SlideShare a Scribd company logo
1 of 45
Download to read offline
TITLE
WEBINAR
USING ADVANCED DATA ANALYTICS &
TECHNOLOGY TO COMBAT FINANCIAL
CRIME
WEBINAR
Mike Caluori
Delivery Manager
Analytics & Data Science Practice
CaseWare Analytics
PRESENTER
AGENDA
1. The Money Services Business (MSB) Market
2. Regulatory Environment
3. Common Crimes
4. Fines and Penalties
5. Challenges
6. Building a Successful AML Program
7. The Role of Technology
8. Data Analytics
9. Q&A
THE MSB MARKET
Worldwide, 230 million people send $500 billion in
remittances each year, primarily using firms like Western
Union, Moneygram, and RIA, which together control 1.1
million retail locations and account for more than 25% of the
world’s annual remittance volume.
EMERGING MARKET
1. Mobile money
2. P2P
3. Bitcoins
4. Social media apps (e.g. Facebook)
5. Others (e.g. Starbucks)
REGULATORY ENVIRONMENT
4 Pillars of BSA compliance
1. Compliance Officer
2. Tailored internal policies, procedures and controls
3. Ongoing, relevant training of employees
4. Independent Review for compliance
FINES AND PENATIES
Civil money penalty against American
Express Bank International and American
Express Travel Related Services Company
Inc
Civil money penalty against Thomas
Haider, Chief Compliance Officer and
Senior Vice President of Government
Affairs at MoneyGram
Civil money penalty against Ripple Labs
Inc. for acting as an MSB and selling its
virtual currency without registering with
FinCEN
COMMON CRIMES
1. Human smuggling
2. Narcotics trafficking
3. Terrorist financing
4. Elder abuse
5. Mail order bride
6. Heavenly offerings
Christopher Westphal, Data Mining for Intelligence, Fraud and Criminal Detection, 2009
CHALLENGES
1. Reporting/Filing requirements
2. Staffing
3. Margins
4. Data quality
5. De-risking
HOW TO BUILD A SUCCESS AML
PROGRAM
1. Governance and tone
2. Training
3. Risk management
4. Compliance technologies
5. Culture
ROLE OF TECHNOLOGY
CASE MANAGEMENT
FILING IS COSTLY
END-TO-END AUTOMATION
70%-80% of your filing can be done without human
interactions
1. Detect reportable transactions
2. Aggregate the data
3. Complete the reports
4. Validate
5. Submit
6. Confirm
7. Evidence
DATA ANALYTICS
1. Getting the data right
2. Analytics
3. From monitoring to insights
4. Realizing the value
THE DATA CHALLENGE
1. Existence
2. Completeness
3. Validity
4. Accuracy
DATA REFINEMENT
1. Parsing
2. Standardizing
3. Fuzzy matching
EXAMPLE
Standardizing
Best of Breed Record
Parsing
Source House Street Suffix City Zip
Code
State Country
234 Leader Ave, Denver, Colorado, 80327,
United States
234 Leader Ave Denver 80327 Colorado United
States
234 Leadr Avenue, Denver 234 Leadr Avenue Denver Colorodo
Leader St., Denver, USA Leader St. Denver USA
Source Number Street Suffix City Zip Code State Country
234 Leader Ave, Denver, Colorado, 80327,
United States
234 Leader Avenue Denver 80327 Colorado USA
234 Leadr Avenue, Denver 234 Leader Avenue Denver 80327 Colorado USA
Leader St., Denver, USA Leader Avenue Denver 80327 Colorado USA
Source Number Street Suffix City Zip Code State Country
234 Leader Avenue, Denver, Colorado, 80327,
USA
234 Leader Avenue Denver 80327 Colorado USA
VIRTUAL CUSTOMER ID
1. Fuzzy matching
2. A unique ID
3. This allows us to create a virtual single instance of the
customer
Virtual ID Name Address ID Presented Certainty
100900212 Andrew Simpson 234 TRELAWNEY CIRCLE
CONYERS
GA 30013
DL#0**~*33 100
100900212 Andrew Simpson 234 TRELAWNEY ROAD
CONYERS
GA 30013
95
100900212 A. Simpson DL#0**~*33 90
DRIVEN BY RISK ASSESSMENT
1. What to monitor?
2. Frequency?
3. Focus on highest risk
SCENARIOS
STRUCTURING
1. Multiple transactions by a customer across locations to
evade CTR filings
2. Individually below threshold but cumulatively above
Hints
Benefits from refined customer and
household data.
Exclude noise like PO Boxes, blanks,
or invalid addresses.
Make the time period for review a
variable (i.e.: don’t just use a day).
STRUCTURING
3. Multiple transactions at single location across multiple
days
SMURFING
1. Multiple transactions by multiple customers across
locations to evade CTR filings
2. Individually below threshold but cumulatively above
3. May be to the same recipient
Hints
Isolate all the suspected smurfs, and
then examine receivers for trends.
Correlate the receiver with
information from your network
analysis.
FLIPPING
1. Receives a transaction and quickly resends or vice-versa
2. May keep a small portion (“fee”)
Hints
Make the timeline for the flip a variable and do “what-if” to see what works best.
Make a distinction between a fee taken or not. Then examine other inbounds that are not
flipped.
MULES
1. Sending from and receiving at the same location
Hints
Suggest you limit this to same location or city so as to not mix with
flipping.
Make a distinction between a fee taken or not. Then examine other
inbounds.
NETWORKS
1. Layering evidenced by a
collection of smurfing,
flipping, mules, etc.
2. Correlation between
senders and receivers
Hint
There are some good tools available to
do this. However you can achieve
something success with just summaries.
MULTIPLE CUSTOMER – SAME
ADDRESS
Hints
Benefits from refined data.
Exclude noise like P.O. Boxes, blanks or invalid addresses.
Prioritize by number of customers or amounts sent or frequency.
SINGLE CUSTOMER – MULTIPLE
ADDRESS
Hints
Benefits from refined data.
Reduce false positives by using more than just name (e.g.: ID).
Prioritize by number of addresses or amounts sent or frequency.
INHERENTLY RISKY
1. Identifying transactions to and from “high” risk countries.
2. Refer to Financial Action Task Force (FATF) website –
fatf.org
ELDER ABUSE
1. Treat transfers from elderly customers as higher risk
2. Also correlate to high risk payout locations/recipients
3. HQ Compliance should detect any structuring
Hints
Make the age variable by sex.
Flag known recipients and trigger a red flag
on future transfers.
NGOS/CHARITIES/RELIGIOUS
1. Use keywords to detect
2. Treat as higher risk transactions
3. May be used for tax evasion and money laundering
Hints
Adjust thresholds for detection based on
existing cases.
Add new keywords over time.
COLLUSION DETECTION
Trending by locations and employee:
1. Falsified addresses (“ANYWHERE STREET”)
2. Invalid or duplicated IDs
3. Invalid or duplicated SSN
INSIGHTS
1.What locations am I having a challenge with?
2.What is the most frequent anomaly detected?
3.What controls are failing?
ROOT CAUSE AND ACTION
Why did we allow the structuring?
• Was not aware of the requirements
• Not structuring (false positive)
• Scared of customer
What actions were taken?
• Filed a SAR
• Requested additional details
• Rejected transfer
ADVANCED ANALYTICS
1.Anomaly detection
2.Link analysis
3.Predictive
ANOMALY DETECTION
ANOMALY DETECTION
1.Anomaly detected based on Customer’s historical
behavior
2.Peer anomaly based on behavior that is significantly
different from customers in the same segment/cluster
3.Primarily focused on these attributes:
• Frequency
• Value
• Source and destinations
• Time and day
• Segmentation (e.g. location)
NETWORK LINKING
1. Anomaly detected based on
Customer’s historical behavior
2. Peer anomaly based on behavior
that is significantly different
from customers in the same
segment/cluster
3. Primarily focused on these
attributes:
• Frequency
• Value
• Source and destinations
• Time and day
• Segmentation (e.g. location)
PREDICTIVE ANALYTICS
1. Using known cases to identify the procurement pattern
that normally results in fraud
2. Using machine learning to train models and predict
outcomes
MERGING THE MODELS
KEY TAKE-AWAYS
• The rewards and risks for MSBs are big
• The only way to maintain compliance, manage volume of work at
a reasonable cost, and mitigate risks is to have the right culture
and an analytics-driven compliance program
• The right data analytics program which combines anomaly
detection, network linking and predictive analytics can identify
many money-laundering scenarios quickly and easily
• Identify root causes that can lead to potential cost-saving
opportunities in your processes
• Start taking Cross Jurisdictional Reporting Requirements into
account
QUESTIONS
casewareanalytics.com
aml@caseware.com
CONNECT WITH US
TITLE
WEBINAR
USING ADVANCED DATA ANALYTICS &
TECHNOLOGY TO COMBAT FINANCIAL
CRIME
WEBINAR

More Related Content

Similar to Using Advanced Data Analytics and Technology to Combat Financial Crime

Vivint Wireless How to De-Risk a New Venture & Build a Better ISP - Luke L...
Vivint Wireless   How to De-Risk a New Venture & Build a Better ISP  - Luke L...Vivint Wireless   How to De-Risk a New Venture & Build a Better ISP  - Luke L...
Vivint Wireless How to De-Risk a New Venture & Build a Better ISP - Luke L...
Lounge47
 
How to write the perfect tender ~ Global Move Management
How to write the perfect tender ~ Global Move ManagementHow to write the perfect tender ~ Global Move Management
How to write the perfect tender ~ Global Move Management
Bournes Relocation Solutions
 

Similar to Using Advanced Data Analytics and Technology to Combat Financial Crime (20)

Vivint Wireless How to De-Risk a New Venture & Build a Better ISP - Luke L...
Vivint Wireless   How to De-Risk a New Venture & Build a Better ISP  - Luke L...Vivint Wireless   How to De-Risk a New Venture & Build a Better ISP  - Luke L...
Vivint Wireless How to De-Risk a New Venture & Build a Better ISP - Luke L...
 
Data warehousing and mining furc
Data warehousing and mining furcData warehousing and mining furc
Data warehousing and mining furc
 
Graphs in Action
Graphs in ActionGraphs in Action
Graphs in Action
 
Data Quality for AML
Data Quality for AMLData Quality for AML
Data Quality for AML
 
Connections Drive Digital Transformation
Connections Drive Digital TransformationConnections Drive Digital Transformation
Connections Drive Digital Transformation
 
Digital Transformation and the Journey to a Highly Connected Enterprise
Digital Transformation and the Journey to a Highly Connected EnterpriseDigital Transformation and the Journey to a Highly Connected Enterprise
Digital Transformation and the Journey to a Highly Connected Enterprise
 
SHAKEN without the EARTHQUAKE - Blocking calls with STIR/SHAKEN in 2023
SHAKEN without the EARTHQUAKE - Blocking calls with STIR/SHAKEN in 2023SHAKEN without the EARTHQUAKE - Blocking calls with STIR/SHAKEN in 2023
SHAKEN without the EARTHQUAKE - Blocking calls with STIR/SHAKEN in 2023
 
Anomaly detection Workshop slides
Anomaly detection Workshop slidesAnomaly detection Workshop slides
Anomaly detection Workshop slides
 
Audit Webinar How to get the right data for your audit in 3 easy steps
Audit Webinar How to get the right data for your audit in 3 easy stepsAudit Webinar How to get the right data for your audit in 3 easy steps
Audit Webinar How to get the right data for your audit in 3 easy steps
 
Lean Continual Service Improvement – Driving Change Enablement
Lean Continual Service Improvement – Driving Change EnablementLean Continual Service Improvement – Driving Change Enablement
Lean Continual Service Improvement – Driving Change Enablement
 
Sigma Kappa Donor Engagement Case Study
Sigma Kappa Donor Engagement Case StudySigma Kappa Donor Engagement Case Study
Sigma Kappa Donor Engagement Case Study
 
Go Code Colorado and The Data Liaison
Go Code Colorado and The Data LiaisonGo Code Colorado and The Data Liaison
Go Code Colorado and The Data Liaison
 
Mas638 – business analytics consulting section 2 – first case
Mas638 – business analytics consulting section 2 – first caseMas638 – business analytics consulting section 2 – first case
Mas638 – business analytics consulting section 2 – first case
 
Who, What, Where and How: Why You Want to Know
 Who, What, Where and How: Why You Want to Know Who, What, Where and How: Why You Want to Know
Who, What, Where and How: Why You Want to Know
 
Demystify Big Data, Data Science & Signal Extraction Deep Dive
Demystify Big Data, Data Science & Signal Extraction Deep DiveDemystify Big Data, Data Science & Signal Extraction Deep Dive
Demystify Big Data, Data Science & Signal Extraction Deep Dive
 
How to write the perfect tender ~ Global Move Management
How to write the perfect tender ~ Global Move ManagementHow to write the perfect tender ~ Global Move Management
How to write the perfect tender ~ Global Move Management
 
Nonprofit data migration: You can't take it all with you Webinar
Nonprofit data migration: You can't take it all with you WebinarNonprofit data migration: You can't take it all with you Webinar
Nonprofit data migration: You can't take it all with you Webinar
 
Nonprofit data migration webinar 02.20.2014
Nonprofit data migration webinar 02.20.2014Nonprofit data migration webinar 02.20.2014
Nonprofit data migration webinar 02.20.2014
 
How to Gather Useful, Usable Customer Satisfaction Feedback
How to Gather Useful, Usable Customer Satisfaction FeedbackHow to Gather Useful, Usable Customer Satisfaction Feedback
How to Gather Useful, Usable Customer Satisfaction Feedback
 
Optimizing the Lead: A Data Driven Optimization Process - Brian Carroll
Optimizing the Lead: A Data Driven Optimization Process - Brian CarrollOptimizing the Lead: A Data Driven Optimization Process - Brian Carroll
Optimizing the Lead: A Data Driven Optimization Process - Brian Carroll
 

More from Alessa

How to make KYC for AML Compliance More Effective
How to make KYC for AML Compliance More EffectiveHow to make KYC for AML Compliance More Effective
How to make KYC for AML Compliance More Effective
Alessa
 
Assessing AML Geographic Risk: a Methodology (November 2020)
Assessing AML Geographic Risk: a Methodology (November 2020)Assessing AML Geographic Risk: a Methodology (November 2020)
Assessing AML Geographic Risk: a Methodology (November 2020)
Alessa
 
Trade-Based Money Laundering: What Compliance Professionals Need to Know
Trade-Based Money Laundering: What Compliance Professionals Need to KnowTrade-Based Money Laundering: What Compliance Professionals Need to Know
Trade-Based Money Laundering: What Compliance Professionals Need to Know
Alessa
 
Understanding Money Laundering and Fraud Risks of Wire Transfers
Understanding Money Laundering and Fraud Risks of Wire TransfersUnderstanding Money Laundering and Fraud Risks of Wire Transfers
Understanding Money Laundering and Fraud Risks of Wire Transfers
Alessa
 
Elements of Customer Risk: Profiles and Relationships
Elements of Customer Risk: Profiles and RelationshipsElements of Customer Risk: Profiles and Relationships
Elements of Customer Risk: Profiles and Relationships
Alessa
 
Beneficial Ownership Rules: Global and Canada Perspective
Beneficial Ownership Rules: Global and Canada PerspectiveBeneficial Ownership Rules: Global and Canada Perspective
Beneficial Ownership Rules: Global and Canada Perspective
Alessa
 
Tackling Hidden Risks in AML Sanctions Screening Programs
Tackling Hidden Risks in AML Sanctions Screening ProgramsTackling Hidden Risks in AML Sanctions Screening Programs
Tackling Hidden Risks in AML Sanctions Screening Programs
Alessa
 
Writing Effective Suspicious Activity Reports (SARs): Start with WHY
Writing Effective Suspicious Activity Reports (SARs): Start with WHYWriting Effective Suspicious Activity Reports (SARs): Start with WHY
Writing Effective Suspicious Activity Reports (SARs): Start with WHY
Alessa
 
A Regulatory Understanding of Virtual Assets (Cryptocurrency) Types and their...
A Regulatory Understanding of Virtual Assets (Cryptocurrency) Types and their...A Regulatory Understanding of Virtual Assets (Cryptocurrency) Types and their...
A Regulatory Understanding of Virtual Assets (Cryptocurrency) Types and their...
Alessa
 
Webinar: Strategies to Enhance your Screening and Transaction Monitoring Proc...
Webinar: Strategies to Enhance your Screening and Transaction Monitoring Proc...Webinar: Strategies to Enhance your Screening and Transaction Monitoring Proc...
Webinar: Strategies to Enhance your Screening and Transaction Monitoring Proc...
Alessa
 
WEBINAR: What Financial Institutions need to know about Cryptocurrencies
WEBINAR: What Financial Institutions need to know about CryptocurrenciesWEBINAR: What Financial Institutions need to know about Cryptocurrencies
WEBINAR: What Financial Institutions need to know about Cryptocurrencies
Alessa
 
An Executive Guide on How to Use Machine Learning and AI for AML Compliance
An Executive Guide on How to Use Machine Learning and AI for AML ComplianceAn Executive Guide on How to Use Machine Learning and AI for AML Compliance
An Executive Guide on How to Use Machine Learning and AI for AML Compliance
Alessa
 
Sanctions List Screening with World-Check and CaseWare
Sanctions List Screening with World-Check and CaseWare Sanctions List Screening with World-Check and CaseWare
Sanctions List Screening with World-Check and CaseWare
Alessa
 

More from Alessa (20)

How to make KYC for AML Compliance More Effective
How to make KYC for AML Compliance More EffectiveHow to make KYC for AML Compliance More Effective
How to make KYC for AML Compliance More Effective
 
Assessing AML Geographic Risk: a Methodology (November 2020)
Assessing AML Geographic Risk: a Methodology (November 2020)Assessing AML Geographic Risk: a Methodology (November 2020)
Assessing AML Geographic Risk: a Methodology (November 2020)
 
Trade-Based Money Laundering: What Compliance Professionals Need to Know
Trade-Based Money Laundering: What Compliance Professionals Need to KnowTrade-Based Money Laundering: What Compliance Professionals Need to Know
Trade-Based Money Laundering: What Compliance Professionals Need to Know
 
Understanding Money Laundering and Fraud Risks of Wire Transfers
Understanding Money Laundering and Fraud Risks of Wire TransfersUnderstanding Money Laundering and Fraud Risks of Wire Transfers
Understanding Money Laundering and Fraud Risks of Wire Transfers
 
Novedades en alessa (antes conocido como case ware monitor)
Novedades en alessa (antes conocido como case ware monitor)Novedades en alessa (antes conocido como case ware monitor)
Novedades en alessa (antes conocido como case ware monitor)
 
Elements of Customer Risk - Products & Services, Activity Patterns and Behaviors
Elements of Customer Risk - Products & Services, Activity Patterns and BehaviorsElements of Customer Risk - Products & Services, Activity Patterns and Behaviors
Elements of Customer Risk - Products & Services, Activity Patterns and Behaviors
 
Elements of Customer Risk: Profiles and Relationships
Elements of Customer Risk: Profiles and RelationshipsElements of Customer Risk: Profiles and Relationships
Elements of Customer Risk: Profiles and Relationships
 
Beneficial Ownership Rules: Global and Canada Perspective
Beneficial Ownership Rules: Global and Canada PerspectiveBeneficial Ownership Rules: Global and Canada Perspective
Beneficial Ownership Rules: Global and Canada Perspective
 
Tackling Hidden Risks in AML Sanctions Screening Programs
Tackling Hidden Risks in AML Sanctions Screening ProgramsTackling Hidden Risks in AML Sanctions Screening Programs
Tackling Hidden Risks in AML Sanctions Screening Programs
 
Writing Effective Suspicious Activity Reports (SARs): Start with WHY
Writing Effective Suspicious Activity Reports (SARs): Start with WHYWriting Effective Suspicious Activity Reports (SARs): Start with WHY
Writing Effective Suspicious Activity Reports (SARs): Start with WHY
 
A Regulatory Understanding of Virtual Assets (Cryptocurrency) Types and their...
A Regulatory Understanding of Virtual Assets (Cryptocurrency) Types and their...A Regulatory Understanding of Virtual Assets (Cryptocurrency) Types and their...
A Regulatory Understanding of Virtual Assets (Cryptocurrency) Types and their...
 
Webinar: Strategies to Enhance your Screening and Transaction Monitoring Proc...
Webinar: Strategies to Enhance your Screening and Transaction Monitoring Proc...Webinar: Strategies to Enhance your Screening and Transaction Monitoring Proc...
Webinar: Strategies to Enhance your Screening and Transaction Monitoring Proc...
 
Status of Beneficial Ownership Transparency in Canada
Status of Beneficial Ownership Transparency in CanadaStatus of Beneficial Ownership Transparency in Canada
Status of Beneficial Ownership Transparency in Canada
 
WEBINAR: What Financial Institutions need to know about Cryptocurrencies
WEBINAR: What Financial Institutions need to know about CryptocurrenciesWEBINAR: What Financial Institutions need to know about Cryptocurrencies
WEBINAR: What Financial Institutions need to know about Cryptocurrencies
 
An Executive Guide on How to Use Machine Learning and AI for AML Compliance
An Executive Guide on How to Use Machine Learning and AI for AML ComplianceAn Executive Guide on How to Use Machine Learning and AI for AML Compliance
An Executive Guide on How to Use Machine Learning and AI for AML Compliance
 
Reduce your aml compliance workload
Reduce your aml compliance workloadReduce your aml compliance workload
Reduce your aml compliance workload
 
Sanctions List Screening with World-Check and CaseWare
Sanctions List Screening with World-Check and CaseWare Sanctions List Screening with World-Check and CaseWare
Sanctions List Screening with World-Check and CaseWare
 
Strengthen Your AML Compliance Program with Data Mining
Strengthen Your AML Compliance Program with Data Mining Strengthen Your AML Compliance Program with Data Mining
Strengthen Your AML Compliance Program with Data Mining
 
Sanctions Risk - What's the Problem?
Sanctions Risk - What's the Problem? Sanctions Risk - What's the Problem?
Sanctions Risk - What's the Problem?
 
Analytics and Continuous Monitoring to Manage Purchasing Cards
Analytics and Continuous Monitoring to Manage Purchasing CardsAnalytics and Continuous Monitoring to Manage Purchasing Cards
Analytics and Continuous Monitoring to Manage Purchasing Cards
 

Recently uploaded

怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制
怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制
怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制
vexqp
 
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...
nirzagarg
 
怎样办理伦敦大学城市学院毕业证(CITY毕业证书)成绩单学校原版复制
怎样办理伦敦大学城市学院毕业证(CITY毕业证书)成绩单学校原版复制怎样办理伦敦大学城市学院毕业证(CITY毕业证书)成绩单学校原版复制
怎样办理伦敦大学城市学院毕业证(CITY毕业证书)成绩单学校原版复制
vexqp
 
怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制
怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制
怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制
vexqp
 
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
Health
 
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
nirzagarg
 
如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样
如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样
如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样
wsppdmt
 
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
nirzagarg
 
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
nirzagarg
 
Lecture_2_Deep_Learning_Overview-newone1
Lecture_2_Deep_Learning_Overview-newone1Lecture_2_Deep_Learning_Overview-newone1
Lecture_2_Deep_Learning_Overview-newone1
ranjankumarbehera14
 
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
gajnagarg
 
怎样办理旧金山城市学院毕业证(CCSF毕业证书)成绩单学校原版复制
怎样办理旧金山城市学院毕业证(CCSF毕业证书)成绩单学校原版复制怎样办理旧金山城市学院毕业证(CCSF毕业证书)成绩单学校原版复制
怎样办理旧金山城市学院毕业证(CCSF毕业证书)成绩单学校原版复制
vexqp
 

Recently uploaded (20)

SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
 
Harnessing the Power of GenAI for BI and Reporting.pptx
Harnessing the Power of GenAI for BI and Reporting.pptxHarnessing the Power of GenAI for BI and Reporting.pptx
Harnessing the Power of GenAI for BI and Reporting.pptx
 
怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制
怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制
怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制
 
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...
 
Digital Transformation Playbook by Graham Ware
Digital Transformation Playbook by Graham WareDigital Transformation Playbook by Graham Ware
Digital Transformation Playbook by Graham Ware
 
怎样办理伦敦大学城市学院毕业证(CITY毕业证书)成绩单学校原版复制
怎样办理伦敦大学城市学院毕业证(CITY毕业证书)成绩单学校原版复制怎样办理伦敦大学城市学院毕业证(CITY毕业证书)成绩单学校原版复制
怎样办理伦敦大学城市学院毕业证(CITY毕业证书)成绩单学校原版复制
 
怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制
怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制
怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制
 
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
 
Discover Why Less is More in B2B Research
Discover Why Less is More in B2B ResearchDiscover Why Less is More in B2B Research
Discover Why Less is More in B2B Research
 
Sequential and reinforcement learning for demand side management by Margaux B...
Sequential and reinforcement learning for demand side management by Margaux B...Sequential and reinforcement learning for demand side management by Margaux B...
Sequential and reinforcement learning for demand side management by Margaux B...
 
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
 
如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样
如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样
如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样
 
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
 
Aspirational Block Program Block Syaldey District - Almora
Aspirational Block Program Block Syaldey District - AlmoraAspirational Block Program Block Syaldey District - Almora
Aspirational Block Program Block Syaldey District - Almora
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
 
Ranking and Scoring Exercises for Research
Ranking and Scoring Exercises for ResearchRanking and Scoring Exercises for Research
Ranking and Scoring Exercises for Research
 
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
 
Lecture_2_Deep_Learning_Overview-newone1
Lecture_2_Deep_Learning_Overview-newone1Lecture_2_Deep_Learning_Overview-newone1
Lecture_2_Deep_Learning_Overview-newone1
 
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
 
怎样办理旧金山城市学院毕业证(CCSF毕业证书)成绩单学校原版复制
怎样办理旧金山城市学院毕业证(CCSF毕业证书)成绩单学校原版复制怎样办理旧金山城市学院毕业证(CCSF毕业证书)成绩单学校原版复制
怎样办理旧金山城市学院毕业证(CCSF毕业证书)成绩单学校原版复制
 

Using Advanced Data Analytics and Technology to Combat Financial Crime

  • 1. TITLE WEBINAR USING ADVANCED DATA ANALYTICS & TECHNOLOGY TO COMBAT FINANCIAL CRIME WEBINAR
  • 2. Mike Caluori Delivery Manager Analytics & Data Science Practice CaseWare Analytics PRESENTER
  • 3. AGENDA 1. The Money Services Business (MSB) Market 2. Regulatory Environment 3. Common Crimes 4. Fines and Penalties 5. Challenges 6. Building a Successful AML Program 7. The Role of Technology 8. Data Analytics 9. Q&A
  • 4. THE MSB MARKET Worldwide, 230 million people send $500 billion in remittances each year, primarily using firms like Western Union, Moneygram, and RIA, which together control 1.1 million retail locations and account for more than 25% of the world’s annual remittance volume.
  • 5. EMERGING MARKET 1. Mobile money 2. P2P 3. Bitcoins 4. Social media apps (e.g. Facebook) 5. Others (e.g. Starbucks)
  • 6. REGULATORY ENVIRONMENT 4 Pillars of BSA compliance 1. Compliance Officer 2. Tailored internal policies, procedures and controls 3. Ongoing, relevant training of employees 4. Independent Review for compliance
  • 7. FINES AND PENATIES Civil money penalty against American Express Bank International and American Express Travel Related Services Company Inc Civil money penalty against Thomas Haider, Chief Compliance Officer and Senior Vice President of Government Affairs at MoneyGram Civil money penalty against Ripple Labs Inc. for acting as an MSB and selling its virtual currency without registering with FinCEN
  • 8. COMMON CRIMES 1. Human smuggling 2. Narcotics trafficking 3. Terrorist financing 4. Elder abuse 5. Mail order bride 6. Heavenly offerings Christopher Westphal, Data Mining for Intelligence, Fraud and Criminal Detection, 2009
  • 9. CHALLENGES 1. Reporting/Filing requirements 2. Staffing 3. Margins 4. Data quality 5. De-risking
  • 10. HOW TO BUILD A SUCCESS AML PROGRAM 1. Governance and tone 2. Training 3. Risk management 4. Compliance technologies 5. Culture
  • 14. END-TO-END AUTOMATION 70%-80% of your filing can be done without human interactions 1. Detect reportable transactions 2. Aggregate the data 3. Complete the reports 4. Validate 5. Submit 6. Confirm 7. Evidence
  • 15. DATA ANALYTICS 1. Getting the data right 2. Analytics 3. From monitoring to insights 4. Realizing the value
  • 16. THE DATA CHALLENGE 1. Existence 2. Completeness 3. Validity 4. Accuracy
  • 17. DATA REFINEMENT 1. Parsing 2. Standardizing 3. Fuzzy matching
  • 18. EXAMPLE Standardizing Best of Breed Record Parsing Source House Street Suffix City Zip Code State Country 234 Leader Ave, Denver, Colorado, 80327, United States 234 Leader Ave Denver 80327 Colorado United States 234 Leadr Avenue, Denver 234 Leadr Avenue Denver Colorodo Leader St., Denver, USA Leader St. Denver USA Source Number Street Suffix City Zip Code State Country 234 Leader Ave, Denver, Colorado, 80327, United States 234 Leader Avenue Denver 80327 Colorado USA 234 Leadr Avenue, Denver 234 Leader Avenue Denver 80327 Colorado USA Leader St., Denver, USA Leader Avenue Denver 80327 Colorado USA Source Number Street Suffix City Zip Code State Country 234 Leader Avenue, Denver, Colorado, 80327, USA 234 Leader Avenue Denver 80327 Colorado USA
  • 19. VIRTUAL CUSTOMER ID 1. Fuzzy matching 2. A unique ID 3. This allows us to create a virtual single instance of the customer Virtual ID Name Address ID Presented Certainty 100900212 Andrew Simpson 234 TRELAWNEY CIRCLE CONYERS GA 30013 DL#0**~*33 100 100900212 Andrew Simpson 234 TRELAWNEY ROAD CONYERS GA 30013 95 100900212 A. Simpson DL#0**~*33 90
  • 20. DRIVEN BY RISK ASSESSMENT 1. What to monitor? 2. Frequency? 3. Focus on highest risk
  • 22. STRUCTURING 1. Multiple transactions by a customer across locations to evade CTR filings 2. Individually below threshold but cumulatively above Hints Benefits from refined customer and household data. Exclude noise like PO Boxes, blanks, or invalid addresses. Make the time period for review a variable (i.e.: don’t just use a day).
  • 23. STRUCTURING 3. Multiple transactions at single location across multiple days
  • 24. SMURFING 1. Multiple transactions by multiple customers across locations to evade CTR filings 2. Individually below threshold but cumulatively above 3. May be to the same recipient Hints Isolate all the suspected smurfs, and then examine receivers for trends. Correlate the receiver with information from your network analysis.
  • 25. FLIPPING 1. Receives a transaction and quickly resends or vice-versa 2. May keep a small portion (“fee”) Hints Make the timeline for the flip a variable and do “what-if” to see what works best. Make a distinction between a fee taken or not. Then examine other inbounds that are not flipped.
  • 26. MULES 1. Sending from and receiving at the same location Hints Suggest you limit this to same location or city so as to not mix with flipping. Make a distinction between a fee taken or not. Then examine other inbounds.
  • 27. NETWORKS 1. Layering evidenced by a collection of smurfing, flipping, mules, etc. 2. Correlation between senders and receivers Hint There are some good tools available to do this. However you can achieve something success with just summaries.
  • 28. MULTIPLE CUSTOMER – SAME ADDRESS Hints Benefits from refined data. Exclude noise like P.O. Boxes, blanks or invalid addresses. Prioritize by number of customers or amounts sent or frequency.
  • 29. SINGLE CUSTOMER – MULTIPLE ADDRESS Hints Benefits from refined data. Reduce false positives by using more than just name (e.g.: ID). Prioritize by number of addresses or amounts sent or frequency.
  • 30. INHERENTLY RISKY 1. Identifying transactions to and from “high” risk countries. 2. Refer to Financial Action Task Force (FATF) website – fatf.org
  • 31. ELDER ABUSE 1. Treat transfers from elderly customers as higher risk 2. Also correlate to high risk payout locations/recipients 3. HQ Compliance should detect any structuring Hints Make the age variable by sex. Flag known recipients and trigger a red flag on future transfers.
  • 32. NGOS/CHARITIES/RELIGIOUS 1. Use keywords to detect 2. Treat as higher risk transactions 3. May be used for tax evasion and money laundering Hints Adjust thresholds for detection based on existing cases. Add new keywords over time.
  • 33. COLLUSION DETECTION Trending by locations and employee: 1. Falsified addresses (“ANYWHERE STREET”) 2. Invalid or duplicated IDs 3. Invalid or duplicated SSN
  • 34. INSIGHTS 1.What locations am I having a challenge with? 2.What is the most frequent anomaly detected? 3.What controls are failing?
  • 35. ROOT CAUSE AND ACTION Why did we allow the structuring? • Was not aware of the requirements • Not structuring (false positive) • Scared of customer What actions were taken? • Filed a SAR • Requested additional details • Rejected transfer
  • 38. ANOMALY DETECTION 1.Anomaly detected based on Customer’s historical behavior 2.Peer anomaly based on behavior that is significantly different from customers in the same segment/cluster 3.Primarily focused on these attributes: • Frequency • Value • Source and destinations • Time and day • Segmentation (e.g. location)
  • 39. NETWORK LINKING 1. Anomaly detected based on Customer’s historical behavior 2. Peer anomaly based on behavior that is significantly different from customers in the same segment/cluster 3. Primarily focused on these attributes: • Frequency • Value • Source and destinations • Time and day • Segmentation (e.g. location)
  • 40. PREDICTIVE ANALYTICS 1. Using known cases to identify the procurement pattern that normally results in fraud 2. Using machine learning to train models and predict outcomes
  • 42. KEY TAKE-AWAYS • The rewards and risks for MSBs are big • The only way to maintain compliance, manage volume of work at a reasonable cost, and mitigate risks is to have the right culture and an analytics-driven compliance program • The right data analytics program which combines anomaly detection, network linking and predictive analytics can identify many money-laundering scenarios quickly and easily • Identify root causes that can lead to potential cost-saving opportunities in your processes • Start taking Cross Jurisdictional Reporting Requirements into account
  • 45. TITLE WEBINAR USING ADVANCED DATA ANALYTICS & TECHNOLOGY TO COMBAT FINANCIAL CRIME WEBINAR