Control
Law enforcement and intelligence agencies are locked in a chess game with their criminal organization adversaries. To avoid detection and capture, bad actors rely on staying several moves ahead. For investigators, the enduring challenge is that the game has fundamentally changed – and not in their favor.
Indeed, today, criminal networks and adversarial organizations (including terrorist groups) are strategic and well-resourced. They can exploit widespread dual-use technologies to obfuscate their nefarious activities, which can misdirect and surprise investigators. They can communicate and exchange information near-instantaneously – enabling them to stealthily mobilize at lightning speed.
But, thankfully, investigators can exploit a key weakness. Either unwittingly or reluctantly, every person and organization leaves footprints in public records. This is a by-product of societal norms: when participating in professional and revenue-producing activities – or when using recognized instruments for commerce – our day-to-day activities and engagements with legitimate systems compel us to leave trails. These footprints are what constitute business activity intelligence (BizINT).
The footprints that bad actors leave can tell a colorful story: they can be compared to the typical participant as a baseline, or provide intelligence on company size, revenues earned. Investigators can use these footprints to discover or confirm an identity, and connected persons of interest – as well as how actors may intend to commit crime or pose a threat (their means and methods).
BizINT’s value to investigations is significant but often underplayed: they can provide color not only to financial crimes like money laundering, but also to physical crimes with a financial nexus, such as drug trafficking, human smuggling, terrorism, counterfeiting, and more. Crucially, its detail is sufficient enough for investigators to conduct pattern and trend analysis. When used effectively, it provides investigators an “honest broker” lens on indicators of fraud and other wrongdoing.
BizINT can address four types of bad actor behaviors, known as the “four Cs”: control; concealment; circumvent; and conduit.
These four behaviors are crime- and threat-agnostic. Rather, a safe assumption is if one can successfully uncover nefarious behaviors in their early stages, adverse outcomes can be mitigated before the actor can conceive a specific attack, event, or point of penultimate victimization.
The four Cs of bad actor behaviors:
Control
The desire by a person or organization to have direct command or tasking authority over business operations to achieve an envisioned impact on a counterparty or counterparties participating in the same or a related commercial environment.
Economic espionage; synthetic drug manufacturing; organized crime; counterfeiting; conspiracy; tax evasion; real estate/property management
Hostile mergers or takeovers, strategic duress; bad actors accesses non-public information by inserting themselves in a position of authority.
Concealment
Active attempt to hide, deny, misrepresent, or disassociate a person or entity’s identity, status, bona fides, mission, and conduct in order to avoid detection and/or punishment for involvement with some type of illicit or outlawed activity.
Economic espionage; identity fraud; organized crime; terrorism, conspiracy; money laundering; human trafficking; legalized marijuana
Synthetic identity fraud
Circumvent
Active attempt to evade or avoid rules, regulations, laws, accepted industry practices or other requirements that guide the ethical and appropriate conduct of everyday professional activities; concerted acts to outwit a counterparty in the broader market through surreptitious means.
Economic espionage; cybercrime; money laundering; counterfeiting, weapons trafficking, prostitution; extortion; document fraud
Evading sanctions using proxies, opaque state-owned enterprises, family members and associates, or the use of enablers e.g. lawyers and accountants
Conduit
Use of completely legal means, vehicles, channels or mechanisms to facilitate an ultimate illicit act or create an adverse outcome against a specific counterparty or range of counterparties in the market/society.
Economic espionage; loan sharking; public corruption/bribery; conspiracy; identity theft; mail and wire fraud; sanctioned foreign investment
Shell companies
Opportunities for investigators to further exploit BizINT in the coming years are abounding. Perhaps the most interesting trend is the advent of generative artificial intelligence (GenAI), which has the potential to transform investigations. For instance, its capacity to process analyze vast amount of data will help investigators to predict and identify criminal patterns, generate reports highlighting anomalies and potential threats, and build scenario models to proactively counteract criminal strategies.
Additionally, GenAI's natural language processing can assist in translating data across languages and formats, broadening intelligence gathering. These augmentations may help law enforcement to stay ahead in the cat-and-mouse game, making it harder for criminals to operate undetected.
The race against criminals is ongoing. BizINT is one of the best weapons in the investigator’s arsenal. And, thanks to the technological evolution already underway, law enforcement capabilities could see even further advancement in the battle against sophisticated criminal networks.
Moody’s provides actionable business activity intelligence that can help law enforcement agencies to better understand nefarious behavior, as well as detect and track bad actors.
Maxsight™ Investigations is a platform that automates and centralizes investigation workflows so investigators can collect, view, analyze, and visualize vast datasets for faster results without compromising quality.
Learn more about Maxsight™ Investigations.
Get in touch with our team today.