JULY 2013
IBM
23
Current Systems Will not Suffice So why are many banks falling behind the curve? Basically, traditional AML transaction monitoring systems generate alerts based on patterns and rules which can quickly become outdated, as criminals find new and sophisticated ways to evade the system. In addition, many of these systems generate high numbers of False Positive alerts that will tie up analysts’ time working on alerts that are not likely to generate Suspicious Activity Reports (SARs)
This means that the investigation teams are under a lot of pressure to maintain high levels of diligence and consistency as they sift through False Positives to apply objective – and subjective – judgement to the alerts. Several major banks employ over 2000 resources to analyse such alerts. The imperative of ensuring consistency of decisioning and governance is, therefore, paramount.
As organisations have grown and merged over time, internal fractures have occurred which has led to a duplication of data and technology used to tackle financial crime. It is the financial crime analysts who therefore struggle with huge amounts of information and, as a result, crimes slip through the cracks and go undetected. Such fragmented approaches to AML challenge the integrity of an organisation, but history shows that unless these risks turn into a crisis very little will be done to renew the systems and processes currently in place.
Making the Haystack Smaller & the needle Bigger AML transaction-monitoring systems may be able to provide some useful information into the nature of financial crimes, but only if the system can make connections and recognise patterns in the data. This makes the analysis and interpretation of data key to preventing future crimes. IBM’s recent experience with a major banking institution has driven the development of a robust, flexible solution that combines predictive analytics, case management, advanced visual analysis and investigation with the mining of unstructured text and data to reduce False Positive alerts and resolve entities across multiple business units and geographies. IBM i2 Anti-Money Laundering Solution is
different in that it complements existing Transaction Monitoring functionality as it unlocks the intelligence in AML data, allowing users to simultaneously capture and import massive amounts of data from multiple sources into a central analysis repository This provides an extra layer of enriched intelligence to the AML process, thereby empowering analysts to uncover patterns and trends that would otherwise go undetected. This means the needle in the haystack is now bigger and easier to detect. The IBM solution allows analysts to gather data from disparate, unstructured sources (social media, biometrics and criminal databases) and visualise the connections making it easier to present their findings and report in a common language to law enforcement agencies.
Moreover, IBM’s AML solution is helping make the haystack smaller. Almost 40% of the output from traditional monitoring systems can be assigned a ‘Low Priority’ status, allowing analysts to concentrate on a lower number of False Positives which allows companies to enjoy increased efficiencies and cost savings.
Additionally, used to complement an incumbent sanctions screening process, IBM i2 systems can be deployed to reduce False Positives on legitimate transactions as part of the sanction screening process. Organisations can therefore move closer to restoring both regulator and client faith in the sector.
Preventing Crime By using IBM i2 technology together with the Predictive Analytics functionality integrated in IBM’s AML solution, companies can make the critical step from the detection of financial crimes towards prevention. The enriched data provided, in addition to traditional analysis, can be fed back by means of a learning loop to enhance algorithms and rules on which the transaction monitoring systems are based. Therefore, the overall system can be maintained at a more pro-active state and is able to detect newer attempts to perpetrate financial crimes. More importantly, erecting stronger barriers to financial crimes deters criminals and ensures that they seek paths of less resistance
However, technology is not the ultimate panacea. It requires human intelligence to be part of the detection and analysis systems and take the critical decision of which transactions should be investigated. This confirms the value of the analysts’ role and the ability to share findings with regulators and law enforcement agencies.
As the financial services sector comes under increasing scrutiny, banks need to demonstrate that full measures have been put in place to prevent financial crimes. With IBM i2’s investigative capabilities, banks can demonstrate that they are moving beyond traditional tools and are using the same rigour and diligence that is applied by law enforcement agencies. All 43 police forces in the UK use IBM i2 technology in some capacity for crime detection.
the Path of Right Compliance With today’s market volatility and increased pressure from regulators to detect and prevent financial crime, organisations can easily find themselves guilty of doing the bare minimum to comply. It would therefore be prudent to consider a longer term view, and whether an integrated and more holistic approach to data analytics would improve the quality of financial crime intelligence, whilst reducing costs. The synergies, when doing so, can create significant opportunities for operational improvement with the consequent reduction in AML risk. LM
About the Author Richard Collard joined IBM as part of the 2009 acquisition of enterprise software company, ILOG. Richard draws on a business-based career with major global fraud analytics
organizations and specializes in the provision of fraud detection solutions and consulting for credit/debit card issuers and for Anti-Money Laundering.
www.lawyer-monthly.com
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52 |
Page 53 |
Page 54 |
Page 55 |
Page 56 |
Page 57 |
Page 58 |
Page 59 |
Page 60 |
Page 61 |
Page 62 |
Page 63 |
Page 64 |
Page 65 |
Page 66 |
Page 67 |
Page 68 |
Page 69 |
Page 70 |
Page 71 |
Page 72 |
Page 73 |
Page 74 |
Page 75 |
Page 76 |
Page 77 |
Page 78 |
Page 79 |
Page 80 |
Page 81 |
Page 82 |
Page 83 |
Page 84 |
Page 85 |
Page 86 |
Page 87 |
Page 88 |
Page 89 |
Page 90 |
Page 91 |
Page 92 |
Page 93 |
Page 94 |
Page 95 |
Page 96 |
Page 97 |
Page 98 |
Page 99 |
Page 100 |
Page 101 |
Page 102 |
Page 103 |
Page 104 |
Page 105 |
Page 106 |
Page 107 |
Page 108 |
Page 109 |
Page 110 |
Page 111 |
Page 112 |
Page 113 |
Page 114 |
Page 115 |
Page 116 |
Page 117 |
Page 118 |
Page 119 |
Page 120 |
Page 121 |
Page 122 |
Page 123 |
Page 124 |
Page 125 |
Page 126 |
Page 127 |
Page 128 |
Page 129 |
Page 130 |
Page 131 |
Page 132