I. Introduction
Money laundering regulation in the Philippines is principally governed by Republic Act No. 9160, otherwise known as the Anti-Money Laundering Act of 2001, as amended by later statutes including Republic Act Nos. 9194, 10167, 10365, 10927, and 11521. The law created the country’s anti-money laundering framework, established the Anti-Money Laundering Council, and imposed reporting, recordkeeping, customer due diligence, and compliance duties on covered persons and institutions.
The Philippine anti-money laundering regime is preventive, investigative, and punitive. It requires covered persons to know their customers, monitor transactions, keep records, report certain transactions, and cooperate with lawful inquiries. These requirements are designed to prevent the financial system and other regulated sectors from being used to conceal, transfer, or legitimize proceeds of unlawful activity.
Although money laundering is often associated with banks, the Philippine framework is broader. It applies not only to banks and financial institutions, but also to insurance companies, securities dealers, foreign exchange dealers, remittance companies, casinos, real estate developers and brokers, and certain professional service providers when they perform covered activities.
II. Legal Framework
The core legal instruments governing money laundering reporting in the Philippines include:
- Republic Act No. 9160, the Anti-Money Laundering Act of 2001, as amended;
- Republic Act No. 10168, the Terrorism Financing Prevention and Suppression Act;
- Republic Act No. 11479, the Anti-Terrorism Act of 2020, insofar as freezing and terrorism-financing controls are concerned;
- Implementing Rules and Regulations issued by the Anti-Money Laundering Council;
- Regulations and circulars issued by supervisory authorities such as the Bangko Sentral ng Pilipinas, Securities and Exchange Commission, Insurance Commission, Philippine Amusement and Gaming Corporation, and other competent authorities.
The AMLA establishes both the offense of money laundering and the compliance system through which covered persons must detect and report potentially suspicious financial activity.
III. The Anti-Money Laundering Council
The Anti-Money Laundering Council, commonly called the AMLC, is the central authority responsible for implementing the Philippine anti-money laundering regime.
The AMLC is composed of:
- the Governor of the Bangko Sentral ng Pilipinas, as Chairperson;
- the Chairperson of the Securities and Exchange Commission;
- the Insurance Commissioner.
The AMLC is empowered to receive and analyze covered transaction reports and suspicious transaction reports, investigate money laundering and terrorism financing, institute civil forfeiture proceedings, seek freeze orders, and coordinate with domestic and foreign authorities.
It is also the Philippine financial intelligence unit. Covered persons submit required reports to the AMLC, which uses such reports to detect possible laundering, financing of terrorism, predicate crimes, and related illicit financial activity.
IV. What Is Money Laundering?
Under Philippine law, money laundering is committed when a person, knowing that a monetary instrument or property represents, involves, or relates to the proceeds of an unlawful activity, transacts or attempts to transact such monetary instrument or property.
Money laundering may also be committed by converting, transferring, disposing of, moving, acquiring, possessing, using, concealing, disguising, or facilitating transactions involving proceeds of unlawful activity.
The offense is not limited to the person who committed the predicate crime. A person who assists, facilitates, or participates in the laundering of criminal proceeds may be liable even if that person was not the original offender in the underlying unlawful activity.
Money laundering usually involves three stages:
- Placement, where illicit funds enter the financial system;
- Layering, where transactions are used to obscure the source, ownership, or trail of the funds;
- Integration, where the funds appear to have legitimate origin.
Philippine reporting requirements are designed to detect these stages, especially unusual patterns, unexplained movement of funds, nominee arrangements, inconsistent customer profiles, and structured transactions.
V. Predicate or Unlawful Activities
The AMLA applies to proceeds derived from specified unlawful activities. These include, among others, kidnapping for ransom, drug trafficking, graft and corruption, plunder, robbery and extortion, swindling, smuggling, violations of securities laws, human trafficking, terrorism financing, tax evasion under certain conditions, cybercrime-related offenses, environmental crimes, and other serious offenses listed by law.
The reporting duty does not require the covered person to prove that a predicate offense was committed. The duty arises when a transaction is covered or suspicious under the statutory and regulatory standards.
This is important: reporting is a compliance obligation, not a judicial finding of guilt. A suspicious transaction report does not by itself establish that the customer committed money laundering. It signals that the transaction warrants examination by the AMLC.
VI. Covered Persons
Reporting obligations apply to covered persons, which include both natural and juridical persons subject to AML regulation.
A. Banks and Financial Institutions
Covered persons include banks, offshore banking units, quasi-banks, trust entities, non-stock savings and loan associations, pawnshops, foreign exchange dealers, money changers, remittance and transfer companies, electronic money issuers, virtual asset service providers when regulated, and other institutions supervised by the Bangko Sentral ng Pilipinas.
Banks are among the most heavily regulated covered persons because they are common channels for placement, layering, and integration of illicit funds.
B. Insurance Sector
Insurance companies, pre-need companies, insurance agents and brokers, and other entities supervised by the Insurance Commission are covered persons when they conduct activities that may be used to move, store, or disguise value.
Insurance products can be misused through excessive premiums, early redemption, third-party payments, beneficiary manipulation, or policy loans funded by illicit proceeds.
C. Securities and Investment Sector
Securities dealers, brokers, investment houses, mutual funds, investment companies, and other entities supervised by the Securities and Exchange Commission are covered persons.
Money laundering risk may arise from rapid movement of funds through securities accounts, market manipulation schemes, nominee accounts, layering through investments, and unusual trading inconsistent with a customer’s known profile.
D. Casinos
Casinos, including internet-based and ship-based casinos operating in the Philippines, are covered persons. Casino operators must comply with customer identification, recordkeeping, and reporting requirements.
Casino-related laundering may occur through chip purchases, minimal gaming, chip redemption, third-party funding, junket arrangements, and conversion of illicit cash into apparent gambling winnings.
E. Designated Non-Financial Businesses and Professions
The AMLA also covers certain non-financial businesses and professions, including:
- jewelry dealers in precious metals and stones for covered transactions;
- company service providers;
- lawyers and accountants when they prepare for or carry out transactions for clients concerning specified activities.
These specified activities may include managing client money, securities, or other assets; managing bank, savings, or securities accounts; organizing contributions for the creation, operation, or management of companies; and creating, operating, or managing juridical persons or arrangements.
However, lawyers and accountants are not covered when acting in circumstances protected by attorney-client privilege or professional secrecy, particularly when information is obtained in relation to legal advice or litigation, subject to the limits recognized by law.
F. Real Estate Developers and Brokers
Real estate developers and brokers are covered persons under later amendments to the AMLA. This reflects the risk that real property may be used to integrate illicit proceeds into the legitimate economy.
Common risks include purchases through cash, nominees, corporations, undervalued or overvalued sales, rapid resale, unexplained funding, foreign buyers with opaque source of funds, and purchases inconsistent with declared income.
VII. Covered Transactions
A covered transaction is a transaction in cash or other equivalent monetary instrument involving a total amount above the statutory threshold within the relevant period.
Under the AMLA framework, the general threshold for covered transactions is commonly understood as transactions involving more than ₱500,000 within one banking day, subject to specific sectoral rules and amendments.
For casinos, the threshold is different. Casino covered transactions generally involve cash transactions above the applicable casino reporting threshold, which has been set at ₱5,000,000 or its equivalent in any other currency.
For real estate-related covered persons, transactions involving real property above the statutory threshold may trigger reporting obligations, particularly where payment or transaction value reaches the amount prescribed by law and regulations.
Covered transaction reporting is threshold-based. It does not necessarily require suspicion. If the transaction meets the legal threshold and falls within the reporting rule, it must be reported even if it appears legitimate.
VIII. Suspicious Transactions
A suspicious transaction is reportable regardless of amount when circumstances suggest that the transaction may involve unlawful activity, money laundering, terrorism financing, or an attempt to evade AML controls.
Under Philippine AML rules, a transaction may be suspicious when:
- there is no underlying legal or trade obligation, purpose, or economic justification;
- the customer is not properly identified;
- the amount involved is not commensurate with the customer’s business or financial capacity;
- the transaction is structured to avoid reporting requirements;
- the transaction deviates from the customer’s profile or previous transactions;
- the transaction appears to have no apparent economic or lawful purpose;
- the customer refuses or is unable to provide required information;
- the transaction is related to an unlawful activity or known criminal conduct;
- the transaction is unusually complex or involves unusual patterns;
- the transaction appears designed to conceal the true beneficial owner.
Suspicious transaction reporting is risk-based and judgment-driven. Covered persons must not ignore warning signs merely because the transaction amount is below the covered transaction threshold.
IX. Covered Transaction Reports and Suspicious Transaction Reports
The two principal reports under the AMLA are:
- Covered Transaction Reports, or CTRs;
- Suspicious Transaction Reports, or STRs.
A. Covered Transaction Reports
A CTR is filed when a transaction meets the statutory monetary threshold. The filing is mandatory when the amount and transaction type fall within the rule.
The purpose of a CTR is to give the AMLC visibility over large-value transactions that may be relevant to money laundering analysis.
A CTR does not imply wrongdoing. It is an automatic reporting mechanism based on objective criteria.
B. Suspicious Transaction Reports
An STR is filed when suspicious circumstances exist. Unlike a CTR, an STR is based on qualitative indicators.
The covered person must evaluate customer profile, source of funds, transaction pattern, business purpose, beneficial ownership, geographic risk, and other relevant factors.
An STR must be filed even if the suspicious transaction is attempted but not completed. Attempted transactions are important because criminals may test controls, abandon transactions when asked for documents, or attempt to use another institution.
X. Reporting Periods
Covered persons must submit reports to the AMLC within the periods prescribed by law and regulation.
Traditionally, covered transaction reports and suspicious transaction reports must be filed within a short period from the occurrence of the transaction or determination of suspicion. The applicable period has generally been understood as within five working days, subject to AMLC rules and regulatory issuances that may prescribe form, manner, electronic submission, or extended periods in justifiable cases.
The critical compliance point is that reporting must be prompt. Delay may expose the covered person, responsible officers, and compliance personnel to regulatory sanctions.
The period for filing an STR may be reckoned not merely from the date of the transaction but from the date the covered person forms suspicion or determines that suspicious circumstances exist, depending on the applicable rule and facts. Institutions should document when red flags were detected, when internal review began, and when suspicion was determined.
XI. Electronic Filing and AMLC Registration
Covered persons are generally required to register with the AMLC’s reporting system and submit reports electronically in the prescribed format.
Electronic reporting enables the AMLC to receive standardized information, conduct data analytics, identify patterns, and connect reports across institutions and sectors.
Covered persons must ensure that their reporting systems are accurate, secure, and capable of timely submission. Manual workarounds should not be relied upon as a normal compliance method.
Important reporting data usually includes:
- customer identity;
- account or transaction details;
- amount and currency;
- date and place of transaction;
- nature and purpose of transaction;
- source and destination of funds;
- beneficial owner information;
- counterparties;
- narrative explanation for suspicious transaction reports;
- supporting indicators and red flags.
A weak STR narrative may reduce the usefulness of the report. A good STR explains what happened, why it is unusual, what customer profile was expected, what red flags were observed, and what documents or facts support the suspicion.
XII. Customer Due Diligence
Reporting obligations cannot function properly without customer due diligence. Covered persons must identify and verify customers, understand the nature of the business relationship, determine beneficial ownership, and monitor transactions.
Customer due diligence includes:
- identifying the customer;
- verifying identity using reliable, independent source documents, data, or information;
- identifying beneficial owners;
- understanding the purpose and intended nature of the relationship;
- conducting ongoing monitoring;
- updating customer information;
- applying enhanced due diligence for higher-risk customers.
CDD must generally be performed before establishing a business relationship or carrying out covered transactions, subject to limited exceptions under applicable rules.
XIII. Beneficial Ownership
A key part of Philippine AML reporting is identifying the beneficial owner. The beneficial owner is the natural person who ultimately owns or controls the customer or on whose behalf a transaction is conducted.
For corporations, partnerships, trusts, foundations, associations, and other juridical arrangements, covered persons must look beyond nominal ownership. They must identify the individuals who ultimately control or benefit from the entity.
Beneficial ownership issues commonly arise when:
- the customer is a shell company;
- ownership is layered through several corporations;
- shareholders are nominees;
- the entity is incorporated in a secrecy jurisdiction;
- a person acts under a power of attorney;
- funds come from or go to third parties;
- control is exercised through family members or close associates;
- directors or officers appear to be mere fronts.
Failure to identify beneficial ownership can impair reporting and expose the institution to regulatory risk.
XIV. Risk-Based Approach
The Philippine AML framework follows a risk-based approach. Covered persons are expected to identify, assess, monitor, manage, and mitigate money laundering and terrorism financing risks.
A risk-based approach means that not all customers and transactions are treated the same. Higher-risk customers require deeper scrutiny, while lower-risk customers may be subject to simplified measures when allowed.
Risk factors include:
- customer type;
- occupation or business;
- source of funds;
- transaction size and frequency;
- geography;
- delivery channel;
- product or service type;
- beneficial ownership structure;
- political exposure;
- adverse media or law enforcement information.
The risk-based approach does not eliminate mandatory reporting. A transaction that meets the covered transaction threshold must still be reported. A suspicious transaction must still be reported regardless of whether the customer is otherwise low-risk.
XV. Enhanced Due Diligence
Enhanced due diligence is required for higher-risk situations. It may include:
- obtaining additional identification documents;
- verifying source of funds and source of wealth;
- requiring senior management approval;
- conducting adverse media checks;
- reviewing beneficial ownership more deeply;
- increasing transaction monitoring frequency;
- requiring more detailed explanations for transactions;
- examining the customer’s business model;
- validating declared income or financial capacity;
- monitoring related accounts and counterparties.
Enhanced due diligence is especially relevant for politically exposed persons, high-net-worth individuals with unexplained wealth, cross-border transactions, private banking, foreign corporations, casinos, real estate acquisitions, and complex legal structures.
XVI. Politically Exposed Persons
A politically exposed person, or PEP, is an individual who is or has been entrusted with a prominent public position, as well as certain family members and close associates.
PEPs are not prohibited customers. However, they present higher corruption, bribery, and abuse-of-office risks.
Covered persons dealing with PEPs should apply enhanced due diligence, including:
- senior management approval;
- establishing source of wealth and source of funds;
- closer monitoring;
- scrutiny of unusual transactions;
- attention to family members, associates, and controlled entities.
The reporting obligation arises when transactions involving a PEP are covered or suspicious. Suspicion may arise where transaction values are inconsistent with lawful income, funds move through nominees, government contracts appear relevant, or transactions involve unexplained offshore structures.
XVII. Recordkeeping Requirements
Covered persons must keep records of customer identification and transactions for the period required by law and regulation.
The AMLA generally requires covered persons to maintain records for at least five years from the date of transaction or account closure, subject to specific rules. If a case has been filed in court involving the account or transaction, records must generally be retained until the case is finally resolved.
Records should be sufficient to reconstruct transactions and support regulatory review, AMLC inquiry, or prosecution.
Records include:
- account opening documents;
- identification documents;
- customer information sheets;
- beneficial ownership records;
- transaction records;
- wire transfer information;
- internal investigation files;
- STR and CTR support documents;
- risk assessments;
- correspondence with customers;
- compliance approvals;
- account closure records.
Good recordkeeping is essential because money laundering investigations often occur long after the transaction.
XVIII. Wire Transfers and Funds Transfers
Funds transfers are a major focus of AML controls. Covered persons must obtain and retain originator and beneficiary information for wire transfers and remittances.
Relevant information may include:
- name of originator;
- originator account number or reference number;
- originator address or identification details;
- beneficiary name;
- beneficiary account number;
- transaction amount;
- date;
- purpose or remittance information, where required.
Red flags in funds transfers include:
- rapid movement of funds through multiple accounts;
- transfers to or from high-risk jurisdictions;
- multiple small transfers structured below thresholds;
- inconsistent purpose descriptions;
- third-party remitters unrelated to the customer;
- circular movement of funds;
- use of newly opened accounts for large transfers;
- transactions involving shell entities;
- multiple remitters sending to one beneficiary;
- one remitter sending to many unrelated beneficiaries.
XIX. Prohibition Against Tipping Off
Covered persons, officers, employees, and agents must not disclose to the customer or unauthorized persons that a covered transaction report or suspicious transaction report has been or will be filed.
This is known as the prohibition against tipping off.
Tipping off undermines investigations by warning suspects, allowing them to move funds, destroy evidence, close accounts, or flee. It may expose the disclosing person and institution to liability.
Institutions should train employees to handle customer inquiries carefully. For example, if a customer asks why documents are being requested, staff should refer to general regulatory or account review requirements rather than disclosing that an STR is being considered.
XX. Safe Harbor for Reporting
The AMLA provides protection for covered persons and their officers and employees who report covered or suspicious transactions in good faith.
This safe harbor is necessary because reporting may involve sensitive customer information. Covered persons should not be deterred from filing required reports by fear of breach of confidentiality, bank secrecy, or civil liability, provided that the report is made in accordance with law and in good faith.
However, safe harbor does not protect malicious, knowingly false, or bad-faith reporting. Institutions should maintain documentation supporting the basis for suspicion.
XXI. Bank Secrecy and AML Reporting
The Philippines has strong bank secrecy laws, including laws on bank deposits and foreign currency deposits. However, AMLA reporting obligations operate as statutory exceptions in specific circumstances.
Covered persons must submit required reports to the AMLC notwithstanding ordinary confidentiality obligations. The AMLC may also seek authority to inquire into bank deposits and related accounts in accordance with the AMLA and applicable judicial requirements, subject to exceptions provided by law.
The relationship between bank secrecy and AML enforcement has historically been a sensitive issue in the Philippines. The AMLA attempts to balance financial privacy with the need to detect and prevent laundering of criminal proceeds.
XXII. Freeze Orders
The AMLC may seek the freezing of monetary instruments or properties related to unlawful activity, money laundering, or terrorism financing under the conditions provided by law.
For money laundering cases, freeze authority generally involves court processes. In terrorism financing and related cases, separate statutory mechanisms may apply.
A freeze order preserves assets while investigation, prosecution, or forfeiture proceedings are pursued. It prevents the dissipation, transfer, withdrawal, or concealment of suspected illicit assets.
Covered persons receiving freeze orders must comply strictly and promptly. They should identify affected accounts or properties, prevent prohibited movement, preserve records, and report compliance to the proper authority.
XXIII. Civil Forfeiture
Civil forfeiture allows the government to recover monetary instruments or properties related to unlawful activity or money laundering even apart from criminal conviction, subject to the procedures and standards provided by law.
The AMLC may institute civil forfeiture proceedings when there is probable cause that assets are connected to unlawful activity.
Reporting by covered persons often provides the intelligence foundation for asset tracing, freeze applications, and forfeiture proceedings.
XXIV. Internal AML Compliance Program
Covered persons must maintain an effective AML compliance program. This typically includes:
- board and senior management oversight;
- written policies and procedures;
- customer due diligence processes;
- beneficial ownership identification;
- transaction monitoring;
- covered and suspicious transaction reporting;
- recordkeeping;
- employee training;
- independent audit;
- compliance officer designation;
- risk assessment;
- sanctions screening;
- reporting escalation procedures;
- periodic review and updating.
The compliance program must be proportionate to the covered person’s size, nature of business, complexity, products, customers, and risk exposure.
A paper program is not enough. Regulators expect actual implementation, documented decisions, trained staff, functioning systems, and management accountability.
XXV. Role of the Compliance Officer
Covered persons must designate responsible officers or compliance personnel to oversee AML compliance.
The compliance officer is typically responsible for:
- implementing AML policies;
- receiving internal alerts;
- reviewing suspicious activity;
- deciding or recommending STR filing;
- ensuring timely CTR submission;
- maintaining AML records;
- coordinating with regulators;
- conducting training;
- monitoring regulatory developments;
- reporting to senior management or the board.
The compliance officer must have sufficient authority, independence, access to information, and resources.
Institutions should avoid placing AML responsibility on officers who lack control, access, or institutional support. AML compliance is ultimately a governance responsibility, not merely a clerical task.
XXVI. Internal Escalation of Suspicious Activity
Employees who detect red flags should escalate them internally according to the institution’s AML policy.
An internal escalation process should identify:
- who receives the report;
- what information must be provided;
- how urgent cases are handled;
- when accounts may be restricted;
- who decides whether to file an STR;
- how the decision is documented;
- how confidentiality is preserved;
- how customer communication is handled.
The institution should document both decisions to file and decisions not to file. A decision not to file may later be questioned by regulators, especially if clear red flags were present.
XXVII. Transaction Monitoring
Covered persons must monitor transactions to ensure that they are consistent with the customer’s profile and stated business.
Monitoring may be manual, automated, or a combination of both, depending on the size and complexity of the institution.
Transaction monitoring should detect:
- threshold breaches;
- structuring;
- unusual volume;
- unusual frequency;
- rapid movement of funds;
- dormant account reactivation;
- transactions inconsistent with occupation;
- high-risk counterparties;
- unusual geographic patterns;
- multiple accounts used together;
- transactions involving sanctions or watchlist names;
- activity inconsistent with expected source of funds.
Automated systems should be calibrated. Excessive false positives may overwhelm compliance staff, while weak rules may miss suspicious activity.
XXVIII. Structuring and Smurfing
Structuring occurs when transactions are deliberately broken into smaller amounts to avoid reporting thresholds. Smurfing is a form of structuring involving multiple persons or accounts conducting smaller transactions.
Examples include:
- depositing ₱490,000 repeatedly instead of one larger amount;
- using several branches on the same day;
- using multiple accounts under related names;
- splitting remittances among family members;
- buying cashier’s checks or monetary instruments in smaller amounts;
- spreading casino chip purchases across individuals;
- staging real estate payments through multiple buyers or entities.
Structuring is a major red flag and may require an STR even if no single transaction exceeds the covered transaction threshold.
XXIX. Source of Funds and Source of Wealth
A common reporting issue is whether the customer can adequately explain the source of funds or source of wealth.
Source of funds refers to the origin of the specific money used in a transaction. Source of wealth refers to the broader origin of the customer’s total wealth.
For example, a customer buying real estate may claim the purchase money came from business income. The covered person may need to determine whether the business plausibly generated that amount, whether tax or business records support the claim, and whether the funds came from the customer or an unrelated third party.
Unexplained source of funds may create suspicion. This is especially true when the customer is a public official, a nominee, a high-risk foreign national, or a person with no apparent lawful income.
XXX. Shell Companies and Nominees
Shell companies are entities with little or no real business activity. They may be used to hide ownership, move funds, or hold assets.
Nominees are persons who appear as owners or signatories but act for someone else.
Red flags include:
- no physical office;
- no employees;
- vague business purpose;
- recently incorporated entity conducting large transactions;
- common address shared with many unrelated entities;
- directors who are young, elderly, low-income, or unrelated to the business;
- complex ownership without commercial reason;
- third-party funding;
- reluctance to disclose beneficial owners;
- use of corporate vehicles to buy personal assets.
Covered persons must identify beneficial owners and determine whether the transaction has legitimate economic purpose.
XXXI. Real Estate Reporting Risks
Real estate is attractive for money laundering because it can absorb large amounts of value, appreciate over time, and appear legitimate.
Common money laundering typologies in Philippine real estate include:
- cash purchases of high-value property;
- purchases through corporations or nominees;
- undervaluation or overvaluation of sale price;
- rapid resale without economic reason;
- purchase by persons with no visible income;
- payment by unrelated third parties;
- use of offshore companies;
- acquisition by politically exposed persons through relatives;
- multiple condominium units bought by one group;
- payments from high-risk jurisdictions.
Real estate developers and brokers must conduct customer due diligence, identify beneficial owners, maintain records, and report covered or suspicious transactions.
XXXII. Casino Reporting Risks
Casinos are vulnerable because they handle large amounts of cash and chips.
Suspicious casino activity may include:
- buying chips with cash and redeeming them after minimal play;
- using multiple persons to buy chips;
- chip transfers between unrelated players;
- use of junket operators to obscure source of funds;
- repeated cash-in and cash-out without meaningful gambling;
- third-party payment for gaming activity;
- requests for casino checks in another person’s name;
- use of foreign currency from unexplained sources;
- refusal to provide identification;
- transactions involving high-risk jurisdictions.
Casino covered persons must maintain AML controls comparable to the risk profile of gaming operations.
XXXIII. Lawyers, Accountants, and Privilege
The AMLA’s application to lawyers and accountants is carefully limited.
Lawyers and accountants may become covered persons when they prepare for or carry out covered transactions for clients, such as managing client funds, organizing companies, or buying and selling business entities or real estate.
However, legal professionals are generally not required to report information obtained in circumstances protected by attorney-client privilege or professional secrecy.
This balance is important. The law seeks to prevent misuse of professional services while preserving the confidentiality necessary for legal advice and representation.
A lawyer acting as a legal advocate in litigation is different from a lawyer acting as a financial intermediary, nominee incorporator, asset manager, or transaction arranger.
XXXIV. Tax Crimes and Money Laundering
Tax-related offenses may serve as predicate offenses under Philippine AML law when the statutory conditions are met.
This has important implications because funds derived from tax evasion or fraudulent tax schemes may be treated as proceeds of unlawful activity.
Covered persons should be alert to:
- customers with large funds inconsistent with declared business;
- unexplained cash-intensive operations;
- invoices that appear fictitious;
- circular payments among related companies;
- sudden wealth without tax documentation;
- requests to avoid documentation;
- use of personal accounts for corporate revenues;
- cross-border transfers inconsistent with tax profile.
A covered person is not a tax auditor, but obvious inconsistencies may contribute to suspicion.
XXXV. Terrorism Financing Reporting
Terrorism financing is related to but distinct from money laundering. Money laundering usually involves proceeds of crime. Terrorism financing may involve funds from lawful or unlawful sources used to support terrorism or terrorist organizations.
Covered persons must monitor and report suspicious transactions related to terrorism financing.
Red flags include:
- transactions involving designated persons or organizations;
- small but frequent transfers to conflict areas;
- accounts collecting funds from many unrelated persons;
- charitable organizations with opaque beneficiaries;
- use of remittance channels to high-risk areas;
- transactions inconsistent with customer profile;
- adverse information linking persons to extremist activity.
Terrorism financing controls may also involve sanctions screening, freezing obligations, and coordination with competent authorities.
XXXVI. Sanctions and Watchlist Screening
Covered persons should screen customers, beneficial owners, counterparties, and relevant parties against applicable sanctions lists, watchlists, and negative information sources.
Screening should occur:
- at onboarding;
- periodically during the relationship;
- before significant transactions;
- when sanctions lists are updated;
- when beneficial ownership changes;
- when alerts arise.
A sanctions or watchlist match should be reviewed carefully to determine whether it is a true match. True matches may require freezing, rejection, reporting, or other regulatory action depending on the applicable law.
XXXVII. Data Privacy and AML Compliance
AML compliance involves collecting and processing personal information. Covered persons must reconcile AML obligations with the Data Privacy Act.
Processing personal data for AML purposes is generally grounded in legal obligation and legitimate regulatory compliance. However, covered persons should still observe privacy principles, including proportionality, security, retention discipline, and restricted access.
Customers should be informed through appropriate privacy notices that their information may be processed and disclosed as required by law.
Data privacy cannot be used as a reason to refuse lawful AML reporting. At the same time, AML information should not be casually shared beyond authorized personnel and authorities.
XXXVIII. Confidentiality of AML Reports
CTRs and STRs are confidential. They are submitted to the AMLC and should not be disclosed to customers or unauthorized third parties.
Internal access should be limited to personnel with a legitimate compliance need. Institutions should control access to AML systems, investigation files, STR narratives, and regulatory correspondence.
Confidentiality protects both the investigation and the reporting institution.
XXXIX. Penalties for Non-Compliance
Violations of AML requirements may result in criminal, civil, administrative, and regulatory consequences.
Possible consequences include:
- fines;
- imprisonment for money laundering offenses;
- administrative sanctions;
- suspension or revocation of licenses;
- regulatory enforcement actions;
- reputational damage;
- civil forfeiture;
- personal liability of responsible officers;
- enhanced regulatory scrutiny;
- restrictions on business operations.
Failure to report covered or suspicious transactions, failure to maintain records, malicious reporting, tipping off, and refusal to comply with lawful AMLC or regulatory requirements may carry liability.
Regulators may also penalize weak AML systems even where no specific laundering transaction has been proven.
XL. Corporate Governance and Board Responsibility
AML compliance is a board and senior management responsibility. The board must ensure that the institution has an effective AML framework, adequate resources, competent compliance personnel, and a culture of compliance.
The board should approve AML policies, review risk assessments, receive compliance reports, and ensure remediation of audit or regulatory findings.
Senior management must implement the board-approved framework and ensure that business units do not override compliance concerns for profit.
A strong AML culture means that revenue generation does not excuse weak due diligence, ignored red flags, or delayed reporting.
XLI. Independent Audit
Covered persons should subject AML compliance to independent audit. The audit may be internal or external depending on regulatory requirements and the institution’s risk profile.
AML audit should review:
- customer due diligence files;
- risk rating methodology;
- transaction monitoring alerts;
- CTR filing accuracy;
- STR investigation quality;
- timeliness of reporting;
- record retention;
- sanctions screening;
- staff training;
- governance and oversight;
- remediation of prior findings.
Audit findings should be tracked until resolved.
XLII. Employee Training
Employees must be trained to recognize money laundering and terrorism financing risks.
Training should cover:
- legal obligations;
- customer identification;
- beneficial ownership;
- red flags;
- covered transaction reporting;
- suspicious transaction reporting;
- tipping-off prohibition;
- internal escalation;
- sanctions screening;
- recordkeeping;
- sector-specific risks.
Frontline personnel, relationship managers, tellers, brokers, casino staff, real estate agents, and compliance personnel require training tailored to their functions.
Training should not be purely formal. Employees must understand how to detect suspicious behavior in real transactions.
XLIII. Common Red Flags
Common AML red flags in the Philippine context include:
- customer refuses to provide identification;
- customer gives inconsistent information;
- customer uses nominees without explanation;
- transaction amount is inconsistent with income;
- frequent cash deposits below threshold;
- rapid movement of funds in and out of accounts;
- multiple accounts with no clear purpose;
- funds pass through without business reason;
- transactions involve high-risk jurisdictions;
- customer is linked to adverse media;
- customer is a PEP with unexplained wealth;
- real estate purchase is paid by unrelated third parties;
- casino chips are redeemed after minimal play;
- company has no real operations;
- beneficial owner is hidden;
- use of personal accounts for business transactions;
- sudden activity in dormant accounts;
- repeated amendment or cancellation of transactions;
- large remittances inconsistent with occupation;
- customers become evasive when asked about source of funds.
A single red flag may not always require an STR, but multiple red flags or an unresolved material concern usually warrant escalation and possible reporting.
XLIV. Attempted Transactions
Attempted suspicious transactions are reportable. A customer who refuses to proceed after being asked for identification or source-of-funds documents may still trigger an STR.
Examples include:
- customer attempts a large cash deposit but leaves when asked for ID;
- customer seeks to buy property through a nominee but refuses beneficial ownership disclosure;
- customer attempts to remit funds to a high-risk recipient but cancels when questioned;
- customer tries to redeem casino chips through another person;
- customer refuses to explain source of wealth.
Attempted transactions matter because they may show intent to use the institution for laundering.
XLV. De-Risking and Account Closure
Covered persons may terminate or refuse business relationships when customer risk cannot be managed. However, de-risking must be handled carefully.
Before closing an account, an institution should consider:
- whether an STR should be filed;
- whether closure would constitute tipping off;
- whether funds are subject to freeze or inquiry;
- whether regulatory guidance applies;
- whether there are contractual obligations;
- how to document the decision.
Account closure is not a substitute for reporting. If suspicious circumstances exist, the institution must consider STR filing even if the relationship is terminated.
XLVI. Interaction with Law Enforcement
Covered persons generally should not conduct criminal investigations beyond their compliance function. Their role is to identify, monitor, document, and report.
The AMLC and law enforcement agencies investigate and prosecute money laundering and predicate offenses.
Covered persons must cooperate with lawful requests, subpoenas, freeze orders, bank inquiry orders, and other official processes, while preserving confidentiality and customer rights.
XLVII. Cross-Border Cooperation
Money laundering is often transnational. Funds may move through foreign banks, offshore companies, remittance channels, digital platforms, and trade transactions.
The AMLC may cooperate with foreign financial intelligence units and international counterparts, subject to law. Philippine covered persons may also be part of multinational groups that apply global AML standards.
Cross-border transactions require attention to foreign laws, sanctions, high-risk jurisdictions, correspondent relationships, and beneficial ownership opacity.
XLVIII. Digital Finance, E-Money, and Virtual Assets
Modern laundering risks increasingly involve electronic money, online platforms, virtual assets, and fast digital transfers.
Covered persons in the digital finance space must address risks such as:
- remote onboarding fraud;
- mule accounts;
- identity theft;
- phishing proceeds;
- rapid wallet-to-wallet transfers;
- conversion between fiat and virtual assets;
- layering through multiple platforms;
- use of foreign exchanges;
- anonymity-enhancing tools;
- cybercrime proceeds.
Virtual asset service providers, where covered by Philippine regulation, must conduct customer due diligence, monitor transactions, retain records, and report covered or suspicious transactions.
XLIX. Trade-Based Money Laundering
Trade-based money laundering involves disguising illicit value through trade transactions.
Common methods include:
- over-invoicing;
- under-invoicing;
- multiple invoicing;
- false description of goods;
- phantom shipments;
- misclassification of goods;
- unusual shipping routes;
- payments inconsistent with trade documents;
- related-party trade without commercial logic;
- use of shell importers or exporters.
Banks and financial institutions handling trade finance must examine documents, counterparties, pricing anomalies, and transaction patterns.
L. Practical Compliance Checklist
A covered person should ensure that it has the following:
- AML registration with the AMLC, where required;
- board-approved AML policy;
- designated compliance officer;
- customer onboarding procedures;
- beneficial ownership procedures;
- risk rating system;
- transaction monitoring process;
- CTR filing process;
- STR investigation and filing process;
- record retention system;
- sanctions screening;
- employee training;
- independent audit;
- management reporting;
- internal escalation protocol;
- data privacy safeguards;
- documented handling of PEPs;
- enhanced due diligence procedures;
- suspicious activity investigation files;
- periodic risk assessment.
LI. Difference Between CTR and STR
A CTR is filed because the transaction crosses a legal threshold. An STR is filed because the transaction is suspicious.
A transaction may be both covered and suspicious. In that case, the covered person must comply with both reporting obligations as applicable.
A transaction below the CTR threshold may still require an STR if suspicious. Conversely, a transaction above the CTR threshold may require a CTR even if not suspicious.
This distinction is fundamental to AML compliance.
LII. Liability of Officers and Employees
Officers and employees may face liability when they knowingly participate in money laundering, deliberately fail to report, tip off customers, falsify records, or obstruct compliance.
However, employees who report in good faith through proper channels are generally protected.
Institutions should define responsibility clearly. Frontline employees should know when to escalate. Compliance personnel should know when to file. Senior management should ensure that compliance decisions are respected.
LIII. Importance of Documentation
In AML compliance, undocumented action is often treated as weak action. Covered persons should document:
- customer risk assessments;
- identification and verification;
- beneficial ownership checks;
- source-of-funds review;
- enhanced due diligence;
- alert investigations;
- STR decisions;
- CTR submissions;
- management approvals;
- account closure decisions;
- training attendance;
- audit remediation.
Documentation helps show regulators that the institution acted reasonably and in good faith.
LIV. Philippine Enforcement Context
The Philippines has strengthened its AML regime over time by expanding predicate offenses, adding covered persons, improving beneficial ownership controls, regulating casinos and real estate, and strengthening terrorism financing measures.
This evolution reflects international expectations, domestic enforcement needs, and the growing complexity of financial crime.
The direction of Philippine AML law is toward broader coverage, more effective reporting, better beneficial ownership transparency, stronger risk-based supervision, and closer coordination among regulators.
LV. Conclusion
Money laundering reporting requirements in the Philippines are central to the country’s financial crime prevention system. Covered persons must identify customers, understand beneficial ownership, monitor transactions, keep records, and report covered and suspicious transactions to the AMLC.
The reporting system rests on two pillars: objective threshold-based reporting through covered transaction reports, and risk-based judgment through suspicious transaction reports. Both are necessary. Threshold reporting gives visibility over large-value movement of funds, while suspicious transaction reporting captures conduct that appears unlawful, evasive, or inconsistent with legitimate activity.
Compliance is not limited to banks. It extends to securities firms, insurance companies, remittance businesses, casinos, real estate developers and brokers, jewelry dealers, company service providers, and certain professional activities of lawyers and accountants. Each sector has its own risks, but the core obligation is the same: prevent the misuse of legitimate channels for criminal proceeds.
An effective AML program requires governance, customer due diligence, beneficial ownership transparency, transaction monitoring, prompt reporting, confidentiality, recordkeeping, training, and audit. Failure to comply can result in serious regulatory, civil, criminal, and reputational consequences.
In the Philippine context, AML reporting is both a legal obligation and a public interest function. It protects the integrity of the financial system, assists in the detection of crime, supports asset recovery, and helps ensure that economic channels are not used to conceal corruption, fraud, trafficking, terrorism financing, cybercrime, and other unlawful activities.