Menu

Identifying Illicit Activity Through Financial Transactions

January 22, 2014

To shield against emerging threats from sources such as rogue states, terrorist groups, organized crime and disaffected internal elements, financial intelligence units need to use financial intelligence solutions to collate and analyze information from multiple source systems. This paper presents the two fundamental architectural approaches for FI solutions -- the database-centric and application-centric approaches.

BylawsCode of ConductPrivacy NoticeTerms of Use © 2024 Global Association of Risk Professionals