Methodology to Assess Mobile Money Fraud and Money Laundering Risks (2024)

2007 was a remarkable year in many ways for me as a graduate student and a tech-enthusiast.

It was the year when J.K Rowling wrote her final book, ‘Harry Potter and the Deathly Hallows’, which I read and re-read with much enthusiasm, and the year that marked the beginning of ‘iPhone mania’.

It was also the year when the largest mobile network operator in Kenya, Safaricom (part of the Vodafone Group), launched M-PESA – an innovative payment service for the unbanked.

This heralded a new era for mobile customers, allowing them to leverage telecom providers beyond the traditional use of voice and SMS. They could use network provider infrastructure for financial transactions, money transfers, and other services without having to hold bank accounts.

Fast forward to 2021

Now, it is a sea change. Mobile money has grown to become a significant contributor to the overall revenue for most Asian and African operators. By the end of 2018,there were over 866 million registered accounts in over 90 countries processing over US $1.3 billion a day. 2019 marked a major milestone for the mobile money industry withover 1 billion registered accounts across 290 mobile money deployments in 95 countries, processing over US $1.9 billion a day. This was the year when the industry first witnessed 57% of digital transactions values that exceeded the cash-in/out values and the US $22 billion in circulation.

When the world was hit with Covid-19 in early 2020, it quickly became clear that mobile technology was vital to keep the world connected. More importantly, it became evident that mobile money could play a critical role in providing safe, no-contact way for payments for life essentials, including food, electricity, daily grocery supplies, money transfers to friends and family, etc.

The year 2020 saw an increase of17% year-on-year in the number of monthly active accounts, 5.2 million unique agent outlets, and US $500 million digitized transactions per day by agents globally. Despite the difficulties during the pandemic, there was a significant increase in the adoption of digital technology. No-contact and restricted movements made digital payments a necessity. This saw anincrease of 12.7% in the number of registered mobile money accounts.

Risks of Using Mobile Money

Being relatively new to the market, mobile money has several loopholes by way of operations, regulations, and user knowledge. Also, being a fast, cheap, and easy way to transact makes it increasingly susceptible to attacks like money laundering and fraud.

On October 3, 2020, MTN Uganda was forced to suspend mobile money transactions on its network after discovering thathackers had breached the payment systemthrough one of their partners, a finance aggregator. The hack, executed using 2000 mobile SIM cards, resulted in the theft of nearly US $3.2 million dollars.

This example is one among many frauds that permeate the mobile money network. Mobile money attacks arise from different sources – from within the network, through agents, customers, employees. It can also be part of wider schemes to steal financial data. Some of the common mobile money attacks are shown in the figure below.

Types of Mobile Money Attacks

  • Fraudulent top-up using compromised or stolen credit-cards
  • Identity or subscription fraud
  • Dealer or agent fraud
  • Commissions fraud
  • Internal fraud (employee collusion)
  • Social engineering fraud
  • SIM swaps
  • Roaming fraud
  • Foreign exchange (exploiting currency differences during deposit and withdrawal)

Source: GSMA Mobile Financial Services – Fraud Risk Analysis

Without the right controls, mobile money presents increasing business, financial, operational, and compliance risks. On the business side, it can also lead to identity theft and impersonation. Financially, it breeds laundering by exchanging counterfeit notes for digital money or spoofing transactions to withdraw cash. On the operations side, it may cause a lack of electronic float and abuse of customer details. Finally, from a compliance perspective, it presents risks arising from inadequate KYC and screening of PEP and sanctions lists.

According to an Interpol report, transaction fees for mobile money networks are lower than traditional banks, making it lucrative for criminals to section big transactions into many smaller ones to avoid detection. In fact, one of the most dangerous and costly risks is money laundering. In money laundering, the objective of the launderer is to conceal their identity, source, and destination of the money for organized crime, financial fraud, arms dealing, terrorist financing, etc. Funds are simply transited through various accounts and financial systems. The rapid speed of transactions and minimal face-to-face interactions make mobile money a viable channel for money laundering.

The cost of money laundering is heavy for telecom operators. According to research from Fenergo, regulators across the globe issued more than US $10 billion in anti-money laundering fines to financial institutions in 2020. Nearly 198 fines were issued to global financial institutions in 2020 for non-compliance with AML, KYC, data privacy regulations. Global data privacy fines amounted to US $88.6 million, while AML and MIFID (Markets in Financial Instruments Directive) breaches in US, Europe, and China by 203 individuals led to fines of US $88.8 million. Controlling money laundering involves detecting suspicious transactions and reporting them to the correct authorities. This, in turn, requires strong monitoring controls.

Fraud Monitoring Controls

With years of experience in fraud management, Subex has seen the types of fraud becoming more ingenious and innovative in methods. In the same vein, it requires dedicated commitment and effective monitoring controls such as:

  • Customer and agent/dealer dedupe controls
  • Transactional controls at all levels (customer, dealer, device, etc.)
  • Internal fraud controls
  • Anti-money laundering controls like monitoring new and existing customers against International Sanctioned lists and Politically Exposed Persons (PEP)
  • Advanced machine learning techniques to automatically segment customers based on predictive models and identify complex fraud techniques like smurfing or layering

A stitch in time

Robust processes and appropriate solutions are needed to deploy numerous fraud controls in real-time. It calls for powerful machine learning techniques, AI-driven AML monitoring, and real-time visualization tools to combat the existing and future threats in the mobile money landscape. Other capabilities like risk categorization, AML watchlists, and activity monitoring can protect mobile money networks from criminal activities and fraud attacks, thereby securing them for safe financial transactions and revenue growth.

Download this point of view to know how CSPs are minimizing losses and enhancing user satisfaction.

Learn more

Nishanth S Shetty

Experienced Director with a demonstrated history of working in the telecommunications industry, especially in the Fraud and Security domain. Skilled in Oracle Database, Hadoop, Data Visualization, and Business Intelligence. Strong professional with a MS focused in Software Engineering from TU Eindhoven.

Methodology to Assess Mobile Money Fraud and Money Laundering Risks (2024)

FAQs

What is the AML risk assessment methodology? ›

An AML risk assessment helps identify the institution's inherent risk and assesses the effectiveness of its preventative and detective controls. FATF recommends considering the following factors when assessing inherent money laundering risk: The nature, scale, diversity, and complexity of the business. Target markets.

What is the IMF NRA methodology? ›

The methodology measures net ML/FT risk, that is, the level of risk taking into account the effect of controls on inherent risk. Controls are implemented to reduce inherent risk; thus, they reduce, but their absence or poor effectiveness can never increase, inherent risk.

What is the ML risk assessment? ›

The purpose of a national ML/TF risk assessment is to identify money laundering and terrorist financing methods across a jurisdiction and to determine how often those methods are used, how effective they are in moving illicit funds, and whether there are gaps in the AML/CFT systems and controls.

What is the World Bank risk assessment methodology? ›

The World Bank's National Risk Assessment methodology is based on informed, expert judgment. The purpose of data and information collection is to inform and facilitate sound judgment. This judgment is applied in determining the most appropriate period over which data information should be collected.

What is risk analysis methodology? ›

Risk analysis is the process of identifying and analyzing potential issues that could negatively impact key business initiatives or projects. This process is done to help organizations avoid or mitigate those risks.

How do you assess NRA? ›

The NRA process requires an identification of the country's criminal activities that generate the most proceeds, an assessment of the vulnerability of the financial and private sectors to ML, ascertaining the controls and weaknesses of the criminal justice system, determining the effectiveness of the anti-money ...

What is the FATF national risk assessment guidance? ›

The FATF requires each country to identify, assess and understand the terrorist financing risks it faces in order to mitigate them and effectively dismantle and disrupt terrorist networks.

What is the FATF national risk assessment? ›

The publication of such a national risk assessment is not a mandatory requirement of the FATF Standards. However, sharing this information will increase global understanding of ML/TF risk and may help countries identify, assess and understand where their own vulnerabilities lie.

How do you conduct AML TF risk assessment? ›

How to perform an ML/TF risk assessment?
  1. Step 1: Identify and assess the inherent risks associated with each product, customer, channel, and country. ...
  2. Step 2: Determine the likelihood and severity of risks. ...
  3. Step 3: Develop mitigation controls to reduce the risk of money laundering and terrorism financing.
May 1, 2023

What is risk assessment in Six Sigma? ›

Conducting a risk assessment can help evaluate the degree of risks hat any potential events may have on an organization's ability to achieve its goals. Six Sigma tools like cause-and-effect matrix, risk matrix, and failure mode and effects analysis can be used to convert qualitative approaches to quantitative methods.

What is risk based approach to ML and TF risk? ›

A risk-based approach means that countries, competent authorities, and banks identify, assess, and understand the money laundering and terrorist financing risk to which they are exposed, and take the appropriate mitigation measures in accordance with the level of risk.

What is the financial risk methodology? ›

The financial risk process includes identifying the risk, assessing and quantifying the risk, defining strategies to manage the risk, implementing a strategy to manage the risk, and lastly, monitoring the effectiveness of the strategy implemented to manage the risk.

What is risk assessment methodology for cyber security? ›

A cybersecurity risk assessment can be split into many parts, but the five main steps are: scoping, risk identification, risk analysis, risk evaluation and documentation.

What are the three risk analysis methodology activities? ›

The most basic and skeletal steps that are involved in any method used to conduct risk analysis are: Identification of threats, vulnerabilities, and uncertainties. Understanding the impact of these threats, vulnerabilities, and uncertainties. Creating or using a model for risk analysis.

What are the 4 pillars of risk assessment in AML? ›

The Four (4) Pillars Of BSA/AML Compliance
  • PILLAR #1. DESIGNATION OF A COMPLIANCE OFFICER.
  • PILLAR #2. DEVELOPMENT OF INTERNAL POLICIES, PROCEDURES AND CONTROLS.
  • PILLAR #3. ONGOING, RELEVANT TRAINING OF EMPLOYEES.
  • PILLAR #4. INDEPENDENT TESTING AND REVIEW.
  • CONCLUSION.
Mar 24, 2016

What are the four common categories of AML risk assessment? ›

What are the common categories of AML risk assessment?
  • The nature, scale, diversity, and complexity of its business.
  • Target markets.
  • The number of customers already identified as high risk.
  • The jurisdictions it is exposed to (through its own activities of those of its customers)
  • Distribution channels.

What are the three categories to include in an AML risk assessment? ›

According to the BSA, determining inherent AML risk involves assessing three main factors:
  • Products and services.
  • Customers.
  • Geographic location.
Apr 27, 2023

Top Articles
Latest Posts
Article information

Author: Reed Wilderman

Last Updated:

Views: 6089

Rating: 4.1 / 5 (72 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Reed Wilderman

Birthday: 1992-06-14

Address: 998 Estell Village, Lake Oscarberg, SD 48713-6877

Phone: +21813267449721

Job: Technology Engineer

Hobby: Swimming, Do it yourself, Beekeeping, Lapidary, Cosplaying, Hiking, Graffiti

Introduction: My name is Reed Wilderman, I am a faithful, bright, lucky, adventurous, lively, rich, vast person who loves writing and wants to share my knowledge and understanding with you.