Graph Mining for Detection of a Large Class of Financial Crimes
|
|
|
- Darlene Knight
- 10 years ago
- Views:
Transcription
1 Graph Mining for Detection of a Large Class of Financial Crimes Czeslaw Jedrzejek 1, Maciej Falkowski 1, Jaroslaw Bak 1 Poznan University of Technology, Institute of Control and Information Engineering, Curie Sq. 5, Poznan, Poland {Czeslaw.Jedrzejek, Maciej.Falkowski, Jaroslaw.Bak}@put.poznan.pl Abstract. Financial crime perpetrators use many different and sophisticated types of schemes, techniques and transactions to accomplish their goals. However, for a large class of financial crimes, such as doing harm to a company, they cannot escape a powerful principle: illegal proceeds have to return to or be under control of managers to achieve a personal gain. This circular flow of transaction attributes is characteristic of another type of financial crimes: such as a VAT carousel or a Polish fuel mafia scheme. In this work we propose a minimal model of descriptions of a doing harm to a company crime, combined with money laundering. Such a model uses sufficient ontology to build evidence and assign legal qualifications to criminal activities and nothing more. The scheme can be described by using 8 layers of concepts and relations that follow in logical order of uncovering a crime. For example, on the first level that describes money transfers there are only 6 parameters necessary assuming that certain operations can be grouped. Using conceptual graphs with subsumption and negation operations, one can reason on people involvement in a crime and choose between strategies of building a case. The model captures over 90% of relevant information for a typical use case of issuing fictitious invoices, the so called Hydra case and is able effectively reason over relevant facts, which means that legal qualification for this case is basically correct. To what extent the model can be generalized to more complex schemes will be a subject of a further study. 1 Introduction 1.1 Financial Crimes Money laundering (ML) as a criminal activity accompanying most serious crimes is seriously undermining economic and social order. There are many schemes of complex nature that are recognized by FATF [5] and new schemes appear exploiting ever increasing richness of money forms and economic activity. Altogether currently up to possibly 50 basic schemes could be identified. Trade-based money laundering is defined as the process of disguising the proceeds of crime and moving value through the use of trade transactions in an attempt to legitimize their illicit origins. For money laundering [11] FATF developed over the
2 years indicators [5-7], that are frequently observed signs of suspicious activity. Representation of facts is important for a financial crime description in terms of uncovering mechanisms (modus operandi) and data collection for building evidence. In this work we propose focusing analysis of a large class of financial crimes on looking for chain graphs representing flows of money, invoices and goods/services. We demonstrate on a few examples that such a representation largely facilitates asking relevant questions on connections between financial entities and people associated with them, which is conducive to evidence building and a crime qualification. To study these relations we propose a data model (called a minimal model), based on conceptual graphs [13]. This means that an ontology is crafted to a task rather that attempting to describe whole conceivable space of concepts and relations (top ontologies). The methodology consist of several steps: 1. Design of a hierarchical data representation with minimal ontology, constructed in sequence of uncovering of a crime scheme. In the first stage, goods/services transfer data is analyzed with relation to 3 basic flows: money, invoices, and documents (i.e. confirming that the service or goods have been delivered - particularly important for a fuel mafia type of crimes). In addition, responsible or relevant people within companies are associated with particular illegal activities.. 2. Construction of a multigraph of the data flow and looking for cycles or potential cycles when a chain of transactions strongly indicates a closure path. 3. Provision of a framework in which the graph building process and queries are executed 4. Relating answers to queries with crime qualifications. This approach is preliminary and limited, but provides an essential model for evidence building of a very important class of financial crimes: among them money laundering and acting to a harm to a company. Our approach is an extension of an approach used by Badia and Kantardzic [1] to analysis of the Enron [4] dataset. 1.2 Data and Red Flags Used in Financial Crime Investigations The analysis begins with information from banks on suspicious operations - symptoms of financial crimes (red flags) - that are transferred to countries Financial Intelligence Units (FIUs). The common red flags detected by financial institutions and designated non-financial businesses and professions using data mining of transaction records are: Unconventionally large currency transactions, particularly in exchange for negotiable instruments or for the direct purchase of fund transfer services; Apparent structuring of transactions to avoid identification requirements or regulatory record-keeping and reporting thresholds;
3 Introduction of a client by an overseas associate or financial institution based in a country or jurisdiction known for drug trafficking and production, other financial crimes and bank secrecy. FIUs employ data mining techniques of suspicious activity patterns (over 750 in case of the Polish FIU - GIIF). These employ rule-based systems, customer profiling, and statistical techniques [9]. Other FATF indicators require financial audits, analysis of tax information, testimonies and more difficult to obtain or correlate information, such as: Transactions that appear inconsistent with a client s known legitimate (business or personal) activities or means; unusual deviations from normal account and transaction patterns; Any situation where personal identity is difficult to determine; Unauthorized or improperly recorded transactions; inadequate audit trails; Transactions passed through intermediaries for no apparent business reason. 2 General Crime Model for Selected Crimes Fig. 1. A basic schema of transaction flows for a real case of acting to harm a company We define concepts only to the level necessary to ask questions and reason on the main mechanisms of financial crimes. We assume from the start that we capture 80-95% of relevant knowledge - but this type of knowledge will be universal. In some cases deciding whether a work has been done or not is left to
4 a human. Although less ambitious, such a procedure opens a provision of using an opinion of an expert (i.e. expert accountant). The class of crimes we consider is presented in Fig. 1 (modeled after a real case, the so called Hydra case with real data).the fraudulent scheme is based on invoicing work not done. The CEO of company A subcontracts construction work which the company A does itself. The work is then consecutively subcontracted though a chain of phony companies. Each of them is getting a commission for money laundering and commits that contracted work has been done with fictitious statements. At the end of a chain an owner of a single person company D attempts to withdraw cash, and there is a suspicion that this cash reaches under the table the management of company A (possibly through a trusted intermediary, here associated with company C). People associated with company D may not know full details of a case. In this scenario money leaves companies and goes to physical persons. The knowledge base (KB) is modeled at several (here 8) levels to describe a mechanism of crime, that are presented in Section 3. The concepts come in a hierarchy according to a prevailing mode of gathering data. 3 Hierarchies of Submodels The facts for a case we analyze (the Hydra case) can be presented in 7 pages of a natural language text. This case is one of the easiest for which we have data (only 4 companies and 10 people involved) but contains all elements of the financial crime mechanisms. The full analysis is beyond the scope of the paper, however, in the minimal model the first 3 layers are described by the following top level concepts: General concepts related to layers 1-3: General Flow (From Entity, To Entity, Date, Flow), Flow (Money Transfer, Invoice, Work/Service). Specifically layer 1 concepts are modeled as follows: MoneyTransfer (From Entity, To Entity, Method of Transfer, Date, Value, Title of transfer, i.e. for Work, registered/unregistered) MethodOfTransfer (Electronic transfer, Cash) ElectronicTransfer(Account1, Account2) Account (Time of setting, History) The unregistered transfer could be cash or a transfer to tax heavens banks. We model the remaining layers in a similar way (to be presented in future publications). At each level we assign concerns, and type of analysis. Answers to questions infer assignment of relevant penalty as sanctioned by articles of the Polish Penal Code ( Kodeks Karny in Polish).
5 Table 1: Hierarchy of models representing data involved in a criminal activity (sanctions are presented in bold print) Level of Concern type Type of Analysis/ What can be deducedfications Potential legal quali- Analysis Tools/ Visualization 1 Levels Levels Money transfer Abnormal transaction pattern for a sanctioned by art. Suspicion of a crime companies, institutions, single person Tool for company chain of companies. 299 of the Polish between companies. companies. transaction relations (selecting all viation kk), that is penal code (abbre- Levels 1-2 ML - type of a scheme relevant attributes money laundering for case of Company and unknown base A). crime (they always come together). 2 Invoice flow between companies. Tax statements. Tool for invoice analysis and tax statement analysis. 3 Work/Services flow Activities: Inspection of work (in case of Company A inspection of site). Question: X; Value of work as invoiced Y: Market value of work Event calculus tool. Abnormal operation: company a) establishing correspondence of invoices and money transfers b) tax statements values much smaller than real turnover c) singletransaction companies d) detection if invoices are for the same goods/services Establishing whether work has been done: a) find a chain of companies involved in operations for the same goods/services. Reinforcement of suspicion of art. 299 crimes and unknown base crime. All companies involved in chain transactions that is a part of a scheme. Initial legal qualification: fraud, art kk [10] in connection with money laundering Later after testimonies of accomplices art. 296 Conditions: 1 and 2 and 3 kk b) investigate and art kk whether goods - the legal qualification changes to do- were sold/work performed; if no harm-to-a- company c) find the last crime (at significant company in a or large degree) and chain that did acting for a personal not do a work. If gain. yes, all companies in the chain implicated. d) alternate procedure: find the first company in a chain that ordered work.
6 Level of Concern type Type of Analysis/ What can be deducedfications Potential legal quali- Analysis Tools/ Visualization 4 Assign roles to people Tool for associating Who are the persons in potentially people with compa- that were responsible implicated companies nies. for false documents? (in some cases Investigate docunies. scheme organizers ments stating that can act and not be the work was done. directly associated Roles: management, with transacting proxies, legal advisors. companies): Administration: executing activities or- a) logical decision for ordering dered by superiors. work; if authorized person did not order nor accept; nor authorized payment the work find who forged the document b) who physically did invoices, money transfers c) who accepted work in chain of command 5 Mapping potential roles coming from positions in companies to a contribution to a financial crime. Correlate potentially implicated people, and testimonies of people, or their role as indicated by documents. In the Hydra case, Did accused people suspect s testimonies worked conscien- accused tiously? of crime related Did they work together? to art kk (constituted implicated CEO of a crime group)? the company A as Can this be only a a mastermind of a matter of negligence? scheme. Change of qualification of CEOs of companies A and B from art kk to art and 2, and 3 kk (using art. 212 kk) Making false statements: Sanctioned by art and 3 kk. 6 People not related to companies but being a part of crime. Other relations of people. 7 Information about Discovering invoice people; whether of company sentenced in the last A waiting to repeating 10 years, criminal execution connection; school of a scheme (after business etc. completing the first cycle). 8 Additional factors An invoice waiting for payment. That is why initially Company C transferred only half of money to Company D testing whether a withdrawal will be blocked. Sanctioned by art kk in relation to art and 5 kk using art. 12 kk. Detailing legal qualification. Owner of company D got an increase of sentenced using art kk. Art. 12. Repeated crime (counts as one). Art intent to commit crime.
7 4 Money Transfer Flow In this Section we show details of modeling and data querying for layers 1-3. The source of data is twofold: structured documents, eg. Excel or Calc spreadsheets containing flows data and additional, manually entered data about persons and companies. That data is stored in relational database and is further converted to Conceptual Graphs relations.[13, 14]. We use elements of graph theory to effectively process and query details of financial data. Our goal is to find suspicious behavior, described by patterns (discussed later). There are three basic parts in our system: a knowledge base, a set of rules and a set of patterns. The knowledge base contains facts about companies: their cash flow, invoice flow, work or goods flow and related physical persons. Facts are represented by entity nodes connected with relation nodes. Fig. 2 contains visualization of a fragment of knowledge base. Formally, we can describe Fig. 2 with a formula: KB = MoneyTransfer(CompanyA, CompanyB, , Invoice no 18/07, ) Nodes can be typed such as Company, Transfer, Person and other. This Fig. 2. A fragment of KB kind of data description is an extension of conceptual graphs [13] that preserves its soundness and decidability. We use simple query and ontological constructs (subsumption and negation) that are needed for our data analysis and computing crime qualifications. Knowledge base can contain thousands of facts about transactions and for our analysis the crucial thing is the transaction flow. Such flows can be described by rules of form as in Fig. 3. The main part of a rule is a pattern, which can contain variables. Pattern can be complemented with additional variable constraints (date d1 is earlier than d2). Rule in Fig. 3 states that if a company transfers money to another company, and that company transfers later the same amount of money to a third company, then the middle company acts as a broker and in fact the first company transfers money to the third company (minus a provision). This pattern can be easily extended to include more intermediary companies, as shown in Fig. 4. Application of such rules to the KB produces a web of transfers and shows the real starting and ending points of a money flow. Presented transitive rules can be set to include only transfers above minimum value or within a period of time. For the sake of clarity we used simple less and equal operators to compare dates and values, but in fact they can be far more complex. We developed sophisticated algorithms that can aggregate small
8 Fig. 3. Transfer chain rule transfers (technique often used to disguise real money flow), not discussed here. One of patterns that exploits such a transitive use of broker companies is money laundering where additional physical persons and unregistered money transfer are involved. Such a pattern is shown in Fig. 5: Transfer from one person to another can also be more complex and involve intermediary persons. After applying specified rules to the KB, the crime detection phase takes place. In this phase we try to find homomorphism between data collected in KB and defined crime patterns. Our computational machinery searches for crime symptoms described by a pattern (like VAT fraud or money laundering). Data sets that are closest to match the pattern are presented to a user. At this level the user can judge probability of crime and provide additional data, such as bank transfers and invoices from other companies that look suspicious, or data from expert analysis (e.g. that work or service was fictitious). System works in cycles: data input, analysis, propositions of directions of further investigation. After gathering enough information additional functionality is triggered, that is a crime qualification for humans involved. The qualifications are proposed based on roles persons play in a discovered crime schema.
9 Fig. 4. Transitive transfer chain rule Fig. 5. Crime flow pattern 5 Conclusions In this paper we have presented a computational background and an use case of our tool that is still being developed. Although it is not fully completed yet, we have obtained first promising practical results. The success is due to several reasons: 1. Guidance of legal experts as to legal procedures and crime schemes [12]. 2. Existence of an invariant in the scheme (the cycle of money transfers).
10 3. The minimal model description. The first feature bootstraps relevant questions. The second one introduces clarity to a description, at a price of some decrease of power of expression. The problem with complete ontologies is that a formulation relevant questions becomes very difficult [2, 3]. Take an invoice, for example. Company A issues an invoice, and company B receives an invoice. These operations are described as 2 RDF triples. We assume that both activities are coupled, so invoices becomes a predicate, A invoices B. This is the only concept related to invoice. If invoice is lost or destroyed and it is important for understanding a scheme our model cannot use such information. We are working on implementation of the rest of analysis levels and a few more financial crime schemas. One of the most desired schema that we are developing and that our tool aims to help with, is the VAT fraud schema. Our practice shows that the current implementation can handle up to with 50 thousand of VAT invoices on a standard PC machine. Currently we are working on optimization of querying algorithms, which we applied. Acknowledgments. Our research is supported by the Polish Ministry of Science and Higher Education, Polish Technological Security Platform grant 0014/R/2/T00/06/02. We thank drs. J. Cybulka and Jacek Martinek; and Mr. Z. Wieckowski and Mr T. Dela for guiding information and discussions. References 1. Badia A., M. Kantardzic M. M.: Link Analysis Tools for Intelligence and Counterterrorism. ISI 2005, pp Cybulka J., Martinek J.: The core ontology of criminal processes and investigation procedures. Submitted for publication, Cybulka J., Jdrzejek C., Martinek J., Police Investigation Management System Based on the Workflow Technology, Chapter in: Legal Knowledge and Information Systems, Frontiers Artificial Intelligence and Applications, vol. 189, IOS Press, Amsterdam, Berlin, Oxford, Tokyo, Washington DC, 2008, pp Enron data set. available at Enron 5. FATF (The Financial Action Task Force) Report: Trade Based Money Laundering, 23 July 2006; 6. FATF (The Financial Action Task Force) Report: Complex Money Laundering Techniques: A Regional View, 23 February 2007; 7. FATF (The Financial Action Task Force) Report: Laundering the Proceeds of VAT Carousel Fraud, 23 February 2007; 8. Jedrzejek C., Martinek J.: On the modelling of money laundering techniques as courses of events. Proceedings of 3rd Language & Technology Conference, October 5-7, 2007, Pozna, Poland, pp Mena, J. (2003) Investigative Data Mining for Security and Criminal Detection, Butterworth Heinemann, The Penal Code (in Polish). Ustawa z dnia 6 czerwca 1997 r. Kodeks karny. 11. Unger B., Busuioc, E. M.: The Scale and Impacts of Money Laundering, Publisher:Edward Elgar, May 2007
11 12. Wieckowski J.: Regional Prosecutors Bureau in Katowice, Poland, private communication, February-May Chein M., Mugnier M., Graph-based Knowledge Representation Computational Foundations of Conceptual Graphs, Springer London Allemang D., Hendler J.: Semantic Web for the Working Ontologist: Effective Modeling in RDFS and OWL, Morgan Kaufmann Publishers 2008
澳 門 金 融 管 理 局 AUTORIDADE MONETÁRIA DE MACAU EXAMPLES OF SUSPICIOUS TRANSACTIONS
EXAMPLES OF SUSPICIOUS TRANSACTIONS 1. Cash Transactions a) Transactions where large deposits and withdrawals above the minimum thresholds defined in the AML/CFT Guideline on Large Cash Transactions (including
MONEY LAUNDERING INDICATORS. 1. Financial professionals must pay especially close attention to the following indicators
Belgian Financial Intelligence Processing Unit Gulden Vlieslaan 55/ 1 1060 Brussels - Belgium Tel. : +32 2 533 72 11 Fax : +32 2 533 72 00 E-mail : [email protected] MONEY LAUNDERING INDICATORS NL1175F-EN
FIUs AND TERRORIST FINANCING ANALYSIS - A review by the Egmont Group of sanitised cases related to Terrorist Financing
FIUs AND TERRORIST FINANCING ANALYSIS - A review by the Egmont Group of sanitised cases related to Terrorist Financing Overview This document contains indicators of suspicious transactions that might be
Insider Threat Detection Using Graph-Based Approaches
Cybersecurity Applications & Technology Conference For Homeland Security Insider Threat Detection Using Graph-Based Approaches William Eberle Tennessee Technological University [email protected] Lawrence
Big Data s Big Impact In Financial Investigations
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] Big Data s Big Impact In Financial Investigations
Strategic analysis brief Money laundering through legal practitioners
Strategic analysis brief Money laundering through legal practitioners Strategic analysis briefs AUSTRAC strategic analysis briefs provide insights for government and industry on money laundering and terrorism
TYPOLOGY 13 MONEY LAUNDERING THROUGH CASINOS APPROVED BY THE DECISION OF THE GOVERNOR OF THE CENTRAL BANK OF ARMENIA NO 1/41A FROM JANUARY 24, 2014
APPROVED BY THE DECISION OF THE GOVERNOR OF THE CENTRAL BANK OF ARMENIA NO 1/41A FROM JANUARY 24, 2014 ANNEX TYPOLOGY 13 MONEY LAUNDERING THROUGH CASINOS YEREVAN 2014 1 Contents Chapter 1: Scope of Application...
PART 3 The Basics 10
PART 3 The Basics 10 PART 3 The Basics A. What is Money Laundering? 3.1 Put simply, money laundering covers all kinds of methods used to change the identity of illegally obtained money (i.e. crime proceeds)
Product. AML Risk Manager for Life Insurance Complete End-to-End AML Coverage for Life Insurance
Product AML Risk Manager for Life Insurance Complete End-to-End AML Coverage for Life Insurance A Comprehensive Solution for AML Detection, Investigation, Case Management and Reporting Illegal money laundering
MTN Mobile Money 2012
MTN Mobile Money 2012 Anti-Money Laundering It is the policy of MTN to prohibit and actively prevent the use of its money transfer services to facilitate money laundering, the funding of terrorists or
BANKING. Sector Specific AML/CFT Guidance Notes. May 2015
BANKING Sector Specific AML/CFT Guidance Notes May 2015 Whilst this publication has been prepared by the Financial Supervision Commission, it is not a legal document and should not be relied upon in respect
PAYROLL AGENTS. Sector Specific AML/CFT Guidance Notes. August 2015
PAYROLL AGENTS Sector Specific AML/CFT Guidance Notes August 2015 Whilst this publication has been prepared by the Financial Supervision Commission, it is not a legal document and should not be relied
For most countries, money laundering and terrorist financing raise significant
01-chap01-f.qxd 3/30/03 13:44 Page I-1 Chapter I Money Laundering and Terrorist Financing: Definitions and Explanations A. What Is Money Laundering? B. What is Terrorist Financing? C. The Link Between
Fact Sheet for Financial Crimes Enforcement Network Geographic Targeting Orders for Manhattan, N.Y., and Miami-Dade County, Fla.
Fact Sheet for Financial Crimes Enforcement Network Geographic Targeting Orders for Manhattan, N.Y., and Miami-Dade County, Fla. On January 13, 2016, the Financial Crimes Enforcement Network (FinCEN),
(unofficial English translation)
REGULATION ON PREVENTION OF MONEY LAUNDERING AND FINANCING OF TERRORISM FOR MONEY TRANSFER BUSINESSES AND MONEY CHANGING BUSINESSES (unofficial English translation) REGULATION ON PREVENTION OF MONEY LAUNDERING
SCREENING CHAPTER 24 JUSTICE, FREEDOM AND SECURITY AGENDA ITEM 7A: ORGANISED CRIME
1 SCREENING CHAPTER 24 JUSTICE, FREEDOM AND SECURITY Country Session: Republic of TURKEY 13-15 February 2006 CONTENT -LEGAL BASIS -ORGANISATION -COMBATTING INSTRUMENTS -EXPERTISE AND TRAINING -INTERNATIONAL
Anti-Money Laundering and Counter- Terrorism Financial Policy
Anti-Money Laundering and Counter- Terrorism Financial Policy Version: March 2014 1. INTRODUCTION...3 2. DEFINITIONS...3 3. RISK-BASED APPROACH...3 4. AML COMPLIANCE OFFICER...4 5. SUSPICIOUS TRANSACTION
IT-Based Anti-Money Laundering and Anti-Fraud in Banks and Insurance Companies
IT-Based Anti-Money Laundering and Anti-Fraud in Banks and Insurance Companies Added Value through a Holistic GRC Approach Frank Holzenthal, computer scientist* 1 Today, a holistic Governance, Risk & Compliance
Treasury Department Proposes Anti-Money Laundering Regulations for Investment Advisers
CLIENT MEMORANDUM Treasury Department Proposes Anti-Money Laundering Regulations for Investment Advisers August 28, 2015 AUTHORS Benjamin J. Haskin Russell L. Smith Barbara Block On August 25, 2015, the
Detecting patterns of fraudulent behavior in forensic accounting *
Detecting patterns of fraudulent behavior in forensic accounting * Boris Kovalerchuk 1, Evgenii Vityaev 2 1 Dept. of Computer Science, Central Washington University Ellensburg, WA 98926, USA [email protected]
The State of Insurance Fraud Technology. A study of insurer use, strategies and plans for anti-fraud technology
The State of Insurance Fraud Technology A study of insurer use, strategies and plans for anti-fraud technology September 2014 The State of Insurance Fraud Technology A study of insurer use, strategies
Anti-Money Laundering Facts
Anti-Money Laundering Facts Security Benefit Life Insurance Company (SBL) has implemented a formal anti-money laundering (AML) program in response to the Financial Crimes Enforcement Network s (FinCEN)
The Department of the Treasury established the Financial Crimes
Appendix A Financial Crimes Enforcement Network Programs The Department of the Treasury established the Financial Crimes Enforcement Network in April 1990. 33 FinCEN s original mission was to establish
What Insurance Agents and Brokers Should Expect under the New Anti-Money Laundering Regulations for Life Insurance Companies
What Insurance Agents and Brokers Should Expect under the New Anti-Money Laundering Regulations for Life Insurance Companies The USA PATRIOT Act includes provisions intended to prevent the financial services
Committee of experts on the evaluation of anti-money laundering measures and the financing of terrorism MONEYVAL
MONEYVAL(2010) 9 18 March 2010 Committee of experts on the evaluation of anti-money laundering measures and the financing of terrorism MONEYVAL Typology research Money laundering through private pension
Purpose of this document
Independent Financial Advisors (IFAs), Mortgage Brokers and Retail Intermediaries: Identifying Risks to your Business and Reporting Suspicious Activity This is a United Kingdom Financial Intelligence Unit
Dan French Founder & CEO, Consider Solutions
Dan French Founder & CEO, Consider Solutions CONSIDER SOLUTIONS Mission Solutions for World Class Finance Footprint Financial Control & Compliance Risk Assurance Process Optimization CLIENTS CONTEXT The
Cressey s fraud triangle: All 3 conditions must be present for fraud to occur
DEfINITION Of fraud AND fraud INvESTIgATION Dilek ÇİLİNgİR Ernst & Young What is fraud? According to International Standard on Auditing (240): An intentional act By one or more individuals among management,
Indicators for Banks to Assist in Identifying Suspicious Transactions
Indicators for Banks to Assist in Identifying Suspicious Transactions A suspicious transaction may involve several factors that may on their own seem insignificant, but when analyzed may raise suspicion
The World Bank Risk Assessment Methodology
The World Bank Risk Assessment Methodology 1. Background World Bank has attached high importance to money laundering and terrorist financing risk assessment from the early years of the recognition of risk
AML & Mortgage Fraud Compliance Program v. 08.2013 ANTI-MONEY LAUNDERING & MORTGAGE FRAUD COMPLIANCE PROGRAM
ANTI-MONEY LAUNDERING & MORTGAGE FRAUD COMPLIANCE PROGRAM Version: 2.0 dated 08.2013 TABLE OF CONTENTS AML & Mortgage Fraud Compliance Program 1.0 PURPOSE AND SCOPE... 3 2.0 APPLICABLE REGULATIONS AND
HIGH-RISK COUNTRIES IN AML MONITORING
HIGH-RISK COUNTRIES IN AML MONITORING ALICIA CORTEZ TABLE OF CONTENTS I. Introduction 3 II. High-Risk Countries 3 Customers 4 Products 7 Monitoring 8 Audit Considerations 8 III. Conclusion 10 IV. References
NOTICE TO BANKS MONETARY AUTHORITY OF SINGAPORE ACT, CAP. 186 PREVENTION OF MONEY LAUNDERING AND COUNTERING THE FINANCING OF TERRORISM - BANKS
MAS 626 2 July 2007 Last revised on 1 July 2014 (Refer to endnotes for history of amendments) NOTICE TO BANKS MONETARY AUTHORITY OF SINGAPORE ACT, CAP. 186 PREVENTION OF MONEY LAUNDERING AND COUNTERING
FORETHOUGHT LIFE INSURANCE COMPANY AND FORETHOUGHT NATIONAL LIFE INSURANCE COMPANY ANTI-MONEY LAUNDERING GUIDELINES FOR PRODUCERS
FORETHOUGHT LIFE INSURANCE COMPANY AND FORETHOUGHT NATIONAL LIFE INSURANCE COMPANY ANTI-MONEY LAUNDERING GUIDELINES FOR PRODUCERS Revised July 7, 2010 Which Insurance Products Are Covered By These Guidelines?
Fraud Awareness Training
UT System Administration General Compliance Training Fall 2014 This training will take approximately 20 minutes to complete Objectives What is occupational fraud Common myths about fraud Conditions for
CASES FORWARDED WITH REGARD TO CORRUPTION
BELGIAN FINANCIAL INTELLIGENCE PROCESSING UNIT CTIF-CFI Avenue de la Toison d Or - Gulden Vlieslaan 55/1-1060 Brussels - BELGIUM Tel.: + 32 (0)2 533 72 11 Fax: + 32 (0)2 533 72 00 E-mail: [email protected]
Using Data Analytics to Detect Fraud
Using Data Analytics to Detect Fraud Fundamental Data Analysis Techniques 2016 Association of Certified Fraud Examiners, Inc. Discussion Question For each data analysis technique discussed in this section,
THE FORTY RECOMMENDATIONS OF THE FINANCIAL ACTION TASK FORCE ON MONEY LAUNDERING
THE FORTY RECOMMENDATIONS OF THE FINANCIAL ACTION TASK FORCE ON MONEY LAUNDERING 1990 A. GENERAL FRAMEWORK OF THE RECOMMENDATIONS 1. Each country should, without further delay, take steps to fully implement
Presented By Greg Baldwin
ANTI-MONEY LAUNDERING COMPLIANCE OFFICER TRAINING Presented By Greg Baldwin THE ANTI-MONEY LAUNDERING COMPLIANCE OFFICER We re going to cover: Basis for the requirement to have a Compliance Officer The
Strategic analysis brief Money laundering through real estate
Strategic analysis brief Money laundering through real estate Strategic analysis briefs AUSTRAC strategic analysis briefs provide insights for government and industry on money laundering and terrorism
Secure Semantic Web Service Using SAML
Secure Semantic Web Service Using SAML JOO-YOUNG LEE and KI-YOUNG MOON Information Security Department Electronics and Telecommunications Research Institute 161 Gajeong-dong, Yuseong-gu, Daejeon KOREA
CATCH ME IF YOU CAN: THE IRS IMPERSONATION SCAM AND WHAT IS BEING DONE ABOUT IT
STATEMENT OF ALYSA D. ERICHS SPECIAL AGENT IN CHARGE HOMELAND SECURITY INVESTIGATIONS MIAMI U.S. IMMIGRATION AND CUSTOMS ENFORCEMENT REGARDING A HEARING ON CATCH ME IF YOU CAN: THE IRS IMPERSONATION SCAM
SFC AML/CFT Seminar Governance, PEPs & Transaction Monitoring. Philip Rodd
SFC AML/CFT Seminar Governance, PEPs & Transaction Monitoring Philip Rodd Agenda Page ML/TF Vulnerabilities for the Securities Industry 3 Governance and Culture 5 PEP Identification 7 Case Study Structuring
SPECIAL RECOMMENDATION IX: CASH COURIERS DETECTING AND PREVENTING THE CROSS-BORDER TRANSPORTATION OF CASH BY TERRORISTS AND OTHER CRIMINALS
)LQDQFLDO$FWLRQ7DVN)RUFH RQ0RQH\/DXQGHULQJ *URXSHGDFWLRQILQDQFLqUH VXUOHEODQFKLPHQWGHFDSLWDX[ '(7(&7,1*$1'35(9(17,1*7+(&5266%25'(5 75$163257$7,212)&$6+%
Meeting Identity Theft Red Flags Regulations with IBM Fraud, Risk & Compliance Solutions
Leveraging Risk & Compliance for Strategic Advantage IBM Information Management software Meeting Identity Theft Red Flags Regulations with IBM Fraud, Risk & Compliance Solutions XXX Astute financial services
Malaysia s National Risk Assessment. 1 National ML/TF Risk Assessment (NRA)
Malaysia s National Risk Assessment 1 National ML/TF Risk Assessment (NRA) Cooperation and collaboration are vital for an AML/CFT regime to be effective Ultimate Objective: Protect Financial System and
REPLIES TO THE QUESTIONNAIRE ON PROTECTION OF WITNESSES AND PENTITI IN RELATION TO ACTS OF TERRORISM POLAND
REPLIES TO THE QUESTIONNAIRE ON PROTECTION OF WITNESSES AND PENTITI IN RELATION TO ACTS OF TERRORISM POLAND a. General Information 1. Please describe the framework (legal provisions and established practice)
FFIEC BSA/AML Examination Manual. Four Key Components of a Suspicious Activity Monitoring Program
FFIEC BSA/AML Examination Manual Four Key Components of a Suspicious Activity Monitoring Program 1 2 IDENTIFICATION OF SUSPICIOUS ACTIVITY 3 Unusual Activity Identification Employee Identification Law
Financial Services Regulatory Commission Antigua and Barbuda Division of Gaming Customer Due Diligence Guidelines for
Division of Gaming Customer Due Diligence Guidelines for Interactive Gaming & Interactive Wagering Companies November 2005 Customer Due Diligence for Interactive Gaming & Interactive Wagering Companies
Money Laundering Trends and Typologies in the Canadian Securities Sector
Money Laundering Trends and Typologies in the Canadian Securities Sector Her Majesty the Queen in Right of Canada, 2013 Catalogue No.: FD5-1/6-2013E-PDF ISBN: 978-1-100-21778-9 FINTRAC Typologies and Trends
PREVENTION OF MONEY LAUNDERING AND FINANCING OF TERRORISM ACT
Law no. 10/2014 PREVENTION OF MONEY LAUNDERING AND FINANCING OF TERRORISM ACT (unofficial English translation) PREVENTION OF MONEY LAUNDERING AND FINANCING OF TERRORISM ACT CONTENTS PART ONE PRELIMINARY
MPS GROUP GLOBAL ANTI-MONEY LAUNDERING POLICY
Siena, march 2012 Pag. 1 di 5 MPS GROUP 1 - A p p l i c a t i o n This Global Anti-Money Laundering Policy (Policy) applies to all Banca Monte dei Paschi di Siena subsidiaries and branches (collectively
Mass Marketing Fraud: Money Laundering Methods and Techniques
Financial Transactions and Reports Analysis Centre of Canada Centre d'analyse des opérations et déclarations financières du Canada Mass Marketing Fraud: Money Laundering Methods and Techniques FINTRAC
Stopping the Flow of Health Care Fraud with Technology, Data and Analytics
White Paper and New Ways to Fight It Stopping the Flow of Health Care Fraud with Technology, Data and Analytics January 2014 Health care costs are rising and everyone is being affected, including patients,
Guidance. FIN-2014-G001 Issued: February 14, 2014 Subject: BSA Expectations Regarding Marijuana-Related Businesses
Guidance FIN-2014-G001 Issued: February 14, 2014 Subject: BSA Expectations Regarding Marijuana-Related Businesses The Financial Crimes Enforcement Network ( FinCEN ) is issuing guidance to clarify Bank
7.0 Information Security Protections The aggregation and analysis of large collections of data and the development
7.0 Information Security Protections The aggregation and analysis of large collections of data and the development of interconnected information systems designed to facilitate information sharing is revolutionizing
Anti-Money Laundering Issues for Securities Transfer Agents
Anti-Money Laundering Issues for Securities Transfer Agents Stanley V. Ragalevsky, Esq. Kirkpatrick & Lockhart LLP 75 State Street Boston, MA 02110 (617) 261-3100 Caveat This outline and the oral presentation
Law Related to Fraud. Civil Justice System. 2013 Association of Certified Fraud Examiners, Inc. 2015 Association of Certified Fraud Examiners, Inc.
Law Related to Fraud Civil Justice System 2013 Association of Certified Fraud Examiners, Inc. Civil Litigation Beginning the Civil Action Filing the Complaint Jurisdiction Grounds for relief (what are
FINRA E-Learning Courses
FINRA E-Learning Courses The Definitive Source for Firm Element Training FINRA develops a wide range of e-learning courses for registered representatives, supervisors, operations staff, compliance personnel
ACCOUNTANTS AND TAX ADVISORS
ACCOUNTANTS AND TAX ADVISORS Sector Specific AML/CFT Guidance Notes May 2015 Whilst this publication has been prepared by the Financial Supervision Commission, it is not a legal document and should not
ANTI-MONEY LAUNDERING COMPLIANCE GUIDE
LATIN AMERICA AND THE CARIBBEAN ANTI-MONEY LAUNDERING COMPLIANCE GUIDE REPORTING REQUIREMENTS RECORDKEEPING EMPLOYEE TRAINING PREVENTION OF TERRORISM FINANCING COMPLIANCE WITH LOCAL REGULATIONS COMPLIANCE
Investigative Techniques
Investigative Techniques Data Analysis and Reporting Tools 2016 Association of Certified Fraud Examiners, Inc. Data Mining v. Data Analysis Data mining is the science of searching large volumes of data
Nevada Registered Agents Association
Nevada Registered Agents Association Best Practices Recommendations to Prevent the Exploitation of Nevada Business Entities for Criminal Activities, and for the Protection of the Nevada Registered Agent
Japan Financial Intelligence Center(JAFIC)
Japan Financial Intelligence Center(JAFIC) 2012 National Police Agency JAFIC: Japan Financial Intelligence Center Table of CONTENTS Chapter 1 Overview of History of Anti-Money Laundering and Countering
D- To keep all the papers and documents justifying all transactions and operations for 10 years.
PROCEDURES MANUAL North Africa International Bank TITLE: Transfers, Cash Remittances and Withdrawals PROCEDURE NOTE Anti-Money Laundering (AML) and Anti-Terrorism Financing (ATF) Combating Procedures.
FIN-2014-A007 August 11, 2014
FIN-2014-A007 August 11, 2014 Advisory to U.S. Financial Institutions on Promoting a Culture of Compliance BSA/AML shortcomings have triggered recent civil and criminal enforcement actions FinCEN seeks
Guidelines on the Identification of Suspicious Financial Transactions for Financial Dealers
Attachment to the Decision of the Head of the Indonesian Financial Transaction Reports and Analysis Center Number: 2/4/KEP.PPATK/2003 Guideline II FIRST EDITION INDONESIAN FINANCIAL TRANSACTION REPORTS
MERCHANTS EXPRESS MONEY ORDER COMPANY, INC. (MEMO) AGENT ANTI-MONEY LAUNDERING COMPLIANCE GUIDE
MERCHANTS EXPRESS MONEY ORDER COMPANY, INC. (MEMO) AGENT ANTI-MONEY LAUNDERING COMPLIANCE GUIDE Table of Contents WHY YOU AND YOUR EMPLOYEES SHOULD READ AND UNDERSTAND THIS GUIDE...1 WHY THIS GUIDE IS
LAW No. 1015/96 PREVENTING AND PENALIZING UNLAWFUL ACTS TO LAUNDER MONEY OR PROPERTY
LAW No. 1015/96 PREVENTING AND PENALIZING UNLAWFUL ACTS TO LAUNDER MONEY OR PROPERTY THE CONGRESS OF THE PARAGUAYAN NATION ENACTS THE FOLLOWING WITH FORCE OF LAW: CHAPTER I GENERAL PROVISIONS Article 1.
Managing of client money, securities or other assets; Management of bank, savings or securities accounts;
22 PART 4 The Risks PART 4 The Risks 4.1 In this part, suspicious activity indicators and case examples specific to individual sectors are presented. You may learn more about money laundering and terrorist
POTENTIAL MONEY LAUNDERING WARNING SIGNS POTENTIAL ABUSIVE ACTS - CUSTOMER ACTIVITY WARNING SIGNS
POTENTIAL MONEY LAUNDERING WARNING SIGNS POTENTIAL ABUSIVE ACTS - CUSTOMER ACTIVITY WARNING SIGNS Activity Inconsistent with the Customer s Business A customer opens several accounts for the type of business
FINANCING OF TERRORISM THROUGH NON PROFIT ORGANIZATIONS
CENTRAL BANK OF THE REPUBLIC OF ARMENIA FINANCIAL MONITORING CENTER APPROVED BY THE DECISION OF THE GOVERNOR OF THE CENTRAL BANK OF ARMENIA NO 1/1218A FROM 11.12.2014 ANNEX FINANCING OF TERRORISM THROUGH
The role of financial intelligence units in counter-terrorism terrorism investigations
The role of financial intelligence units in counter-terrorism terrorism investigations Counter-Terrorism Committee Executive Directorate (CTED) United Nations New York, 12 September 2012 What is an FIU?
FATF Recommendations Related to DNFBPs on Anti Money Laundering Assessment
FATF Recommendations Related to DNFBPs on Anti Money Laundering Assessment Normah Omar and Haslinn Hajudin Abstract Globally, member countries are expected to comply to the international standard on anti-money
Compliance Toolkit. Protecting Charities from Harm. Chapter 2: Due Diligence, Monitoring and Verification of End Use of Charitable Funds SUMMARY
Compliance Compliance Toolkit Protecting Charities from Harm Chapter 2: Due Diligence, Monitoring and Verification of End Use of Charitable Funds SUMMARY The Charity Commission The Charity Commission is
Case study on asset tracing
Recovering Stolen Assets: A Practitioner s Handbook ARNO THUERIG * Case study on asset tracing I. Case study background The client adviser of a Swiss private bank transferred approximately USD 1 million
REGULATION FOR LIFE INSURANCE AND FAMILY TAKAFUL INSURANCE BUSINESSES ON PREVENTION OF MONEY LAUNDERING AND FINANCING OF TERRORISM
REGULATION FOR LIFE INSURANCE AND FAMILY TAKAFUL INSURANCE BUSINESSES ON PREVENTION OF MONEY LAUNDERING AND FINANCING OF TERRORISM (unofficial English translation) REGULATION FOR LIFE INSURANCE AND FAMILY
RESIDENTIAL MORTGAGE LENDERS & ORIGINATORS L COMPLIANCE PROGRAM
RESIDENTIAL MORTGAGE LENDERS & ORIGINATORS L COMPLIANCE PROGRAM PO Box 760 Prosper, TX 75078 972 347 9921 www.americanhfm.com Contents INTRODUCTION... 6 New FinCEN Rule 31 CFR Parts 1010 and 1029... 6
UNDERSTANDING MONEY LAUNDERING
UNDERSTANDING MONEY LAUNDERING Preface In light of the international concerns growing on money laundering and the financing of terrorist activities, many countries have taken rigorous measures to curb
FSA reports on how banks deal with high-risk customers, correspondent banking relationships and wire transfers
July 2011 FSA reports on how banks deal with high-risk customers, correspondent banking relationships and wire transfers FSA reports on how banks deal with high-risk customers, correspondent banking 1
FINANCIAL CRIME RISK MANAGEMENT GUIDELINE
c FINANCIAL CRIME RISK MANAGEMENT GUIDELINE November 2011 TABLE OF CONTENTS Preamble... 3 Introduction... 4 Scope... 6 Coming into effect and updating... 7 Financial crime risks... 8 Financial crime risk
A Guide to Forensic Accounting Investigation. 2nd Edition
Brochure More information from http://www.researchandmarkets.com/reports/2211320/ A Guide to Forensic Accounting Investigation. 2nd Edition Description: Recent catastrophic business failures have caused
Best practices issued by the Middle East and North Africa Financial Action Task Force Concerning the HAWALA
Best practices issued by the Middle East and North Africa Financial Action Task Force Concerning the HAWALA December 2005 TABLE OF CONTENTS First: Hawala definition 3 Second: Characteristics of the Hawala
Asset Tracing. PC.DEL/790/12/Rev.1 4 September 2012. Seminar Identifying, Restraining and Recovering Stolen Assets in the OSCE Region Session IV
Seminar Identifying, Restraining and Recovering Stolen Assets in the OSCE Region Session IV Jean-Bernard Schmid State Prosecutor, Geneva PC.DEL/790/12/Rev.1 4 September 2012 ENGLISH only Asset Tracing
Automatic Timeline Construction For Computer Forensics Purposes
Automatic Timeline Construction For Computer Forensics Purposes Yoan Chabot, Aurélie Bertaux, Christophe Nicolle and Tahar Kechadi CheckSem Team, Laboratoire Le2i, UMR CNRS 6306 Faculté des sciences Mirande,
