Anti Money Laundering (AML) —
This is something of an umbrella term and refers to the whole complex of laws, regulations, and procedures devoted to the unearthing of attempts to legitimize illegitimate funds. Laundering is an offense in itself, but is also commonly linked to other criminal activities since it is employed to cash in from illegal operations such as asset theft, fraud, and illicit trade.
AML includes a number of processes, mainly connected to screening, flagging up, monitoring and reporting dubious transactions and clients. In a lot of countries, companies and financial institutions have to comply with strict legal guidelines in their business interactions. For organizations, two major processes lie at the heart of this: "Know Your Customer" (KYC) identity verification, and customer due diligence.
At a basic level, the KYC process centers around gaining reliable verification that a potential client is indeed who they say they are. But in fact, it goes beyond this to a close examination of the subject’s past financial activities, checking that deposits they have received are also from reliable sources. It also extends to screening for whether the potential customer is under sanction.
Customer due diligence is essentially the part of the KYC process that is most investigative and painstaking in its nature. For instance, it doesn’t just verify the identity of a company, but the identity of all its major beneficiaries. It also involves looking into the nature of the subject’s customer ties to elaborate risk profiles, and conducting continual monitoring of customers to stay updated with their financial activities.
SEE OUR ARTICLES ABOUT
Featured terms
Blockchains —
In a nutshell, a blockchain is a shared, or distributed, ledger recording transactions and assets. The data is compiled through a continuous verification process that links all transactions into a large, decentralized "chain" of participants, who are linked across a network of peer-to-peer computers...
Data Breach —
Data breaches are the exposure of sensitive or classified information to unauthorized parties and can have disastrous consequences for an organization. When a breach occurs, a company often has to pay out huge sums of money to contain the leak and may also suffer costly reputational damage...
Link Analysis —
The process of link analysis involves examining data to uncover relationships or connections that might not be apparent in raw data sets. It is a powerful analytical tool that has a wide range of applications in various sectors, from law enforcement and national security to cyber and...
Operations Security (OPSEC) —
Operations Security, or OPSEC, involves identifying and consolidating critical information to gain a better understanding of a situation. Additionally, it refers to safeguarding data and ensuring a given mission against eavesdropping by unauthorized parties or accidental compromise...
Social Media Intelligence (SOCMINT) —
A close cousin of OSINT, SOCMINT is an acronym meaning ‘social media intelligence.’ SOCMINT is the collection and analysis of data from social media platforms. Such information might be used for various purposes, including digital footprinting, link analysis, etc.
Social Media Piggybacking (Piggyback Marketing) —
When a company’s social media post goes viral, it is only a matter of time before millions of people start talking about it. Seeing an opportunity to leverage the post's popularity, companies can join in to redirect some of the traffic toward their services...
Our OSINT Solutions
A suite of data extraction and analysis methods across social media, blockchains, messengers, and the Dark Web connected directly to your in-house platform via our API.
A versatile OSINT tool for conducting in-depth investigations across social media, blockchains, messengers, and the Dark Web via the Maltego and i2 platforms.