About Me

Jonathan Foxx, PhD, MBA is the Chairman & Managing Director of Lenders Compliance Group, the first full-service, mortgage risk management firm in the United States, specializing exclusively in mortgage compliance and offering a full suite of services in residential mortgage banking for banks and non-banks.

Wednesday, March 11, 2020

Personal Liability of AML Compliance Officer

PRINT THIS

In the ongoing saga of the Financial Crimes Enforcement Network’s (FinCEN) pursuit of terrorists and various illicit activities, the Bank Secrecy Act (BSA) is the foundational framework that provides the examination and enforcement authorities. Recently, a Chief Operational Risk Officer got caught up in the net of financial institution officials who allow violations of the BSA.[1]

I believe this is the second time that the Financial Crimes Enforcement Network has assessed a civil monetary penalty (“CMP”) against an individual for Bank Secrecy Act violations based on alleged shortcomings of the Anti-Money Laundering (“AML”) Program that the individual was responsible for overseeing.

Let’s be clear about the implications of this enforcement action: all industry participants should take note that AML enforcement reaches to individuals who are responsible for AML compliance, that is, they may be held personally liable if the AML Program is legally insufficient.

FinCEN has the authority to investigate and impose civil money penalties on financial institutions that willfully violate the BSA, and on current and former employees who willfully participate in such violations.[2]

Here’s what happened. A CMP assessment (“CMP Assessment”) was brought against the former Chief Operational Risk Officer of U.S. Bank National Association (“U.S. Bank” or “Bank”) on the basis of alleged actions involving the Bank’s AML compliance program that had previously been addressed by regulators.

As set forth in the CMP Assessment, the most prominent alleged shortcoming of the Bank’s AML compliance program, until 2015, included systems and processes that capped the number of alerts regarding suspicious transactions that were generated. This “alert capping” resulted in many potentially suspicious transactions not being further investigated or reported through SARs. Additionally, regulators determined that certain money transfers processed as an agent of a licensed money transmitter at the Bank were (A) not included in the monitoring system, (B) used deficient procedures for identifying and addressing high-risk customers, and (C) had an insufficient number of AML compliance personnel assigned to AML Program implementation.

FinCEN’s decision to pursue the individual allegedly responsible for these shortcomings after they have already been enforced against the Bank is sort of reminiscent of FinCEN’s decision to assess a CMP of $1 million against the former Chief Compliance Officer of MoneyGram International, a major international money transmitter, in 2014.[3] That matter was, ultimately, settled in 2017, and the former compliance officer agreed to a $250,000 penalty. The facts and circumstances do not line up tightly with the U.S. Bank situation, and the specific allegations of misconduct against the money transmitter were different from the allegations against the money transmitter’s compliance officer; however, this sentence stands out in the MoneyGram litigation:

“… despite being presented with various ways to address clearly illicit use of the financial institution, the individual failed to take required actions designed to guard the very system he was charged with protecting, undermining the purposes of the BSA.”

Line that up with the current case, where FinCEN alleges that the Bank’s Chief Operational Risk Officer

“… shares responsibility for the Bank’s violations of the requirements to implement and maintain an effective AML program and file SARs in a timely manner,” and that he “failed to take sufficient action when presented with significant AML program deficiencies.”

The Chief Operational Risk Officer was hit with a $450,000 penalty for violations of the BSA and its implementing regulations. Indeed, he was required to affirm that he did not handle a compliance management function from June 2014, when he left the Bank, to February 26, 2020.

Relevant to this matter is that in February 2018, FinCEN assessed a civil money penalty on U.S. Bank for, among other things, willfully violating the BSA requirements to implement and maintain an effective AML program and to file SARs in a timely manner.[4] Stated differently, in February 2018, FinCEN, the Office of the Comptroller of the Currency (“OCC”), and the U.S. Department of Justice, issued a CMP of $185 million against the Bank for, among other things, failing to comply with its obligations to implement and maintain an effective AML compliance program, and to detect and report certain suspicious activity by filing Suspicious Activity Reports.

What is obvious is that FinCen can hold an individual personally liable if he or she is responsible for the implementation of an AML Program that is legally defective!

Let that sink in!

In this case, according to FinCEN, the Chief Operational Risk Officer held multiple senior positions within the Bank’s AML compliance department, and he was at times responsible for overseeing the Bank’s AML compliance program. Consequently, FinCEN asserted that he shared responsibility for the Bank’s failures to establish and implement an adequate AML compliance program and to timely file the SARs.

The CMP Assessment claims that the Bank knowingly drafted AML policies and procedures that prevented the identification and reporting of certain suspicious activity. Significantly, the Bank’s automated transaction monitoring system allegedly “capped” the number of alerts generated for review. What’s more, according to the CMS Assessment, the Bank purportedly set limits on two rules that were run against transaction data to identify “indicia of potentially suspicious activity.” FinCEN alleged that these practices suppressed an “alarming” number of SAR alerts that would have been captured by a risk-based AML compliance program. Thus, according to FinCEN’s characterization based on a look-back review, thousands of SARs were not timely filed as a result, and some may have involved transactions that laundered money.

FinCEN also alleged that the Bank had inadequate compliance personnel, such that even a limited number of alerts could not be properly reviewed. According to the CMP Assessment, even when the Bank had over $340 billion in assets, it employed only about 30 AML investigators. FinCEN stated that this violated the BSA requirement to provide a compliance officer with the resources necessary to fulfill his or her responsibilities.

So, what was the basis for individual liability?

FinCEN alleged that the Chief Operational Risk Officer was individually responsible for these failures during his tenure with the Bank (which began in 2005 and ended in 2014). FinCEN’s pursuit of individual liability seems to be predicated on FinCEN’s belief that the Chief Operational Risk Officer was on notice of the alleged shortcomings of the Bank’s compliance program and failed to act appropriately to address them.

In particular, the CMP Assessment notes that there was precedent for FinCEN’s regulatory action for AML compliance program violations, including concerns about “capping alerts.” According to FinCEN, the regulatory action taken against Wachovia Bank (“Wachovia”) in February 2010 should have been recognized as applicable to the U.S. Bank, since the conduct was similar to that of U.S. Bank. By the way, about that regulatory action? It was taken against Wachovia Bank, the predecessor bank, in February 2010, and FinCEN claimed that the previous action should have been recognized as applicable to U.S. Bank’s situation.

In addition, the CMP Assessment states that officials at U.S. Bank were warned by the OCC that the alert caps could result in an enforcement action for U.S. Bank, and that FinCEN had previously taken action against other banks for the same activity.

Wachovia had been improperly capping the number of alerts generated by its automated transaction monitoring system based on the number of compliance personnel that it had available to review transactions. Wachovia’s “monitoring system was routinely tuned so that the number of alerts generated by the system with respect to international correspondent banks remained constant at around 300 each month,” without any “analysis to determine whether [this] number of monthly alerts was appropriate to actual risk and the number and nature of transactions facilitated.” FinCEN also faulted Wachovia for “fail[ing] to adequately staff the BSA compliance function,” and employing “as few as three individuals” to monitor all of Wachovia’s “correspondent relationships with foreign financial institutions.” 

You might take the position that the Chief Operational Risk Officer saw Wachovia’s situation as constructively more different from U.S. Bank’s own situation, and, to that end, FinCEN appears to have found that certain subordinates in his group actually did discount the applicability of the Wachovia regulatory action to U.S. Bank. Nevertheless, FinCEN’s view was that he should have known, based on his position, that there was clear relevance of the Wachovia action to U.S. Bank’s practices or, based on that observation, he should have conducted further diligence to make an appropriate determination.

In the case of U.S. Bank, the Chief Operational Risk Officer was, according to FinCEN, “advised” by two separate AML officers that the AML transaction monitoring tools were problematic. For example, in 2009, the CMP Assessment details an instance in which an AML officer sent the Chief Operational Risk Officer a memo indicating that an insufficient number of alerts were being investigated. The CMP Assessment also recounts an instance in 2010 in which an AML officer again allegedly warned that “despite increases in SAR volumes, law enforcement inquiries, and closure recommendations, staffing had remained ‘relatively constant’ and ‘dangerously thin.’” According to FinCEN, even though the Chief Operational Risk Officer “did take certain steps to upgrade the AML Program, including advocating for and receiving funding for the replacement of the system in its entirety, his actions were inadequate to correct the deficiencies.”

FinCen asserted that employees understood through internal testing and other means that the inadequate AML policies caused the Bank to fail to identify and report large numbers of suspicious transactions. Subsequent analysis of the Bank’s transactions revealed that it failed to timely file thousands of SARs, including on transactions that potentially laundered the proceeds from crimes.

Although FinCEN determined that the Chief Operational Risk Officer did try to address the deficiencies, it found that his efforts were not enough: he “failed to take sufficient action when presented with significant AML program deficiencies in the Bank’s SAR-monitoring system and the number of staff to fulfill the AML compliance role.” In mid-2012, U.S. Bank hired a new Chief Compliance Officer (“CCO”) and a new AML Officer (AMLO”), both of whom had significant AML experience and had been recruited by the Chief Operational Risk Officer.

The CMP Assessment also states that, by the end of 2012, the new AMLO identified the practice of capping alerts as a “serious risk” (in the words of the CMP Assessment), and the new CCO also raised the issue. Furthermore, according to FinCEN, around November 2013, the new AMLO and CCO prepared a PowerPoint presentation on the AML program, which identified the capping of alerts. FinCEN stated that the issue of alert caps was first on a list of an “Overview of Significant AML Issues,” because, “from their perspective, it was the most pressing of the Bank’s AML issues.” According to FinCEN, the Chief Operational Risk Officer reviewed the presentation “yet failed to raise the issue of the alert caps with the CEO during the meeting, choosing instead to prioritize other compliance-related issues.”

Furthermore, in or about November 2013, a meeting was scheduled at the request of the Bank’s CEO, so that the Chief Operational Risk Officer, AMLO and CCO could update the Chief Executive Officer on the Bank’s AML program.

According to FinCEN, the following took place:

“In advance of that meeting, the AMLO and CCO prepared a PowerPoint presentation that began with an ‘Overview of Significant AML Issues,’ the first of which was ‘Alert volumes capped for both [Security Blanket, an alert system] and [Q]uery detection methods.’ The AMLO and CCO put the alert caps issue first because, from their perspective, it was the most pressing of the Bank’s AML issues. The PowerPoint identified the alert caps as a ‘[c]overage gap’ that ‘could potentially result in missed Suspicious Activity Reports.’ It also said that the ‘[s]ystem configuration and use could be deemed a program weakness, with potential formal actions including fines, orders, and historical review of transactions.’ Prior to the meeting with the CEO, the [Chief Operational Risk Officer] reviewed the PowerPoint, yet failed to raise the issue of the alert caps with the CEO during the meeting, choosing instead to prioritize other compliance-related issues.”

FinCEN alleged that in May 2014, the AMLO bypassed the Chief Operational Risk Officer and emailed the Bank’s then-Chief Risk Officer, outlining steps the AMLO believed were necessary to correct the alert capping issue, but the Bank still did not begin addressing the issues until June 2014 “when questions from the OCC and reports from an internal complainant caused the Bank’s Chief Risk Officer to retain outside counsel to investigate the Bank’s practices.” At that point, FinCEN alleges, the Bank had maintained inappropriate alert caps for “no less than five years.”

According to FinCEN, the communications and warnings to the Chief Operational Risk Officer were sufficient for him to be responsible – and, thus, personally liable – for the Bank’s AML compliance program’s shortcomings. The CMP Assessment states that the civil monetary penalty was appropriate “for his role in the violations of the BSA and its implementing regulations.”

Under the BSA, a civil money penalty of $25,000 may be imposed for each willful violation of the AML program requirement occurring on or before November 2, 2015.[5] The BSA provides that a “separate violation” of the AML program requirement occurs “for each day that the violation continues.”[6] Violations of AML program requirements include the lack of one or more AML program “pillars.” There are four “pillars”: (1) internal controls (i.e., Anti-Money Laundering Program); (2) designation of one or more individuals to assure day-to-day compliance with the BSA/AML; (3) independent testing; and (4) training.

Furthermore, a penalty not to exceed the greater of the amount involved in the transaction (but capped at $100,000) or $25,000 may be imposed for each willful violation of the SAR-filing requirement occurring on or before November 2, 2015.[7]

In my view, FinCEN’s actions should put on notice all AML compliance program personnel and certainly the most responsible individuals charged with its implementation that there can be personal consequences for alleged systemic shortcomings of AML compliance programs.




[1] In the Matter of Michael LaFontaine, Number 2020-01, Department of the Treasury, Financial Crimes Enforcement Network
[2] 31 C.F.R. § 1010.810(a); Treasury Order 180-01 (July 1, 2014); 31 U.S.C. § 5321(a)
[3] In the Matter of Thomas E. Haider, Number 2014-08, Department of the Treasury, Financial Crimes Enforcement Network
[4] See In re U.S. Bank, N.A., FinCEN Assessment No. 2018-01. In February 2018, FinCEN and US Bank entered into a settlement agreement that resolved the claims asserted by FinCEN in the assessment. See Treasury v. U.S. Bank, N.A., No. 18 Civ. 1358 (RWS), Dkt. No. 4 (S.D.N.Y. Feb. 15, 2018).
[5] 31 U.S.C. § 5321(a)(1). Violations of the AML program requirement all occurred before November 2, 2015.
[6] 31 U.S.C. § 5321(a)(1)
[7] 31 U.S.C. § 5321(a)(1); 31 C.F.R. § 1010.820(f). Violations of the SAR-filing requirement all occurred before November 2, 2015.

Personal Liability of AML Compliance Officer

PRINT THIS In the ongoing saga of the Financial Crimes Enforcement Network’s (FinCEN) pursuit of terrorists and various illicit activitie...