Executive Summary
Anti-Money Laundering (AML) compliance has evolved from a banking sector concern to a comprehensive regulatory framework affecting all financial services providers—including private lenders. The expansion of the USA PATRIOT Act, implementation of the Corporate Transparency Act, and FinCEN’s evolving guidance have created substantial compliance obligations that many private lenders underestimate or misunderstand.
As private lending increasingly migrates to digital platforms, the risk profile expands. Online loan origination creates anonymity opportunities that sophisticated money launderers exploit, while regulatory oversight intensifies. The consequence of non-compliance extends beyond regulatory penalties to reputational damage, loss of banking relationships, and potential criminal liability for willful violations.
This comprehensive guide provides private lenders with a practical framework for implementing effective AML compliance programs tailored to the unique risks of real estate-secured lending.
AML Regulatory Framework: What Private Lenders Must Know
The Foundational Statutes
Bank Secrecy Act (BSA) – 1970 Requires financial institutions to maintain records and file reports assisting government agencies in detecting and preventing money laundering.
USA PATRIOT Act – 2001 Expanded BSA requirements post-9/11, creating Customer Identification Program (CIP) requirements and enhanced due diligence obligations.
Anti-Money Laundering Act of 2020 (AMLA) Modernized AML framework, creating beneficial ownership reporting requirements and expanding FinCEN enforcement authority.
Corporate Transparency Act (CTA) – Effective 2024 Requires beneficial ownership information reporting for most entities formed in or registered to do business in the United States.
Do Private Lenders Have AML Obligations?
Entities Subject to Full BSA/AML Requirements:
- State-licensed lenders (CFL, DRE, etc.) conducting substantial volume
- Lenders classified as “financial institutions” under FinCEN definitions
- Mortgage funds accepting investor capital
- Lenders operating through banking partners (compliance often passed through)
- Small private lenders (1-10 loans annually)
- Individual investors making direct loans
- Family offices with limited third-party investor capital
The Five Pillars of AML Compliance for Private Lenders
Pillar 1: Customer Identification Program (CIP)
Identifying Individual Borrowers/Investors
- Full legal name
- Date of birth
- Residential address (NOT P.O. boxes for primary identifier)
- Identification number (SSN or ITIN for US persons; passport for foreign nationals)
- Driver’s license (unexpired)
- Passport
- State-issued ID card
- Credit bureau reports confirming identity
- Public records searches (property ownership, voter registration)
- Third-party identity verification services (LexisNexis, Equifax)
Identifying Entity Borrowers/Investors
- Articles of Organization/Incorporation
- Operating Agreement or Bylaws
- Certificate of Good Standing from formation state
- Employer Identification Number (EIN) letter
- Own 25%+ equity interest (direct or indirect)
- Exercise substantial control over the entity
Pillar 2: Customer Due Diligence (CDD) & Enhanced Due Diligence (EDD)
Standard CDD Requirements
Beyond identity verification, lenders must understand:
- Purpose of loan/investment: Why is the customer seeking financing?
- Source of funds: Where is down payment/equity coming from?
- Expected activity: Is loan structure consistent with customer profile?
Enhanced Due Diligence Triggers
Certain customers require heightened scrutiny:
Foreign Politically Exposed Persons (PEPs): Foreign government officials, senior political party officials, or senior executives of state-owned enterprises.
- Understand source of wealth
- Conduct adverse media searches
- Obtain senior management approval for relationship
- Monitor transactions closely
- OFAC-sanctioned countries (Iran, North Korea, Syria, Cuba, Russia)
- Countries identified by FATF as having strategic AML deficiencies
- Known drug trafficking or terrorist financing hubs
- Understand reason for US real estate transaction
- Verify legitimate source of funds with supporting documentation
- Consider requiring funds wired from recognized financial institutions (not cash)
- Multi-tiered entities obscuring beneficial ownership
- Offshore entities or trusts
- Nominee shareholders or trust arrangements
- Trace ownership to natural persons
- Understand business purpose justifying complex structure
- Obtain detailed documentation of entity structure
- Check cashing services
- Money service businesses
- Casinos or gaming operations
- Restaurants or nightclubs
- Verify business licenses and regulatory compliance
- Review financial statements and tax returns
- Understand cash flow sources
Pillar 3: Ongoing Transaction Monitoring
What to Monitor
How to Implement Transaction Monitoring
Detecting suspicious patterns requires systematic monitoring procedures tailored to your operation size and transaction volume.
Manual Monitoring Procedures (Small Lenders)
For lenders originating fewer than 50 loans/investments annually, manual review procedures can be effective:
- Review all borrower payment activity for the month
- Identify any payments exceeding normal amounts by 20%+
- Verify all third-party payments (payments from entities other than borrower)
- Document review completion and findings
- Review all active loans for early refinancing patterns
- Identify borrowers with multiple transactions within 12 months
- Compare borrower financial profiles to actual payment patterns
- Create summary report of potential concerns
- Compare stated source of funds to borrower/investor financial profile
- Review wire transfer origination (domestic vs. foreign)
- Screen all parties against OFAC SDN list
- Document verification in loan/investment file
Automated Monitoring Systems (Larger Lenders)
Lenders originating 50+ transactions annually should implement technology-based monitoring:
- Payments exceeding 150% of scheduled amount
- Wire transfers from foreign institutions
- Multiple payments from different sources in same month
- Deposits structured below $10,000 reporting threshold
- Customers with rapid refinancing patterns (3+ times in 24 months)
- Investors with in-and-out patterns (invest and redeem within 6 months)
- Geographic clustering from high-risk countries
- Unusual transaction timing (late-night transactions, weekend wires)
- Geographic risk factors
- Entity complexity (multi-tier structures = higher risk)
- Industry risk (cash-intensive businesses = higher risk)
- Transaction characteristics
- Historical behavior patterns
- Total alerts triggered
- Alerts investigated and resolved
- Open investigations requiring escalation
- Trends over time
Monitoring Frequency Standards
- OFAC SDN list matches
- Transactions from sanctioned countries
- Payments exceeding $25,000 from unexpected sources
- Wire transfers from foreign institutions
- Multiple same-day transactions from single customer
- Large cash deposits reported by servicing banks
- Payment pattern deviations (overpayments, third-party payments)
- New customer onboarding for enhanced due diligence triggers
- Investor subscription/redemption activity
- Full portfolio transaction activity
- Customer risk score updates
- Comparison to previous months for trend analysis
- Management reporting on monitoring results
Documentation Requirements
Maintain records demonstrating monitoring effectiveness:
- Date of review
- Transactions/accounts reviewed
- Alerts or anomalies identified
- Actions taken (investigation, escalation, or determination of no concern)
- Reviewer name and signature
- Description of suspicious activity
- Additional information gathered during investigation
- Analysis of whether activity has legitimate explanation
- Decision whether to file SAR or continue monitoring
- Approval by AML Compliance Officer
Escalation Procedures
Clear escalation protocols ensure suspicious activity receives appropriate attention:
- Request additional information from customer (source of funds documentation, explanation of transaction purpose)
- Review customer’s historical activity
- Consult public records or third-party databases
- Document investigation findings
- Reasonable Explanation: Document explanation and close alert (continue normal monitoring)
- Insufficient Information: Request additional documentation from customer
- Suspicious Activity Confirmed: Escalate to Level 3
- Enhanced Monitoring: Flag customer for closer scrutiny without SAR filing
- SAR Filing Required: Suspicious activity meets FinCEN reporting thresholds
- Relationship Termination: Risk profile exceeds acceptable tolerance (terminate borrower relationship or decline investor)
- Present investigation summary
- Obtain approval for SAR filing or relationship termination
- Document management decision
Technology Solutions for Transaction Monitoring
- NICE Actimize: Enterprise-level transaction monitoring and case management
- SAS Anti-Money Laundering: Advanced analytics and behavioral detection
- FICO Falcon: Machine learning-based anomaly detection
- ComplyAdvantage: Risk screening and transaction monitoring
- Sanctions Scanner: Real-time monitoring with OFAC screening
- Unit21: Customizable rule-based monitoring
- Alloy: Identity verification with integrated monitoring
- Jumio: Identity verification and ongoing risk assessment
- Manual spreadsheet tracking: For very small portfolios (under 25 active customers)
- Transaction volume (number of loans/investments annually)
- Customer count (total active borrowers and investors)
- Budget (technology costs vs. manual labor costs)
- Integration requirements (compatibility with existing loan servicing system)
- Regulatory requirements (state-licensed lenders may have specific obligations)
Balancing Effectiveness with Customer Experience
Overly aggressive monitoring creates friction and drives away legitimate customers. Calibrate monitoring to achieve appropriate balance:
- Foreign investors: Enhanced monitoring with lower alert thresholds
- Cash-intensive businesses: Quarterly financial statement review
- Complex entity structures: Annual beneficial ownership re-verification
- Low-risk customers (long-standing borrowers with established payment history): Standard monitoring only
- Minor deviations (payment 10% higher than expected): Note in file, no customer contact
- Moderate concerns (single third-party payment): Email inquiry requesting explanation
- Significant red flags (multiple structuring indicators): Formal investigation with documentation request and AML officer review
- “Our compliance procedures require us to verify the source of funds for transactions exceeding $X. Could you provide documentation showing where these funds originated?”
- “We noticed this payment came from [entity name] rather than your company. Could you help us understand the relationship between these entities for our records?”
- High false-positive rates: Adjust alert thresholds to reduce unnecessary investigations
- Missed suspicious activity: Strengthen monitoring rules
- Customer complaints about documentation requests: Streamline information gathering process
Pillar 4: Suspicious Activity Reporting (SAR)
- Known or suspected violations of federal law
- Transactions with no apparent lawful purpose
- Transactions designed to evade BSA reporting requirements
SAR Filing Triggers for Private Lenders
- Borrower uses loan proceeds to wire funds offshore immediately after closing
- Investor provides cash down payment in small bills ($20s, $50s)
- Multiple transactions just below $10,000 threshold
- Breaking up large transactions into smaller ones
- Borrower provides false identification
- Material misrepresentations about source of funds, employment, or assets
- Transaction involves persons or entities on OFAC SDN list
- Funds originate from sanctioned countries
SAR Filing Process
Pillar 5: AML Program Governance
1. Internal Policies & Procedures Written manual addressing:
- CIP procedures
- CDD/EDD protocols
- Transaction monitoring procedures
- SAR decision-making process
- Recordkeeping requirements
- Training requirements
2. Designated AML Compliance Officer Individual responsible for:
- Overseeing AML program implementation
- Ensuring staff training
- Updating policies as regulations change
- Serving as point of contact for regulators and law enforcement
3. Independent Testing/Audit Annual review by independent party (external auditor or internal audit function independent of AML officer) evaluating:
- Program effectiveness
- Compliance with policies
- Recommendations for improvement
4. Employee Training Annual training for all employees covering:
- AML program overview
- Red flag recognition
- SAR reporting procedures
- Regulatory update highlights
Digital Lending Platforms: Heightened AML Risks
The Online Anonymity Challenge
Traditional brick-and-mortar lending involved face-to-face borrower meetings, allowing lenders to assess credibility and verify identity through personal interaction. Digital lending eliminates this human verification, creating vulnerability to:
Digital Lending AML Enhancements
- ID document authentication (examining security features)
- Selfie comparison using facial recognition
- Knowledge-based authentication (questions only real person could answer)
- Device fingerprinting (detecting multiple applications from same device)
- Application completed suspiciously quickly (suggesting pre-populated information)
- Multiple failed attempts from same IP address
- VPN or proxy usage obscuring true location
- Access from high-risk jurisdictions
- OFAC SDN list screening
- Fraud databases (identify addresses or phone numbers linked to prior fraud)
- Negative news/adverse media searches
Red Flags Requiring Investigation
Transaction Structure Red Flags
| Red Flag | Money Laundering Risk | Recommended Action |
| Borrower requests cash-out refinance immediately after purchase | Rapid equity extraction could indicate purchase with laundered funds, then “cleaning” through refi | Enhanced due diligence on source of purchase funds |
| Investor insists on using third-party wires from unrelated entities | Obscuring true source of funds | Verify beneficial ownership and source of funds with supporting documentation |
| Borrower purchases property significantly above market value | Overpayment may compensate seller for accepting dirty money | Require independent appraisal and investigate seller relationship |
| Customer provides incomplete or evasive answers about source of funds | Potential illegal source being concealed | Escalate to AML officer for enhanced due diligence or SAR consideration |
| Frequent loan prepayments followed by immediate refinancing | Converting cash into “clean” lender checks through prepayments | Monitor pattern and consider SAR if economically irrational |
Customer Behavior Red Flags
| Red Flag | Money Laundering Risk | Recommended Action |
| Customer nervous or uncomfortable during identity verification | Possible identity fraud | Require additional verification; conduct in-person meeting if possible |
| Customer provides multiple phone numbers or addresses but cannot be reached at any | Fictitious contact information | Verify addresses through public records; require utility bills confirming residence |
| Customer’s stated occupation inconsistent with financial capacity | Undisclosed (possibly illegal) income source | Request tax returns or financial statements; consider employment verification |
| Customer unconcerned about interest rate or loan terms | Economic terms irrelevant because purpose is money laundering, not financing | Probe into purpose of loan and source of funds |
| Customer rushes transaction and willing to pay premium for speed | Need to move money quickly before detection | Consider declining transaction if customer cannot provide satisfactory explanation for urgency |
Banking Relationship Protection: Why Your Bank Cares About Your AML Program
The Bank’s Perspective
Your bank’s Bank Secrecy Act Officer (BSAO) is personally responsible for the bank’s AML compliance. When you maintain business accounts with the bank, YOUR activities create risk THEY must monitor and report.
- Frequent large cash deposits (red flag for unbanked business or cash laundering)
- Wire transfers to/from high-risk countries
- Rapid movement of funds in and out of accounts
- Transactions inconsistent with stated business purpose
- Copy of your written AML policy
- Evidence of beneficial ownership verification for your customers
- SAR filing history (number filed, not details)
- Training documentation for staff
- Are you lending in high-risk markets?
- Do you accept foreign investors?
- What is your customer screening process?
Preventing Account Closure
Banks terminate business relationships for:
- Inability to demonstrate adequate AML program
- Frequent SAR filings by the bank based on YOUR account activity
- Lack of cooperation with bank’s information requests
- Perception your business creates unacceptable money laundering risk
Notify Bank of Large Expected Transactions: If you’re about to receive $100,000 wire from investor, proactively notify bank. Unexpected large wires trigger automated alerts.
Building Your AML Compliance Program: Practical Implementation Steps
Step 1: Conduct Risk Assessment
Evaluate your specific money laundering risk profile:
- Percentage of foreign investors/borrowers
- Percentage of entity vs. individual customers
- Customer concentration in high-risk industries
- Average loan/investment size
- Do you lend in border regions?
- Do you accept investors from high-risk countries?
- Do properties you finance have money laundering nexus (casinos nearby, etc.)?
- Offering cash-out refinances (higher risk than purchase-money)?
- Short-term bridge loans (used for rapid fund movement)?
- Large commercial loans to private companies (easier to obscure beneficial ownership)?
Step 2: Draft Written AML Policies
- What ID documents are required?
- Who verifies IDs?
- Where are copies maintained?
- When is beneficial ownership certification required?
- What verification is performed on beneficial owners?
- List specific red flags relevant to your business
- Escalation procedures when red flags identified
- Who makes SAR filing decisions?
- What documentation is required before filing?
- Confidentiality procedures
- Initial training for new employees
- Annual refresher training
- Training documentation procedures
Step 3: Designate AML Compliance Officer
- Understanding of AML regulations
- Authority to implement policies and make SAR decisions
- Independence from sales/production pressures
Step 4: Implement Technology Solutions
- Automated OFAC SDN list screening
- PEP database screening
- Adverse media monitoring
- Document authentication tools
- Facial recognition verification
- Knowledge-based authentication services
- Automated alerts for unusual patterns
- Dashboard summarizing customer activity
- Red flag identification and case management
- ComplyAdvantage (screening and monitoring)
- Jumio (identity verification)
- Trulioo (global identity verification)
- Voxel Verify (real-time verification)
Step 5: Train Your Team
- Overview of money laundering threats to private lending
- CIP requirements and procedures
- Red flag recognition specific to your business
- SAR confidentiality obligations
- Consequences of non-compliance
- Regulatory updates from past year
- Case studies from your business or industry
- Review of policy changes
- Q&A on challenging scenarios encountered
- Training attendance sheets
- Training materials (slides, handouts)
- Post-training quizzes demonstrating comprehension
- Maintain 5 years
Step 6: Conduct Annual Independent Testing
- Policy compliance: Are procedures being followed?
- Effectiveness: Are red flags being detected and escalated?
- Completeness: Are all required program elements in place?
- Recommendations: What improvements are needed?
- External consultant (for smaller lenders)
- Internal audit department (for larger organizations)
- Legal counsel with AML expertise
Consequences of AML Non-Compliance
Regulatory Penalties
- Civil penalties up to $250,000 per violation
- Criminal penalties for willful violations: up to $500,000 and/or 10 years imprisonment
- License suspension or revocation
- Fines and penalties
- Consent orders requiring remediation
Banking Relationship Loss
Reputational Damage
- Raise capital from institutional investors
- Partner with other lenders
- Attract quality borrowers
Conclusion: AML as Competitive Advantage
While AML compliance requires investment in policies, technology, and training, sophisticated lenders recognize these systems as competitive advantages:
At Geraci LLP, we assist private lenders in developing tailored AML compliance programs meeting regulatory requirements while remaining practical and cost-effective for your operation size and risk profile.
For questions about AML compliance program development, beneficial ownership verification requirements, or SAR filing obligations, contact Geraci LLP’s compliance team.
© 2025 Geraci LLP. All Rights Reserved.