Linguistic Identity Matching
Identity matching has become an integral part of many business and security processes, from border control and crime investigation to anti-money laundering and client data management.Following years of struggling with computational techniques, the new lin
- PDF / 3,732,845 Bytes
- 257 Pages / 476.22 x 680.315 pts Page_size
- 64 Downloads / 167 Views
Ab A b do doo o ol o l R ah ahm hm maa n
A b do Abd Ab d o rr rraa hman h m an n
Yeltsin A bd a ll R ahm man
Ieltsin
Bertrand Lisbach Victoria Meyer A b d u r R a hm h m an n
Linguistic Identity Matching
Linguistic Identity Matching
Bertrand Lisbach ⋅ Victoria Meyer
Linguistic Identity Matching
Bertrand Lisbach Freiburg, Germany
ISBN 978-3-8348-1370-1 DOI 10.1007/978-3-8348-2095-2
Victoria Meyer Zurich, Switzerland
ISBN 978-3-8348-2095-2 (eBook)
Library of Congress Control Number: 2013939631 Springer Vieweg © Springer Fachmedien Wiesbaden 2013 This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilm or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. Printed on acid-free paper. Springer is part of Springer Science+Business Media www.springer.com
v
Foreword
by David Smith My interest in identity matching comes from my years’ fraud investigation and AML work. A few years ago, I would have expected that banks and other financial institutions would, by now, have reduced the AML process to a routine, low level back office function. How wrong I was! At time of writing, the revolutions and uprisings in the Middle East have resulted in wide-scale sanctions where identity matching will be critical. The death of Osama bin Laden and the reported capture of a vast hoard of data will no doubt start a major anti terrorist financing effort. Looking at this from a bank’s point of view, this is a worrying time, given the scale of fines and sanctions imposed by regulators on both the firms and individuals. No decent bank wants to get caught out but this may not be as easy as it may appear. Before looking at how Linguistics should be a major step forward in Identity Matching it is worth considering the context in which it can be used in AML work in financial firms. The Wolfsberg Group 2009 Statement on AML Screening, Monitoring and Searching usefully sets out 4 key areas involving matching: •• Screening (real time payment screening to prevent sanctions and other breaches) •• Monitoring (either live or delayed monitoring for unusual transactions) •• Client Screening (KYC not only at the opening of accounts but also at appropriate periods thereafter) •• Searches (typically in response to regulatory enquiries, updated sanctions lists, etc.) The first major issue is scale – the volume of data
Data Loading...