{"id":22795,"date":"2023-03-28T09:34:18","date_gmt":"2023-03-28T07:34:18","guid":{"rendered":"https:\/\/www.accuracy.com\/use-of-intelligence-in-financial-cybercrime-investigations\/"},"modified":"2025-10-23T14:20:11","modified_gmt":"2025-10-23T12:20:11","slug":"use-of-intelligence-in-financial-cybercrime-investigations","status":"publish","type":"post","link":"https:\/\/www.accuracy.com\/en_gb\/use-of-intelligence-in-financial-cybercrime-investigations\/","title":{"rendered":"Use of Intelligence in Financial Cybercrime Investigations"},"content":{"rendered":"<p>Stopping financial crimes is a multifaceted challenge, and the increase in cyber threats has made this significantly more complicated. According to PwC, external economic crimes cost the firms they surveyed $42 billion annually. 1<\/p>\n<p>As investigators quickly navigate change, bad actors look to exploit any widening gaps in investigation capabilities. As reported by the World Economic Forum, we are gradually seeing the rise of risk management rather than compliance-run cybercrime strategies to combat these threats. 2<\/p>\n<p>Do the public and private sectors need a more proactive and focused approach to cybercrime risks and threats, especially concerning investigation intelligence?<\/p>\n<p>Generating intelligence involves collecting information on cybercrime from a wide range of private, public and open sources and then processing and analysing that information. The objective is to enhance and grow intelligence, which will help the investigator fight cybercrime as effectively as possible.<\/p>\n<h4>Investigators and Intelligence<\/h4>\n<p>The cybercrime investigator is at the forefront of the fight against financial crimes, undertaking an array of intelligence collection and investigative tasks. This involves using multiple analytical platforms, investigative tools, open-source intelligence, and other tools, which are constantly evolving. Thus, the techniques and tools keep changing. It happens often, investigators\u2019 desks jumbled with paperwork, computers with multiple standalone applications and separate computer screens to keep up with the volume of wrongdoing.<\/p>\n<p>Cybercrime investigations continue to be hindered by a fragmented approach. Numerous digital devices have proprietary operating systems and software that require specialised forensic tools to identify, collect, and preserve digital evidence. The time taken to investigate everything can seriously hamper or delay the identification of crucial evidence in an investigation.<\/p>\n<p>Much of this approach is driven by the low quality and ungraded intelligence that investigators receive. Poor source material and inadequate analytical platforms can, in turn, generate a \u2018throughput mentality\u2019 amongst investigators, where the focus is less on the quality of the investigation and more on ensuring that volume-based targets have been met.<\/p>\n<p>Intelligence grading, however, is a fundamental step in the intelligence process by investigators and others. Why? So, anyone reading it can have the confidence to depend on it. Once gathered, intelligence should go through a grading process where a handling code is attached to the content as part of an initial risk assessment process. Grading intelligence allows for a quick and accessible expression of this intelligence source risk assessment and sanitisation to protect that source. Based on this grading, an investigator can begin prioritising devices to review.<\/p>\n<h4>Cybercrime Investigations and Intelligence<\/h4>\n<p>Financial cybercrime investigations happen regularly within financial institutions (\u201cFIs\u201d). Their quality can vary widely in many instances because FIs often do not work with optimal analytical and forensic tools or intelligence sources. Many FIs still use standard word processing and spreadsheet applications to collate, store, and analyse customer behaviour or first-generation analytical platforms to identify vital transactional relationships. Investigators must also work through various disconnected internal and external sources to collate material for their investigation.<\/p>\n<h4>Cybercrime Investigations and Intelligence (continued)<\/h4>\n<p>The proliferation of separate data sources and intelligence streams can decelerate the investigation process, creating voids that allow mistakes and potentially missed connections that will undermine the value of the final assessment produced by the investigator. This \u2018multiple system\u2019 approach makes the investigation process more challenging to record, manage, and ultimately audit.<\/p>\n<p>Despite efforts by regulators and authorities to continuously develop their strategies to fight financial cybercrime, bad actors continue to adapt, leading to more sophisticated threats and attacks in all areas of financial cybercrime. There are also significant challenges with ensuring that investigators get the right kind of contextual intelligence delivered in a way designed to support robust outcomes. Some of the problems an investigator may face include:<\/p>\n<p>\u2022 Quantity of intelligence \u2013 this is a matter of either feast or famine, especially concerning the open source intelligence (\u201cOSINT\u201d) framework. 3<br \/>\n\u2022 Quality of intelligence \u2013 the provenance and reliability of material are often hard to assess and lead to extended and fruitless efforts to corroborate information.<br \/>\n\u2022 Consistency of intelligence \u2013 for example, open-source searches on the internet will often produce results that vary<br \/>\ndepending on location, past user history, or what online vendors might be seeking to sell. The internet is not designed to help investigators find information.<br \/>\n\u2022 Security of investigations \u2013 some investigations can leave potentially glaring online footprints on more sensitive sites such as social media platforms.<br \/>\n\u2022 Use of digital evidence \u2013 the primary goal of digital forensics is to extract data from the electronic evidence, process it into actionable intelligence, and present the findings.<\/p>\n<h4>Evolvement of Investigations<\/h4>\n<p>Experienced and well-trained investigators can help mitigate some of these problems, but even the best investigator must be equipped with the correct data and tools. A significant development is the advent of \u2018intelligent automation\u2019, which combines artificial intelligence and robotic process automation to put investigators at the centre of seamless and carefully curated intelligence environments.<\/p>\n<p>These environments make the collation, analysis, and assessment of material as frictionless as possible by:<br \/>\n\u2022 Producing an all-around view \u2013 rather than following numerous lines of intelligence on various platforms, investigators can work through a primary platform that brings together the right kind of graded intelligence \u2013 internal and external \u2013 in a single space in the shortest time possible.<br \/>\n\u2022 Refining the intelligence deluge \u2013 instead of chasing down untold disparate sources from scratch, graded and improved intelligence allows an investigator to start with a solid set of foundation stones.<br \/>\n\u2022 Developing a structured approach \u2013 investigations can rapidly become unstructured as they move across different evidential sources. Having a structured dashboard will facilitate a more systematic approach.<br \/>\n\u2022 In this modern age of technology, digital evidence is an integral part of an entire intelligence and investigation process. It helps investigators capture critical intelligence and evidence from computer systems and networks. Digital intelligence and evidence are growing exponentially and must be managed appropriately throughout an investigation.<\/p>\n<p>The decisions made by financial investigators within FIs are incredibly significant and can influence management decisions or the future of a customer relationship. If genuinely suspicious activity is missed due to poor investigative practices, poorly equipped analytical platforms, or inefficient use of intelligence, a crime that might otherwise have been detected and disrupted will be allowed to proceed. Having the best investigative tools to hand enables organisations to make these kinds of risk-based decisions confidently. At the same time, similar failings could lead to an innocent person being treated as a subject of concern, raising issues of fairness and having implications for financial inclusion. Whether the investigator gets it right or wrong will significantly affect how well an FI tackles financial crime, keeps its reputation intact, reduces monetary loss, and protects its customers.<\/p>\n<h4>Way Forward<\/h4>\n<p>Investigator-led approaches have better success against high-profile risks using improved and integrated intelligence settings within the intelligent automation process. Their deployment within the financial services sector for cybercrimes is already beginning to show fruit, primarily when allied with closer cooperation across private and public sectors in sharing risk information.<\/p>\n<p>As financial cybercrime practitioners focus increasingly on delivering results, it seems evident that empowering the investigator with the right tools to automate, collate, and grade intelligence will significantly aid the quality and efficiency of investigations.<\/p>\n<hr \/>\n<p>Notes<br \/>\n[1] https:\/\/www.pwc.com\/gx\/en\/services\/forensics\/economic-crime-survey.html<br \/>\n[2] https:\/\/www.weforum.org\/agenda\/2020\/02\/cyber-risk-should-take-centre-stage-in-financial-services\/<\/p>\n<hr \/>\n<p><strong>Darren Mullins &#8211; Partner &#8211; Accuracy<\/strong><\/p>\n<p><strong>Paul Wright &#8211; Senior Adviser &#8211; Accuracy<\/strong><\/p>\n<p><strong>Arthur Couvreur &#8211; Director &#8211; Accuracy<\/strong><\/p>\n<p><strong>Steve Molloy &#8211; Director &#8211; Accuracy<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Stopping financial crimes is a multifaceted challenge, and the increase in cyber threats has made this significantly more complicated. According to PwC, external economic crimes cost the firms they surveyed $42 billion annually. 1 As investigators quickly navigate change, bad actors look to exploit any widening gaps in investigation capabilities. As reported by the World [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":22796,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[212,263,436,265,122],"tags":[174],"class_list":["post-22795","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-analysis","category-digital-telecommunications-analysis","category-digital-technology-software-analysis","category-financial-services-banking-insurance-analysis","category-perspectives","tag-perspectives"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Use of Intelligence in Financial Cybercrime Investigations - Accuracy<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.accuracy.com\/en_gb\/use-of-intelligence-in-financial-cybercrime-investigations\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Use of Intelligence in Financial Cybercrime Investigations\" \/>\n<meta property=\"og:description\" content=\"Stopping financial crimes is a multifaceted challenge, and the increase in cyber threats has made this significantly more complicated. According to PwC, external economic crimes cost the firms they surveyed $42 billion annually. 1 As investigators quickly navigate change, bad actors look to exploit any widening gaps in investigation capabilities. As reported by the World [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.accuracy.com\/en_gb\/use-of-intelligence-in-financial-cybercrime-investigations\/\" \/>\n<meta property=\"og:site_name\" content=\"Accuracy\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-28T07:34:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-23T12:20:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.accuracy.com\/wp-content\/uploads\/2023\/04\/shutterstock_2054709956-Copy.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1170\" \/>\n\t<meta property=\"og:image:height\" content=\"390\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"dev\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dev\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/en_gb\\\/use-of-intelligence-in-financial-cybercrime-investigations\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/en_gb\\\/use-of-intelligence-in-financial-cybercrime-investigations\\\/\"},\"author\":{\"name\":\"dev\",\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/#\\\/schema\\\/person\\\/8cfdef62d7af45536d2b7b45979f72e7\"},\"headline\":\"Use of Intelligence in Financial Cybercrime Investigations\",\"datePublished\":\"2023-03-28T07:34:18+00:00\",\"dateModified\":\"2025-10-23T12:20:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/en_gb\\\/use-of-intelligence-in-financial-cybercrime-investigations\\\/\"},\"wordCount\":1222,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/en_gb\\\/use-of-intelligence-in-financial-cybercrime-investigations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.accuracy.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/shutterstock_2054709956-Copy.jpg\",\"keywords\":[\"Perspectives\"],\"articleSection\":[\"Analysis\",\"Digital - Telecommunications\",\"Digital technology &amp; Software\",\"Financial services - Banking - Insurance\",\"Perspectives\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.accuracy.com\\\/en_gb\\\/use-of-intelligence-in-financial-cybercrime-investigations\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/en_gb\\\/use-of-intelligence-in-financial-cybercrime-investigations\\\/\",\"url\":\"https:\\\/\\\/www.accuracy.com\\\/en_gb\\\/use-of-intelligence-in-financial-cybercrime-investigations\\\/\",\"name\":\"Use of Intelligence in Financial Cybercrime Investigations - Accuracy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/en_gb\\\/use-of-intelligence-in-financial-cybercrime-investigations\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/en_gb\\\/use-of-intelligence-in-financial-cybercrime-investigations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.accuracy.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/shutterstock_2054709956-Copy.jpg\",\"datePublished\":\"2023-03-28T07:34:18+00:00\",\"dateModified\":\"2025-10-23T12:20:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/en_gb\\\/use-of-intelligence-in-financial-cybercrime-investigations\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.accuracy.com\\\/en_gb\\\/use-of-intelligence-in-financial-cybercrime-investigations\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/en_gb\\\/use-of-intelligence-in-financial-cybercrime-investigations\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.accuracy.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/shutterstock_2054709956-Copy.jpg\",\"contentUrl\":\"https:\\\/\\\/www.accuracy.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/shutterstock_2054709956-Copy.jpg\",\"width\":1170,\"height\":390},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/en_gb\\\/use-of-intelligence-in-financial-cybercrime-investigations\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.accuracy.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Use of Intelligence in Financial Cybercrime Investigations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/#website\",\"url\":\"https:\\\/\\\/www.accuracy.com\\\/\",\"name\":\"Accuracy\",\"description\":\"Business Advisers - Financial Consultants\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.accuracy.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/#organization\",\"name\":\"Accuracy\",\"url\":\"https:\\\/\\\/www.accuracy.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.accuracy.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/unnamed-3.jpg\",\"contentUrl\":\"https:\\\/\\\/www.accuracy.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/unnamed-3.jpg\",\"width\":512,\"height\":512,\"caption\":\"Accuracy\"},\"image\":{\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/accuracy\\\/?originalSubdomain=fr\",\"https:\\\/\\\/www.instagram.com\\\/accuracycareers\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/#\\\/schema\\\/person\\\/8cfdef62d7af45536d2b7b45979f72e7\",\"name\":\"dev\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f1ffcac9ca2fa95ad3ec33e9be3ade82f752acb0cabe541e56c5889225afa88a?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f1ffcac9ca2fa95ad3ec33e9be3ade82f752acb0cabe541e56c5889225afa88a?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f1ffcac9ca2fa95ad3ec33e9be3ade82f752acb0cabe541e56c5889225afa88a?s=96&d=blank&r=g\",\"caption\":\"dev\"},\"sameAs\":[\"https:\\\/\\\/www.accuracy.com\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Use of Intelligence in Financial Cybercrime Investigations - Accuracy","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.accuracy.com\/en_gb\/use-of-intelligence-in-financial-cybercrime-investigations\/","og_locale":"en_GB","og_type":"article","og_title":"Use of Intelligence in Financial Cybercrime Investigations","og_description":"Stopping financial crimes is a multifaceted challenge, and the increase in cyber threats has made this significantly more complicated. According to PwC, external economic crimes cost the firms they surveyed $42 billion annually. 1 As investigators quickly navigate change, bad actors look to exploit any widening gaps in investigation capabilities. As reported by the World [&hellip;]","og_url":"https:\/\/www.accuracy.com\/en_gb\/use-of-intelligence-in-financial-cybercrime-investigations\/","og_site_name":"Accuracy","article_published_time":"2023-03-28T07:34:18+00:00","article_modified_time":"2025-10-23T12:20:11+00:00","og_image":[{"width":1170,"height":390,"url":"https:\/\/www.accuracy.com\/wp-content\/uploads\/2023\/04\/shutterstock_2054709956-Copy.jpg","type":"image\/jpeg"}],"author":"dev","twitter_card":"summary_large_image","twitter_misc":{"Written by":"dev","Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.accuracy.com\/en_gb\/use-of-intelligence-in-financial-cybercrime-investigations\/#article","isPartOf":{"@id":"https:\/\/www.accuracy.com\/en_gb\/use-of-intelligence-in-financial-cybercrime-investigations\/"},"author":{"name":"dev","@id":"https:\/\/www.accuracy.com\/#\/schema\/person\/8cfdef62d7af45536d2b7b45979f72e7"},"headline":"Use of Intelligence in Financial Cybercrime Investigations","datePublished":"2023-03-28T07:34:18+00:00","dateModified":"2025-10-23T12:20:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.accuracy.com\/en_gb\/use-of-intelligence-in-financial-cybercrime-investigations\/"},"wordCount":1222,"commentCount":0,"publisher":{"@id":"https:\/\/www.accuracy.com\/#organization"},"image":{"@id":"https:\/\/www.accuracy.com\/en_gb\/use-of-intelligence-in-financial-cybercrime-investigations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.accuracy.com\/wp-content\/uploads\/2023\/04\/shutterstock_2054709956-Copy.jpg","keywords":["Perspectives"],"articleSection":["Analysis","Digital - Telecommunications","Digital technology &amp; Software","Financial services - Banking - Insurance","Perspectives"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.accuracy.com\/en_gb\/use-of-intelligence-in-financial-cybercrime-investigations\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.accuracy.com\/en_gb\/use-of-intelligence-in-financial-cybercrime-investigations\/","url":"https:\/\/www.accuracy.com\/en_gb\/use-of-intelligence-in-financial-cybercrime-investigations\/","name":"Use of Intelligence in Financial Cybercrime Investigations - Accuracy","isPartOf":{"@id":"https:\/\/www.accuracy.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.accuracy.com\/en_gb\/use-of-intelligence-in-financial-cybercrime-investigations\/#primaryimage"},"image":{"@id":"https:\/\/www.accuracy.com\/en_gb\/use-of-intelligence-in-financial-cybercrime-investigations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.accuracy.com\/wp-content\/uploads\/2023\/04\/shutterstock_2054709956-Copy.jpg","datePublished":"2023-03-28T07:34:18+00:00","dateModified":"2025-10-23T12:20:11+00:00","breadcrumb":{"@id":"https:\/\/www.accuracy.com\/en_gb\/use-of-intelligence-in-financial-cybercrime-investigations\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.accuracy.com\/en_gb\/use-of-intelligence-in-financial-cybercrime-investigations\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.accuracy.com\/en_gb\/use-of-intelligence-in-financial-cybercrime-investigations\/#primaryimage","url":"https:\/\/www.accuracy.com\/wp-content\/uploads\/2023\/04\/shutterstock_2054709956-Copy.jpg","contentUrl":"https:\/\/www.accuracy.com\/wp-content\/uploads\/2023\/04\/shutterstock_2054709956-Copy.jpg","width":1170,"height":390},{"@type":"BreadcrumbList","@id":"https:\/\/www.accuracy.com\/en_gb\/use-of-intelligence-in-financial-cybercrime-investigations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.accuracy.com\/"},{"@type":"ListItem","position":2,"name":"Use of Intelligence in Financial Cybercrime Investigations"}]},{"@type":"WebSite","@id":"https:\/\/www.accuracy.com\/#website","url":"https:\/\/www.accuracy.com\/","name":"Accuracy","description":"Business Advisers - Financial Consultants","publisher":{"@id":"https:\/\/www.accuracy.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.accuracy.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.accuracy.com\/#organization","name":"Accuracy","url":"https:\/\/www.accuracy.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.accuracy.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.accuracy.com\/wp-content\/uploads\/2023\/08\/unnamed-3.jpg","contentUrl":"https:\/\/www.accuracy.com\/wp-content\/uploads\/2023\/08\/unnamed-3.jpg","width":512,"height":512,"caption":"Accuracy"},"image":{"@id":"https:\/\/www.accuracy.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/accuracy\/?originalSubdomain=fr","https:\/\/www.instagram.com\/accuracycareers\/"]},{"@type":"Person","@id":"https:\/\/www.accuracy.com\/#\/schema\/person\/8cfdef62d7af45536d2b7b45979f72e7","name":"dev","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/f1ffcac9ca2fa95ad3ec33e9be3ade82f752acb0cabe541e56c5889225afa88a?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f1ffcac9ca2fa95ad3ec33e9be3ade82f752acb0cabe541e56c5889225afa88a?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f1ffcac9ca2fa95ad3ec33e9be3ade82f752acb0cabe541e56c5889225afa88a?s=96&d=blank&r=g","caption":"dev"},"sameAs":["https:\/\/www.accuracy.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.accuracy.com\/en_gb\/wp-json\/wp\/v2\/posts\/22795","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.accuracy.com\/en_gb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.accuracy.com\/en_gb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.accuracy.com\/en_gb\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.accuracy.com\/en_gb\/wp-json\/wp\/v2\/comments?post=22795"}],"version-history":[{"count":4,"href":"https:\/\/www.accuracy.com\/en_gb\/wp-json\/wp\/v2\/posts\/22795\/revisions"}],"predecessor-version":[{"id":51732,"href":"https:\/\/www.accuracy.com\/en_gb\/wp-json\/wp\/v2\/posts\/22795\/revisions\/51732"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.accuracy.com\/en_gb\/wp-json\/wp\/v2\/media\/22796"}],"wp:attachment":[{"href":"https:\/\/www.accuracy.com\/en_gb\/wp-json\/wp\/v2\/media?parent=22795"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.accuracy.com\/en_gb\/wp-json\/wp\/v2\/categories?post=22795"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.accuracy.com\/en_gb\/wp-json\/wp\/v2\/tags?post=22795"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}