GLOBAL FINANCIAL CRIME REVIEW
Exposure , typologies and red flags Exposure
The first critical step is for FIs to determine their CSAM / CSE / CST risk exposure and implement proper controls . This can be done through a targeted CSAM / CSE / CST risk assessment 4 that articulates a clear understanding of these crimes , the threats and the vulnerabilities faced by the FI . In addition , FIs should source relevant typologies and red flags by leveraging resources readily available . 5 A generic approach does not work to tackle CSAM / CSE crime types .
Graphic 1 : How payments enable CSE
Typologies and red flags
No one red flag in isolation can confidently reveal complex crimes such as CSAM / CSE / CST . Therefore , the detection ( with proper data and context ), investigation and reporting approach should be tailored to consider relevant red flags in context , as illustrated in Graphic 1 .
Payment methods
Facilitator
$$
$$
Wire transfer Bank transfer Supplier
Mobile e-wallet Digital currency
Victim Gift cards
Gifts
Traveling to offend
Provides instructions and / or requests
$$
Computer
Mobile phone
Viewing exploitation material
Source : Australian Transaction Reports and Analysis Centre 6
$$
Offenders Child-like sex doll
Increasingly , online CSAM / CSE / CST is being enabled by financial transactions either between an offender and a victim ( sextortion or self-production ) or between an offender and a facilitator ( CSE livestreaming or traveling to offend ). These transactions are at the core of CSAM / CSE / CST and can be vital in detecting and stopping these crimes .
Not all CSAM / CSE / CST offender typologies and red flags will be applicable to a particular FI , so it is imperative that FIs understand those they will likely have exposure to , see Table 1 , and documentation that can be exposed in a targeted risk assessment .
120 acamstoday . org