Publication:
Money laundering and terrorism financing detection using neural networks and an abnormality indicator

Loading...
Thumbnail Image
Full text at PDC
Publication Date
2021
Advisors (or tutors)
Editors
Journal Title
Journal ISSN
Volume Title
Publisher
Elsevier
Citations
Google Scholar
Research Projects
Organizational Units
Journal Issue
Abstract
This study proposes a comprehensive model that helps improve self-comparisons and group-comparisons for customers to detect suspicious transactions related to money laundering (ML) and terrorism financing (FT) in financial systems. The self-comparison is improved by establishing a more comprehensive know your customer (KYC) policy, adding non-transactional characteristics to obtain a set of variables that can be classified into four categories: inherent, product, transactional, and geographic. The group-comparison involving the clustering process is improved by using an innovative transaction abnormality indicator, based on the variance of the variables. To illustrate the way this methodology works, random samples were extracted from the data warehouse of an important financial institution in Mexico. To train the algorithms, 26,751 and 3527 transactions and their features, involving natural and legal persons, respectively, were selected randomly from January 2020. To measure the prediction accuracy, test sets of 1000 and 600 transactions were selected randomly for natural and legal persons, respectively, from February 2020. The proposed model manages to decrease the proportion of false positives and increase accuracy when compared to the rule-based system. On reducing the false positive rate, the company’s costs for investigating suspicious customers also decrease significantly.
Description
UCM subjects
Keywords
Citation
Aluko, A., & Bagheri, M. (2012). Journal of Money Laundering Control, 15(4), 442–457. Álvarez-Jareño, J. A., Badal-Valero, E., & Pavía, J. M. (2017). Using machine learning for financial fraud detection in the accounts of companies investigated for money laundering. Working Papers 2017/07, Economics Department, Universitat Jaume I, Castellon ´ (Spain). Berliner, A. K. (1955). Journal of Criminal Law and Criminology, 46(1). Boot, J. C. G., Feibes, W., & Lisman, J. H. C. (1967). Journal of the Royal Statistical Society, 16(1), 65–75. Buchanan, B. (2004). Money laundering—a global obstacle. Research in International Business and Finance, 18(1), 115-127. Cao, D. K., & Do, P. (2012). Lecture Notes in Computer Science, 7197, 207–2016. Chandraeva, L. S., Amarasinghe, T. M., De Silva, M., Aponso, A. C., & Krishnarajah, N. (2020). Fourth international congress on information and communication technology, advances in intelligent systems and computing, 1041, 385–396. Chen, A. H., & Siems, T. F. (2004). European Journal of Political Economy, 20(2), 349–366. Chen, Z., Van Khoa, L. D., Teoh, E. N., Nazir, A., Kandasamy, E., & Sim, K. (2018). Knowledge Information Systems, 57, 245–285. Deng, X., Roshan Joseph, V., Sudjianto, A., Jeff, Wu, & C. F.. (2009). Journal of the American Statistical Association, 104(487), 969–981. Drezewski, R., Sepielak, J., & Filipkowski, W. (2014). Information Sciences, 295, 18–32. Du, K. L. (2010). Clustering: A neural network approach. Neural Networks, 23(1), 89–107. Enders, W., & Sandler, T. (2008). Terrorism, 14(1), 49–58. Enders, W., Sandler, T., & Parise, G. F. (1992). Kyklos, International Review for Social Sciences, 45(4), 531–554. Engle, R. (2004). American Economic Review, 94(3), 405–420. Financial Action Task Force (2004). Annual Report. Financial Action Task Force (2008a). Money laundering and terrorist financing vulnerabilities of commercial websites and internet payment systems. Financial Action Task Force (2008b). Terrorist financing. Financial Action Task Force (2008b). Terrorist financing. Financial Action Task Force (2013a). Annual report. Financial Action Task Force (2013b). Anti-money laundering and terrorist financing measures and financial inclusion. Financial Action Task Force (2013c). Guidance politically exposed persons. Financial Action Task Force (2013d). Money laundering and terrorist financing related to counterfeiting of currency. Financial Action Task Force (2014). Guidance for a risk-based approach. Financial Action Task Force (2015). Emerging terrorist financing risks. Financial Action Task Force (2017). Guidance anti-money laundering and terrorist financing measures and financial inclusion. Financial Action Task Force (2018a). Financing of recruitment for terrorist purposes. Financial Action Task Force (2018b). Anti-money laundering and anti-terrorist financing measures, Mexico. Frick, T. A. (2019). ERA Forum, 20, 99–112. Fronzetti Colladon, F., & Remondi, E. (2016). Using social network analysis to prevent money laundering. Expert Systems with Applications, 67, 49–58. Gao, Z. (2009). International Conference on Management and Service Science, 2009, 1–4. Global Financial Integrity (2015). Illicit financial flows: the most damaging economic condition facing the developing world. Gohar, F., Wasi, H., & Usman, Q. (2014). Terrorist group prediction using data classification. Proceedings of the International Conference on Artificial Intelligence and Pattern Recognition, (AIPR2014), at Asia Pacific University of Technology and Innovation (APU), Kuala Lumpur, Malaysia. Gopinath, G., & Stein, J. C. (2018). Banking, trade, and the making of a dominant currency. The National Bureau of Economic Research NBER, Working Paper No. 24485. Hassani, M., & Seidl, T. (2017). Vietnam Journal of Computer Science, 4, 171–183. Hausken, K., & Gupta, D. K. (2015). International Journal of Contemporary Sociology, 52 (2), 141–166. Heidarinia, N., Harounabadi, A., & Sadeghzadeh, M. (2014). International Journal of Computer Applications, 97(22), 35–39. Ibrahim, S. A. (2019). Stratagem, 2(1). Jancsics, D. (2017). Public Integrity, 19(1), 4–21. Jancsics, D. (2018). Shell companies and government corruption. Global Encyclopedia of Public Administration, Public Policy, and Governance. Jun, T. (2006). Lecture Notes in Computer Science, 3917, 58–65. Jullum, M., Løland, A., & Bang Huseby, R. (2020). Journal of Money Laundering Control, 23(1), 173–186. Kannan, S., & Somasundaram, K. (2017). Journal of Money Laundering Control, 20(2). Khan, S. N., Larik, A. S., Rajput, Q., & Haider, S. (2013). International Journal of Computers and Applications, 35(4), 181–187. Koschade, S. (2006). Studies in Conflict and Terrorism, 29(6), 559–575. Larik, A. S., & Haider, S. (2011). Clustering based anomalous transaction reporting. Procedia Computer Science, 3, 606–610. Lee, A. (2011). World Politics, 63, 203–245. Li, S. H., Yen, D. C., Lu, W. H., & Wang, C. (2012). Computers in Human Behavior, 28, 1002–1013. Liu, R., Qian, X., Mao, S., & Zhu, S. (2011). Research on anti-money laundering based on core decision tree algorithm. In 2011 Chinese Control and Decision Conference (CCDC) Mianyang (pp. 4322–4325). Liu, X., & Zhang, P. (2010). International Conference on Multimedia Communications, 2010, 210–213. Liu, X., Zhang, P., & Zeng, D. (2008). Sequence matching for suspicious activity detection in anti-money laundering. Intelligence and Security Informatics 5075. Maitland, A. S., Kim-Kwang, I., & Lin, C. (2011). Journal of Money Laundering Control, 15 (1), 85–111. Martínez-Sánchez, J. F., & Cruz-García, S. (2020). A risk management approach through regression trees (data mining). Journal of Money Laundering Control, 23(2), 427–439. Monteleone, C. (2016). Global Change, Peace and Security, 28(1), 35–53. Moustafa, T., Abd El-Megied, M., Sobh, T., & Shafea, K. (2015). Anti money laundering using a two-phase system. Journal of Money Laundering Control, 18(3), 304–329. Nitsch, V., & Schumacher, D. (2004). European Journal of Political Economy, 20(2), 23–433. Obermaier, F., & Obermayer, B. (2016). Los papeles de Panamá. El club mundial de los evasores de impuesto. Barcelona: Península 463. Ozgul, F., Erdem, Z., & Bowerman, C. (2009). Pacific-Asia Workshop on Intelligence and Security Informatics, 25–30. Pratt, D. (2010). Terrorism and Political Violence, 22(3), 438–456. Raphaeli, N. (2010). Terrorism and Political Violence, 15(4), 59–82. Raza, S., & Haider, S. (2011). Procedia Computer Science, 3, 987–991. Romaniuk, P. (2014). The RUSI Journal, 159(2), 6–17. Saidi, F., Trabelsi, Z., & Ghazela, H. B. (2018). A novel approach for terrorist subcommunities detection based on constrained evidential clustering. In 12th International Conference on Research Challenges in Information Science (RCIS) (pp. 1–8). Sandler, T., & Enders, W. (2008). Economic consequences of terrorism in developed and developing countries. Terrorism, Economic Development, and Political Openness, Cambridge University Press. Savagea, D., Wangb, Q., Chouc, P., Zhanga, & Yub, X. (2016). Detection of money laundering groups using supervised learning in networks. Computer Science, Social and Information Networks. arXiv:1608.00708. Secretariat of Finance and Public Credit (2016). First National Risk Assessment. Seymour, B. (2008). Global money laundering. Journal of Applied Security Research, 3 (3–4), 373–387. Shelley, L. I., & Picarelli, J. T. (2005). Trends in Organized Crime, 9, 52–67. Sobreira Leite, G., Bessa Albuquerque, A., & Rogerio Pinheiro, P. (2019). Applied Sciences, 9(22), 4800. Soltani, R., Nguyen, U. T., Yang, Y., Faghani, M., Yagoub, A., & An, A. (2016). A new algorithm for money laundering detection based on structural similarity. In IEEE 7th annual ubiquitous computing, electronics and mobile communication conference (UEMCON) (pp. 1–7). Spreutels, J., & Grijseels, C. (2000). 10 EC Tax Review, 10(1), 3–12. Tang, J., & Yin, J. (2005). International conference on machine learning and cybernetics, 6, 3453–3457. Teichmann, F. (2020). Recent trends in money laundering. Crime, Law and Social Change, 73, 237–247. Teichmann, F. (2019). Recent trends in money laundering and terrorism financing. Journal of Financial Regulation and Compliance. The Guardian. (2016). The Panama papers: how the world’s rich and famous hide their money offshore. Tianqing, Z. (2006). An outlier detection model based on cross datasets comparison for financial surveillance. In 2006 IEEE Asia-Pacific conference on services computing (APSCC’06). Torgler, B., & Valev, N.T. (2006). Corruption and age. Journal of Bioeconomics, 8, 133–145. Wang, S., & Yang, J. (2007). A money laundering risk evaluation method based on decision tree. In 2007 international conference on machine learning and cybernetics (Vol. 1, pp. 283–286). Watkins, R. C., Reynolds, K. M., Demara, R., Georgiopoulos, M., Gonzalez, A., & Eaglin, R. (2010). Police Practice and Research: An International Journal, 4(2), 163–178. Wei, Q., & Dunbrack, R. L., Jr. (2013). PLoS ONE, 8(7). Wei, W., Li, J., Cao, L., Ou, Y., & Chen, J. (2012). World Wide Web, 16, 449–475. Williams, P. (2009). Money laundering. South African Journal of International Affairs, 5 (1), 71–96. Wolfsberg Group. (2006). Guidance on a risk based approach for managing money laundering risks. Yang, S., & Wei, L. (2010). Journal of Economic Policy Reform, 13(2), 159–178. Zadeh, L. A. (1983). Fuzzy Sets and Systems, 11(1–3), 199–227. Zhang, Y., & Trubey, P. (2018). Computational Economics, 54, 1043–1063.
Collections