Geospatial analysts involved in AML/CTF investigations plan and conduct analysis to provide actionable location intelligence for decision makers trying to stop transactions that fund crime and terrorism. This lesson continues the AML/CTF case study with additional information and datasets.
Section 6.1 reviews methods of integrating geospatial analysis into AML/CTF, considerations of the laws and higher authorities guiding investigations, and ways to present findings for decision making.
At the successful completion of Lesson 6, you should be able to:
Lesson 6 will take us one week to complete. There are a number of required activities in this lesson listed below. For assignment details, refer to the lesson page noted.
Note: Please refer to the Calendar in Canvas for specific time frames and due dates.
6.1 Geospatial Analysis for AML/CTF Investigations | ||
---|---|---|
Requirements | Details | Access / Directions |
Read | Read the course content | Use the Lessons menu or the links below to continue moving through the lesson material. |
U.S. Securities and Exchange Commission. Anti-Money Laundering (AML) Source Tool for Broker-Dealers. | Registered students can access the reading in Canvas on the Lesson 6 Readings page. | |
U.S. Treasury. U.S. Money Laundering Threat Assessment. | Registered students can access the reading in Canvas on the Lesson 6 Readings page. | |
Bureau of Justice Assistance. The State and Local Anti-Terrorism Training (SLATT) Program. | Registered students can access the reading in Canvas on the Lesson 6 Readings page. | |
Deliverable | No Deliverable for 6.1 | N/A |
6.2 Case Study: Location Intelligence for AML/CTF Investigations, Part 2 | ||
---|---|---|
Requirements | Details | Access / Directions |
Read | Read the course content | Use the Lessons menu or the links below to continue moving through the lesson material. |
Do | Complete the Case Study activities for Money Laundering Layering, Integration, Geospatial Analysis, Recommendations | Directions are provided in the course text. |
Deliverable | Submit Case Study Steps 3-5 with Presentation, due Tuesday | Submit your case study in Canvas to the Lesson 6.2 Activity: Case Study - Location Intelligence for AML/CTF Investigations, Part 2 drop box |
6.3 Supply Chain Security Management | ||
---|---|---|
Requirements | Details | Access / Directions |
Read | Read the course content | Use the Lessons menu or the links below to continue moving through the lesson material. |
FEMA, Supply Chain Resilience Guide | Registered students can access the reading in Canvas on the Lesson 6 Readings page. | |
Larson, Global Survey Reveals Supply Chain as Rising | Registered students can access the reading in Canvas on the Lesson 6 Readings page. | |
Deliverable | Provide Comments, due Tuesday | Post comments in Canvas to the Lesson 6.3 - Supply Chain Security Management forum |
6.4 for Term Project Submit Revised Project Proposal with Data Sources | ||
---|---|---|
Requirements | Details | Access / Directions |
Read | Read the course content | Use the Lessons menu or the links below to continue moving through the lesson material. |
Deliverable | Submit revised Project Proposal with Data Sources, due Tuesday | Submit your proposal and data sources in Canvas to the Term Project: Revised Project Proposal with Data Sources drop box |
AML and CTF requires action to mitigate the risks, actually to disrupt and prevent money laundering. This lesson on AML/CTF investigations examines the analysis of geospatial and financial information to produce location intelligence.
This is the intersection of geospatial data of all types, to include social data, remote sensing where applicable, data analytics, and data visualization. Geospatial data sources enrich the initial available information for analysis from structured and unstructured data, open source, third-party, internal, and collected data. Think of how funds are transferred in the 21st century, the vast information accessible to evaluate risk summaries on FI, sectors, and countries. The role of the geospatial analyst is not as investigator or determiner of illegal activities, but tasked to analyze geospatial factors surrounding suspicious activity.
Combining a geospatial analytics methodology and tradecraft to enhance AML/CTF investigations, following a method, process, and secret approach to produce location intelligence. Analysts perform geospatial analysis to assess threats and hazards, discover and model patterns, relationships and networks, and apply predictive and prescriptive analysis to map likely areas at similar risks. These are key elements to risk assessments; however, the criminal intent goes beyond certain nations with bad or weak policies that allow opportunities for money laundering.
Laws, Higher Authority, and Official Organizations
Authorities from the local to global level direct effort and establish boundaries on the geospatial analyst's involvement in AML/CTF investigations to comply with procedures, protect client and business rights, and produce location intelligence of suspicious cases.
U.S. Laws governing banking and the financial sector.
Higher Authorities publish expert guidance, conduct oversight, and provide support for AML/CTF investigations. A significant international organization for law enforcement and finance is the Financial Action Task Force (FATF) providing AML recommendations with a view to global risks to regulate financial sector, curb corruption, and assessments of specific country strengths and weaknesses.
Process of geospatial analysis to produce Location Intelligence
For this lesson and case study, you will examine a sequence of geospatial analysis methods and pertinent AML/CTF analytic questions. This involves complex geospatial analysis to detect patterns, corridors, and networks. Examine the process, purpose, and value of descriptive, real time, predictive, and prescriptive analysis techniques. Similar methods include fraud ring analysis, link analysis, or network analysis.
Investigators ask investigative, analytic, behavioral, and risk questions. We interpret the question to determine a method of geospatial analysis to expose:
The workflow depends on the business question an analyst is addressing. Bank and FI objectives range in scope, possibly to identify money laundering, follow up on a client's SAR, prevent money laundering, and comply with laws, financial sector policies, or local adverse situations. Each situation requires an approved target and organized method.
The foundation of geospatial analysis in AML/CTF is a workflow, as depicted in Figure 6.1, a process to:
To that extent, this is not simply a Boolean analysis to layer all our banking and law enforcement data sets to locate hubs of money laundering. It's useful to use domain-specific theories to better understand the actual phenomena being investigated.
It also requires choosing the appropriate method or technique of geospatial analysis to describe the situation and answer key questions.
Analysis technique | analytic question | value to aml/ctf investigation |
---|---|---|
Descriptive | What happened? | Proven investigative technique to build elements of a case. |
Diagnostic | What's happening? | Gaining situational understanding of AML/CTF activity and locations. |
Predictive | What could happen? | Likelihood of similar actions occurring in a different location. |
Prescriptive | What should we do? | Recommending courses of action for decision. |
Prescriptive analytics adds a previously unappreciated decision advantage to AML and CTF investigations for the business, financial, and public safety sectors. Where appropriate and within the scope of duties, recommended courses of action provide location intelligence insights. Optimization and simulation algorithms advise on possible outcomes that calculate predictions, providing courses of action to decision makers.
In geospatial analytics, coding and AI may automate routine tasks and elevate alerts, reports, and situational awareness to well-trained analysts. Advanced machine learning is currently applied to identify high-risk procedural aberrations, false links, and patterns of fraud. Location intelligence provides insights of regions, customers, and FIs where multiple-SAR related transactions meet regulations or cumulative illicit activity falls below thresholds.
Identify regions likely exposed to:
Recognize the Global Financial Audit Trail, "Follow the Money" to understand the broader global financial networks and investment strategies. Bad money is intermingled with good money in a complex attempt by criminals to throw off investigators and complicate a financial audit trail.
By leveraging the wealth of data available to FIs and exploring additional physical features, such as important rail and road networks, location intelligence can be utilized to enhance the understanding of potential illicit funding corridors. There's a process for geospatial analysts to work, which you may consider for the case study.
Presentations
Present findings for actionable decision.
Present location intelligence for referral; summary, charts, maps, pattern diagrams
Submit report to authorities
It's important to recognize the significance of visualizations for decision-making; seeing patterns emerge from data, identifying linked networks, and discovering instances of suspicious activity.
Advanced Analytics
Choosing the right tool falls into the analyst's ability for critical thinking. This encompasses math, statistics, computer science, and analytical reasoning. One will use a variety of geospatial analytical tools; but the software platform doesn't drive analysis. In your studies, you are learning methods of geospatial analysis, developing elements of tradecraft, and applying location intelligence workflows to a problem. Learning to use a particular software or tool is more training than education. Develop your critical thinking through your courses and personal continuing education.
The AML/CTF case study is a learning exercise to reinforce the main points of location intelligence and material in Lessons 5 & 6. In this section, we're presenting advanced geospatial analytics material, which may require additional software tools to accomplish (outside this course and not for the assignments). This may be a refresher from other experiences or your introduction to advanced visualizing methodologies:
1. Outliers or anomalies
Spatial outliers and anomalies are spatial objects whose non-spatial attributes differ from their spatial neighbors. This technique is quite effective with suspicious behavior and outlier transaction detection. May be represented by a graph analysis of events by latitude and longitude to identify outliers; and then dive deeper into feature attributes to detect anomalies and refer for other investigative tools or methods.
2. Colocation patterns
Colocation patterns can be detected through event-centric models to build neighbor groupings of data points. Alteryx (Alteryx) is an example of a data management software in which the analyst creates a workflow to statistically analyze and filter structured and unstructured financial data. A robust analytic software tool supports exploring a wide range of datasets to uncover patterns. The advantage in point data analysis is to apply statistical significance tests to remove chance patterns. Data management and data analytics tools, e.g. R, GeoDa, SQL, predictive analytics or graph analytics, can perform colocation pattern detection where geolocated events are often sited in a geographic neighborhood.
3. Hotspot detection
Geospatial hot spot regions are significantly more active than surrounding areas in density, frequency, and appearance. This method is common with ABI and fraud ring analysis. Signature Analyst (Maxar) has been successfully applied to depict the likelihood of terrorist threats and event corridors in foreign conflicted areas.
4. Teleconnection detection in space & time
Teleconnection technique is used to discover pairs of correlated spatial time series at large distances, with either positive or negative correlation. There are situations and conditions where imagery adds value in AML/CTF investigations to detect, measure, and visualize patterns in space and time. Imagery is remotely sensed from space, airplanes, unmanned aerial systems, and surveillance video/photos. Tools like ENVI (L3/Harris Geospatial) provide reliable automation of complex and repetitive digital functions.
5. Predictions
Predictive analysis works best with a Bayesian approach, calculating probabilities on georeferenced information from numerous datasets. Spatial prediction relies on selection of an appropriate model for classification and regression, relying on accurate training samples. Signature Analyst (Maxar) effectively works through dependent and independent variable relationships to identify likely locations where similar AML/CTF events may occur.
The financial community recognizes the advantages of combining location intelligence workflows with advanced computing applications. Current literature provides insight on companies researching and programming AI to automate routine foundational tasks, e.g. elevate alerts, reports, situational awareness to analysts. Advanced machine learning has advantages to cue patterns, financial anomalies, and - since we're dealing with the human domain - to rule out false leads.
Errors, Cautions, False Leads
Geospatial scientists understand the potential errors which traditional data mining creates on geospatial data. You may have found that traditional density-based clustering methods will generally output chance patterns if applied to geospatial hotspot detection. Methods that test for statistical significance can potentially reduce such chance patterns.
Unlike classic data mining for businesses, these geospatial techniques must handle spatial point distributions and the associated challenges of auto-correlation.
False positives or false leads present challenges in AML/CTF investigations. Data or events may appear suspicious when they are actually the result of standard transactional activity. This may be caused by randomness in data, errors of bias in prediction assumptions, AI training data, or investigation. People are not always predictable. The purchase of a $9,000 necklace isn't always to hide a transaction below the $10,000 bank reporting threshold. There's significant corporate marketing that goes into selling jewelry, and one buyer may be inspired to spend less than $10,000 on a fancy necklace.
Conclusion
What actions should a financial organization take in finding, freezing, and forfeiting criminally derived income and assets?
All of this analysis effort is to support the people involved:
Analysts detect patterns, quantify the events, risks, and potential consequences. Investigators and decision makers follow these leads to stop criminal and terrorist access to money.
Developing new prescriptive methods, deploying machine learning, AI, and critical thinking will advance the discipline of investigating and stopping financial criminal activity.
Proven geospatial analytic methods of location intelligence transform the efficiency of investigations, location-based business problem-solving, and global commerce which is moving at high speed, undergoing great change.
Case Study: Location Intelligence to Support AML/CTF Investigations,
Part 2 - Integration, Geospatial Analysis, and Presentation
Your work in Lesson 5 uncovered patterns of money laundering placement and layering. Let's continue the case study in Lesson 6 to expand the location intelligence supporting the fictional college student AML/CTF investigation to identify any integration activities.
Investigators created a link to additional media reports, financial, and geospatial information for your analysis. Use the Canvas, Lesson 6.2 link to download pertinent financial reports.
a. Your assignment in Lesson 6 is to identify integration activities of money laundering, if applicable, in the case of Blake Glover. What do you find?
b. It is often difficult to separate legitimate purchases from false leads; examine the location, methods, and timing of possible layering activities with an open mind in these situations.
a. Using the available data and information you researched, perform a formal geospatial analysis to produce location intelligence. The results of your analysis will be used by investigators to supplement other forms of legal analysis.
b. Perform a predictive analysis to understand the future consequences or prescriptive analysis to advise on possible outcomes.
c. Develop a recommendation or courses of action (COAs) for the investigative decision makers.
a. Present your findings in a powerpoint or other format presentation.
b. To demonstrate your critical thinking skills and understanding of location intelligence, present your top recommendation on the next step for investigators to prevent money launding in the FI/or identify money laundering earlier. From your job role as a geospatial analyst, what do you recommend or what COAs do you develop?
Complete Steps 3, 4 and 5 of the Case Study
Complete the Money Laundering, Steps 3-5 activity and create a Presentation (sequence of slides/images/maps/reports with your comments annotating the presentation) & Summary Report (about 400-500 words).
Approximately five to seven slides will cover the concepts of Integration, Analysis, and Recommendations. Submit your Presentation of Location Intelligence, Recommendation, and supporting maps, diagrams, charts, and summary in Canvas to the Lesson 6.2 Activity Case Study: Location Intelligence for AML/CTF Investigations, Part 2 drop box.
Your grade will be based how well you make your case both in terms of evidence and presentation.
Due Tuesday night 11:59 pm (Eastern Time)
Threats to global commerce range from destructive weather events to criminal theft to cyber attacks on the supply chain infrastructure. The responsibilities to secure a business’ supply chain are a daunting task and require education, awareness, teamwork, strategic planning, inspections, and continual surveillance. This falls under the headings, roles, and departments of Supply Chain Security and Supply Chain Management (SCM).
Supply Chain Security is a major concern for commercial and government leaders alike. Building resilience in the supply chain is an effective planning element to responding to disasters, intrusions, and catastrophic events. A Supply Chain is that network which identifies, tracks, reports, monitors, and fulfills demand for products. Products may be perishable foods, technical manufactured tools, pharmaceuticals, digital software, or granite counters; transported by air, land, rail, sea, e-delivery, cloud storage, and in-person.
The fundamental issues to learn in this short lesson are the risks, threats, and vulnerabilities of an organization’s supply chain. Security topics or needs include:
Post a comment and two responses in Canvas to the Lesson 6.3 - Supply Chain Security Management forum.
Considering the information you learned from both reading assignments, share your viewpoints on Supply Chain Security. Either answer one of these questions, or share a new, relevant concern:
Due Tuesday 11:59 pm (Eastern Time)
Based on the feedback that you received from other students and from me, revise your original project proposal and submit a final version this week. Note that you may lose points if your proposal suggests that you haven't been developing your thinking about your project.
In your revised proposal, you should respond to as many of the comments made by your reviewers as possible. However, it is OK to stick to your guns! You don't have to adjust every aspect of the proposal to accommodate reviewer concerns, but you should consider every point seriously, not just ignore them.
Your final proposal should be between 600 and 800 words in length (about 1.5 ~ 2 pages double spaced max.). The maximum number of words you can use is 800. You will lose points if your word count exceeds 800. Make sure to include the same items as before:
Additional writing and formatting guidelines are provided in the document (TermProjectGuidelines.pdf) in 'Term Project Overview ' in Canvas.
Post your revised (final) project proposal in Canvas to the Term Project: Revised Project with Data Sources drop box in the Lesson 6 module.
To complete this assignment, you will need to incorporate any peer/instructor feedback into your final draft of your question/case. Remember that you considered project elements in Section 4.5 [10] of Lesson 4—make sure your final draft takes into account all of those elements.
Due Tuesday 11:59 pm (Eastern Time)
Links
[1] https://www.fincen.gov/resources/statutes-and-regulations/bank-secrecy-act
[2] https://www.fatf-gafi.org/
[3] http://www.fatf-gafi.org
[4] https://creativecommons.org/licenses/by-nc-sa/4.0
[5] https://www.sec.gov/about/offices/ocie/amlsourcetool.htm
[6] https://www.treasury.gov/resource-center/terrorist-illicit-finance/Documents/mlta.pdf
[7] https://www.slatt.org/
[8] https://www.fema.gov/sites/default/files/2020-07/supply-chain-resilience-guide.pdf
[9] https://www.crowdstrike.com/blog/global-survey-reveals-supply-chain-as-a-rising-and-critical-new-threat-vector/
[10] https://www.e-education.psu.edu/geog850/node/370