Tools And Resources

Practical resources to help compliance professionals stay ahead.

  • AI Risk Evaluation Worksheet – Questions to ask when vetting AI tools for compliance

    A worksheet to evaluate tools for compliance, covering data, risk, regulations, and vendor controls.

  • Alert Tuning Cheat Sheet for AML Compliance

    A guide to adjust AML alerts, set thresholds, track customer behavior, and focus on high-risk transactions.

  • AML Basics - Enforcement Action Case Studies AML Compliance Culture

    Case studies highlighting how weak AML culture, poor oversight, and ignored risks lead to major enforcement actions.

  • AML Red Flags Cheat Sheet

    A concise guide outlining common AML red flags by role and when to escalate suspicious activity internally.

  • CaseStudy - New fintech product launch

    A structured guide to assess and manage fraud risks throughout a fintech product launch, from planning to post-launch monitoring.

  • Crypto and AML Risks and Compliance Essentials - Case study - mixer and darknet tracing example

    A case study showing how stolen cryptocurrency moved through mixers and darknet wallets, highlighting tracing and compliance reporting strategies.

  • Crypto KYC Comparison Table – How Crypto Onboarding Differs from Traditional Finance

    A comparison of crypto and traditional finance KYC processes, highlighting differences in verification, monitoring, and regulatory requirements.

  • Crypto Risk Typology Cheat Sheet

    A cheat sheet outlining common cryptocurrency laundering patterns and red flags to identify suspicious wallet and transaction activity.

  • Detecting Fraud in Digital Payments - Roleplay exercise suspicious P2P transfers

    A scenario-based exercise for identifying and responding to suspicious P2P payment activity, highlighting red flags and escalation steps.

  • Financial Investigator Log Worksheet

    A structured worksheet for tracking investigations, documenting transactions, evidence, risk indicators, and follow-up actions systematically.

  • Fraud Detection Red Flag Reference Guide

    A reference guide listing common red flags across identity theft, romance scams, money mule networks, and elder fraud cases.

  • Fraud escalation email template

    A template for escalating suspected fraud via email, detailing suspicious activity, actions taken, and requesting immediate investigation.

  • Fraud Investigations Case Study and Roleplay

    A roleplay-based case study for practicing fraud detection, handling suspicious activity, and following proper escalation procedures.

  • Fraud Pattern Recognition Guide - Examples of Synthetic ID, Mule Behavior, and Scam Signals

    A guide identifying patterns and red flags for synthetic identity fraud, money mule activity, and various scam behaviors.

  • Fraud Red Flag Reference Card

    A quick reference card outlining common fraud types, behavioral and transaction red flags, and steps for immediate escalation.

  • Fraud Risk Assessment Fundamentals Control Evaluation Checklist

    A control evaluation table outlining objectives, methods, responsible teams, and status for monitoring transactions, security, and fraud prevention.

  • Investigating Suspicious Transactions - Case-based alert simulations

    Simulated case studies for investigating suspicious transactions, helping compliance teams identify red flags and assess potential money laundering activity.

  • Investigating Suspicious Transactions - Sample SAR Narrative

    Guidelines for drafting a clear, detailed SAR narrative, documenting suspicious transactions and supporting evidence for regulatory reporting.

  • Money Laundering Stage - Placement-Patterns Checklist

    Checklist of suspicious fund placement patterns, highlighting cash, crypto, shell companies, and rapid movements for AML detection.

  • Money Laundering Stages - Case Study Layering Through Crypto and Real Estate

    Illustrates how criminals launder money through crypto and real estate, highlighting placement, layering, integration, and red flags.

  • MSB enforcement case studies

    Highlights MSB compliance failures at Western Union and MoneyGram, showing the need for enforced AML programs and continuous monitoring.

  • OFAC Sanctions Compliance FAQ Guide

    Summarizes OFAC sanctions rules, compliance requirements, screening procedures, red flags, and steps for handling potential violations.

  • OSINT Tool Guide for Investigating Suspicious Transactions

    Lists OSINT tools and methods to verify identities, investigate suspicious transactions, and gather publicly available evidence for investigations.

  • Payments Exception Handling Matrix Matrix for ACH, RTP, and FedNow transactions

    Outlines common ACH, RTP, and FedNow payment exceptions, causes, compliance considerations, and recommended resolution steps.

  • Red Flags by Product Type Chart

    Identifies common red flags and risks across financial products to guide monitoring and detect potential fraud or money laundering.

  • Risk Rating Template

    Assesses customer risk by scoring transaction volume, source, KYC status, and account type to determine overall risk tier.

  • Sanctions Compliance Case Study

    Analyzes scenarios to identify and escalate potential OFAC sanctions violations, emphasizing proper due diligence and internal controls.

  • SAR Writing Checklist - What to Include and Avoid

    Provides a structured checklist for writing clear, factual, and compliant SAR narratives while avoiding speculation or subjective language.

  • Step-by-Step Guide for Screening Crypto Wallets and Counterparties

    Outlines a step-by-step process for screening crypto wallets and counterparties to identify sanctions risks and ensure compliance.

  • Suspicious Activity Report (SAR) Red Flag Reference Guide

    Lists common red flags in financial transactions indicating suspicious activity, aiding detection of fraud, money laundering, or AML breaches.

  • Suspicious Activity Report (SARs) Internal Report Writing Exercise

    Guides staff to document and report structured or unusual account activity objectively for internal compliance review and monitoring.

  • Third-Party Risk Assessment Template

    Provides a structured framework to assess, monitor, and mitigate operational, compliance, financial, and cybersecurity risks of vendors.

  • Training Retention Tips for Managers – How to reinforce learning post-session

    Guides managers on reinforcing employee training through follow-ups, practical application, peer discussions, and performance tracking for retention.

  • Transaction Monitoring Building Effective Rules and Scenarios - Sample rule writing templates

    Provides templates for setting transaction monitoring rules to detect suspicious activity, including cash deposits, crypto, and structuring patterns.