Yes. Staff members check the reports, but we also use technology. It's difficult to verify everything physically, so we use technology for assistance. We begin by searching on keywords.
Before disclosing information based on a suspicious activity report, we also check our database to see if other transactions might corroborate our suspicions or broaden the network to identify other people involved in a scheme.
That's how we proceed before preparing and establishing a disclosure process that we then transmit to the police, or to national or international security agencies.