AMLTHINK Academy

Life Cycle of a SAR: From Suspicion to Conviction

What happens after SAR reporting? What are the most common mistakes? What should be considered for an effective SAR?

Live sessions
Virtual class

Intermediate

Live: 1 day
Virtual: 2x3 hrs

AMLTHINK ACADEMY

Who Should Attend?

AMLTHINK ACADEMY

Instructor

Inonu Akgun ALP

Inonu Akgun ALP

Founder, CEO, AMLTHINK

Having started his professional life at MASAK (FIU of Turkey) in 1999, ALP has held various positions at the FIU for 20 years. 

He prepared the AML compliance report given to financial institutions annually and reported the deficiencies to the financial institutions by performing the quantitative and qualitative measurement of the financial institutions' suspicious transaction reports with the scoring system.

He played a role as AML team leader in an EU project. During his professional career, he participated in numerous international conferences and meetings.

During his Department Head position at MASAK in 2014 and 2015, he managed and mentored the establishment of MASAK information security infrastructure and obtaining ISO 27001 certification, the establishment of the e-notification system, development of Integrated Financial Intelligence System (EMIS) providing electronic communication and e- SAR system with obligated parties, issuance of AML Compliance Scorecards for financial institutions on annual basis.

Between 2015-2020, he served as Vice President of the FIU and managed the Analysis, Sanctions, and IT departments. During this period, he carried out automation of analytical processes related to money laundering and terrorist financing, harmonization of AML scenarios of financial institutions, the establishment of the infrastructure of standard information flow from financial institutions, and the preparation of sectoral SAR guidelines. He left the public service in 2021 at his own request.

AMLTHINK ACADEMY

Course Content

1

INTRODUCTION and KEY CONCEPTS

- The concept of suspicion
- The concept of suspicious activity
- The story of the concepts

2

LEGAL FRAMEWORK of SUSPICIOUS ACTIVITY REPORTING

- Suspicion and suspicious activity
- Must the suspicion be of money laundering and terrorist financing?
- Red Flags and suspicion
- To-do list before reporting
- Suspicioys activity reporting procedure
- Time constraints
- To-do list after reporting

3

WHY REPORTING?

- Legal risks
- Operational risks
- Reputational risks
- Costs of non-compliance

4

FINDING SUSPICION in TRANSACTİONS

- AML softwares and scenarios
- Staff-based suspicioun detections

5

AML SCENARIOS ve OPTIMIZATION

- The importance of AML scenarios
- Fundamentals of risk-based approach in optimization
- Optimization frequency and stages
- Key points to be considered

6

STAFF-BASED SUSPICION DETECTIONS

- Why important?
- Supporting suggestions
- What the compliance unit should do?

7

INTERNAL FEEDBACK and SARs

- Why important?
- Feedback to the staff
- Feedback to the unit

8

TIME CONTRAINTS: REPORTING DECISION and PRELIMINARY RESEARCH

- Determining whether there is a suspicion or not
- Decision process regarding the need for additional research
- The scope and meaning of preliminary research
- Creation of suspicious transaction reporting strategy

9

MOST COMMON MISTAKES for SARs

- Common mistakes for the identification of suspicion
- Common mistakes for the analysis of suspicion
- Common mistakes for the reporting of suspicion
- Self-Confidence risk for Reporting Entities

10

10 TIPS for a HIGH-QUALITY SAR

- Meaning of quality in SARs
- Quality challenge
- 10 Tips

11

POST-REPORTING PROCESS

- Preliminary analysis
- Analysis
- Investigation

12

CASE STUDIES: FROM SUSPICION TO CONVICTION

- Case Study-1: Money Laundering
- Case Study-2: Terrorist financing
AMLTHINK ACADEMY

People interested in this course also viewed

CFT: Analytical Techniques to Find the Needle in the Haystack

CFT: Analytical Techniques to Find the Needle in the Haystack

What analytical methods can be used in the fight against terrorist financing. What proactive steps can reporting parties take to identify terrorist financing?
Learn More
ADVANCED
Financial Profiles of Organized Crime Organizations <br> Mali Profilleri

Financial Profiles of Organized Crime Organizations
Mali Profilleri

How do organized crime conceal their proceeds of crime? What are their financial profiles and typical characteristics? What should be considered by financial and non-financial businesses?
Learn More
INTERMEDIATE
Use of Open Sources in Detecting Suspicious Activities

Use of Open Sources in Detecting Suspicious Activities

Are open sources used correctly and sufficiently to detect suspicions? How is external data used to detect anomalies? What should be considered with social media accounts?
Learn More
ADVANCED
AMLTHINK ACADEMY

Frequently Asked Questions

It is important to note that the AMLTHINK ACADEMY Training Packages are offered institutionally. If you would like to take the training courses individually, you can contact us.
AMLTHINK ACADEMY Training Package includes presentations, videos, exams, training materials, and your certificate.
Presentations, videos, exams, training materials, and certificates included in AMLTHINK ACADEMY Training Package are offered exclusively to our members who participate in our training program.
After the training, a certificate of completion or certificate of attendance will be issued depending on the level of training. Your certificates will be issued depending on the completion of the training in the case of training without examination and on the passing of the examination in the case of training with examination. Your certificates will be sent to your address and can be downloaded electronically from your AMLTHINK ACADEMY profile page.
If you would like to enroll or register for this course individually, you can contact us.
The training materials included in the course can be downloaded by our members who have attended the course. If the training materials are updated, the updated versions of the materials will be sent to our members who attended the training.

After logging in with the username and password we gave you in the Member Login section, you will be directed to the training page you received from the system. On this page, you can view your progress in training and pick up where you left off.

Course View Browser Mobile tp 2 Şüpheli işlem

More questions?