A B C D E F G H I J K L M N O P R S T V W Z
AML Alert Investigation
AML Compliance Framework
AML Compliance Monitoring
AML Obligations
Anomaly Detection
Anonymous Networking
Arms Trafficking in AML/CFT
Art Market Manipulation in AML Compliance
Batch Screening
Beneficial Owner Manipulation in AML
Blockchain Monitoring in AML/CFT Compliance
Breach Detection in AML
Captive Insurance in AML/CFT
Cash for Gold Services
Cash Handling Services in AML
Cheque Fraud in AML/CFT
Collective Investment Schemes
Compliance Risk in AML/CFT
Compliance Screening
Corporate Structuring in AML
Country Risk Assessment
Daigou Network
Deep Fake Impersonations
e-Money Services in AML
Embezzlement vs Theft
Entertainment Venture Fronts
False Negative in AML/CFT
Financial Crime Typologies
Foreign Exchange Transaction
Fraud Risk Management
Free Trade Zones
Funnel Accounts
Fuzzy Logic in AML
Geo Blocking in AML/CFT
Ghost Shipping
Global AML Watchlist
Global Sanctions Screening Requirements
Hawala
Hedge Fund
High-Net-Worth Individuals
Illegal Mining and Mineral Trafficking
Insider Trading
Integration in AML
Invoice Manipulation in TBML
Jewellery Value Manipulation in TBML
Jurisdictional Risk
Knowledge Compartmentalisation
KYB Software
Layering
List Management
Microstructuring
Money Mule
Money Mule Exploitation
Multi-Jurisdiction Corporate Structures
Name Alteration in AML
Network-Based Detection
Offshore Company Incorporation Services
Offshore Transfers
Payment Sanctions Screening
Payment Screening Tool in AML
Payment Service Provider in AML/CFT
PEP List Management
Phishing Mule Recruitment
Placement in AML
Precious Metals & Gemstones
Pseudonymous in AML/CFT
RegTech AML Solutions
Rental Income Schemes
Sanctions Evasion
Sanctions List
Shelf Companies
Smurfing
Structuring in AML/CFT
TITO Tickets in AML Compliance
Trade Diversion
Trade-Based Transaction Manipulation
Transaction Chaining in AML
Transaction Logs in AML
Transaction Patterns
Virtual Asset Exchange
Virtual Token in AML
Wash Trading
Watchlist Filtering
Wealth Management in AML
Zero False Positives

A

  • AML Alert Investigation
  • AML Compliance Framework
  • AML Compliance Monitoring
  • AML Obligations
  • Anomaly Detection
  • Anonymous Networking
  • Arms Trafficking in AML/CFT
  • Art Market Manipulation in AML Compliance

B

  • Batch Screening
  • Beneficial Owner Manipulation in AML
  • Blockchain Monitoring in AML/CFT Compliance
  • Breach Detection in AML

C

  • Captive Insurance in AML/CFT
  • Cash for Gold Services
  • Cash Handling Services in AML
  • Cheque Fraud in AML/CFT
  • Collective Investment Schemes
  • Compliance Risk in AML/CFT
  • Compliance Screening
  • Corporate Structuring in AML
  • Country Risk Assessment

D

  • Daigou Network
  • Deep Fake Impersonations

E

  • e-Money Services in AML
  • Embezzlement vs Theft
  • Entertainment Venture Fronts

F

  • False Negative in AML/CFT
  • Financial Crime Typologies
  • Foreign Exchange Transaction
  • Fraud Risk Management
  • Free Trade Zones
  • Funnel Accounts
  • Fuzzy Logic in AML

G

  • Geo Blocking in AML/CFT
  • Ghost Shipping
  • Global AML Watchlist
  • Global Sanctions Screening Requirements

H

  • Hawala
  • Hedge Fund
  • High-Net-Worth Individuals

I

  • Illegal Mining and Mineral Trafficking
  • Insider Trading
  • Integration in AML
  • Invoice Manipulation in TBML

J

  • Jewellery Value Manipulation in TBML
  • Jurisdictional Risk

K

  • Knowledge Compartmentalisation
  • KYB Software

L

  • Layering
  • List Management

M

  • Microstructuring
  • Money Mule
  • Money Mule Exploitation
  • Multi-Jurisdiction Corporate Structures

N

  • Name Alteration in AML
  • Network-Based Detection

O

  • Offshore Company Incorporation Services
  • Offshore Transfers

P

  • Payment Sanctions Screening
  • Payment Screening Tool in AML
  • Payment Service Provider in AML/CFT
  • PEP List Management
  • Phishing Mule Recruitment
  • Placement in AML
  • Precious Metals & Gemstones
  • Pseudonymous in AML/CFT

R

  • RegTech AML Solutions
  • Rental Income Schemes

S

  • Sanctions Evasion
  • Sanctions List
  • Shelf Companies
  • Smurfing
  • Structuring in AML/CFT

T

  • TITO Tickets in AML Compliance
  • Trade Diversion
  • Trade-Based Transaction Manipulation
  • Transaction Chaining in AML
  • Transaction Logs in AML
  • Transaction Patterns

V

  • Virtual Asset Exchange
  • Virtual Token in AML

W

  • Wash Trading
  • Watchlist Filtering
  • Wealth Management in AML

Z

  • Zero False Positives

AML Alert Investigation

AML Alert Investigation is the disciplined review of risk signals generated by monitoring and screening systems. Investigators assess customer context, transactional behaviour, and available data to determine whether an alert reflects genuine Money Laundering,

Learn More

AML Compliance Framework

A Compliance Framework is an organised arrangement of controls, governance mechanisms, and policies constructed to make sure that an institution complies with all CFT and AML obligations.

Learn More

AML Compliance Monitoring

AML Compliance Monitoring is a continuous process of inspecting customer profiles, financial transactions, and customer activity to detect and prevent money laundering and other financial crimes.

Learn More

AML Obligations

AML Obligations refer to the legal and regulatory requirements that a financial institution, DNFBPS, or VASP must comply with to prevent money laundering, terrorism financing and other financial crimes.

Learn More

Anomaly Detection

Anomaly detection in AML transaction monitoring identifies unusual or suspicious financial transactions that deviate from the customer’s ordinary behaviour, such as sudden large transfers or activities in risky areas, helping detect potential money laundering, fraud and terrorist financing.

Learn More

Anonymous Networking

Anonymous networking involves users hiding their online identity using technologies like VPNs, Tor, and proxy servers.

Learn More

Arms Trafficking in AML/CFT

Arms trafficking refers to the illegal trade of weapons such as small arms, explosives, and ammunition (supply of bullets and shells) across borders.

Learn More

Art Market Manipulation in AML Compliance

Art market manipulation refers to the misuse of buying and selling of artwork to hide illicit funds and make money look legal.

Learn More

Batch Screening

Batch Screening, or bulk screening, is the process of screening large volumes of customer records simultaneously, against Sanctions, Politically Exposed Persons (PEP), and Adverse Media databases.

Learn More

Beneficial Owner Manipulation in AML

Beneficial ownership manipulation means deliberately creating layered corporate structures or falsifying ownership or control information to obscure the identity of the natural person carrying out the transaction.

Learn More

Blockchain Monitoring in AML/CFT Compliance

Blockchain monitoring in AML/CFT is used to continuously analyse blockchain transactions, provide transparency and enhance traceability, and help detect and assess the money laundering and terrorism financing risks.

Learn More

Breach Detection in AML

Breach detection in AML compliance refers to the system’s capability to identify unauthorised access to sensitive information, security flaws or data leaks in real time to comply with regulatory requirements.

Learn More

Captive Insurance in AML/CFT

Captive insurance refers to a self-insurance that companies usually form to cover specific risks and avoid relying on an external insurer.

Learn More

Cash for Gold Services

Cash for Gold Services allow individuals to sell their gold items, such as coins, jewellery, bars, or watches, in exchange for instant cash. Key players in this service include precious metal buyers, jewellery recycling firms, gold pawn shops, and consumers.

Learn More

Cash Handling Services in AML

Cash handling services in AML/CFT are a systematic management of physical cash through activities like counting, sorting, storing, transporting and processing for businesses and financial institutions.

Learn More

Cheque Fraud in AML/CFT

Cheque fraud refers to an illegal activity which involves the unauthorised use, forgery, counterfeiting, alteration, or theft of cheques to obtain funds illegally.

Learn More

Collective Investment Schemes

A Collective Investment Scheme is an investment technique where a group of people pool funds and invest them together in options such as stocks, real estate, bonds, and other assets.

Learn More

Compliance Risk in AML/CFT

Compliance risk in AML/CFT refers to the risk that regulated entities face when they fail to comply with AML/CFT rules, regulations, policies, and internal standards.

Learn More

Compliance Screening

Compliance Screening refers to the process of checking customers, transactions and counterparties against regulatory requirements, global watchlists, and risk parameters.

Learn More

Corporate Structuring in AML

Corporate structuring is the way a company systematically arranges its legal entities, operations and ownership to achieve its business objectives.

Learn More

Country Risk Assessment

Country Risk Assessment refers to the process of evaluating the level of Money Laundering and Terrorist Financing (ML/TF) risk associated with a specific jurisdiction.

Learn More

Daigou Network

Daigou is a Chinese term that means “buying on behalf of”. Diagou Networks are informal groups of individuals who shop for usually luxury or in-demand items abroad on behalf of clients in China and then ship those items back to China for resale.

Learn More

Deep Fake Impersonations

Deepfakes are AI-generated fake images, audios, and videos that impersonate real individuals. Criminals use these tactics to bypass identity verification procedures by duplicating an individual’s face, voice, and actions.

Learn More

e-Money Services in AML

According to the Electronic Money Directive 2 (EMD2), e-money means monetary value stored magnetically and used for payments by entities that are not issuers. e-money is an alternative to cash kept in electronic form or just the representation of cash.

Learn More

Embezzlement vs Theft

Embezzlement is not merely theft; although both crimes involve unlawful practices, they stand apart. Embezzlement is the unlawful misappropriation of funds or assets by someone entrusted with them. In essence, the offender misuses another party’s property for their personal gain.

Learn More

Entertainment Venture Fronts

Entertainment venture fronts are entertainment firms such as film production companies, concert promotion firms, record labels, or talent management agencies used to launder illicit funds.

Learn More

False Negative in AML/CFT

A False Negative occurs when any suspicious customer, transaction or activity is not flagged by Screening or Transaction Monitoring systems.

Learn More

Financial Crime Typologies

Financial crime typologies are methods or patterns used by criminals to obscure the proceeds of illicit money.

Learn More

Foreign Exchange Transaction

Foreign Exchange Transactions, also known as FX transactions, involve converting one currency into another across countries via banks or financial markets. They allow funds to move freely between countries, supporting international trade, investments, and remittances.

Learn More

Fraud Risk Management

Fraud risk management is the basic framework of technologies, workflows, and controls. These pinpoint, block, detect, and counter fraudulent moves before damage spreads. Designed to identify, respond to, detect, and prevent deceptive activities.

Learn More

Free Trade Zones

Free trade zones are areas with fewer restrictions where businesses can trade freely, allowing them to import, store, process, or re-export goods without complexity or paperwork.

Learn More

Funnel Accounts

A funnel account is a bank account that serves as a temporary collection point to receive multiple deposits from various locations.

Learn More

Fuzzy Logic in AML

Fuzzy logic in AML is an analytical approach that manages uncertainty, inconsistencies, and partial similarities within customer or transactional data while performing name screening.

Learn More

Geo Blocking in AML/CFT

Geo-blocking in the AML/CFT and sanctions compliance refers to restricting access to financial services, transactions, or relationships based on the user’s location to maintain safety and compliance.

Learn More

Ghost Shipping

Ghost shipping, which can also be defined as phantom shipping, is a deceptive trade practice where no actual goods are dispatched or sold, just a fictitious shipment which exists only on paper.

Learn More

Global AML Watchlist

A Global AML Watchlist is a consolidated reference of individuals and entities that may carry financial crime or Sanctions risk. It brings together information from Sanctions Lists, PEP datasets, Adverse Media sources, and law enforcement or regulatory risks, giving

Learn More

Global Sanctions Screening Requirements

Global Sanction screening requirements indicate checking individuals, businesses and transactions against the sanctioned lists, to ensure that no business or individual is involved in transactions with sanctioned parties.

Learn More

Hawala

Hawala is a traditional way of transferring money without any physical movement.

Learn More

Hedge Fund

Hedge funds are pooled investment funds that collect capital from private investors and invest it into multiple assets, stocks, bonds, and currencies, with the aim of generating higher returns.

Learn More

High-Net-Worth Individuals

High-Net-Worth-Individuals (HNWIs) are people who hold a significant amount of liquid wealth, usually starting at about USD 1 million. As this threshold increases, they may fall into other categories, such as Ultra-High-Net-Worth Individuals (UHNWIs)

Learn More

Illegal Mining and Mineral Trafficking

Illegal mining involves unlicensed extraction that circumvents environmental regulations, tax laws, and safety standards. It usually involves unregulated operations that evade royalties, damage ecosystems, and exploit workers.

Learn More

Insider Trading

Insider Trading is the buying or selling of a company’s stocks by a person who has material non-public information (MNPI) about that company. Insider Trading is often referred to as market abuse or illegal trading.

Learn More

Integration in AML

Integration is the third and final phase in the process of money laundering, where the illicit funds are reintroduced into legitimate flows after placement and layering, making it difficult to trace their origin.

Learn More

Invoice Manipulation in TBML

Deepfakes are AI-generated fake images, audios, and videos that impersonate real individuals. Criminals use these tactics to bypass identity verification procedures by duplicating an individual’s face, voice, and actions.

Learn More

Jewellery Value Manipulation in TBML

Jewellery value manipulation is the over-invoicing or under-invoicing of jewellery items for money laundering. It’s one of the trade-based money laundering (TBML) techniques utilised by criminals to launder money.

Learn More

Jurisdictional Risk

Since AML laws are not consistent worldwide, Regulated Entities are exposed to risks from unfamiliar foreign lands. Jurisdictional risks in AML refer to risks arising from dealing with a country or territory that is vulnerable to money laundering and terrorist financing.

Learn More

Knowledge Compartmentalisation

The idea that restricting access to fewer people reduces the chances of information leaks forms a basis for knowledge compartmentalisation.

Learn More

KYB Software

KYB software (know your business) is a tool used by financial institutions for the automatic verification of their business client, company details, and risk factors to ensure that they are not dealing with risky third parties.

Learn More

Layering

Layering is the second stage of Money Laundering, where illicit funds are moved through a series of complex financial transactions to obscure their origin.

Learn More

List Management

List management in AML screening and compliance refers to the process of handling the multiple lists which are used to check risky transactions or customers. These lists include Sanctions Lists, Politically Exposed Persons (PEP) lists, Adverse Media lists and internal watchlists.

Learn More

Microstructuring

Microstructuring in Anti-Money Laundering (AML) is a small-value form of structuring or smurfing where criminals split one large amount into many tiny deposits, withdrawals, transfers, or crypto moves that stay below AML alert limits.

Learn More

Money Mule

A money mule is a person or an entity who moves illicit money on behalf of criminals. The various categories include unwitting money mules who are unaware of their participation in a criminal scheme and are involved through fake job offers or online romance schemes.

Learn More

Money Mule Exploitation

Money mule exploitation means using individuals as intermediaries to transfer illicit money through financial systems. These intermediaries, known as money mules, are used to conceal the origin of illicit funds, making them hard to trace.

Learn More

Multi-Jurisdiction Corporate Structures

Multi-Jurisdiction Corporate Structures are businesses that operate or have legal entities across various jurisdictions. These structures are made to hide the real owners, evade tax, and reduce legal risks.

Learn More

Name Alteration in AML

Name alteration refers to purposely changing names through measures such as using aliases, nicknames, misspellings, or legal changes. It is a technique used by criminals to bypass the AML screening systems that might otherwise reveal their true identity.

Learn More

Network-Based Detection

Phishing mule recruitment is a cybercrime method to trick individuals into money laundering activities by exploiting them to move illegal funds on behalf of criminals.

Learn More

Offshore Company Incorporation Services

Offshore company incorporation services refer to helping entities set up their operations in a foreign jurisdiction.

Learn More

Offshore Transfers

Offshore transfers mean moving funds from one account to another account in a foreign jurisdiction. The funds are mostly transferred to countries with strict banking secrecy laws and lighter regulatory oversight

Learn More

Payment Sanctions Screening

Payment sanctions screening is the process of verifying and validating the payment messages.

Learn More

Payment Screening Tool in AML

A payment screening tool in AML is a system that automatically evaluates and verifies every incoming and outgoing financial transaction to make sure that it does not involve any high-risk or restricted parties.

Learn More

Payment Service Provider in AML/CFT

A payment service provider in AML/CFT is an entity that enables individuals or businesses to send, receive, or process payments.

Learn More

PEP List Management

PEP List Management is the structured process of maintaining, updating, and applying datasets of Politically Exposed Persons and relevant global AML watchlists.

Learn More

Phishing Mule Recruitment

Phishing mule recruitment is a cybercrime method to trick individuals into money laundering activities by exploiting them to move illegal funds on behalf of criminals.

Learn More

Placement in AML

Placement is the initial step in money laundering, where criminals introduce illegal funds into the financial system. They conceal the source of the proceeds to make the funds legitimate and use them.

Learn More

Precious Metals & Gemstones

The PMGs (precious metals and gemstones) sector is a thriving industry that deals in diamonds, gold, silver, platinum, and other valuable commodities.

Learn More

Pseudonymous in AML/CFT

Pseudonymous is an identity or a system where a person uses an alternate or false name, such as usernames, pen names, or crypto addresses, rather than their identity.

Learn More

RegTech AML Solutions

RegTech in AML compliance, also known as regulatory technology, helps to manage the regulatory process more efficiently and accurately.

Learn More

Rental Income Schemes

Rental Income Schemes in Money Laundering are methods used by criminals to introduce illicit funds into the financial system as legitimate rent payments.

Learn More

Sanctions Evasion

Sanctions evasion in AML/CFT is an act of deliberately avoiding or circumventing economic sanctions that are imposed by the government.

Learn More

Sanctions List

Sanctions Lists are official lists or databases that identify individuals, entities, and countries that have been sanctioned by local or international authorities and with whom regulated entities are prohibited from entering into business transactions.

Learn More

Shelf Companies

A shelf company, also known as an aged corporation, is a legal business entity that has been incorporated but has not conducted any business operations.

Learn More

Smurfing

Smurfing is a practice of hiding a larger amount of money by breaking it into smaller amounts to make it appear legitimate. It’s a technique used by criminals to hide large amounts of illicit funds.

Learn More

Structuring in AML/CFT

Structuring in AML/CFT is a deliberate process of breaking down large sums of money into multiple smaller transactions, often used for avoiding the reporting threshold.

Learn More

TITO Tickets in AML Compliance

Discover the essence of TITO Tickets in AML compliance, common typologies, risks, red flags, and how automation helps in reducing money laundering risk.

Learn More

Trade Diversion

Trade diversion is a money laundering technique used by criminals to disguise the true origin/destination of goods by rerouting, altering shipping paths, or using fake trade documents.

Learn More

Trade-Based Transaction Manipulation

Trade-Based Transaction Manipulation (TBTM), also referred to as trade manipulation, fraudulent trade structuring or illicit trade value distortion, is the intentional alteration of goods, values and shipment terms in international trade to illegally transfer value.

Learn More

Transaction Chaining in AML

Transaction chaining in AML is defined as the process of identifying and analysing the financial transactions that are interlinked with each other.

Learn More

Transaction Logs in AML

Transaction logs are detailed records of all the financial transactions that are made across financial institutions to keep a track of transaction amounts, time, date, parties involved, and the type of transactions.

Learn More

Transaction Patterns

Transaction patterns are recurring behaviours and temporary changes observed during money movement across customer accounts. Understanding transaction patterns helps identify various Money Laundering typologies, such as structuring, layering, fraud, involvement of money mules, and unusual transfer of funds.

Learn More

Virtual Asset Exchange

A Virtual Asset Exchange (VAX) in AML is a digital platform where the buying, selling, and trading of cryptocurrencies and other virtual currencies take place. VAX plays a crucial role in AML and crypto compliance.

Learn More

Virtual Token in AML

Virtual tokens are digital tokens transferred, managed and stored using distributed ledger technology (DLT). These exist in digital format and are managed electronically on a shared, decentralised database that ensures security and transparency.

Learn More

Wash Trading

Wash Trading is the process of selling and buying the same asset repeatedly to create an illusion of real market activity and to make the asset look active or in demand even though nothing meaningful has changed hands.

Learn More

Watchlist Filtering

Watchlist filtering means screening customer names, transactions, and counterparties against the official watchlists. These lists include details of high-risk individuals and entities, which include politically exposed persons (PEPs), sanctions, and other regulatory datasets.

Learn More

Wealth Management in AML

Wealth Management is a personalised financial service to help affluent clients plan and manage their finances.

Learn More

Zero False Positives

In Anti-Money Laundering (AML), “Zero False Positives” refers to a state where every alert raised is genuinely tied to risk. Many describe it as perfect precision or noise-free detection.

Learn More

Get Started

*
*
*
*
*
*
I agree to the Privacy Policy and Terms of Service.

Contact Us

*
*
*
*
*
*
I agree to the Privacy Policy and Terms of Service.