The Creepy Professor

I just saw a report about several female students filing a lawsuit against Dartmouth University alleging that they were sexually harassed by professors at the school. According to the lawsuit, the…

Smartphone

独家优惠奖金 100% 高达 1 BTC + 180 免费旋转




Discovering Fraud Patterns using IBM Financial Crime Insights

Have you ever wondered how to make sense of this data and subsequent revelations thus made on money laundering, movement of money, and corruption? Gaining meaningful insights from such massive, dense, and interconnected data is not easy. It requires detecting indirect relationships, patterns, and connections, a task relational databases that rely on primary and foreign keys to link tables are ill equipped with. Graph traversals on the other hand are highly efficient which makes transaction monitoring and analysis fast, easy and intuitive.

About IBM FCI Graph Analytics

System architecture showing a JanusGraph, Hbase graph store, shipped with pre-built data ingestion, pattern detection, graph algorithms, visual fragments and REST API based service layer.

Schema of the data

In this section, we describe how we mapped the data from FinCEN files to a graph data structure. The structure consists of the following: each Suspicious Activity Report aka ‘filing’ is filed by a ‘filer’. Each filing contains information on the “originator”, “beneficiary”, and “entity” of the transaction. These actors are banks located all over the world.

A graph schema depicting the FinCEN files. Filer, Filing, Entity, Originator, Beneficiary and Country are stored as vertexes. Vertexes Filer and Filing are connected by edge Filed, vertexes Filing and Entity by edge Concerns and vertexes Originator and Beneficiary by edge Transferred. Each Filer, Entity, Originator and Beneficiary are connected to Country by edge Located.

Query Data Analysis

Once the data was loaded on to the system, we used the Cypher Query framework to write queries and detect fraud patterns. This framework can be accessed by opening the “Explore” tab after the user logs into the system.

Login and page of FCI Graph Analytics and the Explore tab that has an input box to execute a Cypher Query.

Let us now look at some specific examples from the data. The following is an example of a Suspicious Activity Report (SAR), where nearly $45 million USD were transferred from JP Morgan Chase, London to Alfa Bank, Russia:

A graph showing a SAR filed by JP Morgan Chase showing $45 million USD transferred from JP Morgan Chase, London to Alfa Bank, Russia.

Cypher Query for top 5 banks that filed the most SARs

Network representation of top 5 banks that generated a lot of SARs. This list includes the Standard Chartered Plc, China Investment Corporation, Barclays Plc, Deutsche Bank AG and JP Morgan Chase.

Cypher Query for banks where most transactions originated:

This query lists 5 banks that have more than 1,000 outgoing transactions.

Tabular representation of 5 banks where more than 1000 transactions originated. All 5 banks are located in Russia.

Cypher query for countries where more than $40 million USD was received:

Tabular representation of 5 countries where more than $40 million USD was received. The list includes Netherlands, two banks in India, Czech Republic and Sweden.

Cypher query to detect supernode:

In the context of graphs, a supernode can be described as a vertex with disproportionately large number of incoming and outgoing edges. We use this query to list 5 countries that were flagged most often in SARs.

Tabular representation of supernode cypher query list countries that were flagged most often in SARs which includes China, Singapore, Switzerland and United Kingdom.

Graph Algorithm Analysis

The top beneficiary banks in FinCEN files:

The top originator banks emerged from FinCEN files:

Top beneficiary countries revealed in FinCEN files:

Using a combination of Page Rank and Degree algorithms, we identified the most prominent countries in the network and have tagged them as Originator (O), Intermediary (I) and Tax havens (TH), as listed below:

Conclusion

Add a comment

Related posts:

Introduction of pilot and battleship functions

Players need to send at least 3 space-battleships with 1 pilot, 3 space-battleships with 3 pilots at max for the PVE. SSR space-battleship possess 4 battleship skills of the same type, with…

Yassin Hankir of Savedroid on Exit Scams And ICO Sustainability

Yassin Hankir does not pause when he talks. The founder of Savedroid, a German payments startup, doesn’t punctuate his sentences with umms, or aahs: he speaks in declaratives, with clarity and…

Why GitHub Code Review Sucks

Why GitHub Code Review Sucks. It encourages to provide rationales as part of the conversation (which is not stored in Git) instead of inside the respective commit….