WHITE PAPER. Anti-money laundering and counter terrorist financing A functional and technical description of the approach and tool

Similar documents
Compliance Risk Rating

Circular on Anti-Money Laundering Officer

Implementing and Managing Open Source Compliance Programs

Financial Crime Mitigation

REPORT ON FEEDBACK ON MONEY LAUNDERING AND TERRORIST FINANCING CASES AND TYPOLOGIES 1. (Good practices)

IBM Tivoli Monitoring

CONSULTATION DOCUMENT AML/CFT SUPERVISORY STRATEGY

SIMULATION ON DEMAND: Using SIMPROCESS in an SOA Environment

QPR ProcessGuide. Make Process Excellence an Item on Everyone s Agenda. QPR ProcessGuide 1

IBM Tivoli OMEGAMON XE for. WebSphere Business Integration. Optimize management of your messaging infrastructure. Highlights

Information paper. Transaction filtering, systems testing and annual certification: driving business benefits

Client onboarding and Legal Entity Data Solutions from Thomson Reuters

Actimize Essentials. Cloud-based Solutions for Financial Crime Prevention & Regulatory Compliance

DIGITALE VP/MS AGENDA. For insurers the main change drivers are related to:

Joint Opinion. on the risks of money laundering and terrorist financing affecting the Union s financial sector JC/2017/07.

Supply Chain EDI Supplier Accreditation Guide. EDI Supplier Accreditation Guide Page 1 of 25 July 2017 Myer Pty Ltd

Crowe Caliber. Using Technology to Enhance AML Model Risk Management Programs and Automate Model Calibration. Audit Tax Advisory Risk Performance

A technical discussion of performance and availability December IBM Tivoli Monitoring solutions for performance and availability

Take Advantage of Remote Diagnosis and Maintenance

Anti Money Laundering (AML) Advisory Services Effective solutions for complex issues Deloitte Malta, 2017

Thomson Reuters Regulatory Change Management

FINRA 2090/2111 Solutions & Expertise

Single Euro Payments Area

Actimize Essentials AML. Cloud Based Anti-Money Laundering Solutions

Arjun Kalra - Senior Manager - Crowe Horwath Risk Consulting Practice Chuck Taylor BSA Officer City National Bank

What s new in Maximo 7.6. Presenter: Jeff Yasinski

IRIS-KYC. An On-boarding and Client Interaction solution. Data Sheet. Phone: +44 (0)

Info paper Is your sanctions filter working?

Customer Due Diligence A Risk Based Approach. Dr Tony Wicks Director of AML Solutions NICE Actimize

IBM Tivoli Endpoint Manager for Lifecycle Management

CORE BANK PROCESSING NUPOINT. Dynamic Solutions. Superior Results.

Implementing ITIL Best Practices

Beyond Rules-Based Tests: The "Seven Wonder" Counter-Fraud Statistical Modeling Tests. Vincent Walden, CFE, CPA, CITP

IBM AML compliance solution

Headline 2. Zeile. D&B Connect The customized process platform for evaluating your business partners in SAP

OCTOBER 2016 GROUP CODE OF CONDUCT

Thomson Reuters SCREENING RESOLUTION SERVICE

AVEPOINT RISK INTELLIGENCE SYSTEM

The client onboarding process how to provide state-of-the-art support

Comprehensive Enterprise Solution for Compliance and Risk Monitoring

Risk Based Approach and Enterprise Wide Risk Assessment Edwin Somers / Inneke Geyskens-Borgions 26 September 2017

Intranet Platform. Software for sharing, collaboration and information management

An all-in-one risk management platform delivering fraud detection, transactions screening and customer due diligence capabilities

Solution Overview : The IBM Government Industry Framework

Madison Consulting Group. An Introduction to AML Compliance Consulting Services

WORKFLOW AUTOMATION AND PROJECT MANAGEMENT FEATURES

A W I P R O W H I T E PA P E R

Bed Management Solution (BMS)

The New Rule on Customer Due Diligence Key Takeaways from Banker s Toolbox

Help Reduce Paper with nq360 Document Scanning and Routing

BlackPearl Customer Created Clients for Media & Entertainment Using Free & Open Source Tools

IT Event Alerting and Response

Using Application Response to Monitor Microsoft Outlook

Synergy Document Management. Maximize Your Time and Minimize Your Clutter

CT CORPORATION CORPORATE SERVICES CT S KNOWLEDGEABLE LOCAL TEAMS AND ADVANCED TECHNOLOGY HELP YOU RESPOND TO THE DEMANDS OF CORPORATE COMPLIANCE

RC & TACKLING TRADE BASED MONEY LAUNDERING (TBML) risk compliance RISK & COMPLIANCE MAGAZINE. risk & compliance REPRINTED FROM: APR-JUN 2018 ISSUE

A Guide to Effective Customer Screening O R A C L E W H I T E P A P E R J A N U A R Y 2017

ANTI-MONEY LAUNDERING: GET CLUED BEFORE IT'S LATE NEED FOR SOLUTIONS TO EVOLVE TO KEEP FINANCIAL CRIME AT BAY

Management Information Systems. B02. Information Technologies: Concepts and Management

Enterprise Content Management and Business Process Management

ACD MIS Supervisor Manual

The Windows 7 and Office 2010 Imperative: Are You Ready?

Professional Engineers Using Software-Based Engineering Tools

DIGITAL FINANCIAL SERVICES BASIC TERMINOLOGY

IBM AIX Performance Toolbox and Performance Aide V3.1 Analyze System Performance

Introduction to. Software. Business. Software

CHAPTER 17. Intelligent Software Agents and Creativity

That will suffice as an introduction to the main modi operandi. And increasingly, offenders adapt to preventive measures as they identify them.

IBM Resilient Incident Response Platform On Cloud

IBM WebSphere Information Integrator Content Edition Version 8.2

AVL CONCERTO 4. Experience the harmony

Alloy Navigator Enterprise 8

ORACLE HOSPITALITY CLOUD CONSULTING SERVICE DESCRIPTIONS October 19, 2017

File No: PERMANENT AUDIT FILE INDEX Annual update confirmation. Business details 1. Background to client

Information Technologies: Concepts and Management

Introduction Figure 1:

Knowledge Discovery Services and Applications

How PSD2 impacts marketplaces and platforms

FMS New York/ New Jersey Chapter Meeting January 14, The Impact of Models. by: Scott Baranowski

British Standard BS Specification for an Anti-bribery Management System. Summary

Internal Audit Charter

MAS 500. MAS 500 Version 7.0 Pre-Release Guide

Service Virtualization

Top 5 Challenges for Hadoop MapReduce in the Enterprise. Whitepaper - May /9/11

Metrics That Matter Integration Process Overview

New Features in Enterprise Miner

KPMG Intelligent Diligence An automated approach to KYC. kpmg.com/uk

statement by the board of directors

Select Plus. Commercial Licensing guide

Get The Best Out Of Oracle Scheduler

Crowe Activity Review System

CAA RADE V5.18 consolidates its building tools while improving code management tools and C++ source code quality checking

A complete business system for project-oriented companies

Business Insight and Big Data Maturity in 2014

report that their financial impact of all fraud, corruption and/or money laundering incidents is over per incident

VALITRADE WORLDWIDE TRADE VALIDATION

IBM WebSphere Service Registry and Repository, Version 6.0

IBM Watson for Clinical Trial Matching Express Edition

IBM QRadar SIEM. Detect threats with IBM QRadar Security Information and Event Management (SIEM) Highlights

Application Modernization

Transcription:

WHITE PAPER BayesAML Anti-money laundering and counter terrorist financing A functional and technical description of the approach and tool

WHITE PAPER TABLE OF CONTENT Introduction................................................................ 1 Functional description of risk-based customer due diligence and transaction monitoring tool....... 5 Integration description....................................................... 9 Technology................................................................ 13 Technical Information........................................................ 15 Description of Software................................................. 15 Description of data requirements......................................... 15 How the tool integrates with existing workflow.............................. 15 Technical requirements for required user interface........................... 16 Description of tool performance.......................................... 16 Description of required administration of the tool............................ 16 Management of software updates........................................ 16 Contact information: HUGIN EXPERT A/S: Anders L Madsen, Chief Executive Officer, +45 96 55 07 91 Combitech AS: Annelin Thorkildsen, Senior Advisor, +47 952 751 88 1 HUGIN EXPERT www.hugin.com COMBITECH www.combitech.com

Introduction This white paper contains a functional and technical description of a tool for anti-money laundering and counter terrorist financing designed to comply with the requirements in the 4th European Union anti-money laundering directive (2015). In addition to describing the tool s core functionality, this document also outlines the tasks required for solution development and implementation. A key element of the established solution is customizing the tool to the conditions at each particular institution : customers, products and other business activity, to ensure a high level of accuracy in flagging suspicious transactions. Figure 1 below illustrates the overall functionality for identifying money laundering. The customized money laundering models of the tool power a filter that helps advisors manage customer relationships through the risk classification of customers, and provides guidance for establishing a level of customer due diligence that corresponds to the risk indicated. If suspected money laundering is detected, the system based on available information suggests measures to be taken to clarify the suspicion. If the suspicion is due to lack of information, the system contains functionality to advise on which information is most useful to collect in order to disprove or confirm the suspicion. Model for risk-based customer due diligence Control measures to disprove/confirm suspicion Filter for customer due diligence Suspicion disproved No Customer information Report transaction/customer Money laundering suspected? Yes Yes No Customer OK Figure 1: Description of functionality in the money laundering filter HUGIN EXPERT www.hugin.com COMBITECH www.combitech.com 1

The proposed system is an effective solution for detecting attempts at money laundering based on advanced statistical graphical models. This document describes Combitech s process for developing money laundering models using HUGIN analysis and simulation software, and how to integrate models into existing IT platforms using the HUGIN Java Application Programming Interface (API). It also provides concrete examples of integration using the HUGIN Java API. The core principle of current anti-money laundering regulations is that individual institutions must establish a risk-based approach to preventing money laundering. In practice this means that the obliged entities are required to assess the level of money laundering risk present in its operations and business relationships. For banks this means risk classification of customers, products and services in order to adapt control measures and customer due diligence to the associated level of risk. It is also a requirement to monitor transactions, to demonstrate the ability to detect suspicious transactions, investigate transactions and if the suspicion holds, report the transaction to the relevant authority. Combitech has extensive experience developing and implementing anti-money laundering solutions for financial institutions and providers of gambling services, and in collaboration with HUGIN has developed the methods, framework and tools described here. Upon adoption of the described solution, institutions achieve a genuine risk based approach for combating money laundering and terrorist financing that complies with current laws and regulations. Solution development and implementation is carried out in the following five steps: 1 2 3 4 Adapt money laundering model to a particular business Test model ability to distinguish between low and high risk Integrate HUGIN with bank s systems using APIs Full-scale test of models and integrations 5 Go live Figure 2: Step by step process for developing and implementing the solution 1 Develop anti-money laundering models adapted to a specific business. The development of graphical models is carried out in cooperation with the bank. Combitech formulates a starting point for discussion based on laws and regulations related to anti-money laundering and counter terrorism, best practices, past experience, and FATF (Financial Action Task Force) case studies, etc. Based on the bank s needs and business activity, models are developed for risk analysis of customers and customer relationships, products and services, geography and possibly channels. 2 HUGIN EXPERT www.hugin.com COMBITECH www.combitech.com

Customer register Business-specific model for risk classification of customers Customers are sorted according to risk category Risk-based customer due diligence and follow-up Exiting customers and associated customer data Risk analyses Basis for Risk-based approximation Risk-adjusted resources and measures Increased measures Extra high High Normal Low Increased measures Normal customer control Simplified customer control Figure 3: Process for developing customized risk-based customer due diligence for a specific business 2 Test the ability of the model(s) to distinguish between high and low risk. This test is carried out based on data such as the customer data of a selection of customers from the client bank. Test results are the starting point for model adjustment/calibration and rendering of results, which ensures compliance with existing laws and regulations. 3 Integration of HUGIN model(s) into existing client systems using the HUGIN Java API. This is normally carried out by the client with support from Combitech or HUGIN. The starting point for this work is an integration description with supporting examples. 4 Full-scale test of models and integration to ensure the solution meets quality and performance requirements. 5 Go live. The solution is put into production. HUGIN EXPERT www.hugin.com COMBITECH www.combitech.com 3

Functional description of risk-based customer due diligence and transaction monitoring tool. Behind risk-based customer due diligence are regulations that require banks to establish and maintain the tools and processes necessary to differentiate high risk customers from normal and low risk customers. This capability makes it possible to focus time and resources on high risk customers and to make adjustments to the level of transaction monitoring and customer knowledge, and enables banks to fulfill their investigative obligations. Using network models, it is possible to classify customers, products and geographical locations into risk categories. The models are developed using Bayesian Network modeling tools in the HUGIN software. The main component of the solution for risk-based customer due diligence is the graphical model (the network) itself which represents the risk analysis. The model(s) calculate the probability of a money laundering attempt based on given information about customers, customer relationships, products, services, geography, etc. And while in principle, model(s) may contain as many variables/indicators as desired and have any graphic structure, experience has shown that even a system consisting of a simple model with a limited number of indicators produces highly accurate results. To ensure the relevance of the tool and its associated models, the model development process is based on the historical data and information from a specific institution and adapted to suit its conditions and business activity. The development of risk classification models is first done graphically as illustrated in Figure 4. This involves systemizing all available information about the factors shown to have an influence on the likelihood of money laundering and terrorist financing. The visualization of identified causal relationships provides important insight and awareness about the causes of money laundering/tf. In addition to providing a visual overview that can be used for documentation and training, the network is built on a powerful mathematical platform that is the brain of the automated ongoing monitoring of business relationships and transactions filter. HUGIN EXPERT www.hugin.com COMBITECH www.combitech.com 5

Higher risk Risk assessment Customer type Risk assessment indicators and type Personal Contact with customer Risk assessment indicators Customer profile matches product/service request Origin of funds known Doubt whether gathered customer information is correct Complex/Unsuitable business structure Vulnerable sector Industry risk Purpose of customer relations Figure 4: Graphical model of customer risk (private persons) The system categorizes customers into risk groups based on the established set of indicators. This risk analysis is the basis for risk-based follow-up and adjusting customer control measures to the actual risk posed by the individual customer. Customers classified as extra high risk or high risk for money laundering and terrorism require enhanced customer due diligence, whereas customers that fall into the normal risk category can be followed up with normal control measures. In certain cases, reduced risk may justify less rigorous controls and simplified due diligence measures. Increased measures Extra high High Normal Low Increased measures Normal customer control Simplified customer control Figure 5: Risk classification and adjusted control measures. 6 HUGIN EXPERT www.hugin.com COMBITECH www.combitech.com

When establishing a new business relationship or updating customer information, a money laundering filter supports the bank advisor. The money laundering filter counsels the bank advisor on which information should be collected, and if this information indicates an increased risk of money laundering/ terrorist financing, the system counsels the advisor on what action to take, i.e. that more information is needed to disprove or confirm the suspicion of money laundering/tf. Based on the bank s needs, risk analyses can also be carried out for products and services, geography and channels. The money-laundering filter has a web-based interface: Attempt of money laundering or terror financing - customer appears suspicious This tool indicates whether a customer intends to launder money through the bank. Single factors that give lower risk Customer type No Single factors that give higher risk Higher risk No Customer Identity Personal contact with customer? Doubt whether gathered customer information is correct/sufficient No No doubt Industry sector of the customer Complex/Unsuitable business structure Vulnerable sector Industry risk Yes No No Purpose and intention of customer relationship Purpose of customer relationship Investments on behalf of Origin of funds known? Customer profile matches services/ product requested No No Risk assessment 27% Suspicious 72,99% Normal Control measures More information about the customer is required Figure 6: Web-based interface of the money laundering filter. See example at: http://demo.hugin.com/example/money_laundering_bank HUGIN EXPERT www.hugin.com COMBITECH www.combitech.com 7

The tool for ongoing monitoring of business relationships and transactions specifies the dependence relations between indicators of money laundering attempts and risk characteristics, and differentiates suspicious transactions from normal transactions. Together, the aggregate information and aggregate assessment of risk based on a combination of customer risk characteristics, customer relationship, product and services and geography provide a solid decision-making basis for identifying suspicious transactions. It ensures resources are correctly dedicated to customers and transactions that pose the highest risk, and reduces the number of false positives and unnecessary use of resources. Customer Customer Relationship Transaction OK Product Transaction Monitoring Geography Suspicious Transaction Transaction Figure 7: Transaction monitoring based on a total assessment of risk. 8 HUGIN EXPERT www.hugin.com COMBITECH www.combitech.com

Integration description Here we describe how to integrate a money laundering tool into an existing IT platform. Integration involves two main tasks: 1. Linking each model variable/indicator to the appropriate data source. 2. Reading/Exporting and presenting the probability of money laundering/tf as soon as new values are calculated. Experience shows that integrating the money laundering tool into an existing IT platform is a simple task using the HUGIN API. Before integration it is important to decide how to display the probability of money laundering/tf to the user. We suggest showing the probability of money laundering/tf using traffic lights with red, yellow and green lights, or just red and green lights, as the threshold limits for when yellow turns to green, for example, are defined during the implementation phase. Integration consists primarily of three steps: 1. Link each indicator variable to a data source in the existing IT platform. 2. Link threshold limit values for the state that indicates money-laundering/tf to the traffic lights. 3. Implement a method and routine/process description that defines how to collect and register relevant data, update model probabilities and present results. The below link contains a complete example of how to integrate a sample money laundering model. http://download.hugin.com/combitech/moneylaundering.zip HUGIN EXPERT www.hugin.com COMBITECH www.combitech.com 9

The example shown in the link uses the HUGIN Java API and involves the following steps: 1. Load the money-laundering model from file 2. Define how to obtain variables represented in the model 3. Compile the model into a calculation structure 4. Enter observations from a test example 5. Propagate evidence to calculate the probability of an indication of money laundering 6. Present the results 7. Remove observation Steps 1-3 are only required the first time. Steps 4-7 are performed each time the probability of money laundering is calculated. Model development on PC Production system HUGIN API Basic model information Front end system Customer information ASCII File Figure 8: Clear distinction between model development and system integration. 10 HUGIN EXPERT www.hugin.com COMBITECH www.combitech.com

One of the benefits of the money-laundering solution is the clear distinction between model development and model integration into an existing IT platform. Figure 8 illustrates the clear distinction between model development and system integration, - usually performed by client IT staff and supported by HUGIN consultants if needed. As soon as integration is completed, it is a simple task to replace an existing model with a new one. If no new variables are added to the model, the model can be updated by replacing a simple ASCII text file. If new variables are added to the model, these must be linked to the relevant data source. As part of the development process, the HUGIN Decision Engine is integrated into the existing or new IT platform used by a bank for managing customer data and customer transactions. The HUGIN Decision Engine comes with a set of APIs (Application Programming Interfaces) which makes integration simple. However, it is common to build what is called a HUGIN driver that acts as a mediator between the existing IT platform and the HUGIN Decision Engine. The purpose of the HUGIN driver is to control the use of the HUGIN Decision Engine. The figure below illustrates this principle. Real time IT platform Internal Method invocations (e.g., web service) External HUGIN Driver/(Data Hub ) 9.1% 5.5 External X Y Age Sex (data collection, transformation & alignment) History External Method invocations (e.g., native) HUGIN Decision Engine (state-less) Probabilities Attributes Explanation Value of information Model 1 Model n Figure 9: Illustration of the driver principle HUGIN EXPERT www.hugin.com COMBITECH www.combitech.com 11

The top part of the figure shows the platform s user interface for system users, and the bottom part the HUGIN Decision Engine. The layer in between is the HUGIN Driver, an application that can be developed by the client (or client s IT partner, assisted by HUGIN or Combitech if needed) to meet data format requirements. The task of the HUGIN Driver is to gather all data fed into the models and convert these into the proper data format (to match the data format in the models), and to convert the results produced by the HUGIN Decision Engine. The HUGIN Driver is also in charge of storing information in the form of data, which is registered in the models in addition to the model information used in each calculation. This historical data can be useful, for example, in testing future models. See Chapter 1 of the HUGIN API Reference Manual (http://download.hugin.com/webdocs/manuals/ api-manual.pdf) for further technical details about using APIs with other software and platforms, including information about how to compile and run applications using API functionality. 12 HUGIN EXPERT www.hugin.com COMBITECH www.combitech.com

Technology The technology behind the money laundering models is Bayesian Networks (also known as Bayesian Belief Networks, causal models of probability, Bayes nets, etc.). Bayesian networks are graphical models that structure the knowledge about a topic into a map of causes and effects between key variables. For each variable associated with a cause, probability is used to specify the extent to which one variable affects another. HUGIN software has long list of advantages compared to competing systems: It can combine expert knowledge and historical data It handles missing values and calculates using incomplete information Efficient inference engine makes real-time inference possible Models and implementation are flexible and easy to maintain, extend and revise The models are simple to integrate into existing systems Intuitive graphical models make it easy to communicate and discuss the risk of money laundering and terrorism connected with customers and products HUGIN EXPERT www.hugin.com COMBITECH www.combitech.com 13

Technical Information Description of Software A HUGIN software package consists of the HUGIN Graphical User Interface (GUI) for developing models for money laundering, and the HUGIN Decision Engine for integration. HUGIN Decision Engine has APIs for C, C #, C++, Java and VBA via a COM server. The HUGIN GUI is a Java implementation (which uses JNI) and the HUGIN Decision Engine is implemented using ISO C. Description of data requirements The HUGIN Graphical User Interface reads CSV files. The HUGIN Decision Engine has API functionality for entering data in real time. The HUGIN tool stores no data. How the tool integrates with existing workflow Money laundering model(s) are integrated into existing systems using one of the API s for the HUGIN Decision Engine. The API s are available for C, C #, C++, Java and VBA through a COM server. The HUGIN Decision Engine contains functionality for entering information, making calculations and assessing the probability of money laundering. The money laundering solution is especially useful in three different areas: For bank advisors when registering new customers, during periodic review of existing customers and for training purposes. The money laundering filter is usually implemented as a traffic light/color indication on the user s (advisor s) screen. HUGIN EXPERT www.hugin.com COMBITECH www.combitech.com 15

The graphical user interface is only used for developing models, during peer review, internal-external communication about the money laundering solution, and training. Monitoring of transactions - transactions are run through the HUGIN Decision Engine, which issues a warning about suspicious transactions in the form of a report, or by Email to the person in charge. Technical requirements for required user interface The HUGIN Graphical User Interface is implemented in Java using the HUGIN Java API for the HUGIN Decision Engine. The core of the HUGIN Decision Engine is implemented using the ISO C for portability and efficiency. HUGIN Decision Engine has been used in various hardware and operating systems, including PC s running on Windows and Linux, MAC for Mac OS, PCs and SUN servers on Solaris, and HP servers on HPUX and IBM mainframes. Description of tool performance HUGIN Decision Engine does not support user administration. Users of the HUGIN Decision Engine are responsible for using mutual exclusion variables, for example, when multiple users have access to the model at the same time. Alternatively, you could have a dynamic set of processes running on the same model. Time and space complexity for the most common money laundering models are linear in the number of indicator variables. Response time is dependent on hardware. Description of required administration of the tool The HUGIN Graphical User Interface is installed on the desktop of PC users. The HUGIN Decision Engine is distributed as a single file or a few files installed on the host computer. There is no user administration. The money laundering model is stored as a single file (usually as an ASCII file). This file can be opened in the HUGIN graphical interface and in the HUGIN Decision Engine. If minor adjustments are made to an existing model, the update consists of replacing the file on the server. Management of software updates The HUGIN graphical user interface (GUI) is a separate one-user program. The HUGIN GUI contains functionality for automatically installing new upgrades issued on the HUGIN website. A new version of the HUGIN Decision Engine can be installed by replacing the existing files on the host computer. Normally, new software versions are released 1-2 times per year, and active software users are notified of releases. The functionality of the HUGIN Decision Engine is tested using a series of test programs. Updates are not mandatory. New updates are usually installed on a host computer when new functionality is needed. This is rare with regard to money laundering models. HUGIN operates on the principle of reversed compatibility, meaning that files established in a previous software version will always function in new versions of the software. 16 HUGIN EXPERT www.hugin.com COMBITECH www.combitech.com

About Combitech AS Combitech is one of the Nordic region s largest technology consulting firms, with more than 1,400 employees in Sweden, Norway and Finland. We combine technical expertise with in-depth industry knowledge, all-round capability and a particular focus on the environment and security. This results in customised, sustainable solutions for demanding clients who are active both in the Nordic region and internationally. For more information visit www.combitech.no COMBITECH AS Prof. Olav Hanssensvei 7A NO-4021 Stavanger Norway Phone: +47 952 75 188 www.combitech.no About HUGIN EXPERT A/S HUGIN EXPERT A/S is a provider of predictive analytic software for building model-based risk analysis and decision support solutions that can handle uncertainty. HUGIN EXPERT A/S was established in 1989 and is headquartered in Aalborg, Denmark. Clients use HUGIN tools to create intelligent decision support solutions for fraud detection, credit default prediction, operational risk management, medical diagnosis, health monitoring, risk analysis, data mining, troubleshooting, safety assessment, forensic identification and more. For more info visit www.hugin.com HUGIN EXPERT A/S Gasvaerksvej 5 DK-9000 Aalborg Denmark Phone +45 96 55 07 90 Fax +45 96 55 07 99 www.hugin.com info@hugin.com