SlideShare a Scribd company logo
1 of 18
Download to read offline
SAS founded in 2013 in Paris | http://linkurio.us | @linkurious
Visualizing an anti-
money laundering
investigation.
What is money laundering.
Money laundering is the
process in which the
proceeds of crime are
transformed into
ostensibly legitimate
money or other assets.
The 3 steps of the money laundering process.
Placement
Introducing cash into the
financial system by some
means.
Layering
Carrying out complex
financial transactions to
camouflage the illegal
source
Integration
Acquiring wealth generated
from the transactions of the
illicit funds
Criminals vs AML investigators.
Follow the trail of illegal
money to convict criminal
and seize assets.
Create a complex financial
maze to obfuscate the trail of
illegal money.
The
fraudsters
The
investigators
Graphs can help investigators
fight money laundering.
Linkurious allows
investigators to explore
visually the information and
to look for specific patterns.
More results, faster.
The investigators can use
visualization to communicate
their findings. It helps
collaboration and obtain
convictions.
Working with data coming
from various sources is
complex. A graph allows you
to link the events, persons or
organizations together.
Track the
relations
Find hidden
insights
Communicate
results
Graphs and data investigation.
Concrete example : scenario.
Who?
As a specialized police investigator, we are tasked with investigating a criminal organization.
What?
The leaders of the organization are Virginia Parker, Marilyn Meyer and Diane Lawson. They are suspected of
running a large drug operation. All we have at the start of the investigation is that a known associate of the
organization runs a small business called Tanoodle.
Why?
The objective of the investigation is to map the money laundering scheme in order to secure the convictions
of its perpetrators and seize their assets.
How?
We are going to use graph visualization to represent the information captured via the investigation. It will
help us target the suspects.
Concrete example : data.
ACME Corp
COMPANY
John Smith
PERSON
ACCOUNT ACCOUNT
SENDS_TOHAS_ACCOUNT HAS_ACCOUNT
Discovering links from
financial records.
Concrete example : a first suspicious company.
We are looking at Tanoodle, a company associated with the criminal
organization. It is linked to a bank account.
The interface of Linkurious also makes it easy to explore and edit a graph.
Concrete example : first connection.
Via its bank account, Tannodle is connected to Avavee a company it
transfers money to.
Concrete example : Avavee collects money.
The financial records of Avavee shows that it collects money from Avavee
and 6 other companies.
That money is then funnel to two bank accounts (bottom right corner).
Concrete example : another hub of companies.
Connected to Avavee and the first hub of companies is another company
called Youspan. It receives money from 5 companies and channels it to
the same 2 bank accounts as Avavee.
Avavee and Youspan are the second layer of the money laundering
scheme.
Concrete example : the third layer.
Further investigation, helps gather information about the two suspicious
bank accounts. They are associated with two other companies called
Digitube and Zava. It constitutes the third layer of the money laundering
scheme.
Concrete example : the first three layers.
The first three layers of the money laundering scheme form a directed
network.
Concrete example : the complete scheme.
By investigating Digitube and Zava, we are able to have a look at the
complete money laundering network with 2 new companies and three
people.
Concrete example : the leaders.
We are finally available to find the ultimate beneficiaries of the money
laundering scheme. Time to make arrests and seize funds!
You can do it too!
Contact us to discuss
your projects
contact@linkurio.us
Conclusion
Blog post on AML investigation : http://linkurio.us/investigating-a-money-
laundering-scheme
Dataset used in the example : https://www.dropbox.com/s/4yxslaysaagf17o/aml%
20dataset.zip?dl=0
Additional resources.

More Related Content

What's hot

iovation presents Fighting CNP Fraud - April 2016
iovation presents Fighting CNP Fraud - April 2016 iovation presents Fighting CNP Fraud - April 2016
iovation presents Fighting CNP Fraud - April 2016 TransUnion
 
A Practical Guide to Post-EMV Card Not Present Fraud
A Practical Guide to Post-EMV Card Not Present FraudA Practical Guide to Post-EMV Card Not Present Fraud
A Practical Guide to Post-EMV Card Not Present FraudForter
 
Product Sheet: Small Business Risk Exchange
Product Sheet: Small Business Risk ExchangeProduct Sheet: Small Business Risk Exchange
Product Sheet: Small Business Risk Exchangeclaytonroot
 
Affiliate Fraud Trends & the Policies Needed in the Industry
Affiliate Fraud Trends & the Policies Needed in the IndustryAffiliate Fraud Trends & the Policies Needed in the Industry
Affiliate Fraud Trends & the Policies Needed in the IndustryAffiliate Summit
 
Insurance stream - Marc DonFrancesco slides
Insurance stream - Marc DonFrancesco slidesInsurance stream - Marc DonFrancesco slides
Insurance stream - Marc DonFrancesco slidesCallcredit123
 
Money Laundering by Vivek Singh,Aryan College
Money Laundering  by Vivek Singh,Aryan CollegeMoney Laundering  by Vivek Singh,Aryan College
Money Laundering by Vivek Singh,Aryan CollegeAryan Ajmer
 
Merchant Link by the Numbers
Merchant Link by the NumbersMerchant Link by the Numbers
Merchant Link by the NumbersMerchant Link
 
Detecting fraud through traffic analytics
Detecting fraud through traffic analyticsDetecting fraud through traffic analytics
Detecting fraud through traffic analyticsSven Hezel
 
Digital Risk: Protecting your Most Important Asset.
Digital Risk: Protecting your Most Important Asset.Digital Risk: Protecting your Most Important Asset.
Digital Risk: Protecting your Most Important Asset.RobbiePaterson2
 
What We Learned Working with Forter
What We Learned Working with ForterWhat We Learned Working with Forter
What We Learned Working with ForterSimplifilm
 
Anti Money Laundering Presentation
Anti Money Laundering PresentationAnti Money Laundering Presentation
Anti Money Laundering PresentationAudrius Sapola
 
Combating money laundering & terror financing case of nigeria- adv. chitengi...
Combating money laundering & terror financing  case of nigeria- adv. chitengi...Combating money laundering & terror financing  case of nigeria- adv. chitengi...
Combating money laundering & terror financing case of nigeria- adv. chitengi...cjnsipho
 
The Ramblings of a Title Man - Wire Fraud
The Ramblings of a Title Man - Wire FraudThe Ramblings of a Title Man - Wire Fraud
The Ramblings of a Title Man - Wire FraudMichael Holden
 
Know your Fraudster: Preparing for the Post EMV Card-Not-Present Fraud
Know your Fraudster: Preparing for the Post EMV Card-Not-Present FraudKnow your Fraudster: Preparing for the Post EMV Card-Not-Present Fraud
Know your Fraudster: Preparing for the Post EMV Card-Not-Present FraudNoam Inbar
 
Money Laundering Basics And Impact
Money Laundering   Basics And ImpactMoney Laundering   Basics And Impact
Money Laundering Basics And ImpactPaul_R_Freeman
 

What's hot (19)

iovation presents Fighting CNP Fraud - April 2016
iovation presents Fighting CNP Fraud - April 2016 iovation presents Fighting CNP Fraud - April 2016
iovation presents Fighting CNP Fraud - April 2016
 
A Practical Guide to Post-EMV Card Not Present Fraud
A Practical Guide to Post-EMV Card Not Present FraudA Practical Guide to Post-EMV Card Not Present Fraud
A Practical Guide to Post-EMV Card Not Present Fraud
 
Product Sheet: Small Business Risk Exchange
Product Sheet: Small Business Risk ExchangeProduct Sheet: Small Business Risk Exchange
Product Sheet: Small Business Risk Exchange
 
Affiliate Fraud Trends & the Policies Needed in the Industry
Affiliate Fraud Trends & the Policies Needed in the IndustryAffiliate Fraud Trends & the Policies Needed in the Industry
Affiliate Fraud Trends & the Policies Needed in the Industry
 
Insurance stream - Marc DonFrancesco slides
Insurance stream - Marc DonFrancesco slidesInsurance stream - Marc DonFrancesco slides
Insurance stream - Marc DonFrancesco slides
 
Money Laundering by Vivek Singh,Aryan College
Money Laundering  by Vivek Singh,Aryan CollegeMoney Laundering  by Vivek Singh,Aryan College
Money Laundering by Vivek Singh,Aryan College
 
Merchant Link by the Numbers
Merchant Link by the NumbersMerchant Link by the Numbers
Merchant Link by the Numbers
 
Money laundering
Money launderingMoney laundering
Money laundering
 
Detecting fraud through traffic analytics
Detecting fraud through traffic analyticsDetecting fraud through traffic analytics
Detecting fraud through traffic analytics
 
Digital Risk: Protecting your Most Important Asset.
Digital Risk: Protecting your Most Important Asset.Digital Risk: Protecting your Most Important Asset.
Digital Risk: Protecting your Most Important Asset.
 
What We Learned Working with Forter
What We Learned Working with ForterWhat We Learned Working with Forter
What We Learned Working with Forter
 
Anti Money Laundering Presentation
Anti Money Laundering PresentationAnti Money Laundering Presentation
Anti Money Laundering Presentation
 
RSA Conference 2016 Review
RSA Conference 2016 ReviewRSA Conference 2016 Review
RSA Conference 2016 Review
 
Fighting back! short
Fighting back! shortFighting back! short
Fighting back! short
 
Combating money laundering & terror financing case of nigeria- adv. chitengi...
Combating money laundering & terror financing  case of nigeria- adv. chitengi...Combating money laundering & terror financing  case of nigeria- adv. chitengi...
Combating money laundering & terror financing case of nigeria- adv. chitengi...
 
Money Laundering and Corruption
Money Laundering and CorruptionMoney Laundering and Corruption
Money Laundering and Corruption
 
The Ramblings of a Title Man - Wire Fraud
The Ramblings of a Title Man - Wire FraudThe Ramblings of a Title Man - Wire Fraud
The Ramblings of a Title Man - Wire Fraud
 
Know your Fraudster: Preparing for the Post EMV Card-Not-Present Fraud
Know your Fraudster: Preparing for the Post EMV Card-Not-Present FraudKnow your Fraudster: Preparing for the Post EMV Card-Not-Present Fraud
Know your Fraudster: Preparing for the Post EMV Card-Not-Present Fraud
 
Money Laundering Basics And Impact
Money Laundering   Basics And ImpactMoney Laundering   Basics And Impact
Money Laundering Basics And Impact
 

Viewers also liked

Anti money laundering
Anti money launderingAnti money laundering
Anti money launderingUttma Shukla
 
How to use phone calls and network analysis to identify criminals
How to use phone calls and network analysis to identify criminals How to use phone calls and network analysis to identify criminals
How to use phone calls and network analysis to identify criminals Linkurious
 
Using graph technologies to fight fraud
Using graph technologies to fight fraudUsing graph technologies to fight fraud
Using graph technologies to fight fraudLinkurious
 
Money laundering
Money launderingMoney laundering
Money launderingsaadiakh
 
How to apply graph analytics for bank loan fraud detection?
How to apply graph analytics for bank loan fraud detection?How to apply graph analytics for bank loan fraud detection?
How to apply graph analytics for bank loan fraud detection?Linkurious
 
Basics of Anti-Money Laundering : A Really Quick Primer
Basics of Anti-Money Laundering : A Really Quick PrimerBasics of Anti-Money Laundering : A Really Quick Primer
Basics of Anti-Money Laundering : A Really Quick Primercomplianceonline123
 
Anti-money laundering presentation
Anti-money laundering presentationAnti-money laundering presentation
Anti-money laundering presentationElias Mose
 
Anti Money Laundering - CDD & KYC
Anti Money Laundering - CDD & KYCAnti Money Laundering - CDD & KYC
Anti Money Laundering - CDD & KYCBesart Qerimi
 
Anti-Money Laundering (AML) Risk Assessment Process
Anti-Money Laundering (AML) Risk Assessment ProcessAnti-Money Laundering (AML) Risk Assessment Process
Anti-Money Laundering (AML) Risk Assessment Processaccenture
 
Case study on AXA Sun Life - Anti Money Laundering
Case study  on AXA Sun Life - Anti Money LaunderingCase study  on AXA Sun Life - Anti Money Laundering
Case study on AXA Sun Life - Anti Money LaunderingCGI
 
Money laundering (sadiq shariff10@hotmail.com)
Money laundering (sadiq shariff10@hotmail.com)Money laundering (sadiq shariff10@hotmail.com)
Money laundering (sadiq shariff10@hotmail.com)Sadiq Shariff
 
Graph visualization options and latest developments
Graph visualization options and latest developmentsGraph visualization options and latest developments
Graph visualization options and latest developmentsLinkurious
 
Dossier presentation bmr_associés
Dossier presentation bmr_associésDossier presentation bmr_associés
Dossier presentation bmr_associésMarjorie KIENTZLER
 
Indian Regulators & AML Actions
Indian Regulators & AML ActionsIndian Regulators & AML Actions
Indian Regulators & AML ActionsAbhishek Bali
 
Sas anti money laundering training
Sas anti money laundering training Sas anti money laundering training
Sas anti money laundering training bidwhm
 

Viewers also liked (20)

Anti money laundering
Anti money launderingAnti money laundering
Anti money laundering
 
How to use phone calls and network analysis to identify criminals
How to use phone calls and network analysis to identify criminals How to use phone calls and network analysis to identify criminals
How to use phone calls and network analysis to identify criminals
 
Using graph technologies to fight fraud
Using graph technologies to fight fraudUsing graph technologies to fight fraud
Using graph technologies to fight fraud
 
Money laundering
Money launderingMoney laundering
Money laundering
 
0122 02SAS
0122 02SAS0122 02SAS
0122 02SAS
 
How to apply graph analytics for bank loan fraud detection?
How to apply graph analytics for bank loan fraud detection?How to apply graph analytics for bank loan fraud detection?
How to apply graph analytics for bank loan fraud detection?
 
Basics of Anti-Money Laundering : A Really Quick Primer
Basics of Anti-Money Laundering : A Really Quick PrimerBasics of Anti-Money Laundering : A Really Quick Primer
Basics of Anti-Money Laundering : A Really Quick Primer
 
Anti-money laundering presentation
Anti-money laundering presentationAnti-money laundering presentation
Anti-money laundering presentation
 
Anti Money Laundering - CDD & KYC
Anti Money Laundering - CDD & KYCAnti Money Laundering - CDD & KYC
Anti Money Laundering - CDD & KYC
 
Anti-Money Laundering (AML) Risk Assessment Process
Anti-Money Laundering (AML) Risk Assessment ProcessAnti-Money Laundering (AML) Risk Assessment Process
Anti-Money Laundering (AML) Risk Assessment Process
 
Case study on AXA Sun Life - Anti Money Laundering
Case study  on AXA Sun Life - Anti Money LaunderingCase study  on AXA Sun Life - Anti Money Laundering
Case study on AXA Sun Life - Anti Money Laundering
 
Money laundering (sadiq shariff10@hotmail.com)
Money laundering (sadiq shariff10@hotmail.com)Money laundering (sadiq shariff10@hotmail.com)
Money laundering (sadiq shariff10@hotmail.com)
 
AML
AMLAML
AML
 
Case sas 2
Case sas 2Case sas 2
Case sas 2
 
Money Laundering
Money LaunderingMoney Laundering
Money Laundering
 
Graph visualization options and latest developments
Graph visualization options and latest developmentsGraph visualization options and latest developments
Graph visualization options and latest developments
 
HSBC
HSBCHSBC
HSBC
 
Dossier presentation bmr_associés
Dossier presentation bmr_associésDossier presentation bmr_associés
Dossier presentation bmr_associés
 
Indian Regulators & AML Actions
Indian Regulators & AML ActionsIndian Regulators & AML Actions
Indian Regulators & AML Actions
 
Sas anti money laundering training
Sas anti money laundering training Sas anti money laundering training
Sas anti money laundering training
 

Similar to Visualizing an Anti-Money Laundering Investigation

Money laundering has become a mechanism for terrorist financing acti.pdf
Money laundering has become a mechanism for terrorist financing acti.pdfMoney laundering has become a mechanism for terrorist financing acti.pdf
Money laundering has become a mechanism for terrorist financing acti.pdfshahidqamar17
 
VAT fraud detection : the mysterious case of the missing trader
VAT fraud detection : the mysterious case of the missing traderVAT fraud detection : the mysterious case of the missing trader
VAT fraud detection : the mysterious case of the missing traderLinkurious
 
Money Laundering: A Three-Step Secret Game
Money Laundering: A Three-Step Secret GameMoney Laundering: A Three-Step Secret Game
Money Laundering: A Three-Step Secret GameMd Arman
 
H030101043047
H030101043047H030101043047
H030101043047theijes
 
Greenfield Peace Essay Scholarship. Online assignment writing service.
Greenfield Peace Essay Scholarship. Online assignment writing service.Greenfield Peace Essay Scholarship. Online assignment writing service.
Greenfield Peace Essay Scholarship. Online assignment writing service.Lisa Davis
 
Money laundering has become a mechanism for financing terrorist acti.pdf
Money laundering has become a mechanism for financing terrorist acti.pdfMoney laundering has become a mechanism for financing terrorist acti.pdf
Money laundering has become a mechanism for financing terrorist acti.pdfarorasales234
 
THE LEGAL AND INSTITUTIONAL FRAMEWORKS FOR COMBATTING MONEY LAUNDERING IN CAM...
THE LEGAL AND INSTITUTIONAL FRAMEWORKS FOR COMBATTING MONEY LAUNDERING IN CAM...THE LEGAL AND INSTITUTIONAL FRAMEWORKS FOR COMBATTING MONEY LAUNDERING IN CAM...
THE LEGAL AND INSTITUTIONAL FRAMEWORKS FOR COMBATTING MONEY LAUNDERING IN CAM...AkashSharma618775
 
Distributed Corruption Reporting_Catalysts For Change Zone of Future Innovtion
Distributed Corruption Reporting_Catalysts For Change Zone of Future InnovtionDistributed Corruption Reporting_Catalysts For Change Zone of Future Innovtion
Distributed Corruption Reporting_Catalysts For Change Zone of Future InnovtionInstitute for the Future
 
Banking Law - Money laundering
Banking Law - Money launderingBanking Law - Money laundering
Banking Law - Money launderingDivyansh Sharma
 
How To Become A Good Writer Essay. Online assignment writing service.
How To Become A Good Writer Essay. Online assignment writing service.How To Become A Good Writer Essay. Online assignment writing service.
How To Become A Good Writer Essay. Online assignment writing service.Jenn Smith
 
Money Laundering: A Three Step Secret Game
Money Laundering: A Three Step Secret GameMoney Laundering: A Three Step Secret Game
Money Laundering: A Three Step Secret GameMd Arman
 
Best Custom Paper Writing Service
Best Custom Paper Writing ServiceBest Custom Paper Writing Service
Best Custom Paper Writing ServiceTammi Busch
 
Telephone Essay In Tamil. Online assignment writing service.
Telephone Essay In Tamil. Online assignment writing service.Telephone Essay In Tamil. Online assignment writing service.
Telephone Essay In Tamil. Online assignment writing service.Jill Johnson
 
Understanding Anti-Money Laundering_ A Comprehensive Guide.pdf
Understanding Anti-Money Laundering_ A Comprehensive Guide.pdfUnderstanding Anti-Money Laundering_ A Comprehensive Guide.pdf
Understanding Anti-Money Laundering_ A Comprehensive Guide.pdftewhimanshu23
 
Essay On Mobile Technology. Use of mobile essay. Mobile Phone Essay for Stud...
Essay On Mobile Technology.  Use of mobile essay. Mobile Phone Essay for Stud...Essay On Mobile Technology.  Use of mobile essay. Mobile Phone Essay for Stud...
Essay On Mobile Technology. Use of mobile essay. Mobile Phone Essay for Stud...Teresa Laverty
 
Unmasking Money Laundering_ How Criminals Clean Their Dirty Cash (1).pptx
Unmasking Money Laundering_ How Criminals Clean Their Dirty Cash (1).pptxUnmasking Money Laundering_ How Criminals Clean Their Dirty Cash (1).pptx
Unmasking Money Laundering_ How Criminals Clean Their Dirty Cash (1).pptxjiyalouis
 
Money laundry-rAzik's
Money laundry-rAzik'sMoney laundry-rAzik's
Money laundry-rAzik'sRazik Khan
 

Similar to Visualizing an Anti-Money Laundering Investigation (20)

Money laundering has become a mechanism for terrorist financing acti.pdf
Money laundering has become a mechanism for terrorist financing acti.pdfMoney laundering has become a mechanism for terrorist financing acti.pdf
Money laundering has become a mechanism for terrorist financing acti.pdf
 
VAT fraud detection : the mysterious case of the missing trader
VAT fraud detection : the mysterious case of the missing traderVAT fraud detection : the mysterious case of the missing trader
VAT fraud detection : the mysterious case of the missing trader
 
Money Laundering: A Three-Step Secret Game
Money Laundering: A Three-Step Secret GameMoney Laundering: A Three-Step Secret Game
Money Laundering: A Three-Step Secret Game
 
H030101043047
H030101043047H030101043047
H030101043047
 
Greenfield Peace Essay Scholarship. Online assignment writing service.
Greenfield Peace Essay Scholarship. Online assignment writing service.Greenfield Peace Essay Scholarship. Online assignment writing service.
Greenfield Peace Essay Scholarship. Online assignment writing service.
 
Money laundering has become a mechanism for financing terrorist acti.pdf
Money laundering has become a mechanism for financing terrorist acti.pdfMoney laundering has become a mechanism for financing terrorist acti.pdf
Money laundering has become a mechanism for financing terrorist acti.pdf
 
THE LEGAL AND INSTITUTIONAL FRAMEWORKS FOR COMBATTING MONEY LAUNDERING IN CAM...
THE LEGAL AND INSTITUTIONAL FRAMEWORKS FOR COMBATTING MONEY LAUNDERING IN CAM...THE LEGAL AND INSTITUTIONAL FRAMEWORKS FOR COMBATTING MONEY LAUNDERING IN CAM...
THE LEGAL AND INSTITUTIONAL FRAMEWORKS FOR COMBATTING MONEY LAUNDERING IN CAM...
 
Distributed Corruption Reporting_Catalysts For Change Zone of Future Innovtion
Distributed Corruption Reporting_Catalysts For Change Zone of Future InnovtionDistributed Corruption Reporting_Catalysts For Change Zone of Future Innovtion
Distributed Corruption Reporting_Catalysts For Change Zone of Future Innovtion
 
Money laundering
Money launderingMoney laundering
Money laundering
 
Banking Law - Money laundering
Banking Law - Money launderingBanking Law - Money laundering
Banking Law - Money laundering
 
How To Become A Good Writer Essay. Online assignment writing service.
How To Become A Good Writer Essay. Online assignment writing service.How To Become A Good Writer Essay. Online assignment writing service.
How To Become A Good Writer Essay. Online assignment writing service.
 
Money Laundering: A Three Step Secret Game
Money Laundering: A Three Step Secret GameMoney Laundering: A Three Step Secret Game
Money Laundering: A Three Step Secret Game
 
Best Custom Paper Writing Service
Best Custom Paper Writing ServiceBest Custom Paper Writing Service
Best Custom Paper Writing Service
 
Telephone Essay In Tamil. Online assignment writing service.
Telephone Essay In Tamil. Online assignment writing service.Telephone Essay In Tamil. Online assignment writing service.
Telephone Essay In Tamil. Online assignment writing service.
 
Help Writing Dbq Essay
Help Writing Dbq EssayHelp Writing Dbq Essay
Help Writing Dbq Essay
 
Understanding Anti-Money Laundering_ A Comprehensive Guide.pdf
Understanding Anti-Money Laundering_ A Comprehensive Guide.pdfUnderstanding Anti-Money Laundering_ A Comprehensive Guide.pdf
Understanding Anti-Money Laundering_ A Comprehensive Guide.pdf
 
Money laundering
Money launderingMoney laundering
Money laundering
 
Essay On Mobile Technology. Use of mobile essay. Mobile Phone Essay for Stud...
Essay On Mobile Technology.  Use of mobile essay. Mobile Phone Essay for Stud...Essay On Mobile Technology.  Use of mobile essay. Mobile Phone Essay for Stud...
Essay On Mobile Technology. Use of mobile essay. Mobile Phone Essay for Stud...
 
Unmasking Money Laundering_ How Criminals Clean Their Dirty Cash (1).pptx
Unmasking Money Laundering_ How Criminals Clean Their Dirty Cash (1).pptxUnmasking Money Laundering_ How Criminals Clean Their Dirty Cash (1).pptx
Unmasking Money Laundering_ How Criminals Clean Their Dirty Cash (1).pptx
 
Money laundry-rAzik's
Money laundry-rAzik'sMoney laundry-rAzik's
Money laundry-rAzik's
 

More from Linkurious

Using graph technology for multi-INT investigations
Using graph technology for multi-INT investigationsUsing graph technology for multi-INT investigations
Using graph technology for multi-INT investigationsLinkurious
 
Webinar: What's new in Linkurious Enterprise 2.8
Webinar: What's new in Linkurious Enterprise 2.8Webinar: What's new in Linkurious Enterprise 2.8
Webinar: What's new in Linkurious Enterprise 2.8Linkurious
 
Graph-based intelligence analysis
Graph-based intelligence analysis Graph-based intelligence analysis
Graph-based intelligence analysis Linkurious
 
What's new in Linkurious Enterprise 2.7
What's new in Linkurious Enterprise 2.7What's new in Linkurious Enterprise 2.7
What's new in Linkurious Enterprise 2.7Linkurious
 
How to visualize Cosmos DB graph data
How to visualize Cosmos DB graph dataHow to visualize Cosmos DB graph data
How to visualize Cosmos DB graph dataLinkurious
 
GraphTech Ecosystem - part 3: Graph Visualization
GraphTech Ecosystem - part 3: Graph VisualizationGraphTech Ecosystem - part 3: Graph Visualization
GraphTech Ecosystem - part 3: Graph VisualizationLinkurious
 
Getting started with Cosmos DB + Linkurious Enterprise
Getting started with Cosmos DB + Linkurious EnterpriseGetting started with Cosmos DB + Linkurious Enterprise
Getting started with Cosmos DB + Linkurious EnterpriseLinkurious
 
GraphTech Ecosystem - part 2: Graph Analytics
 GraphTech Ecosystem - part 2: Graph Analytics GraphTech Ecosystem - part 2: Graph Analytics
GraphTech Ecosystem - part 2: Graph AnalyticsLinkurious
 
GraphTech Ecosystem - part 1: Graph Databases
GraphTech Ecosystem - part 1: Graph DatabasesGraphTech Ecosystem - part 1: Graph Databases
GraphTech Ecosystem - part 1: Graph DatabasesLinkurious
 
Graph analytics in Linkurious Enterprise
Graph analytics in Linkurious EnterpriseGraph analytics in Linkurious Enterprise
Graph analytics in Linkurious EnterpriseLinkurious
 
Graph technology and data-journalism: the case of the Paradise Papers
Graph technology and data-journalism: the case of the Paradise PapersGraph technology and data-journalism: the case of the Paradise Papers
Graph technology and data-journalism: the case of the Paradise PapersLinkurious
 
Visualize the Knowledge Graph and Unleash Your Data
Visualize the Knowledge Graph and Unleash Your DataVisualize the Knowledge Graph and Unleash Your Data
Visualize the Knowledge Graph and Unleash Your DataLinkurious
 
Graph-based Product Lifecycle Management
Graph-based Product Lifecycle ManagementGraph-based Product Lifecycle Management
Graph-based Product Lifecycle ManagementLinkurious
 
Fraudes Financières: Méthodes de Prévention et Détection
Fraudes Financières: Méthodes de Prévention et DétectionFraudes Financières: Méthodes de Prévention et Détection
Fraudes Financières: Méthodes de Prévention et DétectionLinkurious
 
Detecting eCommerce Fraud with Neo4j and Linkurious
Detecting eCommerce Fraud with Neo4j and LinkuriousDetecting eCommerce Fraud with Neo4j and Linkurious
Detecting eCommerce Fraud with Neo4j and LinkuriousLinkurious
 
Graph-based Network & IT Management.
Graph-based Network & IT Management.Graph-based Network & IT Management.
Graph-based Network & IT Management.Linkurious
 
Graph-powered data lineage in Finance
Graph-powered data lineage in FinanceGraph-powered data lineage in Finance
Graph-powered data lineage in FinanceLinkurious
 
Using Linkurious in your Enterprise Architecture projects
Using Linkurious in your Enterprise Architecture projectsUsing Linkurious in your Enterprise Architecture projects
Using Linkurious in your Enterprise Architecture projectsLinkurious
 
Linkurious SDK: Build enterprise-ready graph applications faster
Linkurious SDK: Build enterprise-ready graph applications fasterLinkurious SDK: Build enterprise-ready graph applications faster
Linkurious SDK: Build enterprise-ready graph applications fasterLinkurious
 
Fighting financial crime with graph analysis at BIWA Summit 2017
Fighting financial crime with graph analysis at BIWA Summit 2017Fighting financial crime with graph analysis at BIWA Summit 2017
Fighting financial crime with graph analysis at BIWA Summit 2017Linkurious
 

More from Linkurious (20)

Using graph technology for multi-INT investigations
Using graph technology for multi-INT investigationsUsing graph technology for multi-INT investigations
Using graph technology for multi-INT investigations
 
Webinar: What's new in Linkurious Enterprise 2.8
Webinar: What's new in Linkurious Enterprise 2.8Webinar: What's new in Linkurious Enterprise 2.8
Webinar: What's new in Linkurious Enterprise 2.8
 
Graph-based intelligence analysis
Graph-based intelligence analysis Graph-based intelligence analysis
Graph-based intelligence analysis
 
What's new in Linkurious Enterprise 2.7
What's new in Linkurious Enterprise 2.7What's new in Linkurious Enterprise 2.7
What's new in Linkurious Enterprise 2.7
 
How to visualize Cosmos DB graph data
How to visualize Cosmos DB graph dataHow to visualize Cosmos DB graph data
How to visualize Cosmos DB graph data
 
GraphTech Ecosystem - part 3: Graph Visualization
GraphTech Ecosystem - part 3: Graph VisualizationGraphTech Ecosystem - part 3: Graph Visualization
GraphTech Ecosystem - part 3: Graph Visualization
 
Getting started with Cosmos DB + Linkurious Enterprise
Getting started with Cosmos DB + Linkurious EnterpriseGetting started with Cosmos DB + Linkurious Enterprise
Getting started with Cosmos DB + Linkurious Enterprise
 
GraphTech Ecosystem - part 2: Graph Analytics
 GraphTech Ecosystem - part 2: Graph Analytics GraphTech Ecosystem - part 2: Graph Analytics
GraphTech Ecosystem - part 2: Graph Analytics
 
GraphTech Ecosystem - part 1: Graph Databases
GraphTech Ecosystem - part 1: Graph DatabasesGraphTech Ecosystem - part 1: Graph Databases
GraphTech Ecosystem - part 1: Graph Databases
 
Graph analytics in Linkurious Enterprise
Graph analytics in Linkurious EnterpriseGraph analytics in Linkurious Enterprise
Graph analytics in Linkurious Enterprise
 
Graph technology and data-journalism: the case of the Paradise Papers
Graph technology and data-journalism: the case of the Paradise PapersGraph technology and data-journalism: the case of the Paradise Papers
Graph technology and data-journalism: the case of the Paradise Papers
 
Visualize the Knowledge Graph and Unleash Your Data
Visualize the Knowledge Graph and Unleash Your DataVisualize the Knowledge Graph and Unleash Your Data
Visualize the Knowledge Graph and Unleash Your Data
 
Graph-based Product Lifecycle Management
Graph-based Product Lifecycle ManagementGraph-based Product Lifecycle Management
Graph-based Product Lifecycle Management
 
Fraudes Financières: Méthodes de Prévention et Détection
Fraudes Financières: Méthodes de Prévention et DétectionFraudes Financières: Méthodes de Prévention et Détection
Fraudes Financières: Méthodes de Prévention et Détection
 
Detecting eCommerce Fraud with Neo4j and Linkurious
Detecting eCommerce Fraud with Neo4j and LinkuriousDetecting eCommerce Fraud with Neo4j and Linkurious
Detecting eCommerce Fraud with Neo4j and Linkurious
 
Graph-based Network & IT Management.
Graph-based Network & IT Management.Graph-based Network & IT Management.
Graph-based Network & IT Management.
 
Graph-powered data lineage in Finance
Graph-powered data lineage in FinanceGraph-powered data lineage in Finance
Graph-powered data lineage in Finance
 
Using Linkurious in your Enterprise Architecture projects
Using Linkurious in your Enterprise Architecture projectsUsing Linkurious in your Enterprise Architecture projects
Using Linkurious in your Enterprise Architecture projects
 
Linkurious SDK: Build enterprise-ready graph applications faster
Linkurious SDK: Build enterprise-ready graph applications fasterLinkurious SDK: Build enterprise-ready graph applications faster
Linkurious SDK: Build enterprise-ready graph applications faster
 
Fighting financial crime with graph analysis at BIWA Summit 2017
Fighting financial crime with graph analysis at BIWA Summit 2017Fighting financial crime with graph analysis at BIWA Summit 2017
Fighting financial crime with graph analysis at BIWA Summit 2017
 

Recently uploaded

Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...GQ Research
 
GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]📊 Markus Baersch
 
RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.natarajan8993
 
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degreeyuu sss
 
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝DelhiRS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhijennyeacort
 
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)jennyeacort
 
LLMs, LMMs, their Improvement Suggestions and the Path towards AGI
LLMs, LMMs, their Improvement Suggestions and the Path towards AGILLMs, LMMs, their Improvement Suggestions and the Path towards AGI
LLMs, LMMs, their Improvement Suggestions and the Path towards AGIThomas Poetter
 
DBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfDBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfJohn Sterrett
 
Top 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In QueensTop 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In Queensdataanalyticsqueen03
 
Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Colleen Farrelly
 
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degreeyuu sss
 
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Boston Institute of Analytics
 
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...ssuserf63bd7
 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPTBoston Institute of Analytics
 
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort servicejennyeacort
 
RadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfRadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfgstagge
 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024thyngster
 
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...limedy534
 
Semantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptxSemantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptxMike Bennett
 

Recently uploaded (20)

Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
 
GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]
 
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
 
RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.
 
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
 
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝DelhiRS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
 
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
 
LLMs, LMMs, their Improvement Suggestions and the Path towards AGI
LLMs, LMMs, their Improvement Suggestions and the Path towards AGILLMs, LMMs, their Improvement Suggestions and the Path towards AGI
LLMs, LMMs, their Improvement Suggestions and the Path towards AGI
 
DBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfDBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdf
 
Top 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In QueensTop 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In Queens
 
Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024
 
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
 
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
 
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...
 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
 
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
 
RadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfRadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdf
 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
 
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
 
Semantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptxSemantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptx
 

Visualizing an Anti-Money Laundering Investigation

  • 1. SAS founded in 2013 in Paris | http://linkurio.us | @linkurious Visualizing an anti- money laundering investigation.
  • 2. What is money laundering. Money laundering is the process in which the proceeds of crime are transformed into ostensibly legitimate money or other assets.
  • 3. The 3 steps of the money laundering process. Placement Introducing cash into the financial system by some means. Layering Carrying out complex financial transactions to camouflage the illegal source Integration Acquiring wealth generated from the transactions of the illicit funds
  • 4. Criminals vs AML investigators. Follow the trail of illegal money to convict criminal and seize assets. Create a complex financial maze to obfuscate the trail of illegal money. The fraudsters The investigators
  • 5. Graphs can help investigators fight money laundering. Linkurious allows investigators to explore visually the information and to look for specific patterns. More results, faster. The investigators can use visualization to communicate their findings. It helps collaboration and obtain convictions. Working with data coming from various sources is complex. A graph allows you to link the events, persons or organizations together. Track the relations Find hidden insights Communicate results Graphs and data investigation.
  • 6. Concrete example : scenario. Who? As a specialized police investigator, we are tasked with investigating a criminal organization. What? The leaders of the organization are Virginia Parker, Marilyn Meyer and Diane Lawson. They are suspected of running a large drug operation. All we have at the start of the investigation is that a known associate of the organization runs a small business called Tanoodle. Why? The objective of the investigation is to map the money laundering scheme in order to secure the convictions of its perpetrators and seize their assets. How? We are going to use graph visualization to represent the information captured via the investigation. It will help us target the suspects.
  • 7. Concrete example : data. ACME Corp COMPANY John Smith PERSON ACCOUNT ACCOUNT SENDS_TOHAS_ACCOUNT HAS_ACCOUNT Discovering links from financial records.
  • 8. Concrete example : a first suspicious company. We are looking at Tanoodle, a company associated with the criminal organization. It is linked to a bank account. The interface of Linkurious also makes it easy to explore and edit a graph.
  • 9. Concrete example : first connection. Via its bank account, Tannodle is connected to Avavee a company it transfers money to.
  • 10. Concrete example : Avavee collects money. The financial records of Avavee shows that it collects money from Avavee and 6 other companies. That money is then funnel to two bank accounts (bottom right corner).
  • 11. Concrete example : another hub of companies. Connected to Avavee and the first hub of companies is another company called Youspan. It receives money from 5 companies and channels it to the same 2 bank accounts as Avavee. Avavee and Youspan are the second layer of the money laundering scheme.
  • 12. Concrete example : the third layer. Further investigation, helps gather information about the two suspicious bank accounts. They are associated with two other companies called Digitube and Zava. It constitutes the third layer of the money laundering scheme.
  • 13. Concrete example : the first three layers. The first three layers of the money laundering scheme form a directed network.
  • 14. Concrete example : the complete scheme. By investigating Digitube and Zava, we are able to have a look at the complete money laundering network with 2 new companies and three people.
  • 15. Concrete example : the leaders. We are finally available to find the ultimate beneficiaries of the money laundering scheme. Time to make arrests and seize funds!
  • 16. You can do it too!
  • 17. Contact us to discuss your projects contact@linkurio.us Conclusion
  • 18. Blog post on AML investigation : http://linkurio.us/investigating-a-money- laundering-scheme Dataset used in the example : https://www.dropbox.com/s/4yxslaysaagf17o/aml% 20dataset.zip?dl=0 Additional resources.