SlideShare a Scribd company logo
2
Most read
3
Most read
Dear ,
As per my previous mail,Iam sending you complete details of my job profile and the
differentsoft wares that we use to detect External and Internal frauds within the RBS group.This
will just give you an idea how DETICA works to prevent fraud in Companies.As per your previous
mail to me i have also completed my cv registration with Redsnapper .
INTRODUCTION:-
Detica:-Detica is an external company which provides a services to the Bank (RBS) by providing
a product called NetReveal which manipulates customer personal details to create social
networks.these networks are then scored against Risk triggers and are prioritized by level of
fraud risk.The system got substantial benefits and prompted the group to purchase the Detica
license that allows the Detica NetReveal system to be used as a key fraud prevention tool within
the RBS group.
What is Detica NetReveal ?
Detica NetReveal uses common factors such as e-mail address ,home address,mobile phone
number and account transactions to create linksbetween RBSG customers from the information
provided by Financial Crime UK.Once these linkshave been establishedDetica then ranks the
networks using scoring techniques to identifythe highest potential fraud risks.The networks
provided are grouped into the following sub categories :
 Cash Cycling .
 Confirmed Fraud.
 Suspected Fraud.
 Large Network.
 Cheque Runaway Spend.
Different Tools and softwares used during Fraud Investigation :-
1.Profiling the Customers:-
 AGE.
 NATIONALITY.
 DATE JOINED THE GROUP.
 OCCUPATION.
 CUSTOMER LOCALITY.
 MARKER IS CURRENTLY ON THE ACCOUNT.(CREDIT RATING).
2.GK3 search:-Gk3 is the internal tool which is very helpful to profile customer and have proper
case background .Gk3 also tells which all departments are dealing with the Customer.
3. CUSTOMER EVENT SYSTEM:-
CES NOTES are typicallysplit into three main areas:
 Personal Information:- Here you will see notes such as address changes,name amendments
etc.
 Concerna and Queries:-Here you will see notes regarding charges,chequebooks or card
orders.
 Fraud Notes:-Here you will see notes regarding potential or confirmed fraud.
4.Back Office Investigation:-
 Turnover.
 Balance.
 Overdraft Limit.
 Source of funds
 Beneficiariesof funds.
 Unusual Cash transactions.
 Concerning cheque behaviors.
 Unpaid: IN and OUT.
5.Equifax:-
Equifax is one of the most valuable fraud tools used to Detica when investigating a customer.
 Alias usage
 Multiple individualson voter roll with your customer.
 Multiple recently opened credits for your cutomer.
 CIFAS loadings.
6.IMAGE AND WORKFLOW:-
iMAGE AND WORKFLOW can be very valuable to your investigations.Image and workflow can
be used to find account opening documents and Identification provided at the time of
application.
7.Keesings:-
Keesings isa tool that you can use to check identitydocuments such as Passport and ID cards
8.Visa checks:-
If you have suspicious of the false Visa .Passprt validator can be used to identifythe fraud.
9.Voucher Enquiry System
VES is used to identifycheque fraud withinthe group.
10.AML :-
A set of procedures, laws or regulations designed to stop the practice of generating income
through illegal actions. In most cases money launderers hide their actions through a seriesof
steps that make it look like money coming from illegal or unethical sources was earned
legitimately.
11.INVESTIGATION NOTES:-
Having completed investigation the information must be gathered to write summary and make
recommendations.The summary should make references of all important information gathered
through entire investigation tools.The most essential part of the investigation notes is
Full Assessment Reports (FAR) which should cover everything in report and the final outcome.

More Related Content

PPTX
Bank Accounts & Customers
PPTX
Internet Banking - NEFT and RTGS
PDF
Payment Gateway
PDF
chapter 7 : electronic banking
PDF
Payment gateway testing
PPTX
Payment gateway
PPTX
e-banking
PPTX
RTGS AND NEFT
Bank Accounts & Customers
Internet Banking - NEFT and RTGS
Payment Gateway
chapter 7 : electronic banking
Payment gateway testing
Payment gateway
e-banking
RTGS AND NEFT

What's hot (20)

PDF
How payment gateway process works?
PPT
Swift money transfer
PPT
RTGS & NEFT by ROHAN PRAKASH @ BMSB
PPTX
PPTX
NEFT & RTGS
PPTX
Invoice Discounting.pptx
PPTX
Internet Banking
PPTX
Online payment gateway provider
PPT
E Banking
PPT
Neft and rtgs
PPTX
Internet banking
PDF
How To Qualify For A U.S. Diversity Visa (DV-2022)
PPTX
RBI guidelines for mobile banking
PPTX
Payment systems
PPTX
Payments and transaction processing systems - Global and Indian Overview
PPTX
Payment gateway
PDF
E Banking
PPTX
Internet Banking by Chethan Raju
PDF
Types of kyc documents required for various customer
How payment gateway process works?
Swift money transfer
RTGS & NEFT by ROHAN PRAKASH @ BMSB
NEFT & RTGS
Invoice Discounting.pptx
Internet Banking
Online payment gateway provider
E Banking
Neft and rtgs
Internet banking
How To Qualify For A U.S. Diversity Visa (DV-2022)
RBI guidelines for mobile banking
Payment systems
Payments and transaction processing systems - Global and Indian Overview
Payment gateway
E Banking
Internet Banking by Chethan Raju
Types of kyc documents required for various customer
Ad

Similar to DETICA INTRODUCTION AND EXPLANATION . (20)

DOCX
E-business,Methods, Function, Formation, Risk, Resources,etc- SNAPDEAL
PPTX
Business Identity Theft
PDF
PCI Compliance Process
PDF
Fraud Prevention Guide
PDF
PCI FAQs and Myths
DOCX
Preventing Internet Fraud By Preventing Identity Theft
PDF
PCI FAQs and Myths - BluePay
PPT
How really to prepare for a credit card compromise (PCI) forensics investigat...
PDF
Iaetsd vulnerabilities in credit card security
PDF
Arrival of A.ID - compliance-as-a-service solution
PPTX
Mobile payment solutions pp.
PPTX
Reduce your aml compliance workload
PPT
Liberty Data Solutions, Know your Client
PPT
Merchant Account Tips: Proven Methods for Reducing Online Credit Card Fraud &...
PDF
Insurance stream - Marc DonFrancesco slides
PPT
Fraud Presentation
PPTX
Pay Easy Solutions International
PPTX
Pay Easy Solutions International
PPT
Business Intelligence For Aml
PDF
IDTmemberGuide
E-business,Methods, Function, Formation, Risk, Resources,etc- SNAPDEAL
Business Identity Theft
PCI Compliance Process
Fraud Prevention Guide
PCI FAQs and Myths
Preventing Internet Fraud By Preventing Identity Theft
PCI FAQs and Myths - BluePay
How really to prepare for a credit card compromise (PCI) forensics investigat...
Iaetsd vulnerabilities in credit card security
Arrival of A.ID - compliance-as-a-service solution
Mobile payment solutions pp.
Reduce your aml compliance workload
Liberty Data Solutions, Know your Client
Merchant Account Tips: Proven Methods for Reducing Online Credit Card Fraud &...
Insurance stream - Marc DonFrancesco slides
Fraud Presentation
Pay Easy Solutions International
Pay Easy Solutions International
Business Intelligence For Aml
IDTmemberGuide
Ad

DETICA INTRODUCTION AND EXPLANATION .

  • 1. Dear , As per my previous mail,Iam sending you complete details of my job profile and the differentsoft wares that we use to detect External and Internal frauds within the RBS group.This will just give you an idea how DETICA works to prevent fraud in Companies.As per your previous mail to me i have also completed my cv registration with Redsnapper . INTRODUCTION:- Detica:-Detica is an external company which provides a services to the Bank (RBS) by providing a product called NetReveal which manipulates customer personal details to create social networks.these networks are then scored against Risk triggers and are prioritized by level of fraud risk.The system got substantial benefits and prompted the group to purchase the Detica license that allows the Detica NetReveal system to be used as a key fraud prevention tool within the RBS group. What is Detica NetReveal ? Detica NetReveal uses common factors such as e-mail address ,home address,mobile phone number and account transactions to create linksbetween RBSG customers from the information provided by Financial Crime UK.Once these linkshave been establishedDetica then ranks the networks using scoring techniques to identifythe highest potential fraud risks.The networks provided are grouped into the following sub categories :  Cash Cycling .  Confirmed Fraud.  Suspected Fraud.  Large Network.  Cheque Runaway Spend. Different Tools and softwares used during Fraud Investigation :- 1.Profiling the Customers:-  AGE.  NATIONALITY.  DATE JOINED THE GROUP.  OCCUPATION.  CUSTOMER LOCALITY.  MARKER IS CURRENTLY ON THE ACCOUNT.(CREDIT RATING).
  • 2. 2.GK3 search:-Gk3 is the internal tool which is very helpful to profile customer and have proper case background .Gk3 also tells which all departments are dealing with the Customer. 3. CUSTOMER EVENT SYSTEM:- CES NOTES are typicallysplit into three main areas:  Personal Information:- Here you will see notes such as address changes,name amendments etc.  Concerna and Queries:-Here you will see notes regarding charges,chequebooks or card orders.  Fraud Notes:-Here you will see notes regarding potential or confirmed fraud. 4.Back Office Investigation:-  Turnover.  Balance.  Overdraft Limit.  Source of funds  Beneficiariesof funds.  Unusual Cash transactions.  Concerning cheque behaviors.  Unpaid: IN and OUT. 5.Equifax:- Equifax is one of the most valuable fraud tools used to Detica when investigating a customer.  Alias usage  Multiple individualson voter roll with your customer.  Multiple recently opened credits for your cutomer.  CIFAS loadings. 6.IMAGE AND WORKFLOW:- iMAGE AND WORKFLOW can be very valuable to your investigations.Image and workflow can be used to find account opening documents and Identification provided at the time of application. 7.Keesings:- Keesings isa tool that you can use to check identitydocuments such as Passport and ID cards
  • 3. 8.Visa checks:- If you have suspicious of the false Visa .Passprt validator can be used to identifythe fraud. 9.Voucher Enquiry System VES is used to identifycheque fraud withinthe group. 10.AML :- A set of procedures, laws or regulations designed to stop the practice of generating income through illegal actions. In most cases money launderers hide their actions through a seriesof steps that make it look like money coming from illegal or unethical sources was earned legitimately. 11.INVESTIGATION NOTES:- Having completed investigation the information must be gathered to write summary and make recommendations.The summary should make references of all important information gathered through entire investigation tools.The most essential part of the investigation notes is Full Assessment Reports (FAR) which should cover everything in report and the final outcome.