Professional Documents
Culture Documents
The Financial Crimes Enforcement Network AI System (F)
The Financial Crimes Enforcement Network AI System (F)
Articles
■ The Financial Crimes Enforcement Network (FIN- port of federal, state, and local law enforce-
CEN) AI system (FAIS) links and evaluates reports ment. A key data source available to FINCEN
of large cash transactions to identify potential is reports of large cash transactions made to
money laundering. The objective of FAIS is to dis- the Treasury according to terms of the Bank
cover previously unknown, potentially high-val- Secrecy Act.2
ue leads for possible investigation. FAIS integrates FINCEN has developed a system, called the
intelligent human and software agents in a coop-
FINCEN AI System ( FAIS ), which links and
erative discovery task on a very large data space.
It is a complex system incorporating several
evaluates all reported transactions for indica-
aspects of AI technology, including rule-based tions of suspicious activity characteristic of
reasoning and a blackboard. FAIS consists of an money laundering, with the objective of iden-
underlying database (that functions as a black- tifying previously unknown, potentially high-
board), a graphic user interface, and several pre- value leads for follow-up investigation and, if
processing and analysis modules. FAIS has been in warranted, prosecution (Wall Street Journal
operation at FINCEN since March 1993; a dedi- 1993).
cated group of analysts process approximately FAIS integrates intelligent software and
200,000 transactions a week, during which time human agents in a cooperative discovery task
over 400 investigative support reports corre-
on a very large data space. It is a complex sys-
sponding to over $1 billion in potential laun-
dered funds were developed. FAIS’s unique analyt-
tem incorporating several aspects of AI tech-
ic power arises primarily from a change in view of nology, including rule-based reasoning and a
the underlying data from a transaction-oriented blackboard. FAIS consists of an underlying
perspective to a subject-oriented (that is, person database, a graphic user interface, and several
or organization) perspective. preprocessing and analysis modules. The
T
he Financial Crimes Enforcement Net- database functions as a blackboard and is
work (FINCEN) is a relatively new agen- implemented in SYBASE . The graphic user
cy (founded in 1990) of the U.S. Trea- interface is implemented in Neuron Data’s
sury Department whose mission is to OPEN INTERFACE. The suspiciousness evaluation
establish, oversee, and implement policies to module is a rule-based reasoner implemented
prevent and detect money laundering in sup- in Neuron Data’s NEXPERT OBJECT (now called
Copyright © 1995, American Association for Artificial Intelligence. All rights reserved. 0738-4602-1995 / $2.00 WINTER 1995 21
Articles
Task Description
The most common motivation for criminal
behavior is profit. The larger the criminal
organization is, the greater the profit. By dis-
rupting the ability to profit, law enforcement
can focus on a vulnerable aspect of large
criminal organizations. Money laundering is a
complex process of placing the profit, usually
cash, from illicit activity into the legitimate
financial system, with the intent of obscuring
the source, ownership, or use of the funds.
Money laundering, previously viewed as an
ancillary offense, is today a primary offense
in its own right. Money laundering makes it
possible for drug dealers, terrorists, arms deal-
ers, and others to operate and expand their
criminal enterprises. Left unchecked, it can
erode the integrity of financial institutions.
Figure 1. The Currency Transaction Report (CTR).
Money laundering typically involves a multi-
SMART ELEMENTS ). Alta Analytics’ NETMAP pro- tude of transactions, perhaps by distinct indi-
vides a link-analysis module. Other FAIS pro- viduals, into multiple accounts with different
grams, which asynchronously load and pre- owners at different banks and other financial
process the data, are written in SQL and C. FAIS institutions. Detection of large-scale money-
runs on a network of Sun servers and work- laundering schemes requires the ability to
stations under the UNIX operating system. reconstruct these patterns of transactions by
FAIS has been in operation at FINCEN since linking potentially related transactions and
March 1993, supporting a dedicated group of then to distinguish the legitimate sets of
analysts and processing approximately transactions from the illegitimate ones. This
200,000 transactions a week. FAIS operates in technique of finding relationships between
two modes: (1) data driven and (2) user di- elements of information, called link analysis,
rected. Over 400 investigative support reports is the primary analytic technique used in law
have resulted from using the system, reflect- enforcement intelligence (Andrews and Peter-
ing transactions on the order of $1 billion in son 1990).
potential laundered funds. FAIS development To combat money laundering, the Bank
is continuing to remain current with changes Secrecy Act requires the reporting of cash
in money-laundering techniques and transactions in excess of $10,000. This record
statutes, increase its effectiveness, add fea- keeping preserves a financial trail for investi-
tures, and support FINCEN’s policy and regu- gators to follow and allows the government
latory responsibilities as well as provide to scrutinize systematically large cash transac-
detection and investigative support. tions. These transactions are reported by
22 AI MAGAZINE
Articles
financial institutions, casinos, and individu- cash transactions. They cannot, however,
als entering or leaving the country. Transac- search, sort, or link the forms according to
tions at financial institutions, which include complex sets of criteria.
traditional institutions such as banks and The data reported on the forms are subject
nontraditional institutions such as Casas de to errors, uncertainties, and inconsistencies
Cambio, are reported on Internal Revenue that affect both identification and transaction
Service (IRS) Form 4789, the currency transac- information. Simple data-entry errors can be
tion report (CTR), which is partially repro- the result of difficulties in reading handwrit-
duced in figure 1. 3 Individuals entering or ten forms or keypunching errors. More com-
leaving the country are required to file a plex difficulties arise from other aspects of
report of international transportation of currency the forms. Free text fields, such as that con-
or monetary instruments (CMIR) with the U.S. taining a business type or occupation, are not
Customs Service. CMIRs are also required standardized, resulting in a variety of descrip-
when cash or monetary instruments (for tions. The variety of linguistic and ethnic
example, traveler’s checks) are shipped into types, especially on CMIR forms and for per-
or out of the country. Casinos file the currency sonal names, also makes the data difficult to
transaction report by casinos (CTRC), which is a interpret. Not all fields are filled out on all
variant of the basic CTR. forms. The filer can accept any of several
Approximately 10 million transactions are forms of identification (for example, social
reported each year; over 90 percent are CTRs. security number, driver’s license number).
In 1993, these transactions amounted to The information provided on each form type
approximately $500 billion. These amounts is not completely equivalent. All these factors
have been increasing continually, as illustrat- make it extremely difficult to reconstruct the
ed in figure 2. Forms are entered into the patterns of transactions.
Treasury’s financial database, which is main- Because of the volume of forms received,
tained in two mainframe-hosted database sys- the number and variety of fields on the
tems: (1) the Treasury enforcement communi- forms, and the quality of the entries on the
cations system ( TECS ) operated by the U.S. forms, it is infeasible for human analysts to
Customs Service and (2) the currency bank- review all forms even on an individual
ing regulatory system operated by the IRS. unlinked basis. Linking the forms together to
These systems are used by law enforcement review sets of related transactions for indica-
for responses to general or specific queries. tions of money laundering is impossible
These systems are extremely useful for sup- without the use of advanced computing tech-
porting existing investigations and conduct- nology. Because the number of sets of poten-
ing strategic studies of money laundering and tially related transactions scales at least expo-
WINTER 1995 23
Articles
24 AI MAGAZINE
Articles
WINTER 1995 25
Articles
26 AI MAGAZINE
Articles
WINTER 1995 27
Articles
Laundering Money
28 AI MAGAZINE
Articles
are used to formulate queries into a database. dow environment facilitates the conceptual-
Data retrieved from the database are dis- ization of linkages between seemingly dis-
played as a list in an output window. The joint subject matter. The NETMAP- and NEXPERT
output list serves as a starting point for fur- OBJECT–based link-analysis and suspiciousness
ther investigation. The output window pro- evaluation modules, which can be invoked
vides a pull-down menu in which the user through menu selections in the output
can request further information or perform screen, provide additional information that
further actions on a selected subset of the can aid the user in this conceptualization
output list. A user can request a more detailed task. The ability to view data simultaneously
view of an item in the list; this information, in a compartmentalized manner enables the
often in list form, is displayed in a separate user’s investigative process and is facilitated
window. Additional windows are created by by the object orientation of OPEN INTERFACE.
retrieving increasingly detailed information Users enter the system by selecting the
(or retrieving additional related information) data-driven or the user-directed mode from a
on the initial set of data. The multiple-win- main menu. Data-driven mode brings up the
WINTER 1995 29
Articles
30 AI MAGAZINE
Articles
Uses of AI Technology
As discussed earlier, FAIS is an example of the
use of AI as an essential enabling technology
for components in a complex information
system. FAIS’s use of rules and of a blackboard
differs from the original use of these ideas in
AI. The FAIS Project also yielded insights into
the difficulties of applying case-based reason-
ing and other machine-learning techniques
to this type of task. FAIS’s rule base is interest-
ing because it is literally second generation.
Finally, FAIS is interesting because of its appli-
cation domain and its link-analysis task. FAIS
differs from previously reported financial-
monitoring systems such as INSPECTOR (Byrnes
et. al. 1990) and large data-analysis systems Figure 7. User-Directed Mode.
such as SPOTLIGHT (Anand and Kahn 1992)
because of the need to link transactions based
on uncertain and imprecise identification computer problem-solving system. The human
information. and software agents cooperate through the
database. As we gain insights into how the
Differences from Expert Systems users perform their tasks, some of these func-
Explicit knowledge is used in three compo- tions will be automated.
nents of FAIS in its current design. The suspi- The tasks that FAIS performs are significantly
ciousness evaluation rules are the primary different from tasks traditionally thought
repository of knowledge in FAIS. The consolida- amenable to the expert system approach
tion algorithm in the data load programs and (Hayes-Roth, Waterman, and Lenat 1983) in
the occupation decoding in the suspiciousness several ways. Most important, FAIS attempts to
evaluation components are also knowledge perform a task that was not performed at all
based. This knowledge is applied according to prior to the existence of this system. There
a predefined control path; it is not selectively was no computing infrastructure to link trans-
invoked based on particulars of a specific prob- actions automatically. Even if this infrastruc-
lem instance. This global invocation of knowl- ture had been available, the automated evalu-
edge is necessary because these parts of FAIS’s ation of suspiciousness—which is the expert
task must evaluate all incoming data to pre- system–like part of FAIS—could not have been
pare it for the rule-based suspiciousness evalu- performed manually simply because of the
ation. Finally, the search model embodied in large data volume involved. The primary goal
the user-directed concept of operations is the of FAIS’s development, therefore, was to enable
result of the acquisition of procedural knowl- the performance of this task and provide the
edge. Instead of embedding this procedural associated operational benefits rather than to
knowledge for use solely by the system in increase productivity, save money, speed up
problem solving, this knowledge is used by the decisions, improve decision quality, or retain
expert user to reason heuristically through or distribute scarce expertise.
his/her own searches. The users are intelligent Another difference is that there are no
agents in the context of a mixed human and clearly provable experts for this process,
WINTER 1995 31
Articles
although there are analysts experienced in human can perform a task that neither could
working with Bank Secrecy Act data who perform alone. FAIS does not process individu-
have a detailed understanding of suspicious- al transactions against a database. Instead, it
ness indicators. These analysts have differing (re)evaluates the suspiciousness of each sub-
perspectives on what factors make a set of ject and account in the database as it receives
transactions suspicious. These differing per- new evidence (that is, additional relevant
spectives do not need to be resolved and transactions). Finally, FAIS does not perform
made consistent in favor of some (possibly extensive reasoning with a large set of con-
nonexistent) ground truth; rather, they need cepts to perform one specific task; rather, it
to be combined appropriately and evaluated combines evidence from multiple perspec-
systematically. A large part of the knowledge tives at various points in a multistep process.
engineering in this domain consisted not of
making explicit the problem-solving behavior Database as a Blackboard
and knowledge of expert analysts but rather It is important to note how the use of the
of conducting experiments on the data them- blackboard in FAIS differs from the use of tradi-
selves to test the intuition of these analysts tional blackboard systems, such as those
about the actual data. described in Engelmore and Morgan (1988).
FAIS attempts to provide assistance to ana- First, all input data are loaded into the
lysts; the combination of computer and database, and all accepted-level consolidations
32 AI MAGAZINE
Articles
are performed. The resulting subject and a human user is in the loop. More important,
account clusters, and their derived data, result the prepopulation of the database with clus-
from the application of knowledge across the ters allows the users to shift their focus freely
entire blackboard without waiting for any from transactions to subjects or accounts and
other part of the system to request it. This back again, as their investigations warrant.
global application of knowledge is necessary Unlike traditional uses of a blackboard to
because of performance considerations when control a specific problem solution, the FAIS
WINTER 1995 33
Articles
34 AI MAGAZINE
Articles
Several problems arose in our attempt to lion consolidated subjects and 2.5 million
use a commercial case-based reasoning shell. accounts. These 20 million include all trans-
Case-based reasoning required that we define actions that were received from January 1993
an appropriate set of characteristics to repre- through December 1994 as well as selected
sent cases. Although knowledge engineering transactions that occurred during 1992. On
identified a candidate set, these characteris- average, approximately 200,000 transactions
tics are not explicitly represented in the FAIS are added each week. A dedicated group of
database. The computational power to derive intelligence analysts is engaged full time in
these features in data-driven mode from all reviewing, validating, and pursuing potential
transactions is not yet available to us. Even leads generated by the system. They also pro-
deriving these features for some transactions vide leads to other FINCEN analysts for fol-
for evaluation purposes was difficult because low-up investigations. These analysts have as
the features are not clearly specified in terms their primary responsibility the analysis of
of the data; some require additional domain Bank Secrecy Act data for suspiciousness. An
knowledge. Case-based reasoning shells are additional responsibility is to serve as the pri-
based on a flat-feature vector; they are unable mary sources of knowledge for system devel-
to describe the more complex data structures opment. Currently, there are three full-time
that are required to represent money-launder- analysts, but there have been as many as five.
ing schemes. The basic ideas of case-based These users have been augmented at times by
reasoning (that is, nearest-neighbor matching other FINCEN analysts who used the oppor-
and inductive retrieval) appeared useful for tunity to learn about the FAIS system and
parts of the task but could not be stripped out work on specific projects involving Bank
of a commercial case-based reasoning shell, Secrecy Act data.
and the overhead involved in incorporating The analysts use both the data-driven and
the commercial case-based reasoning shell the user-directed modes of FAIS. The data-driv-
was significant. At the time this effort was en mode is used to select those subjects or
performed, FAIS was not yet operational; so, a accounts that display a relatively high suspi-
reasonably sized set of clearly labeled positive ciousness score. The analysts then further
examples of suspicious activity in the Bank evaluate the subjects or accounts through
Secrecy Act database was not available. Final- research and analysis of the financial data
ly, case-based reasoning shells do not scale to and other source data for development into a
the size required for this task. valid lead. FAIS reviews, processes, and evalu-
A more direct approach to applying the ates each Bank Secrecy Act filing for the ana-
machine-learning ideas of nearest-neighbor lysts to such a degree that the intense effort
retrieval and inductive building of decision and the time expended in the pre-FAIS envi-
trees was also explored. The lack of labeled ronment are no longer needed. The lead is
examples was the major obstacle to using then fully researched and analyzed for dis-
these techniques. Unsupervised learning algo- semination to the appropriate law enforce-
rithms were considered, but the difficulties in ment agency. These agencies provide FINCEN
deriving appropriate features on which they with feedback regarding the use of the infor-
would operate made these techniques infeasi- mation generated by the system. In one early
ble. These difficulties were exacerbated by the evaluation, about half the subjects identified
poor data quality and the need for additional by the system were already known to the
background knowledge. It was discovered field agency conducting the investigation,
that these techniques are potentially useful as and the unknown subjects exhibited similar
knowledge engineering aids to conduct behavior. This evaluation of the system was
experiments with the data. In one test, we favorable, showing both credibility and utili-
used induction to create a decision tree with ty; if it had identified only unknown subjects,
a limited data set based on 40 features iden- it would have lacked credibility, but if it had
tified during knowledge engineering. Analysts identified only existing subjects, it would
then examined the decision trees to deter- have lacked utility.
mine how useful the various heuristic fea- In the user-directed mode, the analysts set
tures were as indicators of suspiciousness. specific criteria in support of a request by a
law enforcement agency, a request from other
groups within FINCEN, or a self-initiated pro-
Application Use and Payoff ject. A project can contain numerous hits
FAIShas been in use since March 1993. As of that fit the specified criteria, but the hits
January 1995, 20 million transactions had might not necessarily be related to one
been entered and linked, resulting in 3.0 mil- another. Each subject on the hit list contains
WINTER 1995 35
Articles
36 AI MAGAZINE
Articles
Jan. 1991 Initial design and planning, Bank Secrecy Act data transfer and
data model design in progress
May 1991 Data model finalized
June 1991 Data sweeps of Bank Secrecy Act data in progress
Oct. 1991 Data-load program completed
Dec. 1991 Initial workstations configured
March 1992 Design review, overall system architecture approved
June 1992 Sun 490 server configured, user interface development started
Sept. 1992 NETMAP and user interface integrated, data updates being loaded
March 1993 Release 1.0 operational
Jan. 1994 Release 1.1 operational
Dec. 1994 Release 2.0 operational
WINTER 1995 37
Articles
Because the underlying domain will continue on the use of advanced computing technolo-
to change—in response to law enforcement gy to aid in the detection and analysis of
successes and changes in the financial system financial crimes, for his unwavering support,
itself—the knowledge bases will never be confidence, assistance, and insights, without
finished; they will have to evolve continually whom this system never would have been
to keep pace with changes in money-launder- developed. We also want to thank the current
ing techniques and in the Bank Secrecy Act director of FINCEN, Stanley E. Morris, who
forms. Some maintenance is shifting to the immediately recognized the value of FAIS not
analysts as they acquire training in tools such only for generating leads but also for aug-
as NEXPERT and SQL. The knowledge bases con- menting regulatory and compliance pro-
tain some of FINCEN’s most sensitive knowl- grams, whose continued support has been
edge regarding money laundering and our essential to the expanded use and develop-
intelligence sources and methods. Also, mon- ment of FAIS.
ey laundering and Bank Secrecy Act data are a
complex domain that requires significant
Notes
time to learn. Maintaining the knowledge 1. The authors of this article are employees of the
bases with dedicated in-house staff provides Financial Crimes Enforcement Network of the U.S.
Department of the Treasury, but this article in no
the required security and continuity neces-
way represents an official policy statement of the
sary for these tasks. U.S. Treasury Department or the U.S. government.
Because specialized expertise regarding The views expressed here are solely those of the
money laundering is distributed among all authors. This article implies no general endorse-
FINCEN analysts, we are developing proce- ment of any of the particular products mentioned
dures for incorporating this wide range of in the text.
knowledge into the system. The design of the 2. The Bank Secrecy Act is outlined in 12 U.S.C.
suspiciousness evaluation modules, with indi- sections 1730d, 1829b, 1951–1959, and 31 U.S.C.
vidual rule sets addressing specific money- sections 5311–5326.
laundering indicators, will facilitate the 3. Cash transactions at nonfinancial businesses are
incorporation of additional indicators. These reported under 26 U.S.C. section 6050I to the Inter-
mechanisms could be as simple as using the nal Revenue Service (IRS) on Form 8300, the Report
user-directed mode to search for subjects of Cash Payments over $10,000 Received in a Trade
or Business. As of November 1992, law enforce-
meeting criteria that indicate a newly iden-
ment agencies other than the IRS no longer have
tified money-laundering technique. If a par- access to this information. FAIS is designed to
ticular technique appears to be widespread, accommodate these reports if they once again
additional rule sets could be developed and become more widely available to law enforcement.
incorporated into the suspiciousness evalua- 4. Depending on the assumptions regarding what
tion module to routinely evaluate all filings types of linkage are allowed, the complexity can
for these techniques. scale proportionally to the number of partitions or
A key aspect of FAIS maintenance involves subsets.
tracking and evaluating the disposition of 5. As in most AI applications with large search
potential leads generated by the system. spaces, massive computing power is another poten-
Because of the time required for investiga- tial solution.
tions and prosecutions, we are not yet able to 6. This work was performed by Cognitive Systems,
collect comprehensive data. It is intended Inc., and Ascent Technology, Inc., respectively.
that feedback from FINCEN’s customer agen-
cies be used to guide the continued evolution References
of the knowledge bases. Anand, T., and Kahn, G. 1992. Making Sense of
Gigabytes: A System for Knowledge-Based Market
Acknowledgments Analysis. In Innovative Applications of Artificial Intel-
ligence 4, eds. A. C. Scott and P. Klahr, 57–69. Menlo
The authors would like to acknowledge the
Park, Calif.: AAAI Press.
contributions of all their colleagues at FIN-
Andrews, P. P., and Peterson, M. B., eds. 1990.
CEN who aided in the development of FAIS or
Criminal Intelligence Analysis. Loomis, Calif.: Palmer
contributed to its knowledge bases. We would Enterprises.
also like to thank the staff members of the
Byrnes, E.; Campfield, T.; Henry, N.; and Waldman,
U.S. Customs Data Center at Newington, Vir- S. 1990. INSPECTOR: An Expert System for Monitor-
ginia, who consistently and generously pro- ing Worldwide Trading Activities in Foreign
vide us with the data that drive the system. Exchange. In Proceedings of the Second Annual Con-
Most importantly, we would like to thank the ference on Innovative Applications of Artificial Intelli-
retired founding director of FINCEN, Brian gence, 16–20. Menlo Park, Calif.: AAAI Press.
Bruh, who had the vision to actively champi- Davidson, C. 1993. What Your Database Hides
38 AI MAGAZINE
Articles
WINTER 1995 39