Professional Documents
Culture Documents
www.emeraldinsight.com/1368-5201.htm
JMLC
10,2 A framework for data
mining-based anti-money
laundering research
170
Zengan Gao and Mao Ye
School of Economics and Management,
Southwest Jiaotong University, Chengdu, People’s Republic of China
Abstract
Purpose – The purpose of this paper is to propose a framework for data mining (DM)-based
anti-money laundering (AML) research.
Design/methodology/approach – First, suspicion data are prepared by using DM techniques.
Also, DM methods are compared with traditional investigation techniques. Next, rare transactional
patterns are further categorized as unusual/abnormal/anomalous and suspicious patterns whose
recognition also includes fraud/outlier detection. Then, in summarizing the reporting of money
laundering (ML) crimes, an analysis is made on ML network generation, which involves link analysis,
community generation, and network destabilization. Future research directions are derived from a
review of literature.
Findings – The key of the framework lies in ML network analysis involving link analysis,
community generation, and network destabilization.
Originality/value – The paper offers insights into DM in the context of AML.
Keywords Data analysis, Money laundering, Crimes
Paper type Research paper
Introduction
Money laundering (ML) is the processing of criminal, “dirty” money to disguise their
illicit origin and make them appear legitimate and “clean.” IMF Managing Director
Michel Camdessus estimated in 1998 that between 2 and 5 percent of the global GDP is
laundered annually. Evidence also shows that ML finances terrorist attacks
worldwide. So anti-money laundering (AML) research is of critical significance to
national financial stability and international security.
ML behavioral patterns and ML network structural features are essential to AML,
but traditional research focuses on legislative considerations and compliance
requirements. It is methodologically limited to incident identification, avoidance
detection, and suspicion surveillance. Investigations are generally manual, tedious,
time-consuming, and resource-intensive. So challenges are often made to their high
false positive rate (FPR) and inefficiency with voluminous data sets.
Comparatively, data mining (DM) can reduce data preparing time, determine
detection priority, improve FPR, and lessen the pressure of manpower, training, and
budget. It proves particularly effective and efficient in:
Journal of Money Laundering Control
Vol. 10 No. 2, 2007
pp. 170-179 The research is accomplished during the author’s visit to UQ Business School, the University of
q Emerald Group Publishing Limited
1368-5201
Queensland, Australia. The author’s grateful thanks are due to Professor Peter Green,
DOI 10.1108/13685200710746875 Dr Dongming Xu, and Dr Jon Heales for their invitation and support.
.
using decision tree and Bayesian inference to rank suspicious ML cases based on Framework for
probability computations so as to help AML analysts focus on the most DM-based AML
likely suspects;
.
employing consolidation, link analysis, and social network analysis, etc. to
research
identify central members, subgroups, and inter-/intra-group interaction patterns
in ML networks;
.
applying regression and case-based reasoning to uncovering hidden leads and 171
patterns that may prove valuable or timely and predicting prospective
trends; and
.
using support vector machine (SVM) (Schölkopf et al., 2001; Vapnik, 1995) to deal
with high dimensionality heterogeneous data sets.
The objective of this paper is to suggest a framework for DM-based AML research and
highlight some promising directions for future studies from literature review. We also
propose some improvements to the current methodologies.
Illegitimacy
Legitimacy
Figure 1.
Continuum of Legal Usual Unusual Suspicious Illegal
transactional patterns Transaction Transaction Transaction Transaction Transaction
Alternatively, DM is used to detect ML and terrorist financing through abnormal Framework for
transfer pricing (ATP) in international trade, where the imports/exports at prices DM-based AML
over/below the upper/lower quartile import/export prices are considered abnormal
according to the 482 regulations of the US Internal Revenue Service in 1994. The ATP research
range is determined by the real-time transaction prices in the US Merchandize Trade
Database together with upper/lower quartile prices and US/World median prices. Price
frequency distribution and country/commodity heterogeneity are considered, and 173
prices outside the inter-quartile range are also adjusted and brought back to the
median prices. In 2001, the total amount laundered out of the USA through ATP was
estimated to be $156.22 billion, in which nearly $4.27 billion flowed to the 25 countries
appearing on the USA State Department’s watch list and $3.65 billion to the top five
Al-Qaeda countries (Zdanowicz, 2004). These findings not only enable us to feel the
iceberg of ATP’s contribution to international ML but also give evidence that ML
might finance terrorist attacks worldwide, implying that an effective audit and
inspection system must be established to monitor pricing behavior in international
trade in the fight against global ML crimes (MLCs).
Anomaly detection is also identified as a KDD approach (Piatesky-Shapiro and
Matheus, 1992). The previous research on skewed data mostly casts the problem into a
cost-sensitive one where skewed examples receive a higher weight. Some old
techniques are applicable when the cost-model is clearly defined and the volume of the
data is small. To mine trading “anomalies” from extremely skewed positive classes
(, 0.01 percent) in very large volume of data (5 M with 144 features), an
ensemble-based approach is suggested by Fan et al. (2004). This research defines the
goals of using DM in AML context as follows:
.
to automate and shorten the developing cycle;
.
to output a score, such as, posterior probability, to indicate the likelihood for a
trade to be truly anomalous; and
.
to obtain a much lower FPR but a higher recall rate so that analysts can focus on
the “really bad” cases.
Built upon probabilistic modeling and loss functions, its basic idea is to train ensemble of
classifier (or multiple classifiers) from “biased” samples taken from the database. Each
classifier in the ensemble outputs posterior probability, and the probability estimates
from multiple classifiers are averaged to compute the final posterior probability. When
the probability is higher than a threshold, the trade is classified as anomalous. The best
threshold here is determined by the given loss function in each application.
To sum up, “unusualness” is a good surrogate for “suspiciousness,” and customer due
diligence should focus on recognizing behavior patterns instead of learning
background knowledge simply because knowing how people behave is the best way
to identify risks. In order to improve the recognition of rare transactional patterns, our
attention should not be paid to transactions but to subjects and accounts which are
abstractions resulted from consolidation whereby similar identification information is
used to group transactions into clusters.
Fraud/outlier detection
Traditional fraud detection emphasizes access control like identity verification and
customer profiling analysis based on transaction history. It is weak in timely
uncovering potential fraud and insider trading. Statistical analysis, neural networks,
decision tree, fuzzy logic, and genetic algorithms should be employed to reduce FPR.
FAIS seldom uses supervised techniques like case-based reasoning, nearest neighbor
retrieval, and decision trees due to propositional approaches, lack of clearly labeled
positive examples, and scalability issues. Unsupervised techniques are also avoided
because of difficulties in deriving appropriate attributes (Phua et al., 2005). Rule-based
learning and classifier neural networks are taken as part of an adaptive system to
detect cellular cloning account fraud from external threats (Fawcett and Provost, 1997).
Neural networks are also used together with transactional history data to recognize
underlying patterns in data sets and assign risk levels to specific transaction sets,
assuming account-related predictor variables (e.g. transaction on or access to an
account) are related with predicted variables (e.g. risk of fraud or degree of
unusualness on the account) (Vikram et al., 2004). This research is applicable for
internal fraud, but its effectiveness might be weakened by its variable-oriented rather
than history-oriented perspective of each transaction. If a time sequence analysis is Framework for
made, the results might be improved. DM-based AML
SVM is suitable for density estimate and outlier detection. Peer group analysis and
break point analysis can be used to detect fraudulent activities while local outlier and research
global outlier are clearly distinguished. Pattern discovery techniques are advanced so
as to deal with complex (non-numeric) evidences and involve structured objects, texts,
and data in a variety of discrete and continuous scales (nominal, order, absolute and so 175
on) (Kovalerchuk and Vityaev, 2003).
ML Non-ML