Comprehensive internal dataset containing verified customer identities, personal and business details, addresses, beneficial ownership information, account relationships, transaction summaries, risk metrics, financial statements, and business activity records.
KYC & Customer Due Diligence Records
Related Techniques
- Contains verified customer profiles, declared sources of funds, and expected transaction behaviors, which can be compared against frequent sub-threshold ATM deposits.
- Enables identification of deviations from the customer’s financial profile, revealing red flags when ATM usage and deposit volumes exceed or contradict stated activity.
- Supports more thorough investigation of unusual account activity by linking customer risk assessments to emerging structuring indicators.
- Stores verified customer identity details, addresses, and transactional risk profiles.
- Facilitates the detection of suspicious account behavior tied to advance fee fraud, such as sudden changes in contact information or inconsistent explanations for frequent incoming 'advance fee' payments.
- Verify declared business activities and transaction volumes for agents and sub-agents, identifying inconsistencies with reported turnover.
- Confirm ownership, beneficial owners, and any undisclosed control relationships among agents or sub-agents.
- Compare inbound funds to stated sources and documented backgrounds, highlighting suspicious or undocumented inflows indicative of potential laundering.
Contains verified information on farmland registration, beneficial owners, declared business scope, and operational scale. Examining any sudden or repeated changes to these records prior to subsidy disbursements helps detect inconsistencies and insufficiently supported claims.
- Contains verified customer and entity information, including ultimate beneficial owners, organizational structures, and risk profiles.
- Enables enhanced due diligence on complex or layered agribusiness setups by confirming declared owners and cross-checking any undisclosed controllers.
- Helps uncover high-risk relationships or secrecy-jurisdiction incorporations that obscure real ownership.
Contains verified identification details, beneficial ownership data, source-of-funds documentation, and records of requests for additional information. This data helps validate the legitimacy of high-value cash real estate buyers, flag incomplete disclosures, and detect refusals to provide proof of funds.
- Contains verified identification documents, personal and business details, and beneficial ownership information.
- Allows cross-checking user profiles across multiple remittance apps or crypto platforms, uncovering inconsistent or fabricated credentials.
- Provides vetted customer identity details, declared addresses, and documented justifications for using anonymity tools.
- Enables detection of inconsistencies between customer-provided information and actual usage of anonymizing networks, supporting investigations into potentially concealed identities or illegitimate privacy claims.
- Verified customer identities, beneficial ownership details, and business profiles related to arbitration participants.
- Supports examining whether claimants or beneficiaries have valid connections to the dispute, revealing newly formed or shell entities lacking legitimate operating history.
- Contains verified customer identities, beneficial ownership information, addresses, and risk profiles.
- Helps identify individuals or entities with suspected ties to arms trafficking by verifying declared business activities, detecting links to sanctioned entities, or uncovering incomplete disclosures indicative of illicit arms dealings.
- Contains verified personal and business identity data, addresses, and beneficial ownership declarations.
- Enables cross-checking of customer-reported owners with external corporate registries to detect inconsistencies.
- Helps identify undisclosed controllers or suspicious layering that indicates asset cloaking.
- Contains verified customer identities, beneficial ownership details, and stated investment objectives or rationales.
- Identifies incomplete or inconsistent beneficial ownership documentation, repeated refusals to provide the source of funds, and discrepancies in declared investment purposes—key AML red flags for cross-border asset management accounts.
Encompasses verified customer information, including personal and business details, financial statements, and documentation of asset purchases or appraisals. This data enables the verification of legitimate valuations by confirming the existence of independent appraisals and identifying missing or forged documentation, which is critical for detecting manipulated valuations.
- Contains verified identity and beneficial ownership details, financial profiles, and transaction summaries for individuals and entities.
- Highlights discrepancies between a customer’s known financial capacity and continued high-value auction activity.
- Aids AML investigations by flagging participants whose actual wealth may not justify large or frequent auction transactions.
- Contains verified customer identities, stated business activities, and beneficial ownership information.
- Supports comparison of declared business or individual profiles against actual high-volume automated transactions, highlighting potential misalignment.
- Helps detect entities or individuals misusing automated systems inconsistent with their stated financial or operational background.
- Contains verified identities, ownership details, and client interactions, allowing analysts to identify unusual reliance on bearer instruments.
- Enables financial institutions to verify or challenge the authenticity of declared ownership over bearer certificates and detect refusal to provide sufficient beneficial ownership information.
- Supports tracking changes in customer profiles that may indicate evasive or anonymous behavior consistent with bearer instrument misuse.
Provides verified details on beneficial owners, personal and business information, signatories, risk metrics, and historical changes. In the context of beneficial ownership manipulation, these records help identify unusual or frequent changes in controlling interests, detect nominee owners, and confirm whether declared owners match official or transactional records.
Contains verified customer identities, beneficial ownership details, and risk profiles, supporting the identification of shell companies or counterparties lacking legitimate business activities. This data helps reveal discrepancies in the stated business purpose for Bill of Exchange usage.
Data Provided: Verified customer identities, ownership and control structures, addresses, transaction histories, risk ratings, and financial statements.
Direct AML Relevance: Enables institutions to identify undisclosed beneficial owners or high-risk customers engaged in cross-border trade that may conceal illicit proceeds via Black Market Peso Exchange networks.
Provides verified customer identities, beneficial ownership information, declared financial profiles, and associated risk assessments. This data helps detect mismatches between customers’ stated risk/income profiles and their bond activity, identify ownership structures that place bonds in relatives’ or third-party names, and assess unexplained sources of funds.
- Contains verified personal and business details, ownership information, and risk metrics.
- Aids in identifying suspicious accounts or relationships potentially used to funnel bribe payments or hide beneficiary details.
Contains verified customer identities, beneficial ownership data, and declared sources of funds or business rationale. For Burn and Mint Transfers, these records allow investigators to:
- Compare stated economic purposes with actual on-chain activity involving burn addresses.
- Identify discrepancies between customer-declared funds and large or repeated burn-and-mint transactions.
- Assess whether customers’ stated profiles align with abrupt changes in transactional behavior indicative of cross-chain layering.
Contains verified customer identities, beneficial ownership structures, and due diligence findings. This data helps investigators identify newly introduced or dormant entities, nominal stakeholders with no legitimate business roles, or investors from high-risk backgrounds linked to the enterprise.
- Provides verified identity details, beneficial ownership information, transaction summaries, risk ratings, and financial background data for each customer.
- In the context of CBI/RBI applications, this information helps detect discrepancies in declared wealth, identify multiple or conflicting identity documents, and flag sudden changes in financial profiles.
- Directly supports AML detection by revealing whether investments for citizenship/residency are sourced from illicit funds or inconsistent with the applicant’s stated profile.
- Identify and verify beneficial owners, shareholders, and controllers of the captive insurer.
- Flag owners lacking relevant insurance expertise, high-risk profiles, or frequent changes in controlling parties, which may indicate possible shell structures or hidden ownership.
- Contains verified details of customers, including beneficial ownership, declared business activities, and investment backgrounds.
- Helps identify potential mismatches between a customer’s stated knowledge of carbon credit markets and their significant investment behaviors, indicating possible money laundering or misuse of accounts.
- Contains verified identities, employment status, financial profiles, and beneficial ownership details.
- Helps detect inconsistencies between a customer’s declared income or business activity and suspicious cross-border cash-carrying patterns.
- Enhances risk assessment of individuals who may be facilitating cash courier activities.
- Contains declared income, source of funds, beneficial ownership information, and overall risk profile of customers.
- Facilitates comparison of stated financial capacity against large or frequent cash deposits, flagging potential inconsistencies.
- Provides essential background to investigate the legitimacy of deposit activity and identify hidden relationships or beneficial owners.
- Consolidate verified customer data, ownership structures, and declared payroll figures.
- Cross-check official payroll information with actual wage outflows to highlight discrepancies, revealing off-the-books transactions.
- Provides verified identity details, declared income sources, and financial backgrounds of casino patrons.
- Enables detection of discrepancies between claimed financial capacity and actual transaction sizes, helping identify potential mules or unexplained wealth in the casino environment.
- Consolidates verified customer identities, beneficial ownership information, and account activity profiles.
- Detects newly created or multiple exchange accounts used to disperse assets across different blockchains and flags mismatches between declared business purposes and actual cross-chain activities.
KYC & CDD records provide verified customer identity information, including:
- Official personal details such as names, addresses, and identification documents.
- Historical changes to customer addresses and contact information.
Access to accurate identity data helps pinpoint inconsistent or fraudulent information supplied during chargeback disputes and detect stolen or synthetic identities used in collusive chargeback schemes.
- Contains verified identities, risk ratings, and supporting documentation for donors, board members, and key stakeholders.
- Enables verification of legitimate donor profiles and detection of incomplete or fraudulent KYC submissions.
- Facilitates screening for infiltration by criminals or parties with unknown or suspicious backgrounds attempting to misuse charitable entities.
- Contain verified identity documents, beneficial ownership information, and account opening details, enabling the detection of inconsistent or suspicious customer profiles.
- Provide baseline transaction behavior and risk assessments, allowing for the identification of anomalies such as sudden large check deposits from unknown payors.
- Help verify the legitimacy of recently opened accounts used for rapid withdrawals following fraudulent check deposits.
- Contains verified identification details, addresses, beneficial ownership information, and risk assessments.
- Allows financial institutions to identify potential links to known child exploitation networks or suspicious profiles, enhancing monitoring and scrutiny of relevant accounts.
- Includes verified customer identity documents, account creation timelines, and beneficial ownership information.
- Helps detect newly registered or minimally vetted accounts quickly engaging in high-value chip transactions.
- Provides a means to identify multiple suspicious accounts linked to the same individual or incomplete KYC profiles, a common tactic in chip dumping.
- Provides verified customer and business profiles, beneficial ownership data, and declared operational scope.
- Assists in comparing the stated business size or nature against actual revenue sources, particularly large cash inflows purportedly from cigarette sales.
- Aids in identifying potential discrepancies in business activity or beneficial ownership that suggest illicit tobacco smuggling revenues.
- Contains verified identity, ownership, and beneficial ownership data for customers and entities.
- Identifies shell or front companies operating in multiple jurisdictions with questionable business rationale.
- Supports evaluating newly formed or high-risk entities involved in suspicious letters-of-credit transactions.
- Contains verified customer identities, beneficial ownership information, and account relationships.
- Enables detection of rapid ownership changes, frequent entity acquisitions, or expansions lacking operational legitimacy that facilitate circular flows.
Holds verified customer identities, business profiles, and risk assessments. Investigators can identify entities or individuals lacking legitimate experience in commodity trading, which raises suspicion of involvement in smuggling networks.
- Contains verified identification details, business profiles, and risk ratings of customers.
- Reveals inconsistencies between declared earnings or business activities and actual financial behavior.
- Helps detect accounts or beneficial owners with prior petty crime or gang affiliations, refining AML risk assessments for common offenses.
- Contains verified customer identities, business details, beneficial ownership information, and risk profiles.
- Highlights gaps or inconsistencies in customer onboarding and monitoring, such as employees creating accounts on behalf of multiple unrelated clients or bypassing KYC checks.
- Assists AML teams in detecting MSB staff collusion and subversion of internal controls used to hide beneficial owners or high-risk relationships.
- Capture detailed identity and background information for project managers, beneficial owners, and key personnel, revealing inconsistencies or evasive explanations.
- Document financial profiles, declared sources of funds, and ownership structures to support deeper analysis of suspicious financing.
- Verify or challenge PEP status and high-risk attributes, especially when public officials award or invest in suspicious construction projects.
- Contains verified customer identities, business profiles, ownership information, and AML risk assessments.
- Enables detection of undisclosed relationships, suspicious backgrounds, or repeated misuse of consulting services to launder funds.
- Contains verified identity details, beneficial ownership information, and risk profiles for members.
- Supports identifying under-documented individuals rapidly depositing large sums.
- Facilitates verification of declared sources of wealth, uncovering infiltration by high-risk or unqualified individuals.
- Includes verified customer identities, addresses, and beneficial ownership details.
- Enables detection of overlapping beneficial owners, suspiciously shared corporate addresses, or unexplained ownership changes.
- Facilitates cross-checking patrons, revealing potential shell or front companies hidden within corporate structures.
Houses verified customer identities, beneficial ownership information, and ongoing due diligence data for respondent banks and their customers. This enables the correspondent bank to verify that newly onboarded accounts have been properly vetted, preventing criminals from exploiting incomplete or outdated KYC to launder funds through correspondent channels.
Contains verified identities, addresses, beneficial ownership structures, and income details. For corruption investigations, these records confirm potential PEP status, declared sources of wealth, and highlight inconsistencies suggesting embezzlement or abuse of office.
- Contains verified customer identities, declared business activities, and ongoing risk assessments.
- Allows detection of inconsistencies between legitimate business rationale and actual cash handling, as well as identifying prior criminal associations or negative history relevant to counterfeiting.
Houses verified customer profiles, beneficial ownership data, and ongoing due diligence updates, enabling the detection of high-risk or frequently changing suppliers and beneficiaries in counterfeit pharmaceutical schemes.
Provides verified identities and business profiles of customers, along with beneficial ownership details, normal trade patterns, and risk classifications. This data helps investigators:
- Identify unusual countertrade deals or goods that deviate from the customer’s usual scope.
- Verify that parties involved in the exchange have legitimate capacities to conduct the specified trade.
- Detect shell entities or suspicious intermediaries lacking transparent ownership.
Contains verified customer identities, business activities, risk profiles, and financial statements.
How it supports AML detection:
- Compares declared business activities and financial capacity with the scale or frequency of legal settlements.
- Flags inconsistencies between a customer’s known profile and large court-ordered payments, indicating potential abuse of court rulings to launder funds.
- Provides verified identities, beneficial ownership details, addresses, and risk metrics for individuals or corporations across multiple jurisdictions.
- Helps confirm the identities of sub-agents or authorized signers, detect unusual changes in signatories, and ensure consistency with declared beneficial owners.
- Supports AML investigations by revealing undisclosed connections or hidden relationships across different jurisdictions.
- Contains verified customer identities, financial profiles, and supporting documentation.
- Enables investigators to confirm if declared sums match the customer’s legitimate sources of funds.
- Helps identify potential discrepancies in declared reasons for cross-border cash movements versus actual business or personal profiles.
Contains verified customer identities, personal and business details, beneficial ownership information, and due diligence interviews. This data is essential for assessing the legitimacy of a client’s cross-border banking relationships and identifying inconsistencies or unusual justifications for multiple international banks in a single payment sequence.
- Contains verified customer identities, ownership details, risk profiles, and declared financial backgrounds.
- Enables comparison of a customer’s stated wealth or transaction patterns against high-value or frequent cross-chain bridge transfers.
- Helps identify inconsistencies or anomalies in bridging activities that do not align with the customer’s known profile or expected financial behaviors.
Data Provided:
- Verified customer identities, beneficial ownership information, declared accounts and wallets, business activities, risk profiles.
How It Supports Detection/Investigation:
- Enables verification of whether newly created or active wallets for wrapped token transactions are disclosed by the customer.
- Allows comparison of customer-stated business or investment purposes against complex cross-chain wrapping patterns.
- Aids in investigating discrepancies between declared customer profiles and observed asset flows.
Holds verified identity information, beneficial ownership data, and risk profiles, enabling scrutiny of account owners and transferees. These records help detect scenarios where multiple account or asset 'gifting' events exploit insufficient customer due diligence.
- Includes verified identity information, addresses, beneficial ownership data, and risk profiles.
- Facilitates the verification of beneficiary or project owner credentials to identify inconsistencies or unverifiable individuals.
- Helps expose sham campaigns or questionable parties lacking proper documentation.
- Contains verified identity data, personal details, and documentation of customers.
- Detects minimal or inconsistent identification used at crypto ATMs, indicating potential mule activity or attempts to bypass KYC controls.
Verified customer identity data, addresses, and risk profiles indicate whether an individual using a crypto ATM underwent adequate due diligence. This helps uncover accounts with minimal identification, detect potential exploitation of weak KYC controls, and inform further AML investigations.
- Encompasses verified customer identities, beneficial ownership data, and transaction risk profiles.
- Detects newly created exchange or wallet accounts lacking legitimate business purposes, enabling scrutiny of account holders engaging in this cryptocurrency layering technique.
- Contains verified customer and beneficial ownership data, declared business activities, and official identification.
- Allows comparison of stated mining capacity or energy usage against the actual scale of hardware purchases and mining rewards.
- Enables validation of a customer’s legitimacy for conducting cryptocurrency mining activities.
Stores verified customer identities, beneficial ownership data, and detailed account transaction histories. Investigators can correlate suspicious on-chain mixer usage with specific customer profiles, identify undisclosed sources of funds, and detect significant deviations from a customer's stated transaction patterns.
- Enables comparison between claimed business activities (e.g., no declared mining operations) and actual account or transaction patterns.
- Useful for identifying suspicious customers unable to demonstrate legitimate sources for incoming crypto or associated funds.
- Contains verified customer identities, declared sources of incoming funds, and expected transaction profiles.
- Highlights discrepancies between the purported remittance source or amount and the actual credited amounts from unrelated parties.
- Contains verified customer identities, beneficial ownership data, and stated business activities.
- Allows comparison of declared customer profiles against frequent or high-volume foreign exchange transactions.
- Supports detection of misaligned account activity, where currency swaps and cross-border fund transfers contradict stated business objectives.
- Contains verified customer identities, historical transactional behaviors, and risk assessments.
- Helps detect sudden changes in cryptocurrency usage (e.g., new mixer transactions) or discrepancies between declared and actual wallet addresses, supporting investigations into suspicious mixer involvement.
Contains verified customer identities, personal/business details, and beneficial ownership information, helping detect:
- Discrepancies between stated personal profiles and high-volume commercial-like purchasing or shipping activities.
- Potential straw buyers or surrogate shoppers misrepresenting their actual source of funds.
Using KYC data helps confirm whether clients’ payment volumes and cross-border import expenses align with their declared profiles, aiding AML investigations into Daigou operations.
- Includes verified personal and business details, risk profiles, and beneficial ownership information.
- Helps detect discrepancies between declared customer activities and actual high-volume or high-risk cryptocurrency transactions associated with darknet marketplaces.
Includes verified identity information, beneficial ownership data, and risk profiles. This enables financial institutions to link DeFi wallet addresses to known or unknown customers, identify self-custodial wallets lacking verification, and flag sudden suspicious activity on DeFi platforms.
- Contains verified identity data (e.g., names, addresses, beneficial owners, risk profiles) for customers.
- Enables investigators to identify customers with incomplete or suspicious KYC profiles who transact with decentralized mixers.
- Assists in tracing real-world identities behind wallet addresses linked to mixer activity, highlighting potential illicit use.
- Contain verified customer identities, beneficial ownership details, and transaction histories.
- Facilitate the detection of customers with no legitimate involvement in the diamond sector or whose transaction patterns contradict their stated business activities.
- Contains verified identity details, beneficial ownership, and customer background information.
- Supports detection of suspicious diamond transactions by checking if customers possess legitimate industry experience and a verifiable source of funds.
Contain originally verified customer financial documents and identity details. Investigators compare newly submitted or altered documents with stored originals to uncover inconsistencies or evidence of digital record manipulation.
- Contains verified individual and entity identities, official roles, beneficial ownership details, and account relationships.
This data enables financial institutions to detect discrepancies in declared diplomatic or state-owned entity accounts, verify the legitimacy of high-value transactions, and assess the risk profile of individuals claiming diplomatic immunity.
Includes verified customer identities, beneficial ownership details, and account relationships. These records help detect sudden or repeated changes in declared beneficial owners around dividend dates, indicating potential collusion or attempts to obscure rightful ownership.
- Contains verified identity and business profiles, addresses, beneficial ownership data, and risk metrics used to confirm the authenticity of submitted documentation.
- Cross-referencing newly provided documents with established KYC information helps uncover inconsistencies indicative of potential forgeries.
- Contains verified customer identities, beneficial ownership data, and risk profiles.
- Reveals parties with prior suspicious activity, high-risk jurisdiction exposure, or newly formed entities lacking operational history.
- Helps confirm legitimate business purposes and identify red flags in documentary collection transactions.
Includes verified identities, authorization details, and business profiles of customers and depositors, allowing for the detection of unauthorized third-party couriers and confirmation that cash inflows align with declared business activities. This data enables thorough investigations into suspicious deposits tied to domestic bulk cash deliveries.
Contains verified identities, beneficial ownership, addresses, and account relationships. This data is crucial for detecting newly created or unverifiable online accounts, frequent or rapid changes in customer details, and mismatched identity information, all of which indicate potential fraudulent e-commerce activities.
Houses verified customer details and historical profile changes. Comparing recent updates, such as contact information or personal data, with imminent early withdrawal claims helps detect last-minute alterations that suggest fraudulent activity.
- Contains verified identity details, beneficial ownership information, and source-of-funds data for policyholders and premium payers.
- Exposes unexplained third-party relationships or financing, supporting the detection of opaque ownership structures and suspicious early policy surrenders.
- Provides verified customer and business identity details, prior KYC data, beneficial ownership information, and historical business or personal data.
- Helps detect discrepancies or repeated changes in identity or business details across relief applications, indicating potential fraud or misrepresentation.
- Facilitates cross-checking newly submitted application data against historically verified information.
- Contains verified information on donors, payers, beneficial owners, and controlling parties of the nonprofit institution.
- Supports validation of legitimate affiliations, revealing suspicious or unverified donors and owners who may be exploiting the institution’s nonprofit status for laundering.
Provides verified customer identity details, beneficial ownership information, and relationship mappings. This data helps identify whether individuals exchanging or consolidating TITO vouchers are legitimately connected or part of collusive activity, enabling enhanced scrutiny of unusual or unexplained voucher transfers.
- Contains verified identities, addresses, beneficial ownership details, and risk assessments.
- Facilitates thorough examination of clients engaging in sectors with high environmental crime risk.
- Flags inconsistent or false documentation provided by shell entities or politically exposed persons involved in resource exploitation.
- Contains verified identity and beneficial ownership information, account relationships, and risk metrics.
- Highlights incomplete or missing beneficial ownership details when professionals invoke confidentiality.
- Monitors frequent changes in professional intermediaries and refusal or delay in disclosures, revealing potential abuse of privileged accounts.
- Contain verified customer identities, business activities, beneficial ownership data, and financial profiles.
- Help assess whether declared export revenues align with a customer’s known capacity and historical performance.
- Reveal potential discrepancies when actual operations do not match the scale of export claims.
Contains verified personal and business information—such as identities, beneficial ownership, and risk profiles—collected during onboarding and ongoing due diligence. This data supports extortion-related AML efforts by:
- Verifying the legitimacy of sources behind large or recurring deposits that lack a clear business rationale.
- Identifying suspicious or opaque ownership arrangements indicative of front businesses used to commingle extorted proceeds.
- Capture verified identity, stated occupation, and expected account usage.
- Enable detection of inconsistencies between the customer’s declared employment and actual financial activities.
- Document explanations (or lack thereof) for incoming funds and changes in personal information coinciding with suspicious transactions.
- Provides verified customer identity information, including names, dates of birth, addresses, and ownership details.
- Allows financial institutions to cross-check submitted personal data for consistency, detect reused or stolen identities, and identify discrepancies in documentation.
- Contains verified identity details, business registration documents, addresses, and beneficial ownership information.
- Enables thorough cross-checking of vendor-submitted data for inconsistencies or fabricated details, helping identify fictitious suppliers posing as legitimate vendors.
- Contains identity documents, beneficial ownership information, transaction profiles, and risk assessments for customers and entities.
- Helps confirm whether purported call-center owners or operators are accurately represented and meet due diligence requirements, uncovering overlooked associations or control persons.
Maintains verified customer identities, beneficial ownership details, and risk profiles, facilitating the comparison of disclosed consulting operations versus actual activities. This helps identify front entities, low-substance operations, or conflicting ownership information central to fictitious consulting schemes.
- Data Provided: Verified personal and business information, including identification details and ownership data.
- AML Relevance: Checks the authenticity of alleged employees’ identities and the legitimacy of their association with the business.
- Contains verified identities, beneficial ownership details, and risk assessments of customers and related parties.
- Identifies genuine investor profiles, helping to flag suspicious or incomplete due diligence where purported foreign investors lack legitimate business ties.
- Contains verified identification details, beneficial ownership information, and self-reported business data.
- Supports scrutiny of declared addresses, operational capacity, and the individuals behind the jewelry business.
- Enables ongoing monitoring of ownership changes to expose opacity or frequent ownership shifts.
- Consolidates verified identities, addresses, beneficial ownership information, and risk assessments.
- Helps detect shell or cover entities lacking verifiable operating history, confirming whether purported sellers or buyers are legitimate.
- Contains verified identity information, beneficial ownership details, and customer risk assessments.
- Reveals discrepancies between a customer's stated financial profile and actual behavior (e.g., repeated large deposits followed by immediate withdrawals).
- Helps verify the legitimacy of third-party payers who fund policies or accounts without documented relationships to the primary holder.
- Tracks changes in beneficiaries or beneficial owners, enabling detection of policy or account ownership shifts used to obscure true controllers.
- Maintains verified customer information, business activities, beneficial ownership structures, and risk profiles.
- Enables comparison of declared business operations against actual foreign exchange transactions, identifying incongruent volumes or patterns.
- Highlights entities that appear dormant or lack physical presence but engage in high-volume FX activities, signaling potential trade-based laundering.
- Contains verified identities, addresses, and beneficial ownership information.
- Facilitates detection of synthetic or falsified customer profiles used in fraudulent schemes.
- Supports ongoing monitoring of customer activity against stated business or personal backgrounds, revealing red flags if behavior diverges from legitimate profiles.
- Contains verified identity information, risk profiles, and compliance checks for customers.
- Helps identify incomplete or inconsistent documentation among individuals managing dubious fundraising campaigns with minimal verification, flagging potential fraud.
- Provides verified identities, beneficial ownership details, and address information for entities established in free trade zones.
- Enables detection of shell or non-operational companies by verifying declared business activities, physical premises, and source of funds.
- Supports ongoing monitoring to identify unverified ownership changes in FTZ entities.
Encompasses verified identities, beneficial ownership details, and information regarding customers’ high-value assets or transactions. Highlights instances where clients are unwilling to disclose the nature or valuation of assets for freeport storage, prompting deeper scrutiny into potential illicit use.
- Contains verified customer and corporate documentation, ownership details, and records of attempts to obtain further financial information.
- Helps identify refusals or delays in providing financial statements or disclosures, suggesting potential front company concealment strategies.
- Contains verified customer information, including identities, beneficial ownership, and stated account purposes.
- Supports the detection of funnel accounts by comparing declared business activities against actual cross-border transaction patterns, exposing inconsistencies.
- Provides verified customer identities, addresses, and beneficial ownership details.
- Allows comparison of declared residence or business locations against actual deposit locations to spot inconsistencies.
- Identifies potential collusion among multiple depositors linked by overlapping personal identifiers or contact information, indicating coordinated smurfing.
Internal files contain verified identities, business details, and historical transaction data for customers.
- Confirms declared addresses, ownership structures, and trade activities, helping to detect suspiciously incomplete or contradictory details that may indicate ghost shipping.
- Ensures alignment of the actual customer profile with shipping claims.
- Encompasses verified identification details, beneficial ownership data, risk assessments, and financial disclosures.
- Enables detection of customers with unverifiable or inconsistent sources of funds for gold purchases, reflecting inadequate or bypassed due diligence.
Contains verified customer identities, beneficial ownership information, and historical activity profiles. Investigators can:
- Detect sudden or unexplained governance token activity among users with minimal or no prior DeFi involvement.
- Identify mismatches between declared risk profiles and high-volume or complex token swaps.
Contains verified customer identities, ownership details, historical account information, and risk assessments. These records confirm eligibility representations in relief applications, highlight deviations from stated customer profiles, and identify potential synthetic or stolen identities used to fraudulently obtain government funds.
Houses comprehensive identity and business information, including beneficial ownership details, risk assessments, and historical activity. Enables the detection of fictitious or inconsistent customer profiles, which are often exploited by hawala operators for untraceable fund flows.
Contains verified identity details, expected cash usage profiles, and beneficial ownership information. Comparing declared usage against actual requests for or deposits of high-value currency helps identify suspicious inconsistencies tied to cross-border note transport.
- Contains verified customer identities, declared financial profiles, beneficial ownership details, and risk metrics.
- Facilitates comparison between a customer’s stated wealth or business activities and high-value asset purchases, aiding in the detection of transactions inconsistent with the customer’s legitimate profile.
- Contains verified customer identities, business details, beneficial ownership information, and comprehensive risk assessments.
- Includes documentation (or lack thereof) on formal agreements and relationships.
This information helps identify customers conducting trust-based transactions without formal contracts, a common red flag in Hot Transfers where documentation is minimized.
- Contains verified customer identities, beneficial ownership details, and risk profiles.
- Allows verification of inconsistent or incomplete documentation, especially when customers claim legitimate business while concealing proceeds from forced labor or sexual exploitation.
- Supports detection of atypical or unexplained changes in customer information and account activities.
- Store verified customer identity details, including documents and addresses, to confirm legitimate identity or flag mismatches.
- Document historical changes or repeated anomalies to expose potential impersonation patterns across multiple accounts.
Includes verified personal details, addresses, beneficial ownership information, and risk profiles. By comparing these records against newly provided identity data or sudden changes, financial institutions can detect inconsistencies, uncover synthetic or stolen identities, and flag suspicious identity updates for further investigation.
Includes verified identities, risk profiles, and beneficial ownership details maintained by financial institutions. By reviewing customer data linked to high-volume timber transactions, it helps detect clients lacking legitimate business rationale for large-scale proceeds.
Houses customer identification documents, risk profiles, and due diligence notes, including any declared provenance or acquisition history for artifacts. This data facilitates a deeper investigation of a customer’s capacity to legitimately deal in high-value antiquities.
- Provides verified customer identities, personal and business details, and beneficial ownership information.
- Enables casinos and financial institutions to confirm whether a single individual controls multiple gambling accounts and to identify potential misuse of face-to-face ID checks.
- Assists in detecting high-risk or sanctioned customers who use minimal wagers and rapid chip redemptions under the guise of legitimate gambling.
- Contains verified customer identity data, including personal details, addresses, and beneficial ownership information.
- Helps detect instances where sub-agents bypass or fail to document required onboarding steps, ensuring compliance with AML/CFT obligations.
Encompasses verified customer profiles, beneficial ownership data, risk assessments, and AML compliance actions. This data helps detect infiltration when:
- A bank experiences disproportionate growth in high-risk customers or sectors post-acquisition.
- Large capital infusions occur from undocumented or opaque sources.
- Enhanced due diligence is bypassed for high-value clients.
- Suspicious transaction reporting declines abruptly after leadership changes.
These patterns may indicate that criminals in control are circumventing or disabling compliance safeguards.
Contains verified identities, financial profiles, and ownership information, allowing analysts to spot individuals lacking legitimate income sources, identify proxy contributors, and confirm whether multiple group contributions align with a customer’s declared financial capacity.
- Provides verified identification documents, beneficial ownership details, and risk profiles for customers.
- Enables detection of individuals or entities who lack proper licensing or offer inconsistent information about cross-border transfers, exposing potential unregulated IVTS usage.
- Validates whether stated remittance activities align with known customer profiles, helping pinpoint suspicious or opaque trust-based arrangements.
- Contain verified customer identities, beneficial ownership information, documented source of funds, and historical changes to customer risk profiles.
- Support detection of unauthorized or suspicious modifications to customer records, enabling identification of insider collusion in altering due diligence data.
- Maintains verified identities, beneficial ownership information, risk profiles, and customer backgrounds.
- Detects unusual trading activity by identifying customers with limited trading experience who suddenly engage in high-value transactions around key corporate announcements.
- Contains verified customer identities, beneficial ownership, addresses, and risk profiles.
- Helps identify accounts with minimal or missing KYC information, a hallmark of instant swap platforms with weak compliance controls.
- Identify any known relationships or affiliations between policyholders and beneficiaries.
- Verify the policyholder’s declared financial profile and investment objectives.
- Provide a chronological record of policy amendments and beneficiary changes.
- Document the origins of supplied funds and verify their legitimacy.
- Capture declared addresses, citizenship, or residency, highlighting high-risk jurisdictions.
- Assess the stated purpose and supporting documentation of annuity structures.
- Uncover beneficial owners or controlling interests behind all parties to the contract.
- Examine intermediary or broker backgrounds during annuity contract setup.
These records are crucial for verifying identities, tracking changes in ownership or beneficiaries, and detecting inconsistencies that indicate potential money laundering.
- Contains verified identity details, beneficial ownership information, and risk ratings for policyholders and beneficiaries.
- Allows investigators to confirm or refute legitimate relationships among policy participants and to identify repeated, unjustified substitutions of policyholders or beneficiaries, indicating potential layering attempts.
- Provides verified personal and financial background details, enabling comparison of stated income or wealth against large or repeated insurance premium payments.
- Identifies beneficial owners or third-party payers to detect unrelated or suspicious funders with no legitimate link to the policyholder.
- Evaluates any discrepancies between declared financial status and actual overfunding or early redemptions, flagging potential money laundering activity.
- Contains verified identity and beneficial ownership information, enabling the detection of hidden relationships or incomplete disclosures by intermediaries.
- Facilitates the validation of authorized signatories or proxies and cross-checking their stated roles.
- Supports jurisdiction-based risk assessments for intermediaries operating in high-risk or non-cooperative regions.
- Contains verified customer identification details, beneficial ownership information, historical account relationships, and risk profiles.
- Facilitates comparison between declared customer financial circumstances and extensive foreign property transactions.
- Supports enhanced due diligence to uncover suspicious or unverified ownership structures in cross-border real estate deals.
- Verified identity information, ownership details, and business profiles for individuals and entities associated with the investment company.
- Summaries of transaction activities, declared source of funds, and risk assessments.
These details reveal undisclosed or nominee owners, questionable ownership transfers, and inconsistencies in financial or background information—key indicators of potential laundering activities within private investment structures.
Encompasses verified customer identity documents, risk assessments, ownership structures, and related due diligence findings. These records help detect uncooperative entities, confirm investor identities, and identify high-risk customers or suspicious requests for secrecy in fraudulent investment setups.
Contains verified identities, beneficial ownership data, and customer financial profiles. By examining investor backgrounds and sources of funds, institutions can detect suspicious or undisclosed beneficial owners injecting illicit capital under the guise of legitimate investment.
- Contains verified customer identities, addresses, beneficial ownership details, risk assessments, and evidence of the source of funds.
- Supports identification of incomplete or inconsistent documentation regarding capital injections for CBI/RBI and highlights reluctance to provide comprehensive financial records.
Holds verified customer identities, beneficial ownership details, expected transaction patterns, and risk profiles. These records are critical for uncovering discrepancies in declared income versus invested amounts, unexplained changes in investor profiles, or layered ownership structures used to obscure the ultimate source of funds.
- Contains verified customer identities, beneficial ownership details, and stated business activities.
- Helps confirm whether the volume and nature of invoiced trade transactions align with the customer's known profile and legitimate operations.
- Contains verified customer details, asset declarations, and insurance coverage data.
- By examining ongoing updates to jewelry valuations or appraisals, analysts can detect inconsistencies or repeated changes lacking credible justification, revealing potential laundering.
- Central repository of verified customer identities, beneficial ownership details, wealth sources, and risk assessments.
- Flags missing or incomplete documentation for high-value junket transactions, ensuring deeper scrutiny of VIP clients and beneficial owners.
Includes verified identities, onboarding notes, and documented justifications for account activities. For knowledge compartmentalization, these records can expose inconsistencies or gaps where individuals or departments have incomplete or fragmented knowledge of broader business operations.
Contains verified information on customers and beneficial owners, including identity data, ownership structures, risk profiles, and source-of-funds documentation. Investigators can confirm whether the individuals behind new or multiple corporate acquisitions are genuinely identified and assess mismatches in declared backgrounds or funding sources.
Provides verified customer identities, risk profiles, declared income, and due diligence outcomes. This data helps detect inconsistencies between reported financial capacity and wagering volumes, and identifies staff failures or overrides in collecting or verifying required customer information for high-value bettors.
- Holds verified identities, beneficial ownership, risk profiles, and supporting documentation for borrowers and lenders.
- Identifies shell entities or undisclosed high-risk associations and uncovers changes in customer details post-loan approval.
- Cross-checks declared financial or business information to spot inconsistencies or omissions indicative of loan fraud.
Includes verified identities, beneficial ownership information, addresses, business registration documents, and risk assessments for individuals or entities claiming to operate lotteries or sweepstakes. Investigators use this data to confirm the legitimacy of licensing claims, detect misrepresentations of business purpose, and identify whether operators are authorized to conduct gaming or remittance activities.
Contain verified customer identities, financial profiles, and source-of-funds documentation. For lottery schemes, these records:
- Help confirm or refute claimed sources of wealth or gambling finances.
- Uncover inconsistencies between declared income and high-value lottery spending.
- Identify third-party claimants lacking legitimate ties to winnings.
These records provide verified customer identities, beneficial ownership information, and account relationships. For loyalty point programs, KYC data helps identify individuals or entities that control multiple loyalty accounts, enabling the detection of aggregating or pooling strategies and verifying whether account holders are high-risk or suspicious.
- Contain verified identities, beneficial ownership details, and risk profiles of customers and counterparties.
- Help confirm the legitimacy of entities appearing in manipulated financial records, detecting potential fabricated or high-risk relationships that facilitate fictional revenues or expenses.
- Documents verified customer identities, beneficial ownership data, and relationships among accounts.
- Reveals connections between traders who may appear unrelated but share common ownership or affiliations.
- Aids in identifying collusion and repeated trading among accounts linked to the same individuals or entities.
- Contains verified identities, addresses, beneficial ownership data, and risk profiles for each customer.
- Facilitates the detection of multiple accounts with inconsistent or missing KYC details linked to match-fixing schemes.
- Assists in verifying customer legitimacy and uncovering potentially collusive or fraudulent account registrations.
- Includes verified customer identities, declared sources of wealth, and account background information.
- Enables detection of mismatches between stated financial profiles and high-volume or complex metaverse-based transactions.
- Flags newly onboarded accounts lacking rigorous CDD or showing sudden spikes in metaverse asset trading activity.
- Includes verified customer identities, beneficial ownership data, stated account purposes, and transaction summaries.
- Allows comparison of actual micro-transaction patterns against declared financial profiles to spot inconsistencies indicative of micro-structuring.
- Maintains verified customer identities, beneficial ownership details, and due diligence findings.
- Helps detect frequent changes in beneficial ownership or identity discrepancies that may conceal smuggling proceeds.
Contains verified identification, beneficial ownership details, and customer risk profiles. Reviewing these records helps confirm whether multiple accounts executing mirrored trades share the same or concealed controlling parties, exposing layering schemes that shift value with minimal oversight.
- Contain verified identity details, declared sources of income, and beneficial ownership information for customers, including public officials.
- Cross-checking these data with unusually high government-related deposits or substantial personal holdings helps uncover hidden misappropriation.
Comprehensive customer data—including identities, business activities, risk profiles, and transaction summaries—enables a direct comparison between the declared purpose of funds and the client's known profile. This helps uncover inconsistencies suggesting misrepresentations.
Contains verified identity and beneficial ownership data for mobile payment account holders, ensuring the authenticity of provided credentials and detecting falsified or stolen identities that facilitate illicit layering or cross-border transfers.
- Contain verified identity documents, personal and address details, and beneficial ownership information.
- Reveal patterns of multiple new accounts opened by individuals with matching addresses, nationalities, or identical ID documents, consistent with money mule recruitment.
- Include declared source-of-wealth data that can be cross-checked against actual account activity to identify discrepancies indicative of mule exploitation.
Contains verified identities, declared occupations, and risk parameters. This information helps identify sudden surges of new accounts opened by individuals with limited local or employment history and flags inconsistencies between stated background and actual transaction activity.
Maintains verified customer profiles, beneficial ownership details, and expected transaction behaviors, enabling comparison of stated business purposes against actual multi-currency swap activities. Discrepancies can indicate high-risk layering and misuse of customer accounts.
- Contains verified identities, addresses, and beneficial ownership details for individuals and entities.
- Helps detect nominee directors or layering tactics across different jurisdictions.
- Comparing declared ownership against registry data can expose inconsistencies indicative of multi-jurisdiction laundering schemes.
Includes verified identity documents, personal and business details, addresses, beneficial ownership information, and ongoing risk assessments. By reviewing these records for each customer account, institutions can detect inconsistent nationality declarations, track newly introduced passports or ID documents, and identify undisclosed dual or multiple citizenship usage. This directly helps uncover attempts to evade scrutiny by leveraging different passports or nationalities.
- Includes verified customer identities, financial statements, and risk metrics.
- Enables comparison of declared financial profiles with large or frequent currency conversions.
- Assists in detecting cumulative activity that exceeds normal client expectations or risk parameters.
Contains verified identities, beneficial ownership details, and overall risk assessments. Reviewing these records helps identify contradictory explanations for repeated invoices, detect shell or front entities, and support further investigation of suspicious billing patterns.
- Contains verified customer identities, beneficial ownership, and risk profiles of individuals operating NFT-related accounts.
- Helps confirm or reveal discrepancies in reported ownership details for blockchain wallets, facilitating the linkage of pseudonymous NFT transactions to actual persons or entities.
Internal onboarding files store prior verified names, biometric data, and device IDs. When a customer resurfaces with a near-match alias, the system can link back to these originals—highlighting undisclosed identity recycling.
- Contains verified customer information, beneficial ownership data, and documented source-of-funds details.
- Identifies repeated refusals or gaps in source-of-funds documentation, aiding in the detection of suspicious negotiable instrument purchases and deposits.
Contains verified identities, beneficial ownership details, account relationships, and risk profiles. These records help detect intermediaries with limited or inconsistent documentation who repeatedly appear in NEP transactions and assess whether customers have legitimate backgrounds or risk indicators.
- Provides verified identities, beneficial ownership details, and business justifications for involved parties.
- Allows financial institutions to detect unregistered or informal actors lacking legitimate economic purposes.
- Helps identify gaps or inconsistencies that may suggest off-the-record asset transfers.
Includes verified customer identities, beneficial ownership details, and account relationships. This data helps confirm whether multiple accounts involved in offsetting trades are ultimately controlled by the same individuals or entities, revealing collusion or layering.
- Contain verified identity details and risk profiles for high-value or frequent gambling customers.
- Highlight incomplete or missing KYC documentation, revealing offshore gambling operators that fail to perform robust customer due diligence.
These records support AML detection by uncovering accounts lacking proper verification or risk controls, which can be exploited for laundering through offshore gambling services.
Includes verified customer identities, beneficial ownership details, source-of-funds information, and risk profiles. This data is essential for uncovering hidden owners behind offshore insurance policies and detecting discrepancies between declared customer profiles and actual premium payments or policy redemptions.
Contains verified identities, customer backgrounds, beneficial ownership data, and due diligence risk findings. Reviewing these details enables financial institutions to detect forged or unverified documentation and identify suspicious account holders acquiring offshore prepaid cards or e-wallets.
Includes verified customer identities, ownership structures, risk assessments, and declared business activities. This data:
• Validates the authenticity and legitimacy of customers involved in offshore transfers. • Identifies undisclosed beneficial owners or contradictory ownership claims. • Supports enhanced scrutiny of high-risk offshore transactions that deviate from declared business profiles.
- Includes verified identities, addresses, beneficial ownership data, and customer risk metrics.
- Highlights discrepancies or incomplete information related to high-risk jurisdictions.
- Assists investigators in assessing whether offshore entities or addresses align with declared business operations, revealing potential secrecy exploitation.
- Contains customer identity and declared location details, correlating official user information with observed system access.
- Facilitates discrepancy analysis between stated residency and the IP geolocation from which transactions/logins originate.
- Supports detecting location mismatches indicative of Onion over VPN usage, aiding AML investigations.
- Includes verified customer identities, risk profiles, transaction histories, and account relationships.
- Provides insight into customers with limited or no gaming background who engage in large-scale game item transactions, helping detect suspicious or fraudulent usage of in-game currencies.
Contains verified identities, ownership details, and risk profiles of clients. Reviewing these records for parties transacting through OTC desks reveals whether minimal or no due diligence was performed, highlighting potential laundering risks.
Encompasses verified customer identities, beneficial ownership details, wallet addresses, transaction summaries, and risk assessments. This supports the detection of inconsistencies in source-of-funds declarations and helps identify frequent wallet address changes that may signal attempts to evade AML controls in payment token activities.
- Contains verified customer identities, declared salary and employer information, and overall financial profiles.
- Allows validation of payroll deduction amounts against actual income levels and employer data to uncover fraudulent or excessive repayments.
Contains verified personal and financial details (e.g., declared income, employment status, and beneficiary information). These records support detecting pension contributions that exceed the customer’s known financial profile and pinpoint suspicious or undocumented beneficiary changes.
- Contains verified customer identities, stated employment details, and risk levels.
- Enables cross-checking of supposedly legitimate job offers or employers cited by customers.
- Detects discrepancies or incomplete information indicative of phishing-based mule recruitment.
- Contains verified identification details, proof-of-funds documents, and account ownership information.
- Monitors changes in customer profiles and verifies the legitimacy of funds used for crypto investments in unregulated platforms.
- Enables enhanced reviews when inconsistent or updated customer data signals potential fraud or scam involvement.
- Contains verified customer identities, beneficial ownership information, and supporting documentation on client business activities.
- Helps confirm the legitimacy of purported lobbying entities or donors.
- Identifies shell companies and clarifies organizational structures, detecting anomalies in fundraising or campaign donation channels.
Contain verified customer identities, financial backgrounds, and source-of-funds documentation. Investigators can identify large or unexplained investments, discrepancies between declared income and actual contributions, and a lack of supporting documents—key red flags in Ponzi schemes.
- Contains verified identities, declared sources of wealth, beneficial ownership, and account relationships.
- Identifies discrepancies between the customer's documented profile and high-value precious commodity transactions, supporting the detection of potential smuggling activities.
Aggregates verified customer profiles, including financial standing, business activities, and risk assessments. Specifically relevant for:
- Identifying customers newly or unexpectedly engaged in high-value precious metals or gemstone trading.
- Comparing declared sources of wealth or business profiles against actual commodity trading volumes.
- Exposing sudden or unexplained escalation in trading activity that may suggest money laundering.
- Contains verified identities, beneficial ownership information, and business activity profiles of customers and corporate entities.
- Helps uncover shell or front companies used to mask precursor chemical procurement.
- Validates the stated line of business and flags discrepancies when activity does not match the declared purpose.
- Contains verified customer data, including identities, beneficial owners, and account relationships.
- Helps identify cases where multiple accounts controlled by the same individual or entity funnel funds into privacy coin wallets without a clear business rationale, flagging potential layering or structuring across multiple accounts.
- Contains verified identities, risk profiles, stated business activities, and transaction histories.
- Reveals when privacy wallet transactions deviate from a customer’s typical profile or stated purpose, indicating potentially unjustified anonymity-seeking behavior.
Contain verified identities, beneficial ownership details, and risk assessments of both clients and professional intermediaries. This enables investigators to confirm stated credentials, identify hidden stakeholders, and detect incomplete or misleading disclosures that may conceal illicit financial activities.
Contains verified identities, ownership details, and due diligence findings for customers and businesses.
- Identifies abrupt or coerced changes in ownership or management.
- Flags high-risk associations with organized crime and unexplained cash transactions indicative of extortion.
Stores verified details on beneficial owners, authorized persons, and overall customer profiles. Facilitates the comparison of listed signatories with actual transaction initiators to uncover inconsistencies or mismatches indicative of proxy arrangements.
- Contains official customer details, including declared addresses or regions of operation.
- Enables direct comparison of reported locations against observed IP geolocation data from transaction and system logs.
- Facilitates detection of location inconsistencies indicative of proxied or obscured network access.
- Contains verified customer identities, documentation, and addresses, enabling the assessment of whether account openings or modifications align with legitimate user details.
- Facilitates the detection of suspicious or falsified identity information submitted from public WiFi locations, where criminals may mask their true details.
- Contains verified customer identities, beneficial ownership information, and documented wallet addresses.
- Helps identify newly created or unregistered cryptocurrency wallets by comparing them against a customer’s established profile.
- Supports investigations by corroborating suspicious wallet activity with known customer attributes to uncover undisclosed connections to ransomware proceeds.
Comprehensive internal datasets containing verified customer identities, beneficial ownership information, risk assessments, and transaction profiles.
- Detects inconsistencies between buyer profiles and the scale of real estate acquisitions, identifying potential straw purchasers.
- Validates whether auction venues enforce due diligence protocols to collect beneficial ownership data, flagging those with inadequate checks that enable anonymity.
- Aggregates customer identity, financial, and risk profiling details, including declared income and business activity.
- Helps identify customers engaging in frequent real estate flips or high-value transactions through escrow that exceed their known financial profiles.
Provides verified customer identities, prior trade engagements, and risk profiles. By reviewing a customer’s historical involvement in trade finance and matching it against newly issued red/green clause letters of credit, institutions can detect anomalies such as sudden or unjustified usage of advanced credit facilities.
- Contains verified personal details, identity documents, and beneficial ownership information.
- Enables detection of repeated or overlapping data points (e.g., addresses, phone numbers) across accounts, alerts on frequent or unexplained changes to customer profiles, and supports verification of authenticity for new account applications.
- Consolidates verified customer identities, including personal details, risk profiles, and beneficial ownership data.
- Uncovers inconsistencies in identification documents or repeated usage of different identities by the same individual.
- Supports linking senders and beneficiaries to verify legitimate relationships and detect layering in remittance transactions.
Provides comprehensive customer profiles, including stated income or business models, beneficial ownership details, and typical transaction behaviors. Comparing remote deposit capture volumes and check issuers against these records helps detect unexplained deposit activity and anomalies.
- Contains verified identity and background information, including addresses, beneficial ownership, and risk assessments.
- Cross-references newly submitted details with established records to uncover discrepancies or fabricated credentials.
- Enables AML teams to detect remote identity theft or synthetic profiles by comparing claimed identities to known data.
- Contain verified customer identities, beneficial ownership details, and documented business profiles.
- Facilitate verifying a customer's claimed involvement in remote mining and identifying discrepancies, such as inadequate industry knowledge or contradictory background details.
- Contains verified identities, beneficial ownership details, and source-of-funds information for landlords and tenants.
- Facilitates the identification of falsified tenancy agreements or financed rent from illegitimate sources, ensuring that parties to rental transactions are genuine.
- Contains verified identity details, declared occupations, financial profiles, and beneficial ownership information.
- Enables investigators to spot inconsistencies between a customer’s stated profile and actual account activity, such as unexplained receipt or transfer of funds.
- Flags incomplete, contradictory, or vague transaction purposes cited by individuals who may be unwitting mules in romance scams.
Contains verified identity details, addresses, beneficial ownership information, and risk assessments collected during onboarding. This information highlights undisclosed or unverifiable project team members, a common red flag in rug pulls. Investigators can uncover incomplete or nonexistent background references, prompting heightened scrutiny of high-risk profiles.
- Contains verified details of customer financial profiles, address information, and the stated purpose for renting a deposit box.
- Enables institutions to assess the legitimacy of deposit box usage against customer income, business activities, and risk factors.
- Facilitates early detection of inconsistencies (e.g., no plausible reason for needing physical storage).
- Provides verified identifying details (e.g., names, addresses, beneficial owners), risk profiles, and documented relationships for customers and intermediaries.
- Helps detect potential ties to sanctioned individuals or front companies, allowing enhanced due diligence to pinpoint undisclosed connections or suspicious cross-border activities.
- Contains customer-provided sector permits, certificates, and other compliance documents made available during onboarding or periodic reviews.
- Allows financial institutions to validate the consistency and authenticity of these specialized documents, detecting indications of forgery or tampering.
- Includes verified customer identities, beneficial ownership details, risk scores, and account profiles.
- Aids in identifying new or unexplained usage of self-hosted wallets, sudden changes in external addresses, and questionable explanations for sources or uses of funds, which may signal high-risk activity.
- Consolidates verified customer identities, beneficial ownership structures, and compliance risk assessments.
- Reveals shell or recently formed companies lacking legitimate operations or credentials.
- Assists in verifying actual activity and raising red flags for suspicious contracting arrangements.
- Contains verified customer information, including personal and business details, beneficial ownership, and transaction summaries.
- Supports detection of hidden controllers and suspicious relationships within networks perpetrating sexual exploitation, facilitating effective AML investigations and risk assessments.
- Contains verified customer identities, addresses, beneficial ownership data, and risk profiles.
- Detects discrepancies in declared ownership or business purposes, indicating potential shell company usage.
- Aids in verifying the legitimacy of management and operational staff claims.
Stores verified customer identities, addresses, ownership information, and risk profiles. This data helps detect smurfing by:
- Revealing accounts with shared personal or contact details that appear unrelated on the surface.
- Comparing declared financial profiles or expected account activity to actual deposit patterns, potentially exposing structuring through smurfing.
- Contains verified customer identity data, personal and business details, and relevant risk metrics.
- Helps confirm or refute legitimate employment documentation referenced in social media recruitment claims.
- Directly supports AML investigations by identifying inconsistencies between claimed job offers and actual customer profiles, a common red flag in mule recruitment.
- Data elements: Verified identities, beneficial ownership data, high-risk jurisdiction flags, and due diligence files on sponsors or investors.
- AML Use: Facilitates assessing the legitimacy of entities injecting funds into the club and identifying potential hidden relationships or shell structures that disguise illicit funding sources.
- Contains verified identities, beneficial ownership data, and source-of-funds declarations for sponsors and related parties.
- Supports AML by confirming the legitimate backgrounds of sponsors and identifying discrepancies in declared origins of funds for sports sponsorships or betting accounts.
- Contain verified customer identities, beneficial ownership structures, risk profiles, and financial statements.
- Help identify accounts controlled by the same individuals or entities, even when using nominee investors.
- Uncover misalignments between declared wealth and actual investment activity in capital markets.
- Contains verified customer identification data, beneficial ownership information, account relationships, and risk profiles.
- Allows comparison of declared customer details with observed multiple account usage below reporting thresholds.
- Helps identify whether the same individual is using multiple accounts or aliases to evade detection of aggregated deposit amounts.
- Contains verified identities, ownership details, and risk assessments for borrowers, co-lenders, and intermediaries.
- Helps detect undisclosed conflicts of interest, repeated reliance on a single lead arranger’s KYC checks, and overlapping beneficial ownership structures that facilitate syndicated loan fraud.
- Encompasses verified identity details, beneficial ownership data, and customer risk profiles.
- Monitors changes in personal or tax identification data tied to repeated refund claims.
- Aids in detecting deliberate identity manipulation to secure fraudulent tax rebates.
- Contains verified customer profiles, financial backgrounds, and expected account activity.
- Assists in comparing recent small transactions against a customer’s normal financial habits to flag unusual probing attempts.
- Helps investigators correlate suspicious low-value ‘test’ transfers with known legitimate or high-risk customer attributes, refining monitoring thresholds.
Contains verified information on customer identities, beneficial ownership, and documented risk assessments. By cross-referencing depositors’ identities with these records, institutions can detect incomplete or inconsistent details provided by third-party depositors, revealing hidden ownership or suspicious funding sources.
- Contains verified identities, professional qualifications, risk ratings, and transaction summaries for customers.
- Helps confirm if purported timeshare brokers or attorneys have legitimate credentials and business histories.
- Facilitates detection of inconsistencies between fee-based inflows and the customer’s stated services.
- Contains verified personal and business details, addresses, beneficial ownership data, and transactional risk profiles.
- Identifies whether participants in the token sale have undergone proper identity checks or if wallets remain unverified.
- Flags large contributions from high-risk or newly created accounts potentially linked to fraudulent fundraising or money laundering.
Contains verified customer identities, beneficial ownership data, addresses, and risk profiles. Investigators can identify potential shell companies or disguised beneficial owners orchestrating illicit trade diversion. Supports direct review of the customer's ultimate beneficiary and final destination claims for shipped goods.
- Contains verified customer identities, beneficial ownership details, and account relationships.
- Enables linking of multiple accounts or entities controlled by the same individual, which is vital in identifying rapid account openings or closures used in Transaction Chaining.
- Assists in revealing suspicious patterns where a single customer repeatedly opens accounts in different jurisdictions without clear business rationale.
Contains verified identity details, declared occupations, business and ownership information, and documentation gathered during onboarding or ongoing monitoring. This data:
- Verifies the legitimacy and registration status of businesses or individuals claiming informal operations.
- Identifies missing or refused documentation, possibly indicating an attempt to conceal true earnings.
- Checks stated occupation or expected income range against observed transaction flows to detect underreporting.
Contains validated customer identities, addresses, beneficial ownership details, and overall risk assessments.
Helps confirm whether bettors are providing legitimate identification, detect incomplete or inconsistent ID details, and compare declared income against gambling activity levels to identify potential illicit fund placements.
- Consolidate verified identities, beneficial ownership details, authorized signatories, and risk profiles for merchants and associated accounts.
- Facilitate the detection of unauthorized or fraudulent merchant account openings and identity misuse, particularly in cases where criminals open TPPP or merchant accounts without legitimate consent.
- Enable cross-referencing of payers with approved client lists and verify business relationships, exposing suspicious funds lacking lawful connections.
Holds verified identity, employment, and personal information. Cross-referencing these details with claimed unemployment eligibility helps detect discrepancies such as mismatched work history, questionable residential addresses, or incomplete personal details, which may indicate stolen or synthetic identities.
- Includes documented customer identities, beneficial ownership information, and source-of-funds details, as required by AML regulations.
- Detects the absence or insufficiency of KYC procedures often associated with unlicensed MSBs looking to remain hidden.
- Highlights incomplete CDD, pointing to potential illicit operations.
Includes verified customer identity data, beneficial ownership details, and collected AML documentation. This resource highlights instances when real estate transactions proceed without standard due diligence, enabling the detection of deals undertaken by unlicensed brokers lacking proper KYC checks.
- Contains verified customer identity information, beneficial ownership details, and account relationships.
- Helps detect minimal or anonymous KYC scenarios, flagging individuals or entities engaged in utility token transactions without verifiable identities.
- Facilitates correlation of on-chain or exchange data with real-world customer profiles, exposing potential use of multiple new wallets lacking proper KYC documentation.
- Stores verified vendor data, including official contact details, authorized signatories, and beneficial ownership.
- Monitors updates to vendor profiles and triggers internal checks to validate the authenticity of changed contact information.
- Enables swift verification of vendor identity before processing payments to prevent impersonation.
Houses verified customer information, including beneficial ownership data and ongoing due diligence outcomes. Repeated failure to supply valid ownership records or reliance on digital documents alone can reveal virtual entities exploiting minimal disclosure requirements.
- Contains verified customer information, including beneficial owners, business activities, and account relationships.
- Enables validation of legitimate business purposes for virtual IBAN usage and identification of suspicious discrepancies in declared activities versus actual fund movements.
- Includes verified identity data, beneficial ownership details, and risk assessments for customers.
- Allows comparison of declared wallet addresses and source of funds against actual usage.
- Identifies potential mismatches, undisclosed addresses, or suspicious multi-wallet patterns that may indicate layered token transactions.
Contains verified customer identity data, personal and business details, and risk profiles. This information helps uncover accounts with incomplete or inconsistent identification, minimal verification, or transactional volumes misaligned with declared user profiles—key red flags when criminals exploit lax KYC in virtual environments.
- Contains verified identity data, beneficial ownership information, financial profiles, and business activity details.
- Enables comparison of declared financial resources against actual trading activity, helping uncover mismatched capital or business operations.
- Facilitates linking multiple accounts under the same beneficial owner to detect self-dealing trades.
- Contains verified customer identities, financial profiles, risk metrics, and beneficial ownership details.
- Allows comparison of wire transfers with the customer’s stated financial capacity and expected activity to flag anomalies in layering schemes.