About a-team Marketing Services
The knowledge platform for the financial technology industry
The knowledge platform for the financial technology industry

A-Team Insight Briefs

AI-Driven Insights Give Financial Crime Teams a New Edge

Subscribe to our newsletter

Digital intelligence firm Fivecast is bringing its AI-powered platform—originally used in national security—into the financial crime space.

The platform is designed to help compliance and investigation teams better detect risk by surfacing insights from vast amounts of online, publicly available data. Built around open-source intelligence (OSINT), it applies machine learning to identify red flags across customer profiles and transactions—speeding up risk assessments and reducing manual workloads.

According to the company, the platform has shown a four-fold increase in efficiency over traditional investigative methods when applied to KYC, EDD, and AML use cases. This comes at a time when regulatory bodies are demanding more from firms: new definitions and obligations under EU AMLD6, recent enforcement activity from FinCEN and the OCC, and revised AUSTRAC guidance have raised the bar for due diligence.

Legacy systems and static data sources often fail to capture the broader online activity that may signal criminal behaviour. Fivecast’s offering aims to close that gap by analysing a broad “digital footprint” across online content, including multimedia. The goal: a more complete, risk-based view of customer behaviour and affiliations.

The approach is gaining traction amid growing enforcement. In 2024, U.S. regulators alone imposed more than $4.3 billion in fines related to financial crime, including a $3 billion penalty against TD Bank for shortcomings in due diligence processes.

“Some banks employ thousands of analysts to perform enhanced due diligence and investigate money laundering or terrorism financing,” said Duane Rivett, Co-founder and VP of Strategic Growth at Fivecast. “Just as national security agencies use our products to analyse extremist or terrorist networks online, banks are doing the same with a slightly different focus.”

While the company recently received recognition from the Australian Government’s Department of Defence for its innovation in open-source intelligence, its expansion into the financial sector reflects broader adoption of national-security-grade tools in commercial compliance. The trend suggests financial institutions are shifting from traditional workflows to more adaptive, intelligence-led approaches to risk and compliance.

Subscribe to our newsletter

Related content

WEBINAR

Recorded Webinar: How to develop a reporting framework for ESG disclosure regulation

ESG reporting is a challenge and additional burden for many financial institutions as regulations continue to evolve, ESG data management is complex, and global standards remain elusive. Helpful solutions include reporting frameworks that support the collection, understanding, and management of ESG data for disclosure. This webinar will provide practical guidance on how to build a...

BLOG

smartKYC QnA: Accelerating Due Diligence at Scale

Hugo Chamberlain is the chief commercial officer of UK-based smartKYC, which has been automating the KYC process since 2014. Data Management Insight spoke to Hugo to find out how the company is helping financial institutions streamline their onboarding processes. Data Management Insight: Hello Hugo. When was smartKYC created and how does it serve financial institutions?...

EVENT

Eagle Alpha Alternative Data Conference, London, hosted by A-Team Group

Now in its 8th year, the Eagle Alpha Alternative Data Conference managed by A-Team Group, is the premier content forum and networking event for investment firms and hedge funds.

GUIDE

Entity Data Management Handbook – Seventh Edition

Sourcing entity data and ensuring efficient and effective entity data management is a challenge for many financial institutions as volumes of data rise, more regulations require entity data in reporting, and the fight again financial crime is escalated by bad actors using increasingly sophisticated techniques to attack processes and systems. That said, based on best...