The goAML application is a UNODC strategic response to financial crime including money laundering and terrorist financing. The goAML application has been developed by the Information Technology Service of UNODC in partnership with the UNODC Global Programme Against Money Laundering. It is an integrated database and intelligent analysis system intended for use by Financial Intelligence Units worldwide.
http://goaml.unodc.org/goaml/en/index.html
Digital Banking Strategy Roadmap - 3.24.15Calvin Turner
The Digital delivery of banking products and services is already a reality.
Like it or not, your customers will compare their digital banking experience to shopping on Amazon, iTunes, eBay, Southwest Air, etc., and to their digital experiences with large banks that already have robust digital banking offerings.
Traditional banks can’t just push out mobile apps and capabilities to customers and call it a digital banking strategy. Customers expect a seamless integration of the entire online banking experience from initiation to fulfillment. If they are forced to drop off somewhere along the digital experience to print documents, call a representative, and/or visit a branch, you have lost the customer.
This document discusses using machine learning for fraud detection. It outlines how machine learning can provide a scalable, adaptable solution to identify fraud. The machine learning pipeline involves gathering data from user accounts, selecting a model like CatBoost that handles categorical data well, training and evaluating the model, and deploying the trained model to classify new users as fraudulent or not. The goal is to balance avoiding false positives and false negatives when identifying fraud.
Credit Card Analytics on a Connected Data PlatformHortonworks
This document discusses using a connected data platform for credit card analytics. It outlines key payment industry trends like digital payments replacing cash and the need for real-time fraud detection. It describes the current state of payment card fraud and challenges with legacy systems. The presentation proposes a solution utilizing Hortonworks data platform for real-time analytics on all card data to provide insights like fraud detection, customer profiling and attrition management. It provides architecture details and walks through the fraud detection workflow as an example use case. Benefits highlighted are lower costs compared to traditional databases and enabling predictive analytics for fraud detection.
Adaptive Machine Learning for Credit Card Fraud DetectionAndrea Dal Pozzolo
This document discusses machine learning techniques for credit card fraud detection. It addresses challenges like concept drift, imbalanced data, and limited supervised data. The author proposes contributions in learning from imbalanced and evolving data streams, a prototype fraud detection system using all supervised information, and a software package/dataset. Methods discussed include resampling techniques, concept drift handling, and a "racing" algorithm to efficiently select the best strategy for unbalanced classification on a given dataset. Evaluation measures the ability to accurately rank transactions by fraud risk.
This document proposes a mechanism to detect credit card fraud in online transactions using a Hidden Markov Model. The model would classify users as having low, medium, or high spending habits and flag transactions as potentially fraudulent if a user makes a payment outside their normal spending category. The mechanism was implemented using HTML, CSS, JavaScript, PHP, and MySQL and could help reduce fraud by adding an additional layer of security validation for online payments. However, it may not detect all fraudulent transactions accurately as the Hidden Markov Model requires at least 10 prior transactions to properly classify users.
The document summarizes IBM Payments Gateway, a payment processing solution that allows merchants to accept more payment options. It discusses how evolving customer preferences are changing payments and creating challenges for merchants. IBM Payments Gateway aims to help merchants overcome issues like cart abandonment by offering over 170 payment methods across devices and channels. It also helps streamline reconciliation and reduce costs through features like automated payment routing and fraud analysis. The solution is deployed globally and used by various industries to improve sales and customer experiences.
Global Payment System- Reference ArchitectureRamadas MV
The document does not contain any text to summarize. It only contains the abbreviation "ST" which provides no context or meaningful information to summarize in 3 sentences or less.
This document discusses how visual analytics can help drive digital transformation in the retail banking industry. It covers key trends like demographic changes, evolving customer behaviors, and increasing regulations that are challenging traditional banks. It advocates using visual analytics to improve customer centricity, operational efficiencies, risk management, and other initiatives. Case studies are presented showing how banks like ANZ and Swedbank have used visual analytics platforms like Qlik to gain insights from data and remain competitive against technology companies.
Learn how fraudsters compromise email accounts and trick employees into wiring them money. Read how the scam works, why it's so effective, and how to prevent it.
This document analyzes various methods for credit card fraud detection. It discusses techniques like Dempster-Shafer theory, BLAST-SSAHA hybridization, hidden Markov models, evolutionary-fuzzy systems, and using Bayesian and neural networks. The document also compares the different fraud detection systems based on parameters like accuracy, method, true positive rate, false positive rate, and training data needed. In conclusion, the document states that efficient fraud detection is required, and techniques like fuzzy Darwinian systems and neural networks show good accuracy, while hidden Markov models have a low fraud detection rate.
Information security – risk identification is allPECB
Karsten M. Decker is an expert in information security standards and risk identification. He currently works as the owner and CEO of Decker Consulting GmbH, and previously held positions including Managing Director of the Swiss Center for Scientific Computing and Assistant Professor at the University of Bern. He actively contributes to the development of ISO/IEC 27000 information security standards. The document provides an overview of information security risk identification, including why it is important, how it can be done, and what factors are critical to its success. It discusses preparing for the process, different approaches like event-based and asset-threat-vulnerability models, and requirements.
Banking Client Onboarding Process Powerpoint Presentation SlidesSlideTeam
This complete deck can be used to present to your team. It has PPT slides on various topics highlighting all the core areas of your business needs. This complete deck focuses on Banking Client Onboarding Process Powerpoint Presentation Slides and has professionally designed templates with suitable visuals and appropriate content. This deck consists of total of fifty three slides. All the slides are completely customizable for your convenience. You can change the colour, text and font size of these templates. You can add or delete the content if needed. Get access to this professionally designed complete presentation by clicking the download button below. https://bit.ly/2P9MYTT
This document discusses system architecture for central banks. It proposes an integrated Oracle ERP system to consolidate various applications including banking, payments, general ledger, cash management, and regulatory reporting. A data warehouse would store transactional and external data to power decision support tools for monetary policy, risk management, and economic analysis. Standardizing on Oracle applications and a web-centric architecture allows centralization of information and reduces costs.
Credit card fraud detection using python machine learningSandeep Garg
COMPANY_NAME provides data-driven business transformation services using advanced analytics and artificial intelligence. It helps businesses contextualize data, generate insights from complex problems, and make data-driven decisions. The document then discusses using machine learning for credit card fraud detection. It explains supervised learning as inferring a function from labeled training and test data to map inputs to outputs with minimal error. Screenshots are provided of exploring and preprocessing a credit card transaction dataset for outlier detection, correlation, and preparing the data for machine learning models.
The document discusses cyber security analytics and its importance. It covers topics like cyber threats such as ransomware, malware, social engineering and phishing. It also discusses applications of data analytics in cyber security problems like SMS spam detection, credit card fraud detection, and intrusion detection. For each problem, it describes collecting and preprocessing relevant data and then applying machine learning algorithms like logistic regression, Bayesian classification to build models.
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...Molly Alexander
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, & ML Are Transforming the Fight Against Fraud, AML & Cybersecurity -Nadeem Asghar
The document provides an overview of credit scoring and scorecard development. It discusses:
- The objectives of credit scoring in assessing credit risk and forecasting good/bad applicants.
- The types of clients that are categorized for scoring, including good, bad, indeterminate, insufficient, excluded, and rejected.
- The research objectives and challenges in building statistical models to assign risk scores and monitor model performance.
- The research methodology involving data partitioning, variable binning, scorecard modeling using logistic regression, and scorecard evaluation metrics like KS, Gini, and lift.
Big Data and advanced analytics are critical topics for executives today. But many still aren't sure how to turn that promise into value. This presentation provides an overview of 16 examples and use cases that lay out the different ways companies have approached the issue and found value: everything from pricing flexibility to customer preference management to credit risk analysis to fraud protection and discount targeting. For the latest on Big Data & Advanced Analytics: http://mckinseyonmarketingandsales.com/topics/big-data
The document discusses money laundering through the use of offshore jurisdictions. It outlines the stages of money laundering as layering, integration and placement. It describes techniques used in offshore centers to launder money such as using formal banking systems, shipping cash, luxury goods, international trade companies, and blending of funds. Offshore financial centers are defined as countries that deal primarily with non-residents and foreign currency out of proportion to their economy size.
Typologies in general examined -
Securities
Trade Based
Counterfeit Trade
Sports Clubs (and Equestrian)
Child Pornography & Human Trafficking
Government Contracting / Bribery / PEPs
Internet Based Market Systems
Currency Demand Approach
Pricing Approach
Multiple Indicators Multiple Solutions (MIMIC)
Measurement of Crimes Model
Newton’s Law of Gravity applied to ML
The RBI is the third most active regulator in the world, penalising banks NOT for money laundering but due to a deficient AML program. Are Indian Banks assessing their AML programs comprehensively?
Financial institutions play a key role in detecting, preventing, and controlling money laundering and terrorism financing through continuous monitoring of customer relationships and timely reporting of suspicious activities. They must follow know-your-customer procedures and report currency transactions, funds transfers, and other activity to the Financial Crimes Enforcement Network. This helps law enforcement maintain security and integrity in the global financial system.
The document discusses customer due diligence (CDD) and know your customer (KYC) procedures for financial institutions. It outlines the key elements of a CDD program, including identifying customers, monitoring transactions, and performing enhanced due diligence for high-risk clients. Financial institutions must follow the FATF recommendations to avoid legal and reputational risks from money laundering. Proper CDD involves identifying both natural and legal persons as well as their beneficial owners.
Money laundering refers to disguising illegally obtained money to make it appear legitimate. It involves three steps - placement, layering, and integration. Criminals like drug dealers, mobsters, corrupt politicians, and terrorists engage in money laundering to hide the source and destination of funds from illegal activities. Key causes of money laundering include tax evasion, increasing profits from crime, and limited risks of exposure. Money laundering distorts economies, increases corruption and crime, undermines financial market integrity, and risks countries' reputations.
The document discusses money laundering, including its definition, process, and risks. It defines money laundering as the process of converting illegal funds into legitimate funds and assets. The money laundering cycle involves placement, layering, and integration of funds to obscure their criminal origin. Risks to banks from money laundering include reputational, legal, operational, and concentration risks. Know-your-customer (KYC) norms and monitoring of suspicious transactions are important measures to deter money laundering.
The document discusses different tools for monitoring application, network, and infrastructure topologies in an enterprise environment. It recommends tools that can monitor across all three silos and provide out-of-the-box support for most enterprise stacks, both on-premises and in the public cloud. Boundary, AppFirst, LogicMonitor, ScienceLogic, and DataDog are highlighted as tools that meet these criteria. Key selection factors include integration coverage, ease of use, cost, and example enterprise customers.
Old Dogs, New Tricks: Big Data from and for Mainframe ITPrecisely
This document provides a summary of a webcast presentation about using big data analytics platforms like Splunk for mainframe IT operational intelligence, security information and event management (SIEM), and IT service intelligence (ITSI). The presentation discusses the challenges with traditional mainframe monitoring tools and the need for real-time access to mainframe data in modern analytics platforms. It provides examples of how Splunk can be used for ITOA, SIEM, and ITSI use cases. It also summarizes Ironstream, a Syncsort product that streams and normalizes mainframe log and system management facility (SMF) data to Splunk.
Know the features and functions of information systemsRajesh Khadka
Features of information systems: data; people; hardware; software; telecommunications
Functions of information systems: input; storage; processing; output; control and feedback loops; closed
and open systems
Transformation of data into information: distinction between data and information; collection, storage,
processing, manipulation, retrieval, presentation
Types of information system: management information systems; others eg marketing (sales performance,
competitors etc), financial (financial costs, investment returns etc), human resources (HR) (staffing,
professional development etc)
Management information systems (MIS): features; benefits; effectiveness criteria eg accuracy, sustainability,
response times, confidence
Product description shell control box 4 ltsmchatoramhuru
Shell Control Box (SCB) is an appliance that monitors and records user activity on remote servers and virtual desktops. It logs all administrative actions like commands, configuration changes, and file transfers. The encrypted audit logs can be searched and replayed to review events. SCB integrates transparently and controls many protocols like SSH, RDP, HTTP to provide security, compliance, and forensic capabilities.
The Industrial Internet of Things (IIoT) is one of todays hottest topics within the automation and manufacturing industries. Individuals and organizations that uses variable frequency drives have high expectations that the IIoT ecosystem will deliver on its promises of added value through increased productivity, predictive maintenance, and reduced asset downtime. The idea is to come up with a prototype of a remote monitoring system for VLT FC-302 Danfoss drives. A portal that interfaces with the cloud server and displays the current state of all connected drives.
SplunkLive! Milano 2016 - customer presentation - UnicreditSplunk
UniCredit has been using Splunk for over 4 years to gain insights from heterogeneous data sources across their organization. They initially used Splunk for application monitoring and troubleshooting, but have since expanded use cases to include business analytics, IT operational analytics, and replacing manual reporting processes. Through custom scripts and configurations, UniCredit is able to get a single pane of glass view across applications and infrastructure. They have also evolved their use of Splunk from just collecting logs to powering a REST API for client applications. UniCredit views Splunk as a flexible solution that helps deliver insights for both IT and business teams.
We all know how it goes – once a year, the auditor carries out an IT audit as part of the year-end audit. The idea is to flag potential threats in SAP cyber security, and in identity & access management.
In terms of risk, this procedure is no solution; rather, the step is taken much too late in the process to allow for any kind of quick reaction. Hackers may have already had ample time to take advantage of the risks. Despite this fact, many companies leave it too late to close loopholes.
In this webinar, we will show you a much better approach that addresses this discrepancy. Thanks to SAST SUITE, you can achieve continuous, highly efficient real-time monitoring of all critical and security-related changes to your SAP systems. This means you can act immediately. No more waiting until next year when the auditor is at your doorstep.
Topics of focus:
• Immediate detection of unauthorized authorization assignments
• Monitoring role allocation and any evasion of the dual control principle
• Proper reaction – without delay – to suspicious table change documents
• Cost-benefit analysis: manual downstream controls vs. intelligent real-time monitoring
-------------------------------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08NetFlowAuditor
Flow Based technology provides network visibility that reduces time and costs for understanding, alerting, and reporting on network issues. It gives real-time and historical insight into network traffic through non-intrusive collection of flow data from routers and switches. This flow-based network intelligence is useful for various teams and helps with tasks like capacity planning, security, and troubleshooting.
This document describes PlantConnect Insights, a historian and data management solution for industrial facilities. It can acquire data from multiple sources, store it either on-premises or in the cloud, and handle both continuous and batch production processes. Key features include data acquisition, alarm management, custom logic execution, dashboards, reporting, and security controls. The solution was implemented for a dairy plant in Gujarat, India to provide real-time reporting and maintenance alerts from 7 connected devices.
Azeti is an innovative manufacturer that helps businesses achieve operational excellence in IT operations and infrastructure management through its two product lines, Monitoring and Security. It has over 200 monitoring customers, 1000 security customers, and partners in over 35 countries. After securing venture capital funding, Azeti will accelerate its international growth to become the global leader in both operational areas by providing outstanding appliance-based solutions.
Lomiss is a technology company that specializes in location-based systems. The company aims to develop a distributed location-based information system to transfer secured data and track remote caregivers in real-time, maximizing efficiency and reducing costs. The system would provide access to information from different databases, optimize schedules and resource allocation, and generate reports based on location.
An SIEM solution provides the ability to collect, analyze, and manage log data from across an organization. It can collect data from various sources using different protocols and store large volumes of raw data in a scalable platform. This centralized log management allows organizations to generate insightful reports, detect threats in real-time, investigate incidents, ensure compliance, and more. By automatically learning baselines of normal activity, an SIEM can detect anomalies and prioritize the most critical alerts. Its analytics capabilities like correlation rules and taxonomy-driven classification further enhance threat detection and security operations.
STAT Data Solutions provides an IoT data acquisition platform called IoTconnect that allows companies to collect data from devices and sensors in real-time to improve efficiencies and performance. IoTconnect supports over 30 protocols and can universally access any data source to perform analytics and integrate with backend systems. It helps companies build on their existing technology assets and data to derive business value from IoT. IoTconnect provides a versatile and fail-safe platform for automated data collection from a wide range of systems and devices.
SplunkLive! Frankfurt 2018 - Data Onboarding OverviewSplunk
Presented at SplunkLive! Frankfurt 2018:
Splunk Data Collection Architecture
Apps and Technology Add-ons
Demos / Examples
Best Practices
Resources and Q&A
PlantConnect is a web based online monitoring and control tool from Ascent Informatics (India) Pvt. Ltd. It has capability of M2M communication for connecting with multiple devices across geographies and collect live device data. This data can be used for further analytics, reporting and online remote monitoring.
The document describes a software package for employee time and attendance tracking. It includes 28 modules for functions like time tracking, video recording, report generation, access control, and more. The core module, ZKTime Basic Platform, allows identification of employees using biometrics, RFID cards, or other methods. It tracks employee locations, schedules, attendance history, and generates reports. The package offers web-based access so reports can be viewed remotely. Additional modules provide features like CCTV integration, late/absence tracking, shift scheduling, and salary calculation.
The Big Data Analytics Ecosystem at LinkedInrajappaiyer
LinkedIn has several data driven products that improve the experience of its users -- whether they are professionals or enterprises. Supporting this is a large ecosystem of systems and processes that provide data and insights in a timely manner to the products that are driven by it.
This talk provides an overview of the various components of this ecosystem which are:
- Hadoop
- Teradata
- Kafka
- Databus
- Camus
- Lumos
etc.
Agata provides high speed cyber solutions including a full featured Forensics suite with Meta Data and tens of thousands of dynamic policy rules, Layer-7 Intelligence, Network Analytics, filtered sessions and traffic recording.
Backed by 20 years of specialized research and development of traffic management and security solutions for top tier customers, Agata is able to provide best in class high-end technological products. Agata appliances allow enterprises to secure networks using state of the art cyber solutions. Agata DPI empowers the user to find, record, analyze and track security events and vulnerabilities including Zero-Day exploits.
The overview presentation includes a use case and a description of the different applications for Agata DPI.
Abortion pills in Muscat(+918133066128) Cytotec pills buy Omanmaishakhanam230
Abortion pills Kuwait☎️+918133066128☎️ Kuwait City Qatar- Doha Abortion Saudi Arabia [ Abortion pills) Jeddah/riaydh/dammam/+918133066128☎️] cytotec tablets uses abortion pills 💊💊 How effective is the abortion pill? 💊💊 +918133066128) "Abortion pills in Jeddah" how to get cytotec tablets in Riyadh " Abortion pills in dammam*💊💊 The abortion pill is very effective. If you’re taking mifepristone and misoprostol, it depends on how far along the pregnancy is, and how many doses of medicine you take:💊💊 +918133066128) how to buy cytotec pills
At 8 weeks pregnant or less, it works about 94-98% of the time. +918133066128[ 💊💊💊 At 8-9 weeks pregnant, it works about 94-96% of the time. +918133066128) At 9-10 weeks pregnant, it works about 91-93% of the time. +918133066128)💊💊 If you take an extra dose of misoprostol, it works about 99% of the time. At 10-11 weeks pregnant, it works about 87% of the time. +918133066128) If you take an extra dose of misoprostol, it works about 98% of the time. In general, taking both mifepristone and+918133066128 misoprostol works a bit better than taking misoprostol only. +918133066128 Taking misoprostol alone works to end the+918133066128 pregnancy about 85-95% of the time — depending on how far along the+918133066128 pregnancy is and how you take the medicine. +918133066128 The abortion pill usually works, but if it doesn’t, you can take more medicine or have an in-clinic abortion. +918133066128 When can I take the abortion pill?+918133066128 In general, you can have a medication abortion up to 77 days (11 weeks)+918133066128 after the first day of your last period. If it’s been 78 days or more since the first day of your last+918133066128 period, you can have an in-clinic abortion to end your pregnancy.+918133066128
Why do people choose the abortion pill? Which kind of abortion you choose all depends on your personal+918133066128 preference and situation. With+918133066128 medication+918133066128 abortion, some people like that you don’t need to have a procedure in a doctor’s office. You can have your medication abortion on your own+918133066128 schedule, at home or in another comfortable place that you choose.+918133066128 You get to decide who you want to be with during your abortion, or you can go it alone. Because+918133066128 medication abortion is similar to a miscarriage, many people feel like it’s more “natural” and less invasive. And some+918133066128 people may not have an in-clinic abortion provider close by, so abortion pills are more available to+918133066128 them. +918133066128 Your doctor, nurse, or health center staff can help you decide which kind of abortion is best for you. +918133066128 More questions from patients: Saudi Arabia+918133066128 CYTOTEC Misoprostol Tablets. Misoprostol is a medication that can prevent stomach ulcers if you also take NSAID medications. It reduces the amount of acid in your stomach, which protects your stomach lining. The brand name of this medication is Cytotec®
What is an E-commerce- digital marketingpdfPurna Rai
What is an E-commerce?
E-commerce refers to the buying and selling of goods and services over the Internet. In an e-commerce transaction, the exchange of products or services takes place electronically, often through online platforms or websites. E-commerce has become a major aspect of the modern economy, enabling businesses and consumers to conduct transactions without the need for physical presence. It has gained immense popularity over recent years, with more people turning to online shopping for its convenience and accessibility.
E-commerce platforms provide a virtual marketplace where sellers can showcase their products, and buyers can browse and purchase items with just a few clicks. This has opened up new opportunities for entrepreneurs and businesses of all sizes, allowing them to reach a larger customer base and operate globally. However, e-commerce also presents its own set of challenges, such as competition, security concerns, and effectively managing logistics and customer experience. It is important for e-commerce businesses to stay up-to-date with evolving technologies, consumer trends, and effective marketing strategies to remain successful in this ever-growing industry.
What are the Key Components and Features of E-commerce?
E-commerce has various forms, including business-to-consumer (B2C), business-to-business (B2B), consumer-to-consumer (C2C), and more. The growth of e-commerce has transformed the way businesses operate and how consumers shop, providing convenience, accessibility, and a global marketplace. Key components and features of e-commerce include:
Online Stores: Businesses set up digital storefronts or online stores where customers can browse, select, and purchase products or services. These stores can take various forms, including dedicated websites, marketplaces, or social media platforms.
Electronic Payments: E-commerce transactions involve electronic payment methods. Customers can use credit cards, digital wallets, online banking, or other electronic payment systems for making payments.
Digital Marketing: E-commerce relies heavily on digital marketing strategies to attract customers. This includes search engine optimization (SEO), social media marketing, email marketing, and other online advertising methods.
Product Catalogs: Online stores have digital catalogs that showcase their products or services. These catalogs provide detailed information, images, and specifications to help customers make informed purchasing decisions.
Shopping Carts: E-commerce platforms typically incorporate shopping carts that allow customers to add products to their virtual cart, review their selections, and proceed to checkout for payment.
Secure Transactions: Security is a critical aspect of e-commerce. Secure socket layer (SSL) encryption is commonly used to ensure the confidentiality and integrity of sensitive information, such as payment details.
Public Expenditure & its Classifications, Canons, Causes, Effects & Theories....Dr T AASIF AHMED
The meaning, classifications, canons, theories, effects, and trends in public spending are all included in this ppt. This has been prepared to aid students in understanding and help them achieve the best grade possible. Kindly provide your insightful opinions and recommendations. For additional details, get in touch with Dr. T. Aasif Ahmed.
Typical Scams to Stay Away from When Buying Verified Binance AccountsAny kyc Account
In the world of cryptocurrency, having a verified Binance account can provide numerous benefits. However, with the growing demand for these accounts, the risk of encountering scams also increases. This presentation aims to educate you on the most common scams to avoid when buying verified Binance accounts and provide tips for safe transactions.
Unlocking Your Dream Home Understanding Government Subsidies for House and Ho...Kathiriyasubsidyhouse
Purchasing a home is a significant milestone, but the financial commitment can be daunting. Thankfully, various government subsidies and schemes can ease the burden. In this blog post, we'll delve into the intricacies of the government subsidy for house, the benefits of a government subsidy on home loan, and the attractive housing loan interest subsidy offered by Kathiriya Subsidy House. Understanding these can help you make informed decisions and potentially save a substantial amount of money on your home purchase.
Building Trust Through Transparency Kissht's Commitment during Regulatory Cr...Kissht Reviews
Kissht, a leading India fintech company, has shown an unwavering commitment to these principles, particularly during periods of regulatory crackdowns. By prioritizing transparency and robust compliance measures, Kissht has not only built trust among its users but also established itself as a reliable and ethical player in the fintech industry.
2. Anti Money Laundering, Data Collection and Reporting Information Technology Service External Systems Unit Global Programme against Money Laundering
3. Money Laundering/Terrorist Financing – The World’s Response Establish a global environment hostile to money laundering and terrorist financing Implement international standards including the FATF 40+9 recommendations Establish Financial Intelligence Units around the world Establish protocols and platforms for sharing intelligence and evidence Secure technical assistance for countries to implement international standards Uniform and standard AML platform - desirable
4. Anti-Money Laundering Process Three essential components of an AML/CFT regime: A functional compliance culture Functional regulatory bodies – central Bank, SEC, Insurance Regulator etc An effective financial intelligence unit tasked with: The above processes ideally should be automated particularly if they involve high data volumes
6. Brief History – ITS 2005 – UNODC appointed project manager for EC project in Nigeria Significant component – provision of IT solutions to EFCC including NFIU March 2006 UNODC ITS tasked with developing IT solutions April 2006 – ITS commences developing database and analytical tools for NFIU June 2006 – XML Schema introduced to Nigerian reporting institutions October 2006 – CTR database and basic analytical functions installed in NFIU and tested
7. Brief History – GPML Frequent requests from developing FIUs for IT solutions Early involvement in Nigeria project including in advisory role to IT component Potential for goAML beyond the Nigeria project recognized Simultaneous – work commences on widening the scope of the system beyond Nigeria
8. Current – Future February 07 Data collection tools completed Analytical functionality available Drawing tools phase 1 nearing completion Rules engine under construction Profiling tool under construction July 07 STR system completed Profiling tool completed Intelligence file management completed Workflow system completed Drawing tools phase 1 completed
9. Current – Future September 2007 Phase 1 goCASE complete June 2008 Drawing tools completed Rule engine and editor completed Full user documentation in multiple languages (English, French, Spanish, Russian) goAML (complete suite) VERSION 1.0 READY! July 2008 Phase 2 goCASE complete
10. Designed as a modular system to fit the needs of any FIU irrespective of size from a single computer with a few thousand processes - up to 500 million processes over 5 year period irrespective of file size Processes and analyzes reports on: - Suspicious transactions - Financial transactions – of any type - List or alert based reports – CFT etc Fully electronic data collection and dissemination from any source such tax, law enforcement records, immigration service (passenger movement records), property registrar, vehicle registrar etc…. goAML – global Operations Anti-Money Laundering
11.
12. goAML – global Operations Anti-Money Laundering Anti-Money Laundering Solution Building Blocks
13. goAML – Collecting and Managing Information Reporting standard defined: XML based (world standard format) Samples available for FI IT Personnel Exhaustive documentation available Validation application: Checks for valid XML All required fields are present Data types are correct Ensures reporting entities report in the correct format from day 1
14. goAML – Gathering and Managing Information Secure website (SSL 512 bit encryption) for: Creating reporting entities - by the FIU Creating contacts Changing contact details - by the reporting entity Report upload Report data entry - manually if necessary Report verification - clean up by system
15. goAML – Gathering and Managing Information Report History - what reported - accepted/rejected ref number View uploaded report - Individually Submission status - accepted/rejected Common content for any reporting entity - flexible - secure information from FIU - compliance circulars - alerts - name lists
16. goAML – High Volume Analysis Support analytical and investigation teams with highly sophisticated reporting capabilities. Visualize large volumes of data to help understand the big picture. Monitor potentially suspicious accounts. Reveal patterns and hidden connections. Create analytical charts manually or automatically.
17. Workflow for STR analysis Tasks and the process diagram are defined by the FIU users - can change to suit their own needs - full visual designer Task assignment and tracking - within FIU - push or pull reports by e-mail Integrated reporting - workflow reports - assignments - progress - results goAML – Collecting, Managing and Analyzing Information
18. Integrated source tracking - tracks externally sourced information - creates bring-ups, reminders etc Automatic resource scheduling - automatically assigns tasks - monitors workloads - measures outputs/performance Case feedback integration - Produces standardized feedback - reports as word documents goAML – Collecting, Managing and Analyzing Information
19. Customizable data gathering templates - standardized format for receipt of information from outside agencies that decides transmission medium (email/fax/post) Time in flight analysis - Time management measure goAML – Collecting, Managing and Analyzing Information
20. Common user interface across analysis screens - screens look and feel the same - supports multiple languages Workspace based (keep information through different reporting sessions) - two work spaces available at any one time - previous work automatically saved - supports text, tables, merged tables, pictures goAML – Analysis and Targeting Solution
21. Analyst can retrieve, filter and re-arrange the data accordingly to his/her needs. - Rearrange data fields - Change grouping - Filter data - Change data sorting - Save layout - Export goAML – Analysis and Targeting Solution
22. Linking to other screens from current screen Allows easy comparison of different accounts, persons or entities Each window acts independent of others Copy fields or rows Makes analysis easy Very easy to learn All these components have restricted access goAML – Analysis and Targeting Solution
23. goAML – Analysis Trails Link charts association charts – transaction flow charts etc Money and person trails for inbound and outbound transactions Trail for duplicated addresses, phone numbers and other identification data Displays: - source and destination displayed as nodes - direction and amount displayed as arrows
24. goAML – Analysis - Pivots Reports offer many different views of data under analysis Allows for dynamic user filtering and grouping of related data Allows for searching for TOP targets - 5/10/50 etc Flexible data search capability Simple integration with Excel - excellent for net worth analysis - ease of attachment to intel reports - arrives live so can be manipulated by receiver
25. goAML – Analysis - Intersect Combines data from two different reports - User chooses the two reports populated with data and t he columns to intersect Result is displayed in a completely new window with the intersected data
26. goAML – Information Dissemination Suspicious activity detected Open a new case – analysis output attached goCASE picks this up Export case to MS-WinWord - Case file remains with FIU - Output in the form of Intel report - Sanitised to the level required by the user
27. goAML - User and role based functions Management: Is able to check the submissions and the status of reporting entities. - performance measure/compliance Analyst: Responsible of conducting the analysis, finding suspicious activities and linking to similar-patterned cases where they exist - analysis Administrator: Allowed to add new user, give/revoke access to screens and different actions. Access to certain actions is dependant on the user’s role!
28. goAML - Security Username and password required to access applications. Access can be granted and revoked per: - User - Screen - Certain actions like copy, export etc. Access to screens and data is logged. Data partially encrypted in the database. - Encryption level and extent at the discretion of the user
29. goAML - Security Access to the system generally or to any part of it at the discretion of the user – the user must “open the gate” UNODC does not hold private key – cannot decipher encrypted data Rule engine secure Database and system tools installed on the user’s premises, UNODC has no independent access
30. goAML – System Requirements • Assumes average data load – 500,000 reports per month Assumes 15 users Assumes reasonable level of existing infrastructure including security - Mail servers - Local area network - DMZ with 2 firewalls - Anti-spam and anti-virus policy Provide fully redundant environment - 2 DB Servers - 2 Application servers - Storage area network (SAN) - Backup robot servers - Public key infrastructure certificates (PKI) - 15 high end personal computers (PCs) Approx: $220,000
31. goAML – Estimated Costs goAML software package is free of charge Installation – initial training US$ 80,000 (depending on location – 3 visits x 2 persons) Annual user license agreement US$ 100,000 - This fee will decrease as more users take up the system - Provides support within working hours in local time zones - Provides ongoing system development - Guarantees one on-site visit per year ____________ US$ 180,000
32. Breakdown of Costs (Basic installation) Installation – US$80,000 Establishment of standard reporting scheme for reporting institutions Training of reporting institution compliance and IT staff; Customisation of report formats and forms Customisation of goAML interfaces to individual user requirements Migration of existing data to goAML database Installation of goAML and completion of data migration Implementation of reporting system Training of FIU management, analysts and IT personnel Follow up and troubleshooting Time frame 3 – 6 months depending on existing infrastructure and current operating environment.
33. Maintenance, support and development fee – US$100,000 per annum Time zone specific, business hour support by e-mail, phone or fax – provided by regional support centers Outside business hours support provided from other time zones where language permits Ongoing, needs based, customization and development. At least one site visit per annum timed to the requirements of the user Continuous minor upgrade and patch service Periodical major upgrades – new releases Regular regional user group meetings and online forums Access, where necessary, to the full resources of the ITS Service of UNODC Breakdown of Costs (Basic installation)
34. Initial Deployment/Installation – US$600,000, maintenance and development fee – US$300,000 pa. (Assumes maximum 15 users) Includes all services of Basic Installation plus: Site assessment Skills assessment Design and supervise build of physical infrastructure Design and plan full system architecture Purchase, delivery and installation of all server and storage equipment Purchase software licenses Breakdown of Costs (Standard installation)
35. Initial Deployment/Installation – US$3,200,000, maintenance and development fee – US$1,200,000 pa. (Assumes maximum 100 users) Includes all services of Standard Installation plus: Purchase, delivery and installation of all equipment (full IT infrastructure and telecommunications) A support team on-site backed up by a development team offsite Purchase software licenses Management of maintenance contracts with suppliers Management of the buildup of the local IT unit with gradual hand over Full hardware and software upgrades and replacements (3 year cycle) Project duration (3-5 years) Breakdown of Costs (Premium installation)