‘‘Know Your Customer’’ Section 601.0 INTRODUCTION One of the most important, if not the most important, means by which financial institutions can hope to avoid criminal exposure to the institution by ‘‘customers’’ who use the resources of the institution for illicit purposes is to have a clear and concise understanding of the ‘‘custom- ers’’’ practices. The adoption of ‘‘know your customer’’ guidelines or procedures by financial institutions has proven extremely effective in detecting suspicious activity by ‘‘customers’’ of the institution in a timely manner. Even though not presently required by regu- lation or statute, it is imperative that financial institutions adopt ‘‘know your customer’’ guide- lines or procedures to ensure the immediate detection and identification of suspicious activ- ity at the institution. The concept of ‘‘know your customer’’ is, by design, not explicitly defined so that each institution can adopt procedures best suited for its own operations. An effective ‘‘know your customer’’ policy must, at a mini- mum, contain a clear statement of manage- ment’s overall expectations and establish specific line responsibilities. While the officers and staff of smaller banks, Edge corporations, and foreign branches or agencies may have more frequent and direct contact with customers than large urban institutions, it is incumbent upon all institutions to adopt and follow policies appropriate to their size, location, and type of business. OBJECTIVES OF ‘‘KNOW YOUR CUSTOMER’’ POLICY •A ‘‘know your customer’’ policy should increase the likelihood that the financial insti- tution is in compliance with all statutes and regulations and adheres to sound and recog- nized banking practices. •A ‘‘know your customer’’ policy should decrease the likelihood that the financial insti- tution will become a victim of illegal activities perpetrated by its ‘‘customers.’’ • A ‘‘know your customer’’ policy that is effec- tive will protect the good name and reputation of the financial institution. • A ‘‘know your customer’’ policy should not interfere with the relationship of the financial institution with its good customers. CONTENTS OF ‘‘KNOW YOUR CUSTOMER’’ POLICY In developing an effective ‘‘know your cus- tomer’’ policy it is important to note that appearances can be deceiving. Potential custom- ers of a financial institution may appear to be legitimate, but in reality are conducting illicit activities through the financial institution. Like- wise, legitimate customers may be turned away from the institution because their activities are perceived to have a criminal tone. It is also important to realize that various influences on legitimate customers may transform such cus- tomers into wrongdoers. At the present time there are no statutorily mandated procedures requiring a ‘‘know your customer’’ policy or specifying the contents of such a policy. However, in order to develop and maintain a practical and useful policy, financial institutions should incorporate the following principles into their business practices: • Financial institutions should make a reason- able effort to determine the true identity of all customers requesting the bank’s services; • Financial institutions should take particular care to identify the ownership of all accounts and of those using safe-custody facilities; • Identification should be obtained from all new customers; • Evidence of identity should be obtained from customers seeking to conduct significant busi- ness transactions; • Financial institutions should be aware of any unusual transaction activity or activity that is disproportionate to the customer’s known business. An integral part of an effective ‘‘know your customer’’ policy is a comprehensive knowl- edge of the transactions carried out by the customers of the financial institution. Therefore, it is necessary that the ‘‘know your customer’’ procedures established by the institution allow for the collection of sufficient information to Bank Secrecy Act Manual September 1997 Page 1
62
Embed
Know Your Customer’’ Section 601 - Federal Reserve … a ‘‘customer profile.’’ The primary objective of such procedures is to enable the financial institution to predict
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
‘‘Know Your Customer’’Section 601.0
INTRODUCTION
One of the most important, if not the mostimportant, means by which financial institutionscan hope to avoid criminal exposure to theinstitution by ‘‘customers’’ who use the resourcesof the institution for illicit purposes is to have aclear and concise understanding of the ‘‘custom-ers’ ’’ practices. The adoption of ‘‘know yourcustomer’’ guidelines or procedures by financialinstitutions has proven extremely effective indetecting suspicious activity by ‘‘customers’’ ofthe institution in a timely manner.
Even though not presently required by regu-lation or statute, it is imperative that financialinstitutions adopt ‘‘know your customer’’ guide-lines or procedures to ensure the immediatedetection and identification of suspicious activ-ity at the institution. The concept of ‘‘know yourcustomer’’ is, by design, not explicitly definedso that each institution can adopt proceduresbest suited for its own operations. An effective‘‘know your customer’’ policy must, at a mini-mum, contain a clear statement of manage-ment’s overall expectations and establishspecific line responsibilities. While the officersand staff of smaller banks, Edge corporations,and foreign branches or agencies may havemore frequent and direct contact with customersthan large urban institutions, it is incumbentupon all institutions to adopt and follow policiesappropriate to their size, location, and type ofbusiness.
OBJECTIVES OF ‘‘KNOW YOURCUSTOMER’’ POLICY
• A ‘‘know your customer’’ policy shouldincrease the likelihood that the financial insti-tution is in compliance with all statutes andregulations and adheres to sound and recog-nized banking practices.
• A ‘‘know your customer’’ policy shoulddecrease the likelihood that the financial insti-tution will become a victim of illegal activitiesperpetrated by its ‘‘customers.’’
• A ‘‘know your customer’’ policy that is effec-tive will protect the good name and reputationof the financial institution.
• A ‘‘know your customer’’ policy should notinterfere with the relationship of the financialinstitution with its good customers.
CONTENTS OF ‘‘KNOW YOURCUSTOMER’’ POLICY
In developing an effective ‘‘know your cus-tomer’’ policy it is important to note thatappearances can be deceiving. Potential custom-ers of a financial institution may appear to belegitimate, but in reality are conducting illicitactivities through the financial institution. Like-wise, legitimate customers may be turned awayfrom the institution because their activities areperceived to have a criminal tone. It is alsoimportant to realize that various influences onlegitimate customers may transform such cus-tomers into wrongdoers.
At the present time there are no statutorilymandated procedures requiring a ‘‘know yourcustomer’’ policy or specifying the contents ofsuch a policy. However, in order to develop andmaintain a practical and useful policy, financialinstitutions should incorporate the followingprinciples into their business practices:
• Financial institutions should make a reason-able effort to determine the true identity of allcustomers requesting the bank’s services;
• Financial institutions should take particularcare to identify the ownership of all accountsand of those using safe-custody facilities;
• Identification should be obtained from all newcustomers;
• Evidence of identity should be obtained fromcustomers seeking to conduct significant busi-ness transactions;
• Financial institutions should be aware of anyunusual transaction activity or activity thatis disproportionate to the customer’s knownbusiness.
An integral part of an effective ‘‘know yourcustomer’’ policy is a comprehensive knowl-edge of the transactions carried out by thecustomers of the financial institution. Therefore,it is necessary that the ‘‘know your customer’’procedures established by the institution allowfor the collection of sufficient information to
Bank Secrecy Act Manual September 1997Page 1
develop a ‘‘customer profile.’’ The primaryobjective of such procedures is to enable thefinancial institution to predict with relative cer-tainty the types of transactions in which acustomer is likely to be engaged. The customerprofile should allow the financial institution tounderstand all facets of the customer’s intendedrelationship with the institution, and, realisti-cally, determine when transactions are suspi-cious or potentially illegal. Internal systemsshould then be developed for monitoring trans-actions to determine if transactions occur whichare inconsistent with the ‘‘customer profile.’’ A‘‘know your customer’’ policy must consist ofprocedures that require proper identification ofevery customer at the time a relationship isestablished in order to prevent the creation offictitious accounts. In addition, the bank’semployee education program should provideexamples of customer behavior or activity whichmay warrant investigation.
IDENTIFYING THE CUSTOMER
As a general rule, a business relationship witha financial institution should never be estab-lished until the identity of a potential cus-tomer is satisfactorily established. If a potentialcustomer refuses to produce any of therequested information, the relationship shouldnot be established. Likewise, if requestedfollow-up information is not forthcoming, anyrelationship already begun should be termi-nated. The following is an overview of generalprinciples to follow in establishing customerrelationships:
Personal Accounts
1. No account should be opened without satis-factory identification, such as:• a driver’s license with a photograph issued
by the State in which the bank is located;or
• a U.S. passport or alien registration card,together with:
• a college photo identification card;• a major credit card (verify the current
status);• an employer identification card;• an out-of-State driver’s license; and/or• electricity, telephone.
2. Consider the customer’s residence or placeof business. If it is not in the area served bythe bank or branch, ask why the customer isopening an account at that location.
3. Follow up with calls to the customer’s resi-dence or place of employment thanking thecustomer for opening the account. Discon-nected phone service or no record of employ-ment warrant further investigation.
4. Consider the source of funds used to open theaccount. Large cash deposits should bequestioned.
5. For large accounts, ask the customer for aprior bank reference and write a letter to thebank asking about the customer.
6. Check with service bureaus for indicationsthe customer has been involved in question-able activities such as kiting incidents andNSF situations.
7. The identity of a customer may be estab-lished through an existing relationship withthe institution such as some type of loan orother account relationship.
8. A customer may be a referral from a bankemployee or one of the bank’s acceptedcustomers. In this instance, a referral alone isnot sufficient to identify the customer, but inmost instances it should warrant less vigi-lance than otherwise required.
Business Accounts
1. Business principals should provide evidenceof legal status (e.g. sole proprietorship, part-nership, or incorporation or association) whenopening a business account.
2. Check the name of a commercial enterprisewith a reporting agency and check prior bankreferences.
3. Follow up with calls to the customer’s busi-ness thanking the customer for opening theaccount. Disconnected phone service war-rants further investigation.
4. When circumstances allow, perform a visualcheck of the business to verify the actualexistence of the business and that the busi-ness has the capability of providing theservices described.
5. Consider the source of funds used to open theaccount. Large cash deposits should bequestioned.
6. For large commercial accounts, the followinginformation should be obtained:
601.0 ‘‘Know Your Customer’’
September 1997 Bank Secrecy Act ManualPage 2
• a financial statement of the business;• a description of the customer’s principal
line of business;• a list of major suppliers and customers and
their geographic locations;• a description of the business’s primary
trade area, and whether international trans-actions are expected to be routine; and
• a description of the business operationsi.e., retail versus wholesale, and the antici-pated volume of cash sales.
LOAN TRANSACTIONS
It is important to realize that relationships with afinancial institution that take a form other thandeposit accounts can be used for illicit purposes.Loan transactions have become a common vehi-cle for criminal enterprises that wish to takeadvantage of the proceeds of their illegal activi-ties. Therefore, prudent financial institutionsshould apply their ‘‘know your customer’’ pol-icy to customers requesting credit facilities fromthe institution.
SUSPICIOUS CONDUCT ANDTRANSACTIONS
In making a determination as to the validity of acustomer, there are certain categories of activi-ties that are suspicious in nature and should alertfinancial institutions as to the potential for thecustomer to conduct illegal activities at theinstitution. The categories, broadly defined, are:
• Insufficient, false, or suspicious informationprovided by the customer.
• Cash deposits which are not consistent withthe business activities of the customer.
• Purchase and/or deposits of monetary instru-ments which are not consistent with the busi-ness activities of the customer.
• Wire transfer activity which is not consistentwith the business activities of the customer.
• Structuring of transactions to evade record-keeping and/or reporting requirements.
• Funds transfers to foreign countries.
The general categories, delineated above, canbe broken down into various functions of thefinancial institution. Set forth below are morespecific suspicious activities as related to thevarious functions of the financial institution:
Tellers and Lobby Personnel
• Customer is reluctant to provide any informa-tion requested for proper identification.
• Customer opens a number of accounts underone or more names and subsequently makesdeposits of less than $10,000 in cash in eachof the accounts.
• Customer is reluctant to proceed with a trans-action after being informed that a CurrencyTransaction Report (CTR) will be filed, orwithholds information necessary to completethe form.
• Customer makes frequent deposits or with-drawals of large amounts of currency for noapparent business reason, or for a businesswhich generally does not involve large amountsof cash.
• Customer exchanges large amounts of cur-rency from small to large denomination bills.
• Customer makes frequent purchases of mone-tary instruments for cash in amounts less than$10,000.
• Customers who enter the bank simultaneouslyand each conduct a large currency transactionunder $10,000 with different tellers.
• Customer who makes constant deposits offunds into an account and almost immediatelyrequests wire transfers to another city orcountry, and that activity is inconsistent withthe customer’s stated business.
• Customer who receives wire transfers andimmediately purchases monetary instrumentsfor payment to another party.
• Traffic patterns of a customer change in thesafe deposit box area possibly indicating thesafekeeping of large amounts of cash.
• Customer discusses CTR filing requirementswith the apparent intention of avoiding thoserequirements or makes threats to an employeeto deter the filing of a CTR.
• Customer requests to be included on theinstitution’s exempt list.
Bookkeeping and Wire TransferOperations
• Customer who experiences increased wireactivity when previously there has been noregular wire activity.
‘‘Know Your Customer’’ 601.0
Bank Secrecy Act Manual September 1997Page 3
• International transfers for accounts with nohistory of such transfers or where the statedbusiness of the customer does not warrantsuch activity.
• Customer receives many small incoming wiretransfers or deposits of checks and moneyorders then requests wire transfers to anothercity or country.
• Customer uses wire transfers to move largeamounts of money to a bank secrecy havencountry.
• Request from nonaccountholder to receive orsend wire transfers involving currency fromnonaccountholder near the $10,000 limit orthat involve numerous monetary instruments.
• Nonaccountholder receives incoming wiretransfers under instructions to the bank to‘‘Pay Upon Proper Identification’’ or to con-vert the funds to cashier’s checks and mailthem to the nonaccountholder.
Loan Officers and CreditAdministration Personnel
• Customer’s stated purpose for the loan doesnot make economic sense, or customer pro-poses that cash collateral be provided for aloan while refusing to disclose the purpose ofloan.
• Requests for loans to offshore companies, orloans secured by obligations of offshore banks.
• Borrower pays down a large problem loansuddenly, with no reasonable explanation ofthe source of funds.
• Customer purchases certificates of deposit anduses them as loan collateral.
• Customer collateralizes loan with cash deposit.• Customer uses cash collateral located offshore
to obtain loan.• Loan proceeds are unexpectedly channeled
off-shore.
601.0 ‘‘Know Your Customer’’
September 1997 Bank Secrecy Act ManualPage 4
Wire Transfer SystemsSection 701.0
INTRODUCTION
As financial institutions, law enforcement agen-cies, and financial regulators have increasedtheir scrutiny of cash transactions, money laun-derers have become more sophisticated in usingall services and tools available to launder cashand move funds, including the wire transfersystems. This section will provide some back-ground and information on how the differentwire transfer systems work, how these systemsare used by money launderers, and how exam-iners should review a bank’s wire transfersoperations as part of the examination for com-pliance with the Bank Secrecy Act.
WIRE TRANSFER SYSTEMS
There are three wire transfer systems used in theUnited States by financial institutions—Fedwire,CHIPS, and S.W.I.F.T. All three systems sharethe same characteristics of high dollar value ofthe individual transfers, a real time system, anda widely distributed network of users. There areimportant differences, however, and these willbe discussed below. In order to examine aninstitution’s wire transfer function thoroughly, itis important to understand how the system(s)works. Each of the three wire transfer systemswill be looked at below.
Fedwire
Fedwire is the funds transfer system operated bythe Federal Reserve System. The Fedwire sys-tem may be used by any institution holding anaccount with a Federal Reserve Bank and it isprincipally domestic in orientation. It is a real-time system characterized by the instantaneous,irrevocable transfer of funds. As a ‘‘wholesale’’wire transfer system, Fedwire is primarily usedto transfer funds between financial institutionsand their major corporate customers. There areno restrictions on the minimum dollar size ofFedwire transfers, and individuals and smallbusinesses can and do use Fedwire by goingthrough their financial institution.
A financial institution can originate a Fedwiremessage in one of two ways—‘‘on-line’’ or
‘‘off-line.’’ On-line institutions have an elec-tronic connection to the Federal Reserve, andoff-line institutions have no such connectionand usually telephone the Federal Reserveto initiate a transfer. The large, high volumeinstitutions use a direct computer-to-computerconnection with Fed to originate funds transfersover Fedwire, and the other on-line institutionsuse a leased line connection or a telephonedial-up system to connect a PC to the Fedwiresystem. Because the settlement of all Fedwiretransfers is made through reserve accounts main-tained at the Federal Reserve Banks, all transfersgo through a Reserve Bank for routing andsettlement.
Off-line institutions usually telephone the Fedand give instructions over the phone using aprearranged codeword. The Fed verifies thecodeword and enters the message into the elec-tronic system for processing and sending to thereceiving institution. Fedwire transfers sent toan off-line institution are credited immediately,and the institution is either notified by phonefrom the Fed or by copy of the Fedwire messagesent to the institution the next day.
The actual transfer of funds in the Fedwiresystem takes place on the books of the FederalReserve. For a transfer to an institution in thesame Federal Reserve District, the FederalReserve Bank, upon receiving the Fedwireinstructions from the originating institution, deb-its the account of the originator and credits theaccount of the receiving institution. For interd-istrict transfers, the ‘‘local’’ FR Bank debits theaccount of the originator and credits the accountof the ‘‘receiving’’ FR Bank, which, in turn,credits the account of the receiving institution.
CHIPS
CHIPS (Clearing House Interbank PaymentsSystem) is a privately owned and operated fundstransfer system. It is owned and operated by theNew York Clearing House Association. CHIPScurrently has 128 members who are primarilymoney center banks in New York, Chicago, andSan Francisco as well as large internationalbanks.
CHIPS has its own communications networkand processes its own messages for memberinstitutions. During the day CHIPS maintains
Bank Secrecy Act Manual September 1997Page 1
the net credit and debit positions of memberswhile routing messages from sender to receiver.Although used primarily for international trans-fers, CHIPS is used to a small extent fordomestic transfers between U.S. banks and canbe used as an alternative to Fedwire if both thesending and receiving institutions are CHIPSmembers.
In CHIPS the transfer of funds does not occurwith the sending of the message. Rather, at theend of each day any of the 30 CHIPS settlementparticipants that are in a net debit position wirefunds by Fedwire to the CHIPS account at theNew York Fed and CHIPS sends these funds tothe banks in a net credit position by Fedwire.This end of day settlement feature is the biggestdifference between Fedwire and CHIPS, and italso puts CHIPS participants at risk if a partici-pating bank should fail or is unable to cover itsposition.
S.W.I.F.T.
SWIFT stands for the Society for WorldwideInterbank Financial Telecommunications. It is acooperatively owned, non-profit organizationwhich was founded in 1973 to serve the dataprocessing and telecommunications needs of itsmembers. SWIFT currently has members inmost countries throughout the world. The mem-bership base is very broad and includes com-mercial banks, investment banks, securitiesbroker/dealers, and other financial institutions.
As its name implies, SWIFT handles all sortsof telecommunications for its member institu-tions. Transfers of funds are only one use ofSWIFT, others being securities transfers, lettersof credit, advices of collection, foreign exchange,and free format information messages. All mes-sages are sent through the SWIFT network,SWIFT’s privately owned, worldwide telecom-munications network. Because of the availabil-ity of Fedwire and CHIPS, SWIFT is usedalmost exclusively by U.S. banks for interna-tional funds transfers and messages.
A SWIFT funds transfer message is simplynotification that funds are being transferred. Theactual movement of funds is independent of themessage, and transfers are effected in two com-mon ways. The first method is to transfer thefunds by transferring balances through mutualcorrespondent banks, and the second method isto settle through Fedwire or CHIPS.
A bank’s SWIFT operations are usuallylocated in its international department, althoughadditional terminals with SWIFT access couldbe located in the foreign exchange departmentor the securities trading department.
HOW A COMMERCIAL BANK’SWIRE ROOM WORKS
In order to examine the Fedwire operations of acommercial bank, it is important to understandhow the ‘‘wire room’’ of a commercial bankoperates. In the larger banks with a significantvolume of wire traffic, there may be a depart-ment dedicated to this function. In most banks,however, the Fedwire volume does not justify afull time staff or person, and the sending andreceiving of wires may be part-time responsi-bilities for one or several people. Every bank hasits own procedures for handling wires, but thereare enough features in common to allow forgeneric descriptions for large and small banks.
Large Banks
Large banks with a Fedwire volume of severalhundred messages per day will most likely usededicated computer resources for Fedwire—either part of the bank’s host computer or aseparate minicomputer. These banks utilize acomputer-to-computer (computer interface) elec-tronic link with the Fed, which allows for fastertransmission of high volumes. The softwareused for wire transfers, either developed in-house or purchased from a vendor, allows forautomatic posting to DDA and general ledger.
The wire room may receive payment ordersfrom several different sources, including autho-rized personnel from within the bank and cor-porate customers who may either call the bank,fax instructions, or even have an on-line con-nection with the bank to send wire instructionsand access other bank services. Phone calls tothe wire room are recorded for security andaudit reasons, and the tapes are usually main-tained for a 30 day period. The bank should haveprocedures in place to verify payment orders.These procedures usually include the use ofcode words, call backs, and corporate resolu-tions authorizing certain employees to sendwires. Verification and security procedures are
701.0 Wire Transfer Systems
September 1997 Bank Secrecy Act ManualPage 2
extremely important in light of the potential forhigh losses.
After a payment order is received, a Fedwiremessage is entered into the bank’s system at anon-line terminal. Before the wire is sent to theFed, it is sent to a second terminal to be verifiedfor accuracy as well as proper authorization.Only after the payment order is reviewed by thesecond staff member is it sent to the Fed forprocessing. This separation of duties is extremelyimportant to ensure security.
The bank’s software will maintain data oneach day’s transfers in several different ways.These might include a listing by wires sent andreceived, wires listed by amount, wires listed bysequence number, and wires listed by accountholder. Most software systems maintain thework of several previous days, often the last 5 to7 days, to allow for on-line access to trace errorsand problems. After the 5 to 7 days, the datamay be maintained on microfiche or paperlisting.
Smaller Banks
Smaller banks with a low volume of Fedwiretransactions will typically have one or severalstaff members handling the sending and receiv-ing of wires over a connection from the bank’sPC to the Fed’s mainframe. The PC connectionis called Fedline, and the software is supplied bythe Fed. The basic procedures for sending andreceiving wires are similar to those for the largebanks, but the degree of sophistication andseparation of duties is not as great. A financialinstitution should have other back-up controls inplace if separation of duties is a problem. Thesecontrols can include rotation of duties and offi-cer review of all transactions.
Payment orders to send a wire are receivedfrom bank personnel and corporate customers.Individuals who wish to wire funds usually gothrough their loan officer or account representa-tive who notifies the wire room. Here again,verification is an important security procedure,and records should be kept of all payment orderrequests, by tapes of phone calls, written recordsof requests, or other means.
After receiving the payment order, the termi-nal operator keys the wire message into the PC.Before the message can be sent, it must beverified by a second person (this is the recom-mended procedure—some small banks allow the
same person to key in the wire and verify forsending). Most on-line PC connections to theFed have two printers attached, one which printscopies of the outgoing messages and the otherwhich prints incoming messages. The bankshould maintain the copies of these messages inthe continuous paper form for recordkeepingpurposes. The unbroken sheet ensures that allmessages are accounted for; however, thesequence numbers of the messages should alsobe checked because messages can occasionallybe skipped because of communication prob-lems. In addition, each incoming and outgoingmessage is assigned a sequence number that alsoprovides an audit trail ensuring that all messagesare accounted for.
How Money Launderers Use the WireSystem
While there are many ways for money launder-ers to use the wire system, the objective for mostmoney launderers is to aggregate funds fromdifferent accounts and move those funds throughaccounts at different banks until the origins ofthe funds cannot be traced. Most often thisinvolves moving the funds out of the country,through a bank account in a country with strictbank secrecy laws, and possibly back into theU.S. Money laundering schemes uncovered bylaw enforcement agencies, for instance throughOperation Polar Cap, show that money launder-ers use the wire system to aggregate funds frommultiple accounts at the same bank, wire thosefunds to accounts held at other U.S. banks,consolidate funds from these larger accounts,and ultimately wire the funds to offshoreaccounts in countries such as Panama.
Unlike cash transactions, which are closelymonitored, Fedwire transactions and banks’ wirerooms are designed to quickly process approvedtransactions. Wire room personnel usually haveno knowledge of the customer or the purpose ofthe transaction. Therefore, once cash has beendeposited into the banking system, money laun-derers use the wire system because of thelikelihood that transactions will be processedwith little or no scrutiny.
HOW TO READ A WIRETRANSFER MESSAGE
A wire transfer message contains, by design, a
Wire Transfer Systems 701.0
Bank Secrecy Act Manual September 1997Page 3
minimal amount of information. As discussed inmore detail below, Fedwire messages must con-tain primary information consisting of the send-er’s and receiver’s name and ABA routingnumber, the amount of the transfer, a referencenumber, and certain other control information.These messages may contain certain supple-mentary information, such as the name of theoriginating party, the name of the beneficiary,the beneficiary’s account number, a referencemessage for the beneficiary, and other relatedinformation.
For the purposes of these examination proce-dures, it is important to be able to identifycertain information on the message. The supple-mentary information is identified using threeletter codes. These codes are identified below,but not all information will appear in all mes-sages. In some messages, there may not be anysupplementary information at all.
Product Codes—These codes identify the typeof transfer and are followed by a backslash.
BTR/ Bank Transfer, the beneficiary is a bank.CTR/ Customer Transfer, the beneficiary is a
non bank.DEP/ Deposit to Sender’s AccountDRW/ DrawdownFFR/ Fed Funds ReturnedFFS/ Fed Funds Sold
Field Tags—These codes identify certain supple-mentary information about the transfer and con-sist of three letters followed by an equals sign.
ORG= Originator, initiator of the transfer.OGB= Originator’s Bank, bank acting for the
originator of the transfer.IBK= Intermediary Bank, the institution(s)
between the receiving institution andthe beneficiary’s institution throughwhich the transfer must pass, if speci-fied by the sending institution.
BBK= Beneficiary’s Bank, the bank acting asfinancial agent for the beneficiary ofthe transfer.
BNF= Beneficiary, the ultimate party to becredited or paid as a result of a transfer.
RFB= Reference for the Beneficiary, refer-ence information enabling the benefi-ciary to identify the transfer.
OBI= Originator to Beneficiary Information,information to be conveyed from theoriginator to the beneficiary.
BBI= Bank to Bank Information, miscella-neous information pertaining to thetransfer.
INS= Instructing Bank, the institution thatinstructs the sender to execute the trans-action.
Identifier Codes—Two letter codes preceded bya backslash and followed by a hyphen used toidentify or designate a number important to thetransfer.
/AC- Account number/BC- Bank identifier code/CH- CHIPS universal identifier/CP- CHIPS participant identifier/FW- Federal Reserve routing number/SA- SWIFT address
Advice Method Codes—Three letter codes pre-ceded by a backslash used to identify the methodof advising the beneficiary of transfer.
/PHN advise by telephone/LTR advise by letter/WRE advise by wire/TLX advise by telex
The following sample message illustrates theformat of a Fedwire message and the use of theabove codes:
mode status mdc error-intercept
PRODUCTION FT INCOMING MSG
rcvr type
121000358 1040
sndr ref # amt
021000089 4092 $1,000,000.00
CITIBANK NYC/ORG=J.DOE, LONDON OGB=BANK OF THE NORTH, LONDON
BANK AMER SF/CTR/IBK=B OF A LOS ANGELES BBK=BK OF SAN PEDRO, CA
This Fedwire message shows a transfer fromCitibank, NYC, to Bank of America, SanFrancisco, for $1,000,000.00. Under the ‘‘rcvr’’heading is Bank of America’s routing number,
701.0 Wire Transfer Systems
September 1997 Bank Secrecy Act ManualPage 4
and under the ‘‘sndr’’ is Citibank’s routingnumber. The transfer was originated by J. Doe inLondon through his bank (the originating bank),the Bank of the North, London. Bank of theNorth sent the funds to Citibank, which in turnsent the funds to Bank of America. The fundswill be sent to the intermediary bank, Bankof America’s Los Angeles bank for credit tothe bank of the beneficiary, Bank of San Pedro,San Pedro, CA. The beneficiary of the transferis H. L. Industries, and the message containsinstructions to credit the amount to H. L. Indus-tries’ account and advise the company by phone
of receipt of the transfer. Mr. Doe sends infor-mation that the wire is for payment of invoicenumber 8123, which was for the purchase ofequipment. The ‘‘imad’’ and ‘‘omad’’ numbersat the bottom of the message are added by theFed and identify the date, time, and receivingand sending terminal.
For the purposes of examining for moneylaundering, most of the important informationwill be contained in the supplementary portionof the message with the field tags. Bank person-nel can help decipher messages.
Wire Transfer Systems 701.0
Bank Secrecy Act Manual September 1997Page 5
Amendment to Regulation HProcedures for Monitoring Bank Secrecy ActCompliance—February 1987* Section 801.0
Effective January 27, 1987, section 208.14 isadded to read as follows:
(a) Purpose. This section is issued to ensurethat all state member banks establish andmaintain procedures reasonably designed toensure and monitor their compliance withthe provisions of subchapter II of chapter 53of title 31, United States Code, the BankSecrecy Act, and the implementing regula-tions promulgated thereunder by the Depart-ment of Treasury at 31 CFR part 103,requiring recordkeeping and reporting ofcurrency transactions.13
* The complete regulation as amended effectiveJanuary 27, 1987, consists of—• a regulation pamphlet dated May 1942 and• this slip sheet.
13. Recordkeeping requirements contained in thissection have been approved by the Board underdelegated authority from the Office of Managementand Budget under the provisions of chapter 35of title 44, United States Code, and have been assignedOMB No. 7100–0196.
(b) Establishment of compliance program. Onor before April 27, 1987, each bank shalldevelop and provide for the continuedadministration of a program reasonablydesigned to ensure and monitor compliancewith the recordkeeping and reportingrequirements set forth in subchapter II ofchapter 53 of title 31, United States Code,the Bank Secrecy Act, and the implement-ing regulations promulgated thereunder bythe Department of Treasury at 31 CFRpart 103. The compliance program shall bereduced to writing, approved by the board ofdirectors, and noted in the minutes.
(c) Contents of compliance program. The com-pliance program shall, at a minimum—
(1) provide for a system of internal controlsto ensure ongoing compliance;
(2) provide for independent testing for com-pliance to be conducted by bank person-nel or by an outside party;
(3) designate an individual or individualsresponsible for coordinating and moni-toring day-to-day compliance, and
(4) provide training for appropriatepersonnel.
Bank Secrecy Act Manual September 1997Page 1
Internal Compliance ProgramSection 802.0
Essential to the financial institution’s ability tocomply with the rules and regulations of theBank Secrecy Act and ensure that the institutiondoes not become involved in illicit activities, isan effective internal compliance program. Itshould be noted that, by statute (12 U.S.C.1818(s)), Federal banking agencies are requiredto issue orders requiring an institution to ‘‘ceaseand desist from its violation’’ when an institu-tion has failed to establish and maintain ade-quate internal compliance procedures or aninstitution has failed to correct any problem withthe internal compliance procedures that werepreviously identified as being deficient.
At a minimum, an internal compliance pro-gram must:
• Provide for a system of internal controls toensure ongoing compliance;
• Provide for independent testing of compliance;• Designate an individual responsible for day-
to-day coordination and monitoring of com-pliance; and
• Provide training for appropriate personnel.
These items are the basic elements of a goodcompliance program. In order to maintain aprogram that ensures compliance on an ongoingbasis and helps to prevent abuse of the institu-tion by those who might wish to use the insti-tution for illegal purposes, financial institutionsmust involve several areas of operation andadministration.
SENIOR MANAGEMENT
Senior management must show a commitmentto compliance by the financial institution by:
• Establishing a strong compliance plan that isfully implemented and approved by the boardof directors of the institution;
• Requiring that senior management be keptinformed of compliance efforts, audit reportsand any compliance failures with correctivemeasures instituted;
• Including regulation compliance within thejob description and job performance evalua-tion of institution personnel; and
• Conditioning employment on regulationcompliance.
INTERNAL AUDITORS
An internal auditing department within the finan-cial institution should be established withresponsibilities which include:
• Performing transaction testing to ensurethat the institution is following proscribedregulations;
• Performing testing of employees to assessknowledge of regulations and procedures;
• Reviewing written procedures and trainingprograms for completeness and accuracy; and
• Reporting all findings to senior management.
LARGE CURRENCY INTERNALCONTROL
Financial institutions should have the ability todetect and monitor large currency transactionsoccurring at the financial institution to ensurethat such transactions are not being conductedfor illegitimate purposes. With the advent of the‘‘$3,000 rule’’ imposing recordkeeping require-ments for cash purchases of certain monetaryinstruments of between $3,000 and $10,000, thesame principles of currency transaction monitor-ing should be applied to this function, as well.
EXEMPTION PROCEDURES
For those financial institutions that maintainexemptible customers from the CTR reportingrequirements under the existing rules (as opposedto the interim exemption rule), it is imperativethat regular monitoring of the exemption pro-cess be undertaken. The institution must be ableto ensure that exempted customers are comply-ing with the limitations of their exemption andthat, on a regular basis, exempted customerstransactions are reviewed. Any abnormalities inthe exemption process by the institution or thecustomer should be readily identifiable throughthe internal compliance program.
TRAINING
Financial institution personnel should be trainedin all aspects of regulatory and internal policies
Bank Secrecy Act Manual September 1997Page 1
and procedures. An effective training programshould include:
• All compliance officers, audit and/or indepen-dent review personnel and other customercontact personnel, including tellers, customerservice representatives, lending officers andprivate or personal banking officers, should betrained regarding policies and procedures, aswell as common money laundering schemesand patterns;
Continuous and updated training to ensure per-sonnel is provided with the most current and upto date information.
COMPLIANCE RESPONSIBILITY
An individual should be designated as a com-pliance contact, with day-to-day responsibilityfor the compliance program.
802.0 Internal Compliance Program
September 1997 Bank Secrecy Act ManualPage 2
Internal Revenue Service Currency and Banking Retrieval SystemCurrency and Banking Reports System (CBRS) Section 901.0
The Bank Secrecy Act and Money LaunderingStatutes were passed by Congress to help facili-tate the identification and prosecution of indi-viduals involved in illegal activities for profit.In 1984, the Detroit Computing Center (DCC)was chosen to collect, perfect and input to theCBRS Data Base, millions of documentsrequired to be furnished under the laws. Thesedocuments consist of the following:CurrencyTransaction Reports (CTR’s - Form 4789)required to be filed by Financial Institutionson cash transactions over $10,000;CurrencyTransaction Reports by Casinos (CTRC -Form 8362) required to be filed by casinos oncash transactions over $10,000;Report of CashPayments Received in a Trade or Business(Form 8300) to be filed by anyone in a tradeor business receiving payments in cash totalling$10,000 or more in a single or related trans-action;Report of Foreign Bank and FinancialAccounts (FBAR - TDF 90-22.1)required to befiled annually by any U.S. citizen having finan-cial interest in or signature authority over anyforeign bank account exceeding $10,000 in totalvalue at any time during the calendar year, ormultiple accounts that in the aggregate exceed$10,000;Report of International Transporta-tion of Currency or Monetary InstrumentReports (CMIR - Form 4790) are loaded fromtapes received from U.S. Customs Service, thesedocuments are filed when amounts greater than$10,000 in cash or monetary instruments aretaken across any U.S. Borders;SuspiciousActivity Report (SAR) are filed by FinancialInstitutions on any unusual or suspicious cashtransactions of any amount; andForm CF-7501Entry Summary is received from Customselectronically for any commodity subject toExcise Tax. In early 1994, theInformationReturn for Federal Contract Document (Form8596)was added to the CBRS. This Collectiondocument allows for tracking of contracts beingissued by different Federal Agencies. As ofthe end of January 1996, the CBRS DataBase contained over 90,000,000 informationdocuments.
The CBRS Data Base can be accessed byspecial agents, revenue agents and revenue offi-cers through portable computers through a tele-phone system or CDN lines. There are approxi-mately 15,000 user-id/passwords assigned tousers of the CBRS, including staff of the Board
of Governors of the Federal Reserve System.Additionally, tapes of all documents, except8300s, are furnished to U.S. Customs and sub-sequently added to the Treasury EnforcementCommunications Service’s (TECS) data basefor use by law enforcement agencies. Tape filesare also sent to the states of California, Arizona,New York, Florida, Illinois and Texas for CTRdocuments filed in their respective states. ProjectGATEWAY has been established to allowselected officials from all states to have hands-onaccess to the query data base.
The system can be used to identify bankaccounts, secret cash, leads to assets and foreignbank accounts, and a myriad of other usefulinformation for compliance and other lawenforcement personnel. For example, FederalReserve staff utilize the data base to verifytimely filings by financial institutions.
The CBRS Data Base is maintained at theDCC, where the processing of the data is con-trolled. Three branches comprise the workinggroup for the project: Systems, Edit/Error Reso-lution, and the Compliance Branch. The Com-pliance Branch has the overall responsibility ofproviding authoritative information and assis-tance in person, by telephone, or by correspon-dence to financial institutions and their repre-sentatives as they apply to the provisions of theBank Secrecy Act.
Banks, as defined in the regulations, have theauthority to exempt from reporting transactionsof certain types of entities specifically enumer-ated in the regulations. These entities are main-tained on bank exempt lists. The ComplianceBranch corresponds with banks to obtain theseexempt lists and conducts a limited review onsuch lists once received.
If a bank believes that certain circumstanceswarrants the exemption of an entity not specifi-cally enumerated in the regulation, it mustrequest a ‘‘Special Exemption’’ from IRS. Theserequests for ‘‘Special Exemptions’’ are grantedor denied by the Compliance Branch.
Research of various data bases and files isdone so that certified transcripts/documents canbe prepared by use in grand jury investigationsand criminal/civil court cases. Periodically, theemployees may be called upon to serve aswitnesses (court testifiers) to introduce thesedocuments as evidence during a trial.
Bank Secrecy Act Manual September 1997Page 1
Also, as a part of the document processingfunction, many documents are perfected bytelephone contact and/or correspondence. Tele-phone contact is made with financial institutionswhen an unsatisfactory response is received as aresult of computer generated correspondence onan incomplete Currency Transaction Report.The objective is to make the Form 4789processable. If the telephone contact is unsuc-cessful, the Form 4789 is deemed unsatisfactoryand thus forwarded to Treasury for furtherreview.
BSA COMPLIANCE BRANCH,DETROIT COMPUTING CENTER
The BSA Compliance Branch of the CurrencyReporting & Compliance Division has beendelegated responsibility for providing authorita-tive information on certain provisions of theBank Secrecy Act (‘‘BSA’’). This guidance isprovided in person, by telephone or throughcorrespondence to financial institutions and theirrepresentatives.
The BSA Compliance Branch will verifyreceipt of CTRs at the request of a financialinstitution. There is a research fee charged forthis service of $20.00 for up to ten documentsand $2.00 for each additional document. Toreceive copies, add 15 cents per documentrequested.
A synopsis of the duties of the BSA Compli-ance Branch as follows:
Outreach Program:
• Speakers for Banking/Professional Seminars
Financial Institution Services
• Customer service lines for answering techni-cal and form completion questions
• Grant/deny request for special exemptions• Process requests for backfiling determinations• Review bank Exemption Lists• Provide verification of receipt and copies of
CTRs• Staff a toll-free suspicious transaction report-
ing hot line
CID Agents, IRS and Other LawEnforcement Services
• Copies of BSA/Title 26 documents includingtrue copy certifications for court
• Research and certification of ‘‘negative’’ or‘‘no document filed’’ results
Bank Secrecy Act (BSA)Bulletin Board (313) 234-1453
IRS Forms(including Form 4789) (800) 829-3676
IRS Taxpayer ServiceToll-Free (800) 829-1040
LOGON CODES
Each organization is required to use specifiedClient and Office codes in the Accounting Datafield when logging into the CBRS. FederalReserve System staff must first obtain an autho-rizaion code in order to access the CBRS sys-tem. Each Reserve Bank has established a BankSecrecy Act contact to access the CBRS system.Additional requests for logon i.d.’s should bemailed to:
Mr. Richard SmallSpecial CounselBoard of Governors of the Federal ReserveSystemMail Stop 173Washington, D.C. 20551
SPECIAL REQUEST PROCEDURE(REPORTS AND/OR TAPE)
In situations where on-line or download data isinsufficient for your needs, a special report ordata tape may be requested from the DCC.Non-IRS personnel should mail requests to theSpecial Assistant for Financial Enforcement atthe DCC. For Federal Reserve System staff, therequest should be routed through the SpecialCounsel at the Federal Reserve Board.
Internal Revenue Service Currency and Banking Retrieval System 901.0
Bank Secrecy Act Manual September 1997Page 3
Suspicious Activity Report DatabaseSection 902.0
INTRODUCTION
Pursuant to Federal Reserve regulations, allinstitutions supervised by the Federal Reserveare required to report suspicious transactionsusing the Suspicious Activity Report (‘‘SAR’’).The SARs are maintained in a computerizeddatabase that is managed by the Internal Rev-enue Service. All Reserve Banks have on-lineaccess to the SAR database.
REVIEW OF SUSPICIOUSACTIVITY REPORTS
Prior to the start of an examination, the SARdatabase should be reviewed as to all SARsrelated to the financial institution to be exam-ined. This review should be an integral part ofthe examination preparation, as it can providevaluable information to assist in developing theappropriate scope of the review.
SEARCHING THE SARDATABASE
Instructions for accessing the SAR database canbe found in the ‘‘Internal Revenue ServiceUser’s Guide.’’ Additional guidance on the useof the SAR database can be obtained from theBank Secrecy Act coordinator at each ReserveBank.
IDENTIFICATION OFSIGNIFICANT SUSPICIOUSACTIVITY
When suspicious activity involving senior cur-rent or former officials or highly unusual activityis identified, the Board’s Special Investigationsand Examinations Section should be notified at202-452-3168.
FAST TRACK CRIMINALREFERRAL ENFORCEMENTPROGRAM
Effective April 14, 1995, as detailed in theBoard’s supervisory directive SR 95-23, the
Federal Reserve implemented a Fast TrackCriminal Referral1 Enforcement Program (the‘‘Fast Track Program’’) that uses expedited,streamlined enforcement procedures to obtainconsent orders of prohibition from bankingofficials and employees whose cases have beendeclined by law enforcement agencies and havealready admitted to criminal acts involvingamounts up to $100,000. When needed, it willalso be used to seek restitution from theindividuals through consent cease and desistorders. The Fast Track Program also involvesthe expeditious issuance of appropriate noticesin those instances where individuals do notconsent to the orders presented to them. Detailedbelow are the procedures that Federal Reservestaff should follow in utilizing the Fast TrackProgram.
Procedures
1. Each Federal Reserve Bank should review allSARs on an on-going basis and, in connec-tion therewith, should implement the FastTrack Program to identify those SARs wherelaw enforcement agencies have declined toprosecute institution-affiliated parties whohave admitted guilt involving criminal activi-ties with associated losses of less than$100,000.
2. For those SARs involving losses of under$100,000, in which an institution-affiliatedparty has admitted guilt through a signedconfession, an oral admission to a bankingorganization official that is recorded, orotherwise, designated Federal Reserve Bankpersonnel should contact federal law enforce-ment agencies and, where necessary, state orlocal law enforcement agencies, or reconfirmprior contacts, to determine the status of anycriminal investigation or prosecution involv-ing the individual. The Federal Reserve Bankshould ascertain whether the individual hasalready been prosecuted and sentencedthrough a U.S. Attorney’s or state equivalent
1. Effective April 1, 1996, the Criminal Referral Form wasreplaced with the Suspicious Activity Report form.
Bank Secrecy Act Manual September 1997Page 1
‘‘Fast Track’’ system or otherwise,2 whetherthe matter is under active investigation, orwhether the matter has been declined forprosecution.
3. If law enforcement has declined to prosecutethe individual subject to the SAR, the FederalReserve Bank should:a. Gather from the law enforcement agency,
or the banking organization filing theSAR, or both, all appropriate documentsrelated to the SAR, including a copy of thesigned confession, records relating toany admission made to banking officials,and any other pertinent supportingmaterials, such as affidavits and investiga-tory reports;
b. contact the appropriate banking organiza-tion representative to ascertain whetherany civil action has been taken by theorganization against the individual, andwhether the financial institution hasobtained any restitution, either throughthe voluntary cooperation of the indi-vidual or by means of a court judgment;
c. determine the current home address of theindividual, if possible; and
d. determine whether the individual is cur-rently employed by a banking organiza-tion, if possible.
4. When requested information is received andthe Federal Reserve Bank determines withcertainty that the appropriate federal, state, orlocal law enforcement agency will not pros-ecute the institution-affiliated party, desig-nated Federal Reserve Bank personnel shouldmake a determination regarding whether aprohibition order, or cease and desist orderseeking restitution, or a combination of bothshould be pursued under the Fast TrackProgram.
5. In the event a Federal Reserve Bank recom-mends an institution-affiliated party for inclu-sion in the Fast Track Program, it shouldforward to the Board’s Division of BankingSupervision and Regulation’s Deputy Asso-ciate Director responsible for enforcementmatters the following:
a. The completed portion of the Fast TrackProgram checklist3 identified as ‘‘FederalReserve Bank Responsibilities,’’ alongwith a copy of the SAR; and
b. documentation supporting the recom-mendation, such as the signed confession,or a bank’s record of an individual’sadmission.
6. Upon the submission of a Federal ReserveBank’s recommendation and completedchecklist, designated staff of the Division ofBanking Supervision and Regulation, incoordination with the Board’s Legal Divi-sion, will:a. Obtain the necessary approvals of senior
Board staff required for the initiation of anenforcement action using the Fast TrackProgram checklist in the place of a stan-dard ‘‘final approval’’ memorandum;
b. notify the other federal financial institu-tions supervisory agencies regarding theproposed enforcement action under cur-rent interagency notification procedures;
c. in consultation with Federal Reserve Bankstaff, finalize a proposed order, using pre-approved formats, and send it to the indi-vidual for his or her consideration ofentering into the order on a consent basisby means of a cover letter signed by theDeputy Associate Director, which desig-nates an Enforcement Section attorney asthe contact person for discussions regard-ing the consent order;
d. upon receipt of a signed consent order,obtain the necessary senior Board staffapprovals, have the order executed by theBoard’s Secretary, prepare and send allnecessary interagency notification letters,and, in consultation with the Board’s pub-lic information office, prepare an appro-priate press release; and
e. in the event the individual does not agreeto the consensual issuance of an order ofprohibition, or cease and desist order, or acombined order, where necessary, coordi-nate with designated Federal Reserve Bankstaff in order to prepare the appropriatenotice under existing Federal Reserveenforcement procedures.
2. In those cases where an individual has already beenprosecuted and sentenced, Federal Reserve Banks shouldfollow current procedures and ensure that the individualreceives a letter from the Federal Reserve Bank explaining therestrictions and limitations contained in section 19 of theFederal Deposit Insurance Act, as amended (12 U.S.C. 1829).
3. Not included in this Manual. Refer to SR Letter 95-23for a copy of the checklist.
902.0 Suspicious Activity Report Database
September 1997 Bank Secrecy Act ManualPage 2
These are internal procedures for the FederalReserve’s Fast Track Program. They do notcreate or confer any substantive or proceduralrights on third parties, which would be enforce-able, in any manner, in a proceeding of anynature.
QUESTIONS
For questions regarding the use of the SARdatabase you may telephone the Board’s SpecialInvestigations and Examinations Section at202-452-3168.
Suspicious Activity Report Database 902.0
Bank Secrecy Act Manual September 1997Page 3
Federal Reserve Enforcement ActionsSection 903.0
The Federal Reserve supervises the followingentities and has the statutory authority to takeformal enforcement actions against them:
• State member banks• Bank holding companies• Nonbank subsidiaries of bank holding
companies• Edge and agreement corporations• Branches and agencies of foreign banking
organizations operating in the U.S. and theirparent banks
• Officers, directors, employees, and certainother categories of individuals associatied withthe above banks, companies and organizations(referred to as ‘‘institution affiliated parties’’)
Generally, the Federal Reserve takes formalenforcement actions against the above entities
for violations of laws, rules, or regulations,unsafe or unsound practices, breaches of fidu-ciary duty, and violations of final orders. Formalactions include cease and desisit orders, writtenagreements, removal and prohibition orders, andorders assessing civil money penalties. Suchactions can include those for entities who fail todevelop and implement compliance programsdesigned to detect, deter and report suspiciousactivities possibly associated with money laun-dering or to meet other technical reporting andrecordkeeping requirements under the BankSecrecy Act.
For information regarding enforcement actionstaken by the Federal Reserve, the reader mayrefer to the Federal Reserve’s home page at thefollowing address:
http://www.bog.frb.fed.us/boarddocs/enforcement
Bank Secrecy Act Manual September 1997Page 1
FinCEN AdvisoriesSection 904.0
From time to time as deemed necessary, theFinancial Crimes Enforcement Network(‘‘FinCEN’’) will provide advisories to the banks,regulators and the general public concerningmoney laundering matters, trends and patterns,or amendments/clarifications to the BankSecrecy Act. Access to the Fincen home page toobtain the advisories and other information canbe found at the following address:
Federal Reserve Examination Staff is advisedthat any questions regarding a FinCEN mattershould be directed first to the Board’s SpecialInvestigations and Examinations Section at(202) 452-3168.
Bank Secrecy Act Manual September 1997Page 1
Check List to Identify Potential Abuses1001.0
The following is a list of transactions that couldbe considered unusual or suspicious and possi-bly linked to money laundering or other finan-cial crime activities. The list is not intended tobe all inclusive.
MONEY LAUNDERING
• Increase in cash shipments that is not accom-panied by a corresponding increase in thenumber of accounts.
• Cash on hand frequently exceeds limits estab-lished in security program and/or blanketbond coverage.
• Large volume of wire transfers to and fromoffshore banks.
• Large volume of cashier’s checks, moneyorders or travelers checks sold for cash.
• Accounts have a large number of small depos-its and a small number of large checks withthe balance of the account remaining rela-tively low and constant. Account has many ofthe same characteristics as an account used forcheck kiting.
• A large volume of deposits to several differentaccounts with frequent transfers of majorportion of the balance to a single account atthe same bank or at another bank.
• Loans to offshore companies.• A large volume of cashier’s checks or money
orders deposited to an account where thenature of the account holder’s business wouldnot appear to justify such activity.
• Large volume of cash deposits from a busi-ness that is not normally cash intensive.
• Cash deposits to a correspondent bank accountby any means other than through an armoredcarrier.
• Large turnover in large bills or excess of smallbills from bank and demand for large bills bybank which would appear uncharacteristic forthe bank.
• Cash shipments which appear large in com-parison to the dollar volume of currencytransaction reports filed.
• Dollar limits on the list of the bank customersexempt from currency transaction reportingrequirements which appear unreasonably highconsidering the type and location of the busi-ness. No information is in the bank’s files tosupport the limits set.
• Currency transaction reports, when filed, areoften incorrect or lack important information.
• List of exempted customers appears unusuallylong.
• High volume of sequentially numbered trav-eler’s checks or postal money orders addressedto same payee.
OFFSHORE TRANSACTIONS
• Loans made on the strength of a borrower’sfinancial statement reflects major investmentsin and income from businesses incorporated inbank secrecy haven countries.
• Loans to offshore companies.• Loans secured by obligations of offshore
banks.• Transactions involving an offshore ‘‘shell’’
bank whose name may be very similar to thename of a major legitimate institution.
• Frequent wire transfers of funds to and frombank secrecy haven countries.
• Offers of multimillion dollar deposits at belowmarket rates from a confidential source to besent from an offshore bank or somehow guar-anteed by an offshore bank through a letter,telex, or other ‘‘official’’ communication.
• Presence of telex or facsimile equipment in abank where the usual and customary businessactivity would not appear to justify the needfor such equipment.
WIRE TRANSFERS
• Indications of frequent overrides of estab-lished approval authority and other internalcontrols.
• Intentional circumvention of approval author-ity by splitting transactions.
• Wire transfers to and from bank secrecy havencountries.
• Frequent or large wire transfers for personswho have no account relationship with bank.
• In a linked financing situation, a borrower’srequest for immediate wire transfer of loanproceeds to one or more of the banks wherethe funds for the brokered deposits originated.
• Large or frequent wire transfers againstuncollected funds.
Bank Secrecy Act Manual September 1997Page 1
• Wire transfers involving cash where theamount exceeds $10,000.
• Inadequate control of password access.• Customer complaints and/or frequent error
conditions.
LINKED FINANCING/BROKEREDTRANSACTIONS
• Out-of-territory lending.• Loan production used as a basis for officer
bonuses.• Evidence of unsolicited attempts to buy or
recapitalize the bank where there is evidenceof a request for large loans at or about thesame time by persons previously unknown tothe bank. Promise of large dollar deposits mayalso be involved.
• Promise of large dollar deposits in consider-ation for favorable treatment on loan requests.(Deposits are not pledged as collateral for theloans.)
• Brokered deposit transactions where the bro-ker’s fees are paid for from the proceeds ofrelated loans.
• Anytime a bank seriously considers a loanrequest where the bank would have to obtainbrokered deposits to be able to fund the loanshould be viewed with suspicion.
• Solicitation by persons who purportedly haveaccess to multi-millions of dollars, from aconfidential source, readily available for loansand/or deposits in U.S. financial institutions.Rates and terms quoted are usually morefavorable than funds available through normalsources. A substantial fee may be requested inadvance or the solicitor may suggest that thefee be paid at closing but demand compensa-tion for expenses, often exceeding $50,000.
• Prepayment of interest on deposit accountswhere such deposit accounts are used ascollateral for loans.
THIRD PARTY OBLIGATIONS
• Incomplete documentation on guaranties.• Loans secured by obligations of offshore
banks.• Lack of credit information on third party
obligor.
• Financial statements reflect concentrations ofclosely held companies or businesses that lackaudited financial statements to support theirvalue.
CREDIT CARDS ANDELECTRONIC FUNDSTRANSFERS
• Lack of separation of duties between the cardissuing function and issuance of personalidentification number (PIN).
• Poor control of unissued cards and PINs.• Poor control of returned mail.• Customer complaints.• Poor control of credit limit increases.• Poor control of name and address changes.• Frequent malfunction of payment authoriza-
tion system.• Unusual delays in receipt of card and PINs by
the customers.• Bank does not limit amount of cash that a
customer can extract from an ATM in a givenday.
• Evidence that customer credit card purchaseshave been intentionally structured by a mer-chant to keep individual amount below the‘‘floor limit’’ to avoid the need for transactionapproval.
MISCELLANEOUS
• Indications of frequent overrides of internalcontrols or intentional circumvention of bankpolicy.
• Unresolved exceptions or frequently recurringexceptions on exceptions report.
• Out-of-balance conditions.• Purpose of loan is not recorded.• Proceeds of loan are used for a purpose other
than the purpose recorded.• A review of checks paid against uncollected
funds indicates that the customer is offsettingchecks with deposits of the same or similaramount and maintains a relatively constantaccount balance, usually small in relation tothe amount of activity and size of thetransactions.
Section 1001.0 Check List to Identify Potential Abuses
September 1997 Bank Secrecy Act ManualPage 2
Suspicious Activity ReportSection 1002.0
For immediate release February 5, 1996
The Federal Reserve Board today announced a final rule to
simplify the process for reporting suspected crimes and
suspicious activities by banking organizations supervised by the
Federal Reserve.
The final rule is effective April 1, 1996.
The rule was developed by the Federal Reserve, the other
federal banking agencies, and the Financial Crimes Enforcement
Network of the U.S. Department of the Treasury (FinCEN).
The rule significantly reduces reporting burdens, while at
the same time enhancing the ability of law enforcement
authorities to investigate and prosecute criminal offenses
involving our Nation’s financial institutions.
The new suspicious activity reporting rule:
• combines the current criminal referral rules of theFederal Reserve and the other federal banking agencieswith FinCEN’s suspicious activity reportingrequirements relating to money laundering offenses;
• creates a uniform reporting form and instructions--thenew ″Suspicious Activity Report ″ or ″SAR″--for use bybanking organizations to report all violations;
• requires the filing of only one form with FinCEN;
• enables a filer, through computer software that will beprovided by the Federal Reserve to all of the domesticand foreign banking organizations it supervises, toprepare a SAR on a computer and file it by magneticmedia, such as a computer disc or tape;
(more)
Bank Secrecy Act Manual September 1997Page 1
2
• raises the thresholds for mandatory reporting in twocategories and creates a threshold for the reporting ofsuspicious transactions related to money laundering andviolations of the Bank Secrecy Act in order to reducethe reporting burdens of banking organizations; and
• emphasizes recent changes in the law that provide asafe harbor from civil liability to bankingorganizations and their employees for reporting ofknown or suspected criminal offenses or suspiciousactivities.
are being issued by FinCEN, the Office of the Comptroller of the
Currency, the Federal Deposit Insurance Corporation, the Office
of Thrift Supervision, and the National Credit Union
Administration.
The Board’s notice is attached.
-0-
Attachment
1002.0 Suspicious Activity Report
September 1997 Bank Secrecy Act ManualPage 2
FEDERAL RESERVE SYSTEM
12 CFR Parts 208, 211 and 225
[Regulations H, K and Y; Docket No. R-0885]
Membership of State Banking Institutions in the Federal ReserveSystem; International Banking Operations; Bank Holding Companiesand Change in Control; Reports of Suspicious Activity under the
Bank Secrecy Act
AGENCY: Board of Governors of the Federal Reserve System.AGENCY:
ACTION:ACTION: Final Rule.
SUMMARY:SUMMARY: The Board of Governors of the Federal Reserve
System (Board) is amending its regulations on the reporting of
known or suspected criminal and suspicious activities by the
domestic and foreign banking organizations supervised by the
Board. This final rule streamlines reporting requirements by
providing that such an organization file a new Suspicious
Activity Report (SAR) with the Board and the appropriate federal
law enforcement agencies by sending a SAR to the Financial Crimes
Enforcement Network of the Department of the Treasury (FinCEN) to
report a known or suspected criminal offense or a transaction
that it suspects involves money laundering or violates the Bank
Secrecy Act (BSA).
EFFECTIVE DATE: April 1, 1996.EFFECTIVE DATE:
FOR FURTHER INFORMATION CONTACT: Herbert A. Biern, DeputyFOR FURTHER INFORMATION CONTACT:
Associate Director, Division of Banking Supervision and
Regulation, (202) 452-2620, Richard A. Small, Special Counsel,
Division of Banking Supervision and Regulation, (202) 452-5235,
or Mary Frances Monroe, Senior Attorney, Division of Banking
Suspicious Activity Report 1002.0
Bank Secrecy Act Manual September 1997Page 3
2
Supervision and Regulation, (202) 452-5231. For the users of
Telecommunications Devices for the Deaf (TDD) only, contact
Dorothea Thompson, (202) 452-3544, Board of Governors of the
Federal Reserve System, 20th Street and Constitution Avenue,
2. In § 225.4, the heading of paragraph (f) is revised
to read ″Suspicious Activity Report. ″.
3. In § 225.4(f), remove the words ″criminal referral
form ″ and add, in their place, the words ″suspicious activity
report ″.
By order of the Board of Governors of the FederalReserve System, January 30, 1996.
(signed) William W. Wiles
William W. Wiles,Secretary of the Board.
1002.0 Suspicious Activity Report
September 1997 Bank Secrecy Act ManualPage 34
Payable Through AccountsIntroduction Section 1101.0
WHAT IS A PAYABLE THROUGHACCOUNT?
A Payable Through Account (PTA) is a demanddeposit account through which banking entitieslocated in the United States extend check-writing privileges to the customers of a foreignbank. Under this PTA arrangement, a U.S. bank,Edge corporation or the U.S. branch or agencyof a foreign bank (‘‘U.S. banking entities’’),opens a master checking account in the name ofa foreign bank operating outside the UnitedStates.
The master account subsequently is dividedby the foreign bank into ‘‘sub-accounts,’’ eachin the name of one of the foreign bank’scustomers. The foreign bank extends signatureauthority on its master account to its owncustomers. The number of sub-accounts permit-ted under this arrangement is virtually unlim-ited. See Diagram 1.
Deposits into the master account may flowthrough the foreign bank, which pools them fordaily transfer to the U.S. banking entity, or thefunds may flow directly to the U.S. bankingentity for credit to the master account, withfurther credit to the sub-account. Checks encodedwith the foreign bank’s account number, alongwith a numeric code to identify the sub-account,provide sub-account holders with access tothe U.S. payments system. Thus, the PTAmechanism permits the foreign bank operatingoutside the U.S. to offer its customers, thesub-accountholders, U.S. dollar denominatedchecks and ancillary services, which may includethe ability to receive wire transfers and depositsinto the sub-accounts, and to cash checks.
U.S. banking entities may require foreignbanks to execute a contract stipulating that allmatters pertaining to sub-accounts are the soleresponsibility of the foreign bank. Sub-accountrecords are typically maintained by the foreign
Diagram 1
Bank Secrecy Act Manual September 1997Page 1
bank in the foreign jurisdiction in which it ischartered and, for the most part, statements andaccount activity notices are also issued by theforeign bank outside of the United States.
Certain aspects of the PTA arrangement mayprovide opportunities for illicit activities. First,weak licensing laws, promulgated by a prolifer-ating offshore financial services sector and com-pounded by weak or absent bank supervision insome offshore financial centers, have created anenvironment in which access to banking licensesis unencumbered and unregulated.
Second, in the PTA arrangement, the U.S.banking entity may regard the foreign bank asits sole customer. This means that even if theU.S. banking entity has adequate ‘‘know yourcustomer’’ guidelines in place with respect toits own customers, such guidelines may notbe extended to the customers of the foreignbank.
In addition, some U.S. banking entities rou-tinely permit sub-account holders to have cashdeposit and cash withdrawal privileges from theforeign bank’s master account. These activities,especially if they are frequent and involve largeamounts, indicate a potential for abuse, in lightof uncertainty as to the true identity of thesub-account holders. Finally, PTAs used in con-junction with a U.S. office of the foreign bank,such as a representative office or a subsidiary,may enable the foreign bank to, in effect, offerthe same services as a branch without beingsubject to Federal Reserve supervision.
PTAs have been used for many years by creditunions, insurance companies and investmentcompanies. More recently, PTAs have beenmarketed to foreign banks that do not have aU.S. presence as a way to clear U.S. dollardenominated checks through the U.S. paymentssystem. This product has also been offeredunder different names by a variety of bankingentities. Although the most common alternativenames used by banking entities are ‘‘pass-through account’’ or ‘‘pass-by account,’’ thebanking entity may have another name for thisproduct which does not identify it as a PTA. Inthis event, a further check into the foreign bankcorrespondent relationships existing at theexamined institution may be necessary.
BENEFITS AND RISKSASSOCIATED WITH PAYABLETHROUGH ACCOUNTS
The objectives of U.S. banking entities market-ing PTAs, and foreign banks which subscribe tothe PTA service, may vary from situation tosituation. However, there are essentially threebenefits that currently drive provider and userinterest: a) permits U.S. banking entities toattract dollar deposits from the home market offoreign banks without jeopardizing the foreignbank’s relationship with its clients; b) providesfee income potential for both the U.S. PTAprovider and the foreign bank; and, c) theforeign bank can offer its customers efficient andlow cost access to the U.S. payment system.
The safety and soundness risks most likely tobe encountered by U.S. banking entities provid-ing PTA services to foreign banks, in addition tothe possible use of the banking entities in moneylaundering schemes, are ‘‘reputational,’’ withthe potential related loss of business, and thepayment of legal expenses. Violations of theBank Secrecy Act and related statutes, theInternational Emergency Economic Powers Act,and the Trading with the Enemy Act can alsoresult from the PTA arrangement.
CONTRACTUAL AGREEMENTS
There may be a comprehensive written contractagreement between the U.S. banking entityoffering the PTA and the foreign bank thatgoverns their relationship and, among otherthings, the requirements of the account andservices offered, eligible sub-account holders,the accounting and recordkeeping to be doneby both parties, fees, and required minimumbalance, the provision of overdraft lines ofcredit, indemnification for bad checks and losses,and the legal jurisdiction under which disputeswill be resolved. It is important to note that thecontract is between the U.S. banking entity andthe foreign bank. The written agreement shouldbe reviewed as it may provide evidence anddocumentation for the policies and proceduresthat the U.S. banking entity has developed.
1101.0 Payable Through Accounts
September 1997 Bank Secrecy Act ManualPage 2
Payable Through AccountsExamination Procedures Section 1102.0
Y N Comments
1. Review the U.S.-based bank’s deposit ledger anddetermine if the bank offers payable throughaccounts to foreign banks. If so, identify whichbanks and country(s) of origin. If no, do notcomplete this section.
Advisory #1
The Federal Reserve has established guidelinesfor the maintenance of payable through accounts.(See SR 95-10 (SUP), March 3, 1995, Sec-tion 1402.0 of the BSA Examination Manual).The guidelines state that it is inconsistent withthe principles of safe and sound banking forU.S.-based banking entities to offer payablethrough account services without developingand maintaining policies and procedures designedto guard against the possible improper or illegal
use of their payable through account facilities byforeign banks and their customers.
For each payable through account maintainedfor a foreign financial institution, the U.S. bank-ing entity should either: (1) obtain adequateinformation about the ultimate users of thepayable through accounts; (2) be able to rely onthe home country supervisor to require theforeign bank to identify and monitor the trans-actions of its own customers; or (3) ensure thatits payable through account is not being used formoney laundering or other illicit purposes.
Y N Comments
2. Review the contract with the foreign bank. Does thecontract:
a. address procedures for opening sub-accounts?
b. require the master account holder to provide theU.S.-based bank with the true identity of sub-account holders?
c. allow cash transactions by sub-account holderswithin the U.S. borders?
d. require the foreign bank to investigate suspi-cious transactions and report findings to theU.S.-based bank?
e. clearly state the liability of both the U.S.-basedbank and the foreign bank to which the payablethrough service is being offered?
Bank Secrecy Act Manual September 1997Page 1
Y N Comments
f. have approval of personnel with appropriateauthority?
g. have approval of the legal department?
3. Does the U.S.-based bank have an effective systemof internal controls for opening and monitoringpayable through accounts that include written poli-cies and procedures providing for:
a. procedures for opening accounts?
b. operational procedures?
c. staff responsibilities?
d. training?
e. audit?
f. identifying and reporting of unusual or suspi-cious transactions (e.g., money laundering)?
4. Does the U.S.-based bank apply its ‘‘know yourcustomer’’ policy to:
a. payable through accounts
b. sub-account holders?
c. Review documentation to determineeffectiveness.
5. Does the U.S.-based bank prohibit foreign banksfrom openingsub-accounts(second tier) for otherforeign banks, casas de cambios, finance companiesor other financial intermediaries? If not, what pro-cedures are in place for the U.S. bank to understandthe identity of these second-tier sub-accounts hold-ers and the nature of the business transactions (seeDiagram #1 in Section 1101.0)?
6. Does the U.S.-based bank review the listing ofaccount and sub-account holders to ensure that noaccounts have been opened to individuals or busi-nesses located in countries that are prohibited withdoing business with the U.S. and Specially Desig-nated Nationals or Specially Designated NarcoticsTraffickers as determined by the Treasury’s Officeof Foreign Assets Control?
1102.0 Payable Through Accounts
September 1997 Bank Secrecy Act ManualPage 2
Y N Comments
7. Does the U.S.-based bank have written internalcontrols policies to monitor account activity forsuspicious transactions? Determine how monitoringoccurs.
8. Do the foreign banks that maintain the payablethrough relationship properly review and explainsuspicious transactions to the U.S.-based bank?Review and determine if written procedures providefor the explanation of suspicious accounts.
9. Does the U.S.-based bank allow cash transactionsby sub-account holders? If so, does the U.S. bankproperly report CTRs for large cash transactions?
10. Does the U.S.-based bank conduct audits of payablethrough accounts to ensure compliance with thecontract and appropriate laws and regulations? Ifso, note the scope and frequency of the audit.
11. Does the U.S.-based bank conduct audits of theforeign bank, or review in some other way:
a. the procedures of the foreign bank for openingaccounts, to determine if they are consistentwith U.S. requirements?
b. the foreign bank’s monitoring of sub-accountholder activities to detect and report suspiciousor unusual transactions?
12. Does the U.S.-based bank maintain adequate docu-mentary information (i.e. financial statements,licensing confirmation, etc.) regarding the foreignbank?
13. Has the examiner determined, if possible, whetherthe home country supervisor of the foreign bankrequires banks in that jurisdiction to identify andmonitor the transactions of its own customersconsistent with U.S. requirements?
14. Has the U.S.-based bank determined whether thehome country supervisor of the foreign bank requiresbanks in that jurisdiction to identify and monitor thetransactions of its own customers consistent withU.S. requirements?
Payable Through Accounts 1102.0
Bank Secrecy Act Manual September 1997Page 3
Y N Comments
15. After reviewing the responses to procedures1 through 14, above, answer the questions listedbelow:
a. Does the U.S.-based bank obtain adequateinformation about the ultimate users of thepayable through accounts?
b. Is the U.S.-based bank able to rely on the homecountry supervisor to require the foreign bankto identify and monitor the transactions of itsown customers?
c. Can the U.S.-based bank ensure that its payablethrough account is not being used for moneylaundering or other illicit purposes?
Advisory #2
If procedure 15, a, b and c is answered in theaffirmative, you may stop. In the event that theanswer to procedure 15 a, b, or c is in the
negative, Federal Reserve guidelines recom-mend that the U.S.-based banking entity termi-nate the payable through arrangement with theforeign bank as expeditiously as possible.
Y N Comments
16. Has the U.S.-based bank taken steps to terminatethe account relationship as expeditiously as possible?
Advisory #3
In those cases where the U.S.-based institutionfails to take appropriate steps to terminate theaccount relationship, the examiner should so
note this in the ‘‘Examiners Comments andConclusions’’ page of the examination report,and bring the inappropriate practice to the atten-tion of bank management.