Data Mining in the Investigation of Money Laundering and Terrorist Financing

Data Mining ◽  
2013 ◽  
pp. 2193-2207
Author(s):  
Ibrahim George ◽  
Manolya Kavakli

In this chapter, the authors explore the operational data related to transactions in a financial organisation to find out the suitable techniques to assess the origin and purpose of these transactions and to detect if they are relevant to money laundering. The authors’ purpose is to provide an AML/CTF compliance report that provides AUSTRAC with information about reporting entities’ compliance with the Anti-Money Laundering and Counter-Terrorism Financing Act 2006. Their aim is to look into the Money Laundering activities and try to identify the most critical classifiers that can be used in building a decision tree. The tree has been tested using a sample of the data and passing it through the relevant paths/scenarios on the tree. The success rate is 92%, however, the tree needs to be enhanced so that it can be used solely to identify the suspicious transactions. The authors propose that a decision tree using the classifiers identified in this chapter can be incorporated into financial applications to enable organizations to identify the High Risk transactions and monitor or report them accordingly.

Author(s):  
Ibrahim George ◽  
Manolya Kavakli

In this chapter, the authors explore the operational data related to transactions in a financial organisation to find out the suitable techniques to assess the origin and purpose of these transactions and to detect if they are relevant to money laundering. The authors‘ purpose is to provide an AML/CTF compliance report that provides AUSTRAC with information about reporting entities‘ compliance with the Anti-Money Laundering and Counter-Terrorism Financing Act 2006. Their aim is to look into the Money Laundering activities and try to identify the most critical classifiers that can be used in building a decision tree. The tree has been tested using a sample of the data and passing it through the relevant paths/scenarios on the tree. The success rate is 92%, however, the tree needs to be enhanced so that it can be used solely to identify the suspicious transactions. The authors propose that a decision tree using the classifiers identified in this chapter can be incorporated into financial applications to enable organizations to identify the High Risk transactions and monitor or report them accordingly.


Author(s):  
Maruf Adeniyi Nasir

The modern financial system has continuously been traumatised by money laundering and terrorism financing. This is partly because it is a concept that revolves around the complex relationship between money and crime. The challenges posed by these menaces have become a phenomenon that the world has ceaselessly looked for means to address. Yet launderers and terrorists continue to perfect methods of perpetuating their illegal activities, while the havoc created by the menace of these crimes are enormous and remains unquantifiable in term of the actual estimate. Interestingly, Maqasid al Shari'ah has caught the attention of several Muslim scholars as a useful tool that can resolve several contemporary issues. Consequently, examining the relevance of Maqasid al Shari'ah which is the basis of Islamic Finance on money laundering and terrorist financing (AML/CFT) is desirable. The focus of this chapter, therefore, is to examine the relevance of Maqasid al Shari'ah in the fight against the menace of money laundering and terrorism financing


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Zuliera Zariz Azman Aziz ◽  
Seri Ayu Masuri Md Daud

Purpose This study aims to examine the associations between customers’ awareness of money laundering and terrorism financing, trust in banking secrecy measures and discomforts in fulfilling the bank’s anti-money laundering (AML) procedure and their acceptance of existing practices of banks regarding AML and counter-terrorism financing. Design/methodology/approach This study adapts a set of survey instruments developed and validated by prior studies to collect the required data. A convenient sample of 160 Malaysian bank customers aged 18 and above were surveyed to collect the data. Findings This study finds a significant relationship between the respondents’ awareness of money laundering and terrorism financing, trust in banking secrecy measures and their acceptance of the bank’s AML and counter-terrorism financing practices. However, no significant relationship is documented between the level of discomforts experienced by customers in satisfying the banks’ AML requirements and their acceptance of the banks’ AML practices. These results hold even after controlling for alternative explanations of the customers’ acceptance of banking practices examined in the extant literature: age, gender, location, literacy level and occupation. Research limitations/implications This study extends the literature on customers’ acceptance of banking practices more broadly by providing empirical evidence on the role of customers’ awareness on issues underlying the banking practices and their trust in the bank’s secrecy measures. Practical implications This study also provides some practical contributions by shedding some light on the factors that could help banks increase the acceptance of AML practices among their customers. Thus, the findings of this paper help banks focus their effort on these factors and hence increase acceptance rate more effectively. Originality/value Drawing on the elements of the theory of reasoned actions and technology acceptance model and the extant research on trust-privacy and comfortability in a banking setting, this study proposes an integrated approach that is theoretically and empirically grounded.


Author(s):  
K. S. Melkumyan

The article examines the FATF specific approach to the problem of terrorism financing. The FATF essence, content of the activity and influence levers are also analyzed within the article. It is shown that the FATF has reviewed the problem of terrorism financing in the broadest perspective, having engaged simultaneously and consistently mechanisms for combating money laundering and terrorism financing. The Task Force has greatly contributed to building of the world counter-terrorism financing system through forming the legal and institutional basis as well as through interaction with all the possible participants and actors of world politics in this area. Moreover, the FATF has succeeded in geographical expansion of the FATF influence from the original 16 to187 jurisdictions by promotion of FATF-style regional bodies establishment. Particular attention is drawn to the unique features of the FATF Recommendations in comparison with the earlier issued sources of international law, which define the international counter-terrorism financing regime. The author believes that one of the advantages of the FATF as an institute within the counter-terrorism financing system among others is the informal status of the FATF, which provides its flexibility and high ability to respond quickly and in a timely manner to evolving nature of money laundering and terrorism financing as well as emerging threats.


Author(s):  
Sonja Cindori ◽  
Jelena Slović

Money laundering and terrorist financing can be performed in many ways, regular business operations being among them. Business activities go through a large number of business changes, which offers numerous options for money or assets to enter the company via seemingly legal business transactions, enabling money or assets to remain in regular business flows once money laundering is completed. On the other hand, the opposite scenario, in which there is interest in money to be transferred from regular flows to alternative flows, including terrorism financing, is also common. This paper will discuss legal business operations as a framework for money laundering and terrorist financing. Cash flow cycles are presented in form of an algorithm as connections between irregularly and regularly acquired assets in the process of money laundering through business operations, as well as re-entry from regular flows into alternative cash flows. The “Butterfly Diagram”, presenting groups of business changes enabling entry of larger amounts of money and assets owned by a company in order to be laundered or their exit with the effect or tax evasion or terrorism financing, evolved from the algorithm. Also, the “Butterfly Diagram” includes certain forms of legal and tax misuse which enable legalizing the specified activities. The business reality is exceptionally dynamic and needs of money launderers keep growing, this is why there is an increase in types and numbers of business transactions that can be used for money laundering or terrorism financing, resulting in the need to keep modifying the presented “Butterfly Diagram”.


Sign in / Sign up

Export Citation Format

Share Document