Professional Documents
Culture Documents
eot/+ive
a Date
hu',tfy' lC
*^{#"'
?6rQ6tr:
. tt{lrlv/^?, tl?h
h4.fr h0Q:
. nl-,efltt z,rtB* fi*aff +?+f $,eah*al'
*.9,*'7i
Ethiopian Financial Intelligence Center
April,2019
Addis Ababa, Ethiopia
PageT of 21
Tahle of Contents
Pages
ToPics
I Abbreviatiotu and AcronYms
3
2 Definitions
4
3 Preface
5
4 Suspiciots Transactions
6
6
4.1. IdentiSing SuspiciousTransactions
7
4.2. How to Identiff Suspicious Transactions
4.3- Are cash transictions only to be reported as suspicious transactions? 8
Transaction?
4.6. What protection is there for financial institutions and its employees 9
Ptge2 of 27
l. Abbreviations and Acronyms
Page 3 of21
2. Dcfinitions
a) Money laundering m€ans, as per article 2ll of the proclamation no. 780, the offence as
0 lllegal foreign currency exchangc refers to carryout buying or selling of foreign curTency
by an individual or company with any person rvho has not registered and licensed under
National Bank of Ethiopia.
g) Virtual currency means a digital representation of value that can be digitally traded and
functions as a medium of exchange; and/or (2) a unit of account; and/or (3) a store of
(l)
value, but does not have legal tender status. It can be exchanged tbr real money or other
virtual currencies are potentially vulnerable to money laundering and terrorist financing
abuse for many of the reasons identified in the Guidance."
h) Money mule refers to someone who transfers illegally acquired money on behalf of or at the
direction of another. Criminals recruit nrules to move money electronically through bank
accounts, in person, or through a variety of other methods. Once received. the mule will rvire
the money into a third parry bank account; "cash out" the money received, possibly via
several cashier's checks; convert the money into a virtual cutTency'"
i) Trade based money laundering is defined as the 'lrocess of disguising the proceeds of
crime and moving value through the usc of trade transactions in an attempt to legitimize their
illicit origin. This can be achieved through the misrepresentation of the price, quantity or
qualit-v of imports or exports. This can atso involve abuse of the financial system through
Page 4 ofZl
fraudulent transactions involving a range of money transmission instrunrents, such as wire
transfers. The basic techniques of trade-based money laundering are: over- and under-
invoicing of goods and services; multiple invoicing of goods and services; over- and under-
shipments of goods and services; and falsely described goods and services. (FATF Typology
2006)"
j) Proclamation means prevention and suppression of AML and CFT proclamation 780/2013
k) Targeted Financials actions means defined as per Article 2 sub article 8 and 9 of regulation
30612014 procedure for freezing of terrorist's asset council of ministers regulation.
3. Preface
According to FATF recommendation 34, financial intelligence center should prepare guidelines,
and provide feedback, which will assist financial institutions in applying national measures to
combat money laundering and terrorist financing in particular to detect and report suspicious
transactions.
Pursuant to article 219 of AML/CFT proclamation no. 780/2013 enlist Financial institution as a
In addition Pursuant to Article 17 of the AML/CFT Law, financial institutions are required to
report suspicious transactions when they have encountered a suspicion based on reasonable
grounds that a transaction or an attempted transaction is involved.
Ethiopia Financial Intelligence Center, as per article l3l4 of the proclamation no. 780/2013,
should prepare guidelines, and provide feedback, which will assist financial institutions in
particular,
applying national measures to combat money laundering and terorist financing and in
in detecting and reporting suspicious transactions. Thus, it deems necessary to prepare this
guideline to clarify the obligations of financial institutions to report suspicious transactions and
Page
#
to ease the challenge for the identification of suspicious transaction and to reduce the subjectivity
on the identification of suspicious transaction. It has also UN paralleled role to improve the
quality and number of suspicious transaction that has been reported by the financial institutions.
4. Suspicious Transactions
Pursuant to Article l7 of the AMLICFT Proclamation, Reporting entities are required to report
suspicious transactions when they have formed a suspicion based on reasonable grounds that a
transaction or an attempted transaction is involved in, linked to, or may be related to one of the
followings:
The suspicion also applies to offenses that are committed within Ethiopia or in a foreign
jurisdiction. Especially, the predicate offense which are listed in the national risk assessment,
are Corruption, tax fraud/evasion, human trafficking, and migrant smuggling, goods smuggling
(contraband), Illegal hawala and fraud. The reporting entities have focus on when the
identification of suspicious transactions. to prioritize the predicate offenses which are listed
above at their risk level because the offenses are labeled the high risk and they are a threat to our
country. Giving priority to the offenses helps to mitigate the risk and it ensures the effectiveness
to combat ML/TF crime. F
By and large, reporting entities will be unaware as to what the actual criminal is since it has
complex and clandestine nature. Horvever, by screening transactions for indicators' typologies,
and unusual activity, suspicion of criminal offending may arise. A transaction may have many
attributes that, considered individually do not raise suspicion, but, considered collectively,
suggest criminal activitY.
profoundly, Reporting entities can seek guidance as to what could constitute an STR from the list
Page 6 of21
of indicators provided in the Appendix. Horvever, the list of indicators is lbr the guidance of
4.1.1. A Financial instirutions should report to the Financial Intelligence Center (FIC) any
suspicious transaction (including attempted transactions) rvhich reasonably suspects is
related to the commission of:
Page7 ofZl
customers in the similar occupation or business category;
The availability of identification documents and other docunrentation;
a Third-party deposits or transactions unde(aken by third parties.
a Client/accounts subject to previous STR reporting
a Attempt to open an account via non face to face contact
a Transferring money using mobile banking frequently
This list of factors is not exhaustive and may include in diflerent sectors bellow annexed.
AII the above surrounding factors of transaction and a customer should be assgsss6 before
reaching a conclusion that a transaction is suspicious and is likely to be a money laundering
or terrorist financing-related t&rnsaction. The decision that a transaction is suspicious should
be based on a combination of the above-listed factors and not juo on" factor regarding the
transaction or customer.
4.3.I. No, the requirement to report any suspicious transaction applies to all types of the
transaction regardless of whether cash is involved. Thus non-cash transactions, such
as telegraphic transfers. that may appear suspicious. should also be reported.
4.4.2. These transactions are considered to be suspicious transactions unless they are
found rational by the financial institution employee in view of the customer's
occupation, business details, explanations, and other factors.
Page 8 of 21
7,,_)J-{el
'-i\:,.J8riu:-:i, Yrz'
"'-].lYrqqr'cs
'!+-'s:; -
4.4.3. Horv to Report a Suspicious Transaction?
4.4.4. This can be repo(ed to the FIC electronically or through paper repofts.
4.4.6. Financial institutions and decidedly, provide their reports of suspicious transactions
to the FIC through their Anti-Money Laundering Conrpliance OfTicer. Clear
- 'internal reporting procedures should be in place to allow for this and strict
compliance of this rep'orting procedure is required by all erpployees.
4.4.8. A suspicious transaction must be reported to the FIC no later than I working day
after forming the suspicion or the receipt to the information being reported on.
4.5.1. Yes. As per article l7 of proclamation no. 780/2013 If a transaction has not
been completed but is found suspicious by an employee of the financial
institution, the transaction can still be reported as suspicious even if minimal
details of the customer has been obtained by the enrployee.
4.6. What protection is therc for financial institutions and its employees
for disclosing customer's information ?
4.6.1. Firstly, article 20 of proclamation no.780/2013 and the FTR Act prohibits the
disclosure of information that rvill identify or likely to identify an1' person who
has handled a transaction for rvhich a suspicious transaction rcport (STR) has
been raised or any person rvhich has prepared or made an STR.
4.6.2. Secondly, as pcr a(icle 24. proclamation no.780/2013 a financial institution its
employees are protected from any civil, criminal or disciplinary action taken
Pagc9 o[21
against it for reporting a suspicious transaction in good faith.
4.6'3. If there is a prosecution in the courts for money laundering offense in relation to
a suspicious transaction they have reportcd on by a financial institution is
deenred that the financial institution and its entployees did not have possession
of information relating to that transacrion at any,time.
+.i-2. fney have reported or will bo reporting a suspicious tqansaction to the FIC;
4.7.4. Any other information rvhich may cause the person to conclude that suspicion has
been formed or that a report has been or may be rnade to the FIC.
4.7.5. The financial institution, and its employees or agents, nlust not disclose to the
customer being reported on that it rvill be reporting (or has reported) his or her
transaction or information to the FIC as being suspicious.
Yes. As per article 15 of proclanration no. 780/2013 The FIU nray, as part of its
analysis process. request a reporting institution to provide further information on a
5.2. Reporting entity fails to comply with adequate internal policies, procedures, and
controls for detecting, reporting and handling information related to suspicious
.' transactions ,there is administrative and criminal sanbtion as per article 2213 and
article 30 of the proclamation respectivel),
Appendices
b) The customer submits copies of identification documents while refusing to present the
originals without any rational reasons.
c) The customer provides identification documents that are suspected to be forged or false.
d) The customer provides unclear or doubtful information during the account opening
proc€ss.
e) The customer refuses to present his or her personal identification docunrents without any
rational r€asons.
f; Transactions involving business accounts that are suspected of not being registered
Pagc 11 of 21
ii. Rcd Flag Indicator on Cash Transactions
a) The customer conducts a series of large deposits and rvithdrarvals rvithin a short period
of time in cash or by cheque. The customer kecps nraking withdrar;r,als until all funds
are deposited has been exhausted.
b) The stated occupation of the custonrer does not correspond to the level or type of
transactions undertaken. ( e.g. a student customer makes a series of large cash deposits
and u,ithdrawals at different locations)
c) The sudden increase in an account balancc through larse caslr deposits.
d) _ Customer deposits ver1, dirtl,or moist currency notes.
e) eustomer conducts several transactions on the sante day at the samc- branch but in
conducting the transactions the customcr deliberately ur., di'ki."nt tcllers.
Customer freqtrently conducts cash transactions for amounts just belorv the reporting
threshold of in an apparent attempl to avoid being reported on.
g) Company accounts that are dominated b.v cash transactions rather than other monetary
instruments nonnalll' associated rvith comrrrercial businesses such as chcques or credit
cards.
h) The customer presents uncounted funds for a transaction. On counting of the funds by
tlre financial institution cmployec, tlre customer rcduces tlre number of funds to be
a) Large deposits and withdrawals during a short period of timc into an account
imnrediately after being opened. 'fhe account is then closed or discontinued for any
other transaction.
b) Custonrer frequently conducts transactions at particular branches instead ol a branch
Page 72 of 2l ,m
--*
.:l
':)
:.9
.i, <a
c,
c) Frequent telegraphic transfers of large sums into an account of customers.
d) The customer frequently receives large deposits into his/lrer account at a branch distantly
located from the branch at which the customer maintains his/her account.
e) Transactions involving an account that is used frequently to remit funds to a large
number of people.
a) Transactions where customers make frequent large overseas remittances within short
periods of time.
b) The customer receives large overseas remittances for economically unreasonable
purposes.
c) Information concerning the originator of a wire transfer is not provided.
d) High-risk countries. For the list refer to the Financial Action Taskforce website on:
www.fatf-gafi.org
e) Customers who decline to provide information or evidence in conducting a transaction.
uttimate beneficiary is undisclosed, contrary to the normal procedure for the type of
business concerned.
Pagc 13 of 21
v. Red Flag for Insurance Company
a) An applicant is reluctant to provide the necessar\. identification information and
documentation or provides minimal infornration.
b) The applicarrt provides conflicting inlbrnration about his/her personal details and/or
provides identification docunrents which vou suspect to be fictitious.
c) The applicant appears to have insurance policies with several other institutions.
d) Application for a policy fronr a potential customer in a distant place where a
comparable policy could be provided '.closer lo honte.',
e) Customer requests an insurance product that has no apparcnt purpose and is reluctant to
' provide the reason fbr his/lrer investnrent.
f1 Thc applicant anenlprs to rise a third'party chcquE to purchasg the policl'.
g) The applicant seeks an insurance policy with prenriums that exceed the customer's
apparent means.
Ethiopia had conducted national risk assessment before two years .The assessment come up with
6 high threat predicate offbnces. These predicate offbnces should be given priority to mitigate
thcir risks. Ho$,evcr, tllcsc specific rcd flag indicators cannot replace the general red flag
indicators .these indicator uses as additional clues for the high threat predicate offences.
Pagc 1-l of 21
Yiii. General red flags indicators rclating to TBML on linancial institutions specially on
banking Products
a) Use of Letter of Credit to move monev betrveen t\\,o or more lrade relation countries, such
trade rvould not nornrally occur.
b) The method of payment requested by the client appears inconsistent with the risk
characteristics of the transaction.
c) 'fhe ransaction involves thc receipt of cash fronr third party entities that have no apparent
0 In merchandizing trade, the trade finance mechanism should be in place for both export
support as well as import support of transaction.
g) The commodit,v is shipped to or from a jurisdiction designated as 'high risk' for ML
activities or sensitive/ non co-operative jurisdictions.
h) The commodity is transshipped through one or more such high risk / sensitive
jurisdictions for no apparent economic reason.
i) Use of corporate structure of shell companics located across the countries and registration
of a trading compan), in a tax haven even though its business relates to another
jurisdiction.
j) The transaction involves the use of front or shell companies, and both shell and front
companies can be used to cover TBML,
k) Sole proprietorship businesses/private limited companies set up by seenringly unrelated
people are found to be controlled by the same group of people.
Pagc 15 oi
as bills
of lading, invoiccs etc.
o) In addition significant discrepancies appear betrveen
the value of the commodity reported
on the invoice and the conrmodity's fair markct value.
p) Relating Consignment size or type of commoditl, being shipped
appears inconsistent with
the scale or capacity of the exporter or importer's having regard
to their regular business
activities.
q) Disguising the owtrerslrip of assets and interest
in busilresscs- constructions rvith foreign
legal entities. e.g. off shore cornpanies or relatives as tegal olvner: price-manipulating
turnover/sales by conrmingling illicir and legal sources of income.
ix. Common Red flag indicators on Illegal *Hasuala", Goods and Currency
Smuggling
anrt Tax evasion
These rcd flag indicators have their own pattern as rvell as common panerns. Therefore, it is
n€cessary to put them in the same category.
0 They have been established Shell Company intentionally to receive price of the importer
company and to prepare bill of loading, certificate of origin, commercial invoice and other
documents I ike the lega I manu facturer/suppr ier/e.xporter/ company d id.
g) They comnrit tax evasion in domestic market on the imported goods such as Value Added
Tax and income taxes domestically.
r.r. ;l
Page 16 of21
'J
:'i
xi. Red flag indicators using over invoicing import goods
a) The importers took a permit rvhich contains a more
value of foreign currency from
domestic banks based on submitting performa invoice to banks.
b) The foreign curency permiued by the domestic banks and
transfer to the seller bank
using Telegram transferring, or Cash against document and Letter of Credits.
c) They inrported under shipment of goods and services for the same purpose for
over
invoicing.
d) The relationship betrveen buyer and selter is a sister/affiliate company
to the buyer.
e) They have been established Shell Company intentionally to receive price of the importer
cpmpany and to prepare bilt of loading, certificate of origin, commercial invoice and
other documents like tlre legal manufacturer/supplier/expolter/ company did.
0 They took permit from domestic banks with excess foreign currency,
o\
5t Transfer the foreign qurrency by rvay of Letter of Credit, Telegram Transferring or
cash
against docunrent to the seller bank.
h) The importers bought and imported a little commodity and took excess foreign currency
abroad,
i) They paid excess custom duty in donrestic based on the comnrercial invoice.
j) The seller have a sister /affilia1e company to the buyer,
k) They used techniquc basically conrnritted two typcs of crinres. Such as
' First they transfer illicit financial florv or capital flight to abroad.
' Secondly they commit tax evasion donrestically by rvay claiming refund.
Page77 of27
0 They have been established Shell Conrpany intentionally to receive price of the importer
company and to prepare bill of loading, certificate of origin, commercial invoice
and
other documents like the legal manufacturerisupplier/exporter/ company did.
g) They have a sister /aftiliate company abroad.
h) The main purpose is to transfer of i[icit financiat flow or capital flight.
Page
l.x
:*,
1i{
a
r:iffiff
rr.
1"4
0 They have a sister /affiliate company abroad.
g) The main purpose is transfer of illicit financial flow or capital flight.
Paga 19 of 2l
e) cash received fronr countries
which doesn't have business relation
0 Receivables of Foreign currency from the family of trafficking give to the importer
abroad and they receive Ethiopian birr in domestic.
g) They host the smuggling abroad and they collect
Ethiopian Birr from their family
domestically through banks.
0 They may collect foreign currency abroad from Ethiopians and they pay to ttre beneficial
owner in domestic lrom the money rvhich obtains from corruption.
g) Thel' ma.v bought foreign currency in thc black nrarkets and transfer
it abroad by the
helping of virtual currency or money mules.
lr) They nray collect foreign currcncies abroad liom the under invoicing sold export goods.
Page?O of 2l
"i
i) They May operate funnel accounts to receive fraud proceeds from multiple lower level
monev nrules.
j) They May try to recruit other money nrute -vou received an unsolicited email or contact
over social nredia promising easy monev for linte to no effort.
k) They use unusual patterns of transaction activity (e.g. volumes, vetocity. structuring to
avoid detection/reporl.ing obligations, source, destination)
l) They ransfer transacrions by anonymous digital currencies.
m) Give money as a loan for those rvho have no moncy in their hands by taking insufficient
cheque as a guarantee illegalll
'Sorne
n) criminals cornrfrit usury hnd they, can get more supports from bank officials in
different ways such as borrorv mone)'to use as usrrry, give advice and hide proceeds of
crime.
o) They can get support by larv enforcement such as investigators and prosecutors including
judges.
K G/tsedik Hadera
Director General of Ethiopian Financial intelligence center
27 of 2l