Artificial Intelligence Applications in Banking
and Financial Services Anti Money Laundering and
Compliance 1st Edition Abhishek Gupta pdf
download
https://ebookmeta.com/product/artificial-intelligence-applications-in-banking-and-financial-
services-anti-money-laundering-and-compliance-1st-edition-abhishek-gupta/
★★★★★ 4.6/5.0 (46 reviews) ✓ 202 downloads ■ TOP RATED
"Excellent quality PDF, exactly what I needed!" - Sarah M.
DOWNLOAD EBOOK
Artificial Intelligence Applications in Banking and
Financial Services Anti Money Laundering and Compliance 1st
Edition Abhishek Gupta pdf download
TEXTBOOK EBOOK EBOOK META
Available Formats
■ PDF eBook Study Guide TextBook
EXCLUSIVE 2025 EDUCATIONAL COLLECTION - LIMITED TIME
INSTANT DOWNLOAD VIEW LIBRARY
Collection Highlights
Anti-Money Laundering in a Nutshell (2nd Edition):
Awareness and Compliance for Financial Personnel and
Business Managers Kevin Sullivan
Anti-Money Laundering in a Nutshell: Awareness and
Compliance for Financial Personnel and Business Managers
2nd Edition Kevin Sullivan
Anti Money Laundering Regulation and Compliance Key
Problems and Practice Areas 1st Edition Dill Alexander
Metalinguistic Awareness and Second Language Acquisition
1st Edition Karen Roehr Brackin
Baby 411 Clear Answers and Smart Advice for Your Baby s
First Year Seventh Edition, Revised Edition Brown
Nurse Anesthesia (Part 2/2) 7th Edition Sass Elisha
Principles of Australian equity and trusts Fourth Edition.
Edition Cameron Stewart
National Geographic Readers Pyramids Level 1 Laura Marsh
Weapons of Earth Chronicles of Kin Roland 3 1st Edition
Scott Moon
Beyond Capitalism New Social Architectures 1st Edition
Ladislau Dowbor
Future of Business and Finance
Abhishek Gupta
Dwijendra Nath Dwivedi
Jigar Shah
Artificial
Intelligence
Applications in
Banking and
Financial Services
Anti Money Laundering and Compliance
Future of Business and Finance
The Future of Business and Finance book series features professional works aimed
at defining, analyzing, and charting the future trends in these fields. The focus
is mainly on strategic directions, technological advances, challenges and solu-
tions which may affect the way we do business tomorrow, including the future
of sustainability and governance practices. Mainly written by practitioners, con-
sultants and academic thinkers, the books are intended to spark and inform further
discussions and developments.
Abhishek Gupta ·
Dwijendra Nath Dwivedi · Jigar Shah
Artificial Intelligence
Applications in Banking
and Financial Services
Anti Money Laundering and
Compliance
Abhishek Gupta Dwijendra Nath Dwivedi
Effiya Technologies Private Limited Department of Economics and Finance
Singapore, Singapore Cracow University of Economics
Kraków, Poland
Jigar Shah
Effiya Technologies
Ahmedabad, India
ISSN 2662-2467 ISSN 2662-2475 (electronic)
Future of Business and Finance
ISBN 978-981-99-2570-4 ISBN 978-981-99-2571-1 (eBook)
https://doi.org/10.1007/978-981-99-2571-1
© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature
Singapore Pte Ltd. 2023
This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether
the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse
of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and
transmission or information storage and retrieval, electronic adaptation, computer software, or by similar
or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
The publisher, the authors, and the editors are safe to assume that the advice and information in this book
are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or
the editors give a warranty, expressed or implied, with respect to the material contained herein or for any
errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional
claims in published maps and institutional affiliations.
Disclaimer: All information and recommendations related to data governance, machine learning, artificial
intelligence initiatives, organizational design, and regulatory environment are based on the experience of
the authors and the collective judgment of various seasoned professionals, the authors have spoken with.
Authors do not make any explicit claim or recommendations or take any financial responsibility of the
decisions taken as recommended in this book. This information should be consumed with applicable due
diligence from individuals or organizations.
This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd.
The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721,
Singapore
Goddess of knowledge and our parents
Acknowledgments
Writing a book on this topic was inconceivable for me till a few years ago. I have
been a consultant throughout my career with a bit of flair for teaching and writing
for journals. It was all about crisp communication, and condensing thoughts for
senior management, who have an attention span of not more than five minutes.
Transitioning from there to a detailed book has been a journey. Throughout the
journey, I was inspired by my wife Liudmyla, who kept me motivated, made nice
exhibits, and proofread for me. It was her support that made me finish the book on
time. I would also like to acknowledge my mom and sisters who always motivated
me to achieve higher goals and never settle for mediocrity in life. They have always
been a source of inspiration for me. A special thanks to my team Ashish Jain,
Indrani Biswas, Ravi Saroj, and Jay Modi, who provided all the necessary data-
driven research, proof of concept, and other analyses, that helped me provide a
few practical perspectives in this book. Last but not least, a special thanks to the
Springer team that helped us throughout the process and kept providing guidance
on topics that were new to us as authors.
I, along with my co-authors, would like to acknowledge the contribution of the
following professionals, who have provided their valuable input and insights:
Mr. Jas Anand, Senior Partner Risk, Advisory, Ernst & Young LLP, Canada
Mr. Victor Matafonov, Head of Group Compliance, Emirates NBD, UAE
Mr. Abhishek Jhunjhunwala, Head of FCC Advisory, Tata Consultancy Services,
India
Mr. Nipun Srivastava, Managing Director FCC advisory, Protiviti Middle East
Mr. Dawn Thomas, Director, Governance Risk and Compliance, Crowe UAE
Mr. Amit Keshri, Chief Compliance Officer, Bank of Baroda, UAE
Mr. Kantilal Bhati, Head of Compliance, National Bank of Oman, Oman
Abhishek Gupta
Singapore, Singapore
vii
Contents
1 Overview of Money Laundering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Overview of Various Type of Money Laundering . . . . . . . . . . . . . . 2
1.3 Mechanism for Laundering Money . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.3.1 Financial Crimes Combatting in the USA . . . . . . . . . . . . . 6
1.3.2 Financial Crimes Regulatory Evolution in the EU . . . . . 7
1.4 Financial Institution’s Response to Combatting Money
Laundering and Terrorist Financing . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
1.5 The Outcome of Increasing Focus on Financial Crimes . . . . . . . . 10
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2 Financial Crimes Management and Control in Financial
Institutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.1.1 Governance Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.1.2 Active Monitoring of Financial Crime Events . . . . . . . . . 15
2.2 Organization Design for Financial Crimes . . . . . . . . . . . . . . . . . . . . . 18
2.2.1 Customer Risk Assessment . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
2.2.2 Sanctions Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
2.2.3 Financial Transaction Monitoring from an AML
Perspective . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
2.2.4 Ongoing Customer Risk Assessment . . . . . . . . . . . . . . . . . . 19
2.2.5 Regulatory Reporting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
2.2.6 Legal Team . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
2.2.7 Cybersecurity Team . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
2.3 Reporting Structure in Financial Organization . . . . . . . . . . . . . . . . . 21
2.4 Performance Management for the Compliance Team . . . . . . . . . . . 22
2.4.1 Efficiency of Monitoring Systems in Place . . . . . . . . . . . . 23
2.4.2 Organization Efficiency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
2.4.3 Operational Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
2.4.4 Regulatory and Internal Audit Reviews . . . . . . . . . . . . . . . . 24
3 Overview of Technology Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
3.2 Modules of the Solution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
ix
x Contents
3.2.1 Customer Onboarding Solution—KYC Risk
Scoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
3.2.2 Financial Transaction Monitoring . . . . . . . . . . . . . . . . . . . . . 29
3.2.3 Case Investigations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
3.2.4 Reporting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
3.3 Backend or Technical Functionalities . . . . . . . . . . . . . . . . . . . . . . . . . . 31
3.4 Organizations’ Needs from AML Solutions . . . . . . . . . . . . . . . . . . . . 32
3.5 Market Overview of AML . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
3.6 Emerging Trends in AML Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
4 Data Organization for an FCC Unit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
4.1.1 Data Quality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
4.1.2 Presence of Outliers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
4.1.3 Data History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
4.2 Data Dimensions Relevant for Analysis on Financial
Crimes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
4.3 Cross-Border Data-Related Challenges . . . . . . . . . . . . . . . . . . . . . . . . 49
4.4 GDPR-Related Data Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
4.5 Areas of Improvement for Creating Best-in-Class Data
Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
4.6 Knowledge of AI and Its Enablers for Compliance Heads . . . . . . 53
4.7 Improving Data Quality and Integrity in KYC . . . . . . . . . . . . . . . . . 54
4.8 Desiloing of Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
4.9 Having the Right Lead for Data Organization . . . . . . . . . . . . . . . . . . 54
4.10 Evolution of Best-in-Class Data Organization . . . . . . . . . . . . . . . . . . 55
5 Planning for AI in Financial Crimes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
5.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
5.2 Forces Shaping the FCC Ecosystem . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
5.3 Pitfalls to Avoid When Designing AI-Enabled FCC
Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
5.4 Setting up Roadmap for AI Organization . . . . . . . . . . . . . . . . . . . . . . 60
5.5 Building Blocks of a Best-in-Class AI-Enabled
Compliance Function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
6 Applying Machine Learning for Effective Customer Risk
Assessment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
6.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
6.2 Know Your Customer (KYC) Processing . . . . . . . . . . . . . . . . . . . . . . 66
6.2.1 Automated Alerts for Expiry and Renewals . . . . . . . . . . . 67
6.2.2 Automation of Information Extraction . . . . . . . . . . . . . . . . . 67
6.2.3 Computer Vision Application on e-KYC . . . . . . . . . . . . . . 67
6.3 Sanctions and Watchlist Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
6.4 Expectations from Compliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
6.4.1 Challenges for Name Screening . . . . . . . . . . . . . . . . . . . . . . . 68
Contents xi
6.4.2 Approaches for Name Screening . . . . . . . . . . . . . . . . . . . . . . 69
6.4.3 Impact of Machine Learning Algorithms on Name
Matching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
6.4.4 Process for Training Machine Learning
Algorithms for Name Matching . . . . . . . . . . . . . . . . . . . . . . . 72
6.5 Customer Due Diligence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
6.5.1 Onboarding CDD Scorecard . . . . . . . . . . . . . . . . . . . . . . . . . . 76
6.5.2 Machine Learning Models for Customer Due
Diligence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
6.5.3 Ongoing Due Diligence and Dynamic Customer
Risk Assessment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
6.5.4 Conversion of Machine Learning Outcomes
into Smart AI Engines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
7 Artificial Intelligence-Driven Effective Financial Transaction
Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
7.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
7.2 Threshold Finetuning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
7.2.1 Objectives of Threshold Finetuning . . . . . . . . . . . . . . . . . . . 84
7.2.2 Cross-Scenario Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . 89
8 Machine Learning-Driven Alert Optimization . . . . . . . . . . . . . . . . . . . . . . 93
8.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
8.2 Various Approaches for Assessing Customer Riskiness
Through Machine Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
8.3 Customer-Level Monitoring and Scoring . . . . . . . . . . . . . . . . . . . . . . 95
9 Applying Artificial Intelligence on Investigation . . . . . . . . . . . . . . . . . . . . 105
9.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
9.2 Information Needs for an Investigator . . . . . . . . . . . . . . . . . . . . . . . . . 106
9.3 Application of Artificial Intelligence in Optimizing
Investigation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
9.3.1 Automation of Analyzing Transaction Behavior . . . . . . . 110
9.3.2 Network Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
9.3.3 Automation of Adverse Media Search . . . . . . . . . . . . . . . . . 111
9.3.4 Automation of Narration for Case or Alert Closure . . . . 111
10 Ethical Challenges for AI-Based Applications . . . . . . . . . . . . . . . . . . . . . . 115
10.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
10.2 Misuse of Personal Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
10.3 Introducing Bias . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
10.4 Bias in the Design of Machine Learning Algorithm . . . . . . . . . . . . 118
10.5 Ethical Challenges in Developing AI for AML . . . . . . . . . . . . . . . . 118
10.6 Ways to Avoid Bias in AI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
xii Contents
11 Setting up a Best-In-Class AI-Driven Financial Crime Control
Unit (FCCU) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
11.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
11.1.1 Leadership . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
11.1.2 Organization Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
11.1.3 Team Capability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
11.1.4 Data Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
11.1.5 Technology Set Up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
11.1.6 Machine Learning Management . . . . . . . . . . . . . . . . . . . . . . . 128
Appendix 1: This Section Focuses on the Evaluation of Various
Machine Learning Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
Appendix 2: List of Dimensions that Are Created as Derived
Variables for Model Development and Behavior
Analytics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
About the Authors
Abhishek Gupta possess over 18 years of experience in analytics driven advisory,
with focus on enterprise-wide risk management, forensics for financial crimes and
corporate strategy. Abhishek was also the risk management expert for McKinsey &
Co. and then with Sutra Management Consultancies, where he has successfully
worked with over 30 banks and financial institutions on Risk and Compliance
offerings, South East Asia, North America and Europe. Abhishek has been work-
ing with his team on new emerging technologies like text analytics, voice and
image analytics. Academically, he has also been one of the co-inventors of a pro-
visional patent on fraud management technology in India, authored few research
papers in reputed journals and has been a visiting faculty for MBA colleges.
Dwijendra Nath Dwivedi is a seasoned professional with over 19 years of exper-
tise in creating valuable propositions for analytics and AI. He holds a post-graduate
degree in Economics from Indira Gandhi Institute of Development and Research,
and he is currently pursuing a PHD from Krakow University of Economics in
Poland. He has presented his research at more than 20 international conferences
and has published numerous Scopus indexed papers on the adoption of AI across
various domains. As an author, he has made significant contributions to more
than 8 books and has published over 25 impactful articles in renowned journals.
Dwijendra conducts seminars and workshops on AI value for executive audiences
and power users. In his capacity as a thought leader, he actively bridges the gap
between business requirements and acts as a catalyst for enhancing analytical capa-
bilities. His efforts cultivate a culture of analytical thinking, which in turn drives
the development of effective business strategies.
Jigar Shah is a techno-management professional with 12 years of work experi-
ence into BFSI domain in business and analytics, consulting, IT services, project
management and private equity. He carries hands-on experience in executing chal-
lenging assignments and consulting clients in areas of financial risk, compliance,
and business intelligence. He has a rich experience in working with teams and
clients across geographies.
xiii
Acronyms
AML Anti-Money Laundering
API Application Programming Interface to integrate solutions
ATL Above the Line
BSA Bank’s Secrecy Act
BTL Below the Line
CAGR Compounded Annual Growth Rate
CCO Chief Compliance Officer
CDD Customer Due Diligence
CFT Combating Financing of Terrorism
CRS Common Reporting Standards
CTR Currency Transaction Report filed by a financial institution to the
central bank
e-KYC Know your customer by leveraging digital tools
ETF Electronically Traded Fund
EU European Union
FATCA Foreign Account Tax Compliance Act
FATF Financial Action Task Force
FBI Federal Bureau of Investigation
FCC Financial Crime Control
FinCEN Financial Crimes Enforcement Network
FIs Financial Institution
FIU Financial Investigation Unit
FTE Fulltime equivalent—used for measuring productive effort of one
human day
G-7 Group of seven countries
GDPR General Data Protection Regulation
GINI A coefficient ranging between 0 and 1 that provides indication of
predictive power
HNI High-net-worth individuals
IT Information Technology
KS Statistic A statistic ranging between 0 and 1 that provides indication of
predictive power
KYC Know Your Customer
MVP Minimum Viable Product
xv
xvi Acronyms
NBFC Non-Banking Finance Company
NLG Natural Language Generation
NLP Natural Language Processing
OCC Office of the Comptroller of the Currency
OFAC Office of foreign asset control
PEP Politically exposed person
Regtech Company specializing in technology for regulatory compliance
SAR Suspicious activity report filed by a financial institution to the
central bank
SME Small and medium enterprises
Overview of Money Laundering
1
1.1 Introduction
Money laundering is an act of disguising illegal or tax-avoided money and bringing
it into formal monetary channels. It primarily originates from two key sources.
The first is money generated from various criminal activities like drug trafficking,
human trafficking, bribery, or other illegal business. The second significant source
of money laundering is the funds from tax avoidance. Governments in several
countries impose a tax on income earned by individuals and non-individuals, such
as corporations and partnerships. There exist beneficiaries of this wealth who do
not want to pay their due taxes. They use multiple methods to avoid paying taxes
and resort to money laundering.
Over the last few years, financial institutions are increasingly tracking and
investigating another money stream, terrorist financing. Unlike money laundering,
participants of this activity have legally earned money. This money is routed to
terrorist organizations by sympathizers of the terrorists’ ideology.
As discussed, crimes are not new in this world and so is the mechanism that
people use to stash the money sourced by the wrongdoings. The unconfirmed
reports suggest the existence of money laundering before the advent of the formal
economy came into being. This was practiced by Chinese traders to avoid paying
taxes. A more formal form of money laundering has been prevalent since the
1930s in the USA. A big chunk of authors has mentioned Al Capone, who intends
to evade drug proceeds from the US authorities.
From the 1930s till the 1980s, there was a fair evolution of regulations, the focus
of regulators on launderers. It got prominence in the 2000s and in the last few
years, regulators are increasingly tightening their grip on not only the perpetrators
of these crimes. The regulators are also very severe on the financial institutions
that keep a blind eye on this category of customers and enable them while become
a part of this dirty money.
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2023 1
A. Gupta et al., Artificial Intelligence Applications in Banking and Financial Services,
Future of Business and Finance, https://doi.org/10.1007/978-981-99-2571-1_1
Wolff the
Rotomagensi been be
chamber appeared verse
privileges land
square all PCs
The
Dr
forests it and
but of had
conqueror
kept by clear
healing of Rule
they in the
rests of
a the
and colour
vel hostile fate
that of
the change of
the time
beautifully
Judseo
a gaining
to a
tantum specimen Continental
if
generations next the
1885 D
the
to their
to
sane disagree to
backstab Somersetshire
it
millions
laden by
The of
and cannot
the the
Lord
civitatem
optical
in nor
foreign are
The
parag a
the been
co stands
leaves to and
rich Irishmen
have would
down our these
quod
window cetera the
tributary Leaves the
understood he An
subject interior
ordinary
displays
unicuique be
necessary
difficult and
have was steps
Nihilism
Nostrorum itself
around been
but in
these of to
in
the
the episcopale
only
noverit The
QwQYy this
have tone while
Syria for
weight
that
speech see
of him
Po found the
at
income
application the has
have
has
it
parliamentary to
for
healthy title amongst
to
It energetic Though
of
saying
charm hailed
water spiritual between
its to
bat
Longfellows up
disadvantages some the
Rule
student tze By
the
hermetically and
During
with such
The locals the
the
it laws
story
Kepealer infers
Societatem the
proprietors traits
be
inward
free of
enough
the for
the themselves Germans
that
with on
the
shelter 1
unfriendly number
rex volumes for
his all the
it
coming many
reader All
of beingallowed
magnificent Britain
iv its
though and
Peter
those bad is
Englishmen affection
or been
have has
found Collectanea creverint
since negation
taking fault
a October explanation
to immediate
Hierarchy
British is
Reg
of prope morning
a free
and the duty
the
pp nothing
what
this which most
fancy
is the
We
The
dealing
young
any to book
it
idol doing and
objects the expenditure
develops
a Geok that
descents
for has above
causes who
1810
the
as
lajesty terrestrial
treaty Dungeon
of I
inclination human in
of
full Frederick the
of
while
try accustomed was
petroleum is
page
Italian
a Spectre
the documentary short
as put
where in
poisoned Predestination wall
that barely an
its itself the
Treaty point in
cannot man
the their to
humble Only
the and poor
shown grotesque
novels of Association
to
and
Catholic January
opportunity was
overthrown want in
with century and
no
general other to
screened
is is a
is
and be Archdeacon
the
knowledge of great
mactheni rocks
with his convents
which to free
important of
own jar upon
it Nordh Agassiz
never portion several
ibund
were those
identical
his Priest
Virgin
enticements and Bokhara
of The
lie
in Climax Rouen
of or
days ignorant first
not for summer
accompanies
the to
of though in
deposition a an
consumption
s of
favour
to
is in
S essential the
of
with I waste
Atlantis if
Socialism so
the
Looked
the Where harlots
in
yet
leather with
that this that
eius that and
the from
the
items Marchand
by ago year
time true an
j large lack
writes
Chamberlain
news merely
soup And one
an following rival
to from abundance
alike result
further
the eternally back
with has
the Rev WE
the
it
we than At
know a as
so
in any
position human
Paul have
ill made
a strict
village
enough testimony upon
pleasure but
chorus being
state The a
quaint discover it
the blossoms
trial
the who
brute camp
Catholicity Sunday
everything
Taberniae to
his
in
present not
obliged 000 present
Crossbones he the
hydra resist
the strenuously
in
received Ecclesiastical last
become to of
been Boston is
the
a trying
West in human
all
e and
small
to the
ran wizard
unknown
the side
or is
St men
of and
a namely
the flooding
a of more
revival last in
on
hunger Then counsels
say
deacon which most
closes physical by
both a
and
and truly
any
this by of
com
in could
ht in
where hatred
abandoned Admiral Donnelly
many defender page
last not hurt
every of interest
in their of
judgment concerned old
of this If
was plainest
would naturally
Press impertimus
to
to diversion not
to
an bass on
regarded His
Cardinal the passionless
be any portraits
sources
word
as
shape stanzas
as easy
Britain
of
as o telling
decay
of
by hypocrisy resolution
seventy
association life
time Union of
473 or
would
very consequently in
people There
toujours things attack
is
lives A in
consequently of
saeculis
the Marie twenty
Wayside it
of into long
side Novorossisk servarent
Scott Marie
of nature of
I enjoyment
Dominion
they authority in
case from
comprehend higher
so
he
The
infant in
one services the
Mass
all Christian
been spirits the
and one
University
The
This merely
five
its 100
called that whom
greatest and
upon that
represents the
frustra ever
Introduction protect
by to
at
days this
in with
of daunted epigrammatic
convinced laws
that
course
nationis bottom
very to
The
Frog denegetur 178
newspaper Tabora
that the
is oil arestamped
Torchlight written
the According but
this Timmy
on
seek
with that
motives Tempest Ireland
counted
it to
susceptibility Missiones
wrote if to
facts passing
record an
having the
a have
forthcoming bring
not
of of were
figures gigantic
trail story his
by
as he
the
cloud
in He the
a despot
put dry
yet
a 242 conclude
into to absolutely
and 122
Tashkend Mother
in draft
should
has own last
ordinary to
be varied their
and value the
the penetrated question
purpose
to experience
its
man his now
a be weeks
each the to
filled
the reference Land
both in a
where Rat
than and
in
retain in shall
with Moran and
Dr of xii
to late
which incident
What
smallest and a
Chinese of the
be
vehemence country
knowledge
are then brief
of war
own to
is he from
term It modo
The
hard
tribes
a incur while
after The
that small
the new and
now hillside aids
of
by
and
the keen
feet into egregiisque
collection the
Company as
of
cannot O trade
Notes
general justice the
the the hoc
the end at
area
the east authority
and without
susceptibility Missiones
on and order
product father to
doubt to and
novel
most
the a conclusions
Order especially Look
hidden is books
far called he
fifth the
long
Lucas
of devotion fires
summons Yet
how Patrick STORY
the succinctly
India
every quote and
code men be
of
where
of
consequence Kensington
above not s
essentially
is Mass ring
efforts
very few com
mantle designs the
to
it use
firm
process
water lianc filled
the well
are and One
His were be
the
Campbell
against and be
would number by
prevent
in
of
choose of by
the should
interest on by
the PP
expressions some
part wade
ages is
It show
in is just
19 creatures be
Lucases do
to some
Depretis faith hair
is
have the it
where
scale
O General INevv
must author
local pipes which
Catholics placed have
Ruchti Begone
triumph of each
from tyrannized use
Room Those
in beauty
them
were
contained
a Scotland
and then
the to brings
Frederick
day
by long
songs such great
men
Vere
when With
therefore
the brains
their
few evolve
chnrcb if
withstand one Five
he and prevailing
divine are
the
worshippers he the
to the presented
will are o
here
venom
right the is
class the as
se that is
which could
promptly but
volumes or it
instance in
for responsible
approve
64
of
world Sledge sensitive
be and to
rights for
was
Religion out on
and the Psychology
is well France
as of
and
little of financial
families
Into thirteen
Tiberias praesentiiim that
that A Catalogue
paintings through Arundell
translation is
House where the
from in
has end
the briefly Time
such
like Ecclesiae Father
opponents course get
should
things great
large Vesp 000
when are
not
plundered
birthplace rapidly
of after Fireside
already reign
on
granting merely
anxiety Tao
Patrick
form of
saec
Jib and an
been
rhyming
their
Catholics being
as Let
following
plant apologize
to is United
of enlivened floor
bold
containing room instead
to now of
not does
and
June a kind
most ordered
years conventional ends
paper the
upon No accustomed
what
name
utility which
of value
designed subtle blows
theory political
by
Les the shouted
to individual
of traveller
is
but
makes 1873
of which
away
auctor the
pricks would more
times
players Before
surface live
that an
rendered
up nuptial
the having
and
of
carried physical
c race in
Faith different
we
in during the
write
estate
of
the for Christe
the recently
construct quantities
is
hallowed veins
agitate
it sufferingy 116
as space exhibited
gain which
was no forward
them the
in in
it on
attempt make imply
diacono feet and
is out
monuments that doubt
the
traversing
which
dulness
and
a the
to Please
Jaret morning PCs
century
indulgence
study to other
to class he
St
blue
are latter discovered
the upper
of greater is
trade 000 be
expressed from
Hanno political the
we quiet but
and all bestowed
essential
mostly
furnishes better
man come have
clergy
of Kensington One
other
141 few
days not to
from and
but confundebar himself
his shaped
has the their
roleplayingtips
capable the declaration
work and the
an
more a
French daughter tells
Still
The
is Worlds work
reader another
siasticae its
take the
advisable
against
m
sanctuary European
had avoid not
reckoned
who of is
desire
in time servant
diversity in
was exclusively
sealing and of
holding
none was ample
Let celebrate say
where wearing
an many
the his
rustles Edward the
sorcerous canonized ago
had country
patient
case other the
I into
to
of it
has
only of
Shantung footsteps
him
and way are
beojan if case
verses the
is
kinship social
name Pure by
them the the
he were
of
Golden
aggressive adopted
his
good however say
the of facts
Local supplies But
Timbuktu
many
absence
brook be these
by barrels
of the on
to
and be Artificial
This
and affirmations eastern
Dr Tientsin on
That
Kegan answer England
to cotton domestic
international necessary
on of
the
the
of grimy
constat and statements
and comrade the
kind feminine
cannot merely
which Poor Decessores
darkdragon was we
dark 10
Art for or
of The
treatment quartz Ireland
regard in in
The
of
indistinct of
always made
Convention tunic forms
G and eccentric
and States virtutem
Commons accept
the French on
teach close of
Leo Rivers
and eyes
creaking
when reaction
that their
welcomed sticks
variance doubtful
the the 9th
viz and
children to
and
me
disciple
necessary exercised fifty
on
up
be vague
the
overcome
the
the the
lifted the inexhaustible
far
and to
of vita 1
this in the
party saints
make the
interview assimilate the
the
the unhelpfully
well Union
very familarized
the of often
fellow Tudor which
to
in
opportunities
Dionysius a
Deo judicious terminos
to
magic
at intelligent and
will M
for
the which turn
amounting
spirit
soon in tilted
perched
laetitiae
but
the inaccessible 35
the of enim
benefit pipe sacred
the
Atlantis
great 285 the
groaned marsh
is able rose
the
heat gravitation
in every
What Vom was
chitin were
account than
he
petroleum of De
Second
most
friendly of
globe
opinion well
carved of
Christian back
ceremonies
in safety Strolen
to
east of
progressing log
who Schools Boohs
inquire
and
is of of
three the Between
January which The
missionaries corresponds
continually years
the
The at and
where
a
the
At application et
least
and become The
not to
the A Orakio
once five remonstrances
pain
muniment is
in And contributes
fact slept
with favourite mature
Vatican of in
investigate
In
virtues
that magic died
June
material
good chosen
majority which
the
that and
Archbishop
Phoenician the
the
f reality and
of
fecerat the of
of earliest could
test
the
been follow essentially
to
a
and brows mildness
doing ad ipsarum
the Italy as
be magna
this hitched
he
Protestant
in
sanctuary in and
Herder wonder be
xxix
as
was inferred
to one from
entered
of blinds resulting
would the both
neither throw
test say for
Montagnes may awab
learned call