ERCIM news 135
ERCIM news 135
ERCIM news 134
ERCIM news 134
ERCIM news 133
ERCIM news 133
ERCIM news 132
ERCIM news 132
ERCIM news 131
ERCIM news 131
ERCIM news 130
ERCIM news 130
Back Issues Online
Back Issues Online

by Marie Beth van Egmond, Thomas Rooijakkers and Alex Sangers (TNO)

Criminal transaction flows can be obfuscated by spreading transactions over multiple banks. Collaboration between banks is key to tackling this; however, data sharing between banks is often undesirable for privacy reasons or is restricted by legislation. In the MPC4AML project, research institute TNO and Dutch banks ABN AMRO and Rabobank are researching the feasibility of using Secure Multi-Party Computation (MPC) to detect money laundering.

Financial crime is a huge, world-wide problem. In 2018, an estimated 5.8 trillion dollars (6.7% of global GDP) worth of financial crime was perpetrated. Banks have a gatekeeper role in the financial system and a legal obligation to identify unusual transactions. However, criminal transaction flows will hardly ever stay confined to the network of one bank and thus often remain undetected. Therefore, collaboration and data sharing is key in detecting financial crime. On the other hand, legislation such as GDPR and competition law, as well as privacy concerns, can restrict data sharing. Privacy-enhancing technologies are promising to enable collaboration without sharing sensitive data. This is also recognised by the recently published Future in Financial Intelligence Sharing (FFIS) paper [1] that describes ten case studies on this topic. One of these is the MPC4AML project, a collaboration between research institute TNO and Dutch banks ABN AMRO and Rabobank, where the technical feasibility of using Secure Multi-Party Computation (MPC) for detecting money-laundering is being researched. The possibility of performing calculations on the entire transaction network while keeping data private creates a lot of opportunities. In 2017, TNO published an article on secure PageRank for detecting transactional fraud [2]. In the current project, the research is focused on both the secure use of graph embeddings for finding malicious communities in the network, and on secure risk propagation for identifying exposure to high-risk cash or cryptocurrency deposits. We elaborate on the latter in this article.

Risk propagation
Currently, many banks attribute risk scores associated with money laundering to their customers, for example, based on transactions involving large amounts of cash or cryptocurrencies, or being from or to certain high-risk countries. These risk scores are of limited value as long as they are based on only the local network of a single bank. However, by propagating this risk through the transaction network of multiple banks, a lot more information on criminal flows could be identified. An example of such a criminal flow can be found in Figure 1.

Figure 1: We consider a three-bank scenario (Orange, Blue, and Purple). In this scenario the first (left) account at bank Orange is classified as high risk (due to e.g., large cash deposits) by bank Orange. This account wishes to launder its resources. To stay under the radar, the resources are funnelled through multiple accounts, at various banks, before arriving at their eventual destination, e.g., the account at bank Purple (right). To detect money laundering, we wish to follow (propagate) the risky money and classify the endpoint as high risk too. Full (global) knowledge of the network enables us to propagate the risk. However, how can we achieve something similar when there is only partial (local) knowledge of the entire network available? This is where MPC comes into play.
Figure 1: We consider a three-bank scenario (Orange, Blue, and Purple). In this scenario the first (left) account at bank Orange is classified as high risk (due to e.g., large cash deposits) by bank Orange. This account wishes to launder its resources. To stay under the radar, the resources are funnelled through multiple accounts, at various banks, before arriving at their eventual destination, e.g., the account at bank Purple (right). To detect money laundering, we wish to follow (propagate) the risky money and classify the endpoint as high risk too. Full (global) knowledge of the network enables us to propagate the risk. However, how can we achieve something similar when there is only partial (local) knowledge of the entire network available? This is where MPC comes into play.

The goal of risk propagation is to identify nodes that are involved in such a money-laundering pattern. The risk propagation algorithm requires as input a transaction network (containing clients and transactions) of a certain time period. Every client (a node in the network) has an initial risk score, which was assigned by the client’s bank. In one iteration of the algorithm, risk scores are updated using the weighted incoming risk score, i.e. the risk scores of incoming nodes weighted by the transaction amounts. In other words, if a client receives a lot of money from a client with a higher (or lower) risk score, its risk score will increase (or decrease). The formula for risk propagation can be found in Figure 2.

Figure 2: Formula for risk propagation. Because of the properties of Additive Homomorphic Encryption, this can be performed on homomorphically encrypted risk scores as well.

Figure 2: Formula for risk propagation. Because of the properties of Additive Homomorphic Encryption, this can be performed on homomorphically encrypted risk scores as well.

Secure risk propagation
Criminals often obfuscate money laundering patterns, such as in Figure 1, by performing transactions out of sight of any single bank. However, the risk scores that we need for the risk propagation are sensitive information that cannot freely be shared with other banks. Fortunately, using MPC techniques, the risk propagation algorithm can be performed securely on the entire transaction network of the participating banks. Risk scores are encrypted using Additive Homomorphic Encryption (AHE); a form of encryption that enables computations on encrypted data. To be precise, if we denote [x] to be the encryption of a value x, additive homomorphic encryption has the property [a] • [b] = [a + b] and therefore [a]c = [c • a].

To perform a secure risk propagation iteration, banks that participate in the protocol need to share the (relevant) encrypted risk scores with each other. Thanks to the properties of AHE, all banks can perform the required computations for risk propagation (in the formula in Figure 2) on these encrypted risk scores. Next to that, every bank can also use locally known information for each of its own clients, which enables a very efficient protocol.  The result of the secure computation is an encrypted updated risk score for every client. With these updated scores, either a new iteration can take place, or a bank can decrypt the resulting risk score of some of its own clients. The latter can only happen with consent of the other banks, using “threshold decryption”.

Results
In collaboration with ABN AMRO and Rabobank, TNO built a first proof-of-concept of the secure risk propagation [L1] using synthetic data [L2] that includes money laundering patterns. This shows that it is possible to securely perform the risk propagation algorithm among different banks and demonstrates the value of collaborative transaction analysis.

Future challenges
Two technical challenges have been identified for the near future. First, the computational scalability of the solution will need to be evaluated and compared with the theoretical hypothesis. Second, MPC protects the confidentiality of the input data and any intermediate data during the computation. However, for application on real transaction data, it is important to investigate how much information can be deduced from the resulting risk scores after running the protocol.

The next step is to apply the secure risk propagation on real transaction data in a pilot. Many other challenges will no doubt arise from a pilot on real data. This will bring us one step closer to catching criminals involved in sophisticated interbank money laundering patterns.

The research activities that led to this result were funded by ABN AMRO, Rabobank, PPS-surcharge for Research and Innovation of the Dutch Ministry of Economic Affairs and Climate Policy, and TNO's Appl.AI programme.

Links:
[L1] https://github.com/TNO-MPC/protocols.risk_propagation
[L2] https://github.com/IBM/AMLSim 

References:
[1] N. Maxwell: “Innovation and discussion paper: Case studies of the use of privacy preserving analysis to tackle financial crime”, Future of Financial Intelligence Sharing (FFIS) research programme, 2020.
[2] A. Sangers, et al.: “Secure multiparty PageRank algorithm for collaborative fraud detection", Int. Conf. on Financial Cryptography and Data Security, Springer, 2019.

Please contact:
Marie Beth van Egmond,
TNO, The Netherlands
This email address is being protected from spambots. You need JavaScript enabled to view it.

Alex Sangers
TNO, The Netherlands
This email address is being protected from spambots. You need JavaScript enabled to view it.

Next issue: January 2024
Special theme:
Large Language Models
Call for the next issue
Image ERCIM News 126
This issue in pdf

 

Image ERCIM News 126 epub
This issue in ePub format

Get the latest issue to your desktop
RSS Feed