
Monitoring transactions for unusual customer behavior is a key part of anti-fraud and AML operations. But looking solely at the transactions themselves offers only a limited view of a financial ecosystem.
Where someone is transacting from, what device they’re using, what their other online activities look like, how fast they’re trying to complete transactions—these can all be important clues that denote a transaction is more (or less) suspicious than it first seems.
That’s why it is critical for today’s financial organizations to go beyond simply monitoring transactions and employ data monitoring—sometimes referred to as fraud monitoring—to look at contextual information surrounding transactions. This helps risk and compliance teams more accurately identify which transactions are truly suspicious, and which ones are creating alerts that are likely false positives.
This article will discuss data monitoring in an anti-fraud and AML context, including why it’s useful, how it works, and which features are included in an effective data monitoring software.
Data monitoring in anti-fraud and AML is sometimes referred to simply as fraud monitoring. It involves real-time analysis of financial transactions and other related events for signs that fraud may be happening. This creates alerts that can later be manually reviewed for suspicious activity.
Fraud monitoring and detection is closely related to Know Your Transaction. This is the process of analyzing transactions for signs of suspicious activity. It’s a critical step in identifying and stopping financial crimes like fraud or money laundering, but it doesn’t always tell the full story.
Without taking into account contextual activity surrounding transactions, KYT may accidentally label a transaction as suspicious when it really isn’t (i.e. false positive). Or worse, it may clear a transaction that later turns out to be related to financial crime (i.e. false negative).
Both of these scenarios can hurt a financial institution in several ways. These include:
Adding data monitoring to the mix helps to avoid these problems by increasing the accuracy with which true positives are identified. This minimizes false positives and false negatives, improving efficiency and saving team members valuable time.
Data monitoring software works similarly to KYT systems. The main difference is that it takes extra information into account that adds context to transactions, thereby making it easier to tell if a deal is suspicious or not.
Here’s a general framework for how it operates.
Like with transaction fraud monitoring, data monitoring will extract and analyze transaction information that’s relevant to the deal’s risk level. But it will also gather and look at other factors that can point to a transaction being suspicious when it wouldn’t otherwise seem so (or vice-versa). This can include the following information about participants:
The information gathered in the first step is then fed into a rules engine. This is a program that manages rulesets which, based on the information they receive, determine how likely a transaction is to be risky and why (or vice-versa).
Based on the level and nature of a transaction’s risk, a rules engine may be able to automatically take simple actions to block it—and possibly even restrict the participants’ further activity.
If the rules engine deems a transaction’s risk profile to be sufficiently high-risk and complex, it can trigger an alert. This lets anti-fraud professionals know there is something suspicious about the transaction, and they may need to look into it manually. This could include asking a participant for additional information or ID verification, generating a report about the transaction, and so on.
Data monitoring tools can look at contextual activity surrounding a transaction, in addition to data about the transaction itself. So if anti-fraud professionals see something really out of place, they can perform link analysis to get a wide-angle view of the environment surrounding a transaction.
They may be able to spot patterns and relationships between transactions, their participants, and their circumstances that point to broader suspicious conduct. Then they can begin in-depth investigations to potentially find evidence of larger-scale financial crime.
Not all data monitoring solutions are created equal. Some have certain features that can provide a real boost to an FI’s anti-fraud and AML efforts. These are a few to look for:
Unit21’s Transaction Monitoring is actually a data monitoring system. It looks at not just transaction data itself, but also relevant data from a wide variety of credible sources. It also features customizable rulesets, visual link analysis tools, system analytics and testing functions, and more.
See how it works in practice by booking a demo with us today.