Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
SlideShare a Scribd company logo
 
Anti Money Laundering, Data Collection and Reporting Information Technology Service External Systems Unit Global Programme against Money Laundering
Money Laundering/Terrorist Financing –  The World’s Response Establish a global environment hostile to money laundering  and terrorist financing Implement international standards including the  FATF 40+9 recommendations Establish Financial Intelligence Units around the world Establish protocols and platforms for sharing  intelligence and evidence  Secure technical assistance for countries  to implement international standards  Uniform and standard AML platform - desirable
Anti-Money Laundering Process Three essential components of an AML/CFT regime: A functional compliance culture Functional regulatory bodies –  central Bank, SEC, Insurance Regulator etc  An effective financial intelligence unit tasked with: The above processes ideally should be automated particularly if they involve high data volumes
From Start to Finish
Brief History – ITS 2005 – UNODC appointed project manager for EC project in Nigeria Significant component –  provision of IT solutions to EFCC including NFIU March 2006 UNODC ITS tasked with developing IT solutions April 2006 –  ITS commences developing database and analytical tools for NFIU June 2006 –  XML Schema introduced to Nigerian reporting institutions  October 2006 – CTR database and basic analytical  functions installed in NFIU and tested
Brief History – GPML  Frequent requests from developing FIUs for IT solutions Early involvement in Nigeria project including in advisory role  to IT component Potential for goAML beyond the Nigeria project recognized Simultaneous – work commences on widening the scope of the  system beyond Nigeria
Current – Future February 07   Data collection tools completed Analytical functionality available Drawing tools phase 1 nearing completion Rules engine under construction Profiling tool under construction July 07 STR system completed Profiling tool completed Intelligence file management completed Workflow system completed Drawing tools phase 1 completed
Current – Future September 2007   Phase 1 goCASE complete June 2008 Drawing tools completed Rule engine and editor completed Full user documentation in multiple languages    (English, French, Spanish, Russian) goAML (complete suite) VERSION 1.0  READY! July 2008   Phase 2 goCASE complete
Designed as a modular system to fit the needs of any FIU irrespective of size from a single computer with a few thousand processes - up to 500 million processes over 5 year period irrespective of file size  Processes and analyzes reports on: - Suspicious transactions - Financial transactions – of any type - List or alert based reports – CFT etc Fully electronic data collection and dissemination from any source such  tax, law enforcement records, immigration service (passenger movement records), property registrar, vehicle registrar etc…. goAML – global Operations  Anti-Money Laundering
 
goAML – global Operations  Anti-Money Laundering Anti-Money Laundering  Solution Building Blocks
goAML – Collecting and  Managing Information Reporting standard defined: XML based (world standard format) Samples available for FI IT Personnel Exhaustive documentation available Validation application: Checks for valid XML All required fields are present Data types are correct Ensures reporting entities report    in the correct format from day 1
goAML – Gathering and  Managing Information Secure website (SSL 512 bit encryption) for: Creating reporting entities - by the FIU Creating contacts Changing contact details - by the reporting entity Report upload Report data entry - manually if necessary Report verification - clean up by system
goAML – Gathering and  Managing Information Report History - what reported - accepted/rejected ref number View uploaded report - Individually Submission status - accepted/rejected Common content for any  reporting entity - flexible   - secure information from FIU   - compliance circulars   - alerts   - name lists
goAML – High Volume Analysis Support analytical and investigation teams with highly sophisticated reporting capabilities. Visualize large volumes of data to help understand the big picture. Monitor potentially suspicious accounts. Reveal patterns and hidden connections. Create analytical charts manually or automatically.
Workflow for STR analysis Tasks and the process diagram  are defined by the FIU users - can change to suit their own needs - full visual designer  Task assignment and tracking - within FIU - push or pull reports by e-mail  Integrated reporting - workflow reports  - assignments - progress - results  goAML – Collecting, Managing  and Analyzing Information
Integrated source tracking - tracks externally sourced information  - creates bring-ups, reminders etc   Automatic resource scheduling - automatically assigns tasks - monitors workloads - measures outputs/performance  Case feedback integration - Produces standardized feedback - reports as word documents goAML – Collecting, Managing  and Analyzing Information
Customizable data gathering templates - standardized format for receipt of information  from outside agencies that decides transmission medium (email/fax/post) Time in flight analysis - Time management measure goAML – Collecting, Managing  and Analyzing Information
Common user interface across analysis screens - screens look and feel the same - supports multiple languages  Workspace based (keep information through different reporting sessions) - two work spaces available at any one time - previous work automatically saved - supports text, tables, merged tables, pictures goAML – Analysis and  Targeting Solution
Analyst can retrieve, filter and  re-arrange the data accordingly to his/her needs. - Rearrange data fields - Change grouping - Filter data - Change data sorting - Save layout - Export goAML – Analysis and  Targeting Solution
Linking to other screens from current screen Allows easy comparison of different accounts, persons or entities Each window acts independent of others Copy fields or rows Makes analysis easy Very easy to learn All these components have restricted access goAML – Analysis and  Targeting Solution
goAML – Analysis Trails Link charts  association charts – transaction flow charts etc Money and person trails for inbound  and outbound transactions Trail for duplicated addresses,  phone numbers and other  identification data Displays:  - source and destination displayed as nodes - direction and amount  displayed as arrows
goAML – Analysis - Pivots Reports offer many different views of data under analysis Allows for dynamic user filtering and grouping of related data  Allows for searching for TOP targets - 5/10/50 etc Flexible data search capability Simple integration with Excel - excellent for net worth analysis - ease of attachment to intel reports - arrives live so can be manipulated by receiver
goAML – Analysis - Intersect Combines data from two different reports  - User chooses the two reports populated with data and t he columns to intersect Result is displayed in a completely  new window with the intersected data
goAML – Information Dissemination Suspicious activity detected Open a new case –  analysis output attached  goCASE picks this up Export case to MS-WinWord - Case file remains with FIU - Output in the form of Intel report - Sanitised to the level required by the user
goAML - User and role based functions Management:  Is able to check the submissions and the status of reporting entities.  - performance measure/compliance Analyst:  Responsible of conducting the analysis, finding suspicious activities and linking to similar-patterned cases where they exist  - analysis Administrator:  Allowed to add new user, give/revoke access to screens and different actions.  Access to certain actions is dependant on the user’s role!
goAML - Security Username and password  required to access applications. Access can be granted and revoked per: - User - Screen - Certain actions like copy, export etc. Access to screens and data is logged. Data partially encrypted in the database. - Encryption level and extent at the discretion of the user
goAML - Security Access to the system generally or to any part of it at the discretion  of the user – the user must “open the gate” UNODC does not hold private key – cannot decipher encrypted data Rule engine secure Database and system tools installed on the user’s premises,  UNODC has no independent access
goAML – System Requirements  •   Assumes average data load – 500,000 reports per month Assumes 15 users Assumes reasonable level of existing infrastructure including security - Mail servers - Local area network - DMZ with 2 firewalls - Anti-spam and anti-virus policy Provide fully redundant environment - 2 DB Servers - 2 Application servers - Storage area network (SAN) - Backup robot servers - Public key infrastructure certificates (PKI) - 15 high end personal computers (PCs)   Approx: $220,000
goAML – Estimated Costs  goAML software package is free of charge Installation – initial training  US$  80,000   (depending on location – 3 visits x 2 persons) Annual user license agreement US$  100,000 - This fee will decrease as more users take up the system - Provides support within working  hours in local time zones - Provides ongoing system development - Guarantees one on-site visit per year ____________ US$  180,000
Breakdown of Costs (Basic installation) Installation – US$80,000 Establishment of standard reporting scheme for reporting institutions Training of reporting institution compliance and IT staff; Customisation of report formats and forms Customisation of goAML interfaces to individual user requirements  Migration of existing data to goAML database Installation of goAML and completion of data migration  Implementation of reporting system Training of FIU management, analysts and IT personnel Follow up and troubleshooting Time frame 3 – 6 months depending on existing infrastructure and current operating environment.
Maintenance, support and development fee – US$100,000 per annum   Time zone specific, business hour support by e-mail, phone or fax – provided by regional support centers  Outside business hours support provided from other time zones where language permits Ongoing, needs based, customization and development. At least one site visit per annum timed to the requirements of the user Continuous minor upgrade and patch service Periodical major upgrades – new releases Regular regional user group meetings and online forums Access, where necessary, to the full resources of the ITS Service of UNODC  Breakdown of Costs (Basic installation)
Initial Deployment/Installation – US$600,000, maintenance and development fee – US$300,000 pa. (Assumes maximum 15 users) Includes all services of Basic Installation plus: Site assessment Skills assessment Design and supervise build of physical infrastructure Design and plan full system architecture  Purchase, delivery and installation of all server and storage equipment Purchase software licenses Breakdown of Costs (Standard installation)
Initial Deployment/Installation – US$3,200,000, maintenance and development fee – US$1,200,000 pa. (Assumes maximum 100 users) Includes all services of Standard Installation plus: Purchase, delivery and installation of all equipment (full IT infrastructure and telecommunications)  A support team on-site backed up by a development team offsite Purchase software licenses Management of maintenance contracts with suppliers Management of the buildup of the local IT unit with gradual hand over  Full hardware and software upgrades and replacements (3 year cycle) Project duration (3-5 years) Breakdown of Costs (Premium installation)
Impossible is not a fact,  only an opinion Thank you!

More Related Content

What's hot

Digital Banking Strategy Roadmap - 3.24.15
Digital Banking Strategy Roadmap - 3.24.15Digital Banking Strategy Roadmap - 3.24.15
Digital Banking Strategy Roadmap - 3.24.15
Calvin Turner
 
Fraud detection with Machine Learning
Fraud detection with Machine LearningFraud detection with Machine Learning
Fraud detection with Machine Learning
Scaleway
 
Credit Card Analytics on a Connected Data Platform
Credit Card Analytics on a Connected Data PlatformCredit Card Analytics on a Connected Data Platform
Credit Card Analytics on a Connected Data Platform
Hortonworks
 
Adaptive Machine Learning for Credit Card Fraud Detection
Adaptive Machine Learning for Credit Card Fraud DetectionAdaptive Machine Learning for Credit Card Fraud Detection
Adaptive Machine Learning for Credit Card Fraud Detection
Andrea Dal Pozzolo
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detection
kalpesh1908
 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
Eryk Budi Pratama
 
IBM Payments Gateway
IBM Payments GatewayIBM Payments Gateway
IBM Payments Gateway
Killian Delaney
 
Global Payment System- Reference Architecture
Global Payment System- Reference ArchitectureGlobal Payment System- Reference Architecture
Global Payment System- Reference Architecture
Ramadas MV
 
Digital Transformation in Retail Banking
Digital Transformation in Retail BankingDigital Transformation in Retail Banking
Digital Transformation in Retail Banking
Ferran Garcia Pagans
 
Business Email Compromise Scam
Business Email Compromise ScamBusiness Email Compromise Scam
Business Email Compromise Scam
Guardian Analytics
 
Fraud analytics
Fraud analyticsFraud analytics
Fraud analytics
Simran Mondal
 
Analysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detectionAnalysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detection
Justluk Luk
 
Information security – risk identification is all
Information security – risk identification is allInformation security – risk identification is all
Information security – risk identification is all
PECB
 
Banking Client Onboarding Process Powerpoint Presentation Slides
Banking Client Onboarding Process Powerpoint Presentation SlidesBanking Client Onboarding Process Powerpoint Presentation Slides
Banking Client Onboarding Process Powerpoint Presentation Slides
SlideTeam
 
System architecture for central banks
System architecture for central banksSystem architecture for central banks
System architecture for central banks
Jean-Marc Lepain
 
Credit card fraud detection using python machine learning
Credit card fraud detection using python machine learningCredit card fraud detection using python machine learning
Credit card fraud detection using python machine learning
Sandeep Garg
 
Cyber security analysis presentation
Cyber security analysis presentationCyber security analysis presentation
Cyber security analysis presentation
Vaibhav R
 
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Molly Alexander
 
Credit scorecard
Credit scorecardCredit scorecard
Credit scorecard
Tuhin AI Advisory
 
Big Data and Advanced Analytics
Big Data and Advanced AnalyticsBig Data and Advanced Analytics
Big Data and Advanced Analytics
McKinsey on Marketing & Sales
 

What's hot (20)

Digital Banking Strategy Roadmap - 3.24.15
Digital Banking Strategy Roadmap - 3.24.15Digital Banking Strategy Roadmap - 3.24.15
Digital Banking Strategy Roadmap - 3.24.15
 
Fraud detection with Machine Learning
Fraud detection with Machine LearningFraud detection with Machine Learning
Fraud detection with Machine Learning
 
Credit Card Analytics on a Connected Data Platform
Credit Card Analytics on a Connected Data PlatformCredit Card Analytics on a Connected Data Platform
Credit Card Analytics on a Connected Data Platform
 
Adaptive Machine Learning for Credit Card Fraud Detection
Adaptive Machine Learning for Credit Card Fraud DetectionAdaptive Machine Learning for Credit Card Fraud Detection
Adaptive Machine Learning for Credit Card Fraud Detection
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detection
 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
 
IBM Payments Gateway
IBM Payments GatewayIBM Payments Gateway
IBM Payments Gateway
 
Global Payment System- Reference Architecture
Global Payment System- Reference ArchitectureGlobal Payment System- Reference Architecture
Global Payment System- Reference Architecture
 
Digital Transformation in Retail Banking
Digital Transformation in Retail BankingDigital Transformation in Retail Banking
Digital Transformation in Retail Banking
 
Business Email Compromise Scam
Business Email Compromise ScamBusiness Email Compromise Scam
Business Email Compromise Scam
 
Fraud analytics
Fraud analyticsFraud analytics
Fraud analytics
 
Analysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detectionAnalysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detection
 
Information security – risk identification is all
Information security – risk identification is allInformation security – risk identification is all
Information security – risk identification is all
 
Banking Client Onboarding Process Powerpoint Presentation Slides
Banking Client Onboarding Process Powerpoint Presentation SlidesBanking Client Onboarding Process Powerpoint Presentation Slides
Banking Client Onboarding Process Powerpoint Presentation Slides
 
System architecture for central banks
System architecture for central banksSystem architecture for central banks
System architecture for central banks
 
Credit card fraud detection using python machine learning
Credit card fraud detection using python machine learningCredit card fraud detection using python machine learning
Credit card fraud detection using python machine learning
 
Cyber security analysis presentation
Cyber security analysis presentationCyber security analysis presentation
Cyber security analysis presentation
 
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
 
Credit scorecard
Credit scorecardCredit scorecard
Credit scorecard
 
Big Data and Advanced Analytics
Big Data and Advanced AnalyticsBig Data and Advanced Analytics
Big Data and Advanced Analytics
 

Viewers also liked

Money Laundering
Money  LaunderingMoney  Laundering
Money Laundering
Lesichka
 
anti money laundering certificate
anti money laundering certificateanti money laundering certificate
anti money laundering certificate
Sali Saba
 
Anti Money Laundering Typologies
Anti Money Laundering TypologiesAnti Money Laundering Typologies
Anti Money Laundering Typologies
William Byrnes
 
Indian Regulators & AML Actions
Indian Regulators & AML ActionsIndian Regulators & AML Actions
Indian Regulators & AML Actions
Abhishek Bali
 
Aml basics
Aml basicsAml basics
Aml basics
David F Amakobe
 
Anti Money Laundering - CDD & KYC
Anti Money Laundering - CDD & KYCAnti Money Laundering - CDD & KYC
Anti Money Laundering - CDD & KYC
Besart Qerimi
 
Money laundering
Money launderingMoney laundering
Money laundering
saadiakh
 
Anti money laundering
Anti money launderingAnti money laundering
Anti money laundering
Uttma Shukla
 

Viewers also liked (8)

Money Laundering
Money  LaunderingMoney  Laundering
Money Laundering
 
anti money laundering certificate
anti money laundering certificateanti money laundering certificate
anti money laundering certificate
 
Anti Money Laundering Typologies
Anti Money Laundering TypologiesAnti Money Laundering Typologies
Anti Money Laundering Typologies
 
Indian Regulators & AML Actions
Indian Regulators & AML ActionsIndian Regulators & AML Actions
Indian Regulators & AML Actions
 
Aml basics
Aml basicsAml basics
Aml basics
 
Anti Money Laundering - CDD & KYC
Anti Money Laundering - CDD & KYCAnti Money Laundering - CDD & KYC
Anti Money Laundering - CDD & KYC
 
Money laundering
Money launderingMoney laundering
Money laundering
 
Anti money laundering
Anti money launderingAnti money laundering
Anti money laundering
 

Similar to goAML

Modern Monitoring
Modern MonitoringModern Monitoring
Modern Monitoring
Ron Sengupta
 
Smartblitzmerker
SmartblitzmerkerSmartblitzmerker
Smartblitzmerker
Smart Blitzmerker
 
Old Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe ITOld Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe IT
Precisely
 
Know the features and functions of information systems
Know the features and functions of information systemsKnow the features and functions of information systems
Know the features and functions of information systems
Rajesh Khadka
 
Product description shell control box 4 lts
Product description shell control box 4 ltsProduct description shell control box 4 lts
Product description shell control box 4 lts
mchatoramhuru
 
IIOT on Variable Frequency Drives
IIOT on Variable Frequency DrivesIIOT on Variable Frequency Drives
IIOT on Variable Frequency Drives
muthamizh adhithan
 
SplunkLive! Milano 2016 - customer presentation - Unicredit
SplunkLive! Milano 2016 -  customer presentation - UnicreditSplunkLive! Milano 2016 -  customer presentation - Unicredit
SplunkLive! Milano 2016 - customer presentation - Unicredit
Splunk
 
SplunkLive! Munich 2018: Data Onboarding Overview
SplunkLive! Munich 2018: Data Onboarding OverviewSplunkLive! Munich 2018: Data Onboarding Overview
SplunkLive! Munich 2018: Data Onboarding Overview
Splunk
 
What if a hacker has already broken in when your IT auditor is at the door? H...
What if a hacker has already broken in when your IT auditor is at the door? H...What if a hacker has already broken in when your IT auditor is at the door? H...
What if a hacker has already broken in when your IT auditor is at the door? H...
akquinet enterprise solutions GmbH
 
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlowAuditor
 
PlantConnect insights
PlantConnect insightsPlantConnect insights
PlantConnect insights
Akshay Tilak
 
Azeti Company And Products Presentation
Azeti Company And Products PresentationAzeti Company And Products Presentation
Azeti Company And Products Presentation
arvardan
 
Lomiss English V 2
Lomiss English V 2Lomiss English V 2
Lomiss English V 2
Assaf Landau
 
Wc4
Wc4Wc4
IoTconnect Data Sheet Final Version
IoTconnect Data Sheet Final VersionIoTconnect Data Sheet Final Version
IoTconnect Data Sheet Final Version
Daniel Sapir
 
SplunkLive! Frankfurt 2018 - Data Onboarding Overview
SplunkLive! Frankfurt 2018 - Data Onboarding OverviewSplunkLive! Frankfurt 2018 - Data Onboarding Overview
SplunkLive! Frankfurt 2018 - Data Onboarding Overview
Splunk
 
PlantConnect Presentation
PlantConnect PresentationPlantConnect Presentation
PlantConnect Presentation
Akshay Tilak
 
Opis softera i ModulaENVlada
Opis softera i ModulaENVladaOpis softera i ModulaENVlada
Opis softera i ModulaENVlada
Zoran Perisic
 
The Big Data Analytics Ecosystem at LinkedIn
The Big Data Analytics Ecosystem at LinkedInThe Big Data Analytics Ecosystem at LinkedIn
The Big Data Analytics Ecosystem at LinkedIn
rajappaiyer
 
Agata overview
Agata overviewAgata overview
Agata overview
Udi Levin
 

Similar to goAML (20)

Modern Monitoring
Modern MonitoringModern Monitoring
Modern Monitoring
 
Smartblitzmerker
SmartblitzmerkerSmartblitzmerker
Smartblitzmerker
 
Old Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe ITOld Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe IT
 
Know the features and functions of information systems
Know the features and functions of information systemsKnow the features and functions of information systems
Know the features and functions of information systems
 
Product description shell control box 4 lts
Product description shell control box 4 ltsProduct description shell control box 4 lts
Product description shell control box 4 lts
 
IIOT on Variable Frequency Drives
IIOT on Variable Frequency DrivesIIOT on Variable Frequency Drives
IIOT on Variable Frequency Drives
 
SplunkLive! Milano 2016 - customer presentation - Unicredit
SplunkLive! Milano 2016 -  customer presentation - UnicreditSplunkLive! Milano 2016 -  customer presentation - Unicredit
SplunkLive! Milano 2016 - customer presentation - Unicredit
 
SplunkLive! Munich 2018: Data Onboarding Overview
SplunkLive! Munich 2018: Data Onboarding OverviewSplunkLive! Munich 2018: Data Onboarding Overview
SplunkLive! Munich 2018: Data Onboarding Overview
 
What if a hacker has already broken in when your IT auditor is at the door? H...
What if a hacker has already broken in when your IT auditor is at the door? H...What if a hacker has already broken in when your IT auditor is at the door? H...
What if a hacker has already broken in when your IT auditor is at the door? H...
 
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
 
PlantConnect insights
PlantConnect insightsPlantConnect insights
PlantConnect insights
 
Azeti Company And Products Presentation
Azeti Company And Products PresentationAzeti Company And Products Presentation
Azeti Company And Products Presentation
 
Lomiss English V 2
Lomiss English V 2Lomiss English V 2
Lomiss English V 2
 
Wc4
Wc4Wc4
Wc4
 
IoTconnect Data Sheet Final Version
IoTconnect Data Sheet Final VersionIoTconnect Data Sheet Final Version
IoTconnect Data Sheet Final Version
 
SplunkLive! Frankfurt 2018 - Data Onboarding Overview
SplunkLive! Frankfurt 2018 - Data Onboarding OverviewSplunkLive! Frankfurt 2018 - Data Onboarding Overview
SplunkLive! Frankfurt 2018 - Data Onboarding Overview
 
PlantConnect Presentation
PlantConnect PresentationPlantConnect Presentation
PlantConnect Presentation
 
Opis softera i ModulaENVlada
Opis softera i ModulaENVladaOpis softera i ModulaENVlada
Opis softera i ModulaENVlada
 
The Big Data Analytics Ecosystem at LinkedIn
The Big Data Analytics Ecosystem at LinkedInThe Big Data Analytics Ecosystem at LinkedIn
The Big Data Analytics Ecosystem at LinkedIn
 
Agata overview
Agata overviewAgata overview
Agata overview
 

Recently uploaded

( Call ) Girls Churchgate phone 9930687706 You Are Serach A Beautyfull Dolle ...
( Call ) Girls Churchgate phone 9930687706 You Are Serach A Beautyfull Dolle ...( Call ) Girls Churchgate phone 9930687706 You Are Serach A Beautyfull Dolle ...
( Call ) Girls Churchgate phone 9930687706 You Are Serach A Beautyfull Dolle ...
shrivithakur
 
Abortion pills in Muscat(+918133066128) Cytotec pills buy Oman
Abortion pills in Muscat(+918133066128) Cytotec pills buy OmanAbortion pills in Muscat(+918133066128) Cytotec pills buy Oman
Abortion pills in Muscat(+918133066128) Cytotec pills buy Oman
maishakhanam230
 
( Call  ) Girls Greater Kailash Just 9711199012 High Profile Model Yogita Verma
( Call  ) Girls Greater Kailash Just 9711199012 High Profile Model Yogita Verma( Call  ) Girls Greater Kailash Just 9711199012 High Profile Model Yogita Verma
( Call  ) Girls Greater Kailash Just 9711199012 High Profile Model Yogita Verma
arti singh$A17
 
Chennai @Call @Girls Service 🛴 XXXXXXXXXX 🛴 Affordable And Cheapest Beautifu...
Chennai @Call  @Girls Service 🛴 XXXXXXXXXX 🛴 Affordable And Cheapest Beautifu...Chennai @Call  @Girls Service 🛴 XXXXXXXXXX 🛴 Affordable And Cheapest Beautifu...
Chennai @Call @Girls Service 🛴 XXXXXXXXXX 🛴 Affordable And Cheapest Beautifu...
chaddadiyans
 
What is an E-commerce- digital marketingpdf
What is an E-commerce- digital marketingpdfWhat is an E-commerce- digital marketingpdf
What is an E-commerce- digital marketingpdf
Purna Rai
 
GUIA_LEGAL_CHAPTER_2_FOREIGN EXCHANGE.pdf
GUIA_LEGAL_CHAPTER_2_FOREIGN EXCHANGE.pdfGUIA_LEGAL_CHAPTER_2_FOREIGN EXCHANGE.pdf
GUIA_LEGAL_CHAPTER_2_FOREIGN EXCHANGE.pdf
ProexportColombia1
 
GUIA_LEGAL_CHAPTER-7_COLOMBIAN TAX REGIME.pdf
GUIA_LEGAL_CHAPTER-7_COLOMBIAN TAX REGIME.pdfGUIA_LEGAL_CHAPTER-7_COLOMBIAN TAX REGIME.pdf
GUIA_LEGAL_CHAPTER-7_COLOMBIAN TAX REGIME.pdf
ProexportColombia1
 
Public Expenditure & its Classifications, Canons, Causes, Effects & Theories....
Public Expenditure & its Classifications, Canons, Causes, Effects & Theories....Public Expenditure & its Classifications, Canons, Causes, Effects & Theories....
Public Expenditure & its Classifications, Canons, Causes, Effects & Theories....
Dr T AASIF AHMED
 
20230828161124_PPT3-Asset Misappropriation Cases AND Analyses.pptx
20230828161124_PPT3-Asset Misappropriation Cases AND Analyses.pptx20230828161124_PPT3-Asset Misappropriation Cases AND Analyses.pptx
20230828161124_PPT3-Asset Misappropriation Cases AND Analyses.pptx
toriqnauval16
 
@Call @Girls in Chennai 💃 0XXXXX0000 🧁️ Hii i am Nidhi Gupta am Avil For you
@Call @Girls in Chennai 💃 0XXXXX0000 🧁️ Hii i am Nidhi Gupta am Avil For you@Call @Girls in Chennai 💃 0XXXXX0000 🧁️ Hii i am Nidhi Gupta am Avil For you
@Call @Girls in Chennai 💃 0XXXXX0000 🧁️ Hii i am Nidhi Gupta am Avil For you
#S10 NeelamKaur
 
Typical Scams to Stay Away from When Buying Verified Binance Accounts
Typical Scams to Stay Away from When Buying Verified Binance AccountsTypical Scams to Stay Away from When Buying Verified Binance Accounts
Typical Scams to Stay Away from When Buying Verified Binance Accounts
Any kyc Account
 
Introduction to Islamic Banking and Finance.Part2
Introduction to Islamic Banking and Finance.Part2Introduction to Islamic Banking and Finance.Part2
Introduction to Islamic Banking and Finance.Part2
NasrudinMohamedAhmed
 
@Call @Girls Khujauli Lucknow phone 8630512678 You Are Serach A Beautyfull Do...
@Call @Girls Khujauli Lucknow phone 8630512678 You Are Serach A Beautyfull Do...@Call @Girls Khujauli Lucknow phone 8630512678 You Are Serach A Beautyfull Do...
@Call @Girls Khujauli Lucknow phone 8630512678 You Are Serach A Beautyfull Do...
vishalbowli92
 
Unlocking Your Dream Home Understanding Government Subsidies for House and Ho...
Unlocking Your Dream Home Understanding Government Subsidies for House and Ho...Unlocking Your Dream Home Understanding Government Subsidies for House and Ho...
Unlocking Your Dream Home Understanding Government Subsidies for House and Ho...
Kathiriyasubsidyhouse
 
3.1.6. Annual Investment Plan Template(for Barangay).pdf
3.1.6. Annual Investment Plan Template(for Barangay).pdf3.1.6. Annual Investment Plan Template(for Barangay).pdf
3.1.6. Annual Investment Plan Template(for Barangay).pdf
JazzeraMustapha
 
Vasant Kunj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
Vasant Kunj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model SafeVasant Kunj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
Vasant Kunj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
binna singh$A17
 
一比一原版德蒙福特大学毕业证(dmu毕业证)如何办理
一比一原版德蒙福特大学毕业证(dmu毕业证)如何办理一比一原版德蒙福特大学毕业证(dmu毕业证)如何办理
一比一原版德蒙福特大学毕业证(dmu毕业证)如何办理
mauuwuv
 
Building Trust Through Transparency Kissht's Commitment during Regulatory Cr...
Building Trust Through Transparency  Kissht's Commitment during Regulatory Cr...Building Trust Through Transparency  Kissht's Commitment during Regulatory Cr...
Building Trust Through Transparency Kissht's Commitment during Regulatory Cr...
Kissht Reviews
 
TriStar Gold- 07-02-2024 presentation PDF
TriStar Gold- 07-02-2024 presentation PDFTriStar Gold- 07-02-2024 presentation PDF
TriStar Gold- 07-02-2024 presentation PDF
Adnet Communications
 
Consumer s equilibrium class 11 economics ppt.pdf
Consumer s equilibrium class 11 economics ppt.pdfConsumer s equilibrium class 11 economics ppt.pdf
Consumer s equilibrium class 11 economics ppt.pdf
MeenaNagpal
 

Recently uploaded (20)

( Call ) Girls Churchgate phone 9930687706 You Are Serach A Beautyfull Dolle ...
( Call ) Girls Churchgate phone 9930687706 You Are Serach A Beautyfull Dolle ...( Call ) Girls Churchgate phone 9930687706 You Are Serach A Beautyfull Dolle ...
( Call ) Girls Churchgate phone 9930687706 You Are Serach A Beautyfull Dolle ...
 
Abortion pills in Muscat(+918133066128) Cytotec pills buy Oman
Abortion pills in Muscat(+918133066128) Cytotec pills buy OmanAbortion pills in Muscat(+918133066128) Cytotec pills buy Oman
Abortion pills in Muscat(+918133066128) Cytotec pills buy Oman
 
( Call  ) Girls Greater Kailash Just 9711199012 High Profile Model Yogita Verma
( Call  ) Girls Greater Kailash Just 9711199012 High Profile Model Yogita Verma( Call  ) Girls Greater Kailash Just 9711199012 High Profile Model Yogita Verma
( Call  ) Girls Greater Kailash Just 9711199012 High Profile Model Yogita Verma
 
Chennai @Call @Girls Service 🛴 XXXXXXXXXX 🛴 Affordable And Cheapest Beautifu...
Chennai @Call  @Girls Service 🛴 XXXXXXXXXX 🛴 Affordable And Cheapest Beautifu...Chennai @Call  @Girls Service 🛴 XXXXXXXXXX 🛴 Affordable And Cheapest Beautifu...
Chennai @Call @Girls Service 🛴 XXXXXXXXXX 🛴 Affordable And Cheapest Beautifu...
 
What is an E-commerce- digital marketingpdf
What is an E-commerce- digital marketingpdfWhat is an E-commerce- digital marketingpdf
What is an E-commerce- digital marketingpdf
 
GUIA_LEGAL_CHAPTER_2_FOREIGN EXCHANGE.pdf
GUIA_LEGAL_CHAPTER_2_FOREIGN EXCHANGE.pdfGUIA_LEGAL_CHAPTER_2_FOREIGN EXCHANGE.pdf
GUIA_LEGAL_CHAPTER_2_FOREIGN EXCHANGE.pdf
 
GUIA_LEGAL_CHAPTER-7_COLOMBIAN TAX REGIME.pdf
GUIA_LEGAL_CHAPTER-7_COLOMBIAN TAX REGIME.pdfGUIA_LEGAL_CHAPTER-7_COLOMBIAN TAX REGIME.pdf
GUIA_LEGAL_CHAPTER-7_COLOMBIAN TAX REGIME.pdf
 
Public Expenditure & its Classifications, Canons, Causes, Effects & Theories....
Public Expenditure & its Classifications, Canons, Causes, Effects & Theories....Public Expenditure & its Classifications, Canons, Causes, Effects & Theories....
Public Expenditure & its Classifications, Canons, Causes, Effects & Theories....
 
20230828161124_PPT3-Asset Misappropriation Cases AND Analyses.pptx
20230828161124_PPT3-Asset Misappropriation Cases AND Analyses.pptx20230828161124_PPT3-Asset Misappropriation Cases AND Analyses.pptx
20230828161124_PPT3-Asset Misappropriation Cases AND Analyses.pptx
 
@Call @Girls in Chennai 💃 0XXXXX0000 🧁️ Hii i am Nidhi Gupta am Avil For you
@Call @Girls in Chennai 💃 0XXXXX0000 🧁️ Hii i am Nidhi Gupta am Avil For you@Call @Girls in Chennai 💃 0XXXXX0000 🧁️ Hii i am Nidhi Gupta am Avil For you
@Call @Girls in Chennai 💃 0XXXXX0000 🧁️ Hii i am Nidhi Gupta am Avil For you
 
Typical Scams to Stay Away from When Buying Verified Binance Accounts
Typical Scams to Stay Away from When Buying Verified Binance AccountsTypical Scams to Stay Away from When Buying Verified Binance Accounts
Typical Scams to Stay Away from When Buying Verified Binance Accounts
 
Introduction to Islamic Banking and Finance.Part2
Introduction to Islamic Banking and Finance.Part2Introduction to Islamic Banking and Finance.Part2
Introduction to Islamic Banking and Finance.Part2
 
@Call @Girls Khujauli Lucknow phone 8630512678 You Are Serach A Beautyfull Do...
@Call @Girls Khujauli Lucknow phone 8630512678 You Are Serach A Beautyfull Do...@Call @Girls Khujauli Lucknow phone 8630512678 You Are Serach A Beautyfull Do...
@Call @Girls Khujauli Lucknow phone 8630512678 You Are Serach A Beautyfull Do...
 
Unlocking Your Dream Home Understanding Government Subsidies for House and Ho...
Unlocking Your Dream Home Understanding Government Subsidies for House and Ho...Unlocking Your Dream Home Understanding Government Subsidies for House and Ho...
Unlocking Your Dream Home Understanding Government Subsidies for House and Ho...
 
3.1.6. Annual Investment Plan Template(for Barangay).pdf
3.1.6. Annual Investment Plan Template(for Barangay).pdf3.1.6. Annual Investment Plan Template(for Barangay).pdf
3.1.6. Annual Investment Plan Template(for Barangay).pdf
 
Vasant Kunj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
Vasant Kunj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model SafeVasant Kunj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
Vasant Kunj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
 
一比一原版德蒙福特大学毕业证(dmu毕业证)如何办理
一比一原版德蒙福特大学毕业证(dmu毕业证)如何办理一比一原版德蒙福特大学毕业证(dmu毕业证)如何办理
一比一原版德蒙福特大学毕业证(dmu毕业证)如何办理
 
Building Trust Through Transparency Kissht's Commitment during Regulatory Cr...
Building Trust Through Transparency  Kissht's Commitment during Regulatory Cr...Building Trust Through Transparency  Kissht's Commitment during Regulatory Cr...
Building Trust Through Transparency Kissht's Commitment during Regulatory Cr...
 
TriStar Gold- 07-02-2024 presentation PDF
TriStar Gold- 07-02-2024 presentation PDFTriStar Gold- 07-02-2024 presentation PDF
TriStar Gold- 07-02-2024 presentation PDF
 
Consumer s equilibrium class 11 economics ppt.pdf
Consumer s equilibrium class 11 economics ppt.pdfConsumer s equilibrium class 11 economics ppt.pdf
Consumer s equilibrium class 11 economics ppt.pdf
 

goAML

  • 1.  
  • 2. Anti Money Laundering, Data Collection and Reporting Information Technology Service External Systems Unit Global Programme against Money Laundering
  • 3. Money Laundering/Terrorist Financing – The World’s Response Establish a global environment hostile to money laundering and terrorist financing Implement international standards including the FATF 40+9 recommendations Establish Financial Intelligence Units around the world Establish protocols and platforms for sharing intelligence and evidence Secure technical assistance for countries to implement international standards Uniform and standard AML platform - desirable
  • 4. Anti-Money Laundering Process Three essential components of an AML/CFT regime: A functional compliance culture Functional regulatory bodies – central Bank, SEC, Insurance Regulator etc An effective financial intelligence unit tasked with: The above processes ideally should be automated particularly if they involve high data volumes
  • 5. From Start to Finish
  • 6. Brief History – ITS 2005 – UNODC appointed project manager for EC project in Nigeria Significant component – provision of IT solutions to EFCC including NFIU March 2006 UNODC ITS tasked with developing IT solutions April 2006 – ITS commences developing database and analytical tools for NFIU June 2006 – XML Schema introduced to Nigerian reporting institutions October 2006 – CTR database and basic analytical functions installed in NFIU and tested
  • 7. Brief History – GPML Frequent requests from developing FIUs for IT solutions Early involvement in Nigeria project including in advisory role to IT component Potential for goAML beyond the Nigeria project recognized Simultaneous – work commences on widening the scope of the system beyond Nigeria
  • 8. Current – Future February 07 Data collection tools completed Analytical functionality available Drawing tools phase 1 nearing completion Rules engine under construction Profiling tool under construction July 07 STR system completed Profiling tool completed Intelligence file management completed Workflow system completed Drawing tools phase 1 completed
  • 9. Current – Future September 2007 Phase 1 goCASE complete June 2008 Drawing tools completed Rule engine and editor completed Full user documentation in multiple languages (English, French, Spanish, Russian) goAML (complete suite) VERSION 1.0 READY! July 2008 Phase 2 goCASE complete
  • 10. Designed as a modular system to fit the needs of any FIU irrespective of size from a single computer with a few thousand processes - up to 500 million processes over 5 year period irrespective of file size Processes and analyzes reports on: - Suspicious transactions - Financial transactions – of any type - List or alert based reports – CFT etc Fully electronic data collection and dissemination from any source such tax, law enforcement records, immigration service (passenger movement records), property registrar, vehicle registrar etc…. goAML – global Operations Anti-Money Laundering
  • 11.  
  • 12. goAML – global Operations Anti-Money Laundering Anti-Money Laundering Solution Building Blocks
  • 13. goAML – Collecting and Managing Information Reporting standard defined: XML based (world standard format) Samples available for FI IT Personnel Exhaustive documentation available Validation application: Checks for valid XML All required fields are present Data types are correct Ensures reporting entities report in the correct format from day 1
  • 14. goAML – Gathering and Managing Information Secure website (SSL 512 bit encryption) for: Creating reporting entities - by the FIU Creating contacts Changing contact details - by the reporting entity Report upload Report data entry - manually if necessary Report verification - clean up by system
  • 15. goAML – Gathering and Managing Information Report History - what reported - accepted/rejected ref number View uploaded report - Individually Submission status - accepted/rejected Common content for any reporting entity - flexible - secure information from FIU - compliance circulars - alerts - name lists
  • 16. goAML – High Volume Analysis Support analytical and investigation teams with highly sophisticated reporting capabilities. Visualize large volumes of data to help understand the big picture. Monitor potentially suspicious accounts. Reveal patterns and hidden connections. Create analytical charts manually or automatically.
  • 17. Workflow for STR analysis Tasks and the process diagram are defined by the FIU users - can change to suit their own needs - full visual designer Task assignment and tracking - within FIU - push or pull reports by e-mail Integrated reporting - workflow reports - assignments - progress - results goAML – Collecting, Managing and Analyzing Information
  • 18. Integrated source tracking - tracks externally sourced information - creates bring-ups, reminders etc Automatic resource scheduling - automatically assigns tasks - monitors workloads - measures outputs/performance Case feedback integration - Produces standardized feedback - reports as word documents goAML – Collecting, Managing and Analyzing Information
  • 19. Customizable data gathering templates - standardized format for receipt of information from outside agencies that decides transmission medium (email/fax/post) Time in flight analysis - Time management measure goAML – Collecting, Managing and Analyzing Information
  • 20. Common user interface across analysis screens - screens look and feel the same - supports multiple languages Workspace based (keep information through different reporting sessions) - two work spaces available at any one time - previous work automatically saved - supports text, tables, merged tables, pictures goAML – Analysis and Targeting Solution
  • 21. Analyst can retrieve, filter and re-arrange the data accordingly to his/her needs. - Rearrange data fields - Change grouping - Filter data - Change data sorting - Save layout - Export goAML – Analysis and Targeting Solution
  • 22. Linking to other screens from current screen Allows easy comparison of different accounts, persons or entities Each window acts independent of others Copy fields or rows Makes analysis easy Very easy to learn All these components have restricted access goAML – Analysis and Targeting Solution
  • 23. goAML – Analysis Trails Link charts association charts – transaction flow charts etc Money and person trails for inbound and outbound transactions Trail for duplicated addresses, phone numbers and other identification data Displays: - source and destination displayed as nodes - direction and amount displayed as arrows
  • 24. goAML – Analysis - Pivots Reports offer many different views of data under analysis Allows for dynamic user filtering and grouping of related data Allows for searching for TOP targets - 5/10/50 etc Flexible data search capability Simple integration with Excel - excellent for net worth analysis - ease of attachment to intel reports - arrives live so can be manipulated by receiver
  • 25. goAML – Analysis - Intersect Combines data from two different reports - User chooses the two reports populated with data and t he columns to intersect Result is displayed in a completely new window with the intersected data
  • 26. goAML – Information Dissemination Suspicious activity detected Open a new case – analysis output attached goCASE picks this up Export case to MS-WinWord - Case file remains with FIU - Output in the form of Intel report - Sanitised to the level required by the user
  • 27. goAML - User and role based functions Management: Is able to check the submissions and the status of reporting entities. - performance measure/compliance Analyst: Responsible of conducting the analysis, finding suspicious activities and linking to similar-patterned cases where they exist - analysis Administrator: Allowed to add new user, give/revoke access to screens and different actions. Access to certain actions is dependant on the user’s role!
  • 28. goAML - Security Username and password required to access applications. Access can be granted and revoked per: - User - Screen - Certain actions like copy, export etc. Access to screens and data is logged. Data partially encrypted in the database. - Encryption level and extent at the discretion of the user
  • 29. goAML - Security Access to the system generally or to any part of it at the discretion of the user – the user must “open the gate” UNODC does not hold private key – cannot decipher encrypted data Rule engine secure Database and system tools installed on the user’s premises, UNODC has no independent access
  • 30. goAML – System Requirements • Assumes average data load – 500,000 reports per month Assumes 15 users Assumes reasonable level of existing infrastructure including security - Mail servers - Local area network - DMZ with 2 firewalls - Anti-spam and anti-virus policy Provide fully redundant environment - 2 DB Servers - 2 Application servers - Storage area network (SAN) - Backup robot servers - Public key infrastructure certificates (PKI) - 15 high end personal computers (PCs) Approx: $220,000
  • 31. goAML – Estimated Costs goAML software package is free of charge Installation – initial training US$ 80,000 (depending on location – 3 visits x 2 persons) Annual user license agreement US$ 100,000 - This fee will decrease as more users take up the system - Provides support within working hours in local time zones - Provides ongoing system development - Guarantees one on-site visit per year ____________ US$ 180,000
  • 32. Breakdown of Costs (Basic installation) Installation – US$80,000 Establishment of standard reporting scheme for reporting institutions Training of reporting institution compliance and IT staff; Customisation of report formats and forms Customisation of goAML interfaces to individual user requirements Migration of existing data to goAML database Installation of goAML and completion of data migration Implementation of reporting system Training of FIU management, analysts and IT personnel Follow up and troubleshooting Time frame 3 – 6 months depending on existing infrastructure and current operating environment.
  • 33. Maintenance, support and development fee – US$100,000 per annum Time zone specific, business hour support by e-mail, phone or fax – provided by regional support centers Outside business hours support provided from other time zones where language permits Ongoing, needs based, customization and development. At least one site visit per annum timed to the requirements of the user Continuous minor upgrade and patch service Periodical major upgrades – new releases Regular regional user group meetings and online forums Access, where necessary, to the full resources of the ITS Service of UNODC Breakdown of Costs (Basic installation)
  • 34. Initial Deployment/Installation – US$600,000, maintenance and development fee – US$300,000 pa. (Assumes maximum 15 users) Includes all services of Basic Installation plus: Site assessment Skills assessment Design and supervise build of physical infrastructure Design and plan full system architecture Purchase, delivery and installation of all server and storage equipment Purchase software licenses Breakdown of Costs (Standard installation)
  • 35. Initial Deployment/Installation – US$3,200,000, maintenance and development fee – US$1,200,000 pa. (Assumes maximum 100 users) Includes all services of Standard Installation plus: Purchase, delivery and installation of all equipment (full IT infrastructure and telecommunications) A support team on-site backed up by a development team offsite Purchase software licenses Management of maintenance contracts with suppliers Management of the buildup of the local IT unit with gradual hand over Full hardware and software upgrades and replacements (3 year cycle) Project duration (3-5 years) Breakdown of Costs (Premium installation)
  • 36. Impossible is not a fact, only an opinion Thank you!