
Distinguishing Targets from Lookalikes: Entity Disambiguation Tactics and Examples
There are countless people and companies with identical names. As an investigator, how do you determine whether you’re looking at [...]
There are countless people and companies with identical names. As an investigator, how do you determine whether you’re looking at [...]
As an emerging market, cryptocurrency attracts high-risk entities and illicit actors. One of Prime Trust’s core use cases is helping [...]
In today’s globalized economy, it’s increasingly common for financial crime professionals to encounter transnational entities and unfamiliar languages in the [...]
Know Your Customer, or KYC, is the critical first step in the fight against financial crime and money laundering. KYC [...]
Grand corruption, or corruption involving senior government officials and large sums of money, is a global problem. Such grand corruption [...]
The Pandora Papers vividly illustrate the importance of access to global public data in the fight against financial crime. But [...]
How can you use public data to identify potential Chinese military end users and why is it important? U.S. regulators [...]
The International Consortium of Investigative Journalists (ICIJ) earlier this month released the Pandora Papers, a massive leak of confidential records [...]
Russian oligarchs with political ties to the Russian state have long relied on European institutions to protect and hide their [...]
Deceptive shipping practices enable the continued movement of Iranian oil and other illicit goods across the world, despite sanctions. The [...]