Professional Documents
Culture Documents
Financial Crimes Constantine
Financial Crimes Constantine
Toronto, 2018
Constantine T. Boyadjiev
Accenture Digital – Applied Intelligence
NA Fraud & Risk Analytics Practice Lead
• Parking
Other
• Spoofing / Layering • eCommunications • Mandatory Block Leave
• Side By Side • IM / Chat • Expense Accounts
• Suitability • Voice • Travel Habits
• Trades with Affiliated Broker Dealers • Political Contributions • Web Browsing & Print History
• Warehouse Accounts • Badge swipes • Training Breaches
Surveillance capabilities are evolving to develop a broader
integrated framework
Bringing capabilities to life through an understanding of how surveillance fits within the business
▪ eCommunications
▪ IM / Chat ▪ 3rd Party Access & Controls
▪ Audio/Voice/Video ▪ Data Leakage
▪ Expense Accounts ▪ Subcontractor Risk
▪ Mandatory Block Leave Copyright © 2017 Accenture. All rights reserved. 5
▪ Training Breaches
AML / KYC / Conduct Surveillance: Representative suspicious
behaviors & red flags
Most banks leverage multiple technologies as part of their AML Monitoring and Conduct
Surveillance control activities. Leading practices require an enterprise view with close evaluation
of behaviors to maintain appropriate visibility into activity across the institution.
Conduct Red Flags AML & Conduct Red Flags AML Red Flags
Noise Signal
Data’s 3 V’s:
• Volume
• Variety
• Velocity
Uninterpretable Interpretable
Irrelevant Relevant
Insights
Focus of this
phrase & Which systems they
Has PnL / Exposure How many cancel sentiment Are they sharing accessed? Log-on
How many hours of
changed dramatically? and corrected trades? confidential info? times?
professional training?
Who are they
Social Media Chat connected to?
Sentiment Analysis
Market
Benchmarking Transactions Screening
and Monitoring What do they Who do they
say on Social talk to? Customer
Media ? Behavioral Data Peer Groups analysis
SMS
Voice
How does trader
performance compare Who are your customers
to the market? dealing with? Compare historical
Compare historical sentiment dynamics Compare transactional
behaviors vs recent behavior against peers
What are they What are they
sharing? exchanging?
Integrated Surveillance: “Joining the Dots”
Connecting data points is key to enable surveillance to proactively monitor and identify
emerging misconduct
3rd Party
Access
Personal
Outside Account
Large
Business Trading Political
Holdings
Policies External
Activities Contribut &
ions Training
Parties
Conflicts Sub-
Clearance contractors
HR Data & Control
Licensing & Room
Registration
Bankruptcy
Filings
Gifts &
Employee Entertain
eComms ment Financial
Private Crime
Investme
Trade nts
Surveillance
Voice
Social Sales
Media Practices
Travel &
Conduct
Client
Expenses
The Accenture-SAS Surveillance Analytics Solution
• Utilizing both linguistic analysis (NLP) & stochastic modeling, goal was to find both content-
based sensitive information and unusual behavioral patterns in communications
(detection of illicit / suspect / coded information, oddity & substitution in languages, habitual
abnormality in emails).
• Deployed additional advanced analytics techniques & algorithms, such as text mining /
forensics, Principle Component Analysis, Multi-Dimensional Scaling, K-means Clustering, Deep
Machine Learning, etc. to develop Communication & Social Network Analysis, Emotion /
Sentiment Analytics, and Detection of Problematic / Deceptive Behavior.
• Analyzed diverse datasets including Enron, Hillary Clinton, US Election, & Social Media data.
• Built “Suspect Behavior Detector” Advanced Analytics App on SAS Visual Investigator.
• Current work focusing on using / integrating Deep Machine Learning for Voice Analytics (e.g.
extraction of Audio/Acoustic signatures, detection of spoofing, synthetic impersonation,
emotional sentiment), moving swiftly to a “Holistic End-to-End Surveillance” capability.
• Formal Intellectual Property Rights Trademarked / Patents Pending.
Suspect Behavior Detector Surveillance App
Core Capabilities
* upcoming
User Can Select The Surveillance Source(s) and Risk Type(s)