The blog

Tag Publications: fraud

Using graphs to uncover insider trading schemes

When there is power and money at stakes, individuals will resort to cheating to beat the competition. Professional sports have doping and financial markets have insider trading. To understand the role data analysis play in fraud investigation, look no further than the case of former SAC Manager Mathew Martoma convicted in what may be the […]

Reshipping scams and network visualization

Drug lords are not the only persons using mules to launder money. Ecommerce operations are confronted to “reshipping scams”. In these scams, mules are used by online fraudsters to turn their credit cards into actual goods. Graphs can help detect this fraud. When a job ad turns you into a money laundering mule We have […]

Lyft vs Uber : visualizing fraud patterns

You might have heard that the competition between Lyft and Uber, the leading car-sharing services, is heating up. Accusations are flying and each party accuses the other of sabotage. Employees of each company would have ordered and cancelled thousands of rides. Both Uber and Lyft claim to have data to back up their allegations. Of […]

Analysing the Offshore Leaks with graphs

The Offshore Leaks released in 2013 by the ICIJ is a rarity. It is a big dataset of real information about some of the most secret places on earth : the offshore financial centers. The investigation of the ICIJ brought to the surface many interesting stories including the suspicious activities of the President of Azerbaijan. We […]

Fraud detection : identifying conflicts of interest with graphs

Procurement departments are supposed to save companies money. What happens when they are hurt by conflicts of interest? Graph technologies like Neo4j and Linkurious can help find suspicious connections in employee and vendor records : let’s see how graphs can be used for fraud detection! What is a conflict of interest According to wikipedia, a […]

How to detect bank loan fraud with graphs : part 2

Last week we saw the sophisticated schemes criminals use to defraud banks. The TL;DR version of this is : criminals create fake identities, ask banks for loans and disappear with the money. By going through the techniques used by criminals we identified the graph challenge they face : creating and managing a network of identities […]