Bank Processes
In addition to normal AML controls, banks must focus on the CFT angle with renewed vigor and knowledge derived from the extensive databank of case studies now available. Banks must focus on not just name matching with sanctions databases but also with other know your customer (KYC) high-risk databases of good third party vendors. They must use technologies like link analysis to establish second and third level links that identify transactions as potentially suspicious from a CFT perspective. Focus on preventing identity theft is an integral part of any CFT program. Detection rules designed to capture the suspicious activity list given above, should be evaluated. Controls out of the transaction monitoring process, for example, account openings by groups of individuals, are also important to watch for. Any bank that is used for terrorism financing will suffer tremendous reputational damage and also a real business impact in terms of share price and expensive fines. To safeguard against this, financial institutions purchase anti-money laundering software from companies such as Lexis Nexis and C6 along with databases of high risk individuals and organizations developed by companies such as WorldCompliance and C6.
Read more about this topic: Terrorism Financing
Famous quotes containing the words bank and/or processes:
“Life is a long Dardenelles, My Dear Madam, the shores whereof are bright with flowers, which we want to pluck, but the bank is too high; & so we float on & on, hoping to come to a landing-place at lastbut swoop! we launch into the great sea! Yet the geographers say, even then we must not despair, because across the great sea, however desolate & vacant it may look, lie all Persia & the delicious lands roundabout Damascus.”
—Herman Melville (18191891)
“Our bodies are shaped to bear children, and our lives are a working out of the processes of creation. All our ambitions and intelligence are beside that great elemental point.”
—Phyllis McGinley (19051978)