AML Alert Investigation is the disciplined review of risk signals generated by monitoring and screening systems. Investigators assess customer context, transactional behaviour, and available data to determine whether an alert reflects genuine Money Laundering,
Learn MoreA Compliance Framework is an organised arrangement of controls, governance mechanisms, and policies constructed to make sure that an institution complies with all CFT and AML obligations.
Learn MoreAML Compliance Monitoring is a continuous process of inspecting customer profiles, financial transactions, and customer activity to detect and prevent money laundering and other financial crimes.
Learn MoreAML Obligations refer to the legal and regulatory requirements that a financial institution, DNFBPS, or VASP must comply with to prevent money laundering, terrorism financing and other financial crimes.
Learn MoreAnomaly detection in AML transaction monitoring identifies unusual or suspicious financial transactions that deviate from the customer’s ordinary behaviour, such as sudden large transfers or activities in risky areas, helping detect potential money laundering, fraud and terrorist financing.
Learn MoreAnonymous networking involves users hiding their online identity using technologies like VPNs, Tor, and proxy servers.
Learn MoreArms trafficking refers to the illegal trade of weapons such as small arms, explosives, and ammunition (supply of bullets and shells) across borders.
Learn MoreArt market manipulation refers to the misuse of buying and selling of artwork to hide illicit funds and make money look legal.
Learn MoreBatch Screening, or bulk screening, is the process of screening large volumes of customer records simultaneously, against Sanctions, Politically Exposed Persons (PEP), and Adverse Media databases.
Learn MoreBeneficial ownership manipulation means deliberately creating layered corporate structures or falsifying ownership or control information to obscure the identity of the natural person carrying out the transaction.
Learn MoreBlockchain monitoring in AML/CFT is used to continuously analyse blockchain transactions, provide transparency and enhance traceability, and help detect and assess the money laundering and terrorism financing risks.
Learn MoreBreach detection in AML compliance refers to the system’s capability to identify unauthorised access to sensitive information, security flaws or data leaks in real time to comply with regulatory requirements.
Learn MoreCaptive insurance refers to a self-insurance that companies usually form to cover specific risks and avoid relying on an external insurer.
Learn MoreCash for Gold Services allow individuals to sell their gold items, such as coins, jewellery, bars, or watches, in exchange for instant cash. Key players in this service include precious metal buyers, jewellery recycling firms, gold pawn shops, and consumers.
Learn MoreCash handling services in AML/CFT are a systematic management of physical cash through activities like counting, sorting, storing, transporting and processing for businesses and financial institutions.
Learn MoreCheque fraud refers to an illegal activity which involves the unauthorised use, forgery, counterfeiting, alteration, or theft of cheques to obtain funds illegally.
Learn MoreA Collective Investment Scheme is an investment technique where a group of people pool funds and invest them together in options such as stocks, real estate, bonds, and other assets.
Learn MoreCompliance risk in AML/CFT refers to the risk that regulated entities face when they fail to comply with AML/CFT rules, regulations, policies, and internal standards.
Learn MoreCompliance Screening refers to the process of checking customers, transactions and counterparties against regulatory requirements, global watchlists, and risk parameters.
Learn MoreCorporate structuring is the way a company systematically arranges its legal entities, operations and ownership to achieve its business objectives.
Learn MoreCountry Risk Assessment refers to the process of evaluating the level of Money Laundering and Terrorist Financing (ML/TF) risk associated with a specific jurisdiction.
Learn MoreDaigou is a Chinese term that means “buying on behalf of”. Diagou Networks are informal groups of individuals who shop for usually luxury or in-demand items abroad on behalf of clients in China and then ship those items back to China for resale.
Learn MoreDeepfakes are AI-generated fake images, audios, and videos that impersonate real individuals. Criminals use these tactics to bypass identity verification procedures by duplicating an individual’s face, voice, and actions.
Learn MoreAccording to the Electronic Money Directive 2 (EMD2), e-money means monetary value stored magnetically and used for payments by entities that are not issuers. e-money is an alternative to cash kept in electronic form or just the representation of cash.
Learn MoreEmbezzlement is not merely theft; although both crimes involve unlawful practices, they stand apart. Embezzlement is the unlawful misappropriation of funds or assets by someone entrusted with them. In essence, the offender misuses another party’s property for their personal gain.
Learn MoreEntertainment venture fronts are entertainment firms such as film production companies, concert promotion firms, record labels, or talent management agencies used to launder illicit funds.
Learn MoreA False Negative occurs when any suspicious customer, transaction or activity is not flagged by Screening or Transaction Monitoring systems.
Learn MoreFinancial crime typologies are methods or patterns used by criminals to obscure the proceeds of illicit money.
Learn MoreForeign Exchange Transactions, also known as FX transactions, involve converting one currency into another across countries via banks or financial markets. They allow funds to move freely between countries, supporting international trade, investments, and remittances.
Learn MoreFraud risk management is the basic framework of technologies, workflows, and controls. These pinpoint, block, detect, and counter fraudulent moves before damage spreads. Designed to identify, respond to, detect, and prevent deceptive activities.
Learn MoreFree trade zones are areas with fewer restrictions where businesses can trade freely, allowing them to import, store, process, or re-export goods without complexity or paperwork.
Learn MoreA funnel account is a bank account that serves as a temporary collection point to receive multiple deposits from various locations.
Learn MoreFuzzy logic in AML is an analytical approach that manages uncertainty, inconsistencies, and partial similarities within customer or transactional data while performing name screening.
Learn MoreGeo-blocking in the AML/CFT and sanctions compliance refers to restricting access to financial services, transactions, or relationships based on the user’s location to maintain safety and compliance.
Learn MoreGhost shipping, which can also be defined as phantom shipping, is a deceptive trade practice where no actual goods are dispatched or sold, just a fictitious shipment which exists only on paper.
Learn MoreA Global AML Watchlist is a consolidated reference of individuals and entities that may carry financial crime or Sanctions risk. It brings together information from Sanctions Lists, PEP datasets, Adverse Media sources, and law enforcement or regulatory risks, giving
Learn MoreGlobal Sanction screening requirements indicate checking individuals, businesses and transactions against the sanctioned lists, to ensure that no business or individual is involved in transactions with sanctioned parties.
Learn MoreHedge funds are pooled investment funds that collect capital from private investors and invest it into multiple assets, stocks, bonds, and currencies, with the aim of generating higher returns.
Learn MoreHigh-Net-Worth-Individuals (HNWIs) are people who hold a significant amount of liquid wealth, usually starting at about USD 1 million. As this threshold increases, they may fall into other categories, such as Ultra-High-Net-Worth Individuals (UHNWIs)
Learn MoreIllegal mining involves unlicensed extraction that circumvents environmental regulations, tax laws, and safety standards. It usually involves unregulated operations that evade royalties, damage ecosystems, and exploit workers.
Learn MoreInsider Trading is the buying or selling of a company’s stocks by a person who has material non-public information (MNPI) about that company. Insider Trading is often referred to as market abuse or illegal trading.
Learn MoreIntegration is the third and final phase in the process of money laundering, where the illicit funds are reintroduced into legitimate flows after placement and layering, making it difficult to trace their origin.
Learn MoreDeepfakes are AI-generated fake images, audios, and videos that impersonate real individuals. Criminals use these tactics to bypass identity verification procedures by duplicating an individual’s face, voice, and actions.
Learn MoreJewellery value manipulation is the over-invoicing or under-invoicing of jewellery items for money laundering. It’s one of the trade-based money laundering (TBML) techniques utilised by criminals to launder money.
Learn MoreSince AML laws are not consistent worldwide, Regulated Entities are exposed to risks from unfamiliar foreign lands. Jurisdictional risks in AML refer to risks arising from dealing with a country or territory that is vulnerable to money laundering and terrorist financing.
Learn MoreThe idea that restricting access to fewer people reduces the chances of information leaks forms a basis for knowledge compartmentalisation.
Learn MoreKYB software (know your business) is a tool used by financial institutions for the automatic verification of their business client, company details, and risk factors to ensure that they are not dealing with risky third parties.
Learn MoreLayering is the second stage of Money Laundering, where illicit funds are moved through a series of complex financial transactions to obscure their origin.
Learn MoreList management in AML screening and compliance refers to the process of handling the multiple lists which are used to check risky transactions or customers. These lists include Sanctions Lists, Politically Exposed Persons (PEP) lists, Adverse Media lists and internal watchlists.
Learn MoreMicrostructuring in Anti-Money Laundering (AML) is a small-value form of structuring or smurfing where criminals split one large amount into many tiny deposits, withdrawals, transfers, or crypto moves that stay below AML alert limits.
Learn MoreA money mule is a person or an entity who moves illicit money on behalf of criminals. The various categories include unwitting money mules who are unaware of their participation in a criminal scheme and are involved through fake job offers or online romance schemes.
Learn MoreMoney mule exploitation means using individuals as intermediaries to transfer illicit money through financial systems. These intermediaries, known as money mules, are used to conceal the origin of illicit funds, making them hard to trace.
Learn MoreMulti-Jurisdiction Corporate Structures are businesses that operate or have legal entities across various jurisdictions. These structures are made to hide the real owners, evade tax, and reduce legal risks.
Learn MoreName alteration refers to purposely changing names through measures such as using aliases, nicknames, misspellings, or legal changes. It is a technique used by criminals to bypass the AML screening systems that might otherwise reveal their true identity.
Learn MorePhishing mule recruitment is a cybercrime method to trick individuals into money laundering activities by exploiting them to move illegal funds on behalf of criminals.
Learn MoreOffshore company incorporation services refer to helping entities set up their operations in a foreign jurisdiction.
Learn MoreOffshore transfers mean moving funds from one account to another account in a foreign jurisdiction. The funds are mostly transferred to countries with strict banking secrecy laws and lighter regulatory oversight
Learn MorePayment sanctions screening is the process of verifying and validating the payment messages.
Learn MoreA payment screening tool in AML is a system that automatically evaluates and verifies every incoming and outgoing financial transaction to make sure that it does not involve any high-risk or restricted parties.
Learn MoreA payment service provider in AML/CFT is an entity that enables individuals or businesses to send, receive, or process payments.
Learn MorePEP List Management is the structured process of maintaining, updating, and applying datasets of Politically Exposed Persons and relevant global AML watchlists.
Learn MorePhishing mule recruitment is a cybercrime method to trick individuals into money laundering activities by exploiting them to move illegal funds on behalf of criminals.
Learn MorePlacement is the initial step in money laundering, where criminals introduce illegal funds into the financial system. They conceal the source of the proceeds to make the funds legitimate and use them.
Learn MoreThe PMGs (precious metals and gemstones) sector is a thriving industry that deals in diamonds, gold, silver, platinum, and other valuable commodities.
Learn MorePseudonymous is an identity or a system where a person uses an alternate or false name, such as usernames, pen names, or crypto addresses, rather than their identity.
Learn MoreRegTech in AML compliance, also known as regulatory technology, helps to manage the regulatory process more efficiently and accurately.
Learn MoreRental Income Schemes in Money Laundering are methods used by criminals to introduce illicit funds into the financial system as legitimate rent payments.
Learn MoreSanctions evasion in AML/CFT is an act of deliberately avoiding or circumventing economic sanctions that are imposed by the government.
Learn MoreSanctions Lists are official lists or databases that identify individuals, entities, and countries that have been sanctioned by local or international authorities and with whom regulated entities are prohibited from entering into business transactions.
Learn MoreA shelf company, also known as an aged corporation, is a legal business entity that has been incorporated but has not conducted any business operations.
Learn MoreSmurfing is a practice of hiding a larger amount of money by breaking it into smaller amounts to make it appear legitimate. It’s a technique used by criminals to hide large amounts of illicit funds.
Learn MoreStructuring in AML/CFT is a deliberate process of breaking down large sums of money into multiple smaller transactions, often used for avoiding the reporting threshold.
Learn MoreDiscover the essence of TITO Tickets in AML compliance, common typologies, risks, red flags, and how automation helps in reducing money laundering risk.
Learn MoreTrade diversion is a money laundering technique used by criminals to disguise the true origin/destination of goods by rerouting, altering shipping paths, or using fake trade documents.
Learn MoreTrade-Based Transaction Manipulation (TBTM), also referred to as trade manipulation, fraudulent trade structuring or illicit trade value distortion, is the intentional alteration of goods, values and shipment terms in international trade to illegally transfer value.
Learn MoreTransaction chaining in AML is defined as the process of identifying and analysing the financial transactions that are interlinked with each other.
Learn MoreTransaction logs are detailed records of all the financial transactions that are made across financial institutions to keep a track of transaction amounts, time, date, parties involved, and the type of transactions.
Learn MoreTransaction patterns are recurring behaviours and temporary changes observed during money movement across customer accounts. Understanding transaction patterns helps identify various Money Laundering typologies, such as structuring, layering, fraud, involvement of money mules, and unusual transfer of funds.
Learn MoreA Virtual Asset Exchange (VAX) in AML is a digital platform where the buying, selling, and trading of cryptocurrencies and other virtual currencies take place. VAX plays a crucial role in AML and crypto compliance.
Learn MoreVirtual tokens are digital tokens transferred, managed and stored using distributed ledger technology (DLT). These exist in digital format and are managed electronically on a shared, decentralised database that ensures security and transparency.
Learn MoreWash Trading is the process of selling and buying the same asset repeatedly to create an illusion of real market activity and to make the asset look active or in demand even though nothing meaningful has changed hands.
Learn MoreWatchlist filtering means screening customer names, transactions, and counterparties against the official watchlists. These lists include details of high-risk individuals and entities, which include politically exposed persons (PEPs), sanctions, and other regulatory datasets.
Learn MoreWealth Management is a personalised financial service to help affluent clients plan and manage their finances.
Learn MoreIn Anti-Money Laundering (AML), “Zero False Positives” refers to a state where every alert raised is genuinely tied to risk. Many describe it as perfect precision or noise-free detection.
Learn MoreGet Started
Contact Us