Open Source Intelligence for Financial Investigators & AML Practitioners is essential for all financial institutions and corporations required to comply with the European Union Fourth Anti-Money Laundering (AML) Directive and similar legislation, or otherwise engaging in enhanced due diligence activities.
This comprehensive training provides financial and business professionals, at all levels, with the latest tools and techniques required to effectively gather online open source intelligence, with the aim of enhancing compliance activities and minimizing potentially detrimental risks to an organization — both quickly and accurately.
Exploring real-life case studies, this course will enable financial investigators and AML practitioners to gather often circumspect information about the online activities, reputations, and business profiles of individuals and corporations, and to effectively evaluate data and sources based on specific online indicators. This advanced practical knowledge of research techniques and methodologies, coupled with technical advances, will enable financial institutions and corporations to prevent potentially costly problems through the early recognition of warning signals.
Students will be introduced to the concept of Open Source Intelligence (OSINT) and why it is an increasingly powerful tool for financial investigators. Learn about:
Building on Module 1 skills, this second module further explores the OSINT process and advanced methodologies for structured searching. Various specialized information gathering and management techniques and tools will also be introduced in this module. Learn about:
Focusing on recent legislation changes in North America and Europe in relation to financial crime, and the resulting implications, specific corporate investigation methodologies will be demonstrated with the use of case studies. Learn about:
This final module will explore how to uncover early warning signals of potential risks, and students will be introduced to real-time monitoring tools. In addition, advanced security and anonymizing techniques will be explored. Learn about: