MAKING THE MOST OF SANCTIONS AND WATCH LISTS Various sanctions, terrorist, and serious crime watch lists are available to anti-fraud professionals and can be utilised for anti-fraud purposes. Led by the architect behind the United Nation’s new format for the al-Qaeda and Taliban sanctions lists, this session discusses best practices in watch list screening and the latest developments in identity matching techniques. VICTORIA MEYER, CFE, FCCA Director Swiss International Business Academy Zurich, Switzerland Victoria is a Director of the Swiss International Business Academy. She trained in the Forensic Services Department of KPMG London before moving on to coordinate the European Forensic Technology practice for PricewaterhouseCoopers. After more than a decade in Big-4 Forensic practices, Victoria now works mainly in the financial services sector, and has worked with the UN, OFAC, and other government agencies on a new format for anti-terrorism sanctions information. She began working with identity data on Social Security fraud investigations and has since used increasingly sophisticated linguistic matching techniques to support investigations as diverse as FCPA, insider trading and mortgage fraud enquiries, as well as high profile assignments for the UN and the search for dormant bank accounts dating from the Second World War. “Association of Certified Fraud Examiners,” “Certified Fraud Examiner,” “CFE,” “ACFE,” and the ACFE Logo are trademarks owned by the Association of Certified Fraud Examiners, Inc. The contents of this paper may not be transmitted, re-published, modified, reproduced, distributed, copied, or sold without the prior consent of the author. ©2013 MAKING THE MOST OF SANCTIONS AND WATCH LISTS Contents 1. Intelligence Screening for Compliance and Anti-Fraud Purposes Sanctions Screening Screening Other Official Watch Lists Screening Other Intelligence Lists Internal Intelligence Lists 2. Selecting External Watch Lists Available External Lists Selecting Appropriate Lists Outsourcing Collection 3. Managing Identity Data 4. Linguistic Identity Matching This paper supports the session “Making the Most of Sanctions and Other Watch Lists” for presentation at the ACFE 2013 European Conference in Prague. The session looks at the different kinds of sanctions and other watch lists available to the anti-fraud professional and considers how they can most effectively be employed in compliance and anti-fraud processes. It begins by considering the various counter-fraud uses for sanctions and other watch lists (including internally gathered intelligence information) and goes on to highlight some of the areas that are most important in making the most effective use of this intelligence: watch list selection and creation, data management, and linguistic identity matching. Intelligence Screening for Compliance and Anti-Fraud Purposes The four main sources for identity screening in compliance, anti-fraud, and counter-terrorism projects are: Sanctions lists Other official watch lists ©2013 2013 ACFE European Fraud Conference 1 NOTES MAKING THE MOST OF SANCTIONS AND WATCH LISTS Other published intelligence lists Internally generated intelligence lists While these lists may be compiled in different ways, and used for different purposes, the techniques necessary for making effective use of the intelligence they contain are very similar. Sanctions Screening International sanctions programs may take different forms. Some of the most well-known are country-based programs, which prohibit certain kinds of transactions with designated states. These often follow UN resolutions designed to promote world peace or human rights, such as the EU’s program of measures against Iran, but may also be instigated at a national level, as is the case with the United States’ economic embargo against Cuba. Country-based official programs often do not provide specific watch lists for screening, but may still form the basis of internal lists. For example, a financial institution might use a list of towns and ports in a sanctioned country to help filter the payments it processes. Of more direct relevance to the screening process are sanctions programs that produce official lists of named individuals, groups, and entities against which restrictive measures are in place. These are often lists of parties who carry out or support terrorist activities, but may also list members of a corrupt regime or parties accused of war crimes or other atrocities. The measures applied could include financial restrictions as well as travel bans or other restrictive measures. Examples of targeted sanctions lists include the UN’s al-Qaeda Sanctions List, the U.S.-issued OFAC Specially Designated Nationals List, the Consolidated List of ©2013 2013 ACFE European Fraud Conference 2 NOTES MAKING THE MOST OF SANCTIONS AND WATCH LISTS Persons, Groups and Entities Subject to EU Financial Sanctions, and the UK HMT’s Financial Sanctions List. Again, many of the national programs are based on sanctions imposed under UN resolutions, so many of the names appearing on the UN lists also appear on supra-national lists such as those issued by the EU, as well as national sanctions lists such as the OFAC and HMT lists. It is arguably in the financial services industry that organisations face the greatest risks if their sanctions screening processes fail, as the penalties for providing parties involved in money laundering or terrorist financing with access to the financial system can be severe. In the worst case scenario, an organisation’s ability to do business in one or more regions can be threatened, as regulators impose strict fines and consider withdrawing banking licences for breaches of sanctions or anti-corruption legislation. In addition, indirect penalties can include negative effects on the organisation’s reputation and the cost of increased regulatory scrutiny going forward. That said, as many of the named sanctions lists apply to individuals working with terrorist organisations or accused of serious crimes, more and more non-financial services organisations are choosing to incorporate these lists into their anti-crime procedures. Screening Other Official Watch Lists The principles discussed in this paper can just as easily be applied to other kinds of watch lists, including law enforcement lists such as Interpol’s Red Notices, the FBI’s Crime Alert List and Featured Fugitives lists, and the various national and regional wanted lists issued by police forces around Europe. Effective screening against such lists can help to prevent an organisation ©2013 2013 ACFE European Fraud Conference 3 NOTES MAKING THE MOST OF SANCTIONS AND WATCH LISTS from doing business with parties accused of criminal offences and from becoming involved in on-going scams. The techniques discussed in this paper are also applicable to regulatory enforcement lists, such as the lists of unauthorised firms issued by the FSA in the UK, the U.S. OCC list of Enforcement Actions and the SEC list of administrative proceedings, as well as a host of similar European lists, such as those issued by BaFin in Germany, the AFM in the Netherlands, and the CNMV is Spain. However, greater care must be taken in selecting such lists for screening and in determining the appropriate response if a prospective business partner is found to be on such a list. While some lists comprise serious warnings, such as parties involved in known scams, others detail more administrative penalties and may contain the names of large, reputable international businesses. Screening Other Intelligence Lists As part of their compliance programs, many organisations also screen lists that are not intended to serve as a warning of a specific risk. Some of the most commonly used are PEP lists—lists of politically exposed persons. Though in most cases there is no implication of impropriety on the part of those listed, some organisations choose to apply enhanced due diligence to such parties in order to limit the risk of becoming implicated in corrupt activities. Some organisations, particularly those required to comply with the FCPA or the more recently introduced UK Bribery Act, also use lists of organisations with full or partial state-ownership in order to determine which of their business partners might qualify as “public officials.” ©2013 2013 ACFE European Fraud Conference 4 NOTES MAKING THE MOST OF SANCTIONS AND WATCH LISTS Other lists may be of a more specific nature. For example, one of the most high-profile identity screening exercises of recent times was the project to identify assets left behind by victims of the Second World War. The value of dormant assets under management is climbing globally, fuelled in part by successive international crises, which have seen owners unable to make timely claims for their property, and in part by the reduction in practices that would previously have seen such assets written up to profit or transferred to state ownership. Fraudsters have long since recognised this and become skilled at claiming to be the owner of assets left behind by those killed or displaced by war and other crises. Using verified lists of those known to have been incapacitated by these events can help to identify fraudulent claims for the assets they left behind. Internal Intelligence Lists While official, published watch lists can be invaluable in the fight against crime and terrorism, for specific anti-fraud investigations it is often internally gathered intelligence that forms the basis for screening exercises. Examples include: Corruption and bribery investigations: Over the last two decades, the FCPA has become a significant feature of the anti-fraud landscape, and the 2011 introduction of the UK Bribery Act has strengthened the applicable provisions. A fundamental pillar of all anti-bribery investigations is the identification of relevant power holders and agents, and the matching of these individuals and organisations against payment registers. Investigations often focus on the creation of a list of relevant public officials and local facilitators, and ©2013 2013 ACFE European Fraud Conference 5 NOTES MAKING THE MOST OF SANCTIONS AND WATCH LISTS screening this against an organisation’s vendor and payment registers. Insider trading: The core of many insider trading investigations lies in identifying the friends and associates of those with legitimate access to insider information and determining any overlap with the friends and associates of those who have apparently benefited from trading on this information. Identifying imprecise matches is often key due to the ad hoc way in which friends’ and associates’ details are collected, and the unofficial (often handwritten) nature of the underlying documents. Identifying duplicate claims: Whether it be insurance payouts or state benefit payments, making multiple claims is a long established method of fraud. A slight change to identity details is all that is needed to get past the standard controls in most payment systems, so it is important that fraud monitoring tools are able to pick up on unusual similarities between claimants and flag these for review. Internally generated lists of known fraudsters and those previously rejected for payouts can also help identify new fraudulent claims. Anti-money laundering: Financial institutions are required to screen their clients and transactions against an ever-increasing number of official lists of alleged criminals, PEPs, and their associates. Much of this information is available for purchase, but strict data protection and associated regulations often mean that only confirmed information is available commercially (e.g., details of those holding public office or individuals convicted of crimes). Many institutions also monitor local and international news services and compile their own watch lists of those suspected of facilitating local ©2013 2013 ACFE European Fraud Conference 6 NOTES MAKING THE MOST OF SANCTIONS AND WATCH LISTS corruption or of involvement in serious or organised crime. Selecting External Watch Lists Available External Lists There are many different national and international sanctions lists, and even more law enforcement/crime management lists available, particularly if the lists published by regional and local forces are considered. Depending on the types of lists to be covered by a compliance or anti-fraud system, the number of regulatory enforcement and warning lists may be even higher. This last category incorporates many kinds of warnings, from investor alerts and lists of enforcement action taken by regulatory bodies, to lists of administrative procedures, such as bankruptcies and other watch lists, such as credit risk warnings and lists of websites involved in attempted fraud. There are a number of ways to obtain official sanctions and other watch list data. Many of these lists and intelligence sources are available free from the websites of the issuing bodies, though they may not be nicely formatted as downloadable lists. Examples include: ©2013 2013 ACFE European Fraud Conference 7 NOTES MAKING THE MOST OF SANCTIONS AND WATCH LISTS UN Sanctions Lists The UN’s list of parties subject to sanctions as a result of their connection to al-Qaeda The UN’s list of parties subject to sanctions as a result of their connection to the Iranian nuclear and ballistic arms programs International Criminal Cases Cases brought before the International Criminal Court (e.g., relating to Darfur, Uganda, DR Congo, etc.) Parties indicted by the International Criminal Tribunal for Rwanda National and Supra-National Sanctions Lists The European Union’s consolidated list of sanctioned parties (includes those measures applied following UN resolutions) Australian consolidated list of sanctioned parties (includes those measures applied following UN resolutions) UK consolidated list of sanctioned parties (includes those measures applied following UN resolutions) U.S. (OFAC) Specially Designated National List of parties sanctioned as a result of their connection to terrorism, drug trafficking, and other offences List of terrorist organisations issued by the Israeli Defence Ministry Canada’s consolidated list of sanctioned parties (includes those measures applied following UN resolutions) Russian terrorist sanctions lists French list of freezing orders issued in relation to terrorist activities Swiss list of parties sanctioned as a result of their connection to al-Qaeda or the Taliban Law Enforcement Lists List of parties wanted for serious crimes by the Chinese Public Security Ministry Persons wanted by the German Federal Criminal Police Mexican Federal Attorney General’s most wanted fugitives Persons wanted by the Russian Interior Ministry ©2013 www.un.org/sc/committees/1267/AQList.htm www.un.org/sc/committees/1737/consolist.shtml www.icccpi.int/en_menus/icc/situations%20and%20case s/cases/Pages/cases%20index.aspx unictr.org/Cases/StatusofCases/tabid/204/Defaul t.aspx eeas.europa.eu/cfsp/sanctions/consol-list_en.htm www.dfat.gov.au/icat/unsc_financial_sanctions. html www.hmtreasury.gov.uk/fin_sanctions_listtargets.htm www.treasury.gov/resourcecenter/sanctions/SDN-List/Pages/default.aspx www.mod.gov.il/pages/general/teror.asp www.osfibsif.gc.ca/osfi/index_e.aspx?ArticleID=524 www.fedsfm.ru/documents/terr-list www.tresor.economie.gouv.fr/4248_DispositifNational-de-Gel-Terroriste www.seco.admin.ch/themen/00513/00620/0062 2/00623/index.html?lang=fr www.mps.gov.cn/n16/n1237/n1417/index.html www.bka.de/nn_198410/DE/Fahndungen/Perso nen/BekannteTatverdaechtige/bekannteTatverda echtige__node.html?__nnn=true www.pgr.gob.mx/servicios/fugitivos/fugitivos.a sp www.eng.mvdrf.ru/rozysk/17/ 2013 ACFE European Fraud Conference 8 MAKING THE MOST OF SANCTIONS AND WATCH LISTS Persons wanted by the South African Police Service Appeals issued by Crimestoppers UK Persons wanted by the FBI for white-collar crimes Selection of Interpol “Red Notices” www.saps.gov.za/_dynamicModules/internetsite /wphome.asp wanted.crimestoppers-uk.org/ www.fbi.gov/wanted/wcc Warnings issued by the Hong Kong Monetary Authority regarding fraudulent websites, emails, and other technology frauds www.hkma.gov.hk/eng/key-information/pressrelease-category/fraudulent-websites-e-mailsand-telephone-system-and-other-fraudcases.shtml www.moneysense.gov.sg/UnderstandingFinancial-Products/Investments/Investor-AlertList/IAL-Listing.aspx?sc_p=all www.cmvm.pt/cmvm/comunicados/contrordmto graves/pages/deccrimesmercado.aspx www.led.go.th/ff/casein/casein.asp secure.interpol.int/Public/Wanted/Search/Form.a sp Italian Police most wanted list www.interno.it/mininterno/export/sites/default/it /sezioni/ministero/dipartimenti/dip_pubblica_sic urezza/direzione_centrale_della_polizia_crimina le/scheda_16056.html Regulatory Alerts, Enforcement, and Administrative Actions List of Financial Institutions of Primary ML www.treasury.gov/resource-center/terroristConcern issued by the U.S. TreasuryActions illicit-finance/311-Actions/Pages/311taken under Section 311 of the USA PATRIOT Actions.aspx Act Significant cases dealt with by the Corrupt app.cpib.gov.sg/cpib_new/user/default.aspx?pgI Practices Investigation Bureau in Singapore D=627 UK (FSA) list of parties not authorised to www.fsa.gov.uk/Pages/Doing/Regulated/Law/A conduct regulated activities who may be trying lerts/index.shtml to operate in that area List of parties not licenced by the Monetary Authority of Singapore who may purport or be perceived to be licenced by them Portuguese Securities Exchange enforcement decisions List of bankruptcies registered in Thailand ©2013 2013 ACFE European Fraud Conference 9 MAKING THE MOST OF SANCTIONS AND WATCH LISTS Obviously, there are many more countries with organisations issuing watch lists than are represented above, and most of the countries represented in the list issue many more lists than are shown. In addition, many administrative regions (e.g., towns, counties, states, departments, kantons, etc.) also issue a variety of different kinds of watch lists. As a result, the number of lists that may need to be incorporated into an anti-fraud screening program can be substantial. Selecting Appropriate Lists The selection of watch lists to be included in an intelligence database will generally be based on a number of factors, including: The nature of the investigation/control process The relevant geographical area The jurisdictions in which the overall organisation operates The requirements of relevant regulators and governing bodies The recommendations of industry bodies The availability of relevant published lists The reliability and motives of the list-issuing bodies Restrictions imposed by screening technology and hit-handling resources In some investigations, the nature of the project will clearly indicate the intelligence data required. For example, an anti-corruption investigation based in a specific country will typically require data on local politicians, agents, and facilitators. In other cases, a broader intelligence base will be required. This is often the case with preventive measures, such as the client screening systems used in the financial services industry. Though regulators will generally only specify that their own, local sanctions list is used for screening, ©2013 2013 ACFE European Fraud Conference 10 NOTES MAKING THE MOST OF SANCTIONS AND WATCH LISTS global operations and a more general requirement for banks to “know their customer” means that, in practice, a much wider range of lists is generally used. The UK bank NatWest famously fell foul of this last requirement when it provided banking services to the Palestinian Charity, Interpal. Interpal has been alleged to provide funds to Hamas-backed groups. It was listed as an unlawful organisation by the Israeli government in 1998, and in 2003, the U.S. authorities also listed it as a Specially Designated Global Terrorist group. NatWest was taken to court by a group of claimants who had been affected by Hamas-led terrorist attacks in Israel, who claimed that, in providing banking services to Interpal, NatWest had provided material support for the attacks. The court found that NatWest should have been aware of the Israeli designation, based on its own KYC policies and on the standards set by the Wolfsberg group and FATF. This ruling had a significant impact on the banking community, particularly as the Israeli list was published only on the Israeli government website, in Hebrew. It became clear that banks were going to have to work harder to ensure that they had identified all relevant available intelligence sources. For each of the lists selected for inclusion in the intelligence database, it should be clear what the expected action would be if a true hit on the list was generated. For some lists, such as terrorist sanctions lists or those indicted for war crimes, it might be clear that the organisation does not want to do business with any listed party. In other cases, inclusion on the list might only signify that enhanced due diligence would be required before contracting with those listed. ©2013 2013 ACFE European Fraud Conference 11 NOTES MAKING THE MOST OF SANCTIONS AND WATCH LISTS There are often jurisdictional issues to consider, particularly where a party is listed for serious crimes in only some jurisdictions. It is interesting that, after several investigations, the UK authorities have not listed Interpal as a terrorist organisation and it remains registered as an official charity. UK banks (unless they are also “U.S. persons”) are, therefore, not required to avoid business with Interpal, though even banks sympathetic to the charity have, in practice, found themselves subject to third-party pressures to cease providing banking services. Outsourcing Collection The sheer volume of lists can be daunting, especially if global coverage is required, and some lists might not be published in a language or script that is recognised by an organisation’s internal systems. In addition, many of these lists are frequently updated, in some cases more than once a day, so list management can become a huge task for organisations wishing to keep their intelligence data up to date. For many projects, a more relaxed update schedule may be appropriate, but in some cases, such as in the compliance systems of financial organisations, not updating watch list data on a sufficiently regular basis can lead to serious regulatory repercussions. For this reason, many organisations choose to purchase their watch list data from a dedicated compliance intelligence provider, such as: Dow Jones (“Dow Jones Watchlist”): www.dowjones.com/collateral/files/dj-watchlistbrochure.pdf ©2013 2013 ACFE European Fraud Conference 12 NOTES MAKING THE MOST OF SANCTIONS AND WATCH LISTS World-Check (“World-Check Risk Screening”): www.world-check.com/our-services/world-checkrisk-screening World Compliance: www.worldcompliance.com These organisations employ dedicated teams of multilingual researchers who monitor official websites constantly and update a centralised, consolidated list. Factors to consider when selecting an intelligence service provider are: How strong is their global coverage (i.e., where are their researchers located and what languages do they speak)? What sources do they use for their data collection? What is their reputation in the industry, and how is their relationship with regulators? How often is their data updated? Do they have a robust, enforceable approach to content and quality? Is any kind of external certification available? Do they use an appropriate data structure (see below)? If they provide an online search function, is it appropriately flexible (see below)? If they provide data files, what formats are available? Managing Identity Data Maintaining a database of watch list data requires a number of key steps: Determining whether lists will be purchased from an intelligence vendor, sourced individually from official websites, or created internally Managing duplication/consolidation Defining an appropriate data structure ©2013 2013 ACFE European Fraud Conference 13 NOTES MAKING THE MOST OF SANCTIONS AND WATCH LISTS Defining an appropriate update schedule Verifying amendments will not affect system performance Auditing adjustments and reconciling data The consolidation element is another key reason why many organisations choose to purchase their watch list data. Many parties are listed on multiple watch lists—for example, those sanctioned under the UN’s program related to al-Qaeda appear not only on the UN list, but also on supra-national lists such as the EU Consolidated list and many different national sanctions lists. Not consolidating the duplicate entries would lead to an overall intelligence database size many times the actual number of sanctioned parties, which increases both the processing time required for automated screening and the time needed to manually review duplicate hits. Within the consolidation process, it is important that no information is lost. For example, many list-issuing bodies provide multiple possible spelling variations for the names of sanctioned parties. In the event of a hit, it may be important to know which official body has listed the variant on which the match has been generated. The structure in which the data is maintained is also key to an efficient screening and matching program. Unfortunately, many official watch lists are issued in outdated structures that owe little to the principles of relational data management. This topic has recently been the subject of a UN-led project to define a new structure for sanctions data. The draft structure was circulated among the compliance and anti-fraud community in 2011, and subsequently approved by the UN’s 1267 Committee. In 2012, OFAC in the United States updated its data systems ©2013 2013 ACFE European Fraud Conference 14 NOTES MAKING THE MOST OF SANCTIONS AND WATCH LISTS using the principles defined as part of the UN project, which are described in the attached consultation paper. The appropriate update schedule will depend on the requirements of the project and the frequency with which the lists to be incorporated are updated. Regulated businesses may find that the relevant regulatory bodies specify a minimum acceptable update frequency, but many regulators remain vague on this point. If the lists are sourced internally (as opposed to purchased from an intelligence vendor), then the appropriate schedule may also depend on the available resources, as monitoring external websites and appropriately updating internal data accordingly can be a time-consuming task. Some list issuers provide a subscription service that notifies users when amendments are made, and some provide delta files—data files that contain only details of changes made since the last update/in the last day/in the last week—which can simplify this task. But many list issuers do not provide notifications and issue their updates by simply replacing the list file published on their website, leaving the user to determine what the changes might be. When screening is part of a real-time business process, such as the screening of payment transactions in the financial services sector, it is vital that changes are reviewed before being fed into the live system. Some sanctions and warning regimes have strictly defined criteria for what must be included on a sanctions list, which might lead to entries being made even when the listed party can only be identified in the vaguest terms. The currentlysuspended EU sanctions relating to Myanmar contain several entries that could cause problems in automated payment systems (e.g., those where the only names available are friend and family.) On the other hand, some amendments may be so minor that they are not worth re- ©2013 2013 ACFE European Fraud Conference 15 NOTES MAKING THE MOST OF SANCTIONS AND WATCH LISTS screening—for example, “Dr John Smith” may be amended to “Dr. John Smith.” In this case, it could reasonably be expected (assuming appropriate search logic is implemented) that the amended entry would not alter the search results. As with any data management program, watch list updates should also be subject to periodic checks and controls. A common way to verify the working of an update system is to start the database by adding a complete watch list, regularly updating the data set using the series of delta files provided by the list issuer or intelligence vendor, and then periodically comparing this to the full, updated file provided by the issuer. When processing time is at a premium, this comparison will typically be run overnight or on a non-working day. Linguistic Identity Matching One of the most important factors in the effective screening of intelligence data is the way in which it is searched. Search technologies can be assessed with reference to their recall (a search with strong recall does not miss relevant hits) and precision (a search with good precision does not produce too many irrelevant hits). While the risks associated with poor recall are obvious, there can be significant hit-handling costs associated with poor precision, as well as the increased risk that hit handlers will miss a relevant hit in a sea of false-positive results, so it is vital to get the balance right between these two criteria. While almost all search procedures require some level of trade-off between recall and precision, it is worth considering this relationship in more detail. Clearly, a matching system which returns all database profiles for any search criteria provides a very low level of precision. As precision is improved, the risk increases that a relevant ©2013 2013 ACFE European Fraud Conference 16 NOTES MAKING THE MOST OF SANCTIONS AND WATCH LISTS profile could be excluded from the results list. However, the extent to which recall may suffer as a result of a specified increase in precision is determined by the sophistication of the technology involved. This is where linguistic identity matching can most greatly benefit the screening process. Many traditional methods of name matching suffer a significant loss of precision if recall is improved. This is particularly the case with technology based on text comparison measures, such as edit distance methods. Using such computational measures, the fall in recall as precision increases is a mathematical inevitability. Linguistic name matching has, to a large extent, provided a solution to this problem. It is a relatively new field, based on knowledge drawn from linguistic sciences and from its sub-discipline, onomastic studies (the study of proper names). Mathematical and probabilistic algorithms no longer form the basis of matching technology, but have acquired a new, supporting role for the core fundament of linguistics. Every linguistic matching rule has two functions: a matching function and an analytical function. The matching element applies the rules required to identify names that are valid linguistic alternatives. An example could be the rules required to match possible transcriptions of the Cyrillic name Ельцин, such as Yeltsin, Jelzin, Eltsine, and Ieltsin. The matching element ensures an appropriate recall for the search process. The analytical element ensures that each linguistic matching rule is only applied in appropriate circumstances. Using the above example, the analytic function would prevent the rules required to match Yeltsin with Eltsine being applied to produce a match between Yan and Ane, ©2013 2013 ACFE European Fraud Conference 17 NOTES MAKING THE MOST OF SANCTIONS AND WATCH LISTS despite these examples being orthographically similar in the same manner, requiring the removal of the initial y and the addition of a and final e. The analytical element, therefore, moderates the impact of increased recall on the precision rate. In this way, the use of linguistic matching rules has revolutionised the identity matching arena and allowed organisations greater freedom to increase precision without running the additional risks associated with reduced recall. The attached paper, “Identity Search and Screening,” describes the challenges faced in the matching of proper names and looks at the linguistic matching solution in more detail. Even when appropriate search technology is in place, the system may still fall short if it is not appropriately configured. It is important in any screening system that the search configuration accurately reflects the goals of the system and the risks that it is trying to manage. To this end, anyone managing such a process should have a defined search strategy that sets out how different classes of matches should be treated. Should transcription variants be matched? If so, which languages and scripts are relevant for this process? Should homophone names be matched? Which languages are relevant for this? Should typographic errors be accounted for? If so, which kinds of errors should be allowed? Should partial matches be allowed? If so, which factors should be taken into consideration? The answers to these kinds of questions should be defined in a search standard. Within an organisation, a consistent search standard is desirable, but in cases where the risks faced by search systems differ substantially, or there is a ©2013 2013 ACFE European Fraud Conference 18 NOTES MAKING THE MOST OF SANCTIONS AND WATCH LISTS wide variation in data quality, it may be appropriate to define different levels of search accuracy for use in different systems. The attached paper, “Linguistic Search Standard,” is taken from the book Linguistic Identity Matching, written by Bertrand Lisbach and Victoria Meyer, and considers how such a standard could be defined in greater detail. ©2013 2013 ACFE European Fraud Conference 19 NOTES
© Copyright 2026 Paperzz