SlideShare a Scribd company logo
1 of 76
Anti-Money Laundering Compliance software implementation
2001: Enactment of Patriot Act & impact on  Money Laundering Compliance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Source:  http://www.nchelp.org/elibrary/Presentations/2003/2003WinterLegalAffairsMeeting/Consumer%20Privacy%20Issues.ppt
Objectives ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Training and Awareness Program Cost of Compliance Anti-Money Laundering Strategy Anti - money laundering standards and procedures Management Commitment Security & technology usage Administrative and end - user  policies and procedures KYC  - Data  Access/Mining Transaction Monitoring/  Tracking Processes  Business and organisation Processes & Initiatives Tactical short term  solutions Compliance Requirements International, Regulatory, Industry, Third Party, Internal AML Reporting Risk assessment Investment suitability Tax etc.  Investment suitability Tax etc.  Know your customer (KYC)  - Account Opening From Reactive to Proactive approach Integrated Approach
Data Pipeline DDA CIS SWIFT Money Market transaction hub Load to IEF Load to IEF Load to IEF Data Hub Wires Reference data Posted & Deposit Detail Transactions TDA Extract Normalize & Transform Load Fortent Monitor Systems of Record FedWire transactions wire  transactions customers accounts rel man Concept: Fortent software training material I E F Excel sheet,  graphs Excel sheet,  graphs Excel sheet,  graphs Zurich office London office New York office Money Laundering Data warehouse
Major Opportunities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Opportunities: Easy Trends analysis Money Laundering Analysis using  Tools  Users Wealth Management Investment  Banking Calculation Engine Actuate Actuate Zurich office Stamford Office Actuate Cognos SAS New York office Actuate London Office Excel sheet,  graphs Excel sheet,  graphs Excel sheet,  graphs Excel sheet,  graphs
Opportunity: Easy access of information globally Zurich office  –  Report on Clients  transactions unexplained  for amount  above $10,000 . Stamford office List of clients in US said  to be under suspicion radar Berlin office  List of clients in Germany said  to be under suspicion radar New York office  – US government – List of all  Clients under suspicion  by bank’s investigators Paris office –   How to perform better  Than Credit Suisse –  search Trends Excel, Word London office  demands Suspicious  Activity Reports
Opportunities:  Actual number & not mere suspicion about Client & their transaction 10 47 30 12 Wealth Management Investment banking Fixed Income Institutional securities US Europe Asia 3/1 3/2 3/3 3/4 Date Month Region Product
External Problems Globalisation of clients & data Sophisticated money launderers Inefficient compliance systems Reporting to number of agencies & regulation change Accountability of transactions from Corresponding banks, investigate volumes of data. [1]  Professor S. Seshadari, IIT Professor slides on Datawarehousing.  Only the diagram structure taken by Professor’s slide. The concept & content based  on my understanding of Delta case. Privacy concern’ Of clients
Internal Problems  Hire Paralegal & IT team well versed with Patriot Act AML software which is best processes and budget? Where to hire best IT, Technology consultants Each division working on different data system [1]  Professor S. Seshadari, IIT Professor slides on Datawarehousing.  Only the diagram structure taken by Professor’s slide. The concept & content based  on my understanding of Delta case. Massive volumes  Of data &  Data integration  Permissions Within  The bank Day – to- day operations Vs Trends & Strategy issues
Operational Problem: Quick access to financial information in manage transactions What product promotions have the biggest  impact on revenue? What is the most  effective distribution  channel? Who are my customers  and what products  are they buying? Which are our lowest/highest margin  customers ? What impact will  new products/services  have on revenue  and margins? Which customers are most likely to go  to the competition ?
Data Integration Problem  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Goals ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Know Your Customer Guidelines Customer Acceptance  - Ensure that you accept only legitimate and bona fide customers. Customer Identification-  Ensure that you properly identify your customers to understand the risks they may pose. Transactions Monitoring-  Monitor customers accounts and transactions to prevent or detect illegal activities. Risk Management-  Implement processes to effectively manage the risks posed by customers trying to misuse facilities. Money Laundering Searches required by the Compliance Officer Source: Presentation by Sanjeev Singh
KYC: If Client Involved in  Money Laundering Activities Drug Trafficking Bribery / Corruption Prostitution Gambling Tax Evasion Extortion Robbery  and Fraud White Collar  Crimes ( including Insider Trading and Securities offences ) Smuggling  (arms, people, goods) Counterfeiting and Forgery  Kidnapping Serious Crime or All Crimes? Organised  Crime Source: www.fintraca.gov.af/assets/ ppt /AML
Goal: Integration of Company’s data to enable Money Laundering Analysis Across Bank’s various Divisions for Analysis to happen Investment  Banking –  Europe division Global Wealth Management Fixed Income  US division Trading and Settlement Switzerland Division Drill down By city, country Drill down by Financial product Trend analysis By region Granular Details by region City, state, country
Fortent Monitor Data Manager Profiling Engine Operational Data Store Detection Engine Investigation  System Source: Fortent software training material
Data Pipeline DDA CIS SWIFT Money Market transaction hub Load to IEF Load to IEF Load to IEF Data Hub Wires Reference data Posted & Deposit Detail Transactions TDA Extract Normalize & Transform Load Fortent Monitor Systems of Record FedWire transactions wire  transactions customers accounts rel man Concept: Fortent software training material I E F Excel sheet,  graphs Excel sheet,  graphs Excel sheet,  graphs Zurich office London office New York office Money Laundering Data warehouse
Compliance Officer CCH Wall Street 3 rd  Party Data WSP Email Regs Compliance EYE OFAC Other Mutual Fund  Data Clearing Firms Inefficient  Use of Time OMS Other firm data a/c info Suitability criteria Manual Processes Increasing  Workload Inconsistent Audit Terms Reactive, Not Proactive ,[object Object],Money Laundering Searches required by the Compliance Officer
Goal:  Process change Exchang e Electronic Communications Network Market Maker Firm Internalizes Order Internet order Phone order [1]   http://www.ibtimes.com/articles/20061006/add-nyse-electronic-trading.htm
The Simple SWOT from MIS750 S TRENGTHS W EAKNESSES O PPORTUNITIES T HREATS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Simple SWOT from MIS750 S TRENGTHS W EAKNESSES O PPORTUNITIES T HREATS 4. Existing Human Resource, Divisions, high cost Brick structure within bank, how to utiilize their services compared to Click structure of small Online companies & consequently their low operating cost. 6. Buying / Tie up with Online Financial services Company and learn from their low cost Click culture, Online handling of Processes like Fox TV who successfully launched My Space on Internet though traditional TV Media company. 5. Lack of methods to know and verify Customer details from what they say and what they actually do. 6. Huge amount of daily data to be checked right from Client’s details, to Transactions, to email correspondence between the Client and the Bank. 7. Cataloging data from around the world, from all their Clients & from all the Client’s transactions and then storing all these details at Bank’s location. 8. Cataloging all the above details and yet comply with the Swiss Privacy Laws of Non Disclosure of Client’s details and maintaining Client’s Privacy.
Weakness:  Data Integration & Size of Bank Problems: Data Disintegration Across Sources Brokerage Credit card Wealth Management Investment Banking Same data  different name Different data  Same name Data found here  nowhere else Different keys same data
Threats: Multiple Compliances, Regulators and changing Laws & Compliances pose new Risks for Banks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Fraud USA PATRIOT Act Money Laundering Bank Secrecy Act OFAC Terrorism ,[object Object],[object Object]
Threats: Newspaper reports ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Source: h ttp://www.amlcft.com/cases.htm#Recent_Major_Fines_and_Penalties
Strengths Weaknesses 1. Use Huge pockets to deploy latest Money Laundering Technology. 2. Use Brand name to enter Online Money Laundering Banking Operations. 1. Provide staff IT training in Money Laundering software to make them equipped to handle Money Laundering software operations. 1. Fines from the regulators. New changing regulations around the world and fines for Bank in event of non compliance to these new laws. Loss of Image in case Bank found guilty of Money Laundering.  Tie up Start up firms to join the Online Products & services.  Tie-up and Co-Brand services with existing Online player to compete with new born Online firm.  Lower cost of operations and transaction to attract customers from competition. Tie-up with IBM, Infosys to provide regular supply of well experienced IT workers. Start transformation of Enterprise into IT governed enterprise parallelly in multiple divisions of bank. Opportunities S O   STRATEGIES W O   STRATEGIES S T   STRATEGIES W T   STRATEGIES Threats Super SWOT Company UBS Money Laundering Division 1. Brand Name 2. Cash Flow 3. Well distributed office locales  4. Products and services  5. Trained Financial workforce. 6. Part of Bank Transactions Online.  1. Huge Online market untapped. 2. Commanding presence in US, European  3. Greater reach to clients than competitors 4. Offer more variety services  1. Lack of in house Money Laundering & IT workforce 2. Huge size, slower adoption of technology than by competitors  3. High cost of Brick structure against the Click structure and high operating cost. 4. Late mover in Online market.
Strengths Weaknesses 3. Use big distribution to get more clients than competition.  4. Use huge infrastructure to provide Add on services. 1. Use Huge pockets to deploy latest Money Laundering software & trained IT workforce from say IBM. 2. Use brand name to offer Online services and market these.  2. Slow adoption of IT 3. In house trained workforce  Tie up Start up firms to join the Online Products & services.  Tie-up and Co-Brand services with existing Online player to compete with new born Online firm.  Lower cost of operations and transaction to attract customers from competition. Tie-up with IBM, Infosys to provide regular supply of well experienced IT workers. Start transformation of Enterprise into IT governed enterprise parallelly in multiple divisions of bank. Opportunities S O   STRATEGIES W O   STRATEGIES S T   STRATEGIES W T   STRATEGIES Threats Super SWOT Company UBS Money Laundering Division
Method 1: Customer Relationship Management CRM used for Monitoring/Reporting Customer ID documentation Enhanced due diligence Monitoring Reporting FIU analysis Investigation Application from customer Within the institution Outside the institution When should KYC research need to be carried out? Source:  www.baft.org  presentation by Andrew Clark
Method 1: Customer Relationship Management Contd… Anti Money Laundering Profiles generation 1 ,[object Object],Transaction Account Txn Type Day Daily Summary Account Txn Type Day Monthly Summary Account Txn Type Month Account Profile Account Txn Type Peer Profile Peer Group Txn Type ,[object Object]
Method 1 Contd… CRM : 2 Tracking Suspicious Behavior  by customer, by transaction Comparison of current  month to account profile Comparison of current  month to peer profile Event Thresholds Sum  of scores SB Thresholds Alerts Account Value Account Volume Insufficient Account   Insufficient Peer Peer Volume Peer Value Events Group by customer Customer Security Blanket Infraction Account Security  Blanket Infraction BLU Infraction Infractions (reason for alert) Account Profile Peer Profile Monthly  Summary Daily  Summary Daily  Summary Daily  Summary Source: Fortent software training material
Fortent Monitor Data Manager Profiling Engine Operational Data Store Detection Engine Investigation  System Source: Fortent software training material Method 2: Information Organization
Data Pipeline DDA CIS SWIFT Money Market transaction hub Load to IEF Load to IEF Load to IEF Data Hub Wires Reference data Posted & Deposit Detail Transactions TDA Extract Normalize & Transform Load Fortent Monitor Systems of Record FedWire transactions wire  transactions customers accounts rel man Concept: Fortent software training material I E F Excel sheet,  graphs Excel sheet,  graphs Excel sheet,  graphs Zurich office London office New York office Method 2: Information Organization  Money Laundering Data warehouse
Method 2: Information Organization The Fortent End to End Solution Overview ,[object Object],[object Object],KYC Information & Training Case Management Workflow Transaction Monitoring Investigation  & Reporting Source: Fortent software training material
Method 2: Information Organization What do we look at ?  Role Country Bank Account Island Bank Peoples Bank Lion Bank Transaction Type Originator SWIFT Intermediary 1 SWIFT Intermediary 2 SWIFT $ Wachovia Beneficiary SWIFT $ Message/Product Type SWIFT MT103 WIRE Source: Fortent software training material
Method 2: Information Organization Search Customer and transaction details by … ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Source: Fortent software training material
Business Strategy Competitors Banks like Barclays, Credit Swisse, Citi Group are also deploying Technology, but Business Intelligence might be UBS edge. Local banks, online financial instutions with low distribution network will loose customers badly and may even cease to exist. Competitors Banks like Barclays, Credit Swisse, Citi Group as well Online firms like E-Trade, Charles Schwab are giving UBS tough competition. Customers/Clients Educated, high net worth individual well versed with Online services, specially younger generation will jump on, might loose those who not Online. Client prefer Telephone or web meetings, one-to-one meeting only in special cases. Customers/Clients For Clients coming to bank for one-to-one meet is a norm loaded with paper and going back with bag full of financial documents. Products and Services Single UBS Executive, Client’s point of contact for all kinds of accounts, Asset, Wealth Management or Brokerage to get overall picture. Online services. Products and Services Asset Management, Wealth management, Brokerage – to an extent still manual and same client has to call different divisions for different accounts Business Scope To-Be As-Is
Products & Services / Clients & Customers – As is
Products & Services / Clients & Customers – To Be
Business Strategy Online Asset management, Brokerage, Taxes filing, Pension policy advise and related Online services become norm. Services over the phone, Call center services for minor administrative services like logging on bank’s Web page, opening bank account become a norm.  Note Changes Big distribution network. Brand Name Deep pockets to implement any new technology within a short time. Distinctive Competencies Internal Decisions , Regulatory, Etc. Patriot Act details of client submission to government – implementation done Online only using Excel, Business Objects, graphs. Internal Decisions , Regulatory, Etc. Patriot Act implementation done both partly manual, partly Online Business Governance To-Be As-Is
As – Is : Business Strategy Governance Paper based Approach to Money Laundering Bank teller puts in  Customer account Office Boy Faxes Account details Details received at Bank’s Head office Office Boy Suspicious Transaction Accounts Desk Search for Right Client  Account & Right FAX   Investigator from  FBI, Bank, Head Bank Try to trace client’s  details   Investigator Search Account past trends Money deposit  by Client Bank manager Compiles transaction Volume of paper work  In Investigation and  Administrative loop holes Leads to loss of  Investigation. Is this Client records Processing fine in 2008?
As – Is : Business Strategy
Training and Awareness Program Cost of Compliance Anti-Money Laundering Strategy Anti - money laundering standards and procedures Management Commitment Security & technology usage Administrative and end - user  policies and procedures KYC  - Data  Access/Mining Transaction Monitoring/  Tracking Processes  Business and organisation Processes & Initiatives Tactical short term  solutions Compliance Requirements International, Regulatory, Industry, Third Party, Internal AML Reporting Risk assessment Investment suitability Tax etc.  Investment suitability Tax etc.  Know your customer (KYC)  - Account Opening Business Strategy Governance: To Be From Reactive to Proactive approach Integrated Approach
To-Be: Business Strategy
Business Infrastructure Fast typing skills mandatory along with use of all MS Office products from Word, to Excel to Power point, Outlook, Web browsing along with specilised software like Database programmes like SQL, Business Objects, Charles River for few. Paper based work, typing skills, telephonic skills, PC skills limited to MS Word and limited level of MS Excel. HR/Skills Separate head for Money Laundering was brought in. Person was of level of Director reporting directly to Executive Committee and working in parallel with CIO. Division was headed by Business Analyst, Project Manager who was much low in Management ranking. Administrative Process have been designed to be all Online, data transfer, sharing, all online with click of a button. Bank’s declining position, bank responsibility to comply with new new compliances and unhappy customers with slower transaction speed as compared to competitors. Few process were manual, few based on Excel sheets, few other online but there was no integration, so one division could not exchange information with other without use of paper. Key Processes To-Be As-Is
As – Is : Administrative Approach to Money Laundering REACTIVE APPROACH Bank teller puts in  Customer account Office Boy Faxes Account details Details received at Bank’s Head office Office Boy Suspicious Transaction Accounts Desk Search for Right Client  Account & Right FAX   Investigator from  FBI, Bank, Head Bank Try to trace client’s  details   Investigator Search Account past trends Money deposit  by Client Bank manager Compiles transaction Volume of paper work  In Investigation and  Administrative loop holes Leads to loss of  Investigation. Is this Client records Processing fine in 2008?
Current Key Processes – As Is  Brokerage Asset Management Private Banking Investment Banking Institutional investors **  Above Pictures taken from Google Images
Future Key Processes – To Be Brokerage Asset Management Private Banking Investment Banking Institutional investors **  Above Pictures taken from Google Images
Organisational changes As Is To Be Hierarchy based org Structure Services, Product line based org Structure
Human Resources As is To Be
IT Strategy Internal Decisions , Regulatory, Etc. Include all areas that are relevant after the project implementation. Note Changes Internal Decisions , Regulatory, Etc. Include all areas that are relevant before the project implementation Governance Key Applications After project implementation Key Technologies After project implementation Key Applications Prior to project implementation Key Technologies Prior to project implementation Technology Scope Those areas in which the company has a distinct or competitive advantage over their competition after the implementation of the project. Note Changes Those areas in which the company has a distinct or competitive advantage over their competition. System Competency To-Be As-Is
As – Is : IT Strategy Paper based Approach to Money Laundering Bank teller puts in  Customer account Office Boy Faxes Account details Details received at Bank’s Head office Office Boy Suspicious Transaction Accounts Desk Search for Right Client  Account & Right FAX   Investigator from  FBI, Bank, Head Bank Try to trace client’s  details   Investigator Search Account past trends Money deposit  by Client Bank manager Compiles transaction Volume of paper work  In Investigation and  Administrative loop holes Leads to loss of  Investigation. Is this Client records Processing fine in 2008?
IT Strategy - As Is
IT Strategy – To Be
Infrastructural Re Design & Deployment Money Laundering Data warehouse
IT Strategy: To Be As a result of Process change implementation Exchang e Electronic Communications Network Market Maker Firm Internalizes Order Internet order Phone order
IT Infrastructure As-Is To-Be Architecture The IT Architecture prior to the project The IT Architecture after the project implementation. Key Processes The Key Processes prior to the project.  The Key Processes after the project implementation. H/R/SKILLS HR duties and functions prior to the project.  HR duties and functions after the project.
Pre requisites for Integrated approach to trade processing: centralisation of information collection process …  to Centralised information source on correspondent banks From … Numerous bilateral information exchanges within financial institutions Source: www.swift.com/index.cfm?item_id=3878
As – Is Architecture US Wealth Management Europe Wealth Management Investment Banking US Wealth Management  Board meet Europe Wealth Management  Board meet Brokerage Management  Board meet
To- Be Architecture ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],UBS Investment banking Europe Fixed Income  US Exchange trading US Wealth Management Oracle Sybase SAP Oracle U B S Da t a S t a g i n g Extract SAS Oracle SAP Wealth management Europe Institutional investment
 
Data Pipeline DDA CIS SWIFT Money Market transaction hub Load to IEF Load to IEF Load to IEF Data Hub Wires Reference data Posted & Deposit Detail Transactions TDA Extract Normalize & Transform Load Fortent Monitor Systems of Record FedWire transactions wire  transactions customers accounts rel man Concept: Fortent software training material I E F Excel sheet,  graphs Excel sheet,  graphs Excel sheet,  graphs Zurich office London office New York office Money Laundering Data warehouse
Alternatives Key Process  change Implementation Of IT in handing Transactions Setting up Separate Money Laundering Division Brick to Click Organization for Internal reporting & HR changes Merger, Tie up with upcoming Online Financial companies & Websites [1]  Professor S. Seshadari, IIT Professor slides on Datawarehousing.  Only the diagram structure taken by Professor’s slide. The concept & content based  on my understanding of Delta case. Centralization  and Integration of Various Divisions
Merger, Partner with other Online Financial companies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Western Union Or Charles Schaub which are in Online Financial services business **  Above Pictures taken from Google Images
Go International, grow international  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],**  Above Pictures taken from Google Images
Transform workforce, move from  Brick to Click Organization only for Internal reporting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],**  Above Pictures taken from Google Images
Organisational changes As Is To Be Hierarchy based org Structure Services, Product line based org Structure
Future Key Processes – To Be Brokerage Asset Management Private Banking Investment Banking Institutional investors **  Above Pictures taken from Google Images
Recommendations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Training and Awareness Program Cost of Compliance Anti-Money Laundering Strategy Anti - money laundering standards and procedures Management Commitment Security & technology usage Administrative and end - user  policies and procedures KYC  - Data  Access/Mining Transaction Monitoring/  Tracking Processes  Business and organisation Processes & Initiatives Tactical short term  solutions Compliance Requirements International, Regulatory, Industry, Third Party, Internal AML Reporting Risk assessment Investment suitability Tax etc.  Investment suitability Tax etc.  Know your customer (KYC)  - Account Opening From Reactive to Proactive approach Integrated Approach
Pre requisites for Integrated approach to ML Bank: centralisation of information collection process …  to Centralised information source on correspondent banks From … Numerous bilateral information exchanges  Source: www.swift.com/index.cfm?item_id=3878
Organisational changes As Is To Be Hierarchy based org Structure Services, Product line based org Structure
References MIS 760 Team Case 1. www.cfdg.org.uk/.../events_h_050518_E3%20-%20 Money %20 Laundering %20and%20Fraud%20-%20Don%20Bawtree. ppt   Presentation from Don Rawtree, Don Bawtree, Partner, BDO Stoy Hayward LLP, Emerald House, East Street, Epsom, Surrey, KT17 1HS 2.  Presentation on  Briefing on ‘KYC’ Norms and ‘AML’ Measures for IBA Member Banks   by  Sanjeev Singh, Additional Director, FIU-IND, Financial Intelligence Unit-India  3. www.fintraca.gov.af/assets/ppt/AML  4.http://www.nchelp.org/elibrary/Presentations/2003/2003WinterLegalAffairsMeeting/Consumer%20Privacy%20Issues.ppt  5. www.cityinformation.org.uk/Events/presentations/2007-May-MicheleBate.ppt  6.  http://www.amlcft.com/cases.htm#Recent_Major_Fines_and_Penalties 7.  Presentation on  Briefing on ‘KYC’ Norms and ‘AML’ Measures for IBA Member Banks
References ,[object Object],[object Object],[object Object],[object Object]
References & Bibliography  ,[object Object],[object Object]
Ethical Statement “ Cheating during in-class tests or take-home examinations or homework is, of course, illegal and immoral. A Graduate Academic Evaluation Board exists to investigate academic improprieties, conduct hearings, and determine any necessary actions. The term ‘academic impropriety’ is meant to include, but is not limited to, cheating on homework, during in-class or take home examinations and plagiarism.” Consequences of academic impropriety are severe, ranging from receiving an “F” in a course, to warning from the Dean of the Graduate School, which becomes a part of the permanent student record, to expulsion. Consistent with the above statements, all homework exercises, tests and exams that are designated as individual assignments must contain the following signed statement before they can be accepted for grading. I, Kartik Mehta, pledge on my honor that I have not given or received any unauthorized assistance on this assignment/examination. I ,Kartik Mehta, further pledge that I have not copied any material from a book, article, the Internet or any other source except where I have expressly cited the source.  MIS 760 Team Case

More Related Content

What's hot

Chapter 9 private banking
Chapter 9   private bankingChapter 9   private banking
Chapter 9 private banking
Quan Risk
 
Understanding Money Laundering and Fraud Risks of Wire Transfers
Understanding Money Laundering and Fraud Risks of Wire TransfersUnderstanding Money Laundering and Fraud Risks of Wire Transfers
Understanding Money Laundering and Fraud Risks of Wire Transfers
Alessa
 
role of ai in banking (2).pptx
role of ai in banking (2).pptxrole of ai in banking (2).pptx
role of ai in banking (2).pptx
sagarpatil812774
 
How to Fight Product Counterfeiting with Investigative Strategies and Tactics
How to Fight Product Counterfeiting with Investigative Strategies and TacticsHow to Fight Product Counterfeiting with Investigative Strategies and Tactics
How to Fight Product Counterfeiting with Investigative Strategies and Tactics
IntelCollab.com
 
Anti-money laundering presentation
Anti-money laundering presentationAnti-money laundering presentation
Anti-money laundering presentation
Elias Mose
 

What's hot (20)

Aml basics
Aml basicsAml basics
Aml basics
 
How to conduct an AML risk assessment
How to conduct an AML risk assessmentHow to conduct an AML risk assessment
How to conduct an AML risk assessment
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & control
 
Law amla presentation
Law amla presentationLaw amla presentation
Law amla presentation
 
Chapter 9 private banking
Chapter 9   private bankingChapter 9   private banking
Chapter 9 private banking
 
Anti-Money Laundering (AML) Risk Assessment Process
Anti-Money Laundering (AML) Risk Assessment ProcessAnti-Money Laundering (AML) Risk Assessment Process
Anti-Money Laundering (AML) Risk Assessment Process
 
AML presentation
AML presentationAML presentation
AML presentation
 
Understanding Money Laundering and Fraud Risks of Wire Transfers
Understanding Money Laundering and Fraud Risks of Wire TransfersUnderstanding Money Laundering and Fraud Risks of Wire Transfers
Understanding Money Laundering and Fraud Risks of Wire Transfers
 
role of ai in banking (2).pptx
role of ai in banking (2).pptxrole of ai in banking (2).pptx
role of ai in banking (2).pptx
 
How to Fight Product Counterfeiting with Investigative Strategies and Tactics
How to Fight Product Counterfeiting with Investigative Strategies and TacticsHow to Fight Product Counterfeiting with Investigative Strategies and Tactics
How to Fight Product Counterfeiting with Investigative Strategies and Tactics
 
Presentation AML
Presentation AMLPresentation AML
Presentation AML
 
AI in Banking and Financial Services
AI in Banking and Financial ServicesAI in Banking and Financial Services
AI in Banking and Financial Services
 
Fraud risk management in banks
Fraud risk management  in banksFraud risk management  in banks
Fraud risk management in banks
 
Anti-money laundering presentation
Anti-money laundering presentationAnti-money laundering presentation
Anti-money laundering presentation
 
Ai and machine learning help detect, predict and prevent fraud - IBM Watson ...
Ai and machine learning help detect, predict and prevent fraud -  IBM Watson ...Ai and machine learning help detect, predict and prevent fraud -  IBM Watson ...
Ai and machine learning help detect, predict and prevent fraud - IBM Watson ...
 
Fintech
FintechFintech
Fintech
 
Business impact.analysis based on ISO 22301
Business impact.analysis based on ISO 22301Business impact.analysis based on ISO 22301
Business impact.analysis based on ISO 22301
 
Fraud Management Solutions
Fraud Management SolutionsFraud Management Solutions
Fraud Management Solutions
 
AML Training uba capital
AML Training uba capitalAML Training uba capital
AML Training uba capital
 
Customer Due Diligence: Improving Screening Processes for OFAC Entities and O...
Customer Due Diligence: Improving Screening Processes for OFAC Entities and O...Customer Due Diligence: Improving Screening Processes for OFAC Entities and O...
Customer Due Diligence: Improving Screening Processes for OFAC Entities and O...
 

Viewers also liked

Anti Money Laundering - CDD & KYC
Anti Money Laundering - CDD & KYCAnti Money Laundering - CDD & KYC
Anti Money Laundering - CDD & KYC
Besart Qerimi
 
Money laundering
Money launderingMoney laundering
Money laundering
saadiakh
 
Crowe AML Model Risk Management Whitepaper
Crowe AML Model Risk Management WhitepaperCrowe AML Model Risk Management Whitepaper
Crowe AML Model Risk Management Whitepaper
Brett Rosynek
 
Machine Learning, Data Mining, Genetic Algorithms, Neural ...
Machine Learning, Data Mining, Genetic Algorithms, Neural ...Machine Learning, Data Mining, Genetic Algorithms, Neural ...
Machine Learning, Data Mining, Genetic Algorithms, Neural ...
butest
 
10-15 511 genetic algorithms and machine learning (alan nochenson)
10-15 511 genetic algorithms and machine learning (alan nochenson)10-15 511 genetic algorithms and machine learning (alan nochenson)
10-15 511 genetic algorithms and machine learning (alan nochenson)
Alan Nochenson
 

Viewers also liked (20)

Anti Money Laundering - CDD & KYC
Anti Money Laundering - CDD & KYCAnti Money Laundering - CDD & KYC
Anti Money Laundering - CDD & KYC
 
Money laundering
Money launderingMoney laundering
Money laundering
 
Anti money laundering
Anti money launderingAnti money laundering
Anti money laundering
 
Presentation: Stop illicit trade of tobacco
Presentation: Stop illicit trade of tobaccoPresentation: Stop illicit trade of tobacco
Presentation: Stop illicit trade of tobacco
 
Case sas 2
Case sas 2Case sas 2
Case sas 2
 
Delivering agile customer experience in the nexus Era
Delivering agile customer experience in the nexus EraDelivering agile customer experience in the nexus Era
Delivering agile customer experience in the nexus Era
 
Sas anti money laundering training
Sas anti money laundering training Sas anti money laundering training
Sas anti money laundering training
 
0122 02SAS
0122 02SAS0122 02SAS
0122 02SAS
 
Know More About KYC and Money Laundering Procedure by DHFL
Know More About KYC and Money Laundering Procedure by DHFLKnow More About KYC and Money Laundering Procedure by DHFL
Know More About KYC and Money Laundering Procedure by DHFL
 
Crowe AML Model Risk Management Whitepaper
Crowe AML Model Risk Management WhitepaperCrowe AML Model Risk Management Whitepaper
Crowe AML Model Risk Management Whitepaper
 
Illicit Cigarette Trade: A Global Pandemic
Illicit Cigarette Trade: A Global PandemicIllicit Cigarette Trade: A Global Pandemic
Illicit Cigarette Trade: A Global Pandemic
 
Machine Learning, Data Mining, Genetic Algorithms, Neural ...
Machine Learning, Data Mining, Genetic Algorithms, Neural ...Machine Learning, Data Mining, Genetic Algorithms, Neural ...
Machine Learning, Data Mining, Genetic Algorithms, Neural ...
 
10-15 511 genetic algorithms and machine learning (alan nochenson)
10-15 511 genetic algorithms and machine learning (alan nochenson)10-15 511 genetic algorithms and machine learning (alan nochenson)
10-15 511 genetic algorithms and machine learning (alan nochenson)
 
Github in a Graph
Github in a GraphGithub in a Graph
Github in a Graph
 
Finding the insights hidden in your graph data
Finding the insights hidden in your graph dataFinding the insights hidden in your graph data
Finding the insights hidden in your graph data
 
Fouille de données issues d’un grand graphe par carte de Kohonen à noyau
Fouille de données issues d’un grand graphe par carte de Kohonen à noyauFouille de données issues d’un grand graphe par carte de Kohonen à noyau
Fouille de données issues d’un grand graphe par carte de Kohonen à noyau
 
Visualizing an anti-money laundering investigation
Visualizing an anti-money laundering investigationVisualizing an anti-money laundering investigation
Visualizing an anti-money laundering investigation
 
20141015 how graphs revolutionize access management
20141015 how graphs revolutionize access management20141015 how graphs revolutionize access management
20141015 how graphs revolutionize access management
 
Graph Database Prototyping made easy with Graphgen
Graph Database Prototyping made easy with GraphgenGraph Database Prototyping made easy with Graphgen
Graph Database Prototyping made easy with Graphgen
 
Bringing graph technologies to data analysis : the case of Azerbaijan in th...
Bringing graph technologies to data  analysis : the case of Azerbaijan in  th...Bringing graph technologies to data  analysis : the case of Azerbaijan in  th...
Bringing graph technologies to data analysis : the case of Azerbaijan in th...
 

Similar to Business Intelligence For Anti-Money Laundering

Business Intelligence For Aml
Business Intelligence For AmlBusiness Intelligence For Aml
Business Intelligence For Aml
Kartik Mehta
 
How Big Data and Predictive Analytics are revolutionizing AML and Financial C...
How Big Data and Predictive Analytics are revolutionizing AML and Financial C...How Big Data and Predictive Analytics are revolutionizing AML and Financial C...
How Big Data and Predictive Analytics are revolutionizing AML and Financial C...
DataWorks Summit
 
AML white paper_EN_4Feb2015v2
AML white paper_EN_4Feb2015v2AML white paper_EN_4Feb2015v2
AML white paper_EN_4Feb2015v2
Eric Young
 
Regulatory & Compliance Account Opening
Regulatory & Compliance Account OpeningRegulatory & Compliance Account Opening
Regulatory & Compliance Account Opening
Axis Technology, LLC
 
Fiserv FCRM Platform Brochure
Fiserv FCRM Platform BrochureFiserv FCRM Platform Brochure
Fiserv FCRM Platform Brochure
Paul Stabile
 
Timothy_Dunham_Resume_080116
Timothy_Dunham_Resume_080116Timothy_Dunham_Resume_080116
Timothy_Dunham_Resume_080116
Timothy Dunham
 

Similar to Business Intelligence For Anti-Money Laundering (20)

Business Intelligence For Aml
Business Intelligence For AmlBusiness Intelligence For Aml
Business Intelligence For Aml
 
Falcon 012009
Falcon 012009Falcon 012009
Falcon 012009
 
Citigroup Dact Final Tv
Citigroup Dact Final TvCitigroup Dact Final Tv
Citigroup Dact Final Tv
 
abhishek singh cv
abhishek singh cvabhishek singh cv
abhishek singh cv
 
How Big Data and Predictive Analytics are revolutionizing AML and Financial C...
How Big Data and Predictive Analytics are revolutionizing AML and Financial C...How Big Data and Predictive Analytics are revolutionizing AML and Financial C...
How Big Data and Predictive Analytics are revolutionizing AML and Financial C...
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
 
AML white paper_EN_4Feb2015v2
AML white paper_EN_4Feb2015v2AML white paper_EN_4Feb2015v2
AML white paper_EN_4Feb2015v2
 
Money Laundering Risk Technological Perspective Fina Lv1
Money Laundering Risk Technological Perspective Fina Lv1Money Laundering Risk Technological Perspective Fina Lv1
Money Laundering Risk Technological Perspective Fina Lv1
 
Regulatory & Compliance Account Opening
Regulatory & Compliance Account OpeningRegulatory & Compliance Account Opening
Regulatory & Compliance Account Opening
 
Fiserv FCRM Platform Brochure
Fiserv FCRM Platform BrochureFiserv FCRM Platform Brochure
Fiserv FCRM Platform Brochure
 
opustechglobal-com-key-risks-to-consider-when-implementing-real-time-payments...
opustechglobal-com-key-risks-to-consider-when-implementing-real-time-payments...opustechglobal-com-key-risks-to-consider-when-implementing-real-time-payments...
opustechglobal-com-key-risks-to-consider-when-implementing-real-time-payments...
 
Custody Banking and Emerging KYC Needs
Custody Banking and Emerging KYC NeedsCustody Banking and Emerging KYC Needs
Custody Banking and Emerging KYC Needs
 
Timothy_Dunham_Resume_080116
Timothy_Dunham_Resume_080116Timothy_Dunham_Resume_080116
Timothy_Dunham_Resume_080116
 
Webinar Deck: Efficient Methods for Managing Global Cash in Today's Regulator...
Webinar Deck: Efficient Methods for Managing Global Cash in Today's Regulator...Webinar Deck: Efficient Methods for Managing Global Cash in Today's Regulator...
Webinar Deck: Efficient Methods for Managing Global Cash in Today's Regulator...
 
Resume - Snehal Thakur
Resume - Snehal ThakurResume - Snehal Thakur
Resume - Snehal Thakur
 
EAI Checklist
EAI ChecklistEAI Checklist
EAI Checklist
 
5 Applications of Data Science in FinTech: The Tech Behind the Booming FinTec...
5 Applications of Data Science in FinTech: The Tech Behind the Booming FinTec...5 Applications of Data Science in FinTech: The Tech Behind the Booming FinTec...
5 Applications of Data Science in FinTech: The Tech Behind the Booming FinTec...
 
How Are Data Analytics Used In The Banking And Finance Industries.pdf
How Are Data Analytics Used In The Banking And Finance Industries.pdfHow Are Data Analytics Used In The Banking And Finance Industries.pdf
How Are Data Analytics Used In The Banking And Finance Industries.pdf
 
apidays LIVE Hong Kong 2021 - Federated Learning for Banking by Isaac Wong, W...
apidays LIVE Hong Kong 2021 - Federated Learning for Banking by Isaac Wong, W...apidays LIVE Hong Kong 2021 - Federated Learning for Banking by Isaac Wong, W...
apidays LIVE Hong Kong 2021 - Federated Learning for Banking by Isaac Wong, W...
 
Ibm financial crime management solution 3
Ibm financial crime management solution 3Ibm financial crime management solution 3
Ibm financial crime management solution 3
 

More from Kartik Mehta

Paper - Growth of mobile services, its global reach and its impact on GDPs of...
Paper - Growth of mobile services, its global reach and its impact on GDPs of...Paper - Growth of mobile services, its global reach and its impact on GDPs of...
Paper - Growth of mobile services, its global reach and its impact on GDPs of...
Kartik Mehta
 
Business Intelligence Role Decision Making
Business Intelligence Role Decision MakingBusiness Intelligence Role Decision Making
Business Intelligence Role Decision Making
Kartik Mehta
 

More from Kartik Mehta (9)

Mobile commerce km
Mobile commerce kmMobile commerce km
Mobile commerce km
 
Wimax and changing wireless eco system
Wimax and changing wireless eco systemWimax and changing wireless eco system
Wimax and changing wireless eco system
 
Paper - Growth of mobile services, its global reach and its impact on GDPs of...
Paper - Growth of mobile services, its global reach and its impact on GDPs of...Paper - Growth of mobile services, its global reach and its impact on GDPs of...
Paper - Growth of mobile services, its global reach and its impact on GDPs of...
 
Mobile services and its impact on GPDs and Return on Investment
Mobile services and its impact on GPDs and Return on InvestmentMobile services and its impact on GPDs and Return on Investment
Mobile services and its impact on GPDs and Return on Investment
 
Business Intelligence Role Decision Making
Business Intelligence Role Decision MakingBusiness Intelligence Role Decision Making
Business Intelligence Role Decision Making
 
Chase Decentralised System
Chase Decentralised SystemChase Decentralised System
Chase Decentralised System
 
Business Intelligence In Financial Industry
Business Intelligence In Financial IndustryBusiness Intelligence In Financial Industry
Business Intelligence In Financial Industry
 
From Brick Mortar To Online Click Organisation
From Brick Mortar To Online Click OrganisationFrom Brick Mortar To Online Click Organisation
From Brick Mortar To Online Click Organisation
 
Trade And Settlement Process
Trade And Settlement ProcessTrade And Settlement Process
Trade And Settlement Process
 

Recently uploaded

Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
amitlee9823
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
lizamodels9
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
dlhescort
 
Call Girls In Nangloi Rly Metro ꧂…….95996 … 13876 Enjoy ꧂Escort
Call Girls In Nangloi Rly Metro ꧂…….95996 … 13876 Enjoy ꧂EscortCall Girls In Nangloi Rly Metro ꧂…….95996 … 13876 Enjoy ꧂Escort
Call Girls In Nangloi Rly Metro ꧂…….95996 … 13876 Enjoy ꧂Escort
dlhescort
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
daisycvs
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
amitlee9823
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Sheetaleventcompany
 
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
lizamodels9
 

Recently uploaded (20)

PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
Call Girls In Nangloi Rly Metro ꧂…….95996 … 13876 Enjoy ꧂Escort
Call Girls In Nangloi Rly Metro ꧂…….95996 … 13876 Enjoy ꧂EscortCall Girls In Nangloi Rly Metro ꧂…….95996 … 13876 Enjoy ꧂Escort
Call Girls In Nangloi Rly Metro ꧂…….95996 … 13876 Enjoy ꧂Escort
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLWhitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceMalegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
 
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
 

Business Intelligence For Anti-Money Laundering

  • 1. Anti-Money Laundering Compliance software implementation
  • 2.
  • 3.
  • 4. Training and Awareness Program Cost of Compliance Anti-Money Laundering Strategy Anti - money laundering standards and procedures Management Commitment Security & technology usage Administrative and end - user policies and procedures KYC - Data Access/Mining Transaction Monitoring/ Tracking Processes Business and organisation Processes & Initiatives Tactical short term solutions Compliance Requirements International, Regulatory, Industry, Third Party, Internal AML Reporting Risk assessment Investment suitability Tax etc. Investment suitability Tax etc. Know your customer (KYC) - Account Opening From Reactive to Proactive approach Integrated Approach
  • 5. Data Pipeline DDA CIS SWIFT Money Market transaction hub Load to IEF Load to IEF Load to IEF Data Hub Wires Reference data Posted & Deposit Detail Transactions TDA Extract Normalize & Transform Load Fortent Monitor Systems of Record FedWire transactions wire transactions customers accounts rel man Concept: Fortent software training material I E F Excel sheet, graphs Excel sheet, graphs Excel sheet, graphs Zurich office London office New York office Money Laundering Data warehouse
  • 6.
  • 7. Opportunities: Easy Trends analysis Money Laundering Analysis using Tools Users Wealth Management Investment Banking Calculation Engine Actuate Actuate Zurich office Stamford Office Actuate Cognos SAS New York office Actuate London Office Excel sheet, graphs Excel sheet, graphs Excel sheet, graphs Excel sheet, graphs
  • 8. Opportunity: Easy access of information globally Zurich office – Report on Clients transactions unexplained for amount above $10,000 . Stamford office List of clients in US said to be under suspicion radar Berlin office List of clients in Germany said to be under suspicion radar New York office – US government – List of all Clients under suspicion by bank’s investigators Paris office – How to perform better Than Credit Suisse – search Trends Excel, Word London office demands Suspicious Activity Reports
  • 9. Opportunities: Actual number & not mere suspicion about Client & their transaction 10 47 30 12 Wealth Management Investment banking Fixed Income Institutional securities US Europe Asia 3/1 3/2 3/3 3/4 Date Month Region Product
  • 10. External Problems Globalisation of clients & data Sophisticated money launderers Inefficient compliance systems Reporting to number of agencies & regulation change Accountability of transactions from Corresponding banks, investigate volumes of data. [1] Professor S. Seshadari, IIT Professor slides on Datawarehousing. Only the diagram structure taken by Professor’s slide. The concept & content based on my understanding of Delta case. Privacy concern’ Of clients
  • 11. Internal Problems Hire Paralegal & IT team well versed with Patriot Act AML software which is best processes and budget? Where to hire best IT, Technology consultants Each division working on different data system [1] Professor S. Seshadari, IIT Professor slides on Datawarehousing. Only the diagram structure taken by Professor’s slide. The concept & content based on my understanding of Delta case. Massive volumes Of data & Data integration Permissions Within The bank Day – to- day operations Vs Trends & Strategy issues
  • 12. Operational Problem: Quick access to financial information in manage transactions What product promotions have the biggest impact on revenue? What is the most effective distribution channel? Who are my customers and what products are they buying? Which are our lowest/highest margin customers ? What impact will new products/services have on revenue and margins? Which customers are most likely to go to the competition ?
  • 13.
  • 14.
  • 15. Know Your Customer Guidelines Customer Acceptance - Ensure that you accept only legitimate and bona fide customers. Customer Identification- Ensure that you properly identify your customers to understand the risks they may pose. Transactions Monitoring- Monitor customers accounts and transactions to prevent or detect illegal activities. Risk Management- Implement processes to effectively manage the risks posed by customers trying to misuse facilities. Money Laundering Searches required by the Compliance Officer Source: Presentation by Sanjeev Singh
  • 16. KYC: If Client Involved in Money Laundering Activities Drug Trafficking Bribery / Corruption Prostitution Gambling Tax Evasion Extortion Robbery and Fraud White Collar Crimes ( including Insider Trading and Securities offences ) Smuggling (arms, people, goods) Counterfeiting and Forgery Kidnapping Serious Crime or All Crimes? Organised Crime Source: www.fintraca.gov.af/assets/ ppt /AML
  • 17. Goal: Integration of Company’s data to enable Money Laundering Analysis Across Bank’s various Divisions for Analysis to happen Investment Banking – Europe division Global Wealth Management Fixed Income US division Trading and Settlement Switzerland Division Drill down By city, country Drill down by Financial product Trend analysis By region Granular Details by region City, state, country
  • 18. Fortent Monitor Data Manager Profiling Engine Operational Data Store Detection Engine Investigation System Source: Fortent software training material
  • 19. Data Pipeline DDA CIS SWIFT Money Market transaction hub Load to IEF Load to IEF Load to IEF Data Hub Wires Reference data Posted & Deposit Detail Transactions TDA Extract Normalize & Transform Load Fortent Monitor Systems of Record FedWire transactions wire transactions customers accounts rel man Concept: Fortent software training material I E F Excel sheet, graphs Excel sheet, graphs Excel sheet, graphs Zurich office London office New York office Money Laundering Data warehouse
  • 20.
  • 21. Goal: Process change Exchang e Electronic Communications Network Market Maker Firm Internalizes Order Internet order Phone order [1] http://www.ibtimes.com/articles/20061006/add-nyse-electronic-trading.htm
  • 22.
  • 23. The Simple SWOT from MIS750 S TRENGTHS W EAKNESSES O PPORTUNITIES T HREATS 4. Existing Human Resource, Divisions, high cost Brick structure within bank, how to utiilize their services compared to Click structure of small Online companies & consequently their low operating cost. 6. Buying / Tie up with Online Financial services Company and learn from their low cost Click culture, Online handling of Processes like Fox TV who successfully launched My Space on Internet though traditional TV Media company. 5. Lack of methods to know and verify Customer details from what they say and what they actually do. 6. Huge amount of daily data to be checked right from Client’s details, to Transactions, to email correspondence between the Client and the Bank. 7. Cataloging data from around the world, from all their Clients & from all the Client’s transactions and then storing all these details at Bank’s location. 8. Cataloging all the above details and yet comply with the Swiss Privacy Laws of Non Disclosure of Client’s details and maintaining Client’s Privacy.
  • 24. Weakness: Data Integration & Size of Bank Problems: Data Disintegration Across Sources Brokerage Credit card Wealth Management Investment Banking Same data different name Different data Same name Data found here nowhere else Different keys same data
  • 25.
  • 26.
  • 27. Strengths Weaknesses 1. Use Huge pockets to deploy latest Money Laundering Technology. 2. Use Brand name to enter Online Money Laundering Banking Operations. 1. Provide staff IT training in Money Laundering software to make them equipped to handle Money Laundering software operations. 1. Fines from the regulators. New changing regulations around the world and fines for Bank in event of non compliance to these new laws. Loss of Image in case Bank found guilty of Money Laundering. Tie up Start up firms to join the Online Products & services. Tie-up and Co-Brand services with existing Online player to compete with new born Online firm. Lower cost of operations and transaction to attract customers from competition. Tie-up with IBM, Infosys to provide regular supply of well experienced IT workers. Start transformation of Enterprise into IT governed enterprise parallelly in multiple divisions of bank. Opportunities S O STRATEGIES W O STRATEGIES S T STRATEGIES W T STRATEGIES Threats Super SWOT Company UBS Money Laundering Division 1. Brand Name 2. Cash Flow 3. Well distributed office locales 4. Products and services 5. Trained Financial workforce. 6. Part of Bank Transactions Online. 1. Huge Online market untapped. 2. Commanding presence in US, European 3. Greater reach to clients than competitors 4. Offer more variety services 1. Lack of in house Money Laundering & IT workforce 2. Huge size, slower adoption of technology than by competitors 3. High cost of Brick structure against the Click structure and high operating cost. 4. Late mover in Online market.
  • 28. Strengths Weaknesses 3. Use big distribution to get more clients than competition. 4. Use huge infrastructure to provide Add on services. 1. Use Huge pockets to deploy latest Money Laundering software & trained IT workforce from say IBM. 2. Use brand name to offer Online services and market these. 2. Slow adoption of IT 3. In house trained workforce Tie up Start up firms to join the Online Products & services. Tie-up and Co-Brand services with existing Online player to compete with new born Online firm. Lower cost of operations and transaction to attract customers from competition. Tie-up with IBM, Infosys to provide regular supply of well experienced IT workers. Start transformation of Enterprise into IT governed enterprise parallelly in multiple divisions of bank. Opportunities S O STRATEGIES W O STRATEGIES S T STRATEGIES W T STRATEGIES Threats Super SWOT Company UBS Money Laundering Division
  • 29. Method 1: Customer Relationship Management CRM used for Monitoring/Reporting Customer ID documentation Enhanced due diligence Monitoring Reporting FIU analysis Investigation Application from customer Within the institution Outside the institution When should KYC research need to be carried out? Source: www.baft.org presentation by Andrew Clark
  • 30.
  • 31. Method 1 Contd… CRM : 2 Tracking Suspicious Behavior by customer, by transaction Comparison of current month to account profile Comparison of current month to peer profile Event Thresholds Sum of scores SB Thresholds Alerts Account Value Account Volume Insufficient Account Insufficient Peer Peer Volume Peer Value Events Group by customer Customer Security Blanket Infraction Account Security Blanket Infraction BLU Infraction Infractions (reason for alert) Account Profile Peer Profile Monthly Summary Daily Summary Daily Summary Daily Summary Source: Fortent software training material
  • 32. Fortent Monitor Data Manager Profiling Engine Operational Data Store Detection Engine Investigation System Source: Fortent software training material Method 2: Information Organization
  • 33. Data Pipeline DDA CIS SWIFT Money Market transaction hub Load to IEF Load to IEF Load to IEF Data Hub Wires Reference data Posted & Deposit Detail Transactions TDA Extract Normalize & Transform Load Fortent Monitor Systems of Record FedWire transactions wire transactions customers accounts rel man Concept: Fortent software training material I E F Excel sheet, graphs Excel sheet, graphs Excel sheet, graphs Zurich office London office New York office Method 2: Information Organization Money Laundering Data warehouse
  • 34.
  • 35. Method 2: Information Organization What do we look at ? Role Country Bank Account Island Bank Peoples Bank Lion Bank Transaction Type Originator SWIFT Intermediary 1 SWIFT Intermediary 2 SWIFT $ Wachovia Beneficiary SWIFT $ Message/Product Type SWIFT MT103 WIRE Source: Fortent software training material
  • 36.
  • 37. Business Strategy Competitors Banks like Barclays, Credit Swisse, Citi Group are also deploying Technology, but Business Intelligence might be UBS edge. Local banks, online financial instutions with low distribution network will loose customers badly and may even cease to exist. Competitors Banks like Barclays, Credit Swisse, Citi Group as well Online firms like E-Trade, Charles Schwab are giving UBS tough competition. Customers/Clients Educated, high net worth individual well versed with Online services, specially younger generation will jump on, might loose those who not Online. Client prefer Telephone or web meetings, one-to-one meeting only in special cases. Customers/Clients For Clients coming to bank for one-to-one meet is a norm loaded with paper and going back with bag full of financial documents. Products and Services Single UBS Executive, Client’s point of contact for all kinds of accounts, Asset, Wealth Management or Brokerage to get overall picture. Online services. Products and Services Asset Management, Wealth management, Brokerage – to an extent still manual and same client has to call different divisions for different accounts Business Scope To-Be As-Is
  • 38. Products & Services / Clients & Customers – As is
  • 39. Products & Services / Clients & Customers – To Be
  • 40. Business Strategy Online Asset management, Brokerage, Taxes filing, Pension policy advise and related Online services become norm. Services over the phone, Call center services for minor administrative services like logging on bank’s Web page, opening bank account become a norm. Note Changes Big distribution network. Brand Name Deep pockets to implement any new technology within a short time. Distinctive Competencies Internal Decisions , Regulatory, Etc. Patriot Act details of client submission to government – implementation done Online only using Excel, Business Objects, graphs. Internal Decisions , Regulatory, Etc. Patriot Act implementation done both partly manual, partly Online Business Governance To-Be As-Is
  • 41. As – Is : Business Strategy Governance Paper based Approach to Money Laundering Bank teller puts in Customer account Office Boy Faxes Account details Details received at Bank’s Head office Office Boy Suspicious Transaction Accounts Desk Search for Right Client Account & Right FAX Investigator from FBI, Bank, Head Bank Try to trace client’s details Investigator Search Account past trends Money deposit by Client Bank manager Compiles transaction Volume of paper work In Investigation and Administrative loop holes Leads to loss of Investigation. Is this Client records Processing fine in 2008?
  • 42. As – Is : Business Strategy
  • 43. Training and Awareness Program Cost of Compliance Anti-Money Laundering Strategy Anti - money laundering standards and procedures Management Commitment Security & technology usage Administrative and end - user policies and procedures KYC - Data Access/Mining Transaction Monitoring/ Tracking Processes Business and organisation Processes & Initiatives Tactical short term solutions Compliance Requirements International, Regulatory, Industry, Third Party, Internal AML Reporting Risk assessment Investment suitability Tax etc. Investment suitability Tax etc. Know your customer (KYC) - Account Opening Business Strategy Governance: To Be From Reactive to Proactive approach Integrated Approach
  • 45. Business Infrastructure Fast typing skills mandatory along with use of all MS Office products from Word, to Excel to Power point, Outlook, Web browsing along with specilised software like Database programmes like SQL, Business Objects, Charles River for few. Paper based work, typing skills, telephonic skills, PC skills limited to MS Word and limited level of MS Excel. HR/Skills Separate head for Money Laundering was brought in. Person was of level of Director reporting directly to Executive Committee and working in parallel with CIO. Division was headed by Business Analyst, Project Manager who was much low in Management ranking. Administrative Process have been designed to be all Online, data transfer, sharing, all online with click of a button. Bank’s declining position, bank responsibility to comply with new new compliances and unhappy customers with slower transaction speed as compared to competitors. Few process were manual, few based on Excel sheets, few other online but there was no integration, so one division could not exchange information with other without use of paper. Key Processes To-Be As-Is
  • 46. As – Is : Administrative Approach to Money Laundering REACTIVE APPROACH Bank teller puts in Customer account Office Boy Faxes Account details Details received at Bank’s Head office Office Boy Suspicious Transaction Accounts Desk Search for Right Client Account & Right FAX Investigator from FBI, Bank, Head Bank Try to trace client’s details Investigator Search Account past trends Money deposit by Client Bank manager Compiles transaction Volume of paper work In Investigation and Administrative loop holes Leads to loss of Investigation. Is this Client records Processing fine in 2008?
  • 47. Current Key Processes – As Is Brokerage Asset Management Private Banking Investment Banking Institutional investors ** Above Pictures taken from Google Images
  • 48. Future Key Processes – To Be Brokerage Asset Management Private Banking Investment Banking Institutional investors ** Above Pictures taken from Google Images
  • 49. Organisational changes As Is To Be Hierarchy based org Structure Services, Product line based org Structure
  • 50. Human Resources As is To Be
  • 51. IT Strategy Internal Decisions , Regulatory, Etc. Include all areas that are relevant after the project implementation. Note Changes Internal Decisions , Regulatory, Etc. Include all areas that are relevant before the project implementation Governance Key Applications After project implementation Key Technologies After project implementation Key Applications Prior to project implementation Key Technologies Prior to project implementation Technology Scope Those areas in which the company has a distinct or competitive advantage over their competition after the implementation of the project. Note Changes Those areas in which the company has a distinct or competitive advantage over their competition. System Competency To-Be As-Is
  • 52. As – Is : IT Strategy Paper based Approach to Money Laundering Bank teller puts in Customer account Office Boy Faxes Account details Details received at Bank’s Head office Office Boy Suspicious Transaction Accounts Desk Search for Right Client Account & Right FAX Investigator from FBI, Bank, Head Bank Try to trace client’s details Investigator Search Account past trends Money deposit by Client Bank manager Compiles transaction Volume of paper work In Investigation and Administrative loop holes Leads to loss of Investigation. Is this Client records Processing fine in 2008?
  • 53. IT Strategy - As Is
  • 55. Infrastructural Re Design & Deployment Money Laundering Data warehouse
  • 56. IT Strategy: To Be As a result of Process change implementation Exchang e Electronic Communications Network Market Maker Firm Internalizes Order Internet order Phone order
  • 57. IT Infrastructure As-Is To-Be Architecture The IT Architecture prior to the project The IT Architecture after the project implementation. Key Processes The Key Processes prior to the project. The Key Processes after the project implementation. H/R/SKILLS HR duties and functions prior to the project. HR duties and functions after the project.
  • 58. Pre requisites for Integrated approach to trade processing: centralisation of information collection process … to Centralised information source on correspondent banks From … Numerous bilateral information exchanges within financial institutions Source: www.swift.com/index.cfm?item_id=3878
  • 59. As – Is Architecture US Wealth Management Europe Wealth Management Investment Banking US Wealth Management Board meet Europe Wealth Management Board meet Brokerage Management Board meet
  • 60.
  • 61.  
  • 62. Data Pipeline DDA CIS SWIFT Money Market transaction hub Load to IEF Load to IEF Load to IEF Data Hub Wires Reference data Posted & Deposit Detail Transactions TDA Extract Normalize & Transform Load Fortent Monitor Systems of Record FedWire transactions wire transactions customers accounts rel man Concept: Fortent software training material I E F Excel sheet, graphs Excel sheet, graphs Excel sheet, graphs Zurich office London office New York office Money Laundering Data warehouse
  • 63. Alternatives Key Process change Implementation Of IT in handing Transactions Setting up Separate Money Laundering Division Brick to Click Organization for Internal reporting & HR changes Merger, Tie up with upcoming Online Financial companies & Websites [1] Professor S. Seshadari, IIT Professor slides on Datawarehousing. Only the diagram structure taken by Professor’s slide. The concept & content based on my understanding of Delta case. Centralization and Integration of Various Divisions
  • 64.
  • 65.
  • 66.
  • 67. Organisational changes As Is To Be Hierarchy based org Structure Services, Product line based org Structure
  • 68. Future Key Processes – To Be Brokerage Asset Management Private Banking Investment Banking Institutional investors ** Above Pictures taken from Google Images
  • 69.
  • 70. Training and Awareness Program Cost of Compliance Anti-Money Laundering Strategy Anti - money laundering standards and procedures Management Commitment Security & technology usage Administrative and end - user policies and procedures KYC - Data Access/Mining Transaction Monitoring/ Tracking Processes Business and organisation Processes & Initiatives Tactical short term solutions Compliance Requirements International, Regulatory, Industry, Third Party, Internal AML Reporting Risk assessment Investment suitability Tax etc. Investment suitability Tax etc. Know your customer (KYC) - Account Opening From Reactive to Proactive approach Integrated Approach
  • 71. Pre requisites for Integrated approach to ML Bank: centralisation of information collection process … to Centralised information source on correspondent banks From … Numerous bilateral information exchanges Source: www.swift.com/index.cfm?item_id=3878
  • 72. Organisational changes As Is To Be Hierarchy based org Structure Services, Product line based org Structure
  • 73. References MIS 760 Team Case 1. www.cfdg.org.uk/.../events_h_050518_E3%20-%20 Money %20 Laundering %20and%20Fraud%20-%20Don%20Bawtree. ppt Presentation from Don Rawtree, Don Bawtree, Partner, BDO Stoy Hayward LLP, Emerald House, East Street, Epsom, Surrey, KT17 1HS 2. Presentation on Briefing on ‘KYC’ Norms and ‘AML’ Measures for IBA Member Banks by Sanjeev Singh, Additional Director, FIU-IND, Financial Intelligence Unit-India 3. www.fintraca.gov.af/assets/ppt/AML 4.http://www.nchelp.org/elibrary/Presentations/2003/2003WinterLegalAffairsMeeting/Consumer%20Privacy%20Issues.ppt 5. www.cityinformation.org.uk/Events/presentations/2007-May-MicheleBate.ppt 6. http://www.amlcft.com/cases.htm#Recent_Major_Fines_and_Penalties 7. Presentation on Briefing on ‘KYC’ Norms and ‘AML’ Measures for IBA Member Banks
  • 74.
  • 75.
  • 76. Ethical Statement “ Cheating during in-class tests or take-home examinations or homework is, of course, illegal and immoral. A Graduate Academic Evaluation Board exists to investigate academic improprieties, conduct hearings, and determine any necessary actions. The term ‘academic impropriety’ is meant to include, but is not limited to, cheating on homework, during in-class or take home examinations and plagiarism.” Consequences of academic impropriety are severe, ranging from receiving an “F” in a course, to warning from the Dean of the Graduate School, which becomes a part of the permanent student record, to expulsion. Consistent with the above statements, all homework exercises, tests and exams that are designated as individual assignments must contain the following signed statement before they can be accepted for grading. I, Kartik Mehta, pledge on my honor that I have not given or received any unauthorized assistance on this assignment/examination. I ,Kartik Mehta, further pledge that I have not copied any material from a book, article, the Internet or any other source except where I have expressly cited the source. MIS 760 Team Case