This section is a list of team members, and possibly links to GitHub/GitLab/LinkedIn/personal blog pages for members.
4
+
Elena Dulskyte [linkedin](https://www.linkedin.com/in/elena-dulskyte-50b83aa2/)
5
+
6
+
Marko Sahan [github](http://github.com/sahanmar) [linkedin](https://www.linkedin.com/in/msahan/)
7
+
8
+
Peter Zatka-Haas [github](http://github.com/peterzh) [linkedin](https://www.linkedin.com/in/peterzatkahaas)
5
9
6
10
## Tool Description
7
-
This sections discusses the purpose and motivation for the tool, and how it addresses a tool need you've identified.
11
+
12
+
Financial crime journalists need to dig through complex corporate ownership databases (i.e. databases of companies and the people/companies that control those companies) in order to find associations to criminal activity. They face several problems along the way:
13
+
1. It is difficult to search across multiple publicly-available databases (UK Companies House, Sanction lists, ICIJ Leaks, VK)
14
+
2. There are multiple ‘risk signatures’ associated with criminal activity (e.g. Cyclical or long-chain ownership, links to sanctions, etc) and different journalists prioritise different kinds of signatures in their investigation
15
+
3. The number of corporate networks is overwhelming, and so it is hard to prioritise which corporate ownership structures are more ‘risky’ than others
16
+
17
+
451 Corporate Risk Miner allows a user to navigate over different corporate ownership networks extracted from UK Companies House (UKCH) to identify and visualise those exhibiting risk signatures associated with financial crime. Example risk signatures include:
18
+
* Cyclic ownership: Circular company ownership (e.g. Company A owns Company B which owns Company C which owns Company A)
19
+
* Long-chain ownership: Long chains of corporate ownership (e.g. Person A controls company A. Company A is an officer for Company B. Company B is an officer of company C. etc)
20
+
* Links to tax havens: Corporate networks which involve companies/people associated with tax haven or secrecy jurisdictions
21
+
* Presence of proxy directors: Proxy directors are individual people who are registered as a company director on paper but who are likely never involved in the running of the business.
22
+
* Links to sanctioned entities: Official sanctioned people or companies, from sources such as the UN Sanctions List.
23
+
* Links to politically-exposed persons (PEPs)
24
+
* Links to disqualified directors
25
+
26
+
The user can customise the relative importance of each risk signature for their search. The app then computes a **total risk score** for each corporate network in UKCH, and outlines the details of the most high-risk networks. The user can export these network results as a .csv file for later viewing.
8
27
9
28
## Installation
10
-
This section includes detailed instructions for installing the tool, including any terminal commands that need to be executed and dependencies that need to be installed. Instructions should be understandable by non-technical users (e.g. someone who knows how to open a terminal and run commands, but isn't necessarily a programmer), for example:
11
29
12
30
1. Make sure you have Python version 3.8 or greater installed
13
31
14
32
2. Download the tool's repository using the command:
3. Move to the tool's directory and install the tool
38
+
```
39
+
cd 451
40
+
pip install -r requirements.txt
41
+
```
19
42
20
-
cd hackathon-submission-template
21
-
pip install .
43
+
4. Start the streamlit app
44
+
```
45
+
streamlit run app/app.py
46
+
```
47
+
48
+
5. On your web browser, load [http://localhost:8501](http://localhost:8501)
22
49
23
50
## Usage
24
-
This sections includes detailed instructions for using the tool. If the tool has a command-line interface, include common commands and arguments, and some examples of commands and a description of the expected output. If the tool has a graphical user interface or a browser interface, include screenshots and describe a common workflow.
51
+
52
+
TBD
25
53
26
54
## Additional Information
27
55
This section includes any additional information that you want to mention about the tool, including:
skipped 1 lines
29
57
- Any limitations of the current implementation of the tool
30
58
- Motivation for design/architecture decisions
31
59
60
+
### Limitations
61
+
* Limited to cliques of ??? hop distance owing to space limitation
62
+
* Cyclicity calculation assumes an undirected graph to save computational time. This could be improved by taking into account specific directions of ownership.
63
+
* Entity resolution for company/people entities could be improved
64
+
* Graph visualisation for large corporate networks can be too cluttered to be useful.
65
+
66
+
### Potential next steps
67
+
* Expand to corporate ownership databases outside of the UK, for example using OpenCorporates data.
68
+
* Incorporate more external data sources identifying criminal or potentially-criminal activity for companies and people.