Money mule schemes are a growing threat in the financial sector, used by criminals to launder illicit funds through complex networks of bank accounts. These schemes involve intermediaries who transfer funds on behalf of organized criminal rings, making detection exceptionally challenging due to their layered and decentralized nature. Traditional investigative methods often fall short in uncovering these hidden relationships and patterns, leading to prolonged investigations and increased compliance risks.
In this webinar, we will demonstrate how graph technology is transforming the fight against money mules to accelerate the detection and investigation of complex schemes. By using advanced graph algorithms and visual analytics, we’ll show how to detect suspicious activity within vast datasets and uncover the actors central to these schemes and their relationships in large-scale criminal rings.
Agenda
Understanding money mule schemes: Insights into the mechanics, evolving tactics behind these schemes and challenges for AML/CFT compliance teams
Why traditional methods struggle to uncover hidden relationships in large and complex datasets.
Introduction to graph technology: How graph analytics reveal insights undetectable by other approaches.
A live demo of a money mule investigation using advanced graph algorithms and visual analytics
Live Q&As
Presenters
Thibaut Kellam
Head of Customer Success
Thibaut Kellam is the Head of Customer Success at Linkurious and Certified Anti Money Laundering Specialist (ACAMS). Before joining Linkurious to support financial institutions in the adoption of graph technology to fight financial crime, Thibaut was a KYC/Compliance analyst and a Financial Security Manager at BNP Paribas.
Andrea Berni
Solutions Engineer
With 4 years of experience as a technical advisor in B2B processes, Andrea supports Linkurious’ clients dealing with technical challenges, ensuring they gain the most value out of Linkurious Enterprise. MSc. In Computer Science from La Sapienza, Italy. Thesis in Ontology-Based Data Access.