Money Laundering, Terrorist Financing And How To Contrast Them: Data And Text Mining In Business Intelligence Solutions
Price
Free (open access)
Volume
38
Pages
10
Published
2007
Size
761 kb
Paper DOI
10.2495/DATA070311
Copyright
WIT Press
Author(s)
F. R. Federici
Abstract
The application of data and text mining technologies in business intelligence solutions can give a great contribution to fighting money laundering and terrorist financing. These crimes are multiform and so laws are important, but they can’t be the only tool to contrast them. Money laundering is a well known offence, but it abandons classic methods in favour of new schemes, thanks to informatics: so called \“cyber-laundering”. Money laundering has assumed great relevance since September 11th 2001, because it shows many links to terrorist financing. Data and text mining can be useful in understanding links between people and suspicious transactions in order to track real money laundering and terrorist financing activities. There are American and European initiatives in which data/text mining and business intelligence assume a strategic rule. However, these applications have a critical aspect that involves privacy. Keywords: money laundering, terrorist financing, data and text mining, business intelligence. 1 Introduction Money laundering offers a lot of competitive advantages and, in particular, criminal organizations use \“cleaned” money in order to infiltrate themselves in the vital points of the lawful economy in order to strengthen their base of power and prestige. The recent evolution of IT technologies offers new opportunities to people who want to launder goods: this is cyberlaundering. Money laundering and financing of terrorism prosper also thanks to the complex financial systems and to nations with weak, ineffective and corrupted structures that should fight these two crimes (Schott [1]).
Keywords
money laundering, terrorist financing, data and text mining, business intelligence.