{
  "body_html": "<h2>Financial Crime Risks in Check Cashing</h2>\n<p>Check cashing can be used for money laundering. Money laundering means hiding where criminal money came from. Customers receive cash without a bank account. This makes the money harder to trace.</p>\n<p>Terrorism financing is also a risk. A customer does not need to use stolen money. Even money earned legally can be used to fund a terrorist group. The intended use is what creates criminal liability.</p>\n<p>You must screen every transaction against the OFAC Specially Designated Nationals (SDN) List. The SDN List names people and organizations the U.S. government has sanctioned. Completing a transaction with anyone on that list is a federal sanctions violation. Intent does not reduce your liability.</p>\n<p>Watch for these warning signs at Advanced Compliance Technology, Inc.:</p>\n<ul>\n<li><strong>Fake or borrowed ID.</strong> You cannot confirm who is receiving the cash.</li>\n<li><strong>Someone else cashing.</strong> The presenter is not the name on the check. This hides who controls the money.</li>\n<li><strong>Fake payroll checks.</strong> The check is counterfeit, stolen, or altered. These often appear to come from construction or staffing companies.</li>\n<li><strong>Inflated payroll.</strong> The check amount is more than a legitimate job would produce.</li>\n<li><strong>Structuring.</strong> A customer splits transactions to stay below reporting thresholds. Structuring is a federal crime. Processing a transaction that helps someone structure creates criminal exposure for Advanced Compliance Technology, Inc..</li>\n<li><strong>Shell company checks.</strong> Criminal money enters Advanced Compliance Technology, Inc. disguised as payroll and is converted to cash.</li>\n<li><strong>Check kiting.</strong> A customer writes checks from an account with no money, using the delay between banks to access funds that do not exist.</li>\n<li><strong>Terrorism financing.</strong> Cash from check cashing is used to fund wire transfers or bulk cash sent to high-risk destinations.</li>\n</ul>",
  "narration_text": "Check cashing can be used for money laundering. Money laundering means hiding where criminal money came from. Customers receive cash without a bank account. This makes the money harder to trace.\r\n\r\nTerrorism financing is also a risk. A customer does not need to use stolen money. Even money earned legally can be used to fund a terrorist group. The intended use is what creates criminal liability.\r\n\r\nYou must screen every transaction against the OFAC Specially Designated Nationals (SDN) List. The SDN List names people and organizations the U.S. government has sanctioned. Completing a transaction with anyone on that list is a federal sanctions violation. Intent does not reduce your liability.\r\n\r\nWatch for these warning signs at Advanced Compliance Technology, Inc.:\r\n\r\nFake or borrowed ID. You cannot confirm who is receiving the cash.\r\nSomeone else cashing. The presenter is not the name on the check. This hides who controls the money.\r\nFake payroll checks. The check is counterfeit, stolen, or altered. These often appear to come from construction or staffing companies.\r\nInflated payroll. The check amount is more than a legitimate job would produce.\r\nStructuring. A customer splits transactions to stay below reporting thresholds. Structuring is a federal crime. Processing a transaction that helps someone structure creates criminal exposure for Advanced Compliance Technology, Inc..\r\nShell company checks. Criminal money enters Advanced Compliance Technology, Inc. disguised as payroll and is converted to cash.\r\nCheck kiting. A customer writes checks from an account with no money, using the delay between banks to access funds that do not exist.\r\nTerrorism financing. Cash from check cashing is used to fund wire transfers or bulk cash sent to high-risk destinations."
}