The Trusted Finance Intelligence Partner

Centralised Intelligence for the Digital Financial Ecosystem

A comprehensive digital platform providing real-time financial oversight, AI-powered AML compliance, and integrated fraud detection across all regulated institutions.

System Status
Real-time Aggregation Active
Monitoring 14 Institutions
KYC & onboarding

Retail KYC and business KYB in one compliance hub

Start individual or business onboarding, manage customer registry and screening, and enforce tier-based wallet limits.

Retail

KYC onboarding

Bank-channel capture for retail individuals — identity, documents, Verifi / ECW orchestration, and tier assignment.

Business

KYB onboarding

SME, corporate, agent, and merchant profiles with registry data, UBO, directors, and statutory document packs.

Risk

CRA engine

Versioned onboarding and quarterly composite risk scores with auditable decision rows and manual re-runs.

Screening

Sanctions & PEP

Watchlist, PEP, adverse media, and domestic high-risk registry screening with immutable list versions.

Compliance

CDD & EDD reports

Immutable baseline packs, SLA queues, L1/L2 evaluation, and committee-ready EDD deep assessments.

Controls

Tier & wallet limits

Lite, medium, and full tiers with required documents, channels, and MRU wallet caps before posting.

AML compliance
AML compliance
Detection

01 / 06

Rule-based scenario detection

Configurable AML scenarios including structuring, velocity, circular transfers, geographic anomalies, layering across institutions, and cash-intensive business patterns.

Structuring detection

Below-threshold splitting across accounts

Velocity scenarios

Burst and threshold-testing patterns

Cash-intensive profiles

Sector baseline deviation signals

Tracking

02 / 06

Cross-institution laundering detection

Correlate activity across institutions to detect placement and layering invisible to a single firm, including full chain reconstruction (for example wallet to bank to merchant and onward).

Chain reconstruction

Wallet → bank → merchant → onward

Cross-institution graph

Multi-node laundering paths

Placement detection

First-hop funds entry signals

Screening

03 / 06

Watchlist and PEP screening

Screen counterparties and beneficiaries against FATF and UN sanctions (updated within 24 hours of list changes), PEP data, adverse media, and the domestic high-risk registry.

Sanctions screening

FATF and UN list updates within 24 hours

PEP tier matching

Tier 1–3 with renewal policies

Adverse media hooks

Domestic high-risk registry integration

Analysis

04 / 06

Risk scoring

Dynamic risk scores for transactions and entities from rules, model outputs, watchlist hits, and history—recalculated continuously as new information arrives.

Continuous recalculation

Scores update as new data arrives

Model and rule fusion

Blended outputs from rules and ML

Watchlist hit weighting

History-adjusted risk factors

Geospatial

05 / 06

Cross-border risk monitoring

Dedicated monitoring for cross-border flows, remittance corridors, and informal channels, with enhanced focus where FATF or GIABA flag jurisdictions.

Remittance corridors

High-risk flow monitoring

Jurisdiction overlays

FATF and GIABA flagged routing

Informal channel tracking

Non-bank and wallet hop detection

Reporting

06 / 06

STR automation

Draft suspicious transaction reports when risk thresholds are exceeded, with mandatory fields pre-populated to the national FIU template for analyst review and submission.

FIU template alignment

Mandatory fields pre-populated

Tipping-off controls

Restricted narrative access for filing roles

Submission tracking

Confirmation and acknowledgement logs

Fraud prevention
Fraud prevention
Metrics

01 / 06

Velocity-based fraud detection

Unusual velocity at account, device, and network level: burst sequences, high-frequency transfers in short windows, and threshold-testing behaviour.

Burst detection

Per-minute transfer spikes vs baseline

Channel velocity

Wallet, API, and card velocity windows

Threshold testing

Repeated just-below-limit sequences

Identity

02 / 06

Device fingerprinting

Device identifiers, session context, and behavioural signals to flag activity from known or suspected fraud devices.

Device graph

Shared hardware fingerprints across accounts

Session context

IP, carrier, and app attestation signals

Takeover heuristics

Credential and SIM-swap risk overlays

Patterns

03 / 06

Circular transfer detection

Identify funds looping between accounts without legitimate commercial purpose, returning to an origin or linked account.

Loop detection

Closed paths with no economic offset

Fan-in / fan-out

Rapid in-and-out through intermediaries

Return-to-origin

Funds cycling back to source accounts

Anomalies

04 / 06

Dormant account abuse

Detect sudden high-value use after long dormancy when it departs materially from established history.

Dormancy delta

Sudden use after long inactivity windows

History deviation

Material departure from prior behaviour

Reactivation bursts

Coordinated wake-up across clusters

Clusters

05 / 06

Mule account clusters

Uncover coordinated small inflows and rapid outflows, shared device or location signals, and graph linkages typical of mule networks.

Mule fan patterns

Many small inflows, few large outflows

Shared locations

Geo concentration across linked accounts

Graph communities

Louvain-style cluster highlighting

Machine Learning

06 / 06

Behavioural analytics

Profiles for accounts and entities with machine learning on historical activity to spot meaningful deviations.

Behaviour profiles

Per-account baselines and drift scoring

Anomaly ranking

Top-N deviations for analyst triage

Feedback loop

Labels improve model calibration over time

Supervisory dashboard
Supervisory dashboard
Geospatial

01 / 06

Transaction heat maps

Geospatial view of volumes, values, and risk concentration across Mauritania, kept current for supervisory awareness.

Heat layers

Volume and value concentration by region

Cross-border overlay

Corridor risk and corridor stress

Live refresh

Streaming updates for supervisory tiles

Macro

02 / 06

Sector concentration analysis

Distribution and risk across banking, mobile money, MFIs, and remittances with trends and anomaly emphasis.

Sector mix

Banking, wallet, MFI, and remittance splits

Peer benchmarks

Institution vs sector distribution

Concentration alerts

Threshold breaches on sector share

Corridors

03 / 06

High-risk corridor tracking

Domestic and cross-border corridors with configurable thresholds and escalation.

Corridor watchlist

Configurable jurisdiction and route rules

Flow direction

Inbound vs outbound stress indicators

Domestic routes

High-value domestic path tracking

Institutions

04 / 06

Institution anomaly alerts

Automated alerts when an institution’s patterns diverge materially from its own history or peer benchmarks.

Peer z-scores

Statistical divergence from peer cohorts

Institution baselines

Self-history and cross-peer views

Early warning

Automated anomaly notifications to L4

Insights

05 / 06

Market intelligence reports

Periodic views on digital transaction volumes, channel mix, risk trends, and monetary velocity to inform policy.

Scheduled packs

PDF and data extracts for committees

Trend narratives

Channel mix and velocity commentary

Market context

External shock overlays where configured

Policy

06 / 06

Monetary policy intelligence

Track velocity across digital channels, liquidity concentrations, and payment concentration to support central bank analysis.

Digital velocity

Payment-system velocity and turnover

Liquidity pockets

Concentration in high-velocity nodes

Policy overlays

Geography-weighted monetary indicators

Case management
Case management
Workflow

01 / 05

Investigation workflow

Structured lifecycle to open, assign, escalate, and close cases with SLAs and role-based access.

SLA tracking

Open, assign, escalate, and close timers

Role routing

RBAC-aware task queues and handoffs

Status history

Immutable lifecycle transitions

Compliance

02 / 05

Audit trails

Immutable logs of actions, decisions, evidence, and status changes with tamper-evident retention.

Tamper-evident logs

Hash-chained decision and evidence events

Sign-off trails

Who approved what and when

Export integrity

Regulator-ready audit bundles

Filing

03 / 05

STR generation and submission

National FIU-aligned STR formats, digital submission, and confirmation tracking.

National template

FIU-aligned STR field population

Submission rail

Digital filing with acknowledgement IDs

Confirmation tracking

FIU receipt and resubmission rules

Storage

04 / 05

Evidence management

Attach and retrieve transactions, device data, account history, correspondence, and other case material.

Evidence vault

Transactions, devices, and correspondence

Chain of custody

Attachment versioning and access logs

Discovery search

Full-text and structured case search

Specialized

05 / 05

PEP and anti-corruption monitoring

Dedicated workflows for politically exposed persons and public-fund tracking to support anti-corruption oversight.

PEP workflows

Dedicated escalation and review paths

Public-sector lens

Anti-corruption monitoring hooks

Restricted access

Segregation for sensitive narratives

National oversight, ready for the digital economy.

Authorised users can enter the secure workspace to work alerts, cases, and supervisory views connected to FINX.

99%
Detection rate
Real-time
Aggregation
360°
Entity resolution
FATF
Aligned