Download as pdf or txt
Download as pdf or txt
You are on page 1of 19

AI Magazine Volume 16 Number 4 (1995) (© AAAI)

Articles

The Financial Crimes


Enforcement Network AI
System (FAIS)
Identifying Potential
Money Laundering from Reports of
Large Cash Transactions1

Ted E. Senator, Henry G. Goldberg, Jerry Wooton,


Matthew A. Cottini, A. F. Umar Khan, Christina D. Klinger,
Winston M. Llamas, Michael P. Marrone, and Raphael W. H. Wong

■ The Financial Crimes Enforcement Network (FIN- port of federal, state, and local law enforce-
CEN) AI system (FAIS) links and evaluates reports ment. A key data source available to FINCEN
of large cash transactions to identify potential is reports of large cash transactions made to
money laundering. The objective of FAIS is to dis- the Treasury according to terms of the Bank
cover previously unknown, potentially high-val- Secrecy Act.2
ue leads for possible investigation. FAIS integrates FINCEN has developed a system, called the
intelligent human and software agents in a coop-
FINCEN AI System ( FAIS ), which links and
erative discovery task on a very large data space.
It is a complex system incorporating several
evaluates all reported transactions for indica-
aspects of AI technology, including rule-based tions of suspicious activity characteristic of
reasoning and a blackboard. FAIS consists of an money laundering, with the objective of iden-
underlying database (that functions as a black- tifying previously unknown, potentially high-
board), a graphic user interface, and several pre- value leads for follow-up investigation and, if
processing and analysis modules. FAIS has been in warranted, prosecution (Wall Street Journal
operation at FINCEN since March 1993; a dedi- 1993).
cated group of analysts process approximately FAIS integrates intelligent software and
200,000 transactions a week, during which time human agents in a cooperative discovery task
over 400 investigative support reports corre-
on a very large data space. It is a complex sys-
sponding to over $1 billion in potential laun-
dered funds were developed. FAIS’s unique analyt-
tem incorporating several aspects of AI tech-
ic power arises primarily from a change in view of nology, including rule-based reasoning and a
the underlying data from a transaction-oriented blackboard. FAIS consists of an underlying
perspective to a subject-oriented (that is, person database, a graphic user interface, and several
or organization) perspective. preprocessing and analysis modules. The

T
he Financial Crimes Enforcement Net- database functions as a blackboard and is
work (FINCEN) is a relatively new agen- implemented in SYBASE . The graphic user
cy (founded in 1990) of the U.S. Trea- interface is implemented in Neuron Data’s
sury Department whose mission is to OPEN INTERFACE. The suspiciousness evaluation
establish, oversee, and implement policies to module is a rule-based reasoner implemented
prevent and detect money laundering in sup- in Neuron Data’s NEXPERT OBJECT (now called

Copyright © 1995, American Association for Artificial Intelligence. All rights reserved. 0738-4602-1995 / $2.00 WINTER 1995 21
Articles

FAIS’s unique analytic power arises primarily


from a transformation of view of the
underlying data from a transaction-oriented
perspective to a subject-oriented (that is, per-
son or organization) perspective. FAIS enables
a process that was infeasible without automa-
tion, both because of the data volume and
the need to link related transactions prior to
evaluation. FAIS permits analysts to focus on
significant items of interest in the database,
enabling more detailed and complex analyses
on these items. FAIS allows law enforcement to
derive increased value from the reported data,
ensure that all reported transactions are eval-
uated at least once, and reduce the likelihood
of missing any significant reported illicit
financial activity.

Task Description
The most common motivation for criminal
behavior is profit. The larger the criminal
organization is, the greater the profit. By dis-
rupting the ability to profit, law enforcement
can focus on a vulnerable aspect of large
criminal organizations. Money laundering is a
complex process of placing the profit, usually
cash, from illicit activity into the legitimate
financial system, with the intent of obscuring
the source, ownership, or use of the funds.
Money laundering, previously viewed as an
ancillary offense, is today a primary offense
in its own right. Money laundering makes it
possible for drug dealers, terrorists, arms deal-
ers, and others to operate and expand their
criminal enterprises. Left unchecked, it can
erode the integrity of financial institutions.
Figure 1. The Currency Transaction Report (CTR).
Money laundering typically involves a multi-
SMART ELEMENTS ). Alta Analytics’ NETMAP pro- tude of transactions, perhaps by distinct indi-
vides a link-analysis module. Other FAIS pro- viduals, into multiple accounts with different
grams, which asynchronously load and pre- owners at different banks and other financial
process the data, are written in SQL and C. FAIS institutions. Detection of large-scale money-
runs on a network of Sun servers and work- laundering schemes requires the ability to
stations under the UNIX operating system. reconstruct these patterns of transactions by
FAIS has been in operation at FINCEN since linking potentially related transactions and
March 1993, supporting a dedicated group of then to distinguish the legitimate sets of
analysts and processing approximately transactions from the illegitimate ones. This
200,000 transactions a week. FAIS operates in technique of finding relationships between
two modes: (1) data driven and (2) user di- elements of information, called link analysis,
rected. Over 400 investigative support reports is the primary analytic technique used in law
have resulted from using the system, reflect- enforcement intelligence (Andrews and Peter-
ing transactions on the order of $1 billion in son 1990).
potential laundered funds. FAIS development To combat money laundering, the Bank
is continuing to remain current with changes Secrecy Act requires the reporting of cash
in money-laundering techniques and transactions in excess of $10,000. This record
statutes, increase its effectiveness, add fea- keeping preserves a financial trail for investi-
tures, and support FINCEN’s policy and regu- gators to follow and allows the government
latory responsibilities as well as provide to scrutinize systematically large cash transac-
detection and investigative support. tions. These transactions are reported by

22 AI MAGAZINE
Articles

Figure 2. Currency Transaction Report Filings.

financial institutions, casinos, and individu- cash transactions. They cannot, however,
als entering or leaving the country. Transac- search, sort, or link the forms according to
tions at financial institutions, which include complex sets of criteria.
traditional institutions such as banks and The data reported on the forms are subject
nontraditional institutions such as Casas de to errors, uncertainties, and inconsistencies
Cambio, are reported on Internal Revenue that affect both identification and transaction
Service (IRS) Form 4789, the currency transac- information. Simple data-entry errors can be
tion report (CTR), which is partially repro- the result of difficulties in reading handwrit-
duced in figure 1. 3 Individuals entering or ten forms or keypunching errors. More com-
leaving the country are required to file a plex difficulties arise from other aspects of
report of international transportation of currency the forms. Free text fields, such as that con-
or monetary instruments (CMIR) with the U.S. taining a business type or occupation, are not
Customs Service. CMIRs are also required standardized, resulting in a variety of descrip-
when cash or monetary instruments (for tions. The variety of linguistic and ethnic
example, traveler’s checks) are shipped into types, especially on CMIR forms and for per-
or out of the country. Casinos file the currency sonal names, also makes the data difficult to
transaction report by casinos (CTRC), which is a interpret. Not all fields are filled out on all
variant of the basic CTR. forms. The filer can accept any of several
Approximately 10 million transactions are forms of identification (for example, social
reported each year; over 90 percent are CTRs. security number, driver’s license number).
In 1993, these transactions amounted to The information provided on each form type
approximately $500 billion. These amounts is not completely equivalent. All these factors
have been increasing continually, as illustrat- make it extremely difficult to reconstruct the
ed in figure 2. Forms are entered into the patterns of transactions.
Treasury’s financial database, which is main- Because of the volume of forms received,
tained in two mainframe-hosted database sys- the number and variety of fields on the
tems: (1) the Treasury enforcement communi- forms, and the quality of the entries on the
cations system ( TECS ) operated by the U.S. forms, it is infeasible for human analysts to
Customs Service and (2) the currency bank- review all forms even on an individual
ing regulatory system operated by the IRS. unlinked basis. Linking the forms together to
These systems are used by law enforcement review sets of related transactions for indica-
for responses to general or specific queries. tions of money laundering is impossible
These systems are extremely useful for sup- without the use of advanced computing tech-
porting existing investigations and conduct- nology. Because the number of sets of poten-
ing strategic studies of money laundering and tially related transactions scales at least expo-

WINTER 1995 23
Articles

assists analysts to focus on the most suspi-


cious subjects, accounts, and transactions
identified from Bank Secrecy Act filings.
The process of evaluating Bank Secrecy Act
filings for indications of suspiciousness
begins with FAIS linking and evaluating Bank
Secrecy Act transactions and continues with
analyzing the information generated by FAIS
and providing the information to a law
enforcement agency with jurisdiction in the
matter. It could ultimately lead to the indict-
ment and conviction of the violator as well as
the seizure by the government of illicitly
acquired assets. This process occurs in the
larger context of FINCEN’s investigative sup-
port work. Once the leads are generated from
FAIS, other FINCEN systems, which are used
primarily to collate and analyze financial and
law enforcement intelligence information to
develop existing cases based on known leads
provided by client agencies in support of
existing investigations, are also used to fur-
Figure 3. FAIS Architecture.
ther the investigative support process.
nentially with the number of forms,4 the abil-
ity to prune the search space intelligently by Application Description
creating the most meaningful sets of linkages
This section describes FAIS: how it works, what
is required to evaluate realistically all forms
it is, and how it uses AI techniques and con-
for purposes of detecting money laundering.5
cepts. Figure 3 depicts the FAIS architecture
Additionally, the detection of money laun-
and its two modes of operation: (1) data driv-
dering is a complex task requiring years of
en and (2) user directed. The key functional
experience and judgment by well-trained
modules of FAIS are the underlying database,
analysts, as a result, in large part, to the lack
the data-load programs, the database exten-
of either a formal domain model or norma-
tive data regarding the cash economy. These sion updating programs, the suspiciousness
factors all contributed to the belief that AI evaluation programs, the link-analysis tool,
was a necessary component of FAIS. Finally, and the interactive query interface. Other
and perhaps most importantly, a successful programs and packages that are available in
predecessor system to FAIS was developed by the Sun environment (for example, the APPLIX
the U.S. Customs Service in the mid-1980s. office automation package, consisting of a
This system, called the Customs AI system word processor, a spreadsheet, e-mail, and a
(CAIS), utilized rule-based reasoning to evalu- database) are sometimes also thought of as
ate suspiciousness. It served as a proof of con- part of FAIS because they have full cut-and-
cept that this AI technique could be applied paste interoperability with the FAIS compo-
effectively to the task of detecting money nents.
laundering from Bank Secrecy Act transac-
tions.
Concept of Operations
The primary task of FAIS is the automated FAIS operates in two modes: (1) data driven
review of all Bank Secrecy Act filings to gener- and (2) user directed. Data-driven operation is
ate potential leads. The expertise required for the regular process of loading, linking, and
the FAIS task is the ability to detect potential evaluating new information as it is received.
indications of money laundering in the Bank User-directed analysis is ad hoc, initiated in
Secrecy Act database as distinct from the (at response to a specific project or task. Users
least as important) ability to detect money regularly review and analyze the end product
laundering based on other clues. Bank Secre- of the data-driven operation, that is, a list of
cy Act suspiciousness analysis can be thought subjects sorted by scores. Most of the opera-
of as the incremental process of accumulating tional load on the system is the data-driven
information about the subjects in the processing of all transactions. Because data-
database to allow analysts and investigators driven functions operate on all information
to focus on the most suspicious activity. FAIS received by the system, the complexity of the

24 AI MAGAZINE
Articles

processing is limited by available computing


resources. In contrast, user-directed process-
ing operates on selected information that is
already determined to be of interest; so, more
complex analyses are possible in this mode.
A system operator is responsible for per-
forming the data-driven operations. Data
tapes are received from the U.S. Customs Ser-
vice Data Center in Newington, Virginia.
Tapes are copied and combined onto 8-mil-
limeter cassettes for loading and retention.
Data are then loaded into FAIS. The load pro-
grams perform consolidation, the process of
creating clusters (that is, subjects or accounts)
by linking transactions according to common
personal, business, or account identification
information. Database extension programs
are run to create or update summary informa-
tion associated with the clusters. The analysis
rules are run to update the suspiciousness rat-
ing of clusters. These data-driven processes all
create additional information in the database.
These programs are run asynchronously,
depending on when tapes are received, how Figure 4. Levels of Belief.
much data are on them, and what system
availability and operator availability are. Architecture
Users enter the system through a main This section describes the structure and oper-
menu where they select either user-directed ations of each component of FAIS.
or data-driven analysis. In user-directed FAIS Database SYBASE is the standard FIN-
mode, users set specific criteria for sets of CEN database management system. No evalu-
transactions, and the system retrieves all ation was performed to consider alternatives
transactions, meeting the specified criteria. In to SYBASE for FAIS . It was decided that any
data-driven mode, users retrieve sets of trans- potential advantages of another database
actions based on the data-driven suspicious- management system for FAIS would be out-
ness scores. They can continue by finding all weighed by the disadvantages of having mul-
other transactions for these subjects or tiple database management systems in a sin-
accounts or following a trail of linkages by gle organization, including the difficulties of
looking for other subjects and accounts that sharing data between FAIS and other FINCEN
are linked to a specified subject or account. intelligence information systems in a multi-
This process can continue iteratively as an ple database management system environ-
analyst follows a trail of linked subjects, ment.
accounts, and transactions. At any stage, a The FAIS data model is based on three funda-
user can load sets of transactions into the mental concepts: (1) transactions, (2) subjects,
NETMAP link-analysis tool for further study. A and (3) accounts. It includes all fields from all
user can also create new subjects by combin- Bank Secrecy Act form types, unifying those
ing system-identified subjects, which is useful fields common to multiple form types. There
if the system did not consolidate two subjects are approximately 120 fields, about half of
that the user believes to be identical or if two which are filled in on any given form. It is
subjects do business as a single entity (such as designed to support a blackboard system archi-
a husband and wife), and can reevaluate sus- tecture, where different modules asyn-
piciousness for these user-generated subjects. chronously read to, and write from, the shared
A user can directly access the suspiciousness data repository. The FAIS data model also sup-
evaluation to determine which rules fired for ports three levels of belief: (1) reported, (2)
a particular subject or account, getting what accepted, and (3) hypothesized. These levels
is essentially an explanation of the suspi- correspond to three different levels of access
ciousness score for the subject or account. and control of the data, as depicted in figure 4.
Finally, users can also utilize the NEXPERT Transactions enter the database directly as
graphic mode and alter values or rules to ana- they are reported, with no interpretation of
lyze hypothetical situations of interest. the data by FAIS. The data are restructured,

WINTER 1995 25
Articles

belief (that is, hypothesized) is reserved for


higher-level abstractions (for example, cases,
patterns) and alternative subject and account
consolidations.
The entire database is implemented in the
relational model, although slightly denormal-
ized to provide more efficient retrieval of cer-
tain types of data. The FAIS database consists
of 40 SYBASE tables and currently occupies
approximately 20 gigabytes (GB).
Data-Load Programs The data-load pro-
grams are a hybrid program of C (9K lines)
and SYBASE SQL stored procedure code (4K
lines) that is optimized for performance. The
most interesting activity in this module is the
consolidation of subjects and accounts. These
consolidations are based on a set of heuristics
developed by knowledge engineering. This
knowledge is currently coded into the pro-
Figure 5. Transformation of Perspective. gram in two SQL stored procedures that use
database searches to locate reasonable match-
however, from a model based solely on trans- es to the input identification data. They are
actions into the FAIS model based on transac- implemented as hard-coded procedures not
tions, subjects, and accounts. Subjects and only because optimized performance is neces-
accounts are abstractions that result from a sary but also because the cost of executing
process of consolidation whereby similar alternative consolidations on the entire
identification information is used to group database is prohibitive.
transactions into clusters (Goldberg and Sena- Database Extension Updating Pro-
tor 1995). The transformation from transac- grams The database extension programs
tions to clusters is based on identification compute summary information about clus-
information reported on the transaction. ters. The major activity in this module is the
Because several subjects can appear on a creation of aggregate and summary data fields
transaction, a transaction can be part of sev- derived from the set of transactions underly-
eral clusters. The transformation from trans- ing each subject or account. These derived
actions to subjects or accounts is depicted data fields are used by the suspiciousness
conceptually in figure 5. The data-driven pro- evaluation rules and represent one of the
cessing can be viewed as a compilation of this major areas for future improvement in the
transformation of view from transactions to system. This summary information consists
subjects and accounts, making this view on of numeric aggregates, such as number or
all the data available on user request. Having monetary value of filings during a time peri-
both these views available simultaneously is od, and other nonnumeric information, such
the major increase in analytic insight provid- as locations or occupations associated with
ed by FAIS to the users. subjects. This module consists of two small C
The subject and account clusters and any programs (1K lines) using a general database-
aggregate or summary data computed from access library written in C (8K lines), with SQL
these sets of transactions represent the next stored procedures for only the most rudimen-
level of belief (that is, accepted) and are com- tary operations (200 lines). Any additional
puted according to conservative, proven algo- features that we decide to compute in the
rithms on which the entire system depends. future require only minor modifications.
This summary information about clusters or Suspiciousness Evaluation The FAIS sus-
transactions is referred to as the database piciousness evaluation module contains the
extensions. They include derived attributes major expert rule-based components of the
necessary for the evaluation of suspicious- system. Neuron Data’s NEXPERT OBJECT shell
ness; the results of the data-driven suspicious- was chosen for this task. NEXPERT provided the
ness evaluations; various flags containing graphic user interface for both the develop-
information such as subject status; and addi- ment and the execution of rule bases. This
tional information discovered by analysts in graphic user interface provided a built-in
user-directed mode, including additional rudimentary explanation facility, allowing
linkages between clusters. The final level of users to see easily which rules fired and how

26 AI MAGAZINE
Articles

each rule contributed to the result. It also


allowed properly trained analysts to tinker
with, or even add to, the rule bases to answer
what-if questions, which in turn assist in the
knowledge engineering process. Some other
useful features of NEXPERT for this application
were a quick backward-chaining inference
engine, the ability to import data directly
from database systems (including SYBASE ),
portability between all standard desktop com-
puters and minicomputers, and a comprehen-
sive application program interface that
allowed a NEXPERT rule base to become a com-
ponent of a larger system rather than requir-
ing a forced fit into the NEXPERT model.
The initial implementation of the suspi-
ciousness evaluation in FAIS draws almost
entirely on the rule bases developed in CAIS.
CAIS consisted of 6 distinct rule sets with 439
rules implemented in the knowledge engi-
neering system ( KES ) for the APOLLO (now
Hewlett Packard) computer system. These six
rule sets computed suspiciousness for (1) indi-
vidual CTR transactions, (2) individual CMIR
transactions, (3) the CTR activity of a bank
account, (4) the CTR activity of an individual
or a business, (5) the CMIR activity of an
individual or a business, and (6) the com-
bined CTR and CMIR activity of an individu- Analyst Using FinCen’s Computer Systems to Find Potential Money Launders.
al or a business. The semantic equivalent of
the CAIS rules was reimplemented for FAIS. This Each rule contributes positive or negative evi-
process was fairly straightforward because dence that the transaction, subject, or
both development tools use similar models of account is suspicious or legitimate, respec-
expert system technology. Some simpli- tively. The evidence from each rule is com-
fications of the rule sets were made, resulting bined in a simple Bayesian fashion to come
in FAIS having just 336 rules and providing up with a single suspiciousness rating for the
better execution and easier maintainability. transaction, subject, or account. High suspi-
Recognizing that a large number of the expert ciousness scores are then reported to the ana-
rules essentially implemented a simple table lysts for further investigation.
lookup, we were able to replace many of Interactive Query Interface FINCEN’s
these rules with a C function. Some of the computing environment consists primarily of
rule sets actually increased in number because IBM-compatible personal computers running
of a more explicit representation of the evi- DOS and Microsoft WINDOWS. Because of the
dence combinations. The suspiciousness eval- possibility that FAIS would need to be avail-
uation module consists of 8000 lines of NEX- able to additional users, it was extremely
PERT code, 1300 lines of SQL code, and 2000 desirable to have a user interface that could
lines of C. run on either a UNIX workstation or a PC.
Each rule set looks for various indications Neuron Data’s OPEN INTERFACE was selected as
of financial activity characteristic of money the development tool for the graphic user
laundering. Heuristic knowledge is also used interface to minimize the effort of porting the
to interpret the free-text occupation- and interface. The interactive query interface con-
business-type fields from the forms. These sists of about 25,000 lines of C code in addi-
heuristics were developed based on the actual tion to the OPEN INTERFACE resource files and
values observed in this field. Other rules libraries.
search for patterns of activity associated with The interactive quer y interface was
specific money-laundering techniques such as designed in response to the needs of users
smurfing, which is making transactions for who wanted to view disjoint but related sets
amounts just under the $10,000 reporting of data simultaneously while potential leads
threshold in an attempt to avoid a CTR filing. in the database were searched. Screen forms

WINTER 1995 27
Articles

Laundering Money

28 AI MAGAZINE
Articles

A Large Cash Transaction.

are used to formulate queries into a database. dow environment facilitates the conceptual-
Data retrieved from the database are dis- ization of linkages between seemingly dis-
played as a list in an output window. The joint subject matter. The NETMAP- and NEXPERT
output list serves as a starting point for fur- OBJECT–based link-analysis and suspiciousness
ther investigation. The output window pro- evaluation modules, which can be invoked
vides a pull-down menu in which the user through menu selections in the output
can request further information or perform screen, provide additional information that
further actions on a selected subset of the can aid the user in this conceptualization
output list. A user can request a more detailed task. The ability to view data simultaneously
view of an item in the list; this information, in a compartmentalized manner enables the
often in list form, is displayed in a separate user’s investigative process and is facilitated
window. Additional windows are created by by the object orientation of OPEN INTERFACE.
retrieving increasingly detailed information Users enter the system by selecting the
(or retrieving additional related information) data-driven or the user-directed mode from a
on the initial set of data. The multiple-win- main menu. Data-driven mode brings up the

WINTER 1995 29
Articles

ations menu, the user then views all subjects


associated with BUSINESS-8431 in another
window, which includes the original busi-
ness, BUSINESS-8431, and 18 additional busi-
nesses and persons that appear on any trans-
actions along with BUSINESS-8431. Next, the
user selects four of the subjects from this
list—PERSON-640, PERSON-2951, and two
others—and requests a list of all their transac-
tions. A user can continue this link-tracing
process indefinitely, by either subjects or
accounts, until a trail is completed or
exhausted. The user is responsible for keeping
track of where he or she is in the set of linked
windows, but tracking is made easier with a
hierarchical display of all active windows.
Link Analysis The Alta Analytics NETMAP
link-analysis package (Davidson 1993) was
selected and integrated with the custom FAIS
system components; it is a powerful visualiza-
tion tool that exploits the human analyst’s
superior ability to recognize patterns, and it
effectively accommodates much larger sets of
nodes and connections in its “wagon-wheel”
display than is possible with the more tradi-
tional law enforcement “link-and-edge” charts.
FINCEN analysts use both types of representa-
Figure 6. Data-Driven Mode.
tion. The wagon-wheel display is useful during
window shown in figure 6. The user selects a the analysis process when one is exploring sets
score threshold above which to examine sub- of links; the link-and-edge display is useful for
jects. Person or organization subject types can presentations of fully developed analyses. Fig-
be specified. Other thresholds, such as the ures 9 and 10 provide examples of these two
number of filings or the number of transac- types of display. These figures are reproduc-
tions by a subject, can also be used to elimi- tions of portions of actual intelligence reports
nate subjects from the list. Filters in the dis- produced by FAIS , with all identifying data
play, which use the flags in the database, removed. They illustrate the users’ ability to
allow users to ignore previously examined or continue the linkage discovery and significan-
known legitimate subjects. Alternatively, the ce evaluation processes in greater detail as they
user-directed mode, as depicted in figure 7, focus on smaller data sets.
allows a user to construct a query based on A user invokes NETMAP with a selection of
information items from the transactions, subjects or accounts. All transactions and
including form type. The actual SQL query can associated information from these transac-
be viewed as it is constructed incrementally. tions are loaded into NETMAP from the FAIS
The query returns a set of transactions, orga- database. The interface to NETMAP required
nized by subject or account, which the user 400 lines of C code. The user explores this
selects from the View menu. information, selecting those items relevant to
In either mode, the user examines the a particular case and possibly merging some
results of the query in several windows, mov- subjects that the data-driven consolidation
ing among them as dictated by his or her left separate.
interest and analysis results as depicted in Hardware and System Software Envi-
figure 8. (In figure 8, all identifying informa- ronment FAIS hardware and system soft-
tion was replaced with generic identifiers to ware currently consist of Sun servers and
protect the privacy of the actual subjects.) In workstations running the SOLARIS 2.3 operat-
this example, the data-driven query returns a ing system. The Bank Secrecy Act data are
list of subjects, from which the user chooses stored in SYBASE on a 6-processor SPARCCENTER
subject 8431, a business, which received a 2000 with 768 megabytes (MB) of memory
high suspiciousness score (that is, 150) and and 88 GB of disk storage, with 70 GB avail-
has 72 CTRs totaling over $2.7 million in the able for data. Because the SYBASE SQL server
year ending 1 January 1995. From the Associ- runs on this machine and is the bottleneck

30 AI MAGAZINE
Articles

for large searches, as many other application


modules as possible have been distributed to
other workstations. One workstation is a
development SQL server, a second is a file serv-
er for application code, and others are NEXPERT
OBJECT – SMART ELEMENTS 2.0 and NETMAP 3.63
servers. The user workstations are SPARCSTA-
TIONS (2s and 5s) configured with 32 to 48 MB
of memory and 400 MB to 1 GB of disk space.
Release 1 of FAIS operated on a Sun 4/490 serv-
er with 288 MB of memory, 20 1.3-GB disks,
and 5 controllers.

Uses of AI Technology
As discussed earlier, FAIS is an example of the
use of AI as an essential enabling technology
for components in a complex information
system. FAIS’s use of rules and of a blackboard
differs from the original use of these ideas in
AI. The FAIS Project also yielded insights into
the difficulties of applying case-based reason-
ing and other machine-learning techniques
to this type of task. FAIS’s rule base is interest-
ing because it is literally second generation.
Finally, FAIS is interesting because of its appli-
cation domain and its link-analysis task. FAIS
differs from previously reported financial-
monitoring systems such as INSPECTOR (Byrnes
et. al. 1990) and large data-analysis systems Figure 7. User-Directed Mode.
such as SPOTLIGHT (Anand and Kahn 1992)
because of the need to link transactions based
on uncertain and imprecise identification computer problem-solving system. The human
information. and software agents cooperate through the
database. As we gain insights into how the
Differences from Expert Systems users perform their tasks, some of these func-
Explicit knowledge is used in three compo- tions will be automated.
nents of FAIS in its current design. The suspi- The tasks that FAIS performs are significantly
ciousness evaluation rules are the primary different from tasks traditionally thought
repository of knowledge in FAIS. The consolida- amenable to the expert system approach
tion algorithm in the data load programs and (Hayes-Roth, Waterman, and Lenat 1983) in
the occupation decoding in the suspiciousness several ways. Most important, FAIS attempts to
evaluation components are also knowledge perform a task that was not performed at all
based. This knowledge is applied according to prior to the existence of this system. There
a predefined control path; it is not selectively was no computing infrastructure to link trans-
invoked based on particulars of a specific prob- actions automatically. Even if this infrastruc-
lem instance. This global invocation of knowl- ture had been available, the automated evalu-
edge is necessary because these parts of FAIS’s ation of suspiciousness—which is the expert
task must evaluate all incoming data to pre- system–like part of FAIS—could not have been
pare it for the rule-based suspiciousness evalu- performed manually simply because of the
ation. Finally, the search model embodied in large data volume involved. The primary goal
the user-directed concept of operations is the of FAIS’s development, therefore, was to enable
result of the acquisition of procedural knowl- the performance of this task and provide the
edge. Instead of embedding this procedural associated operational benefits rather than to
knowledge for use solely by the system in increase productivity, save money, speed up
problem solving, this knowledge is used by the decisions, improve decision quality, or retain
expert user to reason heuristically through or distribute scarce expertise.
his/her own searches. The users are intelligent Another difference is that there are no
agents in the context of a mixed human and clearly provable experts for this process,

WINTER 1995 31
Articles

Figure 8. Examining Results with the Interactive Query Interface.

although there are analysts experienced in human can perform a task that neither could
working with Bank Secrecy Act data who perform alone. FAIS does not process individu-
have a detailed understanding of suspicious- al transactions against a database. Instead, it
ness indicators. These analysts have differing (re)evaluates the suspiciousness of each sub-
perspectives on what factors make a set of ject and account in the database as it receives
transactions suspicious. These differing per- new evidence (that is, additional relevant
spectives do not need to be resolved and transactions). Finally, FAIS does not perform
made consistent in favor of some (possibly extensive reasoning with a large set of con-
nonexistent) ground truth; rather, they need cepts to perform one specific task; rather, it
to be combined appropriately and evaluated combines evidence from multiple perspec-
systematically. A large part of the knowledge tives at various points in a multistep process.
engineering in this domain consisted not of
making explicit the problem-solving behavior Database as a Blackboard
and knowledge of expert analysts but rather It is important to note how the use of the
of conducting experiments on the data them- blackboard in FAIS differs from the use of tradi-
selves to test the intuition of these analysts tional blackboard systems, such as those
about the actual data. described in Engelmore and Morgan (1988).
FAIS attempts to provide assistance to ana- First, all input data are loaded into the
lysts; the combination of computer and database, and all accepted-level consolidations

32 AI MAGAZINE
Articles

Figure 9. Wagon-Wheel Link.

are performed. The resulting subject and a human user is in the loop. More important,
account clusters, and their derived data, result the prepopulation of the database with clus-
from the application of knowledge across the ters allows the users to shift their focus freely
entire blackboard without waiting for any from transactions to subjects or accounts and
other part of the system to request it. This back again, as their investigations warrant.
global application of knowledge is necessary Unlike traditional uses of a blackboard to
because of performance considerations when control a specific problem solution, the FAIS

WINTER 1995 33
Articles

Figure 10. Link-and-Edge Display.

blackboard controls multiple problem-solu- ble rule sets, special-purpose consolidation


tion instances interleaved over a long time modules, and other forms of reasoning (for
period, during which additional relevant data example, case based) that might have limited
can arrive randomly. The data volume and applicability, the blackboard will take on a
temporal aspects dominate the choice of more traditional flavor with a variety of rep-
implementation. Whereas traditional black- resentations, describing portions of the
board systems build, use, and then discard database to varying degrees.
the data relevant to a particular problem
instance, FAIS must provide continuity over Case-Based Reasoning and
time, serving as an institutional memory for Machine Learning
multiple investigations, and allow for the Case-based reasoning and other machine-
possibility of connecting separate investiga- learning techniques were explored during the
tions. Because FAIS integrates intelligent soft- development of this system.6 These efforts
ware and human agents in a cooperative dis- were complementary to the main system
covery task on a ver y large data space, development effort and were pursued with
temporal and performance issues—which are the intent of being added to the overall sys-
addressed by database technology—dominate tem if they were successful. Although they
the system design. are not currently included in the operational
Currently, the rule-based suspicion evalua- system, we do anticipate using them in future
tion module also runs across the entire black- versions after the issues identified during
board to provide rapid queries of scores to the these efforts are resolved. These efforts are
users. Thus, the data-driven–analysis search is discussed here because they provide insights
breadth first rather than depth first. As we into the utility of these AI techniques for a
introduce more refined and narrowly applica- specific application.

34 AI MAGAZINE
Articles

Several problems arose in our attempt to lion consolidated subjects and 2.5 million
use a commercial case-based reasoning shell. accounts. These 20 million include all trans-
Case-based reasoning required that we define actions that were received from January 1993
an appropriate set of characteristics to repre- through December 1994 as well as selected
sent cases. Although knowledge engineering transactions that occurred during 1992. On
identified a candidate set, these characteris- average, approximately 200,000 transactions
tics are not explicitly represented in the FAIS are added each week. A dedicated group of
database. The computational power to derive intelligence analysts is engaged full time in
these features in data-driven mode from all reviewing, validating, and pursuing potential
transactions is not yet available to us. Even leads generated by the system. They also pro-
deriving these features for some transactions vide leads to other FINCEN analysts for fol-
for evaluation purposes was difficult because low-up investigations. These analysts have as
the features are not clearly specified in terms their primary responsibility the analysis of
of the data; some require additional domain Bank Secrecy Act data for suspiciousness. An
knowledge. Case-based reasoning shells are additional responsibility is to serve as the pri-
based on a flat-feature vector; they are unable mary sources of knowledge for system devel-
to describe the more complex data structures opment. Currently, there are three full-time
that are required to represent money-launder- analysts, but there have been as many as five.
ing schemes. The basic ideas of case-based These users have been augmented at times by
reasoning (that is, nearest-neighbor matching other FINCEN analysts who used the oppor-
and inductive retrieval) appeared useful for tunity to learn about the FAIS system and
parts of the task but could not be stripped out work on specific projects involving Bank
of a commercial case-based reasoning shell, Secrecy Act data.
and the overhead involved in incorporating The analysts use both the data-driven and
the commercial case-based reasoning shell the user-directed modes of FAIS. The data-driv-
was significant. At the time this effort was en mode is used to select those subjects or
performed, FAIS was not yet operational; so, a accounts that display a relatively high suspi-
reasonably sized set of clearly labeled positive ciousness score. The analysts then further
examples of suspicious activity in the Bank evaluate the subjects or accounts through
Secrecy Act database was not available. Final- research and analysis of the financial data
ly, case-based reasoning shells do not scale to and other source data for development into a
the size required for this task. valid lead. FAIS reviews, processes, and evalu-
A more direct approach to applying the ates each Bank Secrecy Act filing for the ana-
machine-learning ideas of nearest-neighbor lysts to such a degree that the intense effort
retrieval and inductive building of decision and the time expended in the pre-FAIS envi-
trees was also explored. The lack of labeled ronment are no longer needed. The lead is
examples was the major obstacle to using then fully researched and analyzed for dis-
these techniques. Unsupervised learning algo- semination to the appropriate law enforce-
rithms were considered, but the difficulties in ment agency. These agencies provide FINCEN
deriving appropriate features on which they with feedback regarding the use of the infor-
would operate made these techniques infeasi- mation generated by the system. In one early
ble. These difficulties were exacerbated by the evaluation, about half the subjects identified
poor data quality and the need for additional by the system were already known to the
background knowledge. It was discovered field agency conducting the investigation,
that these techniques are potentially useful as and the unknown subjects exhibited similar
knowledge engineering aids to conduct behavior. This evaluation of the system was
experiments with the data. In one test, we favorable, showing both credibility and utili-
used induction to create a decision tree with ty; if it had identified only unknown subjects,
a limited data set based on 40 features iden- it would have lacked credibility, but if it had
tified during knowledge engineering. Analysts identified only existing subjects, it would
then examined the decision trees to deter- have lacked utility.
mine how useful the various heuristic fea- In the user-directed mode, the analysts set
tures were as indicators of suspiciousness. specific criteria in support of a request by a
law enforcement agency, a request from other
groups within FINCEN, or a self-initiated pro-
Application Use and Payoff ject. A project can contain numerous hits
FAIShas been in use since March 1993. As of that fit the specified criteria, but the hits
January 1995, 20 million transactions had might not necessarily be related to one
been entered and linked, resulting in 3.0 mil- another. Each subject on the hit list contains

WINTER 1995 35
Articles

the legitimate transactions is extremely useful


to the Department of Treasury in support of
Year Reports Subjects
the Bank Secrecy Act Compliance Program. It
______________________________________
is considered highly probable that these busi-
1993 27 276
nesses should be on a financial institution’s
1994 75 403
exemption list.
1995 (partial) >300 >1000

Application Development and


Table 1. Leads Resulting from FAIS.
Deployment
The development team consisted of seven
a suspiciousness score that directs the ana- technical staff members, most of whom had
lysts immediately to the subjects with the additional responsibilities. Development
higher degree of suspect financial activity. costs consisted of their salaries and the acqui-
Although user-directed analyses did take sition of the hardware and software tools.
place in the pre-FAIS environment, the time Because FINCEN was a new agency, we had to
for a typical proactive query was reduced acquire resources and hire staff at the same
from about one day to less than one hour. As time we were developing the system. The
in the data-driven mode, the subjects are fur- entire team was not in place until the late
ther evaluated through research and analysis. spring of 1992. Computers for the program-
As the analysts have gained experience ming staff, off-the-shelf software compo-
with the system, it has become more produc- nents, training in SYBASE, NEXPERT OBJECT, and
tive. Table 1 summarizes reports by year OPEN INTERFACE, and a server large enough to
(through April 1995) in terms of the number hold a meaningful data set were also not in
of reports produced and the number of sub- place until about June 1992.
jects identified. These reports correspond to In the mid-1980s, the Customs Service
over $1 billion in potential laundered funds. developed a system to address the task cur-
Feedback and liaison with customers play rently performed by FAIS. This system, CAIS,
an important role. The information that we was inherited by FINCEN when it was formed
are gathering is useful for knowledge base in 1990. CAIS was designed for the volume of
evaluation. Opened investigations resulting transactions typical in the mid-1980s. It ran
from leads previously unknown to law on Apollo workstations under the AEGIS oper-
enforcement suggest the value of looking for ating system and incorporated commercial
other subjects that display the same type of off-the-shelf software that was no longer sup-
behavior. Since March 1993, FINCEN has ported or available on current hardware and
received 109 feedback forms from outside operating systems in 1990. It was decided
agencies in addition to feedback from in- that the only way to update CAIS to handle
house investigations. Over 90 percent of the the vastly increased transaction volume was
feedback indicates either new cases opened or to rebuild it in a new hardware and software
relevance to ongoing investigations. A recent environment. Table 2 lists key FAIS develop-
feedback form notified us of the first closed ment milestones.
case resulting from a lead generated by the Initial planning for FAIS began in early
system and follow-up investigation, prosecu- 1991. This planning included the collection
tion, and conviction. The appropriate follow- and analysis of requirements, the develop-
up to those cases for which we have not ment of the conceptual system architecture
received feedback will be conducted to obtain and the data model, and the evaluation and
a more accurate picture of the value of the selection of hardware and off-the-shelf soft-
leads disseminated. ware tools for system development. Proce-
Another benefit of FAIS is that it has allowed dures and programs for providing the data
analysts to see the Bank Secrecy Act data as from the U.S. Customs Data Center to FIN-
they have not been seen before. Queries CEN were developed during 1991, and an
against the FAIS database have yielded insights extraction from the financial database in TECS
useful for Bank Secrecy Act policy decisions, of the entire historical Bank Secrecy Act
form redesigns, and identification of required database was performed so it would be avail-
compliance actions. The analysts have been able for system development and operations.
able to determine which data elements are The C A I S system was reevaluated, and
highly useful in investigative support func- improvements were suggested. A major
tions versus the data that are not. In turn, design review took place in March 1992, at
identification of businesses that are linked to which point the requirements for release 1.0

36 AI MAGAZINE
Articles

Jan. 1991 Initial design and planning, Bank Secrecy Act data transfer and
data model design in progress
May 1991 Data model finalized
June 1991 Data sweeps of Bank Secrecy Act data in progress
Oct. 1991 Data-load program completed
Dec. 1991 Initial workstations configured
March 1992 Design review, overall system architecture approved
June 1992 Sun 490 server configured, user interface development started
Sept. 1992 NETMAP and user interface integrated, data updates being loaded
March 1993 Release 1.0 operational
Jan. 1994 Release 1.1 operational
Dec. 1994 Release 2.0 operational

Table 2. FAIS Development Milestones.

and the overall system architecture and the Maintenance


data model design were approved.
Development of FAIS began in earnest in Initial management direction was to provide
June 1992. An early release of the user inter- an operational capability as soon as practical.
face with a limited data set was delivered in To meet this goal, it was decided to reimple-
September 1992. This delivery also included ment the suspiciousness evaluation rule bases
the suspiciousness evaluation module and the that had been part of CAIS and concentrate
NETMAP link-analysis module. Release 1.0 was development resources on the overall system.
deployed to users in March 1993. Release 1.1 Most of the development effort was focused
was deployed in January 1994. Continued on building the tools for handling the large
system development resulted in release FAIS database. In the early phases, knowledge
2.0—which contained a better user interface; engineering concentrated on the acquisition
additional aggregates identified during sys- of procedural knowledge necessary for the
tem use and evaluation; and increased perfor- user-directed mode, the linking of related
mance and storage resulting from a port to transactions, and the interpretation of data
larger, faster computers and version updates uncertainties.
to the system software packages. As the system evolved, the early emphasis
Because of the close ties between develop- on deployment of operational capability
ers and users, deployment of the system shifted to performance improvement. Knowl-
occurred incrementally. During development, edge engineering focused on identifying addi-
users were able to look at work in progress tional indicators of suspiciousness and evalu-
and make suggestions for improvements. As ating the effectiveness of differing methods of
soon as a component was ready and tested, it combining these indicators. To this end, a
was integrated and made available to the number of special-purpose data-screening
users. Because developers are readily available queries were run and their results evaluated
to fix problems, we are able to provide new as if they had come through the data-driven
capabilities and fixes almost immediately, side of the system. The intent is to develop
allowing us to try out promising ideas before each successful screen into a small rule-based
they are completely verified. User hardware is knowledge source that can contribute to the
essentially identical to developer hardware; overall system by posting suspiciousness indi-
we share the same network and system cators onto the database-blackboard. We
administrators. System operation—that is, the designed the underlying database to allow
data-driven tape copying, data loading, easy extensibility of the derived attributes (for
extension building, and suspiciousness evalu- example, aggregates) on which these rules
ating—is also performed by the development operate. We found it is important to develop
staff. These close ties also allowed us to forgo such knowledge sources in the context of the
a number of cosmetic fixes and features until entire database. Early efforts to look at man-
later releases. The availability of developers to ageable subsets of the data invariably led to
work with a system “in progress” meant that skewed results and were not applicable to the
release 1.0 could be developed and deployed overall task of nationwide screening.
faster. The current version 2.0 of FAIS has been The system is still under development, and
in use since December 1994. maintenance is performed by the developers.

WINTER 1995 37
Articles

Because the underlying domain will continue on the use of advanced computing technolo-
to change—in response to law enforcement gy to aid in the detection and analysis of
successes and changes in the financial system financial crimes, for his unwavering support,
itself—the knowledge bases will never be confidence, assistance, and insights, without
finished; they will have to evolve continually whom this system never would have been
to keep pace with changes in money-launder- developed. We also want to thank the current
ing techniques and in the Bank Secrecy Act director of FINCEN, Stanley E. Morris, who
forms. Some maintenance is shifting to the immediately recognized the value of FAIS not
analysts as they acquire training in tools such only for generating leads but also for aug-
as NEXPERT and SQL. The knowledge bases con- menting regulatory and compliance pro-
tain some of FINCEN’s most sensitive knowl- grams, whose continued support has been
edge regarding money laundering and our essential to the expanded use and develop-
intelligence sources and methods. Also, mon- ment of FAIS.
ey laundering and Bank Secrecy Act data are a
complex domain that requires significant
Notes
time to learn. Maintaining the knowledge 1. The authors of this article are employees of the
bases with dedicated in-house staff provides Financial Crimes Enforcement Network of the U.S.
Department of the Treasury, but this article in no
the required security and continuity neces-
way represents an official policy statement of the
sary for these tasks. U.S. Treasury Department or the U.S. government.
Because specialized expertise regarding The views expressed here are solely those of the
money laundering is distributed among all authors. This article implies no general endorse-
FINCEN analysts, we are developing proce- ment of any of the particular products mentioned
dures for incorporating this wide range of in the text.
knowledge into the system. The design of the 2. The Bank Secrecy Act is outlined in 12 U.S.C.
suspiciousness evaluation modules, with indi- sections 1730d, 1829b, 1951–1959, and 31 U.S.C.
vidual rule sets addressing specific money- sections 5311–5326.
laundering indicators, will facilitate the 3. Cash transactions at nonfinancial businesses are
incorporation of additional indicators. These reported under 26 U.S.C. section 6050I to the Inter-
mechanisms could be as simple as using the nal Revenue Service (IRS) on Form 8300, the Report
user-directed mode to search for subjects of Cash Payments over $10,000 Received in a Trade
or Business. As of November 1992, law enforce-
meeting criteria that indicate a newly iden-
ment agencies other than the IRS no longer have
tified money-laundering technique. If a par- access to this information. FAIS is designed to
ticular technique appears to be widespread, accommodate these reports if they once again
additional rule sets could be developed and become more widely available to law enforcement.
incorporated into the suspiciousness evalua- 4. Depending on the assumptions regarding what
tion module to routinely evaluate all filings types of linkage are allowed, the complexity can
for these techniques. scale proportionally to the number of partitions or
A key aspect of FAIS maintenance involves subsets.
tracking and evaluating the disposition of 5. As in most AI applications with large search
potential leads generated by the system. spaces, massive computing power is another poten-
Because of the time required for investiga- tial solution.
tions and prosecutions, we are not yet able to 6. This work was performed by Cognitive Systems,
collect comprehensive data. It is intended Inc., and Ascent Technology, Inc., respectively.
that feedback from FINCEN’s customer agen-
cies be used to guide the continued evolution References
of the knowledge bases. Anand, T., and Kahn, G. 1992. Making Sense of
Gigabytes: A System for Knowledge-Based Market
Acknowledgments Analysis. In Innovative Applications of Artificial Intel-
ligence 4, eds. A. C. Scott and P. Klahr, 57–69. Menlo
The authors would like to acknowledge the
Park, Calif.: AAAI Press.
contributions of all their colleagues at FIN-
Andrews, P. P., and Peterson, M. B., eds. 1990.
CEN who aided in the development of FAIS or
Criminal Intelligence Analysis. Loomis, Calif.: Palmer
contributed to its knowledge bases. We would Enterprises.
also like to thank the staff members of the
Byrnes, E.; Campfield, T.; Henry, N.; and Waldman,
U.S. Customs Data Center at Newington, Vir- S. 1990. INSPECTOR: An Expert System for Monitor-
ginia, who consistently and generously pro- ing Worldwide Trading Activities in Foreign
vide us with the data that drive the system. Exchange. In Proceedings of the Second Annual Con-
Most importantly, we would like to thank the ference on Innovative Applications of Artificial Intelli-
retired founding director of FINCEN, Brian gence, 16–20. Menlo Park, Calif.: AAAI Press.
Bruh, who had the vision to actively champi- Davidson, C. 1993. What Your Database Hides

38 AI MAGAZINE
Articles

Away. New Scientist 1855:28–31. Umar Khan is senior technical


Engelmore, R., and Morgan, T., eds. 1988. Black- manager at FC Business Systems.
board Systems. Reading, Mass.: Addison-Wesley. He was formerly a senior software
engineer in FINCEN’s Systems
Goldberg, H. G., and Senator, T. E. 1995. Restruc-
Development Division. He holds
turing Databases for Knowledge Discovery by Con-
a B.S. in computer science from
solidation and Link Analysis. In Proceedings of the
the University of Maryland. His
First International Conference on Knowledge Dis-
current research interests are in
covery in Databases (KDD-95), 136–141. Menlo
ethical reasoning and knowledge
Park, Calif.: AAAI Press.
discovery in databases.
Hayes-Roth, F.; Waterman, D. A.; and Lenat, D. B.,
eds. 1983. Building Expert Systems. Reading, Mass.:
Addison-Wesley. Christina Klinger is a software
engineer in FINCEN’s Systems
Wall Street Journal. 1993. “Tax Report.” The Wall
Development Division. She
Street Journal, 1 December, 1.
received a B.S. in computer sci-
ence and business administration
from Mary Washington College
in 1989.

Ted Senator is the chief of the


Systems Development Division at Winston Llamas is a software
FINCEN. He holds an S.B. in engineer in FINCEN’s Systems
physics and electrical engineering Development Division. He
from the Massachusetts Institute received a B.S. in computer sci-
of Technology. He has performed ence from Rensselaer Polytechnic
graduate work in physics and Institute in 1984 and an M.S. in
computer science. In the mid- computer science from George
1980s, he managed the U.S. Mason University in 1990. His
Navy’s application of the Advanced Research Pro- technical interests include
jects Agency Strategic Computing Initiative. He machine learning and human-computer interac-
serves on the program committees for the Innova- tion.
tive Applications of AI and Knowledge Discovery
and Data Mining conferences. His technical inter-
Michael Marrone is a software
ests include technology management, AI applica-
engineer in FINCEN’s Systems
tions, intelligent system engineering, and knowl-
Development Division. He
edge discovery in databases.
received a B.S. in computer sci-
ence from the University of Notre
H e n r y G o l d b e r g is a senior Dame in 1984 and an M.S. in
computer scientist in FINCEN’s computer science from the Uni-
Systems Development Division. versity of Maryland in 1986. He
He holds a B.S. in mathematics codeveloped a model-based fault-
from the Massachusetts Institute diagnosis system called I-CAT and previously worked
of Technology and a Ph.D. in at the Naval Center for Applied Research in
computer science from Carnegie Artificial Intelligence. His technical interests
Mellon University, where he include knowledge-based systems and parallel pro-
worked on the HEARSAY-II Speech- gramming.
Understanding Project. Prior to FINCEN, he
worked as a senior research scientist at the Federal
Raphael Wong is a senior soft-
Judicial Center. His technical interests include
ware engineer in FINCEN’s Sys-
hybrid AI database systems, knowledge discovery
tems Development Division. He
in databases, and cooperative human-machine
holds a B.S. in electrical engineer-
intelligent systems.
ing from the University of Hawaii
and an M.S. from the Catholic
Jerry Wooten and Matt Cottini are senior intelli- University of America. He holds a
gence research specialists in FINCEN’s Office of Tac- patent on “Microprocessor Board
tical Operations. They are the chief users of FIN- for Monitor/Control of Commu-
CEN’s AI system. They also serve as the primary nication Facilities” and is a registered professional
experts for system requirements, knowledge base engineer. Prior to FINCEN, he performed AI
devel- opment, testing, and evaluation. research at the MITRE Corporation and nuclear
electromagnetic pulse research at the U.S. Army
Harry Diamond Laboratories.

WINTER 1995 39

You might also like