Tag Archives: investigation management

Visallo and Crime Tech Solutions: Partners in Crime-Fighting Software

Sterling, VA (August 24, 2017)Visallo, the Sterling, VA based provider of investigation analytics software, and only true competitor to Silicon Valley giant Palantir, today announced a strategic partnership with Crime Tech Solutions out of Leander, TX.

Visallo_CTSAccording to Jeff Kunkle, President of Visallo, the partnership enhances his company’s suite of easy-to-use, web-based data visualization tools for investigative link analysis, data discovery, crime analytics and geospatial analysis with Crime Tech Solutions’ powerful and flexible Case Closed investigation case management software.

“Visallo is designed for intelligence analysts, law enforcement investigators, and fraud analysts who need easy to use tools to help them discover and visualize complex relationships within vast amounts of data without resorting to time-consuming, ad-hoc, and error-prone manual processes,” said Mr. Kunkle. “These are analysts that want to make sure they don’t miss important non-obvious insights during their investigations, want to produce more accurate, thorough, and defensible conclusions, and ultimately seek to be more accomplished investigators able to tackle the toughest cases.”

Tyler Wood, VP of Operations at Crime Tech Solutions added, “Where Visallo does much of the big data analytics, the Case Closed software is specifically designed for investigative process and major case management. The software manages the entire investigation workflow from start to finish and includes functionality such as task management, alerting, communications, evidence management, and a great deal more.”

Until now, investigative agencies had to turn to multi-million dollar solutions from behemoth multinational companies for this combined functionality. The partnership is designed to give customers more investigation functionality at a price point that can scale down to smaller groups. “For years, only the largest law enforcement and federal agencies could afford to purchase these types of advanced tools,” added Mr. Kunkle. “The partnership between Visallo and Crime Tech Solutions changes that reality.”

The companies have indicated that integration efforts are already underway to ensure a seamless and user-friendly experience.

About Visallo
Visallo helps investigators of all types produce more accurate, thorough, and timely analysis with a software platform to help them discover, visualize, and understand complex relationships hidden in massive amounts of data. Visallo’s all-in-one suite of easy-to-use, web-based, visualization tools and machine learning data analysis algorithms augment the investigator’s hard-earned experience and intuition with data-driven insights that would be difficult, if not impossible, to discover otherwise.

About Crime Tech Solutions
Crime Tech Solutions develops and markets a robust suite of powerful software solutions designed for intelligence and investigation teams. Their flagship products include the popular Case Closed™ investigation platform and IntelNexus™, an advanced criminal intelligence management software.

The Case for Investigative Case Management

Lost in the news of the recent demise of New Zealand based crime-fighting software developer Wynyard Group, is an interesting report published just weeks before the company ceased operations.

55According to the study, just 55% of U.S. law enforcement agencies currently utilize investigative case management software (CMS), and the majority of users are unhappy with their current systems.

Thirty-seven percent of the study respondents are not currently using any type of automated system, and rely mainly on paper files and spreadsheets to manage their investigations.

Investigative case management software has long been the domain of larger agencies and departments, and is only now truly affordable for smaller departments. The software allows investigators to manage the investigation process from start to finish. The more robust software allows agencies to assign cases and tasks, manage deadlines, store and maintain physical and multimedia evidence, and to search for relevant information across disparate databases.

According to a press release issued at the time, the survey queried users on how likely they would be to recommend their current system to another agency. While most users were unhappy with their current investigative case management system, there was a clear difference between agencies using commercial-off-the-shelf (COTS) software and those using home grown, legacy systems. The latter fared very poorly in the survey results.

The survey also measured the use of smart devices by front-line officers. Forty three percent indicated that they currently utilize smart phones and tablet computers, and 23% indicated they had neither device.

The most-desired features in investigative management software include:

  • Management Dashboards
  • Reports – Standard and ad hoc
  • Case Assignment and Reminders
  • Actions and Incident Management
  • Mobile and Front-Line Case Access
  • Evidence Management and Chain-of-Custody
  • Multimedia Handling
  • Audit Logs
  • Collaboration
  • Gangs and Organized Crime Management
  • Data Visualization and Link Analysis
  • Case Closure / Evidence Brief

An investigative case management system for law enforcement and commercial investigation agencies is rapidly becoming a ‘must-have’. In an era of shrinking budgets and competing resources, a high value is placed on getting the biggest ‘bang for the buck’. The study indicates that agencies are looking to maximize the value of their investigative case management software by incorporating a robust feature set with an affordable price.

Case Closed Software, a division of Crime Tech Solutions, is a powerful and affordable investigative case management solution for law enforcement agencies. Case Closed is also available via the cloud with the innovative Case Closed Cloud. Created by former law enforcement investigators, the COTS software is designed with ease-of-use in mind. The software is deployed in agencies – large and small – across the country.

Overland Park senior crime analyst Jamie May joins Crime Tech Solutions

September 16, 2016 – (Leander, TX)  Crime Tech Solutions, a fast-growing provider of low cost / high performance crime fighting software and analytics is delighted to announce the addition of Jamie May as senior analyst and strategic advisor to the company.

jamiemayMs. May has spent over 17 years as a crime and intelligence analyst for Overland Park Police Department in Kansas, and is a recognized expert in crime analysis, mapping, and criminal intelligence. She has sat on critical crime analysis committees including the International Association of Crime Analysts’ Ethics Committee (IACA) and is a past Vice President / Secretary at Mid American Regional Crime Analyst Network (MARCAN).

“Jamie brings an incredible amount of user experience and innovation to the company”, said Kevin Konczal, Crime Tech Solutions’ VP of Sales. “She’s been active in this community for years, and co-authored the ground-breaking guide, GIS in Law Enforcement: Implementation Issues and Case Studies.”

“To me, Crime Tech Solutions represents a truly innovative company that understands how to develop and market very good technology at prices that most agencies can actually afford”, said Ms. May. “I’m looking forward to being part of the continued growth here.”

In her role with the company, Ms. May will interact with customers and prospects to help align the company’s solution strategy with market and user requirements.

black versionCrime Tech Solutions, who earlier this year acquired TN based Case Closed Software, delivers unique value to customers with comprehensive investigative case management software, sophisticated link analysis tools, criminal intelligence management software, and crime mapping technology that includes some of the industry’s best analytics and reporting capabilities.

 
 
 
 

Using crime analysis solutions to take a ‘Byte’ out of crime

_KOK1002_RTCC+(3)Posted by Crime Tech Solutions 
Law enforcement agencies everywhere are tasked with reducing and investigating crime with fewer and fewer resources at their disposal. “To protect and serve” is the highest responsibilities one can sign up for, particularly in light of recent well-publicized criticisms of police by activists in every city.
That responsibility weighs even heavier in a world with no shortage of criminals and terrorists. There’s never enough money in the budget to adequately deal with all of the issues that face an individual agency on a daily basis. Never enough feet on the street, as they say.
New Tools for Age-Old Problems
Perhaps that’s why agencies everywhere are moving to fight crime with an evolving 21st century weapon – law enforcement software including investigative case management, link and social network analysis, and, importantly, crime analytics with geospatial and temporal mapping.
analyticscity
Crime analytics and investigation software have proven themselves to be valuable tools in thwarting criminal activity by helping to better define resource allocation, target investigations more accurately, and enhancing public safety,
According to some reports, law enforcement budgets have been reduced by over 80% since the early 2000s. Still, agencies are asked to do more and more, with less and less.
Analytics in Policing

Analytics
Predictive Analytics for Policing

Analytics in law enforcement  play a key role in helping law enforcement agencies better forecast what types of crimes are most likely to occur in a certain area within a certain window of time. While no predictive analytics solution offers the clarity of a crystal ball, they can be effective in affecting crime reduction and public safety.
Predictive analysis, in essence, is taking data from disparate sources, analyzing them and then using the results to anticipate, prevent and respond more effectively to future crime. Those disparate data sources typically include historical crime data from records management systems, calls for service/dispatch information, tip lines, confidential informant information, and specialized criminal intelligence data.
The Five W’s of Predictive Analytics
Within this disparate data lie the 5 W’s of information that can be used by crime analysis software to build predictions. Those key pieces include:

  1. Arrest records – who committed crimes
  2. Geospatial data – where crimes have occurred
  3. Temporal data – when crimes have occurred
  4. Statistical data – what crimes have occurred
  5. Investigation data – why (and how) the crimes occurred

5W
Using the 5 W’s, agencies are able to gain insight and make predictions about likely future criminal behavior. For example, if a certain type of crime (what) tends to occur in ‘this’ area (where) at ‘this’ time (when), and by ‘this’ type of individual (who) for ‘this’ reason (why)… it would be wise to deploy resources in that area at that time in order to prevent the incidents from ever occurring. This, of course, is a dramatic over-simplification of the types of analytics that make up predictive policing, but illustrates the general concept well.
Although criminals will always try to be one step ahead of the law, agencies deploying predictive analytics are able to maximize the effectiveness of its staff and other resources, increasing public safety, and keeping bad guys off the street.
More about Crime Tech Solutionsblack version
Crime Tech Solutions is an Austin, TX based provider of crime and fraud analytics software for commercial and law enforcement groups. Our offerings include sophisticated Case Closed™ investigative case management and major case management, GangBuster™ gang intelligence software, powerful link analysis software, evidence management, mobile applications for law enforcement, comprehensive crime analytics with mapping and temporal reporting, and 28 CFR Part 23 compliant criminal intelligence database management systems.

Crime Tech Solutions Acquires Case Closed Software

June 1, 2016 (Austin, TX)   Crime Tech Solutions, LLC, a leading provider of analytics and investigation software for law enforcement and commercial markets, today announced that it has acquired Cleveland, TN based Case Closed Software in a cash transaction. The terms of the deal were not released, but according to Crime Tech Solutions’ founder and president Douglas Wood, the acquisition brings together two dynamic and fast-growing software companies with an unparalleled complement of technologies.
For Crime Tech Solutions, the opportunity to add Case Closed Software into the fold was too good to pass up” said Mr. Wood. “We think that the technology offered by Case Closed helps to further differentiate us in the market as the price performance leader for this type of investigative solution.PNG
Crime Tech Solutions, based in the city of Leander, TX, delivers advanced analytics and investigation software to commercial investigators and law enforcement agencies across the globe. Their solution suite includes criminal intelligence software, sophisticated crime analytics with geospatial mapping, and powerful link analysis and visualization software. The company says that the addition of Case Closed Software expands those offerings even further.
Case Closed Software develops and markets investigative case management software specifically designed for law enforcement agencies. The suite is built around four primary software products including best-in-class investigative case management software, property and evidence tracking, a gang database tool, and an integrated link analysis and data visualization tool. The company also plans to release the solution as Case Closed Cloud for cloud-based access.
Case Closed couldn’t be happier than to be joining Crime Tech Solutions,” said Keith Weigand, the company’s founder. “The blending of our technologies creates a suite that will add tremendous value to our mutual customers, and will be hard for others to duplicate.
According to both Mr. Weigand and Mr. Wood, the name Case Closed will continue on as the product brand, given its widespread popularity and loyal customer base. Crime Tech Solutions is expected to retain all Case Closed employees, with Mr. Weigand joining as the company’s chief technical officer.
Crime Tech Solutions says it expects continued growth via ongoing software sales and strategic acquisitions.
About Crime Tech Solutions
(NOTE: Crime Tech Solutions is an Austin, TX based provider of crime and fraud analytics software for commercial and law enforcement groups. Our offerings include sophisticated Case Closed™ investigative case management and major case management, GangBuster™ gang intelligence software, powerful link analysis software, evidence management, mobile applications for law enforcement, comprehensive crime analytics with mapping and predictive policing, and 28 CFR Part 23 compliant criminal intelligence database management systems.)

Is "Minority Report" pure fiction?

Minority-Report-editPosted by Douglas Wood.
Journalist Raj Shekhar had an interesting article in the Times of India this week.
It’s like PreCrime, only four decades early. The “predictive policing” system seen in the Tom Cruise blockbuster Minority Report is now taking shape in Delhi. But instead of the three slime-immersed psychic “Precogs” that system relied on, Delhi Police’s crime prediction will be based on cold, hard data.
Once Enterprise Information Integration Solution or ‘EI2S’—a system that puts petabytes of information from more than a dozen crime databases at police staff’s fingertips—is ready, Delhi Police will be able to implement its ‘Crime Forecast’ plan to predict when and where criminals will strike.
The technology is not as fanciful as it seems at first and is already being tried out in many important cities, including New York, Los Angeles, London and Berlin. Officers associated with the plan say the software will analyze police data for patterns, compare it with other data from jails, courts and other crime-fighting agencies, and alert police to the likely threats. Data will be available not only on the suspects but also their likely victims.
A global tender has been floated for the project and Delhi Police is in talks with various firms for the technology.
According to the article, the system can help pre-empt many situations. For example, a violent clash between two gangs. It can identify individuals who are likely to join gangs or take to crime in an area based on the analyses of their behaviour and network. It can also curb domestic violence by identifying a pattern and predicting the next attack, the article said.
It all boils down to spotting patterns in mountains of data using tremendous computing power. A police document about the plan states that investigators should be able to perform crime series identification, crime trend identification, hot spot analysis and general analysis of criminal profiles. Link analysis will help spot common indicators of a crime by establishing associations and non obvious relationships between entities.
Using neighbourhood analysis, police will be able to understand crime events and the circumstances behind them in a small area as all the crime activity in a neighbourhood will be available for analysis. Criminal cases will be classified into multiple categories to understand what types of crime an area is prone to and the measures needed to curb them. Classification will be done through profiles of victims, suspects, localities and the modus operandi.
Another technique, called proximity analysis, will provide information about criminals, victims, witnesses and other people who are or were within a certain distance of the crime scene. By analyzing demographic and social trends, investigators will be able to understand the changes that have taken place in an area and their impact on criminality.
Network analysis will also be a part of this project to identify the important characteristics and functions of individuals within and outside a network, the network’s strengths and weaknesses and its financial and communication data.
While the system could help fight crime and rid Delhi of its ‘crime capital’ tag, it is bound to raise concerns over privacy and abuse as no predictive system can be foolproof.

Part Two: Major Investigation Analytics – Big Data and Smart Data

Posted by Douglas Wood, Editor.
As regular readers of this blog know, I spend a great deal of time writing about the use of technology in the fight against crime – financial and otherwise. In Part One of this series, I overviewed the concept of Major Investigation Analytics and Investigative Case Management.
I also overviewed the major providers of this software technology – Palantir Technologies, Case Closed Software, and Visallo. The latter two recently became strategic partners, in fact.
The major case for major case management (pun intended) was driven home at a recent crime and investigation conference in New York. Full Disclosure: I attended the conference for educational purposes as part of my role at Crime Tech Weekly. Throughout the three day conference, speaker after speaker talked about making sense of data. I think if I’d have heard the term ‘big data’ one more time I’d have gone insane.  Nevertheless, that was the topic du jour as you can imagine, and the 3 V’s of big data – volume, variety, and velocity – remain a front and center topic for the vendor community serving the investigation market.
According to one report, 96% of everything we do in life – personal or at work – generates data. That statement probably best sums up how big ‘big data’ is.  Unfortunately,  there was very little discussion about how big data can help investigate major crimes. There was a lot of talk about analytics, for sure, but there was a noticeable lack of ‘meat on the bone’ when it came to major investigation analytics.
Nobody has ever yelled out “Help, I’ve been attacked. Someone call the big data!”. That’s because big data doesn’t, in and by itself, do anything.  Once you can move ‘big data’ into ‘smart data’, however, you have an opportunity to investigate and adjudicate crime. To me, smart data (in the context of investigations) is a subset of an investigator’s ability to:

  1. Quickly triage a threat (or case) using only those bits of data that are most immediately relevant
  2. Understand the larger scope of the crime through experience and crime analytics, and
  3. Manage that case through intelligence-led analytics and investigative case management, data sharing, link exploration, text analytics, and so on.

Connecting the dots, as they say. From an investigation perspective, however, connecting dots can be daunting. In the children’s game, there is a defined starting point and a set of rules.  We simply need to follow the instructions and the puzzle is solved. Not so in the world of the investigator. The ‘dots’ are not as easy to find. It can be like looking for a needle in a haystack, but the needle is actually broken into pieces and spread across ten haystacks.
Big data brings those haystacks together, but only smart data finds the needles… and therein lies the true value of major investigation analytics.

Part 2: Investigating the Investigations – X Marks the Spot

Posted by Douglas Wood, Editor.  http://www.linkedin.com/in/dougwood
Part One of this series is HERE.
Most of the financial crimes investigators I know live in a world where they dream of moving things from their Inbox to their Outbox. Oh, like everyone else, they also dream about winning the lottery, flying without wings, and being naked in public. But in terms of the important roles they perform within both public and private sectors, there is simply Investigating (Inbox) and Adjudication (Outbox). Getting there requires a unique blend of their own capabilities, the availability of data, and the technology that allows them to operate. In the diagram below, ‘X‘ marks the spot where crimes are moved from the Inbox to the Outbox. Without any of those three components, an investigation becomes exponentially more difficult to conclude.
Presentation1
In part one of this article two weeks ago, I wrote about the Investigation Management & Adjudication (IMA) side of financial crimes investigations. I coined that term to call out what is arguably the most integral component of any enterprise fraud management (EFM) ecosystem. The original EFM overview is here.

   “The job is almost unrecognizable to those who once used rotary phones in smoke filled offices…

Twenty years ago, IMA was based primarily upon human eyes. Yes, there were technology tools available such as Wordperfect charts and Lotus 1-2-3 spreadsheets, but ultimately it was the investigator who was tasked with finding interesting connections across an array of data elements including handwritten briefs, telephone bills, lists of suspect information, and discussions with other investigators. The job got done, though. Things moved from the Inbox to the Outbox, arrests were made and prosecutions were successful. Kudos, therefore, to all of the investigators who worked in this environment.
Fast forward to today, and the investigator’s world is dramatically different. The job is the same, of course, but the tools and mass availability of data has made the job almost unrecognizable to those who once used rotary phones in smoke filled offices. Organizations began building enterprise data warehouses designed to provide a single version of the truth. Identity Resolution technology was implemented to help investigators recognize similarities between entities in that data warehouse. And today, powerful new IMA tools are allowing easy ingestion of that data, improved methods for securely sharing across jurisdictions, automated link discovery, non-obvious relationship detection, and interactive visualization tools, and -importantly – packaged e-briefs which can be understood and used by law enforcement, prosecutors, or adjudication experts.

     “Without any of these components, everything risks falling to the outhouse…

With all these new technologies, surely the job of the Investigator is becoming easier? Not so fast.
IMA tools – and other EFM tools – do nothing by themselves. The data – big data – does nothing by itself. It just sits there. The best investigators – without tools or data – are rendered impotent.  Only the combination of skilled, trained investigators using the best IMA tools to analyze the most useful data available results in moving things from the Inbox to the Outbox. Without any of these components… everything eventually risks falling to the Outhouse.
Kudos again, Mr. and Mrs. Investigator. You’ll always be at the heart of every investigation. Here’s hoping you solve for X every day.

Investigating the Investigations.

Posted by Douglas Wood, Editor.
A few years ago, I read a book called Fraud Analytics by Delena Spann.  Ms. Spann is with the U.S. Secret Service, Electronic & Financial Crimes Task Force. The book is an overview of investigation analytics with specific information about some former technology leaders in this area.
The IBM i2 toolset is discussed, along with offerings from Raytheon, Centrifuge, and SAS, and FMS’ Link Analytics, and others. (My friend Chris Westphal, formerly of Raytheon Visual Analytics, by the way, published his book ‘Data Mining for Intelligence, Fraud & Criminal Detection’ a few years ago and is another one I strongly recommend.)
Both books offer advice and use cases on how technology can be applied in the fight against crime. A few months ago, I summarized the types of technology being put to use as tools to prevent, detect, and investigate fraud and other criminal activities. (It’s worth a quick read.) What I’m investigating today, however, is… well, investigations.

“IMA is the most critical connection between technology and investigators.”

In my technology summary, I termed this area Investigation Management & Adjudication (IMA). IMA is the most critical connection between technology and humans within an enterprise fraud management ecosystem. Incorporating key elements of enterprise case management, collaboration, link visualization, information dissemination and knowledge discovery, this layer of functionality is designed to uncover insights which aid in investigating complex incidents. The result ought to be actionable visualization of critical entities, and documented results for potential litigation and regulatory compliance.
IBM i2 has long been considered a thought and market leader in this segment – deservedly or not. Palantir Technologies plays in this area as well. Perhaps no company is more in tune with this market, though, than Visallo with their leading investigation analytics platform. Each platform clearly adds value to investigation case management solutions by providing powerful, emerging functionalities that allow easy and intuitive consumption of data in any form. For investigators, the more data – and the easier that data is to consume – the better.

“Users want actionable intelligence, not endless queries.”

What makes for good IMA? A few things, actually. First among them is the technology’s ability to adapt to the way human beings think and act. Users want actionable intelligence, not endless queries. IMA tools, therefore, ought to interact with the investigator in a consultative way that a fellow investigator would. “Hey, have you thought about this, Mr. Investigator?” and “Maybe you should look at that.”
Second, IMA ought to have context. Technologies that simply point to two entities and say, ‘Hey these things look linked‘ are great but leave all of the thinking up to Mr. Investigator. The IMA tools that I like have contextual values associated to those links. ‘Hey, these things look linked AND here’s why that’s important’. Big difference.
Third, IMA should bring the investigations to closure. There are a lot of data mining tools out there that allow querying with case management. How, though, does the investigator get to the point where an investigation is solved and prosecutable? Once again, the most functional IMA products act the way humans do. They package up the results of the investigation in an easy-to-comprehend document that can be shared internally or with police. No loose ends.

“Every investigation ends with an investigator.”

Predictive analytics, big data, and real-time alert scoring are the current industry buzzwords. They should be. They’re important. At the end of the day, however, every investigation ends with an investigator. Putting the right tools in their hands is often the difference between success and failure in an entire enterprise investigation system.
That’s precisely what Crime Tech Solutions, LLC does. Please take a moment to look us over.
Part Two of this series is now available HERE.

Financial Crimes and Technology

Posted by Douglas Wood, Editor. 

In the midst of preparing for a presentation last week, I entered the term “financial crimes” into my internet search engine. I’ve probably done this same search a hundred times, but seemingly never took notice of the staggering number of results. Over two million of them!

Among those results are a stunning number of definitions, news reports, and general articles. But with so many links to seemingly unconnected terms such as check fraud, credit card fraud, medical fraud, insider trading, bank fraud, health care fraud, tax evasion, bribery, identity theft, counterfeiting, and money laundering – it must appear to the uninitiated that an understanding of ‘financial crimes’ requires an Einstein-like intelligence pedigree.

To those involved in the daily prevention / detection / and investigation of financial crimes, however, the term can be effectively boiled down to:

1) Intentional deception made for personal gain, and

2) The illegal process of concealing the source of those gains.

Everything else – all that other noise – simply falls underneath that definition, and only a cohesive combination of human intelligence and technology can take a bite out of those crimes.

Of course, most companies that are targets of these crimes invest heavily in different forms of technology for enterprise fraud management and anti-money laundering systems.  There are dozens of vendors in this market with varying levels of functionality and service offerings.

The problem with too many of those offerings, however, is that they do not account for organizational truths such as functional  (and data) silos, data quality issues, changing criminal tactics, human limitations, and big data.

A complete enterprise solution for financial crimes management must include automated processes for:

Customer Onboarding – Knowing the customer is the first step an organization can take to prevent financial crimes. A holistic view of an entity – customers, partners, employees – provides a very clear view of what is already known about the entity including their past interactions and relationships with other entities.

Flexible Rules-Based Alert Detection – A robust rules-based alert detection process must provide out-of-box functionality for the types of crimes outlined at the beginning of this article. At the same time, it should be flexible enough for an organization to modify or create rules as criminal activities evolve.

Predictive Analytics – Expected by analysts to become a 5.25B industry by 2018, predictive analytics ensures that big data is scrutinized and correlated with present and past historical trends. Predictive analytics utilizes a variety of statistics and modeling techniques and also uses machine information, data mining, and Business Intelligence (BI) tools to make predictions about the future behaviors including risk and fraud.

Social Network Analysis – Also known as Fraud Network Analysis, this emerging technology helps organizations detect and prevent fraud by going beyond rules and predictive analytics to analyze all related activities and relationships within a network. Knowing about shared telephone numbers, addresses or employment histories  allows companies to effectively ‘cluster’ groups of suspected financial crime perpetrators. The key here, however, is context. Many technologies can build these networks and clusters for review, but precious few can provide the key “what does this mean” element that business users require.

Investigation Management and Adjudication – Incorporating key elements of enterprise case management, collaboration, link visualization, information dissemination and knowledge discovery, this layer of functionality is designed to uncover insights which aid in investigating complex incidents. The result ought to be actionable visualization of critical entities, and documented results for potential litigation and regulatory compliance.

Anti-Money Laundering (AML) and Regulatory Compliance – With record fines being assessed to financial institutions globally, AML compliance is very clearly a major requirement within a financial crimes management solution. The oversight requirements grow almost daily, but at a minimum include out of box functionality for suspicious activity monitoring, regulatory reporting, watch list filtering, customer due diligence, Currency Transaction Report (CTR) processing, and the Foreign Account Tax Compliance Act (FATCA) compliance.

Now, there are clearly many more dynamics than can be summarized here but hopefully the point is made. The only way that organizations can continue to drive fraud and money laundering out is via a happy marriage between skilled financial crimes professionals and the flexible/adaptable technology that empowers them.

Posted by Douglas G. Wood. Click on ABOUT for more information.