Red Flags for Terrorist Financing: Test Your CFT Detection Skills

Red Flags for Terrorist Financing: Test Your CFT Detection Skills

9 – 40 Questions 11 min
This quiz targets terrorist financing detection under FATF CFT standards, FinCEN BSA/SAR expectations, and UN/OFAC sanctions controls, focusing on the red flags analysts miss in low-dollar, high-velocity activity, NPO flows, and weak-name screening. Use it to reinforce mandatory training that prevents reportable compliance incidents, enforcement actions, and the real-world harm that follows when controls fail.
Choose quiz length
1Terrorist financing typically involves large, structured transactions, so small payments are rarely relevant.

True / False

2In an AML/CFT context, what does “SAR” stand for?
3What is the best practice when a sanctions-screening hit appears to differ on a single field (for example, country of residence)?
4Which activity is most consistent with terrorist financing risk even if each transfer is low value?
5A customer explains unusual outgoing wires as “helping friends send money home.” What is the best way to corroborate the explanation?
6If one screening field (such as country) does not match, it is acceptable to clear a sanctions hit without checking aliases or other identifiers.

True / False

7Which practice best reduces the risk of fragmented TF analysis and incomplete SAR narratives?
8A personal account with modest stated income receives many cash deposits from unrelated individuals and then wires nearly the full balance to a money services business (MSB) in a FATF grey-listed country. Select all that apply. Which are key red flags?

Select all that apply

9Arrange the investigative steps in the most appropriate order after a potential TF transaction-monitoring alert is generated.

Put in order

1Collect and retain supporting evidence (internal/external)
2Expand the review to related accounts, counterparties, and time periods
3Review alert and transaction details
4Escalate with a documented recommendation for SAR decision
5Compare activity to KYC/profile and expected behavior
10A customer’s name closely matches a UN-designated person, but the date of birth is off by one day. What should an analyst do next?
11Regulators expect institutions to retain evidence supporting why an alert was closed, not just the final disposition code.

True / False

12A domestic education charity receives donations but quickly wires most funds to a sparse-record foreign organization in an active conflict zone. Select all that apply. Which EDD steps are most appropriate?

Select all that apply

13Arrange the steps for appropriately clearing (or escalating) a potential sanctions match.

Put in order

1Compare all available identifiers to the sanctions record
2Confirm alert data quality (name fields, DOB, identifiers)
3Assess ownership/control and relevant transaction context
4Document rationale and obtain required approvals before disposition
5Check for aliases, transliterations, and name-variant logic
14Your monitoring program rarely triggers alerts below $1,000. Which change best aligns with CFT expectations for detecting TF typologies?
15Under FATF’s risk-based approach, which factor is most important when assessing an NPO’s TF risk?
16Which approach best addresses sanctions risk when customers may act through intermediaries or ownership layers?
17A student account receives many transfers with crowdfunding-style comments referencing a foreign conflict, then sends funds to a virtual asset exchange with limited KYC. Select all that apply. Which corroboration methods are most useful?

Select all that apply

18You identify an education NPO whose donations are rapidly wired to a sparse-record counterparty in an active conflict zone. Arrange the response steps from initial risk recognition to final control action.

Put in order

1Request corroboration (contracts, licenses, beneficiary evidence, program reporting)
2Perform EDD on the foreign counterparty and purpose of payments
3Decide on controls (enhanced monitoring, restriction, SAR filing, and/or exit)
4Implement the decision and retain an audit trail
5Escalate to the appropriate compliance/financial crime governance forum
6Update the NPO’s risk assessment and document the trigger
19Terrorist financing risk may only become apparent after linking small, seemingly unrelated events across months, accounts, or products.

True / False

20An account receives multiple transfers labeled as “donation for relief,” followed by outgoing payments to a newly created foreign beneficiary. What should you do to validate the customer’s explanation?
21An e-commerce merchant receives multiple small card payments from different cards, all used from the same IP address in a sanctioned region. Select all that apply. Which internal stakeholders should be engaged before restricting the merchant or deciding on a filing?

Select all that apply

22An account shows rapid deposits followed by wires out to an MSB in a higher-risk jurisdiction. Which single feature most strongly supports escalation for potential TF?

Disclaimer

This quiz is for educational purposes only. It does not replace official safety training, certification, or regulatory compliance programs.

CFT Red-Flag Misreads That Lead to Missed SARs and Weak Sanctions Decisions

These are the failure patterns that most often show up in quality assurance (QA) reviews, FIU feedback, and examiner criticism when institutions assess potential terrorist financing (TF).

1) Treating TF like “big-dollar” money laundering

  • Mistake: Waiting for large structuring patterns or obvious layering before escalating.
  • Avoid it: Weight velocity, donor dispersion, rapid in-and-out movement, and purpose inconsistency against the customer’s KYC and expected activity—even when amounts are small.

2) Clearing sanctions hits on one non-matching field

  • Mistake: Closing a possible match because the country, spelling, or middle name differs.
  • Avoid it: Reconcile all available identifiers (DOB ranges, aliases, addresses, nationality, document numbers), and assess ownership/control exposure (including OFAC’s “50 Percent Rule” logic where applicable).

3) Using the “NPO” label as a substitute for analysis

  • Mistake: Auto-high-risking every charity (or defaulting domestic charities to low risk).
  • Avoid it: Apply a risk-based view: mission, governance, fundraising channels, beneficiaries, delivery methods, and geographic exposure. Compare outbound counterparties to stated programs.

4) Accepting customer explanations without testing them

  • Mistake: Closing on a plausible story (“helping friends,” “donations,” “travel money”).
  • Avoid it: Corroborate with documents/data: payroll, invoices, travel records, beneficiary lists, counterparties, device/IP signals, and prior alert history.

5) Fragmenting alerts and under-documenting decisions

  • Mistake: Treating each alert as isolated, producing thin narratives and inconsistent dispositions.
  • Avoid it: Link related cases across time, accounts, and counterparties; preserve evidence; and write decisions so a reviewer can reproduce your logic from the record.

Decision Drills: Terrorist Financing Signals vs. Normal Customer Behavior

Use these short drills to practice the same judgment calls the quiz targets: separating innocuous activity from TF indicators, deciding when to escalate, and capturing the facts you would need for a defensible case file.

Drill 1: Funnel-account pattern into an MSB corridor

A low-income personal account receives multiple same-week cash deposits from unrelated individuals, then wires most funds to a money services business tied to a higher-risk corridor.

  • Decide: What specific facts make this different from routine remittance behavior?
  • Document: Which KYC gaps and counterparties must be verified before disposition?

Drill 2: NPO with conflict-zone outflows

A domestic education charity advertises local programs, but most donations are quickly sent to a single overseas organization operating in an active conflict area.

  • Decide: What would you seek to validate (program spend, beneficiaries, governance, third-party due diligence)?
  • Escalate: What would trigger a sanctions re-screen or enhanced review of the foreign counterparty?

Drill 3: P2P transfers with concerning memo fields

A customer with ordinary retail activity begins sending frequent low-value P2P transfers; the notes include coded language and cause-based fundraising references.

  • Decide: Which indicators are behavioral (frequency/velocity) versus content-based (memos/notes)?
  • Control check: What monitoring or keyword governance questions should be raised?

Drill 4: “False positive” sanctions hit with partial identifiers

Screening generates a potential match to a designated individual; the name is close, and the address is in a different country than the customer’s stated residence.

  • Decide: What minimum identifier set is needed before you can clear (or confirm) the hit?
  • Risk note: How would you explain the decision to an auditor in one paragraph?

Drill 5: Multiple related customers, each “clean” in isolation

Three customers share devices and contact details, use different products (cards, wires, cash), and each triggers small anomalies across several months.

  • Decide: What linkage evidence matters most (shared addresses, payees, instruments, digital fingerprints)?
  • Narrative: What is the unifying typology you would articulate if you file?

Terrorist Financing Detection: 5 Analyst Takeaways That Improve CFT Outcomes

  1. Prioritize inconsistency over size. TF risk often shows up as behavior that conflicts with the customer’s stated purpose, income, and expected geography—not as large-dollar thresholds.
  2. Sanctions decisions require full-identifier discipline. Don’t clear a hit on a single mismatch; reconcile aliases, DOB ranges, addresses, and ownership/control exposure before you disposition.
  3. Use NPO context, not labels. Compare a charity’s public mission and program footprint to actual inflows/outflows, delivery channels, and overseas counterparties, then apply a risk-based control response.
  4. Test explanations with evidence. A plausible customer story is not a control; you need corroboration (documents, third-party sources, transaction linkage, and historical pattern comparison).
  5. Build cases across time. Link related alerts and entities so your escalation or SAR narrative reflects the full TF typology and decision rationale, not disconnected events.

CFT Glossary for Terrorist Financing Red-Flag Reviews (with Examples)

CFT (Countering the Financing of Terrorism)
Controls designed to detect and disrupt financial support for terrorist actors. Example: “We enhanced CFT monitoring for rapid pass-through transfers to higher-risk corridors.”
SAR (Suspicious Activity Report)
A report to FinCEN documenting suspicious transactions/patterns. Example: “The case was escalated for SAR consideration due to donor dispersion and conflict-zone counterparties.”
Sanctions screening “potential match”
An alert indicating possible alignment between a party and a sanctions list entry, requiring investigation. Example: “We treated the hit as unresolved until DOB and alias checks were completed.”
OFAC 50 Percent Rule
Guidance concept that entities owned 50% or more (in aggregate) by blocked persons are considered blocked, even if not named on a list. Example: “We reviewed ownership after finding an SDN-linked controller.”
MVTS/MSB (Money Value Transfer Service / Money Services Business)
Non-bank providers that transmit money or value (e.g., remittance providers). Example: “The customer’s wire activity concentrated through a single MVTS inconsistent with stated purpose.”
Funnel account
An account receiving funds from multiple sources and quickly sending onward, often with limited economic rationale. Example: “Unrelated cash deposits followed by near-total outgoing wires indicated potential funneling.”

Authoritative References for FATF CFT Standards, FinCEN Expectations, and Sanctions Controls

Terrorist Financing Red Flags (CFT) FAQ: SAR Judgment, NPO Risk, and Sanctions Controls

How is terrorist financing different from “traditional” money laundering in transaction monitoring?

Terrorist financing often presents as low-dollar, high-frequency, fast-moving activity with weak economic purpose (e.g., rapid pass-through, donor dispersion, or atypical corridors) rather than large-dollar structuring. The quiz emphasizes behavioral context (customer profile, velocity, counterparties, geography) because TF risk can be missed when analysts rely on amount thresholds alone.

What evidence should I capture before escalating a TF concern for SAR consideration?

Capture a reproducible fact set: timeline of transactions (in/out and time-to-spend), sender/beneficiary attributes, links across accounts/customers, KYC/EDD profile gaps, sanctions screening outcomes, and any corroboration or contradictions to the stated purpose. The goal is not to “prove TF,” but to document why the pattern lacks a reasonable lawful purpose and what checks were performed.

How should analysts handle alerts involving non-profit organizations (NPOs) without over-flagging?

Use FATF’s risk-based logic: evaluate the NPO’s mission, governance, fundraising channels, and how funds reach beneficiaries. Elevated risk is driven by delivery to conflict areas, opaque intermediaries, unusual cash intensity, or mismatch between public program claims and actual outflows—not the NPO label itself.

What makes a sanctions “false positive” determination defensible during QA or an exam?

A defensible clearance shows that you assessed multiple identifiers (not just name), considered aliases and transliterations, and evaluated whether ownership/control creates indirect exposure. Your notes should explain which identifiers were verified, which were unavailable, and why the remaining risk is low enough to clear under your policy.

Do I need certainty that activity is terrorism-related before escalating or filing?

No. CFT controls are designed to identify suspicion based on facts and reasonable inference, then escalate for appropriate review and reporting under your institution’s procedures. If you want broader practice on SAR reasoning across typologies, use the AML Practice Questions quiz to reinforce narrative and evidence standards.

How do FATF standards and U.S. expectations (FinCEN/OFAC) fit together in day-to-day alert work?

FATF sets the global baseline for a risk-based AML/CFT program, while U.S. regulators (including FinCEN under the BSA and OFAC for sanctions) expect documented, consistently applied controls: monitoring calibrated to TF typologies, timely escalation, well-supported SAR decisions, and disciplined sanctions screening/escalation. For a broader standards view beyond TF-specific red flags, see the AML/CFT Compliance Quiz.