SMARAGD FPD IT-based system for the - cellent finance solutions AG
SMARAGD FPD IT-based system for the - cellent finance solutions AG
SMARAGD FPD IT-based system for the - cellent finance solutions AG
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
07/2010<br />
ANTI-FINANCE-CRIME SU<strong>IT</strong>E<br />
by Cellent Finance Solutions <strong>AG</strong><br />
<strong>SMAR<strong>AG</strong>D</strong><br />
Successful <strong>solutions</strong> to<br />
fight financial crime
ANTI-FINANCE-CRIME SU<strong>IT</strong>E<br />
by Cellent Finance Solutions <strong>AG</strong><br />
Crim<br />
The challenge<br />
of financial crime<br />
2<br />
The obligation. Financial crime has many faces.<br />
No matter if it‘s money laundering, financing terrorism or<br />
insider trading – Financial crime poses a serious threat <strong>for</strong><br />
our society and <strong>for</strong> <strong>the</strong> international financial <strong>system</strong>s. Financial<br />
institutions are abused - most of <strong>the</strong> time without<br />
<strong>the</strong>ir knowledge - as mediators <strong>for</strong> illegal transactions or<br />
business deals.<br />
It is a special obligation, to protect financial institutions<br />
and <strong>the</strong>re<strong>for</strong>e <strong>the</strong> entire financial <strong>system</strong> against financial<br />
abuse. Intelligent <strong>IT</strong> <strong>system</strong>s support <strong>the</strong> financial institutes<br />
in <strong>the</strong>ir fight against financial fraud.
e Contents<br />
© Cellent Finance Solutions <strong>AG</strong><br />
All rights reserved. The contents of this document from Cellent Finance Solutions <strong>AG</strong> are<br />
protected by copyright. Texts and graphics may not be used or reproduced, ei<strong>the</strong>r in whole or in<br />
part, without previous written authorizations from Cellent Finance Solutions <strong>AG</strong>.<br />
ANTI-FINANCE-CRIME SU<strong>IT</strong>E<br />
by Cellent Finance Solutions <strong>AG</strong><br />
1. The financial crime challenge<br />
2. Overview of <strong>the</strong> <strong>SMAR<strong>AG</strong>D</strong><br />
product snite<br />
■ <strong>SMAR<strong>AG</strong>D</strong> MDS<br />
Post Transaction Monitoring,<br />
Anti-Money-Laundering<br />
■ <strong>SMAR<strong>AG</strong>D</strong> TCM<br />
Watch List Filtering, financial<br />
sanctions, customer screening<br />
and combating of terrorism financing<br />
■ <strong>SMAR<strong>AG</strong>D</strong> CRS<br />
<strong>IT</strong>-<strong>based</strong> Risk assessment<br />
■ <strong>SMAR<strong>AG</strong>D</strong> <strong>FPD</strong><br />
Detection of financial fraud<br />
3. Internationality<br />
4. Experience in fighting financial crime<br />
3
ANTI-FINANCE-CRIME SU<strong>IT</strong>E<br />
by Cellent Finance Solutions <strong>AG</strong><br />
SMARA<br />
Financial Crime<br />
The financial crime challenge<br />
Legal provisions<br />
The national and international money laundering regulations<br />
have undergone a phase of radical changes and<br />
tightening.<br />
Ever more frequent and comprehensive sanctions<br />
against infringements of legal provisions, especially by<br />
<strong>the</strong> U.S. American authorities, have increased <strong>the</strong> sustained<br />
pressure to en<strong>for</strong>ce national and international money<br />
laundering regulations.<br />
4<br />
■ Directives of <strong>the</strong> European Union from 1991,<br />
2001, 2002 and <strong>the</strong> 3. EU-money laundering<br />
guideline of <strong>the</strong> EU commission from 2005 and<br />
2006<br />
■ General instructions <strong>for</strong> account opening and<br />
customer identification from February 2003<br />
■ Consolidated KYC (KnowYourCustomer) risk<br />
management from October 2004<br />
■ FATF (Financial Action Task Force), <strong>for</strong>ty + nine<br />
recommendations, report on money laundering<br />
typologies<br />
■ USA PATRIOT Act and Bank Secrecy Act<br />
Innovation and fur<strong>the</strong>r development<br />
The <strong>SMAR<strong>AG</strong>D</strong> product series is being continuously<br />
fur<strong>the</strong>r developed to meet <strong>the</strong> international requirements.<br />
Thus, permanently protecting <strong>the</strong> investments of our<br />
customers.
ANTI-FINANCE-CRIME SU<strong>IT</strong>E<br />
by Cellent Finance Solutions <strong>AG</strong><br />
GDAnti-Finance Crime Suite<br />
<strong>SMAR<strong>AG</strong>D</strong> – convincing facts<br />
■ <strong>SMAR<strong>AG</strong>D</strong> it is being utilized successfully<br />
nationally and internationally by over 750<br />
institutions<br />
■ Our long-term international experience ensures<br />
short implementation times<br />
■ Several innovative functions that help ease <strong>the</strong><br />
work process within your organization<br />
■ SWIFT certification of <strong>the</strong> payment<br />
component S/MGS<br />
■ Identification of Politically Exposed Persons<br />
„PEP“<br />
■ Since it is completely configurable, organizations<br />
can promptly adjust <strong>the</strong>ir parameters to altered<br />
money laundering behaviors<br />
■ The effectiveness and functionality of<br />
<strong>SMAR<strong>AG</strong>D</strong> is confirmed by leading auditing<br />
firms<br />
■ It offers customers <strong>the</strong> highest degree of<br />
security <strong>for</strong> <strong>the</strong> compliance with legal<br />
requirements<br />
■ Seven of <strong>the</strong> 10 largest banks in Germany utilize<br />
<strong>SMAR<strong>AG</strong>D</strong> worldwide<br />
■ Deployed in more than 40 countries<br />
The <strong>SMAR<strong>AG</strong>D</strong> product snite consists<br />
of modules with different<br />
functions <strong>for</strong> combating financial<br />
Crime:<br />
<strong>SMAR<strong>AG</strong>D</strong> MDS<br />
■ Anti-Money-Laundering in financial<br />
institutions<br />
■ Fulfillment of <strong>the</strong> international legal<br />
requirements<br />
■ Risk <strong>based</strong> approach and<br />
KnowYourCustomer-policy<br />
<strong>SMAR<strong>AG</strong>D</strong> TCM<br />
■ Watch list filtering<br />
■ Checking of <strong>the</strong> customer base against<br />
institution specific, national or international<br />
sanctions<br />
■ Combating <strong>the</strong> of terrorism financing<br />
■ Customer screening<br />
<strong>SMAR<strong>AG</strong>D</strong> CRS<br />
■ Risk assessment regardingfinancial crim<br />
■ Risk assessment of <strong>the</strong> current customer<br />
and product base<br />
■ Risk oriented procedure <strong>for</strong> <strong>the</strong> definition of<br />
Countermeasures<br />
<strong>SMAR<strong>AG</strong>D</strong> <strong>FPD</strong><br />
■ Identification of financial fraud in banks and<br />
insurance companies<br />
■ Customer and business specific rule code<br />
■ Short and long-term analysis to identify<br />
financial fraud<br />
5
ANTI-FINANCE-CRIME SU<strong>IT</strong>E<br />
by Cellent Finance Solutions <strong>AG</strong><br />
SMARA<br />
MDS<br />
Tackling money laundering<br />
and financial fraud<br />
Intelligent <strong>IT</strong> <strong>system</strong> <strong>for</strong> <strong>the</strong> analysis and defense Top Business Edition<br />
against money laundering in financial institutions<br />
The internationally employed, MDS fulfills <strong>the</strong> legal<br />
requirements regarding <strong>the</strong> preventive measures against<br />
money laundering and financial fraud.<br />
Adaption to <strong>the</strong> institution specific threat situation<br />
Known money laundering and fraud patterns are stored<br />
in <strong>the</strong> <strong>system</strong> and can be flexibly adapted to <strong>the</strong> internal<br />
threat analysis of <strong>the</strong> institution. The financial institution is<br />
supported by <strong>the</strong> national and international experience of<br />
Cellent Finance Solutions. Currently <strong>the</strong>re are up to 200<br />
money laundering and fraud typologies stored in<br />
<strong>the</strong> <strong>system</strong>.<br />
Money laundering scenarios<br />
Money laundering scenarios, fraud typologies and indicators<br />
can be freely configured within <strong>the</strong> <strong>system</strong>. They<br />
are adaptable to new typologies at anytime - without any<br />
program alterations - solely through <strong>the</strong> configuration.<br />
To per<strong>for</strong>m this, com<strong>for</strong>table and easy to use dialogs are<br />
available to <strong>the</strong> user.<br />
Profiling: dynamic money laundering detection<br />
The detection of money laundering activities is per<strong>for</strong>med<br />
dynamically, <strong>based</strong> on business profiles. These are<br />
automatically updated on a daily basis. Through this, <strong>the</strong><br />
<strong>system</strong> learns to detect money laundering activities, if <strong>the</strong><br />
business behavior changes.<br />
MDS also takes into account <strong>the</strong> complex network<br />
structures of customer and account relations during <strong>the</strong><br />
analysis.<br />
Simulation <strong>system</strong><br />
The rule code must be continuously adapted to new<br />
threat situations. The organization can per<strong>for</strong>m this task<br />
very effectively and simply with <strong>the</strong> simulation <strong>system</strong>.<br />
All new settings are automatically checked by <strong>the</strong> <strong>system</strong><br />
and projected to <strong>the</strong> expected results of <strong>the</strong> productive<br />
<strong>system</strong>. The optimization steps can be repeated as often<br />
as desired. The user <strong>the</strong>n approves <strong>the</strong> best setting and<br />
<strong>the</strong> simulation <strong>system</strong> automatically conveys <strong>the</strong> settings<br />
into <strong>the</strong> productive <strong>system</strong>.<br />
Changes to <strong>the</strong> scenario or indicator model are logged<br />
in an audit-proof way and <strong>the</strong>re<strong>for</strong>e completely fulfill <strong>the</strong><br />
requirements of <strong>the</strong> audit<br />
6<br />
The Top Business Edition is multi-organisation capable<br />
and supports <strong>the</strong>se organizational structures of international<br />
financial institutions. Advanced functions such as <strong>the</strong><br />
gray zone database, data views and reference profiles<br />
also a components of this addition, next to <strong>the</strong> simulation<br />
<strong>system</strong> which includes <strong>the</strong> random testing and projection<br />
features.<br />
The threshold value generator supports <strong>the</strong> user in <strong>the</strong><br />
optimization and best possible setting of indicators and<br />
threshold values. With <strong>SMAR<strong>AG</strong>D</strong> MDS you are <strong>the</strong>re<strong>for</strong>e<br />
able to achieve a high hit rate and keep <strong>the</strong> „false<br />
positive rate“ to a minimum.<br />
Small Business Edition<br />
The Small Business Edition is designed primarily <strong>for</strong><br />
small and medium-sized institutions and <strong>for</strong> <strong>for</strong>eign subsidiaries<br />
of international companies. Predefined settings<br />
enable a quick alignment with <strong>the</strong> institution‘s specific<br />
threat situation and thus allow <strong>for</strong> a very short commissioning<br />
time.<br />
MDS overview<br />
MDS incorporates all business activities as well as customer<br />
and relationship structures of an institution into <strong>the</strong><br />
money laundering analysis process. A special feature of
GD<br />
<strong>SMAR<strong>AG</strong>D</strong> MDS is that all discrepancies detected by <strong>the</strong><br />
<strong>system</strong> are allocated to a customer. This customer view<br />
greatly eases <strong>the</strong> analysis work <strong>for</strong> <strong>the</strong> user.<br />
Innovations<br />
MDS has been continuously expanded and fur<strong>the</strong>r<br />
developed since its introduction in <strong>the</strong> year 2000. The<br />
following MDS innovations continue to streng<strong>the</strong>n its<br />
success:<br />
■ Simulation <strong>system</strong><br />
► Monitoring <strong>for</strong> alterations of <strong>the</strong> scenarios<br />
through dynamic random data testing<br />
■ Early warning <strong>system</strong><br />
► A „rolling“ detection of money laundering and<br />
fraud behavior<br />
■ Threshold value generator<br />
► Prognoses of <strong>the</strong> results, after an alignment of<br />
threshold values and <strong>the</strong> selection of <strong>the</strong> optimal<br />
threshold values<br />
■ Know Your Customer with <strong>the</strong> customer<br />
profile module<br />
► Automatic detection of a customer‘s business<br />
profile <strong>for</strong> <strong>the</strong> money laundering and fraud<br />
detection<br />
ANTI-FINANCE-CRIME SU<strong>IT</strong>E<br />
by Cellent Finance Solutions <strong>AG</strong><br />
What can MDS per<strong>for</strong>m?<br />
MDS<br />
■ Predefined rules and typologies <strong>for</strong> common<br />
money laundering and fraud scenarios<br />
■ Rule code with more than 200 indicators,<br />
which can be adapted to new threat<br />
situations through <strong>the</strong> compliance<br />
organization.<br />
■ Early warning <strong>system</strong> through a daily and<br />
continuous monitoring<br />
■ Configurable automatic profile creation <strong>for</strong><br />
all customers and accounts, to identify<br />
unexpected and unusual business activities<br />
■ Multi-Organisation capability<br />
■ Analysis and monitoring of networks<br />
■ Classification and monitoring of high-risk<br />
customers<br />
■ System-Side support <strong>for</strong> <strong>the</strong> threshold value<br />
determination<br />
■ Role and authorization-<strong>based</strong> concepts,<br />
that also take <strong>the</strong> cooperation of a<br />
centralized compliance and decentralized<br />
customer areas into account<br />
■ Audit-Proof documentation of all processes<br />
<strong>for</strong> internal and external audits<br />
■ Short and long-term analyses<br />
7
ANTI-FINANCE-CRIME SU<strong>IT</strong>E<br />
by Cellent Finance Solutions <strong>AG</strong><br />
SMARA<br />
TCM<br />
Watch list filtering, financial sanctions and<br />
combating <strong>the</strong> of terrorism financing<br />
Early breackdetection<br />
Low false-positive-rate<br />
To ensure <strong>the</strong> embargo monitoring and to prevent terrorism<br />
financing TCM checks financial transactions and<br />
customer data <strong>for</strong> infringements against institution specific,<br />
national or international regulations.<br />
8<br />
■ Embargo filtering of transactions<br />
(SEPA, SWIFT and non-SWIFT)<br />
■ Indentification of “bad guys” in <strong>the</strong> customer<br />
database (customer screening)<br />
■ Identifying PEPs (politically exposed persons)<br />
By implementing TCM economical damages <strong>for</strong> <strong>the</strong> financial<br />
institution can be avoided. International payments<br />
with a terrorist background and/or that violate EU, US or<br />
UN requirements or laws can be prevented.<br />
Daily updated watch lists<br />
The European Union, <strong>the</strong> OFAC (Office of Foreign Assets<br />
Control) and o<strong>the</strong>r authorities publish watch lists<br />
and make <strong>the</strong>m available to financial institutions. If <strong>the</strong>re<br />
is an alteration in <strong>the</strong> list, <strong>the</strong> data files are checked on a<br />
daily basis with <strong>the</strong> help of an automatic update mechanism.<br />
A significant and indispensable characteristic of TCM is<br />
<strong>the</strong> checking of name similarities using <strong>the</strong> undefined<br />
search logic (fuzzy-logic).<br />
■ Phonetic similarities, particularly due to various<br />
spellings in various languages considered are<br />
considered<br />
■ Spelling errors do not prevent <strong>the</strong> detection<br />
■ Phrases and permutations are taken into<br />
consideration<br />
■ Monitoring of documentary bussiness transactions, <strong>for</strong> ■ Differentiation of <strong>the</strong> similarity assessment <strong>for</strong><br />
example trading credits, securities<br />
transactions<br />
free-text fields<br />
■ Online webcheck to reject unwanted customers<br />
The similarity search can be parametrized so that it can<br />
be quickly adjusted in case of increased security requirements.<br />
Checking of SEPA, SWIFT and non-SWIFT<br />
transactions<br />
TCM monitors transactions, that are relayed to <strong>the</strong> financial<br />
institution through <strong>the</strong> SWIFT-network. TCM per<strong>for</strong>ms<br />
a complete checking of <strong>the</strong> embargo-relevant SWIFTmessages:<br />
■ Customer transactions (payments and cheques)<br />
■ Inter-bank transfers<br />
■ Treasury, currancy trading, money<br />
markets and derivatives<br />
■ Collections and money orders<br />
■ Securities transactions<br />
■ Precious metals and cash letters<br />
■ Documentary credits and guarantees<br />
Insolvency-filter<br />
Complex transactions in banks are automated and completed<br />
nowadays, while taking into account a great deal<br />
of additional internal and external in<strong>for</strong>mation. This largely<br />
poses <strong>the</strong> risk that payments are made, even though
GD<br />
<strong>the</strong> addressee is already in financial difficulty or is even<br />
close to insolvency.<br />
These payments can be stopped with <strong>the</strong> „insolvencyfilter“<br />
and thus prevented.<br />
Identifying PEPs (politically exposed persons)<br />
With <strong>the</strong> <strong>SMAR<strong>AG</strong>D</strong> PEP component, politically exposed<br />
persons can be identified through <strong>the</strong><br />
intelligent similarity search (fuzzy-logic). The checking<br />
strategies are configurable, to take into account <strong>the</strong> heterogenic<br />
data quality of <strong>the</strong> PEP lists.<br />
Innovations<br />
TCM supports <strong>the</strong> requirements of <strong>the</strong> EU regulation 1781<br />
(on in<strong>for</strong>mation on teh payer axxounpany transfer of<br />
funds). <strong>SMAR<strong>AG</strong>D</strong> TCM detects infringements<br />
against this guideline and in<strong>for</strong>ms <strong>the</strong> compliance organization<br />
about <strong>the</strong> violation. If necessary <strong>the</strong>se transaction<br />
can be stopped from being processed any fur<strong>the</strong>r.<br />
ANTI-FINANCE-CRIME SU<strong>IT</strong>E<br />
by Cellent Finance Solutions <strong>AG</strong><br />
What does TCM per<strong>for</strong>m?<br />
TCM<br />
■ Complete checking of all transactions <strong>for</strong><br />
embargo breaches<br />
■ Highly optimized customer base checking <strong>for</strong><br />
embargo infringements („bad guy“) with<br />
similarity search, also suited <strong>for</strong> mass data<br />
processing (>10 million partners)<br />
■ Utilization of all relevant external and internal<br />
watch lists <strong>for</strong> <strong>the</strong> embargo<br />
monitoring, including PEP lists (Politically<br />
Exposed Persons)<br />
■ Simplified and quick partner checking with<br />
<strong>the</strong> online webcheck to reject unwanted<br />
customers/partners<br />
■ Auditing security through a complete logging<br />
of all relevant events and processes<br />
■ Case processing <strong>for</strong> embargo infringements<br />
with workflow<br />
■ Flexible maintenance and expansion of <strong>the</strong><br />
checking rule code through <strong>the</strong> specialist<br />
Compliance department<br />
9
ANTI-FINANCE-CRIME SU<strong>IT</strong>E<br />
by Cellent Finance Solutions <strong>AG</strong><br />
SMARA<br />
CRS<br />
Risk management <strong>based</strong> on<br />
a <strong>IT</strong>-driven Risk analysis<br />
Corporate wide risk assessment<br />
Risk oriented procedure <strong>for</strong> <strong>the</strong> definition of measures<br />
CRS documents <strong>the</strong> group-wide risk analysis, by<br />
recording, categorizing and evaluating all threats of fraud,<br />
such as money laundering, terrorist financing, corruption<br />
and economic crime. Analyses support <strong>the</strong> implementation<br />
of countermeasures, and <strong>the</strong> action corresponding to <strong>the</strong><br />
threat is also recorded in CRS.<br />
Risk structuring<br />
Core of risk analysis is <strong>the</strong> structuring of all types of risk<br />
present in <strong>the</strong> Institute, such as customer and product<br />
risks, and risks allocated to different industries, geographies,<br />
processes and transactions.<br />
The risk assessment is per<strong>for</strong>med with <strong>the</strong> help of predefined<br />
centralized indicators. Through this an individual,<br />
but yet uni<strong>for</strong>m, objective and justified risk assessment<br />
can be obtained <strong>for</strong> <strong>the</strong> respective institution.<br />
This procedure fulfills <strong>the</strong> legislative audit requirements<br />
and <strong>the</strong> requirements of audit firms regarding transparency<br />
and traceability.<br />
Risk assessment of <strong>the</strong> current customer<br />
and product base<br />
A substantial benefit of CRS is <strong>the</strong> correlation of assessed<br />
potential risks with <strong>the</strong> actual customer base and<br />
<strong>the</strong> marketed products. This results in various evaluation<br />
and analysis capabilities, that can extend from <strong>the</strong> economically<br />
independent unit, to business areas, and all <strong>the</strong><br />
way up to <strong>the</strong> corporate level. Temporal trends<br />
are also transparent.<br />
10<br />
All risk areas are allocated to measures, whose quality is<br />
derived from <strong>the</strong> respective degree of risk. The complete<br />
documentation of <strong>the</strong> currently utilized or planned measures<br />
in CRS <strong>for</strong> <strong>the</strong> second part of <strong>the</strong> risk analysis.<br />
Risk-<strong>based</strong> approach through frequency distribution<br />
This innovative function of <strong>SMAR<strong>AG</strong>D</strong> CRS determines<br />
a frequency distribution of <strong>the</strong> industry branch risk in an<br />
economically independent unit.<br />
In a graphical representation of <strong>the</strong> degree and frequency<br />
of <strong>the</strong> risk, <strong>the</strong> risk distribution is made transparent<br />
(heat maps). Through this, <strong>the</strong> institution can immediately<br />
notice <strong>the</strong> main areas of risk.<br />
In addition to individual evaluation of risk dimensions, <strong>the</strong><br />
distribution of <strong>the</strong> total customer risk as <strong>the</strong> aggregation<br />
of all customer risk dimensions is of greatest interest, and<br />
is also displayed by <strong>the</strong> <strong>system</strong>.<br />
A fur<strong>the</strong>r evaluation function is <strong>the</strong> combination of product<br />
risks with <strong>the</strong> customer risks that arise through <strong>the</strong><br />
product usage by each individual customer.<br />
Summary of <strong>the</strong> relevant functions:<br />
■ Objective determination of <strong>the</strong> risk situation<br />
within <strong>the</strong> company<br />
■ Separated display according to money<br />
laundering, terrorism financing and fraud<br />
■ Risk model is preconfigured and flexibly<br />
adaptable<br />
■ Freely definable risk dimensions<br />
■ Multiple evaluation options <strong>for</strong> <strong>the</strong> customer and<br />
product risks<br />
■ Preparation of <strong>the</strong> number-data as <strong>the</strong> basis <strong>for</strong><br />
a threat analysis<br />
■ Assessments of new customers (CDD/KYC)
GD CRS<br />
Innovations<br />
<strong>SMAR<strong>AG</strong>D</strong> CRS was designed in cooperation with leading<br />
audit firms and numerous major German banks.<br />
■ Risk Based Approach<br />
► In addition to documentation of <strong>the</strong> risk<br />
situation of <strong>the</strong> financial institution, <strong>the</strong> impact of<br />
each risk combination <strong>based</strong> on <strong>the</strong> transactions<br />
will be actively identified.<br />
■ Customer Due Diligence<br />
► dynamic risk classification of a customer,<br />
structured according to <strong>the</strong> customer type, <strong>for</strong><br />
example private customer, business customer,<br />
correspondence bank etc.<br />
This module can be used both <strong>for</strong> <strong>the</strong><br />
continuous risk assessment as well as <strong>for</strong> <strong>the</strong><br />
risk classification during <strong>the</strong> customer<br />
acceptance process.<br />
ANTI-FINANCE-CRIME SU<strong>IT</strong>E<br />
by Cellent Finance Solutions <strong>AG</strong><br />
What does CRS per<strong>for</strong>m?<br />
■ Description of all customer, product and<br />
o<strong>the</strong>r risks<br />
■ Differentiation between money laundering,<br />
terrorism financing and fraud<br />
■ Corporate unified evaluation of all risks<br />
■ Separation of potential risks and actual risks<br />
■ Risk analyses and evaluations on all<br />
organizational levels<br />
■ Documentation and controlling of<br />
countermeasures<br />
■ Implementation of <strong>the</strong> indicator model in<br />
<strong>SMAR<strong>AG</strong>D</strong> MDS.<br />
11
ANTI-FINANCE-CRIME SU<strong>IT</strong>E<br />
by Cellent Finance Solutions <strong>AG</strong><br />
SMARA<br />
<strong>FPD</strong> <strong>IT</strong>-<strong>based</strong> <strong>system</strong> <strong>for</strong> <strong>the</strong><br />
detection of financial fraud<br />
Financial fraud within banks has many facets and can cial institutions that detects and prevents all types of<br />
sometimes only be detected after <strong>the</strong> fraud has been<br />
committed. According to UN estimations approximately<br />
5% of <strong>the</strong> real social product is accrued through financial<br />
and economic crimes.<br />
Companies are obligated to implement measures to<br />
prevent financial fraud. This must be done preventively,<br />
which means a detection of <strong>the</strong> fraud <strong>for</strong> short-term analysis.<br />
On <strong>the</strong> o<strong>the</strong>r hand this must be per<strong>for</strong>med during<br />
normal operation, which means immediately prevent any<br />
fur<strong>the</strong>r business actions after <strong>the</strong> detection of a fraud<br />
attempt.<br />
Detection of financial fraud<br />
12<br />
■ Identification of complex fraud scenarios with<br />
time series analyses<br />
■ Daily checking of business activities <strong>for</strong> fraud<br />
suspicion<br />
■ Stopping of suspicious transactions <strong>based</strong> on<br />
complex fraud patterns<br />
■ Identification of frauds and <strong>the</strong> customer base or<br />
as business partners<br />
■ Exposure of corruption and internal fraud<br />
financial fraud. The application is comprised of two components<br />
that are combined in a professional way.<br />
■ Fraud detection<br />
The methods and procedures <strong>for</strong> <strong>the</strong> detection<br />
of conspicuous business conduct will be used<br />
toge<strong>the</strong>r with <strong>the</strong> processing of historical data<br />
of customers, accounts and transactions<br />
(fraud-detection).<br />
■ Fraud prevention<br />
Prevention of fraudulent business through <strong>the</strong><br />
online monitoring of transactions<br />
(fraud-prevention).<br />
Fraud-Detection<br />
■ Daily accurate monitoring of customers,<br />
accounts and transactions <strong>for</strong> fraudulent<br />
behavior<br />
■ Detection of fraudulent behavior <strong>based</strong> on<br />
predefined behavior patterns<br />
■ Creation of customer and account profiles, that<br />
described <strong>the</strong> business behavior of each<br />
individual customer<br />
Fraud-Prevention<br />
In Fraud-Prevention <strong>the</strong> payment is monitored in real<br />
time <strong>for</strong> a predefined set of risk factors, such as <strong>the</strong> payment<br />
amount or involved risk countries.<br />
If during a payment significant deviations are detected<br />
which can indicate a financial fraud, <strong>the</strong> payment will be<br />
stopped. Subsequently this transaction will be analyzed<br />
by <strong>the</strong> case processing department.<br />
■ Online checking of payment transactions <strong>based</strong><br />
on customer profiles due to a fraud suspicion<br />
■ Stopping and evaluation of online transactions<br />
with fraud suspicion<br />
<strong>SMAR<strong>AG</strong>D</strong> <strong>FPD</strong> contains intelligent rule codes as well Case processing<br />
as scenarios and indicator models, which are adjustable The screening results are antomatically and audit-securely taken<br />
by <strong>the</strong> staff of <strong>the</strong> Compliance Department. over in <strong>the</strong> application, where <strong>the</strong>y can be processed in a work-<br />
The <strong>SMAR<strong>AG</strong>D</strong> <strong>FPD</strong> is <strong>the</strong> all-in-one solutio n <strong>for</strong> finan- flow. Case data is a relived and can be used in subsequent
GD <strong>FPD</strong><br />
Innovations<br />
researches.<br />
Examples <strong>for</strong> fraud patterns:<br />
■ Detection of fraud and unwanted business<br />
partners in <strong>the</strong> customer base<br />
■ Monitoring of risk payments, such as<br />
- risky business partners<br />
- risky countries<br />
- risky business types<br />
■ Account looting through stolen/<strong>for</strong>ged account<br />
authorizations (phishing)<br />
■ Capital collection points <strong>for</strong> illegal money or<br />
illegal usage<br />
■ Financial agents <strong>for</strong> camouflaging illegal money<br />
■ Corruption<br />
■ Direct debit fraud<br />
■ Misuse of dormant accounts<br />
ANTI-FINANCE-CRIME SU<strong>IT</strong>E<br />
by Cellent Finance Solutions <strong>AG</strong><br />
<strong>SMAR<strong>AG</strong>D</strong> <strong>FPD</strong> combines <strong>the</strong> methods of long-term<br />
analysis of abnormal movements of funds with <strong>the</strong> methods<br />
of online transaction monitoring <strong>for</strong> <strong>the</strong> prevention<br />
of fraudulent financial transactions.<br />
What does <strong>FPD</strong> per<strong>for</strong>m?<br />
With <strong>SMAR<strong>AG</strong>D</strong> <strong>FPD</strong> fraudulent behavior of customers,<br />
business partners and staff can be detected<br />
through a long or short-term analysis. The fraud<br />
scenarios are configurable and can be modified or<br />
supplemented at any time by <strong>the</strong> specialist department.<br />
13
14<br />
ANTI-FINANCE-CRIME SU<strong>IT</strong>E<br />
by Cellent Finance Solutions <strong>AG</strong><br />
<strong>SMAR<strong>AG</strong>D</strong><br />
Internationality<br />
<strong>SMAR<strong>AG</strong>D</strong> is �eployed in more than 40 countries<br />
The <strong>SMAR<strong>AG</strong>D</strong> product suite has established itself<br />
internationally as an <strong>IT</strong> <strong>system</strong> to combat financial crime<br />
in financial institutions. Our customers<br />
benefit from our knowledge and <strong>the</strong> experience that we<br />
have gained through numerous consultings, during <strong>the</strong><br />
implementation of money laundering <strong>solutions</strong> and <strong>the</strong><br />
combating of terrorism financing.<br />
International scenario and indicator model to combat<br />
money laundering<br />
The core of combating fraud in financial institutions<br />
is a comprehensive model with more than 200 scenarios,<br />
which are used <strong>for</strong> money-laundering detection. The<br />
knowledge of specific factors regarding individual countries<br />
has also been integrated.<br />
International rule code <strong>for</strong> combating <strong>the</strong> terrorism<br />
financing<br />
For <strong>the</strong> monitoring of financial transactions, TCM offers<br />
a comprehensive rule code <strong>for</strong> <strong>the</strong> detailed monitoring<br />
of SEPA, EBA and SWIFT-message types. All types of<br />
financial business transactions - including <strong>the</strong> checking<br />
of documentary credit transactions, treasury etc. - are<br />
contained <strong>the</strong>rein.<br />
Internationally oriented financial institutions<br />
<strong>SMAR<strong>AG</strong>D</strong> is deployed at internationally operating institutions,<br />
including <strong>the</strong> wordl's largest banks, and <strong>the</strong>ir respective<br />
<strong>for</strong>eign brauckes. It is used in important financial centers<br />
such as London, Luxembourg, Zürich, Frankfurt, Moskau,<br />
Tokyo and Singapore.<br />
What does <strong>SMAR<strong>AG</strong>D</strong> international<br />
per<strong>for</strong>m?<br />
■ Corporate enabled applications with a depiction<br />
of all kinds of corporate structures<br />
■ Multilanguage capability<br />
■ Multi-organisation capability<br />
■ International scenario/indicator model<br />
and rule code<br />
■ SWIFT certified<br />
■ Employed internationally in more<br />
than 40 countries<br />
■ Worldwide hot line<br />
■ International consulting
ANTI-FINANCE-CRIME SU<strong>IT</strong>E<br />
by Cellent Finance Solutions <strong>AG</strong><br />
knowledge in<br />
combating financial crime<br />
SuiteExpert<br />
Cellent ■ Finance Leasing Solutions companies<br />
<strong>AG</strong> is a leading provider in <strong>the</strong><br />
field of <strong>IT</strong>-<strong>based</strong> money laundering, terrorist financing<br />
combating as well as embargo and financial sanctions<br />
monitoring <strong>for</strong> <strong>the</strong> financial industry. The <strong>SMAR<strong>AG</strong>D</strong><br />
product family is employed at 750 financial institutions, in<br />
more than 40 countries. In Germany, seven of <strong>the</strong> ten<br />
largest banks use <strong>SMAR<strong>AG</strong>D</strong> <strong>solutions</strong> to fight financial<br />
crime.<br />
Cellent Finance Solutions offers a high degree of<br />
professional and technological know-how. Our knowledge<br />
advantage is <strong>the</strong> result of a close cooperation with <strong>the</strong><br />
financial community as well as with <strong>the</strong> leading technology<br />
providerand software manufacturers.<br />
The Cellent Finance Solutions <strong>AG</strong> with headquarters<br />
in Stuttgart is a 100 % subsidiary of <strong>the</strong> Landesbank<br />
Baden-Württemberg (LBBW).<br />
Application fields of <strong>SMAR<strong>AG</strong>D</strong>:<br />
■ Retail banks<br />
■ Direct banks/online banks<br />
■ Data centres<br />
■ Federal State Central Banks<br />
■ National banks<br />
■ International financial institutions<br />
■ Securities-services provider<br />
■ Insurance companies<br />
■ Online gambling<br />
<strong>SMAR<strong>AG</strong>D</strong> – <strong>the</strong> leading solution in<br />
<strong>the</strong> fight against fraud<br />
<strong>SMAR<strong>AG</strong>D</strong> is scalable and used by globally operating<br />
major institutions as well as in small and middle sized<br />
banks.<br />
15
ANTI-FINANCE-CRIME SU<strong>IT</strong>E<br />
by Cellent Finance Solutions <strong>AG</strong><br />
Cellent FS Imprint<br />
Cellent Finance Solutions <strong>AG</strong><br />
Calwer Str. 33<br />
D-70173 Stuttgart / Germany<br />
+49 (0)711 222 992 900<br />
+49 (0)711 222 992 899<br />
Visit our Website:<br />
www.<strong>cellent</strong>-fs.de<br />
Fur<strong>the</strong>r In<strong>for</strong>mation:<br />
info@<strong>cellent</strong>-fs.de<br />
ANTI-FINANCE-CRIME SU<strong>IT</strong>E<br />
by Cellent Finance Solutions <strong>AG</strong><br />
16