Financial Crime Prevention Framework


Last Updated: December 1, 2025


Protecting Your Business, Safeguarding the Financial System

At Unicorn Currencies, preventing financial crime is not just a regulatory obligation—it's fundamental to who we are and how we operate. We have built a comprehensive, multi-layered Financial Crime Prevention Framework that protects our clients, partners, and the integrity of the global financial system.

This framework combines advanced technology, robust processes, highly trained personnel, and a culture of vigilance to detect and prevent money laundering, terrorist financing, fraud, sanctions violations, and other financial crimes.

Our Commitment to Financial Crime Prevention

Zero Tolerance for Financial Crime

We have zero tolerance for the use of our services for any form of financial crime, including:

  • Money laundering and terrorist financing

  • Fraud, forgery, and misrepresentation

  • Sanctions evasion and trade-based money laundering

  • Tax evasion and customs fraud

  • Bribery, corruption, and proceeds of crime

  • Human trafficking and modern slavery-related transactions

We implement rigorous controls to ensure that criminals cannot exploit our platform, and we work closely with law enforcement and regulatory authorities to combat financial crime.

Regulatory Excellence and Compliance

Our Regulatory Framework

Unicorn Currencies operates under some of the world's most stringent anti-money laundering (AML) and counter-terrorist financing (CTF) regulatory frameworks:

Canada

  • FINTRAC Registration: Registered with the Financial Transactions and Reports Analysis Centre of Canada (FINTRAC) as a Money Service Business (MSB) and Payment Service Provider (PSP) - Registration No: C100000159

  • Compliance with: Proceeds of Crime (Money Laundering) and Terrorist Financing Act (PCMLTFA), associated regulations, and FINTRAC guidance

  • Oversight: Subject to FINTRAC compliance examinations and regulatory reporting requirements

United Kingdom

  • FCA Standards Alignment: Operating in partnership with FCA-authorized Payment Service Providers, we adhere to Financial Conduct Authority standards and UK Money Laundering Regulations 2017

  • ICO Registration: Registered with the UK Information Commissioner's Office (ICO Registration No: ZB534346) ensuring data protection compliance in our AML processes

International Standards

  • FATF Compliance: Aligned with Financial Action Task Force (FATF) recommendations and international best practices

  • Sanctions Compliance: Strict adherence to sanctions programs administered by OFAC (USA), OFSI (UK), UN, EU, and Canadian authorities

  • Wolfsberg Principles: Informed by Wolfsberg Group standards for correspondent banking and trade finance AML

Independent Verification

Our compliance program is:

  • Audited annually by independent external auditors

  • Subject to regulatory examination by FINTRAC and oversight through our FCA-authorized partners

  • Tested through regular internal audits and compliance reviews

  • Benchmarked against industry best practices and peer institutions

The Three Lines of Defense

We employ a Three Lines of Defense model, an internationally recognized framework that ensures multiple, independent layers of control and oversight:

First Line of Defense: Business Operations

Our operational teams are the first line of defense against financial crime.

Responsibilities:

  • Client Onboarding: Conducting thorough Know Your Customer (KYC) and Know Your Business (KYB) verification at account opening

  • Transaction Screening: Screening every client and transaction against sanctions lists and politically exposed persons (PEP) databases in real-time

  • Transaction Monitoring: Monitoring all transactions for suspicious patterns, unusual activity, or red flags

  • Customer Due Diligence (CDD): Performing ongoing due diligence and periodic reviews of client relationships

  • Enhanced Due Diligence (EDD): Applying enhanced scrutiny to higher-risk clients, jurisdictions, or transaction types

  • Frontline Detection: Identifying and escalating suspicious activity indicators during daily client interactions

Empowerment and Training:

  • All frontline staff receive comprehensive AML/CTF training upon hire and annually thereafter

  • Staff are empowered and expected to challenge unusual requests or activity

  • Clear escalation procedures ensure concerns reach compliance specialists quickly

Second Line of Defense: Compliance and Risk Management

Our dedicated Compliance function provides independent oversight, policy development, and specialist expertise.

Responsibilities:

  • Policy and Procedures: Developing and maintaining comprehensive AML/CTF policies, procedures, and controls

  • Risk Assessment: Conducting enterprise-wide money laundering and terrorist financing risk assessments

  • Independent Review: Reviewing and challenging decisions made by the first line, including KYC approvals and transaction decisions

  • Suspicious Activity Analysis: Investigating alerts and unusual activity flagged by frontline staff or monitoring systems

  • Regulatory Reporting: Preparing and filing Suspicious Transaction Reports (STRs) / Suspicious Activity Reports (SARs) to FINTRAC and the National Crime Agency (UK)

  • Regulatory Liaison: Serving as primary point of contact with FINTRAC, FCA partners, and law enforcement

  • Quality Assurance: Conducting quality assurance reviews of KYC files, transaction decisions, and compliance processes

  • Advisory Support: Providing guidance and training to business teams on complex compliance scenarios

Independence and Authority:

  • The Head of Compliance reports directly to the Chief Operating Officer and has direct access to the Board of Directors

  • Compliance has authority to block transactions, suspend accounts, or terminate relationships where financial crime risk is identified

  • Compliance is independent from sales and revenue-generating functions, ensuring objective decision-making

Third Line of Defense: Internal Audit

Independent Internal Audit provides assurance that our financial crime controls are effective and operating as designed.

Responsibilities:

  • Periodic Audits: Conducting annual audits of AML/CTF compliance program effectiveness

  • Testing Controls: Testing key controls including KYC procedures, transaction monitoring, sanctions screening, and suspicious activity reporting

  • Gap Identification: Identifying weaknesses, gaps, or areas for improvement in the compliance framework

  • Recommendations: Providing actionable recommendations to strengthen controls and mitigate risks

  • Management Response: Tracking management's implementation of corrective actions

  • Reporting to Board: Reporting audit findings, control effectiveness, and risk issues directly to the Board Audit Committee

Independence:

  • Internal Audit operates independently from both business operations and compliance

  • Internal Audit reports directly to the Board Audit Committee, ensuring objective oversight

Governance and Board Oversight

Our Board of Directors provides active oversight of our financial crime prevention program:

  • Approves AML/CTF policies and risk appetite

  • Reviews quarterly reports on compliance program effectiveness, suspicious activity trends, and regulatory developments

  • Ensures adequate resources (budget, staff, technology) are allocated to compliance

  • Holds management accountable for compliance performance and regulatory obligations

  • Sets the "tone from the top" emphasizing our zero-tolerance culture

Advanced Technology Stack

We leverage cutting-edge technology to detect and prevent financial crime at scale, ensuring comprehensive coverage while minimizing friction for legitimate clients.

Identity Verification - Verify365 Platform

Robust, Multi-Layer Identity Verification

Our identity verification process, powered by leading providers integrated into our Verify365 platform, combines:

Document Verification:

  • Advanced optical character recognition (OCR) and machine learning to extract and verify data from government-issued identity documents (passports, driver's licenses, national ID cards)

  • Forgery detection algorithms identifying tampered, altered, or counterfeit documents

  • Real-time verification against issuing authority databases where available

  • Support for 10,000+ document types from 195+ countries

Biometric Verification:

  • Facial biometric matching comparing live selfies to photo ID documents

  • Liveness detection preventing use of photos, videos, or deepfakes

  • Advanced anti-spoofing technology ensuring genuine identity verification

Data Verification:

  • Cross-referencing identity information against global data sources, credit bureaus, and public records

  • Address verification through utility bills, bank statements, and official correspondence

  • Phone and email verification to confirm contact details

Corporate Verification (for business clients):

  • Company registry searches confirming legal existence, registration number, and registered address

  • Beneficial ownership identification through corporate registries and ultimate beneficial owner (UBO) databases

  • Director and officer verification ensuring authorized signatories are legitimate

  • Business activity verification through websites, social media, and trade references

Outcome: Comprehensive identity assurance before any client can access our services, preventing identity fraud, synthetic identities, and criminal exploitation.

Real-Time Sanctions and PEP Screening

Continuous Screening Against Global Watch Lists

Every client, beneficial owner, director, and transaction counterparty is screened in real-time against:

Sanctions Lists:

  • Office of Foreign Assets Control (OFAC) - USA

  • Office of Financial Sanctions Implementation (OFSI) - UK

  • United Nations Security Council Consolidated List

  • European Union Sanctions

  • Canadian sanctions administered by Global Affairs Canada

  • Additional country-specific sanctions programs

Politically Exposed Persons (PEPs):

  • Comprehensive global PEP databases covering heads of state, government ministers, senior officials, judges, military leaders, and state-owned enterprise executives

  • Family members and close associates of PEPs

  • PEP status triggers enhanced due diligence and ongoing monitoring

Adverse Media and Watch Lists:

  • Criminal records and law enforcement databases

  • Financial crime allegations and convictions

  • Terrorism, human trafficking, and organized crime affiliations

  • Regulatory enforcement actions and sanctions violations

  • Reputation risk indicators

Technology:

  • Integration with leading screening providers (Dow Jones Risk & Compliance, Refinitiv World-Check, ComplyAdvantage)

  • Real-time screening at onboarding and ongoing periodic rescreening (at least annually, or more frequently for higher-risk clients)

  • Automated alerts for match hits, with expert review and disposition by trained compliance analysts

  • False positive reduction through fuzzy matching algorithms and intelligent filtering

Outcome: Criminals, terrorists, sanctioned entities, and high-risk individuals are blocked from using our platform, ensuring compliance with global sanctions regimes and preventing reputational risk.

Transaction Monitoring and Behavioral Analytics

Sophisticated Monitoring Detecting Suspicious Patterns

Every transaction processed through Unicorn Currencies is monitored using advanced rules-based and machine learning-powered analytics:

What We Monitor:

  • Transaction amounts, frequencies, and patterns

  • Beneficiary countries, banks, and counterparties

  • Payment purposes and descriptions

  • Client business profiles and expected activity

  • Geographic risk factors and high-risk jurisdictions

  • Structured transactions (layering, splitting to avoid thresholds)

  • Rapid movement of funds or circular transactions

  • Inconsistencies between declared business activity and actual transactions

Detection Capabilities:

  • Rule-Based Alerts: Pre-configured rules detecting known typologies of money laundering, trade-based money laundering, terrorist financing, and fraud

  • Behavioral Analytics: Machine learning models establishing normal behavior baselines for each client and flagging deviations

  • Network Analysis: Graph analytics identifying relationships between clients, beneficiaries, and transactions that may indicate layered schemes or organized crime

  • Velocity Checks: Monitoring transaction velocity and cumulative amounts over time periods

  • Geographic Risk Scoring: Enhanced scrutiny for transactions involving high-risk jurisdictions (FATF grey/blacklist countries, offshore financial centers, conflict zones)

Alert Investigation Process:

  1. Automated Triage: Alerts prioritized by risk score and assigned to compliance analysts

  2. Investigation: Analysts review transaction details, client profile, historical activity, supporting documentation, and external intelligence

  3. Risk Assessment: Determination whether activity is consistent with legitimate business or indicative of financial crime

  4. Disposition: Alerts closed with documentation (legitimate activity) or escalated for suspicious activity reporting

  5. Continuous Learning: Alert outcomes feed back into monitoring rules and machine learning models, improving detection accuracy over time

Technology Partners:

  • Proprietary transaction monitoring systems calibrated to our business model and risk profile

  • Integration with leading AML technology providers for advanced analytics

  • Continuous system tuning and threshold calibration to optimize detection while minimizing false positives

Outcome: Suspicious activity is detected early, investigated thoroughly, and reported to authorities where appropriate, preventing criminals from successfully laundering proceeds through our platform.

Holistic Risk Assessment

Every Client Has a Risk Rating

We assign comprehensive risk ratings to every client based on multiple factors:

Risk Factors Considered:

  • Client type: Individual, sole proprietor, SME, large corporation, trust, partnership

  • Ownership structure: Transparency of beneficial ownership, complex structures, use of nominees

  • Business model: Industry sector, products/services offered, customer base

  • Geographic exposure: Countries of operation, transaction destinations, supply chain locations

  • Transaction profile: Expected volumes, amounts, frequencies, currencies, counterparties

  • Source of funds: Clarity and legitimacy of wealth and income sources

  • Regulatory status: Licensed businesses, regulatory oversight, compliance history

  • PEP status: Whether client or beneficial owners are politically exposed persons

  • Adverse information: Any negative news, regulatory actions, or reputational concerns

Risk Rating Scale:

  • Low Risk: Well-established businesses in low-risk sectors and jurisdictions with transparent ownership and straightforward transaction needs

  • Medium Risk: Most commercial clients with standard business models, clear ownership, and moderate complexity

  • High Risk: Clients with elevated risk factors requiring enhanced due diligence, frequent reviews, and transaction monitoring

  • Prohibited: Certain high-risk categories (e.g., cryptocurrency exchanges, arms dealers, shell companies without substance) may be declined

Risk-Based Approach:

  • Higher-risk clients receive more intensive scrutiny (enhanced due diligence, senior management approval, frequent reviews, lower alert thresholds)

  • Lower-risk clients receive streamlined processes while maintaining essential controls

  • Risk ratings are dynamic—reviewed periodically and adjusted based on changes in client circumstances or transaction behavior

Robust Processes and Controls

Know Your Customer (KYC) and Know Your Business (KYB)

Comprehensive Client Verification Before Any Service Delivery

No client can transact through Unicorn Currencies without completing our rigorous KYC/KYB process:

For Individuals and Sole Proprietors:

  • Government-issued photo identification (passport, driver's license, national ID)

  • Proof of residential address (utility bill, bank statement, tax document dated within 3 months)

  • Source of funds and source of wealth declaration and verification

  • Screening against sanctions, PEPs, and adverse media

  • Risk assessment and risk rating assignment

For Corporations and Partnerships:

  • Corporate registry documentation (certificate of incorporation, articles, registry extract)

  • Proof of registered address

  • Corporate structure chart and beneficial ownership information (identifying all individuals owning 25%+ and ultimate controlling persons)

  • Verification of directors, officers, and authorized signatories

  • Business activity documentation (business plan, website, client references, financial statements)

  • Screening of the entity and all beneficial owners, directors, and signatories

  • Risk assessment and risk rating

For Complex Structures (trusts, foundations, SPVs):

  • Full transparency of structure, beneficial ownership, and control

  • Source of assets and purpose of structure

  • Enhanced due diligence and senior management approval

Ongoing Due Diligence:

  • Periodic reviews of client information (at least annually for higher-risk clients, every 3 years for lower-risk)

  • Triggered reviews when client circumstances change (change of ownership, business model, transaction patterns)

  • Continuous transaction monitoring and sanctions screening

Enhanced Due Diligence (EDD)

Certain clients and situations trigger Enhanced Due Diligence, requiring additional information, verification, and approval:

EDD Triggers:

  • Politically Exposed Persons (PEPs) and their family members or close associates

  • High-risk jurisdictions (FATF-identified high-risk countries, offshore financial centers with weak AML controls, conflict zones)

  • High-risk business sectors (money service businesses, virtual asset service providers, cash-intensive businesses, charities with international operations)

  • Complex ownership structures lacking transparency

  • Large transaction volumes or unusually complex transaction patterns

  • Adverse media or reputational concerns

  • Prior relationship termination or sanctions screening hits (false positives requiring careful review)

EDD Requirements:

  • Additional source of funds/wealth documentation and verification (bank statements, tax returns, business contracts, audited financials)

  • Independent verification through third-party sources (corporate registries, news databases, business intelligence)

  • Senior management approval for account opening

  • More frequent periodic reviews (semi-annual or quarterly)

  • Lower alert thresholds in transaction monitoring

  • Executive-level relationship oversight

Suspicious Activity Reporting

When We Identify Suspicious Activity, We Report It

Where our monitoring, investigations, or frontline observations identify transactions or patterns that give rise to reasonable grounds to suspect money laundering, terrorist financing, or other financial crime, we are legally obligated to report to:

  • FINTRAC (Canada): Suspicious Transaction Reports (STRs)

  • National Crime Agency (NCA) (UK, through FCA-authorized partners): Suspicious Activity Reports (SARs)

Important Legal Protections:

  • We are legally prohibited from informing clients that a suspicious activity report has been filed (this is called "tipping off" and is a criminal offense)

  • Clients should be aware that any unusual, inconsistent, or high-risk activity may be reported to financial intelligence authorities

  • Reporting suspicious activity does not mean a client is guilty of a crime—it means we have identified patterns requiring expert law enforcement review

We take our reporting obligations seriously and cooperate fully with law enforcement and regulatory authorities in their investigations.

Record Keeping and Data Retention

Comprehensive Records Maintained for Regulatory and Investigative Purposes

We maintain detailed records of all client information, transactions, and compliance activities for a minimum of seven (7) years from the date of account closure or last transaction, in accordance with:

  • Proceeds of Crime (Money Laundering) and Terrorist Financing Act (Canada) - Section 6

  • Money Laundering Regulations 2017 (UK) - Regulation 40

  • FINTRAC Guidance on record-keeping requirements

  • FCA Handbook requirements for transaction records

Records Retained:

  • Client identification and verification documents

  • Beneficial ownership information

  • Business activity documentation

  • Transaction records (dates, amounts, currencies, counterparties, purposes)

  • Correspondence and communications

  • Risk assessments and due diligence reports

  • Sanctions screening results

  • Transaction monitoring alerts and investigation outcomes

  • Suspicious activity reports (internal documentation; actual reports filed with FINTRAC/NCA are maintained by those authorities)

  • Training records and compliance program documentation

Purpose of Retention:

  • Regulatory Compliance: Meeting legal record-keeping obligations

  • Regulatory Examinations: Providing records to FINTRAC, FCA, or other authorities during compliance examinations

  • Law Enforcement: Supporting criminal investigations, prosecutions, and asset recovery proceedings

  • Audit Trail: Demonstrating due diligence, compliance with policies, and reasonableness of decisions

  • Litigation and Dispute Resolution: Defending against claims or resolving disputes

Security and Confidentiality:

  • All records stored securely with encryption at rest and in transit

  • Access restricted to authorized compliance, legal, and audit personnel on a need-to-know basis

  • Records protected against unauthorized access, loss, or destruction

  • Confidentiality maintained in accordance with Privacy Policy and data protection laws

Training and Culture

Comprehensive Staff Training

Every employee is trained to recognize and prevent financial crime:

  • Induction Training: All new employees complete comprehensive AML/CTF training within 30 days of hire, covering money laundering typologies, red flags, sanctions compliance, and reporting obligations

  • Annual Refresher Training: All staff complete annual refresher training on emerging threats, regulatory updates, and lessons learned

  • Role-Specific Training: Frontline staff (sales, operations, customer service) receive enhanced training on recognizing suspicious activity in client interactions

  • Compliance Specialist Training: Compliance team members receive advanced training on investigation techniques, regulatory requirements, and typologies

  • Testing and Certification: Training effectiveness measured through assessments and knowledge tests

Culture of Vigilance

Financial crime prevention is embedded in our culture:

  • Tone from the Top: Senior leadership and the Board set clear expectations that compliance is non-negotiable and financial crime will not be tolerated

  • Speak Up Culture: Employees are encouraged and empowered to raise concerns without fear of retaliation; whistleblower protections ensure safe reporting channels

  • No Pressure to Compromise: Employees are never pressured to onboard risky clients, overlook red flags, or compromise compliance for revenue targets

  • Recognition and Accountability: Employees who demonstrate vigilance and prevent financial crime are recognized; those who fail to follow policies face disciplinary action

  • Continuous Learning: We share case studies, typologies, and regulatory updates regularly to keep the team informed and alert

What This Means for You

Security and Peace of Mind

Our comprehensive Financial Crime Prevention Framework provides you with:

Protection:

  • Assurance that your business is transacting through a platform with rigorous controls, reducing your own risk of unwitting involvement in financial crime

  • Safeguarding against fraud and identity theft through robust verification processes

  • Confidence that your funds are held at reputable, regulated banking institutions with strong AML controls

Transparency:

  • Clear, upfront communication about our KYC requirements and compliance processes

  • Respectful, professional handling of your information with strong data protection safeguards

  • Support from knowledgeable compliance professionals when you have questions

Reputation:

  • Partnering with Unicorn Currencies demonstrates your commitment to ethical business practices and compliance

  • Association with a compliant, well-controlled financial services provider enhances your own reputation with banks, auditors, and regulators

What We Ask of You

To maintain the integrity of our platform, we ask that you:

  • Provide Accurate Information: Ensure all information provided during onboarding and ongoing relationship is truthful, accurate, and complete

  • Respond Promptly: Cooperate with requests for additional information or documentation during due diligence or periodic reviews

  • Report Changes: Notify us promptly of any changes to your business structure, ownership, activities, or anticipated transaction patterns

  • Transact Legitimately: Use our services only for legitimate business purposes in compliance with all applicable laws

  • Be Transparent: Provide clear explanations of transaction purposes, counterparties, and source of funds when requested

Red Flags We Cannot Accommodate:

  • Reluctance or refusal to provide required KYC documentation

  • Provision of false, misleading, or fraudulent information

  • Unusual evasiveness about business activities, ownership, or transaction purposes

  • Requests to circumvent compliance procedures or "expedite" verification

  • Transaction patterns inconsistent with declared business activities

  • Suspected involvement in sanctioned activities, money laundering, fraud, or other financial crimes

If we identify such red flags, we may decline to onboard, suspend services, or terminate the relationship in accordance with our risk-based approach and regulatory obligations.

Regulatory Transparency and Reporting

Our Regulatory Standing

  • FINTRAC Registration: Current, active registration with no compliance examinations resulting in material findings or enforcement actions

  • Clean Regulatory Record: No fines, sanctions, or public enforcement actions related to AML/CTF compliance

  • Proactive Engagement: Regular dialogue with regulators, participation in industry consultations, and commitment to continuous improvement

Independent Assurance

  • External Audits: Annual independent audits of AML/CTF compliance program by qualified external auditors

  • Audit Reports: Audit results reviewed by Board Audit Committee; material findings addressed through management action plans

  • Regulatory Examinations: Cooperation with FINTRAC compliance examinations and FCA oversight (through authorized partners), with findings addressed promptly

Continuous Improvement

Evolving Threats, Evolving Defenses

Financial crime is constantly evolving. So are we.

  • Threat Intelligence: Continuous monitoring of emerging money laundering typologies, terrorist financing methods, and fraud schemes through regulatory alerts, law enforcement bulletins, and industry intelligence sharing

  • Technology Investment: Ongoing investment in advanced AML technology, artificial intelligence, and machine learning to stay ahead of criminal innovation

  • Regulatory Engagement: Active participation in regulatory consultations, industry working groups, and public-private partnerships combating financial crime

  • Benchmarking: Regular benchmarking against peer institutions and international best practices

  • Lessons Learned: Post-incident reviews of any compliance failures, near-misses, or regulatory feedback to strengthen controls

Industry Collaboration

We collaborate with industry partners, law enforcement, and regulatory authorities to combat financial crime collectively:

  • Information Sharing: Participation in financial intelligence sharing initiatives (subject to legal frameworks)

  • Public-Private Partnerships: Engagement with Joint Money Laundering Intelligence Taskforce (JMLIT) and similar initiatives

  • Industry Associations: Membership in fintech and payments industry associations sharing AML best practices

  • Regulatory Dialogue: Open communication with FINTRAC, FCA, and law enforcement on emerging threats and effective controls

Contact Information

Compliance Inquiries

For questions about our compliance processes or to report concerns:

Compliance Officer / Head of Compliance

Email: compliance@unicorncurrencies.com
UK Phone: +44 (20) 8064-0818
Canada Phone: +1 (548) 488-0818

Suspicious Activity Reporting

If you suspect financial crime involving our services, please contact us immediately. Your vigilance helps protect the integrity of the financial system.

Related Policies

  • Anti-Bribery and Corruption Policy: www.unicorncurrencies.com/abc-policy

  • Modern Slavery Statement: www.unicorncurrencies.com/modern-slavery-statement

  • Privacy Policy: www.unicorncurrencies.com/privacy

  • Whistleblower Policy: www.unicorncurrencies.com/whistleblower-policy

  • Safeguarding Policy: www.unicorncurrencies.com/safeguarding

Our Financial Crime Prevention Framework is designed to be robust, effective, and proportionate—protecting legitimate businesses while denying criminals access to the financial system. We are proud to partner with clients who share our commitment to integrity, transparency, and compliance.

© 2025 Unicorn Currencies. All rights reserved.