Types of Suspicious Activities or Transactions – Financial Intelligence Unit (2024)

Table of Contents
Forms DNFBP FAQ About STR's FAQs
  1. Money Laundering using cash transactions
    1. unusually large cash deposits made by an individual or company whose ostensible business activities would normally be generated by cheques and other instruments;
    2. substantial increases in cash deposits of any individual or business without apparent cause, especially if such deposits are subsequently transferred within a short period out of the account and/or to a destination not normally associated with thecustomer;
    3. customers who deposit cash by means of numerous credit slips so that the total of each deposit is unremarkable, but the total of all the credits is significant;
    4. company accounts whose transactions, both deposits and withdrawals, are denominated by cash rather than the forms of debit and credit normally associated with commercial operations (e.g. cheques, Letters of Credit, Bills of Exchange, etc.);
    5. customers who constantly pay in or deposit cash to cover requests for money transfers, bankers drafts or other negotiable and readily marketable money instruments;
    6. customers who seek to exchange large quantities of low denomination notes for those of higher denomination;
    7. frequent exchange of cash into other currencies;
    8. branches that have a great deal more cash transactions than usual (Head Office statistics detect aberrations in cash transactions);
    9. customers whose deposits contain counterfeit notes or forged instruments;
    10. customers transferring large sums of money to or from overseas locations with instruments for payment in cash; and
    11. large cash deposits using night safe facilities, thereby avoiding direct contact with bank staff.
  2. Money Laundering using bank accounts
    1. customers who wish to maintain a number of trustee or client accounts which do not appear consistent with the type of business, including transactions which involve nominees;
    2. customers who have numerous accounts and pay in amounts of cash to each of them in circ*mstances in which the total of credits would be a large amount;
    3. any individual or company whose account shows virtually no normal personal banking or business related activities, but is used to receive or disburse large sums which have no obvious purpose or relationship to the account holder and/or his business(e.g. a substantial increase in turnover on an account);
    4. reluctance to provide normal information when opening an account, providing minimal or fictitious information or, when applying to open an account, providing information that is difficult or expensive for the institution to verify;
    5. customers who appear to have accounts with several institutions within the same locality, especially when the bank is aware of a regular consolidation process from such accounts prior to a request for onward transmission of the funds;
    6. matching of payments out with credits paid in cash on the same or previous day;
    7. paying in large third party cheques endorsed in favour of the customer;
    8. large cash withdrawals from a previously dormant/inactive account, or from an account which has just received an unexpected large credit from abroad;
    9. customers who together, and simultaneously, use separate tellers to conduct large cash transactions or foreign exchange transactions;
    10. greater use of safe deposit facilities and increased activity by individuals; the use of sealed packets deposited and withdrawn;
    11. companies’ representatives avoiding contact with the branch;
    12. substantial increases in deposits of cash or negotiable instruments by a professional firm or company, using client accounts or in-house company or trust accounts, especially if the deposits are promptly transferred between other client, company and trust accounts;
    13. customers who decline to provide information that in normal circ*mstances would make the customer eligible for credit or for other banking services that would be regarded as valuable;
    14. insufficient use of normal banking facilities (e.g. avoidance of high interest rate facilities for large balances); and
    15. large number of individuals making payments into the same account without an adequate explanation.
  3. Money Laundering using investment related transactions
    1. purchasing of securities to be held by the institution in safe custody, where this does not appear appropriate given the customer’s apparent standing;
    2. request by customers for investment management or administration services (either foreign currency or securities) where the source of the funds is unclear or not consistent with the customer’s apparent standing;
    3. large or unusual settlements of securities in cash form; and
    4. buying and selling of a security with no discernible purpose or in circ*mstances which appear unusual.
  4. Money Laundering by offshore international activity
    1. customer introduced by an overseas branch, affiliate or other bank based in countries where production of drugs or drug trafficking may be prevalent;
    2. use of letters of credit and other methods of trade finance to move money between countries where such trade is not consistent with the customer’s usual business;
    3. building up of large balances, not consistent with the known turnover of the customer’s business, and subsequent transfer to account(s) held overseas;
    4. unexplained electronic fund transfers by customers, foreign currency drafts or other negotiable instruments to be issued;
    5. frequent requests for travelers cheques or foreign currency drafts or other negotiable instruments to be issued; and
    6. frequent paying in of travelers cheques or foreign currency drafts particularly if originating from overseas.
  5. Money Laundering involving financial institution employees and agents
    1. changes in employee characteristics, (e.g. lavish lifestyles or avoiding taking holidays);
    2. changes in employee or agent performance, (e.g. the salesman selling products for cash has remarkable or unexpected increase in performance); and
    3. any dealing with an agent where the identity of the ultimate beneficiary or counterpart is undisclosed, contrary to normal procedure for the type of business concerned.
  6. Money Laundering by secured and unsecured lending
    1. customers who repay problem loans unexpectedly;
    2. request to borrow against assets held by the institution or a third party, where the origin of the assets in not known or the assets are inconsistent with the customer’s standing; and
    3. request by a customer for an institution to provide or arrange finance where the source of the customer’s financial contribution to deal is unclear, particularly where property is involved.
  7. Sales and dealing staff
    1. New Business
      Although long-standing customers may be laundering money through an investment business it is more likely to be a new customer who may use one or more accounts for a short period only and may use false names and fictitious companies.

      Investment may be direct with a local institution or indirect via an intermediary who “doesn’t ask too many awkward questions”, especially (but not only) in a jurisdiction where money laundering is not legislated against or where the rules are not rigorously enforced.

      The following situations will usually give rise to the need for additional enquiries:

      1. a personal client for whom verification of identity proves unusually difficult and who is reluctant to provide details;
      2. a corporate/trust client where there are difficulties and delays in obtaining copies of the accounts or other documents of incorporation;
      3. a client with no discernible reason for using the firm’s service, e.g. clients with distant addresses who could find the same services nearer their home base; clients whose requirements are not in the normal pattern of the firm’s business which could be more easily serviced elsewhere; and
      4. any transaction in which the counterparty to the transaction is unknown
    2. Intermediaries

      There are many clearly legitimate reasons for a client’s use of an intermediary. However, the use of intermediaries does introduce further parties into the transaction thus increasing opacity and, depending on the designation of the account, preserving anonymity. Likewise there are a number of legitimate reasons for dealing via intermediaries on a “numbered account” basis; however, this is also a useful tactic which may be used by the money launderer to delay, obscure or avoid detection.

      Any apparently unnecessary use of an intermediary in the transaction should give rise to further enquiry.

    3. Dealing patterns & abnormal transactions

      The aim of the money launderer is to introduce as many layers as possible. This means that the money will pass through a number of sources and through a number of different persons or entities. Long-standing and apparently legitimate customer accounts may be used to launder money innocently, as a favour, or due to the exercise of undue pressure.

      Examples of unusual dealing patterns and abnormal transactions may be as follows:

      • Dealing patterns
        1. A large number of security transactions across a number of jurisdictions;
        2. Transactions not in keeping with the investor’s normal activity, the financial markets in which the investor is active and the business which the investor operates;
        3. Buying and selling of a security with no discernible purpose or in circ*mstances which appear unusual, e.g. churning at the client’s request;
        4. Low grade securities purchased in an overseas jurisdiction, sold locally and high grade securities purchased with the proceeds; and
        5. Bearer securities held outside a recognized custodial system.
      • Abnormal transactions
        1. a number of transactions by the same counter-party in small amounts of the same security, each purchased for cash and then sold in one transaction, the proceeds being credited to an account different from the original account;
        2. any transaction in which the nature, size or frequency appears unusual, e.g. early termination of packaged products at a loss due to front end loading; early cancellation, especially where cash had been tendered or therefund cheque is to a third party;
        3. transfer of investments to apparently unrelated third parties;
        4. transactions not in keeping with normal practice in the market to which they relate, e.g. with reference to market size and frequency, or at off-market prices; and
        5. other transactions linked to the transaction in question which could be designed to disguise money and divert it into other forms or to other destinations or beneficiaries.
  8. Settlements
    1. Payment
      Money launderers will often have substantial amounts of cash to dispose of and will use a variety of sources. Cash settlement through an independent financial adviser or broker may not in itself be suspicious; however, large or unusual settlements of securities deals in cash and settlements in cash to a large securities house will usually provide cause for further enquiry. Examples of unusual payment settlement may be as follows:
      1. a number of transactions by the same counter-party in small amounts of the same security, each purchased for cash and then sold in one transaction;
      2. large transaction settlement by cash; and
      3. payment by way of cheque or money transfer where there is a variation between the account holder/signatory and the customer.
    2. Registration and delivery
      Settlement by registration of securities in the name of an unverified third party should always prompt further enquiry.

      Bearer securities, held outside a recognized custodial system, are extremely portable and anonymous instruments which may serve the purposes of the money launderer well. Their presentation in settlement or as collateral should therefore alwaysprompt further enquiry as should the following:

      1. settlement to be made by way of bearer securities from outside a recognized clearing system; and
      2. allotment letters for new issues in the name of persons other than the client.
    3. Disposition
      As previously stated, the aim of money launderers it to take “dirty” cash and turn it into “clean” spendable money or to pay for further shipments of drugs, etc. Many of those at the root of the underlying crime will be seeking to remove the money from the jurisdiction in which the cash has been received, with a view to its being received by those criminal elements for whom it is ultimately destined in a manner which cannot easily be traced.

      The following situations should therefore give rise to further enquiries:

      1. payment to a third party without any apparent connection with the investor;
      2. settlement either by registration or delivery of securities to be made to an unverified third party; and
      3. abnormal settlement instructions, including payment to apparently unconnected parties.
  9. Company Formation and Management
    1. Suspicious circ*mstances relating to the customer’s behavior:
      1. the purchase of companies which have no obvious commercial purpose;
      2. sales invoice totals exceeding known value of goods;
      3. customers who appear uninterested in legitimate tax avoidance schemes;
      4. the customer pays over the odds or sells at an undervaluation;
      5. the customer makes unusually large cash payments in relation to business activities which would normally be paid by cheques, banker’s drafts etc;
      6. customers transferring large sums of money to or from overseas locations with instructions for payment in cash;
      7. customers who have numerous bank accounts and pay amounts of cash into all those accounts which, if taken in total, amount to a large overall sum; and
      8. paying into bank accounts large third party cheques endorsed in favour of the customers.
    2. Potentially suspicious secrecy might involve
      1. excessive or unnecessary use of nominees;
      2. sales invoice totals exceeding known value of goods;
      3. performing “execution only” transactions;
      4. using a client account rather than paying for things directly;
      5. use of mailing address;
      6. unwillingness to disclose the source of funds; and
      7. unwillingness to disclose identity of ultimate beneficial owners.
    3. Suspicious circ*mstances in groups of companies:
      1. subsidiaries which have no apparent purpose;
      2. companies which continuously make substantial losses;
      3. complex group structures without cause;
      4. uneconomic group structures for tax purposes;
      5. frequent changes in shareholders and directors;
      6. unexplained transfers of significant sums through several bank accounts; and
      7. use of bank accounts in several currencies without reason.

Notes:

  1. None of the above factors on their own necessarily mean that a customer or other person is involved in money laundering. However, it may be that a combination of some of these factors could raise suspicions.
  2. What does or does not give rise to a suspicion will depend on the particular circ*mstances.

Forms

DNFBP FAQ

About STR's

Types of Suspicious Activities or Transactions – Financial Intelligence Unit (2024)

FAQs

Types of Suspicious Activities or Transactions – Financial Intelligence Unit? ›

Suspicious transactions are any event within a financial institution that could be possibly related to fraud, money laundering, terrorist financing, or other illegal activities.

Which of the following answers is the best definition of a suspicious transaction? ›

Suspicious transactions are any event within a financial institution that could be possibly related to fraud, money laundering, terrorist financing, or other illegal activities.

What type of transactions may be reported as suspicious? ›

Suspicious activity is any conducted or attempted transaction or pattern of transactions that you know, suspect or have reason to suspect meets any of the following conditions: 1 Involves money from criminal activity. 1 Is designed to evade Bank Secrecy Act requirements, whether through structuring or other means.

Which of the following transactions could be a suspicious transaction? ›

transactions that don't match the customer profile. high volumes of transactions being made in a short period of time. depositing large amounts of cash into company accounts. depositing multiple cheques into one bank account.

How many types of STR are there? ›

There are two types of STRs which can be reported by the reporting entities on goAML i.e. STR-A (Activity based STR, i.e. adverse media news, attempted transaction, etc) and STR-F (Transaction based STR, i.e. high volume of cash transactions, transactions inconsistent with profile, etc).

What is an example of suspicious activity? ›

Carrying property at an unusual hour or location, especially if they are attempting to hide the item. Using binoculars or other devices to peer into apartment and home windows. Driving a vehicle slowly and aimlessly around campus. Sitting in a vehicle for extended periods of time or conducting transactions from a ...

How do you identify a suspicious transaction report answer? ›

Identifying suspicious transactions often involves looking for certain red flags. These indicators can vary widely but typically include: Unusual Transaction Size or Frequency: Transactions that are unusually large or frequent compared to the customer's usual activity.

What is a suspicious activity report FinCEN? ›

1. Introduction. The purpose of the Suspicious Activity Report (SAR) is to report known or suspected violations of law or suspicious activity observed by financial institutions subject to the regulations of the Bank Secrecy Act (BSA).

What triggers a suspicious activity report? ›

In the United States, financial institutions must file a SAR if they suspect that an employee or customer has engaged in insider trading activity. A SAR is also required if a financial institution detects evidence of computer hacking or of a consumer operating an unlicensed money services business.

Which of the following is a red flag for suspicious transactions? ›

Frequent cross-border flow of transactions, especially with high-risk countries. A large amount of cash deposited in smaller portions. A large amount of cash deposited in an account at once. Payment received in account, not matched with goods shipped or trade-based money laundering.

How do banks identify suspicious activity? ›

Banks leverage sophisticated rule-based detection systems that monitor transaction patterns and flag anomalies. These systems analyze factors such as transaction frequency, amount, and geographical location, comparing them against established customer profiles and historical data.

What amount of money triggers a suspicious activity report? ›

Dollar Amount Thresholds – Banks are required to file a SAR in the following circ*mstances: insider abuse involving any amount; transactions aggregating $5,000 or more where a suspect can be identified; transactions aggregating $25,000 or more regardless of potential suspects; and transactions aggregating $5,000 or ...

What is unusual or suspicious activity? ›

Suspicious activity can refer to any incident, event, individual or activity that seems unusual or out of place. Some common examples of suspicious activities include: A stranger loitering in your neighborhood or a vehicle cruising the streets repeatedly. Someone peering into cars or windows.

What are the three types of STR? ›

Simple STRs: only show variation in the number of repeats without additional sequence variation. Compound STRs: consist of several adjacent repeats of the same repeat unit length. Complex STRs: contain repeats of variable length as well as sequences.

How do you identify a STR? ›

Check if a variable is a string using isinstance()

This isinstance(x, str) method can be used to test whether any variable is a particular datatype. By giving the second argument as “str”, we can check if the variable we pass is a string or not.

How to identify a suspicious person? ›

6 Potentially Suspicious Behavior Cues to Watch For
  1. Avoiding Eye Contact. Furtive behavior can be a sign of suspicious or deceptive behavior. ...
  2. Nervousness & Suspicious Activity. ...
  3. Excessive Perspiration. ...
  4. Suspicious Activity at the Exit or Entrance. ...
  5. Unusual Body Language. ...
  6. Excessive Questions.
Jun 1, 2023

What is the meaning of suspicious transaction? ›

According to Article 27 (1) of the Regulation on Measures regarding Prevention of Laundering Proceeds of Crime and Financing of Terrorism, suspicious transaction is the case where there is any information, suspicion or reasonable grounds to suspect that the asset, which is subject to the transactions carried out or ...

What is called suspicious transaction? ›

Suspicious transactions are financial activities that raise doubts due to their unusual nature. It also involves the potential to involve illegal or illicit activities. As a customer, this includes unauthorised debits from your bank account.

What does suspicious transaction refer to a transaction? ›

Suspicious Transaction” refers to a transaction, regardless of amount, where any of the following circ*mstances exists: 1. there is no underlying legal or trade obligation, purpose or economic justification; 2.

What is a suspicious transaction also called? ›

A suspicious transaction report (STR) is generally considered an interchangeable term with suspicious activity report (SAR), as both terms refer to the mandatory form that financial institutions must file with the Financial Crimes Enforcement Network (FinCEN) whenever there is a suspected case of money laundering or ...

Top Articles
Latest Posts
Article information

Author: Tish Haag

Last Updated:

Views: 5998

Rating: 4.7 / 5 (67 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Tish Haag

Birthday: 1999-11-18

Address: 30256 Tara Expressway, Kutchburgh, VT 92892-0078

Phone: +4215847628708

Job: Internal Consulting Engineer

Hobby: Roller skating, Roller skating, Kayaking, Flying, Graffiti, Ghost hunting, scrapbook

Introduction: My name is Tish Haag, I am a excited, delightful, curious, beautiful, agreeable, enchanting, fancy person who loves writing and wants to share my knowledge and understanding with you.