Fighting Financial Crime Amidst Growing Complexity: T N R AML T A
Fighting Financial Crime Amidst Growing Complexity: T N R AML T A
AMIDST GROWING
COMPLEXITY
THE NEED TO RETHINK AML TECHNOLOGY AND APPROACH
Arin Ray
18 April 2018
CONTENTS
1 www.sas.com
INCREASING OVERLAP AMONG AML COMPONENTS
AML operations at financial institutions span across client and transaction lifecycles, and
consist of several components as shown in Figure 1.
• In watchlist screening, customers are screened against public and private lists
during on-boarding, and periodically, to identify suspect entities and their associates.
• In transaction screening, payment details are examined to prevent sanctioned or
potentially illicit transfers from taking place.
• In transaction monitoring, completed transactions are analyzed in detail because
money launderers can evade detection during transaction screening.
– For example, in “transaction structuring” criminals make several smaller
transactions below usual detection thresholds, which can only be detected by
analyzing aggregated flows, ideally across accounts, channels, and products.
Holistic AML
– Similarly, not all transactions exceeding given thresholds are illicit. analysis requires
• In alert triage and case management, all potentially suspicious activities are information and
investigated, and resolved by sourcing and analyzing additional information. knowledge sharing
The investigation process is highly resource intensive; it is therefore essential to based upon a single
focus compliance resources on the highest risks areas. Appropriate risk assessment view of customer
during Know Your Customer (KYC) process and on an ongoing basis is therefore a across multiple
critical component, and lays the foundation of AML operations. lines of business.
Source: Celent
Traditionally banks have managed the different AML components separately with limited
ability for interaction among them. A truly risk based approach and integrated
strategy will necessitate the ability to leverage information and knowledge across
AML components and other systems. For example, transaction monitoring results can
be used to update customer risk assessments; similarly, watchlist screening results can
be used to risk-prioritize transaction monitoring alerts. Similarly, operational silos along
business or geographical lines need to be dismantled for smoother information flow and
intelligent analysis.
“We want to add new information in case investigation, such as information from KYC
documents, other internal sources, as well as external sources; but getting the data is a
challenge.” — Tier 1 global bank
2
INEFFECTIVE USE OF DATA AND TECHNOLOGY IN AML
Efficient management of AML components and their interplay is difficult to achieve due to
suboptimal use of data and technology plaguing banks’ compliance operations.
• Data collected using manual processes at KYC on-boarding can contain incomplete
or erroneous records. Banks also lack adequate information in critical areas,
such as beneficial ownership, or counterparty information in correspondent banking.
• Banks use customer information file identifiers to create a single view of customer; Current AML
but the views may be inconsistent across business lines or subsidiaries. operations are
mired with poor
• Aggregating customer and transaction records with alert information, building profiles
data management
and networks of entities, and analyzing their changes over time are challenging.
practices, and
• Regulatory expectations on data lineage are rising, and banks will have to do more difficulty in sourcing
to ensure accuracy, consistency, and integrity of data across its lifecycle. data creates gaps
Data collection and preparation therefore involve additional research, outreach to in coverage.
different divisions, and other manual efforts, making it a critical source of inefficiency.
Banks often have to undertake major projects to improve data governance.
“Many of our banking clients also have brokerage accounts with us, but because of
different systems of records we do not have a holistic view of their activities.” — Tier 2
American bank
3
IMPLICATIONS FOR EFFECTIVENESS AND EFFICIENCY
The technology and data challenges greatly limit effectiveness and efficiency levels of
AML programs, as highlighted in Figure 2.
Figure 2: Efficiency and Effectiveness of AML Hampered by Data and Technology Challenges
Source: Celent
High volume of
false positives is the
Risk assessment biggest challenge in
• Generic risk segmentation with subjective and ill-defined thresholds results in AML, but they are
skewed alert distribution, and is a drag on productivity. symptomatic of
• Alert prioritization is also based on generic classifications (e.g., particular list strategies driven by
hits or high value transactions bear highest risk), and is not effective. generalized
typologies.
Screening
• Managing multiple lists, name variations, secondary fields (e.g., date of birth),
with incomplete and erroneous records are challenges in screening.
• Foreign language analysis in native scripts, secondary sources for ownership
information, news and media scanning are not well supported in current solutions.
“Our digital channels are witnessing high growth in Asia, and customers there want end
of day onboarding if not in real time, but onboarding currently takes days. We need better
and faster screening tools with good local language support.” — Tier 1 Global bank
Monitoring
• Rules based systems may not always detect hidden and unknown patterns,
identify behavior nested across undeclared relationships, or group alerts through
correlations in underlying alert attributes. The lack of consolidation makes it difficult to
see the holistic picture of activity, and firms may miss illicit reportable activity.
4
• Subjective tuning of rules and parameters generate high false positives in
transaction monitoring, typically over 90 percent, which includes high share of
duplicate alerts on same customer or transactions, and recurring alerts of similar
activity that were previously resolved.
“Even after statistical modeling our false positive rates are over 80%, we are now thinking
of using advanced analytics to manage so many false positives.”— Tier 1 European bank
Case Management
• Data challenges, and lack of automated workflows and search tools limit ability Banks have tried to
to conduct entity resolution leveraging holistic customer and transaction records. It throw more bodies
also makes peer analysis, network analysis, and behavior profiling challenging. to manage the
volume of false
• System fragmentation is a barrier to automatically combining, correlating, and positives; the result
enriching alerts. Reporting workflows similarly rely on manual efforts. is exploding costs
and high
AML PROGRAMS ARE COSTLY AND INEFFICIENT inefficiency
Banks take a conservative approach to be safe from regulators, and set low thresholds.
The result is high operational cost, because alert management is resource intensive.
Figure 3: Compliance Analysts’ Time is Spent Mostly Doing Low Productivity Work
Source: Celent
“Our analysts spend almost 80% of their time on routine and highly tedious work. We are
looking to automate many of the tasks to not only improve efficiency, but also make
analysts’ life easier and raise productivity.” — Regional bank in the US
False positives are demonstrably costly. However, false negatives – where AML systems
fail to spot actual suspicious cases – may carry higher risk and be hard to quantify. As
criminals become smarter, ability to quickly identify new and previously unknown patterns
will be paramount in AML. Advanced analytics such as AI, ML, and RPA offer
opportunities for real improvements and efficiency gains in AML operations.
5
TRANSFORMING THE RULES IN AML WITH AI
Source: Celent
Graph analytics display networks, patterns, and their evolution over time. Interrogative
drill down allows detailed investigation based on specific nuances of each case.
• These can reveal which attributes are most important predictors of risk based on
a bank’s specific business and client portfolio. Based on this, new risk scoring
or alert prioritization models can be developed, calibrated, and updated regularly.
6
Cluster analysis classifies entities in different groups, and identifies commonalities
within a group and differentiating features separating groups.
• The NLP techniques can enhance name matching algorithms. It can also be used
to extract information from message fields to aid payment screening analysis.
Context based media and web analyses help in UBO assessment and due diligence.
• Document scanning with NLP can be used for regulatory analysis where machines
identify and recommend changes, or for analyzing Suspicious Activity Reports
(SAR), Currency Transaction Reports (CTR) to identify unknown risks.
• Another use case is NLP application in trade finance to scan documents, classify
them in different categories, and extract information for analysis.
• For internal and external reporting, reports can be generated quickly using NLG.
Natural language analyses are part of a larger group of unstructured data analysis that
can also aid in analysis of images, geo-location, digitized communication, and more.
Was this report useful to you? Please send any comments, questions, or suggestions for
upcoming research topics to [email protected].
7
LEVERAGING CELENT’S EXPERTISE
If you found this report valuable, you might consider engaging with Celent for custom
analysis and research. Our collective experience and the knowledge we gained while
working on this report can help you streamline the creation, refinement, or execution of
your strategies.
Vendor short listing and selection. We perform discovery specific to you and your
business to better understand your unique needs. We then create and administer a
custom RFI to selected vendors to assist you in making rapid and accurate vendor
choices.
IT and business strategy creation. We collect perspectives from your executive team,
your front line business and IT staff, and your customers. We then analyze your current
position, institutional capabilities, and technology against your goals. If necessary, we
help you reformulate your technology and business plans to address short-term and long-
term needs.
Product and service strategy evaluation. We help you assess your market position in
terms of functionality, technology, and services. Our strategy workshops will help you
target the right customers and map your offerings to their needs.
Market messaging and collateral review. Based on our extensive experience with your
potential clients, we assess your marketing and sales materials — including your website
and any collateral.
8
RELATED CELENT RESEARCH
Innovations in AML and KYC Platforms: New Models Powered by Advanced Computing
January 2018
Banker’s Guide to Third Party Risk Management: Strategic, Complex, and Liable
December 2016
9
Copyright Notice
Prepared by
200 Clarendon Street, 12th Floor 28, avenue Victor Hugo The Imperial Hotel Tower, 13th Floor
Boston, MA 02116 Paris Cedex 16 1-1-1 Uchisaiwai-cho
75783 Chiyoda-ku, Tokyo 100-0011
Tel.: +1.617.262.3120
Fax: +1.617.262.3121 Tel.: +33.1.73.04.46.20 Tel: +81.3.3500.3023
Fax: +33.1.45.02.30.01 Fax: +81.3.3500.3059
Four Embarcadero Center, Suite 1100 Galleria San Babila 4B 8 Marina View #09-07
San Francisco, CA 94111 Milan 20122 Asia Square Tower 1
Singapore 018960
Tel.: +1.415.743.7900 Tel.: +39.02.305.771
Fax: +1.415.743.7950 Fax: +39.02.303.040.44 Tel.: +65.9168.3998
Fax: +65.6327.5406
Av. Doutor Chucri Zaidan, 920 – Paseo de la Castellana 216 Youngpoong Building, 22nd Floor
4º andar Pl. 13 33 Seorin-dong, Jongno-gu
Market Place Tower I Madrid 28046 Seoul 110-752
São Paulo SP 04578-903
Tel.: +34.91.531.79.00 Tel.: +82.10.3019.1417
Tel.: +55.11.5501.1100 Fax: +34.91.531.79.09 Fax: +82.2.399.5534
Fax: +55.11.5501.1110
Switzerland
Canada
Tessinerplatz 5
1981 McGill College Avenue Zurich 8027
Montréal, Québec H3A 3T5
Tel.: +41.44.5533.333
Tel.: +1.514.499.0461
SAS and all other SAS Institute Inc. product or service names are registered trademarks or trademarks of SAS Institute Inc. in the USA
and other countries. ® indicates USA registration. Other brand and product names are trademarks of their respective companies.
109657_G78766.0518