9 Suspicious Activity Examples + How to Identify & Report Them - Blog | Unit21 (2024)

Suspicious activity in banking and financial institutions is widespread. In fact, in less than two decades—between 1999 and 2017—American financial institutions identified more than $2 trillion of suspicious activities. That figure mirrors the entire annual GDP of Italy, the country with the eighth highest GDP in the world.

Furthermore, keep in mind that this figure merely represents the level of suspicious activity filed via a SAR (Suspicious Activity Report)—it is highly likely that plenty more suspicious activity, perhaps as much as $1 trillion worth, occurred during this same period.

Since it’s not an exact science, there is always going to be some level of manual investigation into potentially suspicious transactions needed to determine whether a report must be filed. Here, we’ll dig into this topic to help you understand the nuances around what constitutes a suspicious transaction and what doesn’t, including:

  • What Are Suspicious Transactions in Banking?
  • What is the Threshold for Reporting Suspicious Transactions?

Let’s dive in with the basics of what actually counts as suspicious activity when it comes to financial transactions.

9 Suspicious Activity Examples + How to Identify & Report Them - Blog | Unit21 (1)

What Are Suspicious Transactions in Banking?

Suspicious transactions are any event within a financial institution that could be possibly related to fraud, money laundering, terrorist financing, or other illegal activities. Suspicious transactions are flagged to be investigated, but many suspicious transactions are simply false positives.

What Makes a Transaction Suspicious?

One of the problems with filing suspicious activity reports is that there is no universal definition of what constitutes suspicious activity. A given action might be deemed suspicious if it occurs within one account, while the same activity would be considered “normal” if it occurs in another.

For example, it might make sense for a petroleum supplier to receive a $100 million wire transfer from a foreign conglomerate, but if that same action were to appear in the account of a local non-profit, it would raise some red flags.

Finding the “threshold” for what constitutes suspicious activity is far from easy. However, by keeping a few basic principles and protocols in mind, financial institutions of all kinds can make some much-needed changes and improve how they monitor suspicious activity.

Generally speaking, a financial transaction might be deemed suspicious if it is unlike any other activity that has occurred within that account. Of course, an activity being new will not necessarily mean that any malicious actions have occurred.

For example, an individual making a sizeable down payment on their first home is an activity that is unusual but not malicious. The processes involved in identifying suspicious activity are far from cut and dry. However, it is still a good idea to flag—and potentially follow up on—any action that seems far from the norm.

Regulations Around Suspicious Transactions

As FinCEN—the Financial Crimes Enforcement Network—has helped describe, transactions that “serve no business or other legal purpose and for which available facts provide no reasonable explanation” are one of the most common signs of suspicious activity.

This means that, in some cases, financial institutions will need to monitor the size of transactions occurring within their system and monitor the types of transactions taking place and determine where these transactions originated from.

The Bank Secrecy Act (BSA), which was signed into law in 1970, establishes responsibility for financial institutions to keep an eye out for signs of suspicious activities and report them to the corresponding authorities (usually within 30 days). The purpose of the BSA is to combat some of the most common forms of suspicious activity, including money laundering, theft, tax evasion, financial fraud, and more.

However, the BSA, contrary to some other financial regulations, still contains a lot of gray areas. Financial institutions will want to ensure they are compliant and report these sorts of activities within a timely manner (or else face fines and possible legal consequences). But at the same time, they will need to balance their account holders’ fundamental rights to privacy.

Ultimately, no formula will clarify that a given activity must be reported or will never need to be reported. But carefully monitoring for a few common red flags—substantial transactions, transactions from an unclear location, foreign transactions, identity fraud, and others—will help these institutions better balance their seemingly “competing” interests.

9 Financial & Bank Suspicious Activity Examples

As the Federal Deposit Insurance Corporation (FDIC) helps explain, many different types of transactions might trigger the need to file a SAR. These can include, but are by no means limited to, the following transactions:

1. Money Laundering

This process involves taking money generated by an illicit activity and “cleaning” the money by falsely presenting it as if it were earned through a legitimate business. One of the largest money laundering schemes of all time, dubbed the 1MDB scandal, involved the theft of more than $4.5 billion from a Malaysian state fund that was then laundered through Goldman Sachs. Following trial, Goldman Sachs was forced to return most of the funds to Malaysia and pay a $600 million fine.

Money laundering is one of the most costly types of fraud occurring in financial institutions, making Anti-Money Laundering compliance paramount in any fraud management system.

2. Cash Transaction Structuring

This involves splitting or otherwise altering financial transactions to avoid automatic reporting to tax authorities. Usually, structuring is done to avoid being subject to certain taxes or to conceal otherwise an organization’s wealth (which may help them qualify for certain loans, etc.).

3. Check Fraud

A broad term used to describe any deliberate misrepresentation, use or creation of checks, check fraud can include writing fraudulent checks, altering checks, creating bad checks (checks you know will bounce), and more. According to one recent estimate, roughly 2 million bad checks are processed daily through the Automatic Clearing House (ACH) system.

4. Check Kiting

This is a form of check fraud that involves writing a check from an account with insufficient funds and depositing that check into another bank account. Due to “the float”—the time before checks are cashed between banks—this can temporarily give people access to uncovered funds.

5. Wire Transfer Fraud

This is a broad term used to describe any situation in which malicious activity occurs during the course of a wire transfer. Perhaps one of the most well-known wire transfer scams was the “Nigerian Prince” email fraud, which happened in the early 2000s (and still makes a considerable amount of money today).

6. Mortgage and Consumer Loan Fraud

This type of fraud involves consumers deliberately misrepresenting their financial position to secure a loan (usually, a large loan, like a mortgage). Misrepresenting income, overvaluing assets, and underreporting expenses are all types of consumer loan fraud.

7. Misuse of Position (Self-Dealing)

This term describes any instance where a fiduciary—a financial agent acting on behalf of their client—takes action or makes a suggestion that is their own best interest, rather than the client’s. For example, if a fiduciary invests a client’s funds into their account, that would be considered self-dealing.

8. Identity Theft or Fraud

While identity theft is used to describe an instance where someone is pretending to be someone else, identity fraud is used to describe any misrepresentation of a person’s identity. These suspicious activities can result in severe punishments, even if no financial transactions have occurred.

9. Terrorist Financing

While the federal government has laws and regulations banning financial transactions connected to any illegal activity, it is particularly strict about activity that could be linked to terrorism. Since the passage (and subsequent renewal) of the USA PATRIOT Act, regulators have a broad ability to monitor certain accounts for terrorist financing.

These are just a few of the most common types of suspicious activity a financial institution can potentially encounter. Therefore, if there are any indicators that these, among other, suspicious activities have occurred, financial institutions are required by law to file a SAR.

What is the Threshold for Reporting Suspicious Transactions?

There are several different types of suspicion that might, eventually, necessitate the need to file a report.

9 Suspicious Activity Examples + How to Identify & Report Them - Blog | Unit21 (2)

At first, a financial institution might have a “simple suspicion”—at this point in time, they might have a hunch or believe that suspicious activity might be occurring but do not yet have enough evidence or reason to file a report. Because this stage does not include articulating any reasons for suspicion, this hunch can come from as little as a simple irregular activity within an account.

Eventually, this simple suspicion might grow into reasonable grounds to suspect—this occurs once they have a legitimate reason to suspect illicit activity is occurring. Then, they have some evidence to prove that their suspicion is more than an ordinary “hunch.” This would include some reporting around the irregularities and an explanation for what makes them suspicious, though does not require any proof that the activity is fraudulent or illegal.

At this point, it is unlikely that the accused party could be convicted of any crime within the criminal justice system. Nevertheless, by law, even a tiny red flag or a single piece of tangible evidence should be considered enough to file a suspicious activity report. Keep in mind, only some SARs are followed up on (The Bank Policy Institute reports that as few as 4% are reviewed by law enforcement), and an even smaller fraction ever results in a criminal conviction. Not all red flags are related to the transactions themselves either—non-monetary indicators can be just as fruitful in identifying suspicious activity.

As evidence continues to build—more suspicious transactions occur, there are signs of financial crimes, etc.—a suspicion might eventually become grounds to believe that illicit activity has occurred. By this point, financial institutions have a legal (and perhaps moral) obligation to report this activity to authorities.

Once the threshold is reached and there is no reasonable justifiable reason for the behavior, then a SAR is required for each incident of suspicious activity. SARs must be submitted to FinCEN within 30 calendar days of the suspicious activity occurring. To follow guidelines and avoid fines and penalties, read more about our detailed instructions on how and when to file a Suspicious Activity Report (SAR).

9 Suspicious Activity Examples + How to Identify & Report Them - Blog | Unit21 (3)

How to Identify Suspicious Activity & Money Laundering

Ultimately, while there is not an explicit cutoff for what constitutes suspicious activity, it is the responsibility of financial institutions to keep an eye out for the early signs that any of the activities listed above have occurred. It's important to incorporate transaction monitoring into your fraud and AML system to effectively combat threats.

Luckily, with technologies like Unit21, monitoring, investigating, and reporting these sorts of activities is easier than ever before. With diligence, a thorough understanding of the law, and a commitment to consistent banking, both large and small financial institutions can develop the SAR protocols they need to remain compliant and help in the fight against financial fraud.

For more information about how Unit21 can help, get in touch today.

9 Suspicious Activity Examples + How to Identify & Report Them - Blog | Unit21 (2024)

FAQs

How to identify and report suspicious activity? ›

Tips for making a good quality Suspicious Activity Report (SAR)
  1. Submit at SAR online. Wherever possible use SAR Online. ...
  2. Be clear and concise. The report should be clear, concise, logical, including all relevant and supporting documentation. ...
  3. Providing the right information.
  4. Use glossary codes. ...
  5. Other reporting considerations.

How do you identify a suspicious transaction report answer? ›

Identifying suspicious transactions often involves looking for certain red flags. These indicators can vary widely but typically include: Unusual Transaction Size or Frequency: Transactions that are unusually large or frequent compared to the customer's usual activity.

How to write a Suspicious Activity Report? ›

The Introduction
  1. Provide a brief statement of the SAR's purpose.
  2. Generally describe the known or suspected violation.
  3. Identify the date of any SARs previously filed on the subject & the purpose of that SAR.
  4. Indicate any internal investigative numbers used by the filing institution to maintain records of the SAR.

How to identify suspicious activity money laundering? ›

transactions that don't match the customer profile. high volumes of transactions being made in a short period of time. depositing large amounts of cash into company accounts. depositing multiple cheques into one bank account.

How to report suspicious activity? ›

If you see suspicious activity, report it to law enforcement and describe specifically what you observed, including: Who or what you saw; When you saw it; Where it occurred; and.

Which method is used to identify potentially suspicious activity? ›

A surveillance monitoring system, sometimes referred to as an automated account monitoring system, can cover multiple types of transactions and use various rules to identify potentially suspicious activity. In addition, many can adapt over time based on historical activity, trends, or internal peer comparison.

How to detect suspicious activities? ›

Signs of suspicious activity include unusual logins, abnormal access patterns, atypical network traffic, multiple failed login attempts, unexpected application usage, lateral movement, changes in user behavior, unusual outbound connections, suspicious system processes, and altered configurations.

How to report a suspicious transaction? ›

STR Submission: Best Practices
  1. Thorough Documentation: Maintain detailed records of all transactions, including the identities of parties involved, the nature of the transactions, and the reasons for suspicion. ...
  2. Timely Reporting: STRs should be filed as soon as a reasonable suspicion arises.
May 12, 2024

What are three suspicious activities? ›

Suspicious activities or behaviors may include, but are not limited to:
  • Wandering around campus areas attempting to open multiple doors.
  • Seeming nervous and looking over their shoulders.
  • Entering restricted areas when not authorized or following immediately behind others into card-access areas while the door is open.

What are suspicious activities? ›

Suspicious activity is any observed behavior that could indicate a person may be involved in a crime or about to commit a crime. Each of us might think of different things when it comes to what appears suspicious.

When should suspicious activity be reported? ›

You have 30 calendar days to file a SAR after becoming aware of any suspicious transaction that is required to be reported. 1. Record relevant information on a Suspicious Activity Report by MSB (SAR-MSB) form available at www.msb.gov or by calling the IRS Forms Distribution Center: 1-800-829-3676.

What is an example of a suspicious movement? ›

A stranger loitering in your neighborhood or a vehicle cruising the streets repeatedly. Someone peering into cars or windows. A high volume of traffic going to and coming from a home on a daily basis. Someone loitering around schools, parks, or secluded areas.

What are examples of suspicious or unusual activity by a customer? ›

Suspicious Behaviour/Demeanour

A group of unconnected customers who share a common correspondence address. A client who shows unusual concern for secrecy e.g. in the identify of beneficial owner of the account, his employment/business or assets or fails to indicate a legitimate source of funds.

What are the ways of reporting suspicious movement? ›

Call the police if you see someone acting suspiciously. Report what the suspect is doing and give a detailed description of what he is wearing, exact location, landmarks or address, description of the vehicle, the side of the street and direction, and direction of its travel.

When reporting suspicious activity what details should you include? ›

When a SAR is filed, five sections of information are required. First, reporters collect names, addresses, social security numbers, birth dates, driver licenses or passport numbers, occupations, and phone numbers of all parties involved.

What is the protocol for identifying suspicious items? ›

Members of the public should not be able to approach the area until it is deemed safe. It is of utmost importance for the safety of your site and its people, to remember these simple protocols. HOT, hidden, obviously suspicious, typical. The four C's, confirm, clear, communicate, control.

What is an indicator of suspicious activity? ›

Impersonation of authorized personnel (e.g., police/security officers, janitor, or other personnel). Misrepresentation. Presenting false information or misusing insignia, documents, and/or identification to misrepresent one's affiliation as a means of concealing possible illegal activity. Theft/Loss/Diversion.

Top Articles
Why does my card keep getting declined?
Less Lethal
Katie Pavlich Bikini Photos
Gamevault Agent
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Free Atm For Emerald Card Near Me
Craigslist Mexico Cancun
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Doby's Funeral Home Obituaries
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Select Truck Greensboro
Things To Do In Atlanta Tomorrow Night
Non Sequitur
How To Cut Eelgrass Grounded
Pac Man Deviantart
Alexander Funeral Home Gallatin Obituaries
Craigslist In Flagstaff
Shasta County Most Wanted 2022
Energy Healing Conference Utah
Testberichte zu E-Bikes & Fahrrädern von PROPHETE.
Aaa Saugus Ma Appointment
Geometry Review Quiz 5 Answer Key
Walgreens Alma School And Dynamite
Bible Gateway passage: Revelation 3 - New Living Translation
Yisd Home Access Center
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Pixel Combat Unblocked
Cvs Sport Physicals
Mercedes W204 Belt Diagram
Rogold Extension
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Teenbeautyfitness
Where Can I Cash A Huntington National Bank Check
Facebook Marketplace Marrero La
Nobodyhome.tv Reddit
Topos De Bolos Engraçados
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Holzer Athena Portal
Hampton In And Suites Near Me
Stoughton Commuter Rail Schedule
Bedbathandbeyond Flemington Nj
Free Carnival-themed Google Slides & PowerPoint templates
Otter Bustr
Selly Medaline
Latest Posts
Article information

Author: Sen. Emmett Berge

Last Updated:

Views: 6448

Rating: 5 / 5 (60 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Sen. Emmett Berge

Birthday: 1993-06-17

Address: 787 Elvis Divide, Port Brice, OH 24507-6802

Phone: +9779049645255

Job: Senior Healthcare Specialist

Hobby: Cycling, Model building, Kitesurfing, Origami, Lapidary, Dance, Basketball

Introduction: My name is Sen. Emmett Berge, I am a funny, vast, charming, courageous, enthusiastic, jolly, famous person who loves writing and wants to share my knowledge and understanding with you.