Menu

Identifying Illicit Activity Through Financial Transactions

To shield against emerging threats from sources such as rogue states, terrorist groups, organized crime and disaffected internal elements, financial intelligence units need to use financial intelligence solutions to collate and analyze information from multiple source systems. This paper presents the two fundamental architectural approaches for FI solutions -- the database-centric and application-centric approaches.

December 7, 2021

BylawsCode of ConductPrivacy NoticeTerms of Use © 2021 Global Association of Risk Professionals