suspicious activity
ICE Is Using Palantir's AI Tools to Sort Through Tips
ICE Is Using Palantir's AI Tools to Sort Through Tips ICE has been using an AI-powered Palantir system to summarize tips sent to its tip line since last spring, according to a newly released Homeland Security document. United States Immigration and Customs Enforcement is leveraging Palantir's generative artificial intelligence tools to sort and summarize immigration enforcement tips from its public submission form, according to an inventory released Wednesday of all use cases the Department of Homeland Security had for AI in 2025. The AI Enhanced ICE Tip Processing service is intended to help ICE investigators "to more quickly identify and action tips" for urgent cases, as well as translate submissions not made in English, according to the inventory. It also provides a "BLUF," defined as a "high-level summary of the tip," produced using at least one large language model. BLUF, or "bottom line up front," is a military term that's also used internally by some Palantir employees.
- North America > United States > California (0.15)
- North America > United States > Colorado (0.05)
- North America > United States > Oregon (0.05)
- (4 more...)
Anti-Money Laundering Systems Using Deep Learning
Sidiq, Mashkhal Abdalwahid, Wondaferew, Yimamu Kirubel
In this paper, we focused on using deep learning methods for detecting money laundering in financial transaction networks, in order to demonstrate that it can be used as a complement or instead of the more commonly used rule-based systems and conventional Anti-Money Laundering (AML) systems. The paper explores the pivotal role played by Anti-Money Laundering (AML) activities in the global financial industry. It underscores the drawbacks of conventional AML systems, which exhibit high rates of false positives and lack the sophistication to uncover intricate money laundering schemes. To tackle these challenges, the paper proposes an advanced AML system that capitalizes on link analysis using deep learning techniques. At the heart of this system lies the utilization of centrality algorithms like Degree Centrality, Closeness Centrality, Betweenness Centrality, and PageRank. These algorithms enhance the system's capability to identify suspicious activities by examining the influence and interconnections within networks of financial transactions. The significance of Anti-Money Laundering (AML) efforts within the global financial sector is discussed in this paper. It highlights the limitations of traditional AML systems. The results showed the practicality and superiority of the new implementation of the GCN model, which is a preferable method for connectively structured data, meaning that a transaction or account is analyzed in the context of its financial environment. In addition, the paper delves into the prospects of Anti-Money Laundering (AML) efforts, proposing the integration of emerging technologies such as deep learning and centrality algorithms. This integration holds promise for enhancing the effectiveness of AML systems by refining their capabilities.
- North America > United States (0.28)
- Asia > Middle East > Iraq > Erbil Governorate > Erbil (0.04)
- Asia > Pakistan (0.04)
- (3 more...)
- Law Enforcement & Public Safety > Fraud (1.00)
- Banking & Finance (1.00)
NATO testing underwater drones off the cost of Europe to deter Russia
NATO Secretary General Jens Stoltenberg shares why its important for America to stay in the fight between Russia and Ukraine on One Nation. NATO is testing new sea drones that can use artificial intelligence to detect suspicious activity near underwater infrastructure. Fourteen members of the NATO alliance, along with Sweden, have teamed up for multiple exercises over 12 days off the cost of Portugal to test underwater sea drones that have real-time ability to send "a deterrence signal to the enemy, be it Russia or somebody else," said Lt. Gen. Hans-Werner Wiermann, head of NATO's cell for protecting undersea infrastructure, according to a report from Bloomberg. The exercises, dubbed Dynamic Messenger 23 and Robotic Experimentation and Prototyping with Maritime Unmanned Systems (REPMUS 23), will bring together over 2,000 civilian amid military personnel with a focus on integrating maritime unmanned systems into the alliance's operations and test new technologies that are currently under development. NATO personnel test new underwater drone technology during Dynamic Messenger 23 and REPMUS 23 exercises.
- Government > Military (1.00)
- Government > Regional Government > Europe Government (0.32)
- Information Technology > Artificial Intelligence > Robots (0.56)
- Information Technology > Communications > Social Media (0.47)
A Video-based Detector for Suspicious Activity in Examination with OpenPose
Moyo, Reuben, Ndebvu, Stanley, Zimba, Michael, Mbelwa, Jimmy
Examinations are a crucial part of the learning process, and academic institutions invest significant resources into maintaining their integrity by preventing cheating from students or facilitators. However, cheating has become rampant in examination setups, compromising their integrity. The traditional method of relying on invigilators to monitor every student is impractical and ineffective. To address this issue, there is a need to continuously record exam sessions to monitor students for suspicious activities. However, these recordings are often too lengthy for invigilators to analyze effectively, and fatigue may cause them to miss significant details. To widen the coverage, invigilators could use fixed overhead or wearable cameras. This paper introduces a framework that uses automation to analyze videos and detect suspicious activities during examinations efficiently and effectively. We utilized the OpenPose framework and Convolutional Neural Network (CNN) to identify students exchanging objects during exams. This detection system is vital in preventing cheating and promoting academic integrity, fairness, and quality education for institutions.
- Africa > Tanzania > Dar es Salaam Region > Dar es Salaam (0.05)
- Africa > Malawi (0.05)
- Africa > Botswana (0.05)
How AI can transform transaction monitoring and prevent financial fraud
Banks and fraudsters are engaged in a never-ending game of cat and mouse. On one side, fraudsters move money around to remove traces of criminality. On the other, banks are on the lookout for suspicious activity that indicates financial fraud. "Criminals put money through the financial system in a series of layers to mask its original source, getting to a point where that money is cleaned and can be used and integrated into the financial system for any kind of purchase or investment," says Livia Benisty, chief business officer and former global head of AML at, Banking Circle – a payments bank that is pioneering the use of AI in AML. Money laundering regulations require banks and financial services to demonstrate methods for spotting this behaviour.
Council Post: The Future Of Data And AI In The Financial Services Industry
As the CTO of a major financial institution, it is crucial to stay informed about the latest trends in data and AI in the financial services industry in order to prepare for the future and remain competitive. While there are many vendor platforms and systems available on the market to help decision-makers solve their challenges initially, the true value varies based on your organization's readiness to implement. In the next five to 10 years, there are several key trends expected to shape the financial services industry. Banks are increasingly leveraging cloud-based solutions to store, process and analyze large amounts of data, as well as to improve scalability and reduce costs. This can help them gain insights into customer behavior and market trends.
- Information Technology > Artificial Intelligence > Natural Language (1.00)
- Information Technology > Cloud Computing (0.80)
- Information Technology > Data Science (0.78)
Understanding the intersection of artificial intelligence and cryptocurrency - AI News
In recent years, both artificial intelligence (AI) and cryptocurrency have emerged as major technological forces. While they may seem like unrelated topics, they are actually deeply intertwined. IBM notes three shared values of blockchain, the technology that underlies most cryptocurrencies, and AI: authenticity, augmentation, and automation. One of the key ways that AI is being used in the world of cryptocurrency is through the application of anomaly detection. Anomaly detection, in simple terms, is the process of identifying unusual or abnormal patterns in data.
Safe and Secure: A look into Artificial Intelligence Technology -- Security Today
It has shaped the way we interact with the companies and businesses we patronize, either through chat assistance, e-mail spam algorithms, or fraud security monitoring for suspicious activity. Every second the world as we know it is changing for the better and for the worse. This perception varies person to person, city to city, and state to state and can spark endless debates on how to keep our children, our family and our world safe. In step with our ever evolving world is the lightning fast speed in which technology science has immersed itself into our everyday activities. Specifically, it is the way in which the complex phenomenon of Artificial Intelligence Technology (AIT) has become a subconscious normal interaction in our daily lives. It has shaped the way we interact with the companies and businesses we patronize, either through chat assistance, e-mail spam algorithms, or fraud security monitoring for suspicious activity.
- North America > United States > California > Los Angeles County > Pasadena (0.05)
- North America > United States > California > Los Angeles County > El Segundo (0.05)
- Asia > Singapore (0.05)
- Asia > China (0.05)
Improving AI-based defenses to disrupt human-operated ransomware - Microsoft Security Blog
Microsoft's deep understanding of human-operated ransomware attacks, which are powered by a thriving cybercrime gig economy, continuously informs the solutions we deliver to protect customers. Our expert monitoring of threat actors, investigations into real-world ransomware attacks, and the intelligence we gather from the trillions of signals that the Microsoft cloud processes every day provide a unique insight into these threats. For example, we track human-operated ransomware attacks not only as distinct ransomware payloads, but more importantly, as a series of malicious activities that culminate in the deployment of ransomware. Detecting and stopping ransomware attacks as early as possible is critical for limiting the impact of these attacks on target organizations, including business interruption and extortion. To disrupt human-operated ransomware attacks as early as possible, we enhanced the AI-based protections in Microsoft Defender for Endpoint with a range of specialized machine learning techniques that find and swiftly incriminate – that is, determine malicious intent with high confidence – malicious files, processes, or behavior observed during active attacks.
How To Use Real-Time Data? Key Examples And Use Cases
Which is more important – understanding what happened to your business last week or understanding what's happening right now? Well, both can provide useful insights that you might be able to use to improve your customer experience, make better products and services, or create efficiencies in your business processes. But there's a strong argument to be made that nothing is as vital as understanding what's going on in the here-and-now. Real-time analytics is about capturing and acting on information as it happens – or as close as it's possible to get. This involves streaming data, which could come from cameras or sensors, or it could come from sales transactions, visitors to your website, GPS, beacons, the machines and devices that operate your business, or your social media audience.
- North America > United States > California (0.05)
- Africa > South Africa (0.05)
- Information Technology > Architecture > Real Time Systems (1.00)
- Information Technology > Artificial Intelligence (0.98)
- Information Technology > Communications (0.91)