Combat Fraud and Money Laundering

Ensure your compliance with current Money Laundering Regulations

Avoid being heavily fined by the FSA. Ensure illegal financial transactions are detected with thorough open source intelligence gathering and financial transaction analysis.

Fighting financial crime icon

Fighting financial crime

Know Your Customer (KYC) Compliance

Know Your Customer (KYC) compliance is a crucial first step for financial institutions in verifying those that you do business with, and heavy fines are handed out to those that fail to conduct the right checks.

Open source intelligence (OSINT) can help to avoid non-compliance and plays a pivotal role in the correct verification of individuals and businesses.

The Chorus Intelligence Suite (CIS) can meet key financial industry requirements. It is designed for financial analysts and investigators to search and capture open source data securely and covertly. Users can perform federated searches, across external sources and internal databases, and combine with other financial data sets to identify connections and suspicious behaviour.

Search any data, anywhere

Connect to any available intelligence source, such as social media, Companies House, sanctions lists and internal databases to reveal the identities of customers

Collect data for verification

Capture any web, social media page or video, in a single click

Generate risk reports

Store all captured data relating to individuals in a collaborative workspace and generate evidential reports

OSINT for KYC checks and transactional analysis

Start with a covert search

Query a name, address, company name or phone number across any intelligence source, with unrestricted online access.

Search conectors include:

  • Companies House
  • Social media – Look up 200+ social media platforms including Facebook, Twitter, Instagram and LinkedIn
  • Company information
  • Consented data

The Chorus Intelligence Suite (CIS) can also be used to connect to internal data and any other intelligence databases via APIs

Remain anonymous, capture evidence and visualise connections

The CIS allows you to remain anonymous using our disguised search function, and maintain a hidden IP footprint. You can always find your way back to the source of intelligence with a URL logger.

Any online content, images and video can be captured in a single click, and the results visualised in multiple ways, to see who is connected to who, what, when and how.

A secure and encrypted hub

All content captured online can be saved as a searchable PDF or video within the CIS, a fully secure and encrypted central storing workspace.

Create cases and use an audit timeline with date and user ID stamps, to review your evidence. You can also perform an internal search of cases, within your organisation, to reveal cross overs and avoid duplication of work.

Choose what to include in reports and share with colleagues, partners and external agencies.  Access controls and security groups can be assigned depending on job role.

The CIS is cloud-based and can be accessed securely from any browser, anywhere, anytime.

End-to-end investigation software

Chorus Video poster image

Discover.Link.Solve

The Chorus Intelligence Suite comprises of just one platform, one dashboard and requires just one login to conduct end-to-end investigations.

Intuitive tools can be used by all, no matter your role or ability, to get answers from your data and tackle the biggest crime types.

Request a demo. Be empowered.

Seeing is believing. Request a demo to see our Intelligence Suite in action and how it can help solve your data challenges.