a third-party provider. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should ensure that it has adequate oversight and control over any third-party providers that it engages for AML/CFT purposes, such as conducting due diligence, verifying information, or monitoring transactions'' (p. 25). The FI should also ''review and evaluate the performance and quality of the third-party providers on a regular basis, and address any issues or gaps that may arise'' (p. 25).
The other options are not as relevant or accurate as option C. The clients of the casino prefer to know that the casino is keeping their information secure when being held by a third-party (A) is not a reason why the casino should maintain control of the output from the provider, but rather a customer expectation or preference. As with all third-party relationships, proper control must be maintained to ensure profitability (B) is not a reason why the casino should maintain control of the output from the provider, but rather a general business principle or objective. Other casinos are frequently looking to reduce costs and share ideas, so if this relationship is successful, the model can be used by other businesses (D) is not a reason why the casino should maintain control of the output from the provider, but rather a potential benefit or outcome.
While each is potentially important, which allows an investigations analyst to better write a SAR/STR narrative that is useful to law enforcement? (Select Two.)
Answer : D, E
A SAR/STR narrative that is useful to law enforcement should include a detailed description of the known or suspected criminal violation or suspicious activity, as well as ensure that all information in the SAR/STR is complete and accurate based on what the institution knows. These elements help law enforcement to understand the nature and scope of the suspicious activity, and to follow up with further investigation if needed. The other options are not essential for a useful SAR/STR narrative, as they either provide irrelevant or redundant information, or could compromise the confidentiality of the report.
Why is a more robust supervisory approach needed by regulators when overseeing small- and medium-sized money service businesses (MSBs) compared to larger MSBs for combatting terrorist financing (TF)?
Answer : D
A more robust supervisory approach is needed by regulators when overseeing small- and medium-sized MSBs compared to larger MSBs for combatting TF because small- and medium-sized MSBs are more at risk of allowing transactions linked to TF due to the lack of skilled compliance resources. Small- and medium-sized MSBs may face challenges in implementing effective AML/CFT controls, such as conducting risk assessments, applying customer due diligence measures, monitoring transactions, detecting suspicious activities, and reporting to the authorities. They may also have limited access to training, guidance, and tools to enhance their compliance capabilities. Therefore, regulators need to provide more supervision and support to small- and medium-sized MSBs to ensure that they comply with the AML/CFT requirements and mitigate the TF risks.
Sustainable Growth for Small and Medium-Sized Enterprises ... - MDPI
Lessons on Resilience for Small and Midsize Businesses - HBR
Which payment method for purchasing luxury items is a red flag for potential money laundering?
Answer : B
According to the Financial Action Task Force (FATF), the use of large amounts of cash is a common method for money launderers to move illicit funds [1]. Purchasing luxury items with cash can indicate an attempt to convert illegal funds into tangible assets that can be easily resold or moved across borders. As a result, businesses that deal with luxury items are required to implement enhanced due diligence measures, including monitoring transactions involving large amounts of cash [1].
A client at a financial institution deposits large amounts of money into an account, and almost immediately, the funds are then distributed to numerous individuals' accounts. The transaction activity described in the scenario is a pattern of:
Answer : B
Deposit trading is a pattern of suspicious activity where a client deposits large amounts of money into an account, and then transfers the funds to other accounts, often in different jurisdictions or countries. This could be an attempt to disguise the source or destination of the funds, or to avoid reporting requirements. Deposit trading is also known as layering, which is the second stage of money laundering.
Which statement most accurately characterizes the methods used by transnational criminal organizations?
Answer : C
The statement that most accurately characterizes the methods used by transnational criminal organizations is that they routinely engage in many different types of criminal activities as long as they think it will benefit them . This is because transnational criminal organizations are flexible and adaptable, and they exploit opportunities and vulnerabilities in different markets and jurisdictions. According to ACAMS2, ''Transnational criminal organizations are involved in a wide range of illicit activities, such as drug trafficking, human trafficking, arms trafficking, money laundering, cybercrime, environmental crime, fraud, corruption, and terrorism'' (p. 3). They also ''operate across borders and regions, using complex networks and structures to evade detection and prosecution'' (p. 3).
The other statements are not as accurate or comprehensive as option C. Transnational criminal organizations are unlikely to associate with known terrorist organizations due to the reputational risks (A) is false, as transnational criminal organizations may collaborate or cooperate with terrorist organizations for mutual benefit or convenience, such as sharing resources, routes, or contacts. Transnational criminal organizations are likely to specialize in one particular method and continue to refine that method to escape detection (B) is false, as transnational criminal organizations may diversify or change their methods depending on the circumstances or opportunities, such as shifting products, markets, or modus operandi. Transnational criminal organizations see each other as competitors and rarely cooperate (D) is false, as transnational criminal organizations may form alliances or partnerships with other criminal groups for strategic or tactical reasons, such as sharing information, expertise, or influence.
A U.S. financial institution (Fl) receives a grand jury subpoena for a corporate client's account. The Fl should:
Answer : B
The Fl should review the corporate account's activity and transactions. This is because a grand jury subpoena is a legal request for information or testimony that may be used in a criminal investigation or prosecution. The Fl should review the account for any suspicious or unusual activity that may be related to the subpoena or indicate money laundering, terrorist financing, or other financial crimes. The Fl should also document its review and retain any relevant records.
An investigator is reviewing an alert for unusual activity. System scanning detected a text string within a company customer's account transactions that indicates the account may have been used for a drug or drug paraphernalia purchase Based on the KYC profile, the investigator determines the customer's company name and business type are marketed as a gardening supplies company. The investigator reviews the account activity and notes an online purchase transaction that leads the investigator to a website that sells various strains of marijuan
a. Additional account review detects cash deposits into the account at the branch teller lines, so the investigator reaches out to the teller staff regarding the transactions. The teller staff member reports that the business customers have frequently deposited cash in lower amounts. The teller, without prompting, adds that one of the transactors would occasionally smell of a distinct scent of marijuana smoke.
Which are the best next steps for the investigator to take? (Select Three.)
Answer : A, C, E
The best next steps for the investigator to take are:
A . Review the customer's transaction history. This can help the investigator identify any patterns or anomalies in the customer's account activity, such as changes in transaction volume, frequency, amount, source, destination, purpose, etc. The investigator can also compare the customer's transaction history with their KYC profile and risk rating to assess if there are any discrepancies or inconsistencies.
C . Check internal KYC information. This can help the investigator verify the customer's identity, business nature, ownership structure, expected activity, source of funds, etc. The investigator can also update or enhance the customer's KYC information based on any new or relevant information obtained from other sources.
E Conduct adverse media and open-source searches on the customer's background. This can help the investigator find out if there is any negative or adverse information about the customer in public data sources, such as news articles, social media posts, blogs, forums, etc. Adverse media and open-source searches can also provide additional context and insight into the customer's reputation, behavior, associations, etc. The other options are incorrect because:
B . Request information from the internet service provider who hosts the website is not feasible, as it may require a legal process or a court order to obtain such information. Moreover, the internet service provider may not have or disclose any useful information about the website or its owner.
D . Research other customer accounts for transactions to the same website is not relevant, as it may not provide any meaningful information about the customer under investigation. Furthermore, it may violate the privacy and confidentiality of other customers who are not related to the investigation.
F . Identify if the customer has opened accounts in an urban city area is not helpful, as it may not have any bearing on the customer's involvement in a drug or drug paraphernalia purchase. Additionally, it may not be possible to access or verify such information without the customer's consent or authorization.
Advanced CAMS-FCI Certification | ACAMS, Section 2: Investigating Financial Crimes, page 11
Leading Complex Investigations Certificate | ACAMS, Module 3: Conducting Research and Analysis, page 6
Adverse Media Screening - Using AI to Mitigate Risk
Legal requirements for adverse media screening - Thomson Reuters
Electronic client due diligence | Ethics helpsheets | ICAEW
6AMLD & FATF: Where Adverse Media Screening Fits In
Free Adverse Media Check | NameScan
In which case should an investigator avoid escalating a suspicious event to the chief compliance officer and pursue other channels?
Answer : B
An investigator should avoid escalating a suspicious event to the chief compliance officer if there is a potential conflict of interest, such as when a close family member of the officer is involved in the transaction. In such a case, the investigator should pursue other channels, such as reporting to a higher authority or an independent committee. The other options do not present a conflict of interest and should be escalated to the chief compliance officer as part of the normal procedure.
An investigator at a corporate bank is conducting transaction monitoring alerts clearance.
KYC profile background: An entity customer, doing business offshore in Hong Kong, established a banking business relationship with the bank in 2017 for deposit and loan purposes. It acts as an offshore investment holding company. The customer declared that the ongoing source of funds to this account comes from group-related companies.
* X is the UBO. and owns 97% shares of this entity customer;
* Y is the authorized signatory of this entity customer. This entity customer was previously the subject of a SAR/STR.
KYC PROFILE
Customer Name: AAA International Company. Ltd
Customer ID: 123456
Account Opened: June 2017
Last KYC review date: 15 Nov 2020
Country and Year of Incorporation: The British Virgin Islands, May 2017
AML risk level: High
Account opening and purpose: Deposits, Loans and Trade Finance
Anticipated account activities: 1 to 5 transactions per year and around 1 million per
transaction amount
During the investigation, the investigator reviewed remittance transactions activities for the period from Jul 2019 to Sep 2021 and noted the following transactions pattern:
TRANSACTION JOURNAL
Review dates: from July 2019 to Sept 2021
For Hong Kong Dollars (HKD) currency:
Incoming transactions: 2 inward remittances of around 1.88 million HKD in total from
different third parties
Outgoing transactions: 24 outward remittances of around 9 4 million HKD in total to
different third parties
For United States Dollars (USD) currency:
Incoming transactions: 13 inward remittances of around 3.3 million USD in total from
different third parties
Outgoing transactions: 10 outward remittances of around 9.4 million USD in total to
different third parties.
RFI Information and Supporting documents:
According to the RFI reply received on 26 May 2021, the customer provided the bank
with the information below:
1) All incoming funds received in HKD & USD currencies were monies lent from non-customers of the bank. Copies of loan agreements had been provided as supporting documents. All of the loan agreements were in the same format and all the lenders are engaged in trading business.
2) Some loan agreements were signed among four parties, including among lenders. borrower (the bank's customer), guarantor, and guardian with supplemental agreements, which stated that the customer, as a borrower, who failed to repay the loan
Based on the KYC profile and the transaction journal, the pattern of activity shows a deviation in:
Answer : A
The correct answer is A because the expected account activities were 1 to 5 transactions per year and around 1 million per transaction amount, but the actual activity showed much more frequent and varied transactions in different currencies and amounts. This indicates a deviation from the customer's profile and risk level.
When crafting internal procedures on writing and submitting SARs/STRs, one should:
Answer : B
When writing and submitting SARs/STRs, one should consider the guidelines issued by the national financial intelligence unit (FIU) and local regulator and incorporate any country-specific requirements. This ensures that the reports are compliant with the relevant laws and regulations and provide useful information to the authorities. The other options are either incorrect or not best practices.
During transaction monitoring. Bank A learns that one of their customers. Med Supplies 123, is attempting to make a payment via wire totaling 382,500 USD to PPE Business LLC located in Mexico to purchase a large order of personal protective equipment. specifically surgical masks and face shields. Upon further verification. Bank A decides to escalate and refers the case to investigators.
Bank A notes that, days prior to the above transaction, the same customer went to a Bank A location to wire 1,215,280 USD to Breath Well LTD located in Singapore. Breath Well was acting as an intermediary to purchase both 3-ply surgical masks and face shields from Chin
a. Bank A decided not to complete the transaction due to concerns with the involved supplier in China. Moreover, the customer is attempting to send a third wire in the amount of 350,000 USD for the purchase of these items, this time using a different vendor in China. The investigator must determine next steps in the investigation and what actions, if any. should be taken against relevant parties.
Upon further investigation. Bank As investigator learns that both the Mexico- and Singapore-based companies are linked to the alleged suppliers in China. Which additional indicators would the investigator need to identify to determine if this fits a fentanyl (drug) trafficking typology? (Select Two.)
Answer : A, C
Which might suggest misuse of crowdfunding resources by a terrorist?
Answer : D
The purchase of airplane tickets after receiving multiple small deposits from a crowdfunding platform might suggest that the funds are being used to facilitate travel for terrorist purposes. The other options are not necessarily indicative of terrorist financing, as they could be explained by legitimate reasons or other types of financial crimes.
An unusual spike in activity has occurred for a customer who is a supplier of aviation parts to a military force. The customer's current line of business is consistent with the banks records, and no adverse media hits have occurred. Which is the best reason for an investigator to continue an investigation?
Answer : A
The best reason for an investigator to continue an investigation is that the end-user is a military force. This is because supplying aviation parts to a military force may involve sanctions risk, export control risk, or human rights risk, depending on the nature and destination of the military force. The investigator should conduct further due diligence to determine if the customer is complying with the relevant laws and regulations, and if the bank is exposed to any reputational or legal risk by providing services to the customer.
Former Airline Employee and Aircraft Part Sellers Charged in Kickback ...
Former Airline Employee and Aircraft Part Sellers Charged in Kickback ...
Former airline employee and aircraft part sellers charged in kickback ...
Which payment method for purchasing luxury items is a red flag for potential money laundering?
Answer : B
According to the Financial Action Task Force (FATF), the use of large amounts of cash is a common method for money launderers to move illicit funds [1]. Purchasing luxury items with cash can indicate an attempt to convert illegal funds into tangible assets that can be easily resold or moved across borders. As a result, businesses that deal with luxury items are required to implement enhanced due diligence measures, including monitoring transactions involving large amounts of cash [1].
An analyst reviews an alert for high volume Automated Clearing House (ACH) activity in an account. The analyst's initial research finds the account is for a commercial daycare account that receives high volumes of large government-funded ACH transactions to support the programs. The account activity consists of checks (cheques) made payable to individual names in varying dollar amounts. One check indicates rent to another business.
An Internet search finds that the daycare company owner has previous government-issued violations for safety and classroom size needs, such as not having enough chairs and tables per enrollee. These violations were issued to a different daycare name.
Simultaneous to this investigation, another analyst sends an email about negative news articles referencing local child/adult daycare companies misusing governmental grants. This prompts the financial institution (Fl) to search all businesses for names containing daycare' or "care*. Text searches return a number of facilities as customers at the Fl and detects that three of these businesses have a similar transaction flow of high volume government ACH funding with little to no daycare expenses.
During the investigation, new suspicious patterns and trends related to check cashing are observed. The Fl decides to conduct a training to ensure that 1) the AML program is robust and 2) the training program is relevant and appropriate. Which parties should be trained on emerging trends and red flags? (Select Two.)
Answer : A, C
The parties that should be trained on emerging trends and red flags are the financial crimes investigation unit (A) and the branch personnel . These parties are directly involved in detecting, investigating, and reporting suspicious activity related to check cashing or other types of fraud or money laundering. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should provide regular and relevant training to its staff on the AML program, policies, procedures, and systems, as well as on the latest typologies, indicators, and best practices for financial crimes investigations'' (p. 36). The FI should also ''ensure that the training is tailored to the specific roles and responsibilities of the staff, and that it is updated and evaluated periodically'' (p. 36).
The other parties are not as relevant or appropriate as options A and C. The loan department (B) is not directly related to check cashing or other types of fraud or money laundering, although it may have some exposure to credit or identity fraud. The senior management (D) is responsible for overseeing and supporting the AML program, but not for conducting or supervising financial crimes investigations. The board of directors (E) is responsible for approving and reviewing the AML program, but not for implementing or monitoring it.
Which scenarios are common to money laundering through online marketplaces and trade-based money laundering? (Select Two.)
Answer : A, C
Money laundering through online marketplaces and trade-based money laundering both involve the manipulation of the value or quantity of goods to disguise the illicit origin of funds. Over-valuation of the stated price of goods and no evidence of delivery of goods or shipping expenses are two common indicators of such schemes. The other options are not specific to these methods of money laundering.
An investigator at a corporate bank is conducting transaction monitoring alerts clearance.
KYC profile background: An entity customer, doing business offshore in Hong Kong, established a banking business relationship with the bank since 2017 for deposit and loan purposes. It acts as an offshore investment holding company. The customer declared that the ongoing source of funds to this account comes from group-related companies.
* X is the UBO. and owns 97% shares of this entity customer;
* Y is is the authorized signatory of this entity customer. This entity customer was previously the subject of a SAR/STR.
KYC PROFILE
Customer Name: AAA International Company. Ltd
Customer ID: 123456
Account Opened: June 2017
Last KYC review date: 15 Nov 2020
Country and Year of Incorporation: The British Virgin Islands, May 2017
AML risk level: High
Account opening and purpose: Deposits, Loans, and Trade Finance
Anticipated account activities: 1 to 5 transactions per year and around 1 million per
transaction amount
During the investigation, the investigator reviewed remittance transactions activities for the period from Jul 2019 to Sep 2021 and noted the following transactions pattern:
TRANSACTION JOURNAL
Review dates: from July 2019 to Sept 2021
For Hong Kong Dollars (HKD) currency:
Incoming transactions: 2 inward remittances of around 1.88 million HKD in total from
different third parties
Outgoing transactions: 24 outward remittances of around 9 4 million HKD in total to
different third parties
For United States Dollars (USD) currency:
Incoming transactions: 13 inward remittances of around 3.3 million USD in total from
different third parties
Outgoing transactions: 10 outward remittances of around 9.4 million USD in total to
different third parties.
RFI Information and Supporting documents:
According to the RFI reply received on 26 May 2021, the customer provided the bank
with the information below:
1J All incoming funds received in HKD & USD currencies were monies lent from non-customers of the bank. Copies of loan agreements had been provided as supporting documents. All of the loan agreements were in the same format and all the lenders are engaged in trading business.
2) Some loan agreements were signed among four parties, including among lenders. borrower (the bank's customer), guarantor, and guardian with supplemental agreements, which stated that the customer, as a borrower, who failed to repay a loan
Which suspicious activity should the investigator identify during the review of the loan agreements?
Answer : D
The correct answer is D because it is a suspicious activity that Y, who is the authorized signatory of the customer, also signed on behalf of the lenders. This indicates a possible conflict of interest, collusion, or fraud. The other options are not suspicious activities based on the information given.
SAR/STR NARRATIVE
A SAR/STR has been submitted on five transactions conducted on the correspondent banking relationship with ABC Bank.
Client Information:
Remitter information: DEF Oil Resource Ltd. is the oldest member of the DEF Group. It was founded in 1977 as a general trading business with a primary focus on exports from Africa and North Americ
a. The group has business activities that span the entire energy value chain. Their core field of endeavor is centered within the oil and gas industry and its associated sub-sectors.
Beneficiary Information:
As per the response received from ABC Bank, it was determined that the beneficiaries are related to DEF Oil Resource Ltd. These were created by DEF Oil Resource Ltd. to purchase property in a foreign country on behalf of their senior management as part of a bonus scheme. The purpose behind this payment was for purchase of property in another country.
Payment Reference:
ABCXXXXX31PZFG2H
ABCXXXXXX51PQGEH
ABCXXXXXX214QWVG
ABCXXXXXX41PSXA2
ABCXXXXXX815QWS3
Concerns:
* We are unsure about the country of incorporation of the beneficiaries.
* We are concerned about the transactional activity since the payment made towards entities (conducted on behalf of individuals) appears to be possible tax evasion.
* There appears to be an attempt to conceal the identity of individuals (senior management), which again raises concerns about the source of funds.
* Referring to the response received from ABC Bank, we are unclear about the ultimate beneficiary of funds.
* The remitter is involved in a high-risk business, (i.e., oil and crude products trading), and the beneficiary is involved in a real estate business which again poses a higher risk.
The monitoring system of the correspondent institution flags the transaction as suspicious activity. The correspondent bank needs to send a request for information to the respondent bank. Which elements should be included in the request? (Select Three.)
Answer : A, C, E
The request for information should include the following elements:
Details of DEF Oil Resource Ltd parent company and the name(s) of the beneficial owner(s) (Option A): This is necessary to verify the identity and ownership structure of the remitter and to assess the risk level of the customer and the transaction.
The account profile of the customer and their KYC data (Option C): This is necessary to understand the nature and purpose of the customer's business relationship with the respondent bank and to compare it with the observed transactional activity.
The contract pertaining to the purchase of property in another country (Option E): This is necessary to verify the legitimacy and source of funds for the transaction and to identify the ultimate beneficiary of funds.
The other options are not relevant or necessary for the request for information. The full transaction history of the correspondent bank's customer (Option B) is too broad and may not be related to suspicious activity. The respondent bank's customer's senior management bonus plan (Option D) is not relevant to the transaction and may not be available to the respondent bank. The last 6 months of transactional history (Option F) is also too broad and may not be related to the suspicious activity.
Advanced CAMS-FCI Certification Handbook, page 19
Which action is part of the enhanced due diligence process?
Answer : A
One of the actions that is part of the enhanced due diligence process is collecting beneficial ownership details regarding the client's account. This is important to identify the natural persons who ultimately own or control the client, and to assess the potential risks associated with them. According to the Financial Action Task Force (FATF), beneficial ownership information should include1:
The name, nationality, and country of residence of each beneficial owner.
The date of birth or incorporation of each beneficial owner.
The nature and extent of the beneficial interest held by each beneficial owner.
The means by which the beneficial ownership or control is exercised.
FATF Guidance on Transparency and Beneficial Ownership
An analyst reviews an alert for high volume Automated Clearing House (ACH) activity in an account. The analyst's initial research finds the account is for a commercial daycare account that receives high volumes of large government-funded ACH transactions to support the programs. The account activity consists of checks (cheques) made payable to individual names in varying dollar amounts. One check indicates rent to another business.
An Internet search finds that the daycare company owner has previous government-issued violations for safety and classroom size needs, such as not having enough chairs and tables per enrollee. These violations were issued to a different daycare name.
Simultaneous to this investigation, another analyst sends an email about negative news articles referencing local child/adult daycare companies misusing governmental grants. This prompts the financial institution (Fl) to search all businesses for names containing daycare' or care*. Text searches return a number of facilities as customers at the Fl and detects that three of these businesses have a similar transaction flow of high volume government ACH funding with little to no daycare expenses.
The analyst determines that site visits should be conducted for the three daycare businesses. Which observations at the on-site visits would justify writing a SAR/STR? (Select Three.)
Answer : A, C, F
The observations at the on-site visits that would justify writing a SAR/STR are signs of severe wear and poor maintenance at the site (A), lights turned off at the site during operational hours , and a full parking lot of cars with no staff at the site (F). These observations suggest that the daycare businesses are not operating legitimately or providing adequate services to their customers, and that they may be misusing governmental grants or laundering money through their accounts. These observations are consistent with some of the red flags for fraud identified by ACAMS2, such as:
Inadequate facilities or equipment for the type of business
Lack of visible activity or customers at the business location
Discrepancy between reported income and expenses
Unusual volume or frequency of transactions
The other observations are not as relevant or indicative of fraud as options A, C, and F. A site located in a commercial building (B) could be a normal or legitimate choice for a daycare business, depending on its size, location, and availability. Visible attendance with children being dropped off by parents (D) could show that the daycare business is providing genuine services to its customers, although it does not rule out possible fraud or money laundering. Visible signage indicating the purpose of building (E) could also show that the daycare business is transparent and legitimate, although it does not guarantee its quality or compliance.
SAR/STR NARRATIVE
A SAR/STR has been submitted on five transactions conducted on the correspondent banking relationship with ABC Bank.
Client Information:
Remitter information: DEF Oil Resource Ltd. is the oldest member of the DEF Group. It was founded in 1977 as a general trading business with a primary focus on exports from Africa and North Americ
a. The group has business activities that span the entire energy value chain. Their core field of endeavor is centered within the oil and gas industry and its associated sub-sectors.
Beneficiary Information:
As per the response received from ABC Bank, it was determined that the beneficiaries are related to DEF Oil Resource Ltd. These were created by DEF Oil Resource Ltd. to purchase property in a foreign country on behalf of their senior management as part of a bonus scheme. The purpose behind this payment was for the purchase of property in another country.
Payment Reference:
ABCXXXXX31PZFG2H
ABCXXXXXX51PQGEH
ABCXXXXXX214QWVG
ABCXXXXXX41PSXA2
ABCXXXXXX815QWS3
Concerns:
* We are unsure about the country of incorporation of the beneficiaries.
* We are concerned about the transactional activity since the payment made towards entities (conducted on behalf of individuals) appears to be possible tax evasion.
* There appears to be an attempt to conceal the identity of individuals (senior management), which again raises concerns about the source of funds.
* Referring to the response received from ABC Bank, we are unclear about the ultimate beneficiary of funds.
* The remitter is involved in a high-risk business, (i.e., oil and crude products trading), and the beneficiary is involved in real estate business which again poses a higher risk.
While reviewing the account activity, it is noted that several transfers are sent to a company located in an offshore jurisdiction. Which step should the investigator take next?
Answer : C
The best step for the investigator to take next is to request information about the beneficiaries related to the company. This will help to identify the ultimate beneficial owners of the funds and the purpose of the transactions. Requesting information from the company or filing a SAR/STR to the FIU where the company is located may not be feasible or effective, as the company may not cooperate or the FIU may not have jurisdiction over the offshore entity. Conducting an open-source search may provide some information about the ownership and registration of the company, but it may not be sufficient or reliable to determine the nature and legitimacy of the transactions.
SAR Narrative Guidance Package
Best Practices for Drafting an STR or SAR
Law enforcement agents arrive at a broker-dealer's premises with a search warrant. In addition to cooperation with the warrant, which instructions should the person in charge of the broker-dealer provide to their employees?
Answer : A
The instruction that the person in charge of the broker-dealer should provide to their employees is to take notes on the questions and comments made by the agents (A). This is because taking notes can help the employees to recall and document what happened during the search warrant execution, which can be useful for legal or regulatory purposes. According to ACAMS3, ''the FI should instruct its staff to cooperate with LE agents during a search warrant execution, but also to take notes of what is being searched, seized, or asked by the agents'' (p. 35). The FI should also ''keep copies of any documents or records that are taken by LE agents'' (p. 35).
The other instructions are not correct. The person in charge of the broker-dealer should not instruct their employees to sign consent forms permitting the agents to search employees' offices (B), as this is unnecessary and potentially risky, as the agents already have a valid search warrant that authorizes them to search the premises. The person in charge of the broker-dealer should not instruct their employees to provide agents with unlimited access to customers' personal data , as this could violate privacy or data protection laws, as well as compromise customer trust and confidentiality. The person in charge of the broker-dealer should not instruct their employees to volunteer information not requested by the agents that they think may be useful (D), as this could interfere with the LE investigation or expose them to legal or regulatory risks.
Introduction to Transnational Organized Crime
ACAMS Law Enforcement and Financial Crimes Investigations eLearning Course Module
Law Enforcement Requests and Actions
How does the Financial Action Task Force (FATF) measure the effectiveness of a country's efforts to combat money laundering and terrorist financing?
Answer : A
'The FATF measures the effectiveness of a country's efforts to combat money laundering and terrorist financing through a mutual evaluation process. During a mutual evaluation, the FATF assesses a country's legal and institutional framework, its implementation of measures to combat money laundering and terrorist financing, and the effectiveness of its efforts. The FATF then issues a report with recommendations for improvement' [CAMS Study Guide 6th edition, page 15-16].
Refer to the exhibit.

During a review of the accounts related to Richard Aston, an investigator notices a high number of incoming payments from various individuals. They also notice that these incoming payments typically occur during large sporting events or conferences. As a result of the account review, of which illegal activity does the investigator have reasonable grounds to suspect Richard Aston?
Answer : B
The illegal activity that the investigator has reasonable grounds to suspect Richard Aston of is aftermarket sales of entertainment admission tickets. This is because aftermarket sales of entertainment admission tickets involve reselling tickets for events, concerts, festivals, etc. at a higher price than their face value, often through online platforms or scalpers. This practice can be illegal or unethical, depending on the jurisdiction and the terms and conditions of the original ticket seller. The investigator should look for indicators of aftermarket sales of entertainment admission tickets, such as high volume or frequency of incoming payments from various individuals, correlation between incoming payments and major events or conferences, and discrepancy between the customer's profile and the nature of the transactions. The other options are incorrect because:
A . Embezzling from the hotel is not likely, as it would involve stealing money or property from the hotel by an employee or a person in a position of trust. There is no evidence that Richard Aston works for or has access to the hotel's assets.
C . Human trafficking is not probable, as it would involve exploiting people for forced labor or commercial sexual exploitation. There is no indication that Richard Aston is involved in any form of human trafficking or has any connection to victims or perpetrators.
D . Sports betting is not plausible, as it would involve wagering money on the outcome of sporting events or games. There is no sign that Richard Aston is engaged in any sports betting activity or has any association with bookmakers or gamblers.
Advanced CAMS-FCI Certification | ACAMS, Section 2: Investigating Financial Crimes, page 10
TicketSwap: The safest way to buy and sell tickets
Ticketing 101 | Ticketmaster
10 Types of Tickets For Events (+ Why & When To Use Them) - Eventbrite
The training department is conducting awareness training for unusual customer identification scenarios. Which two indicators should be included? (Select Two.)
Answer : A, B
This information can be found in the Certified Anti-Money Laundering Specialist (CAMS) study guide, 6th edition, under the section on Unusual Customer Identification Scenarios. The guide explains that two indicators that should be included in awareness training for unusual customer identification scenarios are:
A . The customer opens the account in the name of a family member who begins making large deposits.
This is an indicator of potential structuring, where a customer may be attempting to avoid triggering reporting thresholds by depositing funds in smaller amounts over time. It is important for staff to be aware of this scenario and to monitor accounts for potential suspicious activity.
B . The customer's name and home address cannot be verified.
This is an indicator of potential identity theft or other fraudulent activity. If a customer's identifying information cannot be verified, it is important for staff to conduct additional due diligence to ensure that the customer is legitimate and that the account is not being used for illicit purposes.
Which are some of the negative impacts from illegal wildlife trade and environmental crimes? (Select Two.)
Answer : B, D, D
Some of the negative impacts of illegal wildlife trade and environmental crimes are loss of potential tax proceeds and threats to biodiversity. Loss of potential tax proceeds occurs when illegal wildlife trade and environmental crimes evade taxation and customs duties, depriving governments of revenues that could be used for public services and development. Threats to biodiversity occur when illegal wildlife trade and environmental crimes endanger species, habitats, and ecosystems, reducing their resilience and ability to provide essential services for human well-being. Public health consequences and threats to a country's political stability are not directly related to illegal wildlife trade and environmental crimes, but rather to other types of financial crimes such as money laundering, terrorism financing, or corruption.
During transaction monitoring. Bank A learns that one of its customers. Med Supplies 123, is attempting to make a payment via wire totaling 382.500 USD to PPE Business LLC located in Mexico to purchase a large order of personal protective equipment. specifically surgical masks and face shields. Upon further verification. Bank A decides to escalate and refers the case to investigators.
Bank A notes that days prior to the above transaction, the same customer went to a Bank A location to wire 1,215,280 USD to Breath Well LTD located in Singapore. Breath Well was acting as an intermediary to purchase both 3-ply surgical masks and face shields from Chin
a. Bank A decided not to complete the transaction due to concerns with the involved supplier in China. Moreover, the customer is attempting to send a third wire in the amount of 350,000 USD for the purchase of these items, this time using a different vendor in China. The investigator must determine the next steps in the investigation and what actions, if any. should be taken against relevant parties.
The investigator is gathering more information to determine if a SAR/STR filing is needed. Which steps are the correct ways of collecting the additional information? (Select Two.)
Answer : A, D
The correct answer is A and C because these indicators suggest that the customer is using fraudulent documents and misrepresenting the goods to conceal the illicit nature of the transactions. Fentanyl traffickers often use front companies and falsified invoices to disguise their shipments as legitimate products, such as medical supplies or chemicals. Reviewing the invoices and transportation documents, as well as the FDA product certifications, can help to identify discrepancies or anomalies that indicate fraud or deception.
The investigative department of a financial institution (Fl) receives an internal escalation notice from the remittance department for a SWIFT message requesting a refund due to potential fraud. The notice indicates that a total of three international incoming remittances were transferred to a corporate customer from Country A, in the amount of approximately 5 million EUR for each. The first two incoming remittances had been exchanged into currency B and transferred out to Country B a few days ago. The third incoming remittance has been held by the remittance department.
As noted from the KYC profile, the corporate customer is working in the wood industry. with the last account review completed 3 months ago. Since the account's opening. there has been no history of a large amount of funds flowing through the account. The investigator conducts an Internet search and finds that the remitter is a food beverage company.
The same morning, the investigator receives a call from a financial intelligence unit (FIU) inquiring about the same incident. The FIU states that it will issue a warrant to freeze the account on the same day.
Which steps for documenting the final investigation decision are appropriate for the investigator in this scenario?
Answer : C
The investigator should document the investigation process and retain all relevant documents in the case management system. This is because documenting the investigation process is a good practice to ensure the quality and consistency of the investigation, as well as to facilitate the review and audit of the investigation. Retaining all relevant documents is also important to support the evidence and findings of the investigation, as well as to comply with the record-keeping requirements of the relevant authorities. The other options are incorrect because:
A . Excluding any open-source information from record-keeping is not advisable, as open-source information can provide valuable insights and context for the investigation, and may not be easily retrievable in the future.
B . Adding all of the information the FI has about the subject, their account(s) activity, research results, KYC information, etc. to the SAR/STR is not necessary, as the SAR/STR should only contain the essential information that is relevant and material to the suspicious activity. Adding too much information may obscure the main points and make the SAR/STR less effective.
D . Not documenting the investigation process if a SAR/STR is not filed is not acceptable, as the investigation process should be documented regardless of the outcome. Documenting the investigation process can help justify why a SAR/STR was not filed, and also provide a reference for future investigations involving the same subject or activity.
Advanced CAMS-FCI Certification | ACAMS, Section 3: Reporting Suspicious Activity, page 14
Leading Complex Investigations Certificate | ACAMS, Module 4: Documenting Your Investigation, page 4
The intended benefits of section 314(b) of the USA PATRIOT Act include: (Select Three.)
Answer : B, E, F
Section 314(b) of the USA PATRIOT Act allows financial institutions to share information with each other, under a safe harbor that offers protection from liability, in order to better identify and report potential money laundering or terrorist financing activities. The intended benefits of this information sharing include:
Participating financial institutions sharing information about suspicious activity by customers that may have otherwise gone unnoticed. For example, if a customer is conducting transactions with multiple financial institutions that individually do not appear suspicious, but collectively indicate a pattern of money laundering or terrorist financing, the financial institutions can share this information and report it to the authorities.
Detecting money laundering and terrorist financing approaches and schemes across multiple financial institutions. For example, if a financial institution identifies a new typology or modus operandi of money laundering or terrorist financing, it can share this information with other financial institutions to help them prevent or detect similar activities by their customers.
Obtaining additional information on customers or transactions regarding potential money laundering or terrorist financing. For example, if a financial institution has incomplete or insufficient information on a customer or a transaction that raises suspicion, it can request more information from another financial institution that may have dealt with the same customer or transaction.
Section 314(b) | FinCEN.gov
Section 314(b) Fact Sheet - FinCEN.gov
In which case should an investigator avoid escalating a suspicious event to the chief compliance officer and pursue other channels?
Answer : B
An investigator should avoid escalating a suspicious event to the chief compliance officer if there is a potential conflict of interest, such as when a close family member of the officer is involved in the transaction. In such a case, the investigator should pursue other channels, such as reporting to a higher authority or an independent committee. The other options do not present a conflict of interest and should be escalated to the chief compliance officer as part of the normal procedure.
While each is potentially important, which allows an investigations analyst to better write a SAR/STR narrative that is useful to law enforcement? (Select Two.)
Answer : D, E
A SAR/STR narrative that is useful to law enforcement should include a detailed description of the known or suspected criminal violation or suspicious activity, as well as ensure that all information in the SAR/STR is complete and accurate based on what the institution knows. These elements help law enforcement to understand the nature and scope of the suspicious activity, and to follow up with further investigation if needed. The other options are not essential for a useful SAR/STR narrative, as they either provide irrelevant or redundant information, or could compromise the confidentiality of the report.
A U.S. financial institution (Fl) receives a grand jury subpoena for a corporate client's account. The Fl should:
Answer : B
The Fl should review the corporate account's activity and transactions. This is because a grand jury subpoena is a legal request for information or testimony that may be used in a criminal investigation or prosecution. The Fl should review the account for any suspicious or unusual activity that may be related to the subpoena or indicate money laundering, terrorist financing, or other financial crimes. The Fl should also document its review and retain any relevant records.
Which scenarios are common to money laundering through online marketplaces and trade-based money laundering? (Select Two.)
Answer : A, C
Money laundering through online marketplaces and trade-based money laundering both involve the manipulation of the value or quantity of goods to disguise the illicit origin of funds. Over-valuation of the stated price of goods and no evidence of delivery of goods or shipping expenses are two common indicators of such schemes. The other options are not specific to these methods of money laundering.
Law enforcement (LE) suspects human trafficking to occur during a major sporting event LE officers asked several financial institutions (FIs) to monitor financial transactions occurring before, during, and after the event.
An investigator identified a pattern linked to a business. The business' account received multiple even dollar deposits between midnight and 4:00 AM. They occurred each day for several days prior to the date of the sporting event. Also, large cash deposits, typically between 2,000 USD and 3,000 USD. made by a person to the business' account occurred in many branches in the days after the sports event.
There was little information about the company. The company did not have any history of employee payroll expenses or paying taxes. Expenses from the business account included air travel and hotel expenses. Searches about the person making cash deposits showed little. An online social media platform webpage with the individual's name showed ads for dates1' and "companionship."
The Fl wants to create an automated alert for human trafficking money laundering after this investigation. Which activity type should they target?
Answer : B
The activity type that the FI should target for creating an automated alert for human trafficking money laundering is multiple deposits between midnight and 4:00 AM (B). This is because this pattern is consistent with the indicators of human trafficking identified by the Financial Action Task Force (FATF) and the Egmont Group1, which include:
Frequent cash deposits, often in round amounts, outside of normal business hours
Deposits made at different branches or ATMs in various locations
Lack of information about the nature and purpose of the business
Involvement in online platforms that advertise sexual services
Expenses related to travel and accommodation
The other options are not as relevant or specific as option B. Payments made to multiple hotels in the same city (A) could be a legitimate business expense or a sign of other types of money laundering, such as tax evasion or fraud. Deposits made within days of major sporting events could also be explained by other factors, such as increased tourism or gambling. Payments made for virtual currency (D) are not directly related to human trafficking, although they could be used to facilitate money laundering in general.
A national financial intelligence unit (FIU) is undertaking the country risk assessment for the financing of the proliferation of weapons of mass destruction (WMD). The evaluation involves determining the exposure that financial institutions (FIs) have to operations that evade sanctions. Which should be performed by the FIU to assess proliferation financing risk? (Select Two.)
Answer : B, D
The FIU should cross-reference the databases of international commerce/logistics transactions between the country and WMD proliferation sanctioned states with the corresponding international financial operations of those transactions, as this would help identify any discrepancies or anomalies that could indicate sanctions evasion. The FIU should also evaluate a sample of the amount of false-positive and false-negative alerts that FIs have regarding proliferation sanctions evasion to determine root causes of non-detection, such as inadequate screening systems, lack of training, or human error. These actions would help the FIU assess the proliferation financing risk and provide feedback and guidance to FIs on how to improve their detection and prevention capabilities.
An analyst reviews an alert for high volume Automated Clearing House (ACH) activity in an account. The analyst's initial research finds the account is for a commercial daycare account that receives high volumes of large government-funded ACH transactions to support the programs. The account activity consists of checks (cheques) made payable to individual names in varying dollar amounts. One check indicates rent to another business.
An Internet search finds that the daycare company owner has previous government-issued violations for safety and classroom size needs, such as not having enough chairs and tables per enrollee. These violations were issued to a different daycare name.
Simultaneous to this investigation, another analyst sends an email about negative news articles referencing local child/adult daycare companies misusing governmental grants. This prompts the financial institution (Fl) to search all businesses for names containing daycare' or "care*. Text searches return a number of facilities as customers at the Fl and detects that three of these businesses have a similar transaction flow of high volume government ACH funding with little to no daycare expenses.
During the investigation, new suspicious patterns and trends related to check cashing are observed. The Fl decides to conduct a training to ensure that 1) the AML program is robust and 2) the training program is relevant and appropriate. Which parties should be trained on emerging trends and red flags? (Select Two.)
Answer : A, C
The parties that should be trained on emerging trends and red flags are the financial crimes investigation unit (A) and the branch personnel . These parties are directly involved in detecting, investigating, and reporting suspicious activity related to check cashing or other types of fraud or money laundering. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should provide regular and relevant training to its staff on the AML program, policies, procedures, and systems, as well as on the latest typologies, indicators, and best practices for financial crimes investigations'' (p. 36). The FI should also ''ensure that the training is tailored to the specific roles and responsibilities of the staff, and that it is updated and evaluated periodically'' (p. 36).
The other parties are not as relevant or appropriate as options A and C. The loan department (B) is not directly related to check cashing or other types of fraud or money laundering, although it may have some exposure to credit or identity fraud. The senior management (D) is responsible for overseeing and supporting the AML program, but not for conducting or supervising financial crimes investigations. The board of directors (E) is responsible for approving and reviewing the AML program, but not for implementing or monitoring it.
An investigator at a corporate bank is conducting transaction monitoring alerts clearance.
KYC profile background: An entity customer, doing business offshore in Hong Kong, established a banking business relationship with the bank since 2017 for deposit and loan purposes. It acts as an offshore investment holding company. The customer declared that the ongoing source of funds to this account comes from group-related companies.
* X is the UBO. and owns 97% shares of this entity customer;
* Y is is the authorized signatory of this entity customer. This entity customer was previously the subject of a SAR/STR.
KYC PROFILE
Customer Name: AAA International Company. Ltd
Customer ID: 123456
Account Opened: June 2017
Last KYC review date: 15 Nov 2020
Country and Year of Incorporation: The British Virgin Islands, May 2017
AML risk level: High
Account opening and purpose: Deposits, Loans, and Trade Finance
Anticipated account activities: 1 to 5 transactions per year and around 1 million per
transaction amount
During the investigation, the investigator reviewed remittance transactions activities for the period from Jul 2019 to Sep 2021 and noted the following transactions pattern:
TRANSACTION JOURNAL
Review dates: from July 2019 to Sept 2021
For Hong Kong Dollars (HKD) currency:
Incoming transactions: 2 inward remittances of around 1.88 million HKD in total from
different third parties
Outgoing transactions: 24 outward remittances of around 9 4 million HKD in total to
different third parties
For United States Dollars (USD) currency:
Incoming transactions: 13 inward remittances of around 3.3 million USD in total from
different third parties
Outgoing transactions: 10 outward remittances of around 9.4 million USD in total to
different third parties.
RFI Information and Supporting documents:
According to the RFI reply received on 26 May 2021, the customer provided the bank
with the information below:
1J All incoming funds received in HKD & USD currencies were monies lent from non-customers of the bank. Copies of loan agreements had been provided as supporting documents. All of the loan agreements were in the same format and all the lenders are engaged in trading business.
2) Some loan agreements were signed among four parties, including among lenders. borrower (the bank's customer), guarantor, and guardian with supplemental agreements, which stated that the customer, as a borrower, who failed to repay a loan
Which suspicious activity should the investigator identify during the review of the loan agreements?
Answer : D
The correct answer is D because it is a suspicious activity that Y, who is the authorized signatory of the customer, also signed on behalf of the lenders. This indicates a possible conflict of interest, collusion, or fraud. The other options are not suspicious activities based on the information given.
An investigator receives an alert documenting a series of transactions. A limited liability corporation (LLC) wired 59.000,000 USD to an overseas account associated with a state-run oil company. A second account associated with the state-run oil company wired 600,000,000 USD to the LLC. The LLC then wired money to other accounts, a money brokerage firm, and real estate purchases.
The investigator initiated an enhanced KYC investigation on the LLC. The financial institution opened the LLC account a couple of weeks prior to the series of transactions. The names associated with the LLC had changed multiple times since the account opened. A search of those names revealed relations with multiple LLCs. Public records about the LLCs did not show any identifiable business activities.
Open-source research identified mixed reports about the brokerage firm. The firm indicated it purchased mutual funds for its clients and dispensed returns to clients.
Media reports claimed the firm laundered money by holding for a fee before returning it to investors.
The investigator discovers that the bank has no records pertaining to ownership of the LLC. What would this mean for the bank and/or investigator?
Answer : C
The bank is out of compliance with CIP regulations because it did not obtain the minimum identifying information from the customer prior to opening the account, as required by 31 CFR 1020.220(a)(2)(i)(A). The bank should have obtained the name, date of birth, address, and identification number of the customer, as well as verified the identity of the customer to the extent reasonable and practicable. The lack of ownership data may also indicate a violation of beneficial ownership regulations, but that is not the primary issue in this case.
An investigator is reviewing a case generated from the transaction monitoring system, with two large amounts of incoming remittance (IR) to an individual customer. Based on the KYC profile, the customer is a plant manager of a famous multi-national electronics manufacturing firm. As the customer has no similarly large transaction patterns for the past 2 years, the investigator sends an inquiry to the relationship manager (RM) about the nature of the transaction. The RM replies that the transaction is a consultancy fee provided from two different electronics companies with a debit note provided However, there is no detail of service provided on the debit note, and the remitters are two individuals.
Which actions should the investigator recommend to mitigate risk? (Select Two.)
Answer : D, E
The actions that the investigator should recommend to mitigate risk are conducting enhanced due diligence (D) and re-evaluating the customer risk profile (E). These actions are appropriate and prudent, as they allow the investigator to obtain more information and evidence about the nature and purpose of the transactions, the source and destination of the funds, and the identity and legitimacy of the parties involved. According to the ACAMS Advanced Financial Crimes Investigations Certification Study Guide1, ''the FI should conduct enhanced due diligence on all parties involved in the investigation, including checking various sources of information, such as watch lists, sanctions lists, negative news, and official registries'' (p. 24). The FI should also ''re-assess the customer risk profile based on any new information obtained during the investigation, and adjust the customer due diligence and monitoring requirements accordingly'' (p. 25).
The other options are not as appropriate or effective as options D and E. The investigator should not recommend exiting the relationship with the customer (A), as this could be premature or disproportionate, as well as potentially discriminatory or illegal. The investigator should not recommend documenting and maintaining a file with the investigative findings (B), as this is not an action to mitigate risk, but rather a standard procedure for any investigation. The investigator should not recommend discussing the investigation findings with the customer , as this could compromise the integrity and objectivity of the investigation, as well as expose the FI to legal or regulatory risks.
An investigator is reviewing an alert for unusual activity. System scanning detected a text string within a company customer's account transactions that indicates the account may have been used for a drug or drug paraphernalia purchase Based on the KYC profile, the investigator determines the customer's company name and business type are marketed as a gardening supplies company. The investigator reviews the account activity and notes an online purchase transaction that leads the investigator to a website that sells various strains of marijuan
a. Additional account review detects cash deposits into the account at the branch teller lines, so the investigator reaches out to the teller staff regarding the transactions. The teller staff member reports that the business customers have frequently deposited cash in lower amounts. The teller, without prompting, adds that one of the transactors would occasionally smell of a distinct scent of marijuana smoke.
Which are the best next steps for the investigator to take? (Select Three.)
Answer : A, C, E
The best next steps for the investigator to take are:
A . Review the customer's transaction history. This can help the investigator identify any patterns or anomalies in the customer's account activity, such as changes in transaction volume, frequency, amount, source, destination, purpose, etc. The investigator can also compare the customer's transaction history with their KYC profile and risk rating to assess if there are any discrepancies or inconsistencies.
C . Check internal KYC information. This can help the investigator verify the customer's identity, business nature, ownership structure, expected activity, source of funds, etc. The investigator can also update or enhance the customer's KYC information based on any new or relevant information obtained from other sources.
E Conduct adverse media and open-source searches on the customer's background. This can help the investigator find out if there is any negative or adverse information about the customer in public data sources, such as news articles, social media posts, blogs, forums, etc. Adverse media and open-source searches can also provide additional context and insight into the customer's reputation, behavior, associations, etc. The other options are incorrect because:
B . Request information from the internet service provider who hosts the website is not feasible, as it may require a legal process or a court order to obtain such information. Moreover, the internet service provider may not have or disclose any useful information about the website or its owner.
D . Research other customer accounts for transactions to the same website is not relevant, as it may not provide any meaningful information about the customer under investigation. Furthermore, it may violate the privacy and confidentiality of other customers who are not related to the investigation.
F . Identify if the customer has opened accounts in an urban city area is not helpful, as it may not have any bearing on the customer's involvement in a drug or drug paraphernalia purchase. Additionally, it may not be possible to access or verify such information without the customer's consent or authorization.
Advanced CAMS-FCI Certification | ACAMS, Section 2: Investigating Financial Crimes, page 11
Leading Complex Investigations Certificate | ACAMS, Module 3: Conducting Research and Analysis, page 6
Adverse Media Screening - Using AI to Mitigate Risk
Legal requirements for adverse media screening - Thomson Reuters
Electronic client due diligence | Ethics helpsheets | ICAEW
6AMLD & FATF: Where Adverse Media Screening Fits In
Free Adverse Media Check | NameScan
A financial regulator is evaluating the effectiveness of a financial institution's (Fl) anti-financial crime program. Which condition should be met to satisfy the regulator?
Answer : D
The condition that should be met to satisfy the regulator is that the program is drafted using a risk-based approach to avoid the FI being used as a conduit for criminal activities. A risk-based approach means that the FI identifies, assesses, and understands its exposure to financial crime risks and applies appropriate measures to mitigate them. This is consistent with the international standards and best practices for anti-financial crime compliance. The program being aligned with the financial industry's anti-financial crime priorities, meeting the minimum requirements of anti-financial crime standards published by a financial industry association, or having no high-severity issues in internal auditing results are not sufficient to satisfy the regulator, as they do not necessarily reflect the specific risks faced by the FI or demonstrate its effectiveness in preventing and detecting financial crimes.
A client with many personal and business deposits with the financial institution (Fl) seeks a business loan. The client wants to guarantee the loan with a trust for which they are the beneficiary.
An investigator examines the trust. The trust has many layers, including shell companies in known tax havens. The client's ultimate beneficial ownership claim cannot be validated, and the loan is denied.
Two months later, the Fl receives a law enforcement (LE) request on one of the client's business accounts. While reviewing the business account, the Fl receives another LE request on the same account from another agency. The requested information is shared.
Three months later, a branch manager receives a request to open a business deposit account related to a complex trust. The manager forwarded the request because of the complexity. The trust was the same as the previously examined trust, but the request came from a different client. The second client also has many accounts with the Fl. Further inspection finds links between the second client and the Paradise Papers. The Papers state the client led illegal activities and committed tax evasion.
What steps should the investigator take to review the accounts held by the second client who is listed in the Paradise Papers? (Select Two.)
Answer : A, D, D
The investigator should recommend a SAR/STR be filed regarding the second client's use of a questionable trust to open an account, as this could indicate an attempt to conceal the source and ownership of funds, and to evade taxes and sanctions. The investigator should also monitor all accounts and entities related to the second client, as they may be involved in illegal activities or pose a high risk to the FI. The investigator should not review all accounts that have opened trust accounts, as this would be too broad and inefficient. The investigator should not inform FI management of deficiencies in their AML program, as this is not their role or responsibility. The investigator should not inform FI management of the start of a serious risk-based investigation, as this may compromise the confidentiality and integrity of the investigation.
Law enforcement agents arrive at a broker-dealer's premises with a search warrant. In addition to cooperation with the warrant, which instructions should the person in charge of the broker-dealer provide to their employees?
Answer : A
The instruction that the person in charge of the broker-dealer should provide to their employees is to take notes on the questions and comments made by the agents (A). This is because taking notes can help the employees to recall and document what happened during the search warrant execution, which can be useful for legal or regulatory purposes. According to ACAMS3, ''the FI should instruct its staff to cooperate with LE agents during a search warrant execution, but also to take notes of what is being searched, seized, or asked by the agents'' (p. 35). The FI should also ''keep copies of any documents or records that are taken by LE agents'' (p. 35).
The other instructions are not correct. The person in charge of the broker-dealer should not instruct their employees to sign consent forms permitting the agents to search employees' offices (B), as this is unnecessary and potentially risky, as the agents already have a valid search warrant that authorizes them to search the premises. The person in charge of the broker-dealer should not instruct their employees to provide agents with unlimited access to customers' personal data , as this could violate privacy or data protection laws, as well as compromise customer trust and confidentiality. The person in charge of the broker-dealer should not instruct their employees to volunteer information not requested by the agents that they think may be useful (D), as this could interfere with the LE investigation or expose them to legal or regulatory risks.
Introduction to Transnational Organized Crime
ACAMS Law Enforcement and Financial Crimes Investigations eLearning Course Module
Law Enforcement Requests and Actions
During transaction monitoring. Bank A learns that one of their customers. Med Supplies 123, is attempting to make a payment via wire totaling 382,500 USD to PPE Business LLC located in Mexico to purchase a large order of personal protective equipment. specifically surgical masks and face shields. Upon further verification. Bank A decides to escalate and refers the case to investigators.
Bank A notes that, days prior to the above transaction, the same customer went to a Bank A location to wire 1,215,280 USD to Breath Well LTD located in Singapore. Breath Well was acting as an intermediary to purchase both 3-ply surgical masks and face shields from Chin
a. Bank A decided not to complete the transaction due to concerns with the involved supplier in China. Moreover, the customer is attempting to send a third wire in the amount of 350,000 USD for the purchase of these items, this time using a different vendor in China. The investigator must determine next steps in the investigation and what actions, if any. should be taken against relevant parties.
Upon further investigation. Bank As investigator learns that both the Mexico- and Singapore-based companies are linked to the alleged suppliers in China. Which additional indicators would the investigator need to identify to determine if this fits a fentanyl (drug) trafficking typology? (Select Two.)
Answer : A, C
In a SAR/STR narrative concerning Individual
Answer : B
A product of analysis is a conclusion or inference that is derived from facts or judgments, using analytical techniques or tools. Option B is a product of analysis because it implies that the investigator has used a tool or technique, such as a threshold analysis, to identify a pattern of structured cash deposits that may indicate an attempt to evade reporting requirements. The other options are facts or judgments that can be verified by evidence or observation.
A client at a financial institution deposits large amounts of money into an account, and almost immediately, the funds are then distributed to numerous individuals' accounts. The transaction activity described in the scenario is a pattern of:
Answer : B
Deposit trading is a pattern of suspicious activity where a client deposits large amounts of money into an account, and then transfers the funds to other accounts, often in different jurisdictions or countries. This could be an attempt to disguise the source or destination of the funds, or to avoid reporting requirements. Deposit trading is also known as layering, which is the second stage of money laundering.