The blog

Tag Publications: cypher

VAT fraud : the mysterious case of the missing trader

We have explored in the past how businesses are targeted by fraud schemes. Countries too are victims of fraud. In Europe the Value Added Tax (VAT) is manipulated by criminals that can win hundreds of millions. Let’s see how these VAT fraud rings operate and how to use graph technologies to detect them. Getting rich […]

Reinforcing AML analysis systems with graph technologies

Fighting financial crime is a daily battle worldwide. Organizations must deploy intelligent systems to prevent and detect wrongdoings, such as anti-money laundering (AML) control frameworks. We’ll see in this blog post how graph technologies can reinforce these systems. Using graph technologies to fight financial crime In today’s complex economy, law enforcement and financial organizations fight against a […]

Using graphs visualization for network intelligence analysis

The identification and monitoring of terrorist or criminal networks are crucial activities to detect threats. But with bigger datasets, new data types and fast-paced environment, it has become a challenge to conduct network intelligence analysis. In this article, we show how graph visualizations can help network intelligence analysis activities by identifying and racking suspicious individuals and their connections.

Investigating Enron’s email corpus: The trail of Tim Belden

In fraud and white collar crimes, forensic investigators often have to go through massive amounts of complex connected data to gather proofs and evidence for their cases. In the recent years, the development of graph databases and data visualization tools have made it much easier to quickly find information that would have taken days to […]

Linkurious v0.10.1 released

The new release of our graph visualization software Linkurious is now available! Called “Stellar Stegosaurus”, it is the last minor release before reaching v1.0 (production-ready). Linkurious is available in two flavors: Starter and Enterprise. Both variants are always concerned by releases. New features Cypher graph queries Cypher is the SQL for graph databases, and is […]

Fraud detection in retail

Fraud detection is all about connecting the dots. We are going to see how to use graph analysis to identify stolen credit cards and fake identities. For the purpose of this article we have worked with Ralf Becher, irregular.bi. Ralf is Qlik Luminary and he provides solutions to integrate the Graph approach into Business Intelligence […]