Bank Processes
In addition to normal AML controls, banks must focus on the CFT angle with renewed vigor and knowledge derived from the extensive databank of case studies now available. Banks must focus on not just name matching with sanctions databases but also with other know your customer (KYC) high-risk databases of good third party vendors. They must use technologies like link analysis to establish second and third level links that identify transactions as potentially suspicious from a CFT perspective. Focus on preventing identity theft is an integral part of any CFT program. Detection rules designed to capture the suspicious activity list given above, should be evaluated. Controls out of the transaction monitoring process, for example, account openings by groups of individuals, are also important to watch for. Any bank that is used for terrorism financing will suffer tremendous reputational damage and also a real business impact in terms of share price and expensive fines. To safeguard against this, financial institutions purchase anti-money laundering software from companies such as Lexis Nexis and C6 along with databases of high risk individuals and organizations developed by companies such as WorldCompliance and C6.
Read more about this topic: Terrorism Financing
Famous quotes containing the words bank and/or processes:
“on a May morwening upon Malverne hilles
Me befel a ferly, of fairye me thoughte;
I was wery ofwandred and wente me to reste
Under a brod bank by a bournes side;
And as I lay and lenede and lookede on the watres,
I slomerede into a sleeping, it swyede so merye.”
—William Langland (13301400)
“It has become a peoples war, and peoples of all sorts and races, of every degree of power and variety of fortune, are involved in its sweeping processes of change and settlement.”
—Woodrow Wilson (18561924)