AFC Thoughts

Illicit Financial Flows in Nigeria: The Case for Information Sharing

Site Logo
Tookitaki
07 Jun 2023
7 min
read

Illicit financial flows (IFFs) significantly threaten the economic stability and development of countries worldwide. Nigeria, Africa's largest economy, is no exception. IFFs in the form of money laundering, tax evasion, and other illicit activities continue to plague the nation, resulting in considerable economic loss and negatively affecting its development trajectory.

Addressing illicit financial flows is imperative for Nigeria. By confronting this issue head-on, the country can secure its economic future, promote sustainable development, and ensure the well-being of its people. The importance of this cannot be overstated. The fight against IFFs in Nigeria is not just about economics but about securing a just and equitable future for all Nigerians.

This blog aims to delve into the current state of IFFs in Nigeria, focusing on their impact on the economy and society at large. We will also explore the power of information sharing in combating these flows and its crucial role in disrupting the chains of illicit finance. This includes a discussion on the current barriers to effective information sharing within the country and potential ways to overcome these challenges.

We will further introduce Tookitaki's Anti-Financial Crime (AFC) Ecosystem, an innovative platform that leverages information sharing to combat financial crime. This ecosystem holds the potential to be a game-changer in the fight against IFFs in Nigeria.

The Current State of Illicit Financial Flows in Nigeria

Illicit financial flows in Nigeria are a deep-rooted issue characterised by a complex network of activities. From corruption and tax evasion to money laundering and illegal trade, these flows are diverse and pervasive, permeating different sectors of the Nigerian economy.

Prominent cases in recent years underscore the magnitude of the problem. For instance, the infamous 'Malabu Scandal' involving the illicit transfer of billions of dollars under the guise of oil block allocations has shed light on the depth of corruption and illegal financial activities in the oil sector. Similarly, there have been alarming instances of high-ranking officials siphoning public funds for personal gain, illustrating the scale of corruption within governmental institutions.

The methods of facilitating these illicit flows are equally diverse and complex. Tactics include trade misinvoicing, where trade transactions are deliberately misreported to evade taxes or smuggle money, and anonymous shell companies, which obscure the true owners of assets and facilitate illicit transfers of funds.

These illicit financial flows severely impact Nigeria's economy and society. Economically, IFFs drain the country of vital resources needed for development. It is estimated that billions of dollars are lost annually to illicit flows, money that could be invested in infrastructure, healthcare, education, and other crucial sectors. This loss of revenue also exacerbates fiscal deficits and hampers the government's ability to provide public services.

From a societal perspective, illicit financial flows contribute to increasing inequality and social unrest. They also erode trust in institutions, perpetuate cycles of poverty and hinder progress towards achieving the United Nations' Sustainable Development Goals (SDGs).

Understanding the current state of IFFs in Nigeria is the first step in devising effective strategies to combat them. This necessitates recognising the problem's scale and acknowledging its multifaceted nature and the various sectors it affects.

The Power of Information Sharing

Information sharing is a critical tool in the fight against illicit financial flows. It enables the identification of emerging trends, red flags, and common methodologies used in illicit activities. When utilized effectively, information sharing can disrupt these illicit flows by exposing vulnerabilities, leading to the development of more robust safeguards and systems.

The role of information sharing in combating illicit financial flows can be broken down into several key areas:

  • Detection: Information sharing between financial institutions, regulatory bodies, and law enforcement can lead to early detection of illicit activities. Shared information can reveal patterns and anomalies that might indicate illicit financial flows, facilitating timely intervention.
  • Prevention: By sharing information about known methods and schemes to facilitate illicit financial flows, institutions can take proactive measures to prevent such activities from occurring within their operations.
  • Prosecution: Shared information can support the prosecution of illicit activities by providing evidence of wrongdoing. This could deter future illicit activities by increasing the risk of detection and punishment.
Many successful instances of information sharing aid the fight against illicit financial flows globally. In the European Union, for example, each member state's Financial Intelligence Units (FIUs) share information about suspicious transactions and activities. This has led to significant successes in detecting and preventing illicit financial flows across borders. Similarly, the United States Financial Crimes Enforcement Network (FinCEN employs a robust information-sharing mechanism, enabling financial institutions to share data about potential illicit activities. These shared data points have resulted in successful investigations and prosecutions of illicit financial activities.

In both these examples, the power of information sharing has been leveraged to combat illicit financial flows, providing tangible proof of its effectiveness. It is a testament to the vital role of information sharing in detecting, preventing, and prosecuting illicit financial activities. As such, it stands as a cornerstone strategy in the fight against illicit financial flows in Nigeria and beyond.

{{cta-afc}}

Barriers to Effective Information Sharing in Nigeria

Information sharing, though powerful, is not without its challenges in Nigeria. Several barriers currently hinder the effectiveness of this tool in combating illicit financial flows.

  • Legal and Regulatory Hurdles: In Nigeria, strict confidentiality laws and regulations often restrict the sharing of financial information between institutions. Overcoming this requires the development of a legislative framework that allows for controlled information sharing while ensuring data protection and customer privacy.
  • Lack of Technology Infrastructure: The successful implementation of information sharing also relies heavily on technology infrastructure. Nigeria faces challenges in this area due to inadequate technological infrastructure and a lack of standardized protocols for secure data exchange.
  • Lack of Trust: Trust among financial institutions, regulators, and law enforcement agencies is crucial for effective information sharing. Unfortunately, a history of institutional corruption and a lack of transparency have undermined trust in Nigeria, making institutions hesitant to share information.

Overcoming these barriers is a significant step towards harnessing the full power of information sharing in Nigeria's fight against illicit financial flows.

Tookitaki's AFC Ecosystem: A Game-Changer

In the face of these challenges, innovative solutions like Tookitaki's Anti-Financial Crime (AFC) Ecosystem can be instrumental. This community-based platform has been designed to streamline and simplify information sharing in the battle against financial crime, making it a potential game-changer in Nigeria's fight against illicit financial flows.

The AFC Ecosystem consists of two main components: the AFC Network and the Typology Repository. The AFC Network is a global community of subject matter experts who actively contribute to the latest typologies of financial crime. This network facilitates the exchange of knowledge and experiences among financial institutions, regulatory bodies, risk consultants, and more. It allows for a collective effort against financial crime, enhancing the ability to stay ahead of emerging trends.

The Typology Repository, on the other hand, is the largest federated database of money laundering patterns. It is regularly updated with emerging trends and serves as an exhaustive, ready-to-use database that can be easily integrated into Anti-Money Laundering Systems (AMLS). Importantly, this database operates solely on patterns, not storing any data, thus ensuring full privacy protection.

A typology representation is shown below.

Typology - KYC


Key features of the AFC Ecosystem include:

  • Typology Database: This ready-to-use database is regularly updated with emerging trends, breaking down silos with its federated structure.
  • Typology Developer Studio: This 'No Code' interface allows for easy rule creation and automatic conversion to risk indicators or rules.
  • Typology Management: This feature allows for easy search, download, editing, and reconfiguring of typology parameters.
  • Privacy Protection: The ecosystem only contains the typologies parameters, not any customer Personally Identifiable Information (PII) or client-sensitive information.

The benefits of the AFC Ecosystem are manifold. It allows members to stay ahead of the game with access to a broad range of money laundering techniques and schemes. It also assists in uncovering hidden risks and transforms compliance into a strategic advantage, opening up new business opportunities. 

By fostering a collaborative approach, Tookitaki's AFC Ecosystem can greatly enhance the efficacy of information sharing, making it a valuable tool in Nigeria's fight against illicit financial flows.

How Tookitaki's AFC Ecosystem Can Address Illicit Financial Flows in Nigeria

Tookitaki's AFC Ecosystem can significantly help Nigeria in combating illicit financial flows by leveraging its unique features and robust framework.

  • Enhancing Detection and Prevention Capabilities: The continuously updated Typology Repository provides an extensive database of money laundering patterns, helping to identify and respond to emerging trends. In combination with Tookitaki's Anti-Money Laundering Suite, the repository facilitates early detection and proactive prevention of illicit activities, a vital need in Nigeria's fight against illicit financial flows.
  • Promoting Collaboration: The AFC Network promotes global collaboration among experts, providing a platform for sharing experiences and best practices. This collaborative approach could be instrumental in enhancing Nigeria's capacity to combat illicit financial flows.
  • Fostering Trust and Compliance: The transparent and secure nature of the AFC Ecosystem fosters trust among its users. It ensures that sensitive data is protected, adhering to global standards for privacy protection, which can help instil confidence in the system and enhance compliance.

Together, Tookitaki's AML Suite and AFC Ecosystem provide a comprehensive and proactive solution to Nigeria's issues with illicit financial flows. By facilitating information sharing, enhancing detection capabilities, promoting collaboration, and fostering trust, they can serve as powerful tools in Nigeria's arsenal against illicit financial flows.

Harnessing Information Sharing: A Way Forward for Nigeria

In conclusion, information sharing stands as an indispensable tool in the fight against illicit financial flows. As explored throughout this blog, its power lies in enhancing detection, prevention, and prosecution of financial crimes, contributing significantly to the disruption of illicit financial activities. However, the effectiveness of information sharing in Nigeria faces numerous challenges, ranging from legal barriers to a lack of technology infrastructure.

Tookitaki's Anti-Financial Crime (AFC) Ecosystem presents an innovative platform in this landscape. Fostering global collaboration, offering an extensive database of money laundering patterns, and providing a secure and user-friendly platform can greatly enhance Nigeria's capacity to combat illicit financial flows. The adoption of such comprehensive and proactive tools can lead to significant positive impacts, not just in disrupting financial crime but also in fostering economic growth and stability.

We call upon anti-financial crime experts, financial institutions, and regulatory bodies in Nigeria to explore the AFC Ecosystem and join the global community in this fight. Let's harness the power of information sharing, leverage innovative solutions, and pave the way for a robust and resilient financial ecosystem in Nigeria. Together, we can make a difference in the fight against illicit financial flows.

By submitting the form, you agree that your personal data will be processed to provide the requested content (and for the purposes you agreed to above) in accordance with the Privacy Notice

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Ready to Streamline Your Anti-Financial Crime Compliance?

Our Thought Leadership Guides

AFC Thoughts
18 Jul 2024
4 min
read

Typology Tales July 2024: Account Takeover Surveillance

We are pleased to share the latest edition of "Typology Tales" for July 2024. This edition highlights the new typologies that our Anti-Financial Crime (AFC) community has carefully analysed and selected. Our community's collective efforts are crucial in staying ahead of evolving financial crime threats, and we are grateful for your continued participation and contributions.

AFC Community’s Role

Each month, our dedicated AFC community comes together to analyze and evaluate newly created typologies, selecting those that can significantly enhance the ecosystem's ability to prevent and combat financial crime. The typologies chosen for publication are those that offer the most promise in terms of effectiveness and applicability across various scenarios.

Key Highlights from July 2024 

These typologies have been meticulously curated to ensure they provide robust and actionable insights, ultimately helping to safeguard the financial ecosystem.

Theme of the Month: Account Takeover Fraud (ATO)

Theme of the month

Account takeover fraud (ATO) is a type of cybercrime where unauthorised people access a user's account and use it for harmful purposes. This dangerous activity has increased significantly in recent times, posing a growing threat to both individuals and organisations. 

In this edition...

In this edition of Typology Tales, we delve into two typologies that compliance professionals can incorporate into their transaction fraud monitoring systems to proactively prevent account takeover in real time.

Typology 1: Surge in Multi-Party Transactions in Sizeable Values

Typology-multiple counterparty

A pattern of multiple parties making high-value transactions with one entity in a short period of  time suggests possible account takeover fraud. This requires a strategic review of transaction behaviours.

How It Works

  • The typology monitors transactions involving a single customer who receives or transfers funds with multiple parties within a short time span.
  • To identify potential account takeover risks, the typology groups transactions by the unique identifiers of senders and receivers within a specified time frame. By tracking these identifiers over a defined period, it can determine how many different parties have transacted with a particular entity.

  • Simultaneously, the typology aggregates the transaction amounts linked to unique senders and receivers.

  • It flags any entity that engages in transactions with a large number of different parties and exceeds a cumulative transaction threshold. This signals potential account takeover risks due to unauthorised access and high-value transactions.

Typology 2: Monitoring High-Value Transactions Across Multiple Payment Modes

15 - 2024 July Edition TT Typology tales-1-1-1-1

Financial institutions may implement advanced monitoring to detect high-value transactions between senders and receivers through various modes, aiming to uncover potential account takeover fraud.

How It Works

  • To effectively oversee the flow of funds, the typology tracks and aggregates transaction amounts based on the mode of transfer.
  • Transaction amounts, including those made through cash or alternative payments, are further aggregated by the unique identifiers of the sender and receiver over a specific period.
  • Entities showing high-value transactions across multiple payment modes over specified time frames are potentially flagged as suspicious. This increased activity may indicate that an account has been compromised and is being used to funnel funds illegally.

From the Media: Account Takeover Attacks Overtake Ransomware as Leading Security Concern

Research by cybersecurity firm Abnormal Security highlights that account takeover (ATO) attacks have become a top concern for security leaders. The 2024 State of Cloud Account Takeover Attacks report reveals that 83% of organisations experienced at least one ATO incident in the past year. 

Over 75% of security leaders rank ATOs among the top four global cyber threats, with nearly 50% facing more than five incidents annually and around 20% encountering over ten incidents. ATOs are now considered more significant than other threats such as spear phishing and ransomware.

Read More

Unite in the Fight Against Financial Crime

Financial crime is a pervasive issue that requires a collective, centralised approach to intelligence gathering. That's why we have created the Anti-Financial Crime (AFC) Ecosystem, a network of experts who work together to share knowledge and develop strategies for combating financial crime.

If you are an AFC expert, we invite you to join our efforts and help us grow the AFC Ecosystem. And if you know any other AFC experts, please refer them to us so we can continue to expand and strengthen our network. Together, we can make a real difference in the fight against financial crime.

Typology Tales July 2024: Account Takeover Surveillance
AFC Thoughts
01 Jul 2024
3 min
read

Account Takeover Fraud: Monitoring Entities Incorporated Long Back

In the evolving landscape of financial crime, financial institutions need to intensify their scrutiny of transactions from entities with a long history of incorporation but sporadic or recent activity. This increased vigilance aims to detect and thwart potential account takeover fraud within savings accounts, ensuring the safety and integrity of financial systems.

Given below is a typology from Tookitaki's AFC Ecosystem. It details how to ensure your monitoring system triggers alerts transactions from entities with a long history of incorporation

Understanding the Typology

Setting Up Entity Historical Profiles

Financial institutions employ a function known as the "Incorporation Date of the Entity" to track and record the incorporation dates and transaction activities of entities. This function helps identify entities that have been established long ago but have shown recent or sudden transaction activities, which could be indicative of fraud.

Function Configuration and Data Aggregation

  • Aggregate Fields: The system aggregates data on 'sender incorporation date' and 'receiver incorporation date.'
  • Aggregate Function: Using the collect_set function, the system compiles a unique set of incorporation dates for each sender and receiver, providing a comprehensive historical perspective of each entity's transaction timeline.
  • Group By: Transactions are grouped by unique identifiers like 'sender_hashcode' and 'receiver_hashcode,' linking each entity’s transaction history to specific account profiles.

Monitoring and Anomaly Detection

The system continuously monitors the transaction activities of these entities, comparing current transactions against historical data. Entities that have shown no or minimal transaction activities for a significant period since their incorporation are closely watched. A sudden spike in transactions, especially those of significant volume or frequency, triggers an alert. This scrutiny is particularly heightened if the entity's previous activity has been minimal or non-existent for years.

Group 16190-1

Flagging and Review Process

Transactions involving long-dormant entities resuming activity are flagged as high-risk. These flagged transactions undergo a detailed review to ascertain the legitimacy of the activity and to rule out any potential account takeover or other fraudulent intentions.

Investigative Measures

For flagged transactions, financial institutions conduct thorough investigations involving:

  • Background Checks: Verifying the entity's background.
  • Transaction Legitimacy: Confirming the legitimacy of the transaction.
  • Entity Ownership: Ensuring the entity's ownership and operational status.

Preventative Actions and Customer Interaction

If fraudulent activity is confirmed, financial institutions take immediate steps to:

  • Block further transactions.
  • Secure the affected accounts.
  • Possibly reverse fraudulent transactions.
  • Contact entity representatives for further clarification and to ensure all parties are informed of the situation.

Compliance and Reporting Obligations

All suspicious activities are documented and reported in compliance with regulatory requirements. This ensures that the institution remains compliant with anti-fraud regulations and aids in broader efforts to combat financial crime.

{{cta-ebook}}

Enhancement of Monitoring Systems

Based on findings and trends observed from monitoring these entities, financial institutions continually refine their detection algorithms and update their monitoring systems to better identify and prevent potential fraud.

By closely monitoring the activities of entities incorporated long ago but recently active, banks can effectively spot unusual patterns that may indicate fraudulent activities, such as account takeovers. This proactive approach helps safeguard customer assets and maintain the integrity of the financial system.

Final Thoughts

Financial institutions must remain vigilant and proactive in monitoring and analyzing transaction activities, especially those involving historically dormant entities. This typology, sourced from Tookitaki's AFC Ecosystem, highlights the importance of advanced monitoring techniques in detecting potential fraud.

We encourage anti-financial crime professionals to join the AFC Ecosystem to access unique typologies and leverage community-driven insights for enhanced fraud detection and prevention. Together, we can strengthen our defenses against financial crime and protect the integrity of our financial systems.

Account Takeover Fraud: Monitoring Entities Incorporated Long Back
AFC Thoughts
22 May 2024
3 min
read

The Globalization of Fraud: The Rise of Transnational Scams

In an increasingly interconnected world, the borders that once confined criminal activities are rapidly dissolving, aided by the rise of digitalisation and the pervasive reach of online platforms. The stark reality we face today is a landscape where fraudsters exploit digital payment systems to target individuals across the globe, particularly in the Asia-Pacific region. Organised fraud syndicates are not just local threats; they operate on an international scale, executing sophisticated scams that often outpace current preventative measures.

Case Study: A Transnational Crackdown on Job Scams

On 20 March 2024, a significant breakthrough came when the Commercial Affairs Department (CAD) of the Singapore Police Force and the Bukit Aman Commercial Crime Investigation Department of the Royal Malaysia Police joined forces in Kuala Lumpur. This joint operation was the culmination of extensive cross-border investigative efforts aimed at dismantling a formidable job scam syndicate.

Between October 2023 and January 2024, this syndicate deceived over 3,000 individuals, accumulating illicit gains of approximately $45.7 million. These scams primarily targeted Singaporeans, promising lucrative job opportunities that required victims to make upfront payments or divulge sensitive information under the guise of securing employment. The rapid escalation of these scams prompted an intensive collaborative investigation, which eventually led to the arrest of five Malaysians involved in laundering the proceeds from these fraudulent activities.

This operation not only highlights the severity and reach of transnational scams but also underscores the urgent need for global cooperation and shared strategies to combat these crimes effectively.

Job Scam

The Imperative of a Collaborative Approach

As we witness a surge in transnational fraud, the isolation of financial institutions in their silos makes them particularly vulnerable. The complexity and rapid adaptation of fraud strategies require that defences be equally dynamic and interconnected.

Collective Intelligence and Shared Responsibility

To counteract the evolving menace of cross-border fraud effectively, a collaborative approach is indispensable. The AFC Ecosystem initiative represents a commitment to fostering industry-wide cooperation and information sharing. Through this collective intelligence, we aim to establish a robust defence mechanism that not only identifies but also anticipates fraudulent activities, ensuring safe and secure societies. This shared responsibility is vital in creating an impenetrable barrier against the sophisticated mechanisms of modern financial criminals.

Considering the Typology of the AFC Ecosystem

Drawing from the AFC Ecosystem's insights, let's delve into the typology of transnational job scams. This framework is instrumental in understanding how these frauds operate and what measures can be employed to thwart their attempts.

Detailed Analysis of the Typology

Transnational job scams represent a highly organized and rapidly proliferating threat that exploits the aspirations of job seekers worldwide. These scams are not just about deceit regarding employment opportunities but involve intricate financial manipulations that siphon funds across international borders.

Operational Mechanics

  • Initial Recruitment: The scam begins with contact through social media or other digital platforms, where victims are lured with high-return, low-effort job offers.
  • Deceptive Promises: The roles are advertised as lucrative yet simple enough to attract a wide demographic, from students to the unemployed.
  • Financial Prerequisites: Victims are persuaded to make upfront payments or provide personal information as a part of the onboarding process.
  • Expeditious Expansion: To maximize profits before any potential crackdown, these operations quickly scale and replicate across various regions.

{{cta-ebook}}

Granular Red Flags and Risk Indicators

To effectively monitor and prevent these scams, it is crucial to recognise the following detailed risk indicators:

  • Value: Transactions often involve small amounts that are usually perceived as low-risk by victims, making them less likely to raise immediate alarms.
  • Volume: A high frequency of transactions complicates tracking and analysis, as the sheer number of transactions can overwhelm standard monitoring systems.
  • Velocity: The rapid succession of payments, coupled with potential chargebacks or cancellations, creates a chaotic financial trail that is difficult to follow.
  • Channels: Scammers predominantly use digital payment platforms, online banking, and occasionally cryptocurrencies to maintain anonymity and complicate tracing.
  • Anonymity: There is often a mismatch between beneficiary details and the purported employer, signalling a red flag for transactions.
  • Recurrence: Victims are frequently solicited for multiple payments under various pretexts, each justified as necessary for job commencement or continuation.
  • High-risk Geos: Payments are directed to accounts in high-risk jurisdictions or to those that are otherwise unrelated or suspicious, lacking any logical connection to the job or employer.
  • Geographical Inconsistencies: The involved countries often have no direct connection to the alleged job or employer, exploiting the complexities of international law and jurisdictional boundaries.

Harnessing Collective Efforts for Enhanced Security

The fight against transnational fraud is not a battle that can be won in isolation. It requires the concerted efforts of financial institutions, regulatory bodies, law enforcement, and the public. By adopting the typology provided by the AFC Ecosystem and vigilantly monitoring the detailed risk indicators, we can forge a path towards a more secure and resilient financial environment. This collective approach is our best defense against the sophisticated and ever-evolving landscape of global fraud.

The Globalization of Fraud: The Rise of Transnational Scams