Course Summary

This foundation course will provide you with real-life case studies and introduce you to the principles underpinning financial crime prevention.

In addition, it will enable you to understand the risks unique to cryptoassets.

This course will help you to understand:
• How money laundering, fraud, and tax evasion happen in cryptoassets
• How to spot financial crime risks and red flags specific to cryptoassets
• How risk is controlled and managed across key compliance measures and functions
• How to identify which customer information is relevant and important for cryptoassets
• The process for identifying, researching, and reporting unusual and suspicious customer activity

Graduates of this course will be able to identify and mitigate common methods of financial crime linked to cryptoassets, and will be prepared to progress onto the specialist CCAS certification.

Course Content:
1. What is financial crime?
Introduction
• Introductory case video
• What would you do?
• Feedback
• Learning objectives

Types of financial crime
• What is financial crime?
• Money laundering
• Money laundering (Case example)
• Money laundering for cryptoasset (Case example)
• Terrorist financing
• Detecting terrorist financing (Case example)
• Sanctions evasion
• Sanctions evasion (Case example)
• Fraud
• Fraud (Case example: Voice phishing)
• Fraud in cryptoasset (Case example)
• Bribery and corruption
• Bribery and corruption (Case example)
• Tax avoidance versus tax evasion
• Tax avoidance versus tax evasion (Case example)
• Tax avoidance versus tax evasion in cryptoasset (Case example)
• Cybercrime
• Cybercrime (Case example) Review
• Review questions

2. Financial crime risk
What is risk?
• Types of risk: Regulatory, legal, financial, reputational
• International regulations and guidance
• Categories of risk: Customer, jurisdiction, product, channel

Customer risk
• Customer risk and red flags
• Beneficial ownership
• Ultimate beneficial ownership
• Politically exposed person risk and red flags
• Shell company risk and red flags
• Cash-intensive business risk and red flags

Jurisdiction risk
• Jurisdiction risk and red flags
• Jurisdiction risk and red flags (Case example)

Product risk
• Product risk and red flags
• Charity and NGO risk and red flags
• Trade finance risk and red flags
• Cryptoasset risk and red flags

Channel risk
• Channel risk and red flags
• Electronic transfer of funds risk and red flags
• Remote deposit capture risk and red flags

Risks specific to your business
• Dark markets risk and red flags
• Dark markets risk and red flags (Case example) Mixers and tumblers risk and red flags
• Mixers and tumblers risk and red flags (Case example)
• Cryptoasset and gaming risk and red flags
• Cryptoasset sanctions indirect risk and red flags

Review
• Review questions

3. Controlling risk
Risk-based approach
• Risk-based approach to business
• Controlling risk
• Residual risk equation

Know your role in compliance
• Three lines of defense industry
• Risk-based escalation
• Independence of the second line
• Role of the money laundering reporting officer
• Audit as the third line of defense
• The three phases of customer research

Know your customer
• KYC is intended to manage risk
• KYC is intended to manage risk (Case example)
Transaction monitoring
• Transaction monitoring is intended to manage risk
• Transaction monitoring process
• Transaction monitoring (Case example)

Sanctions compliance
• Regulations related to sanctions compliance
• Internet search: Sanctions screening • Transaction monitoring versus name screening
• Sanctions (Case example)

Review
• Review questions

4. Research and reporting
Research process
• Investigative mindset
• Four research steps
• Levels of due diligence
• CDD for a natural person
• CDD for a legal person

Information sources
• Criteria for selecting standard customer research sources for cryptoasset
• If you need more information
• Tipping off

Organizing what you learn
• How much research is reasonably enough?
• Following organization-specific policies and procedures
• Filter what customer information is relevant and important for cryptoasset
• Data security and privacy
• Documenting your research
• Customer profile structure and format

Your obligation
• Duty to report
• Suspicious activity escalation process

How your organization might act
• What is a suspicious activity report?
• Who writes a SAR in your organization?

Transaction monitoring and ongoing reviews
• Maintaining an account after unusual activity
• Refusing or terminating a customer

Review
• Review questions

There are no prerequisites to this course.

Pass a 20-question final assessment to receive your certificate.

Following your booking, a confirmation message will be sent to all participants, ensuring you're well-informed of your successful enrollment. Calendar placeholders will also be dispatched to assist you in scheduling your commitments around the course. Rest assured, all course materials and access to necessary labs or platforms will be provided no later than one week before the course begins, allowing you ample time to prepare and engage fully with the learning experience ahead.

Our comprehensive training package includes all the necessary materials and resources to facilitate a full learning experience. Enrollees will be provided with detailed course content, encompassing a wide array of topics to ensure a thorough understanding of the subject matter. Additionally, participants will receive a certificate of completion to recognize their dedication and hard work. It's important to note that while the course fee covers all training materials and experiences, the examination fee for certification is not included but can be purchased separately.

Questions About This Course?