Tools And Resources
Practical resources to help compliance professionals stay ahead.
-

AI Risk Evaluation Worksheet – Questions to ask when vetting AI tools for compliance
A worksheet to evaluate tools for compliance, covering data, risk, regulations, and vendor controls.
-

Alert Tuning Cheat Sheet for AML Compliance
A guide to adjust AML alerts, set thresholds, track customer behavior, and focus on high-risk transactions.
-

AML Basics - Enforcement Action Case Studies AML Compliance Culture
Case studies highlighting how weak AML culture, poor oversight, and ignored risks lead to major enforcement actions.
-

AML Red Flags Cheat Sheet
A concise guide outlining common AML red flags by role and when to escalate suspicious activity internally.
-

CaseStudy - New fintech product launch
A structured guide to assess and manage fraud risks throughout a fintech product launch, from planning to post-launch monitoring.
-

Crypto and AML Risks and Compliance Essentials - Case study - mixer and darknet tracing example
A case study showing how stolen cryptocurrency moved through mixers and darknet wallets, highlighting tracing and compliance reporting strategies.
-

Crypto KYC Comparison Table – How Crypto Onboarding Differs from Traditional Finance
A comparison of crypto and traditional finance KYC processes, highlighting differences in verification, monitoring, and regulatory requirements.
-

Crypto Risk Typology Cheat Sheet
A cheat sheet outlining common cryptocurrency laundering patterns and red flags to identify suspicious wallet and transaction activity.
-

Detecting Fraud in Digital Payments - Roleplay exercise suspicious P2P transfers
A scenario-based exercise for identifying and responding to suspicious P2P payment activity, highlighting red flags and escalation steps.
-

Financial Investigator Log Worksheet
A structured worksheet for tracking investigations, documenting transactions, evidence, risk indicators, and follow-up actions systematically.
-

Fraud Detection Red Flag Reference Guide
A reference guide listing common red flags across identity theft, romance scams, money mule networks, and elder fraud cases.
-

Fraud escalation email template
A template for escalating suspected fraud via email, detailing suspicious activity, actions taken, and requesting immediate investigation.
-

Fraud Investigations Case Study and Roleplay
A roleplay-based case study for practicing fraud detection, handling suspicious activity, and following proper escalation procedures.
-

Fraud Pattern Recognition Guide - Examples of Synthetic ID, Mule Behavior, and Scam Signals
A guide identifying patterns and red flags for synthetic identity fraud, money mule activity, and various scam behaviors.
-

Fraud Red Flag Reference Card
A quick reference card outlining common fraud types, behavioral and transaction red flags, and steps for immediate escalation.
-
Fraud Risk Assessment Fundamentals Control Evaluation Checklist
A control evaluation table outlining objectives, methods, responsible teams, and status for monitoring transactions, security, and fraud prevention.
-
Investigating Suspicious Transactions - Case-based alert simulations
Simulated case studies for investigating suspicious transactions, helping compliance teams identify red flags and assess potential money laundering activity.
-
Investigating Suspicious Transactions - Sample SAR Narrative
Guidelines for drafting a clear, detailed SAR narrative, documenting suspicious transactions and supporting evidence for regulatory reporting.
-
Money Laundering Stage - Placement-Patterns Checklist
Checklist of suspicious fund placement patterns, highlighting cash, crypto, shell companies, and rapid movements for AML detection.
-
Money Laundering Stages - Case Study Layering Through Crypto and Real Estate
Illustrates how criminals launder money through crypto and real estate, highlighting placement, layering, integration, and red flags.
-
MSB enforcement case studies
Highlights MSB compliance failures at Western Union and MoneyGram, showing the need for enforced AML programs and continuous monitoring.
-
OFAC Sanctions Compliance FAQ Guide
Summarizes OFAC sanctions rules, compliance requirements, screening procedures, red flags, and steps for handling potential violations.
-
OSINT Tool Guide for Investigating Suspicious Transactions
Lists OSINT tools and methods to verify identities, investigate suspicious transactions, and gather publicly available evidence for investigations.
-
Payments Exception Handling Matrix Matrix for ACH, RTP, and FedNow transactions
Outlines common ACH, RTP, and FedNow payment exceptions, causes, compliance considerations, and recommended resolution steps.
-
Red Flags by Product Type Chart
Identifies common red flags and risks across financial products to guide monitoring and detect potential fraud or money laundering.
-
Risk Rating Template
Assesses customer risk by scoring transaction volume, source, KYC status, and account type to determine overall risk tier.
-
Sanctions Compliance Case Study
Analyzes scenarios to identify and escalate potential OFAC sanctions violations, emphasizing proper due diligence and internal controls.
-
SAR Writing Checklist - What to Include and Avoid
Provides a structured checklist for writing clear, factual, and compliant SAR narratives while avoiding speculation or subjective language.
-
Step-by-Step Guide for Screening Crypto Wallets and Counterparties
Outlines a step-by-step process for screening crypto wallets and counterparties to identify sanctions risks and ensure compliance.
-
Suspicious Activity Report (SAR) Red Flag Reference Guide
Lists common red flags in financial transactions indicating suspicious activity, aiding detection of fraud, money laundering, or AML breaches.
-
Suspicious Activity Report (SARs) Internal Report Writing Exercise
Guides staff to document and report structured or unusual account activity objectively for internal compliance review and monitoring.
-
Third-Party Risk Assessment Template
Provides a structured framework to assess, monitor, and mitigate operational, compliance, financial, and cybersecurity risks of vendors.
-
Training Retention Tips for Managers – How to reinforce learning post-session
Guides managers on reinforcing employee training through follow-ups, practical application, peer discussions, and performance tracking for retention.
-
Transaction Monitoring Building Effective Rules and Scenarios - Sample rule writing templates
Provides templates for setting transaction monitoring rules to detect suspicious activity, including cash deposits, crypto, and structuring patterns.

