Financial crime perpetrators use many different and sophisticated types of schemes, techniques and transactions to accomplish their goals. However, for a large class of financial crimes, such as doing harm to a company, they cannot escape a powerful principle: illegal proceeds have to return to or be under control of managers to achieve a personal gain. This circular flow of transaction attributes is characteristic of another type of financial crimes: such as a VAT carousel or a Polish fuel mafia scheme. In this work we propose a minimal model of descriptions of a doing harm to a company crime, combined with money laundering. Such a model uses sufficient ontology to build evidence and assign legal qualifications to criminal activities and nothing more. The scheme can be described by using 8 layers of concepts and relations that follow in logical order of uncovering a crime. For example, on the first level that describes money transfers there are only 6 parameters necessary assuming that certain operations can be grouped. Using conceptual graphs with subsumption and negation operations, one can reason on people involvement in a crime and choose between strategies of building a case. The model captures over 90% of relevant information for a typical use case of issuing fictitious invoices, the so called Hydra case and is able effectively reason over relevant facts, which means that legal qualification for this case is basically correct. To what extent the model can be generalized to more complex schemes will be a subject of a further study.
[1]
Czeslaw Jedrzejek,et al.
Police Investigation Management System Based on the Workflow Technology
,
2008,
JURIX.
[2]
Brigitte Unger.
The Scale and Impacts of Money Laundering
,
2007
.
[3]
Dean Allemang,et al.
Semantic Web for the Working Ontologist - Effective Modeling in RDFS and OWL, Second Edition
,
2011
.
[4]
Antonio Badia,et al.
Link Analysis Tools for Intelligence and Counterterrorism
,
2005,
ISI.
[5]
Marie-Laure Mugnier,et al.
Graph-based Knowledge Representation - Computational Foundations of Conceptual Graphs
,
2008,
Advanced Information and Knowledge Processing.
[6]
Jesus Mena,et al.
Investigative Data Mining for Security and Criminal Detection
,
2002
.