Aml Transaction Moni
Aml Transaction Moni
END-TO-END
AML COMPLIANCE
Introduction
Transaction monitoring
2
Collectively, AML regulations and their different components have resulted in specializations and silos.
There are often separate teams that oversee their own piece of the AML puzzle, each managing different
software programs and implementing their own sets of processes. Unfortunately, this has led to operational
inefficiencies where data is lost and threats are not properly identified.
Additionally, firms face huge challenges with tuning their compliance rules. Tight thresholds can drown your
compliance teams with way too many false positives, while loose thresholds can allow nefarious activity to
go undetected. The challenge is to find the right balance, and there is no single right answer. Regulators
have made it clear that compliance departments must be adequately staffed to address the resulting case
volume, and it is not acceptable to simply relax thresholds to meet compliance staffing constraints.
3
AML Challenges of Fintechs AML Fines
and Marketplaces by the Numbers
SEB
$107 million
Repeating the Same
Mistakes Commerzbank
£ 37.8 million
Failures in compliance processes cause firms to face
heavy penalties. Yet AML fines continue to rise each
year because many financial institutions continue to
make the same mistakes. Guotai Junan Securities
4
The most recent penalties stem from compliance
Key AML Failings
lapses highlighted since 2015, including insufficient due
diligence on new clients, improper management of AML
programs, poor transaction monitoring and a failure to In their Global Enforcement Review
ensure adherence to the rules. (August 2020), global advisory firm Duff
& Phelps highlighted the four key AML
Financial institutions face strict regulatory scrutiny failings from 2015-2020 that regulators
due to their frequent use by money launderers. They across the world have consistently
need to comply with a regulatory landscape that is in identified through the fines they
a constant state of change. Non-compliance can lead imposed:
to hefty fines, criminal proceedings and sanctions.
Unfortunately, many firms keep making the same
compliance mistakes and struggle to meet their
regulatory obligations despite the repeated messages
in these enforcement cases. The enduring problems KYC/customer
due diligence
115
reflect a lack of resourcing and the reliance on legacy significant cases
systems that can’t keep up with the changing trends in
financial crimes.
AML
management
109
cases
Suspicious
activity 82
monitoring cases
Compliance
monitoring 62
and oversight cases
5
Know Your Customer
What is Know Your Customer?
Know Your Customer (KYC) is the process of gathering data, verifying the identity and understanding the
risks associated with doing business with a particular customer. In practice, this means obtaining key
customer data such as name, address, date of birth and an official document with their photograph that
confirms their identity. They must also be screened to ensure that they are not on any sanctions lists and
are not a politically exposed person (PEP). KYC also encompasses customer due diligence (CDD), which is
the process of assessing the risk both during the onboarding process and on an ongoing basis.
Key Ingredients
At the heart of KYC are three processes designed to thwart the growing threat of money laundering:
According to Gartner, identity proofing describes a set of tools that provide confidence in
the genuine presence of the identity owner. For example, requiring an online user to take
a photo of their government-issued ID and a corroborating selfie (with some embedded
liveness checks to ensure the person is physically present) qualifies as identity proofing.
Identity
Unfortunately, many regulated institutions still rely exclusively on data-centric methods
Proofing
(e.g., pinging a credit bureau) that do not provide the same level of identity assurance.
Financial institutions and fintechs must check their customers against global/regional
watchlists for sanctions, PEPs and adverse media. Often this step is performed when
a new user creates an account, at which point the individual is screened. Regulated
Screening companies also need to stay on top of changes in risk status of existing customers. This
means being alerted if any of your existing customers end up on a watchlist.
With the growing sophistication of money laundering schemes, a robust risk scoring
framework is required to effectively capture customer risk — not just during onboarding
but on a continuous, dynamic basis. Unfortunately, a one-size-fits-all approach no
longer makes sense. Firms must develop risk scores for various customer categories
Risk (e.g., individuals, corporations, government bodies), as every customer type has different
Scoring risk parameters. For example, the source of wealth and nationality would be risk factors
for an individual customer whereas the ownership pattern and products offered would
contribute to a corporation’s risk score.
6
How KYC Works
Is the ID document Is the person holding Is the person holding Jumio instantly
authentic and valid? the ID the same person the ID physically delivers a definitive yes
shown in the ID photo? present during the or no answer.
transaction?
“By 2022,
80%
of organizations will be using document-
centric identity proofing as part of their
onboarding workflows, which is an
increase from approximately 30% today.”
7
Transaction Monitoring
What is Trandsaction Monitoring?
How it Works
An advanced AML transaction monitoring solution will create a profile of each customer’s financial habits
and history and then track transactions to identify patterns and trends. It looks for anomalies or deviations
in transaction types, amounts, frequencies and more. When the solution discovers suspicious activity, it
sends an alert so that the financial institution can take the necessary steps.
Over time, the system can refine customer profiles using their ongoing transactions and other financial
activity. This allows suspicious activity to be flagged faster and more effectively.
8
AML Compliance is Moving to the Cloud
9
Key Ingredients of Transaction Monitoring
Legacy systems based on static rules can only identify the most basic money laundering
vectors. Modern AML detection incorporates machine learning to analyze vast amounts of
data and adaptively search for subtle trends and patterns. Another way to improve detection
Advanced
is to establish different rules or thresholds for various populations based on factors such as
Detection
risk level, geography or account type.
One issue for both regulators and regulated institutions is excessive volumes of false
positive activity alerts. False positives can undermine the efficiency and efficacy of a
compliance program, and they can erroneously disguise actual illegitimate activity. The
Reducing more modern approach leverages machine learning algorithms to learn from the results
False of every investigation. This allows the system to identify ways to improve detection, such
Positives as adjusting a threshold or adding an additional data factor, so your detection models
constantly improve.
Advanced solutions allow firms to embed their own data sets in the transaction
monitoring solution and leverage online sources like social media to enrich the data and
flag suspicious activity. For example, if a customer is applying for a loan, it’s prudent to
ensure that the loan amount isn’t greater than the value of the home, that the customer’s
stated income is typical for their profession and that their stated profession matches
Data
their social media profiles. Regulated institutions also routinely integrate with third-
Enrichment
party services that specialize in identity verification through various channels, such as a
customer’s device settings and geolocation, to give analysts all the information needed to
satisfy KYC requirements.
10
Case Management
What is Case Management?
How it Works
The detection rules in an AML system flag all the suspicious transactions that meet specific criteria. The
system then groups those transactions into a case. Case management involves these three basic steps:
The system provides the analyst with all the relevant information about the suspicious
activity. The analyst can review this data and drill down to view related data and
Case historical activity that might provide additional context. This enables the analyst to gain a
Analysis comprehensive understanding of the suspicious activity.
The analyst records their findings by adding notes, attaching supporting documents and
recommending the next steps. A workflow is often utilized to ensure a consistent process
Investigations is followed across the organization, which may include escalating to a manager for further
review.
11
Key Ingredients of Case Management
An integrated case management solution enables compliance teams to efficiently conduct and document
investigations. Advanced solutions offer highly configurable capabilities, provide flexible case management
workflows, create defensible audit trails, streamline regulatory filings and, most importantly, reduce the risk of
money laundering. They should also include the following:
Consolidated View
FinCEN has made some improvements to the SAR form in recent years, but it’s still a challenge to fill out
correctly and consistently, and the narrative is notoriously difficult to write. Modern case management
systems pre-populate the forms and electronically file them with a regulator. The capability to file the SAR
directly with FinCEN saves your team a lot of time and hassle while helping to ensure your reports adhere to
FinCEN’s strict requirements.
12
End-to-End Compliance
Up until now, fintechs, banks and credit unions, broker-dealers, lenders, cryptocurrency providers,
marketplaces and other regulated organizations have had to cobble together several different point
solutions — sometimes 10 to 20 of them — to combat financial crime and meet compliance mandates.
But in September 2020, Jumio acquired Beam Solutions’ AML platform, creating the first end-to-end
identity verification and compliance solution. Now, firms can use Jumio’s KYX Platform to manage
compliance throughout the entire customer journey, from onboarding to ongoing customer due diligence,
transaction monitoring, case management and reporting.
13
The Solution: Jumio’s KYX Platform
The engine behind Jumio Organizations often utilize Beam’s detection engine
KYX Platform includes a number of identity analyzes vast amount
a number of interwoven services to increase of financial data and
features, including an the level of identity adaptively searches for
award-winning UX, state- assurance and answer the suspicious activity and
of-the-art AI/ML, custom fundumental questions: is trends. It uses machine
workflows, global coverage the user who they claim to learning to significantly
and bank-grade security. be online and is it safe to reduce false positives and
start doing business with yields higher catch rates.
them?
As both financial crimes and regulations have evolved, the task of compliance has become a massive
burden. With the advent of Jumio’s KYX Platform and the dawn of end-to-end compliance, firms can now
leverage the very best compliance solutions in a unified, secure platform.
14
About Jumio
jumio.com
15