<?xml version="1.0" encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="https://www.niceideas.ch/roller2/roller-ui/styles/atom.xsl" media="screen"?><feed xmlns="http://www.w3.org/2005/Atom">
    <title type="html">niceideas.ch</title>
    <subtitle type="html">Technological Thoughts by Jerome Kehrli</subtitle>
    <id>https://www.niceideas.ch/roller2/badtrash/feed/entries/atom</id>
            <link rel="self" type="application/atom+xml" href="https://www.niceideas.ch/roller2/badtrash/feed/entries/atom?cat=Banking" />
        <link rel="alternate" type="text/html" href="https://www.niceideas.ch/roller2/badtrash/" />
        <updated>2025-12-23T06:13:50-05:00</updated>
    <generator uri="http://roller.apache.org" version="5.1.2">Apache Roller</generator>
        <entry>
        <id>https://www.niceideas.ch/roller2/badtrash/entry/artificial-intelligence-and-fraud-prevention</id>
        <title type="html">Artificial Intelligence and fraud prevention with Netguardians&apos; CTO, Jérôme Kehrli</title>
        <author><name>Jerome Kehrli</name></author>
        <link rel="alternate" type="text/html" href="https://www.niceideas.ch/roller2/badtrash/entry/artificial-intelligence-and-fraud-prevention"/>
        <published>2022-01-18T06:11:45-05:00</published>
        <updated>2022-01-18T06:11:45-05:00</updated> 
        <category term="Banking" label="Banking" />
        <category term="ai" scheme="http://roller.apache.org/ns/tags/" />
        <category term="artificial-intelligence" scheme="http://roller.apache.org/ns/tags/" />
        <category term="banking-fraud" scheme="http://roller.apache.org/ns/tags/" />
        <category term="netguardians" scheme="http://roller.apache.org/ns/tags/" />
        <category term="podcast" scheme="http://roller.apache.org/ns/tags/" />
        <summary type="html">&lt;p&gt;
I spoke to to &lt;a href=&quot;https://www.linkedin.com/in/rudolf-falat/&quot;&gt;Rudolf Falat&lt;/a&gt;, founder of the &lt;a href=&quot;https://www.linkedin.com/in/rudolf-falat/&quot;&gt;Voice of FinTech&lt;/a&gt; podcast about leveraging AI in anti-fraud prevention and cybersecurity.
&lt;/p&gt;

&lt;p&gt;
The Podcast is &lt;a href=&quot;https://www.voiceoffintech.com/episodes/netguardians&quot;&gt;available here&lt;/a&gt; and can be listened to directly from hereunder:
&lt;/p&gt;

&lt;iframe width=&quot;100%&quot; height=&quot;180&quot; frameborder=&quot;no&quot; scrolling=&quot;no&quot; seamless=&quot;&quot; src=&quot;https://share.transistor.fm/e/41d2933f/dark&quot;&gt;&lt;/iframe&gt;

&lt;p&gt;
Happy listening !
&lt;/p&gt;

&lt;p&gt;
&lt;b&gt;The full transcript is available hereunder&lt;/b&gt;
&lt;/p&gt;


</summary>
        <content type="html">&lt;p&gt;
I spoke to to &lt;a href=&quot;https://www.linkedin.com/in/rudolf-falat/&quot;&gt;Rudolf Falat&lt;/a&gt;, founder of the &lt;a href=&quot;https://www.linkedin.com/in/rudolf-falat/&quot;&gt;Voice of FinTech&lt;/a&gt; podcast about leveraging AI in anti-fraud prevention and cybersecurity.
&lt;/p&gt;

&lt;p&gt;
The Podcast is &lt;a href=&quot;https://www.voiceoffintech.com/episodes/netguardians&quot;&gt;available here&lt;/a&gt; and can be listened to directly from hereunder:
&lt;/p&gt;

&lt;iframe width=&quot;100%&quot; height=&quot;180&quot; frameborder=&quot;no&quot; scrolling=&quot;no&quot; seamless=&quot;&quot; src=&quot;https://share.transistor.fm/e/41d2933f/dark&quot;&gt;&lt;/iframe&gt;

&lt;p&gt;
Happy listening !
&lt;/p&gt;

&lt;p&gt;
&lt;b&gt;The full transcript is available hereunder&lt;/b&gt;
&lt;/p&gt;








&lt;p&gt;
&lt;b&gt;&lt;i&gt;Jerome, can you introduce yourself? How did you get to do what you do today?&lt;/i&gt;&lt;/b&gt;
&lt;/p&gt;

&lt;p&gt;
I&apos;m swiss, 43 years old and a proud father of 3 boys. 
&lt;br&gt;
I guess I&apos;m first and foremost a passionate software engineer and computer scientist. I remember putting my hands on my first computer - a commodore 128 - when I was 12 years old and knowing very well at that very moment that that would be my carrier.
&lt;br&gt;
I&apos;m passionate by technology, artificial intelligence, programming, etc. for nearly 30 years now. I made all my career in financial institutions and fintechs and I wouldn&apos;t see myself working in another business nowadays. Financial institutions and financial markets form a very interesting domain of application in computer science due to the complexity of these systems and the wide range of concerns to be addressed, from real-time computing to highly mathematical applications.
&lt;br&gt;
I guess that my role today as CTO of NetGuardians is kind of a natural evolution in my career.
&lt;/p&gt;

&lt;p&gt;
NetGuardians is a Swiss based software editor developing a Big Data Analytics platform that we package and deploy in financial institution mostly today to detect fraudulent activities and prevent fraudulent transactions.
&lt;/p&gt;



&lt;p&gt;
&lt;b&gt;&lt;i&gt;Why have you decided to join a start-up (or a scale-up) like NetGuardians?&lt;/i&gt;&lt;/b&gt;
&lt;/p&gt;

&lt;p&gt;
Before the NetGuardians co-founders reached out to me I was a consultant for a few years, working mostly for the major european banking institutions.
&lt;br&gt;
I really liked the job at the time, mostly the possibility to jump quickly from one topic to another, one customer to another.
&lt;/p&gt;

&lt;p&gt;
But I did miss the product culture very much. As a consultant I was guiding other teams or leaders in adopting technologies, designing information systems, driving innovation projects, etc. But I was missing the deep implication and engagement that you get when you create a product from A to Z and sell it. Developing a software is the closest you can get in day job to having an actual child ;-)
&lt;/p&gt;

&lt;p&gt;
So when NetGuardians pivoted to banking fraud fighting 7 years ago, the co-founders were looking for someone to lead the product research and development department, someone with a strong technical background and an extensive experience in finance.
&lt;br&gt;
Switzerland is a small country so they have been directed by some common relationship we had in their advisory board to my profile. So we met and they told me their story and shared their vision with me and I decided that I wanted to be part of it.
&lt;br&gt;
And today, 7 years after this first encounter I guess this company and this product are just as much my children as they&apos;re theirs.
&lt;/p&gt;


&lt;p&gt;
&lt;b&gt;&lt;i&gt;When will we finally have truly intelligent AI working on fraud prevention in banking ?&lt;/i&gt;&lt;/b&gt;
&lt;/p&gt;

&lt;p&gt;
Now that&apos;s a good question.
&lt;br&gt;
It&apos;s hard to answer since intelligent AI would need to be defined or precised. So first I would want to distinguish strong AI vs. weak AI and then share my perspective on what would be a truly intelligent AI.
&lt;/p&gt;

&lt;p&gt;
If we qualify as a strong artificial intelligence, a software program able to contextualize, to show sensitivity, to show creativity or to exceed it&apos;s programming scope, then we don&apos;t have today the slightest trail of a proof that we&apos;d be able one day to create such an program. This is downright science fiction. There is nothing in the real world anywhere close to the beginning of it.
&lt;br&gt;
The thing is that Artificial Intelligence is generating a lot of fantasy in the public&apos;s mind and I guess that the fact that we have given some of these algorithms names such as neural network is not helping in this regards. If we had given to neural networks the technical names they should have, such as largely convoluted and iterative statistical matrix model, I&apos;m sure they wouldn&apos;t generate the same level of fantasy in people&apos;s minds.
&lt;br&gt;
Anyways.
&lt;/p&gt;

&lt;p&gt;
Then if we qualify as a weak AI a software program able to optimize a mathematical function, solve a classification problem, or take a decision based on input data, then the progresses today are tremendous and new applications and solutions pop up nearly every week. 
&lt;br&gt;
This technology evolves at a very fast pace and today&apos;s AI programs are a collection of sometimes hundreds of different algorithms working together to solve an analytical problem, such as driving a car autonomously for instance which is amazing.
&lt;/p&gt;

&lt;p&gt;
Now when it comes to true intelligence, I strongly believe that the only true, actual intelligence is in the mind of the people developing these systems, not the machine, never the machine.
&lt;br&gt;
And then again, the progresses today are tremendous and essentially around 2 dimensions: the complexity of the individual Machine Learning algorithms and the number of these algorithms deployed together and working in conjunction in Artificial Intelligence Systems
&lt;/p&gt;

&lt;p&gt;
And what we do at NetGuardians is a good illustration of all this evolution.
&lt;br&gt;
When we started in 2016, we were using one or two different methods to infer good features on events we were monitoring, mostly EBanking activities and financial transactions, as well as a single Supervised learning algorithm. Today we use a combination of multiple dozens of different unsupervised and supervised techniques all working together and each one of them focusing on a specific perspective, such as the timing of events, their frequency, their location, the destination of the funds, etc. or a specific step in the risk scoring process.
&lt;/p&gt;

&lt;p&gt;
So yeah, again the true intelligence is in the mind of the guys developing these systems, not in the software.
&lt;/p&gt;


&lt;p&gt;
&lt;b&gt;&lt;i&gt;How good is anti-fraud AI today? What kind of AI are we talking about?&lt;/i&gt;&lt;/b&gt;
&lt;/p&gt;

&lt;p&gt;
Anti-fraud systems today form a very peculiar and passionate domain of application for artificial Intelligence. The nature of the problem to be solved makes it very specific.
&lt;br&gt;
Think of it, while some payments channel such as credit cards for instance experience a plethora of frauds, some other channels such as digital banking payments have typically only a few frauds for a million transactions a day.
&lt;/p&gt;

&lt;p&gt;
Most sophisticated classification machine learning algorithms we have today perform very poorly on such datasets. They work well when the data is very much balanced between the positive and other populations.
&lt;br&gt;
As an example, every engineer knows today how to train a neural network to recognize pictures of cats, for instance, by feeding it with thousands of pictures of cats and thousands of pictures of other animals and other objects. Now if you try to train a neural network to recognize cats with only 6 pictures of cats and millions of random pictures of other animals and objects, the next picture of a cat you will present to the neural network will be classified as anything, such an elephant, right ? But there&apos;s no way an algorithm trained this way understands how to recognize cats.
&lt;/p&gt;

&lt;p&gt;
And we&apos;re in the same situation. The very unbalanced nature of the data we&apos;re playing with makes all simple approaches simply irrelevant. So we have to do fairly complex stuff.
&lt;/p&gt;

&lt;p&gt;
Our state of the art approach today at NetGuardians is a combination of multiple fairly evolved techniques and approaches working together. 
&lt;br&gt;
I don&apos;t want to go to much into technical details but I would mention three categories of techniques we&apos;re using.
&lt;/p&gt;

&lt;p&gt;
First, unsupervised learning techniques for anomaly detection ... with a wide range of different algorithms, from simple statistical or Poisson scoring down to clustering and peer group analysis. At the end of the day, fraudulent activities and transactions are always part of the set of anomalies.
&lt;br&gt;
Then, supervised learning techniques ... with a lot of different models being required from classification algorithms to risk scoring techniques, to distinguish between legitimate anomalies and highly potentially fraudulent transactions.
&lt;br&gt;
Last but not least, active learning and other supervision techniques to monitor the feedback we get from banking business users reviewing the hits, the activities or transactions being blocked in real-time by the system, etc. 
&lt;br&gt;
And that is absolutely key because at the end of the day, our algorithms learn a lot from the feedback of these business people and they can only be as good as this feedback is. So supervising this quality is an essential concern.
&lt;/p&gt;

&lt;p&gt;
So yeah, again, our approach at NetGuardians today is a combination of dozens of such techniques and algorithms deployed together to detect and block suspicious activities and transactions in real-time. And It works pretty good !
&lt;/p&gt;

&lt;p&gt;
Another thing to consider: every transaction we block is investigated by a business expert within the bank who takes the eventual decision.
&lt;br&gt;
In a sense, we&apos;re not replacing the human decision process, but we&apos;re enhancing it. We give bankers a chance to review potentially or likely fraudulent activities before the funds leave the bank. And this is called Augmented Intelligence.
&lt;/p&gt;



&lt;p&gt;
&lt;b&gt;&lt;i&gt;Who are your target customers?&lt;/i&gt;&lt;/b&gt;
&lt;/p&gt;

&lt;p&gt;
At NetGuardians, we&apos;re working only for financial institutions. Our typical customers are Tier 1 and Tier 2 banks - big banks to medium size banks - where we detect fraudulent activities in a holistic fashion, fraudulent transactions and activities on digital channels just as much as internal fraud or scams.
&lt;br&gt;
In terms of types of financial institutions, we work just as much with massive retail banking institutions in Asia than private banking institutions in Switzerland.
&lt;br&gt;
Our key markets are Europe, our home market, Africa and Asia Pacific.
&lt;br&gt;
We support on premise deployment for Tier 1 banks who have a strong will to keep everything in house and onboard smaller institutions on one of our SaaS - Software as a Service - platforms on the cloud.
&lt;/p&gt;


&lt;p&gt;
&lt;b&gt;&lt;i&gt;How do you make money?&lt;/i&gt;&lt;/b&gt;
&lt;/p&gt;

&lt;p&gt;
Our customers pay an annual recurring licensing fee calculated from two metrics, their Asset under Management and their volume of financial transactions.
&lt;br&gt;
We bill delivery and integration costs  when we integrate the solution ourselves but we intend to get away from this activity as much as possible and rely increasingly on local partners for integration.
&lt;br&gt;
We are not very much interested to sell services and would want to focus in the future on selling licenses only but that would require us to reach a critical mass and we&apos;re not there yet.But it&apos;s an ultimate objective for us, moving a way from a being both a product and service company today and turning to an only product company.
&lt;/p&gt;


&lt;p&gt;
&lt;b&gt;&lt;i&gt;Where are you based?&lt;/i&gt;&lt;/b&gt;
&lt;/p&gt;

&lt;p&gt;
We&apos;re a company founded in Switzerland and we are still today headquartered in Yverdon-les-bains, a small town north to Lausanne. We have offices in Nairobi where we manage our operations in Africa and in Singapore where we handle our Asian activities. We also have a commercial office in London and a near-shore development center in Warsaw .
&lt;/p&gt;



&lt;p&gt;
&lt;b&gt;&lt;i&gt;Where are you on your journey in terms of product development, geographic reach, funding, hiring? Any numbers you can share?&lt;/i&gt;&lt;/b&gt;
&lt;/p&gt;

&lt;p&gt;
We have today a very solid technology and product for the banking fraud detection and prevention problem. And in the short term we intend to leverage on our technology to extend our product to other financial crime use cases.
&lt;/p&gt;

&lt;p&gt;
There are many different concerns in Financial crime fighting in banking institutions, Fraud detection is an essential one of them of course but then there&apos;s also AML - Anti Money Laundering - Transaction Monitoring, KYC - Know your customer and of course customer and transaction screening.
&lt;br&gt;
KYC and screening require very different technologies than the ones we&apos;ve built so they&apos;re not in our short term focus. But AML Transaction Monitoring is very close from what we do on Fraud, just the perspective of the analytics is somewhat different.
&lt;br&gt;
Finding fraud is a lot about understanding where the money goes while AML is a lot about understanding where the money comes from, but from a technical standpoint it&apos;s really similar.
&lt;/p&gt;

&lt;p&gt;
So long story short, we intend by the end of next year to extend our solution to state of the art AML transaction Monitoring leveraging on our technology. Eventually, over the next years, we intend to build a complete financial crime package by integrating third party solutions for KYC and screening.
&lt;/p&gt;

&lt;p&gt;
In terms of geographic reach, we are today strong in Europe - our local market - and Africa. But we&apos;re really only building Asia. This is where we are investing our effort today and in the coming year to build a strong sales team, identifying and leveraging on the right partners, scaling the delivery team and eventually, hopefully, become a major player in Asia as well.
&lt;br&gt;
Interestingly, we have no intent to actively address the US market today aside of a few opportunistic leads through some of our partners.
&lt;/p&gt;

&lt;p&gt;
To give you a few figures, we&apos;re today a 100 FTEs company and we have a little less than 80 financial institutions as customers.
&lt;/p&gt;

&lt;p&gt;
Now regarding funding, I can&apos;t tell you much actually. We have raised roughly 30 million USD so far and we are in the process of challenging and building the next investment round. Building the proper structure in APAC to emerge as a major player here is not something on our reach today. We need support from investors to build this and we&apos;re working on that today.
&lt;/p&gt;


&lt;p&gt;
&lt;b&gt;&lt;i&gt;What are the next steps for you next year and beyond? Customers, incumbents as partners, investors?&lt;/i&gt;&lt;/b&gt;
&lt;/p&gt;

&lt;p&gt;
We intend to develop significantly in our three key markets, Europe, Africa and Asia. We are in the process of finalizing recruitment of the key people - such as regional sales director, etc. - who will be instrumental in driving our growth in these regions. 
&lt;br&gt;
And as I said before, we need support from investors to build the proper structure in APAC, based in Singapore.
&lt;/p&gt;

&lt;p&gt;
In terms of partnership, we have today very good partners in the core banking systems and banking package providers field where our strategy is to bundle our fraud detection engine with their Core Banking Package offering.
&lt;br&gt;
We are now in the process of looking for integration partners in the different regions to support our scaling and incrementally disengage our own people from delivery.
&lt;/p&gt;

&lt;p&gt;
In terms of investment, we would also expect the next round to support our extension to completeness of offering in AML and more generally financial crime fighting as well as complete our transition to the cloud as lead deployment channel. We have still quite a path ahead of us to provider tier 1 banking institutions with a state of the art hybrid cloud approach.
&lt;br&gt;
A lot of tier 1 banking institution would sign up for a cloud deployment of NetGuardians if and only if we can provide them with means to guarantee that the confidential data remains within the bank information system boundaries. And the technology for that is called hybrid cloud which would be quite an evolution from what we do today.
&lt;/p&gt;


&lt;p&gt;
&lt;b&gt;&lt;i&gt;Where can interested parties reach you?&lt;/i&gt;&lt;/b&gt;
&lt;/p&gt;

&lt;p&gt;
Well, I guess the best way to get in touch with us is through our web site, &lt;a href=&quot;https://netguardians.ch/&quot;&gt;www.netguardians.ch&lt;/a&gt;.
&lt;br&gt;
And the best way to contact me would be on linkedin I guess &lt;a href=&quot;https://www.linkedin.com/in/jeromekehrli/&quot;&gt;jerome KEHRLI&lt;/a&gt;.
&lt;/p&gt;





</content>
    </entry>
    <entry>
        <id>https://www.niceideas.ch/roller2/badtrash/entry/netguardians-3d-ai-technology</id>
        <title type="html">NetGuardians&apos; 3D AI Technology</title>
        <author><name>Jerome Kehrli</name></author>
        <link rel="alternate" type="text/html" href="https://www.niceideas.ch/roller2/badtrash/entry/netguardians-3d-ai-technology"/>
        <published>2021-06-08T03:18:54-04:00</published>
        <updated>2021-09-03T05:12:10-04:00</updated> 
        <category term="Banking" label="Banking" />
        <category term="ai" scheme="http://roller.apache.org/ns/tags/" />
        <category term="artificial-intelligence" scheme="http://roller.apache.org/ns/tags/" />
        <category term="machine-learning" scheme="http://roller.apache.org/ns/tags/" />
        <category term="netguardians" scheme="http://roller.apache.org/ns/tags/" />
        <summary type="html">&lt;p&gt;
&lt;i&gt;(Article initially published on &lt;a href=&quot;https://blog.netguardians.ch/netguardians-3d-ai-delivers-global-analytics-supremacy-in-fraud-detection&quot;&gt;NetGuardians&apos; blog&lt;/a&gt;)&lt;/i&gt;
&lt;/p&gt;

&lt;p&gt;
Whenever our software is run head-to-head in a pitch situation against that of our rivals, we always come out top. We always find more fraud with a lower number of alerts. For some, this is a surprise – after all, we are one of the youngest companies in our field and one of the smallest. To us, it is no surprise. It is testament to our superior analytics.
&lt;/p&gt;

&lt;h2&gt;A focus on customer behavior&lt;/h2&gt;

&lt;p&gt;
We began working in fraud prevention in 2013 and quickly realized the futility of rules engines in this endless game of cat-and-mouse with the fraudsters. The criminals will always tweak and reinvent their scams; those trying to stop the fraud with rules engines will always be left desperately working as fast as possible to identify and incorporate the latest scams into their surveillance. Far better to focus on what we know changes very little – customer behavior.
&lt;/p&gt;

&lt;p&gt;
If a bank knows how a customer spends money, it can spot when something is awry by looking for anomalies in transaction data. However meticulous the fraudster is at trying to hide, every fraudulent transaction will have anomalous characteristics. People’s lives are constantly changing – they buy from new suppliers, they move house, go on holiday and their children grow up – all of which will affect their spending and transaction data. Every change will throw up false alerts that will undermine the customer experience unless you train your models correctly.
&lt;/p&gt;

&lt;h2&gt;The three pillars of 3D AI&lt;/h2&gt;

&lt;p&gt;
We train our models using what we call our 3D AI approach. This enables them to assess the risk associated with any transaction with extraordinary accuracy, even if it involves new behavior by the customer. This also keeps false alerts to the minimum.
&lt;/p&gt;


&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot; https://www.niceideas.ch/roller2/badtrash/mediaresource/f0469115-795b-45d9-be64-e5059c14745f&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 400px;&quot; alt=&quot;3D AI&quot; src=&quot; https://www.niceideas.ch/roller2/badtrash/mediaresource/f0469115-795b-45d9-be64-e5059c14745f&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
Developed by us at NetGuardians, this approach has three pillars, each of which uses artificial intelligence (AI) to constantly update and hone the models.
&lt;/p&gt;

&lt;p&gt;
The pillars are: &lt;b&gt;anomaly detection&lt;/b&gt;, &lt;b&gt;fraud-recognition&lt;/b&gt; training analytics and &lt;b&gt;adaptive feedback&lt;/b&gt;. Together, they give our software a very real advantage by not only spotting fraud and helping banks stop fraudulent payments before any money has left the account, but also by minimizing friction and giving the best possible customer experience. This is what differentiates our software in head-to-head pitches.
&lt;/p&gt;
</summary>
        <content type="html">&lt;p&gt;
&lt;i&gt;(Article initially published on &lt;a href=&quot;https://blog.netguardians.ch/netguardians-3d-ai-delivers-global-analytics-supremacy-in-fraud-detection&quot;&gt;NetGuardians&apos; blog&lt;/a&gt;)&lt;/i&gt;
&lt;/p&gt;

&lt;p&gt;
Whenever our software is run head-to-head in a pitch situation against that of our rivals, we always come out top. We always find more fraud with a lower number of alerts. For some, this is a surprise – after all, we are one of the youngest companies in our field and one of the smallest. To us, it is no surprise. It is testament to our superior analytics.
&lt;/p&gt;

&lt;h2&gt;A focus on customer behavior&lt;/h2&gt;

&lt;p&gt;
We began working in fraud prevention in 2013 and quickly realized the futility of rules engines in this endless game of cat-and-mouse with the fraudsters. The criminals will always tweak and reinvent their scams; those trying to stop the fraud with rules engines will always be left desperately working as fast as possible to identify and incorporate the latest scams into their surveillance. Far better to focus on what we know changes very little – customer behavior.
&lt;/p&gt;

&lt;p&gt;
If a bank knows how a customer spends money, it can spot when something is awry by looking for anomalies in transaction data. However meticulous the fraudster is at trying to hide, every fraudulent transaction will have anomalous characteristics. People’s lives are constantly changing – they buy from new suppliers, they move house, go on holiday and their children grow up – all of which will affect their spending and transaction data. Every change will throw up false alerts that will undermine the customer experience unless you train your models correctly.
&lt;/p&gt;

&lt;h2&gt;The three pillars of 3D AI&lt;/h2&gt;

&lt;p&gt;
We train our models using what we call our 3D AI approach. This enables them to assess the risk associated with any transaction with extraordinary accuracy, even if it involves new behavior by the customer. This also keeps false alerts to the minimum.
&lt;/p&gt;


&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot; https://www.niceideas.ch/roller2/badtrash/mediaresource/f0469115-795b-45d9-be64-e5059c14745f&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 400px;&quot; alt=&quot;3D AI&quot; src=&quot; https://www.niceideas.ch/roller2/badtrash/mediaresource/f0469115-795b-45d9-be64-e5059c14745f&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
Developed by us at NetGuardians, this approach has three pillars, each of which uses artificial intelligence (AI) to constantly update and hone the models.
&lt;/p&gt;

&lt;p&gt;
The pillars are: &lt;b&gt;anomaly detection&lt;/b&gt;, &lt;b&gt;fraud-recognition&lt;/b&gt; training analytics and &lt;b&gt;adaptive feedback&lt;/b&gt;. Together, they give our software a very real advantage by not only spotting fraud and helping banks stop fraudulent payments before any money has left the account, but also by minimizing friction and giving the best possible customer experience. This is what differentiates our software in head-to-head pitches.
&lt;/p&gt;


&lt;!-- read more --&gt;



&lt;p&gt;
The first pillar is &lt;b&gt;anomaly detection&lt;/b&gt;, which is mostly &lt;b&gt;unsupervised learning&lt;/b&gt;. At this stage, we are looking for anomalies and working out the level of risk associated with them. This involves examining a set of parameters such as time of transaction, counterparty, location, amount and currency. As seen above, on their own, these parameters aren’t enough to prevent an unacceptable level of false alerts. By including peer-group behavior, we begin to reduce the number of false alerts. For example, people don’t buy a car often and when they do, they don’t want their bank to block and query the transaction because of its rarity. But if you place the customer among peers, the size of the transaction can trigger associations that bring its risk level down. This, along with other techniques including Poisson Law help us understand the timing and regularity of the transaction, resulting in a highly nuanced picture of risk.
&lt;/p&gt;

&lt;p&gt;
The second pillar is &lt;b&gt;fraud-recognition&lt;/b&gt; training analytics, mostly relying on &lt;b&gt;supervised learning&lt;/b&gt; techniques. Typically, a T2 or T3 bank might see 10 frauds a year out of 100 million transactions. This level of fraud is insufficiently high to train a complex algorithm. So we have developed models using anonymized bank data that can be overlaid on a bank’s own data. The models cover different situations, regions, size of bank and type of customer, which allow us to create analytics that look at the context of the data. Our software is even capable of deciding which model is best for the analysis.
&lt;/p&gt;

&lt;p&gt;
For a T1 bank, it takes just a few hours to train the algorithms, with perhaps some manual intervention to confirm the final choice of models. Smaller banks take one to two hours and the process is fully automated.
&lt;/p&gt;

&lt;p&gt;
The final element is &lt;b&gt;adaptive feedback&lt;/b&gt; using &lt;b&gt;active learning&lt;/b&gt;. This is absolutely crucial to reduce false alerts to the lowest possible level while minimizing the risk of missing a fraud. Our adaptive feedback technology monitors, controls, challenges and supervises feedback from the alert investigators – the bank’s back- and middle-office employees who review alerts and decide when to call the customer – to ensure that it is of sufficient quality before re-injecting it into the machine learning models. As this is unique to the NetGuardians approach, it’s worth going into a little more detail.
&lt;/p&gt;


&lt;h2&gt;Fine-tuning and machine learning&lt;/h2&gt;

&lt;p&gt;
All alerts raised by the NetGuardians software come up on a dashboard and have to be reviewed manually. If the alert turns out not to be a fraud, we ask the bank to classify the risk of transaction.
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;b&gt;High&lt;/b&gt; = not a fraud but confirmed as high-risk, so continue to block similar transactions&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Medium&lt;/b&gt; = not a fraud but can see why NetGuardians software thought it would be. Proceed with care&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Low&lt;/b&gt; = not a fraud and unclear why the software thought it was. Never block similar again&lt;/li&gt;
&lt;/ul&gt;


&lt;p&gt;
This feedback retrains unsupervised and supervised learning and is key to the precision of our solution. Further tuning comes from the ability of our software to query feedback to ensure it is high quality.
&lt;/p&gt;

&lt;p&gt;
For example, someone has been working in fraud investigation for many years. They have “learnt” that usually just two parameters reveal suspicious behavior – let’s say the amount and the beneficiary – and use only those two to decide the level of risk. When applied over and over again, a model would learn to look at just those two features, undermining its ability to see and learn from the whole picture – a form of “overfitting”. This reduces its accuracy. But our software does something very clever. If it believes something is anomalous, it will ask the investigator a direct question about another parameter, forcing them to re-examine the transaction. It then uses this additional feedback to learn more about the customer, the bank and the transactions.
&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/56510626-5ea6-4a69-bc0b-a0e8c35dfe06&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 850px;&quot; alt=&quot;3D AI Cycle&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/56510626-5ea6-4a69-bc0b-a0e8c35dfe06&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
Taken together, these three pillars of AI are responsible for our market-beating performance. Only NetGuardians uses these three together. And only NetGuardians is able to find all the fraud a bank knows about in historic data as well as up to nearly one-fifth more. Our software doesn’t need to be taught new fraud types because it isn’t looking for them. And it doesn’t add customer friction – in fact it reduces false alerts by as much as 83 percent. This is because it is always learning and refining its models across the broadest possible perspective, resulting in our analytics supremacy.
&lt;/p&gt;

&lt;p&gt;
&lt;i&gt;(Article initially published on &lt;a href=&quot;https://blog.netguardians.ch/netguardians-3d-ai-delivers-global-analytics-supremacy-in-fraud-detection&quot;&gt;NetGuardians&apos; blog&lt;/a&gt;)&lt;/i&gt;
&lt;/p&gt;
</content>
    </entry>
    <entry>
        <id>https://www.niceideas.ch/roller2/badtrash/entry/ai-opportunities-and-challenges-for</id>
        <title type="html">AI - opportunities and challenges for Swiss banks</title>
        <author><name>Jerome Kehrli</name></author>
        <link rel="alternate" type="text/html" href="https://www.niceideas.ch/roller2/badtrash/entry/ai-opportunities-and-challenges-for"/>
        <published>2019-12-06T11:00:58-05:00</published>
        <updated>2019-12-06T11:30:29-05:00</updated> 
        <category term="Banking" label="Banking" />
        <category term="ai" scheme="http://roller.apache.org/ns/tags/" />
        <category term="artificial-intelligence" scheme="http://roller.apache.org/ns/tags/" />
        <category term="bank" scheme="http://roller.apache.org/ns/tags/" />
        <category term="banking" scheme="http://roller.apache.org/ns/tags/" />
        <summary type="html">&lt;p&gt;
Yesterday we were amazed by the first smartphones. Today they have almost become an extension of ourselves.&lt;br&gt;
People are now used to be connected all the time, with highly efficient devices on highly responsive services, everywhere and for every possible need.
&lt;/p&gt;
&lt;p&gt;
This is a new industrial revolution - the digitization . and it forces corporations to transform their business models to meet customers on these new channels.
&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/cbe06ed8-664a-49e5-a91e-f829ab3e011d&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 650px; &quot; alt=&quot;AI and banking&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/cbe06ed8-664a-49e5-a91e-f829ab3e011d&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;


&lt;p&gt;
Banks worldwide are on the first line in this regards and for many years now they have well understood the urgency in proclaiming digitization as a key objective.&lt;br&gt;
From a user perspective, the digitization confers enormous benefits in the form of ease, speed and multiple means of access and a paradigm shift in engagement. Since banking as a whole benefits from going digital, it is only a matter of time before operations turn completely digital.
&lt;/p&gt;
&lt;p&gt;
The journey to digital transformation requires both strategy investments as well as tactical adjustments in orienting operations for the digital road ahead.&lt;br&gt;
Fortunately, if technology can be perceived as a challenge, it is also a formidable opportunity.&lt;br&gt;
And in this regards, Artificial Intelligence is a category on its own.
&lt;/p&gt;</summary>
        <content type="html">&lt;p&gt;
Yesterday we were amazed by the first smartphones. Today they have almost become an extension of ourselves.&lt;br&gt;
People are now used to be connected all the time, with highly efficient devices on highly responsive services, everywhere and for every possible need.
&lt;/p&gt;
&lt;p&gt;
This is a new industrial revolution - the digitization . and it forces corporations to transform their business models to meet customers on these new channels.
&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/cbe06ed8-664a-49e5-a91e-f829ab3e011d&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 650px; &quot; alt=&quot;AI and banking&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/cbe06ed8-664a-49e5-a91e-f829ab3e011d&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;


&lt;p&gt;
Banks worldwide are on the first line in this regards and for many years now they have well understood the urgency in proclaiming digitization as a key objective.&lt;br&gt;
From a user perspective, the digitization confers enormous benefits in the form of ease, speed and multiple means of access and a paradigm shift in engagement. Since banking as a whole benefits from going digital, it is only a matter of time before operations turn completely digital.
&lt;/p&gt;
&lt;p&gt;
The journey to digital transformation requires both strategy investments as well as tactical adjustments in orienting operations for the digital road ahead.&lt;br&gt;
Fortunately, if technology can be perceived as a challenge, it is also a formidable opportunity.&lt;br&gt;
And in this regards, Artificial Intelligence is a category on its own.
&lt;/p&gt;

&lt;h3&gt;Artificial Intelligence and it&apos;s potential in the banking business.&lt;/h3&gt;

&lt;p&gt;
AI provides a unprecedented opportunity to make banks smarter. Deploying AI solutions in banking leads to better customer intelligence and better customer experience. &lt;br&gt;
Both are key to increase benefits and reduce operational costs.
&lt;/p&gt;
&lt;p&gt;
There are multiple applications for AI solutions in the banking business around three major axis:
&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; Customer Experience revolution when putting technology in direct contact with the customer&lt;/li&gt;
&lt;li&gt; AI analytics improving operational efficiency in various domains (e.g. investment research, credit scoring, etc.) or providing personalized advisory to customers&lt;/li&gt;
&lt;li&gt; Risk mitigation with better fraud detection, more efficient AML, more efficient compliance controls, etc.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;
One of the most impressive opportunity on the customer experience revolution axis is formed by chat-bots and voice assisted banking. The need for physical presence is definitely fading and technology empowers customers to use banking services using voice commands and touch screens.
&lt;/p&gt;
&lt;p&gt;
In regards to improving operational efficiency within the bank, the most promising evolution comes form the conjunction of Real-time Big Data processing with Machine Learning. The technology can provide personalized, value-added products to customers as it learns about spending habits or investment profiles, but it can also automate most analytics duties within the bank.&lt;br&gt;
Data-driven AI applications are intended in the future to cover the whole range of financial decisions: advisory, calculations, scoring and forecasts, for the bank as well as for the customers. For instance if approving a commercial real estate loan was traditionally a several days process within a bank, using AI will reduce it to a few dozen of minutes.
&lt;/p&gt;
&lt;p&gt;
Last but not least, embracing AI has been at the root of significant improvements in Fraud detection and AML. Companies like MasterCard and Visa have been using AI to detect fraudulent transaction patterns for several years now. At NetGuardians we deploy AI solutions for digital banking fraud prevention and internal fraud detection for several years as well.
&lt;/p&gt;
&lt;p&gt;
AI solutions are key to react proactively and inform the customer before the funds leave the bank. AI enables to implement Transaction analytics but also behaviour analysis aimed at catching more complex fraud patterns.
&lt;/p&gt;

&lt;h3&gt;What about Swiss banks ?&lt;/h3&gt;

&lt;p&gt;
Interestingly, while most would describe Switzerland as less innovative than other countries such as UK for instance, especially in the retail banking space, the reality is a quite differentiated picture.
&lt;/p&gt;
&lt;p&gt;
The digital solutions of the major Swiss banks are among the best in the world and Machine Learning algorithms are used down the line on the three axis described above. Due to their conservative nature, the major Swiss banks have a tendency to rather follow the market best practices and state of the art in terms of customer experience evolution but on the backend side - the technology running under the hood - they are rather very well in advance.
&lt;/p&gt;
&lt;p&gt;
The situation of smaller Swiss retail banking institutions is somewhat similar. Their strong footprint in their regions, their attractive conditions as well as their good digital banking solutions in general relieves the pressure. The biggest difference with major banks is that smaller institutions don&apos;t necessarily have the ability to research AI or Machine Learning technology on their own so they rely on third party providers such as NetGuardians for fraud prevention or other fintechs for other use cases.&lt;br&gt;
In this sense, keeping a close proximity with engineering schools and universities is a tremendous opportunity to stay on the top of the game and get in touch with the numerous fintechs flourishing in Switzerland. One could only advise them to be less timorous when it comes to supporting these startups since investing in them is eventually their only way to support the development of the technology that will be available to them in the future.
&lt;/p&gt;
&lt;p&gt;
Private banking institutions on the other hand are more vulnerable today, at least for the smaller ones. Their margin is reducing and their wealth management business is increasingly cannibalized by other actors such as External Asset Managers, Fintechs or bigger institutions - even retail institutions where AI has been instrumental into making them reach a level of proximity in advisory that was so far the exclusive privilege of private banks.&lt;br&gt;
Private banking institutions need to understand the urgency in revolutionizing the private banking customer experience and recover the lead in this regards from the other actors. Here as well the opportunities for Artificial Intelligence applications are striking: operational efficiency, advisory, etc.</content>
    </entry>
    <entry>
        <id>https://www.niceideas.ch/roller2/badtrash/entry/dissecting-swift-message-types-involved</id>
        <title type="html">Dissecting SWIFT Message Types involved in payments</title>
        <author><name>Jerome Kehrli</name></author>
        <link rel="alternate" type="text/html" href="https://www.niceideas.ch/roller2/badtrash/entry/dissecting-swift-message-types-involved"/>
        <published>2019-04-05T05:40:51-04:00</published>
        <updated>2019-04-06T15:24:06-04:00</updated> 
        <category term="Banking" label="Banking" />
        <category term="bank" scheme="http://roller.apache.org/ns/tags/" />
        <category term="banking" scheme="http://roller.apache.org/ns/tags/" />
        <category term="payments" scheme="http://roller.apache.org/ns/tags/" />
        <category term="swift" scheme="http://roller.apache.org/ns/tags/" />
        <category term="swift-parsing" scheme="http://roller.apache.org/ns/tags/" />
        <summary type="html">&lt;p&gt;
In my current company, we implement a state-of-the art banking Fraud Detection system using an Artificial Intelligence running on a Big Data Analytics platform. When working on preventing banking fraud, looking at SWIFT messages is extremely interesting. 98% of all cross-border (international) funds transfers are indeed transferred using the SWIFT Network.
&lt;br&gt;
The SWIFT network enables financial institutions worldwide to send and receive information about financial transactions in a secure, standardized and reliable environment. Many different kind of information can be transferred between banking institution using the SWIFT network.
&lt;/p&gt;

&lt;p&gt;
In this article, I intend to dissect the key SWIFT Messages Types involved in funds transfers, present examples of such messages along with use cases and detail the most essential attributes of these payments.
&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/b5614a1d-2b9e-4be6-b582-470d92744b3b&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 850px; &quot; alt=&quot;SWIFT messaging scheme&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/b5614a1d-2b9e-4be6-b582-470d92744b3b&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
These key messages are as follows:
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;MT 101 - Request for Transfer&lt;/li&gt;
&lt;li&gt;MT 103 - Single Customer Credit Transfer&lt;/li&gt;
&lt;li&gt;MT 202 - General Financial Institution Transfer&lt;/li&gt;
&lt;li&gt;MT 202 COV - General Financial Institution Transfer for Cover payments&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;
This article presents each and every of these messages, discuss their typical use cases and details key SWIFT fields involved.
&lt;/p&gt;</summary>
        <content type="html">
&lt;!-- Dissecting SWIFT Message Types involved in payments --&gt;

&lt;p&gt;
In my current company, we implement a state-of-the art banking Fraud Detection system using an Artificial Intelligence running on a Big Data Analytics platform. When working on preventing banking fraud, looking at SWIFT messages is extremely interesting. 98% of all cross-border (international) funds transfers are indeed transferred using the SWIFT Network.
&lt;br&gt;
The SWIFT network enables financial institutions worldwide to send and receive information about financial transactions in a secure, standardized and reliable environment. Many different kind of information can be transferred between banking institution using the SWIFT network.
&lt;/p&gt;

&lt;p&gt;
In this article, I intend to dissect the key SWIFT Messages Types involved in funds transfers, present examples of such messages along with use cases and detail the most essential attributes of these payments.
&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/b5614a1d-2b9e-4be6-b582-470d92744b3b&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 850px; &quot; alt=&quot;SWIFT messaging scheme&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/b5614a1d-2b9e-4be6-b582-470d92744b3b&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
These key messages are as follows:
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;MT 101 - Request for Transfer&lt;/li&gt;
&lt;li&gt;MT 103 - Single Customer Credit Transfer&lt;/li&gt;
&lt;li&gt;MT 202 - General Financial Institution Transfer&lt;/li&gt;
&lt;li&gt;MT 202 COV - General Financial Institution Transfer for Cover payments&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;
This article presents each and every of these messages, discuss their typical use cases and details key SWIFT fields involved.
&lt;/p&gt;

&lt;p&gt;
&lt;b&gt;Summary&lt;/b&gt;
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;#sec1&quot;&gt;1. Introduction to SWIFT&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;#sec11&quot;&gt;1.1 Key SWIFT aspects&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;#sec12&quot;&gt;1.2 Correspondent banking&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;#sec121&quot;&gt;1.2.1 Correspondent Bank&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;#sec122&quot;&gt;1.2.2 Transferring Money Using a Correspondent Bank&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;#sec123&quot;&gt;1.2.3 VOSTRO and NOSTRO accounts&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;#sec13&quot;&gt;1.3 Key SWIFT Message Types&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;#sec131&quot;&gt;1.3.1 Detailed presentation of key SWIFT messages&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;#sec132&quot;&gt;1.3.2 Typical situation and use cases in banking institutions&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;#sec14&quot;&gt;1.4 Serial and cover payments&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;#sec141&quot;&gt;1.4.1 Cover method details&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;#sec142&quot;&gt;1.4.2 Serial method details&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;#sec15&quot;&gt;1.5 SWIFT Message Structure&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;#sec16&quot;&gt;1.6 SWIFT BIC Code&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;#sec161&quot;&gt;1.6.1 Structure of the SWIFT BIC Code&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;#sec17&quot;&gt;1.7 Other specific details&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;#sec2&quot;&gt;2. Dissecting key SWIFT Mesages involved in payments (Funds Transfers)&lt;/a&gt;
&lt;ul&gt;

&lt;li&gt;&lt;a href=&quot;#sec21&quot;&gt;2.1 SWIFT MT101 Detailed Analysis&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;#sec211&quot;&gt;2.1.1 MT101 Introductory examples&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;#sec2111&quot;&gt;2.1.1.1 MT101 Example 1: Simplest case&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;#sec2112&quot;&gt;2.1.1.2 MT101 Example 2: beneficiary with another institution&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;#sec2113&quot;&gt;2.1.1.3 MT101 Example 3: Multiple payments in MT101&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;#sec2114&quot;&gt;2.1.1.4 MT101 Example 4: Payment from a subsidiary account&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;#sec2115&quot;&gt;2.1.1.5 MT101 Example 5: Fund repatriation&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;#sec212&quot;&gt;2.1.2 MT101 Parsing and Data Mapping &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;#sec213&quot;&gt;2.1.3 Additional notes on MT101&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;#sec22&quot;&gt;2.2 SWIFT MT103 Detailed Analysis&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;#sec221&quot;&gt;2.2.1 MT103 Introductory examples&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;#sec2211&quot;&gt;2.2.1.1 MT103 Example 1: Simplest case&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;#sec2212&quot;&gt;2.2.1.2 MT103 Example 2: more realistic example&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;#sec2213&quot;&gt;2.2.1.3 MT103 Example3: forwarded serial message&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;#sec2214&quot;&gt;2.2.1.4 MT103 Example 4: Announce message (cover method)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;#sec222&quot;&gt;2.2.2 MT103 Parsing and Data Mapping &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;#sec223&quot;&gt;2.2.3 Additional notes on MT103&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;#sec23&quot;&gt;2.3 SWIFT MT202 Detailed Analysis&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;#sec231&quot;&gt;2.3.1 SWIFT MT202 Introductory Exampkes&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;#sec2311&quot;&gt;2.3.1.1 MT202 Example 1: simplest case&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;#sec2312&quot;&gt;2.3.1.2 MT202 Example 2: other bank case&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;#sec2313&quot;&gt;2.3.1.3 MT202 Example 3: routed message&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;#sec232&quot;&gt;2.3.2 MT202 Parsing and Data Mapping &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;#sec233&quot;&gt;2.3.3 Additional notes on MT202&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;#sec24&quot;&gt;2.4 SWIFT MT202 COV Detailed Analysis&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;#sec241&quot;&gt;2.4.1 MT202 COV Introductory examples&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;#sec2411&quot;&gt;2.4.1.1 MT202 COV Example: Cover payment&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;#sec242&quot;&gt;2.4.2 MT202 COV Parsing and Data Mapping &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;#sec243&quot;&gt;2.4.3 Additional notes on MT202 COV&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;

&lt;/ul&gt;
&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;#sec3&quot;&gt;3. Conclusion&lt;/a&gt;&lt;/li&gt;

&lt;/ul&gt;



&lt;a name=&quot;sec1&quot;&gt;&lt;/a&gt;
&lt;h2&gt;1. Introduction to SWIFT&lt;/h2&gt;

&lt;p&gt;
SWIFT - Society for Worldwide Inter-bank Financial Telecommunication - is a Belgian company, located in Belgium, and is a trusted and closed network used for communication between banks around the world. It is overseen by a committee composed of the US Federal Reserve, the Bank of England, the European Central Bank, the Bank of Japan and other major banks. 
&lt;br&gt;
SWIFT is used by around 11 thousands institutions in more than 200 countries and supports around 25 million communications a day, most of them being money transfer transactions, the rest are various other types of messages.
&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/a887fd53-655c-48a9-9397-6899371af97d&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 150px; &quot; alt=&quot;SWIFT logo&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/a887fd53-655c-48a9-9397-6899371af97d&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
The majority of international inter-bank messages use the SWIFT network. 
&lt;br&gt;
SWIFT does not facilitate funds transfer: rather, it sends payment orders, which must be settled by correspondent accounts that the institutions have with each other. For two financial institutions to exchange banking transactions, they must have a banking relationship beforehand.
&lt;/p&gt;



&lt;a name=&quot;sec11&quot;&gt;&lt;/a&gt;
&lt;h3&gt;1.1 Key SWIFT aspects&lt;/h3&gt;

&lt;p&gt;
Internationally standardized messaging means that every transaction between every financial institution is recorded in exactly the same way, providing all the details in a clear and transparent manner.
&lt;br&gt;
Every financial institution has its own unique code that provides information on the name and location of the bank. Each transaction contains a unique reference number, bank operation code and details of charges incurred during the transaction.
&lt;/p&gt;

&lt;p&gt;
Because SWIFT uses internationally standardized messages, it is a transparent way for institutions to communicate between each other and securely relay the details of any transaction. There are a number of known benefits to using SWIFT:
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
Transparency. SWIFT payments clearly detail the amounts involved in the transaction, the route it takes between banks, the details of all charges and the nature of the payment (along with many other details). This information allows all parties involved to track the transaction and to understand the costs and time period involved.
&lt;/li&gt;
&lt;li&gt;
Traceability. Because SWIFT details the route of the transaction between banks and the amount of money involved, it provides clear and recognized proof of payment.
&lt;/li&gt;
&lt;li&gt;
Consistency. Due to the consistency of how messages are structured, payment information is easy to decipher regardless of country or language barriers.
&lt;/li&gt;
&lt;/ul&gt;



&lt;a name=&quot;sec12&quot;&gt;&lt;/a&gt;
&lt;h3&gt;1.2 Correspondent banking&lt;/h3&gt;

&lt;p&gt;
Correspondent banking is an important aspect of international banking and a key concept underneath the SWIFT network.
&lt;/p&gt;


&lt;a name=&quot;sec121&quot;&gt;&lt;/a&gt;
&lt;h4&gt;1.2.1 Correspondent Bank&lt;/h4&gt;

&lt;p&gt;
A correspondent bank is a financial institution that provides services on behalf of another financial institution. It can facilitate wire transfers, conduct business transactions, accept deposits and gather documents on behalf of another financial institution. Correspondent banks are most likely to be used by domestic banks to service transactions that either originate or are completed in foreign countries, acting as a domestic bank&apos;s agent abroad.
&lt;/p&gt;

&lt;p&gt;
Generally speaking, the reasons domestic banks employ correspondent banks include:
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;limited access to foreign financial markets and the inability to service client accounts without opening branches abroad,&lt;/li&gt;
&lt;li&gt;act as intermediaries between banks in different countries or as an agent to process local transactions for customers abroad,&lt;/li&gt;
&lt;li&gt;accept deposits, process documentation and serve as transfer agents for funds.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;
The ability to execute these services relieves domestic banks of the need to establish a physical presence in foreign countries.
&lt;/p&gt;


&lt;a name=&quot;sec122&quot;&gt;&lt;/a&gt;
&lt;h4&gt;1.2.2 Transferring Money Using a Correspondent Bank&lt;/h4&gt;

&lt;p&gt;
International wire transfers often occur between banks that do not have an established financial relationship. When agreements are not in place between the bank sending a wire and the one receiving it, a correspondent bank must act as an intermediary. For example, a bank in Geneva that has received instructions to wire funds to a bank in Japan cannot wire funds directly without a working relationship with the receiving bank.
&lt;br&gt;
Most if not all international wire transfers are executed through SWIFT. Knowing there is not a working relationship with the destination bank, the originating bank can search the SWIFT network for a correspondent bank that has arrangements with both banks.
&lt;/li&gt;

&lt;p&gt;
Interestingly, when a bank wants to send some funds to another bank on the other side of the world, it happens often that the sending bank has no banking relationships with any bank having itself a relationship with the target bank. In this case, the order needs to be transferred through several, sometimes many, distinct banking institutions through the SWIFT network. 
&lt;br&gt;
These intermediate banks are called routing banks.
&lt;/p&gt;


&lt;a name=&quot;sec123&quot;&gt;&lt;/a&gt;
&lt;h4&gt;1.2.3 VOSTRO and NOSTRO accounts&lt;/h4&gt;

&lt;p&gt;
General usage of NOSTRO/VOSTRO (they refer to the same account but different bank perspective):
&lt;br&gt;
A NOSTRO account is a reference used by Bank A to refer to &quot;our&quot; account held by Bank B. NOSTRO, is a shorthand way of talking about &quot;our money that is on deposit at your bank.&quot;
&lt;br&gt;
VOSTRO is the term used by Bank B, where bank A&apos;s money is on deposit. VOSTRO is a reference to &quot;yours&quot; and refers to &quot;your money that is on deposit at our bank.&quot;
&lt;/p&gt;


&lt;a name=&quot;sec13&quot;&gt;&lt;/a&gt;
&lt;h3&gt;1.3 Key SWIFT Message Types&lt;/h3&gt;

&lt;p&gt;
When it comes to fund transfers, only a subset of the SWIFT messages are relevant:
&lt;/p&gt;

&lt;table class=&quot;allborder&quot;&gt;
&lt;tr style=&quot;background: #CCCCCC; font-weight: bold;&quot;&gt;
&lt;td&gt;Message Identification and Name&lt;/td&gt;
&lt;td&gt;Space&lt;/td&gt;
&lt;td&gt;Reference document&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;MT 101 Request for Transfer&lt;/td&gt;
&lt;td&gt;Customer-to-Bank and Interbank&lt;/td&gt;
&lt;td rowspan=&quot;5&quot;&gt;
&lt;a href=&quot;https://www2.swift.com/uhbonline/books/public/en_uk/us2m_20180720/index.htm&quot;&gt;Standards MT November 2018&lt;/a&gt;
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
MT 103 Single Customer Credit Transfer
&lt;/td&gt;
&lt;td&gt;
Interbank
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
MT 202 General Financial Institution Transfer
&lt;/td&gt;
&lt;td&gt;
Interbank
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
MT 202 COV General Financial Institution Transfer
&lt;/td&gt;
&lt;td&gt;
Interbank
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
MT 9XX - Confirmations and statements
&lt;/td&gt;
&lt;td&gt;
Customer-to-Bank and Interbank
&lt;/td&gt;
&lt;/tr&gt;

&lt;/table&gt;


&lt;a name=&quot;sec131&quot;&gt;&lt;/a&gt;
&lt;h4&gt;1.3.1 Detailed presentation of key SWIFT messages&lt;/h4&gt;

&lt;p&gt;
These SWIFT messages are described as follows:
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
The &lt;b&gt;SWIFT MT101&lt;/b&gt; message is a request for transfer, enabling the electronic transfer of funds from one account to another. Funds are transferred from ordering customers account to a receiving financial institution or account servicing financial institution. For us right now, the important thing to note is that the message format that enables this transfer is the SWIFT MT101 format.
&lt;/li&gt;
&lt;li&gt;
The &lt;b&gt;MT103&lt;/b&gt; is a SWIFT message format used for making payments. MT103 SWIFT payments are known as international wire transfers, telegraphic transfers, standard EU payments (SEPA payments), LVTS in Canada, etc.
&lt;/li&gt;
&lt;li&gt;
Swift &lt;b&gt;MT202&lt;/b&gt; Requests the movement of funds between financial institutions, except if the transfer is related to an underlying customer credit transfer that was sent with the cover method, in which case the MT 202 COV must be used.
&lt;/li&gt;
&lt;li&gt;
&lt;b&gt;MT202 COV&lt;/b&gt; is a SWIFT message format for financial institution (FI) funds transfer between financial institutions. MT202&apos;s are used primarily for two purposes, bank-to-bank payments (i.e. interest payments and settlement of FX trades) and Cover Payments.
&lt;br&gt;
MT202 COV was implemented in 2009 to create traceability of the origination of funds (institution and account) through to the destination of funds (institution and account.) This was in response to anti-money laundering and associated banking requirements.
&lt;br&gt;
Prior to MT202 COV, The message format, MT202, did not include origination/destination financial institution information. Particularly for Cover Payments, where a combination of MT103 and MT202 are used to direct funds transfers to a beneficiary account, the intermediate banks in the MT202 had no ability to understand and perform risk analysis/AML/compliance checks on the funds transfer based on the original and destination of the funds. Thus, intermediate banks could be unwittingly involved in illegal transactions under new regulations.
&lt;/li&gt;
&lt;/ul&gt;


&lt;a name=&quot;sec132&quot;&gt;&lt;/a&gt;
&lt;h4&gt;1.3.2 Typical situation and use cases in banking institutions&lt;/h4&gt;

&lt;p&gt;
In regards to this set of messages, the various situations that a banking institution is confronted to can be represented as follows:
&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/b5614a1d-2b9e-4be6-b582-470d92744b3b&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 850px; &quot; alt=&quot;SWIFT messaging scheme&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/b5614a1d-2b9e-4be6-b582-470d92744b3b&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
With the following details:
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
A customer can request a fund transfer on his behalf using either a bank native channel (email, EBanking, branch, etc.) or by sending an MT101 to the bank. Big corporate customers can indeed be connected themselves to the bank network and send requests to the bank using the MT101 Message Type which is intended for this purpose.
&lt;/li&gt;
&lt;li&gt;
Most of the time, the reception of an MT101 by the bank will make it issue an MT103 to proceed further with the Fund Transfers. But if the account to be debited is not by the bank, it can as well transfer the MT101 further to the other institution owning the account to be debited.
&lt;/li&gt;
&lt;li&gt;
MT103 are sent following a customer request to transfer the funds further (serial method) or announce to the receiving institution that the funds will be coming following an MT202.COV (cover method).
&lt;/li&gt;
&lt;li&gt;
An MT202 is sent on behalf of bank itself and not following a customer request, in contrary to MT103.
&lt;/li&gt;
&lt;li&gt;
If the bank is a routing bank in the middle of a routing chain, MT103 and MT202 are sent further. Actually new messages are sent, the sent MT103 or MT202 can be different than the received one.
&lt;/li&gt;
&lt;/ul&gt;


&lt;a name=&quot;sec14&quot;&gt;&lt;/a&gt;
&lt;h3&gt;1.4 Serial and cover payments&lt;/h3&gt;

&lt;p&gt;
SWIFT Serial and Cover payments originate from the two methods that are used to settle transactions in the SWIFT network and specifically in the field of correspondent banking: Serial method and Cover method.
&lt;br&gt;
When sender and receiver are located in different currency zones, they send or receive funds through their correspondents. And in this case, either of both methods can be used.
&lt;/p&gt;

&lt;p&gt;
With the cover method, two different messages are initiated by the sender to settle the funds, an MT103 and an MT202.COV. The MT101 message is used to inform the creditor bank that funds are coming, it is an announcement.  The MT202.COV, called cover message, moves the funds between correspondent accounts.
&lt;br&gt;
With the serial method, one single message is initiated by the sender to settle the funds, an MT103. That MT103 is in this case not an announce, but the fund transfer itself that moves for one party to the next in the payment chain until it reaches the beneficiary bank.
&lt;/p&gt;

&lt;a name=&quot;sec141&quot;&gt;&lt;/a&gt;
&lt;h4&gt;1.4.1 Cover method details&lt;/h4&gt;


&lt;p&gt;
The MT103 announcement is sent to the beneficiary bank to announce that funds are coming for a specific beneficiary. It does not carry the funds but rather just informs the bank of the beneficiary that funds are coming for which beneficiary customer and which correspondent (of the beneficiary bank) will receive the funds. 
&lt;/p&gt;

&lt;p&gt;
The cover payment (MT202 COV) is sent by the sender to its correspondent. This is the message that really moves the funds. The MT202 COV enables the sender to ask its correspondent to debit its account (of the sender, with the correspondent) and credit the beneficiary bank&apos;s account with its correspondent. 
&lt;/p&gt;

&lt;p&gt;
Most of the time, the announcement is created and sent before the cover but that is not a requirement so receiving the cover payment before the announce is a situation that needs to be taken into account by the receiver.
&lt;/p&gt;

&lt;a name=&quot;sec142&quot;&gt;&lt;/a&gt;
&lt;h4&gt;1.4.2 Serial method details&lt;/h4&gt;

&lt;p&gt;
Using an MT103, the funds moves from one party to another until it reaches the final beneficiary. Following a customer request, the sender sends an MT103 serial to its correspondent which transfers the funds to the intermediary institution. The intermediary institution is the correspondent of the beneficiary most of the time. The intermediary institution on its turn credits the account of the creditor bank and eventually the beneficiary account.
&lt;/p&gt;

&lt;p&gt;
In the SWIFT MT103 Serial Message, the fields 56a and 57a are used while the fields 53a and 54a are used in the MT103 Announcement Message (cover method).
&lt;br&gt;
Intermediary institution and receiver&apos;s correspondent are usually two names to designate the same thing. The account with institution is the bank that holds the beneficiary account, so just another name for Creditor bank. 
&lt;/p&gt;


&lt;a name=&quot;sec15&quot;&gt;&lt;/a&gt;
&lt;h3&gt;1.5 SWIFT Message Structure&lt;/h3&gt;

&lt;p&gt;
This section presents how an ISO 15022 message looks like and decomposes it to its particular parts. The description of the structure is intended as a guidance to build a SWIFT message parser.
&lt;/p&gt;

&lt;p&gt;
A message consists of blocks enclosed in curly braces. The first colon separates the block name and content. The block content can consist of sub-blocks.
&lt;/p&gt;

&lt;table class=&quot;allborder&quot;&gt;

&lt;tr style=&quot;background: #CCCCCC; font-weight: bold;&quot;&gt;
&lt;td&gt;
Block Ident.
&lt;/td&gt;
&lt;td&gt;
Block Name
&lt;/td&gt;
&lt;td&gt;
Mandatory or Optional
&lt;/td&gt;
&lt;td&gt;
Description
&lt;/td&gt;
&lt;td&gt;
Comments
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
1
&lt;/td&gt;
&lt;td&gt;
Basic Header
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
M
&lt;/td&gt;
&lt;td&gt;
The only mandatory block is the basic header. The basic header contains the general information that identifies the message, and some additional control information. The FIN interface automatically builds the basic header.
&lt;/td&gt;
&lt;td&gt;
Common to all SWIFT messages. It contains five fields that are all mandatory.
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
2
&lt;/td&gt;
&lt;td&gt;
Application Header
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
O
&lt;/td&gt;
&lt;td&gt;
The application header contains information that is specific to the application. The application header is required for messages that users, or the system and users, exchange. Exceptions are session establishment and session closure.
&lt;/td&gt;
&lt;td&gt;
Common to all SWIFT messages. There are two variations: One block for input messages which may contain up to six fields and one for output messages which may have up to seven fields.
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
3
&lt;/td&gt;
&lt;td&gt;
User Header
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
O
&lt;/td&gt;
&lt;td&gt;
The user header is an optional header.
&lt;/td&gt;
&lt;td&gt;
Common to all SWIFT messages. All fields of the user header (except the tag 103 for FINCopy Service) are optional. Fields are populated in specific situations.
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
4
&lt;/td&gt;
&lt;td&gt;
Text
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
O
&lt;/td&gt;
&lt;td&gt;
The text is the actual data to transfer.
&lt;/td&gt;
&lt;td&gt;
This is the block found in the Message Reference Guide.
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
5
&lt;/td&gt;
&lt;td&gt;
Trailers
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
O
&lt;/td&gt;
&lt;td&gt;
The trailer either indicates special circumstances that relate to message handling or contains security information.
&lt;/td&gt;
&lt;td&gt;
Common to all SWIFT messages. Like the block 3, this block consists of only non-mandatory fields except the checksum.
&lt;/td&gt;
&lt;/tr&gt;

&lt;/table&gt;

&lt;p&gt;
The various header blocks contain different kinds of information but not all of them are interesting for our use cases in my current company. The next chapters will present which field we extract and for what usage.
&lt;/p&gt;


&lt;a name=&quot;sec16&quot;&gt;&lt;/a&gt;
&lt;h3&gt;1.6 SWIFT BIC Code&lt;/h3&gt;

&lt;p&gt;
The SWIFT BIC code is much more than an entity identifier. It is used to route the financial messages from the issuing institution to the receiving institutions. The SWIFT BIC Code therefore plays a crucial role in payment messaging. Without it, a message cannot be transported to the receiving entity over SWIFT Net. 
&lt;/p&gt;

&lt;p&gt;
The BIC code contains the identity and the location of the participants that are used to find out and reach the message destination.
&lt;/p&gt;

&lt;p&gt;
The SWIFT BIC code is composed of exactly 8 or 11 alphanumeric characters structured as followed:
&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/e06c3953-d548-4614-9f78-01f4d54048ba&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 350px; &quot; alt=&quot;BIC Code Structure&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/e06c3953-d548-4614-9f78-01f4d54048ba&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;a name=&quot;sec161&quot;&gt;&lt;/a&gt;
&lt;h4&gt;1.6.1 Structure of the SWIFT BIC Code&lt;/h4&gt;

&lt;p&gt;
The structure of the BIC code is as follows:
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
alphabetical characters that indicate the identification of the institution (bank or corporate)
&lt;/li&gt;
&lt;li&gt;
2 alphabetical characters for the ISO code of the country in which the institution is located
&lt;/li&gt;
&lt;li&gt;
2 alphabetic or numeric characters used to locate the institution head office in the country or the head office in a particular region in the country.
&lt;ul&gt;
&lt;li&gt;
When the second character takes the value &quot;0&quot;, it is typically a test BIC used in test systems as opposed to a BIC used on the live network (also production).
&lt;/li&gt;
&lt;li&gt;
When the second character takes the value &quot;1&quot;, it denotes a passive participant in the SWIFT network. Passive participants cannot be contacted directly over the SWIFT Network. These BICs are sometimes referred to as ‘BIC1&apos;, ‘non-SWIFT BIC&apos; and ‘non-connected BIC&apos;. A non-connected BIC is not allowed in the header of a SWIFT message, otherwise the message is rejected by the SWIFT system.
&lt;/li&gt;
&lt;li&gt;
When second character takes the value &quot;2&quot;, it indicates a reverse billing BIC, where the recipient pays for the message as opposed to the more usual mode where the sender pays for the message.
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
3 alphabetical or numeric characters to indicate a branch or agency of the institution. Unlike the first 8 characters, these last 3 are not mandatory. They are mainly used by banks and less by corporations. 
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;
Few examples to illustrate the above explanations:
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
DEUTDEFF is the BIC of Deutsche Bank (DEUT) / in Germany (DE) / Main office of Frankfurt (FF)
&lt;/li&gt;
&lt;li&gt;
DEUTDESS is the BIC of Deutsche Bank (DEUT) / in Germany (DE) / Main office of Stuttgart (SS)
&lt;/li&gt;
&lt;li&gt;
DEUTDESS648 is the BIC of Deutsche Bank (DEUT) / in Germany (DE) / Main office of Stuttgart (SS). 648 is the branch located in Vaihingen-Enz in the same region.
&lt;/li&gt;
&lt;li&gt;
DEUTDES0 and DEUTDES0648 are test BIC for DEUTDESS and DEUTDESS648
&lt;/li&gt;
&lt;li&gt;
LAFAFRPP is the BIC of Lafarge (LAFA) / in France (FF) / Main office of Paris (PP)
&lt;/li&gt;
&lt;/ul&gt;


&lt;a name=&quot;sec17&quot;&gt;&lt;/a&gt;
&lt;h3&gt;1.7 Other specific details&lt;/h3&gt;

&lt;p&gt;
Below are some specific noteworthy details about SWIFT messages in a raw fashion:
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;b&gt;Caution: about the little &quot;a&quot; in field names&lt;/b&gt;
&lt;br&gt;
Very often in documents and papers about SWIFT, fields are indicated with a little &quot;a&quot; as suffix, such as 54a, 56a, etc.
&lt;br&gt;
This lower case &quot;a&quot; needs not to be confused with the upper case &quot;A&quot; which indicates the variant of the field.
&lt;br&gt;
For instance, Field 50a exists in 3 variants: 50A, 50F, 50K. The little suffix &quot;a&quot; is just a convention to mention the field 50, it is not the indication of the variant &quot;A&quot;
&lt;/li&gt;
&lt;li&gt;
&lt;b&gt;About SWIFT Input and Output messages&lt;/b&gt;
&lt;br&gt;
In SWIFT, the notion of output and input related to the SWIFT network, not to the bank.
&lt;br&gt;
A SWIFT input message is an outbound message: a message emitted by the bank and send to another bank on the SWIFT network.
&lt;br&gt;
A SWIFT output message is an inbound message: a message received to a bank from the SWIFT network.
&lt;br&gt;
Qualifying messages as Input or Output is relative to the SWIFT network, i.e. inverse to the bank perspective (Input are messages sent by the bank, Output are messages received by the bank)
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/68fa3f37-3bc8-4069-8860-2adbee333ff1&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 650px; &quot; alt=&quot;SWIFT Input / Output Messages&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/68fa3f37-3bc8-4069-8860-2adbee333ff1&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;



&lt;a name=&quot;sec2&quot;&gt;&lt;/a&gt;
&lt;h2&gt;2. Dissecting key SWIFT Mesages involved in payments (Funds Transfers)&lt;/h2&gt;

&lt;p&gt;
This chapter presents key SWIFT messages as well as some examples aimed at understanding the meaning and usage of most important SWIFT fields.
&lt;/p&gt;

&lt;a name=&quot;sec21&quot;&gt;&lt;/a&gt;
&lt;h3&gt;2.1 SWIFT MT101 Detailed Analysis&lt;/h3&gt;

&lt;p&gt;
The SWIFT MT101 Request for Transfer is a payment initiation message used to send domestic and/or international payments instructions to their banks.
&lt;/p&gt;

&lt;p&gt;
The situation of SWIFT MT101 in a banking institution is as follows:
&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/20a4957e-1153-4690-b17f-0519e717b347&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 750px; &quot; alt=&quot;SWIFT MT101 situation&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/20a4957e-1153-4690-b17f-0519e717b347&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
Most of the time when the bank receives an MT101 it will either perform the operation if both debited and credited accounts are with itself, or it will issue an MT103 to proceed with the crediting of the destination account with another banking institution.
&lt;/p&gt;

&lt;p&gt;
But there are situations as well where the account to be debited is not by the bank itself, in which case the MT101 can be routed further.
&lt;/p&gt;


&lt;a name=&quot;sec211&quot;&gt;&lt;/a&gt;
&lt;h4&gt;2.1.1 MT101 Introductory examples&lt;/h4&gt;

&lt;p&gt;
This section presents various examples of SWIFT MT101 corresponding to different situations
&lt;/p&gt;

&lt;a name=&quot;sec2111&quot;&gt;&lt;/a&gt;
&lt;h5&gt;2.1.1.1 MT101 Example 1: Simplest case&lt;/h5&gt;

&lt;p&gt;
A corporate customer - Robert Corporation - of bank XYZ located in Switzerland wants to send 50k CHF to Vinino SARL in Geneva, another customer of bank XYZ. Robert Corporation being a big corporation, it is connected to the SWIFT network and trades on his account by the bank using SWIFT MT 101 messages.
&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/72868344-56dd-4b66-8b41-809192084027&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 620px; &quot; alt=&quot;MT101 Simplest example&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/72868344-56dd-4b66-8b41-809192084027&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
In this situation, there is no SWIFT messages emitted further whatsoever since both customers are customer of bank XYZ.
&lt;/p&gt;

&lt;p&gt;
Details of the MT101:
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
There is one single transaction in this MT101.
&lt;/li&gt;
&lt;li&gt;
Both accounts are with bank XYZ so no &lt;i&gt;Account with Institution&lt;/i&gt; or &lt;i&gt;Account Servicing Institution&lt;/i&gt; need to be indicated.
&lt;/li&gt;
&lt;/ul&gt;


&lt;a name=&quot;sec2112&quot;&gt;&lt;/a&gt;
&lt;h5&gt;2.1.1.2 MT101 Example 2: beneficiary with another institution&lt;/h5&gt;

&lt;p&gt;
A corporate customer - Robert Corporation - of bank XYZ located in Switzerland wants to send 500k EUR to Dupont SARL in Paris. 
&lt;br&gt;
The corporation Dupont SARL is not a customer of bank XYZ, it is a customer of bank BNP Parisbas in Paris.
&lt;br&gt;
Bank XYZ and BNP Paribas have a direct banking relationship.
&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/b5c5cf6a-fbf1-4141-ad82-33cc16b08d64&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 780px; &quot; alt=&quot;MT101 Example 2&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/b5c5cf6a-fbf1-4141-ad82-33cc16b08d64&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
Since Bank XYZ and BNP Paribas have a direct banking relationship, Bank XYZ can send an MT103 to BNP Paribas to make it credit the customer account from its VOSTRO account by BNP Paribas.
&lt;/p&gt;

&lt;p&gt;
Details of the MT101:
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
There is one single transaction in this MT101.
&lt;/li&gt;
&lt;li&gt;
The beneficiary account to be credit is not by bank XYZ, so the eventual banking institution the funds need to be sent to is indicated in &lt;i&gt;Account With Institution&lt;/i&gt; - 57A.
&lt;/li&gt;
&lt;/ul&gt;


&lt;a name=&quot;sec2113&quot;&gt;&lt;/a&gt;
&lt;h5&gt;2.1.1.3 MT101 Example 3: Multiple payments in MT101&lt;/h5&gt;

&lt;p&gt;
In this third example, Corporation Robert Corp of bank XYZ located in Switzerland wants to send a first payment of 100k EUR to Dupont Sarl in Paris and a second payment of 200 K to Jacob SA in France.
&lt;br&gt;
Dupont Sarl is a customer of Bank BNP Paribas in Paris and Jacob SA is a customer of bank Credit Agricole in France as well.
&lt;/p&gt;

&lt;p&gt;
Bank XYZ in Switzerland and BNP Paribas Paris have a direct banking relationship, and BNP Paribas and Credit Agricole have a direct banking relationship as well.
&lt;/p&gt;

&lt;p&gt;
He wants to use different accounts for both transactions and he is submitting both transactions in the very same MT101.
&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/bb13b9d0-9d25-4ba2-822f-4c397de74392&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 850px; &quot; alt=&quot;MT101 Example 3&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/bb13b9d0-9d25-4ba2-822f-4c397de74392&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
The MT101 makes it possible to input as many transaction in a single message, having at least one occurrence of the repetitive sequence is mandatory.
&lt;/p&gt;

&lt;p&gt;
Since Credit Agricole and Bank XYZ have no direct banking relationship, the second transaction, crediting Jacob SA has to go through BNP Paribas as well.
&lt;/p&gt;

&lt;p&gt;
Details of the MT101:
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
This MT101 contains two distinct transactions
&lt;/li&gt;
&lt;li&gt;
In both case &lt;i&gt;Account with Institution&lt;/i&gt; - field 57A - identifies the eventual destination of the funds for both transactions
&lt;/li&gt;
&lt;li&gt;
The &lt;i&gt;ordering customer&lt;/i&gt; - field 50H - is the same from a customer perspective but the accounts used for both fund transfers are different. For this reason the ordering customer is indicated in the repetitive sequence, not in sequence A.
&lt;/li&gt;
&lt;/ul&gt;


&lt;a name=&quot;sec2114&quot;&gt;&lt;/a&gt;
&lt;h5&gt;2.1.1.4 MT101 Example 4: Payment from a subsidiary account&lt;/h5&gt;

&lt;p&gt;
A parent company can also use the SWIFT MT101 to pay from own account on behalf of multiple subsidiaries.
&lt;p /&gt;

&lt;p&gt;
In this example, the parent company Robert Corp located in Switzerland has received an invoice from Jacob SA for various services that Jacob SA provided to the local company Robert Corp France SARL, a subsidiary of Robert Corp located in France.
&lt;/p&gt;

&lt;p&gt;
The parent company Robert Corp decides to use the account of the subsidiary company in France to pay for the invoice (there can be various reasons for that). 
&lt;br&gt;
The subsidiary has granted permission to the parent company for trading with its account with BNP Paris.
&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/bd536ad7-a1a4-4b87-a8c8-e0e6fcd77943&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 850px; &quot; alt=&quot;MT101 Example 4&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/bd536ad7-a1a4-4b87-a8c8-e0e6fcd77943&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
The trick here is in the field 50a Instructing Party. In the SWIFT standard we read the following under the usage rules of that field: &quot;This field must only be used when the instructing customer is not also the account owner.&quot;
&lt;br&gt;
The field 50a Instructing Party specifies the subsidiary company - FR12983459182931 / Robert Corp France Sarl - on behalf of which the parent company, RBCPCHAA02A, sends the payment instruction.
&lt;/p&gt;

&lt;p&gt;
Details of the MT101:
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;i&gt;Account Servicing Institution&lt;/i&gt; - field 52A - is identifying the fact that the MT101 needs to be transferred further to the institution owning the account of the subsidiary where the funds need to be debited from: BNP Paris / BNPSFRZA93B.
&lt;/li&gt;
&lt;li&gt;
The &lt;i&gt;Account with institution&lt;/i&gt; - field 57A - is identifying the eventual recipient of the funds, the institution owning the account to be credited: Bank Credit Agricole / CACIFRXA12C.
&lt;/li&gt;
&lt;li&gt;
&lt;i&gt;Instructing Party&lt;/i&gt; - field 50L - identifies that the parent corporation is actually the one at the origin of this MT101, acting on behalf of the &lt;i&gt;ordering customer&lt;/i&gt; - 50 H - the subsidiary in France.
&lt;/li&gt;
&lt;/ul&gt;



&lt;a name=&quot;sec2115&quot;&gt;&lt;/a&gt;
&lt;h5&gt;2.1.1.5 MT101 Example 5: Fund repatriation&lt;/h5&gt;

&lt;p&gt;
There is another possibility: funds repatriation. 
&lt;br&gt;
Funds repatriation simply means to move the funds available on one account to another account held either by the same financial institution or by another financial institution. Funds repatriation is performed for cash pooling inside a company or a group of companies. Corporations resort to cash pooling to optimize the liquidity usage.
&lt;/p&gt;

&lt;p&gt;
In this example, Robert Corp (a corporate customer) has an account by bank XYZ in Switzerland and an account by bank BNP Paribas Paris which he uses for his operations in EUR.
&lt;br&gt;
Robert Corp. wants to repatriate all the funds he has on his BNP Paris account back to his Bank XYZ Account.
&lt;br&gt;
Bank XYZ account is called centralized account, master account or leader account. The BNP Paris account is called secondary account or slave account.
&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/cad13f64-be4d-4d5f-9484-11afb7c27ace&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 630px; &quot; alt=&quot;MT101 Example 5&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/cad13f64-be4d-4d5f-9484-11afb7c27ace&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
In this case the MT101 is transmitted further to the bank owning the debited account and the funds are repatriated with the MT103.
&lt;/p&gt;

&lt;p&gt;
Details of the MT101:
&lt;/p&gt;
&lt;uL&gt;
&lt;li&gt;
&lt;i&gt;Account Servicing Institution&lt;/i&gt; - field 52A - is identifying the fact that the MT101 needs to be transferred further to the institution owning the account: BNP Paris / BNPSFRZA93B.
&lt;/li&gt;
&lt;li&gt;
The &lt;i&gt;Account with institution&lt;/i&gt; - field 57A - is identifying the eventual recipient of the funds, the institution owning the account to be credited: Bank XYZ / BXYZCHZZ80A.
&lt;/li&gt;
&lt;li&gt;
Using the &lt;i&gt;instruction code&lt;/i&gt; - field 23 - CMZB - Code to Zero Balance, it is not necessary to specify any amount, the code will be balanced down to zero and all the available funds repatriated.
&lt;/li&gt;
&lt;/ul&gt;


&lt;a name=&quot;sec212&quot;&gt;&lt;/a&gt;
&lt;h4&gt;2.1.2 MT101 Parsing and Data Mapping &lt;/h4&gt;

&lt;p&gt;
The MT101 parsing details are presented in the table below. Only most essential fields are discussed.
&lt;/p&gt;


&lt;table class=&quot;allborder&quot;&gt;

&lt;tr style=&quot;background: #CCCCCC; font-weight: bold;&quot;&gt;

&lt;td rowspan=&quot;2&quot;&gt;
Meaning
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
SWIFT
&lt;/td&gt;
&lt;td rowspan=&quot;2&quot;&gt;
Example
&lt;/td&gt;
&lt;td rowspan=&quot;2&quot; colspan=&quot;2&quot;&gt;
Comment
&lt;/td&gt;
&lt;/tr&gt;


&lt;tr style=&quot;background: #CCCCCC; font-weight: bold;&quot;&gt;
&lt;td&gt;Field&lt;/td&gt;
&lt;td&gt;Variant&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
AppID
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Block1/ApplId
&lt;/td&gt;
&lt;td&gt;
F
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
The Application Identifier identifies the application within which the message is being sent or received. The available options are: F = FIN , A = GPA, etc.
&lt;br&gt;
These values are automatically assigned by the SWIFT system and the user&apos;s CBT
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
ServiceID
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Block1/Servid
&lt;/td&gt;
&lt;td&gt;
01
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
The Service Identifier consists of two numeric characters. It identifies the type of data that is being sent or received and, in doing so, the type of the following message
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Sender
(Sending bank / BIC)
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Block1/ 
LTaddrBlk1 (I)
&lt;br&gt;
Or
&lt;br&gt;
Block2/ 
LTaddrBlk2 (O)
&lt;/td&gt;
&lt;td&gt;
SGOBFRPP
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Sender BIC appears in header block (Block 1) in the MT101 Input and in the application block (Block 2) in the MT101 Output
&lt;br&gt;
(Input and output related to the SWIFT network, not the bank). Need to use field Block2 / Inoutind to find out
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Message Type
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Block2/
Msgtype
&lt;/td&gt;
&lt;td&gt;
101
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
SWIFT Message Type = MT 101
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Receiver
(Receiving Bank / BIC)
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Block2/
LTaddrBlk21 (I)
&lt;br&gt;
Or
&lt;br&gt;
Block1/ 
LTaddrBlk1 (O)
&lt;/td&gt;
&lt;td&gt;
RBOSGB2L
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
The Receiver BIC appears in header block (Block1) in the MT101 Output and in the application block (Block 2) in the MT101 Input.
&lt;br&gt;
(Input and output related to the SWIFT network, not the bank). Need to use field Block2 / Inoutind to find out.
&lt;br&gt;
The receiver of the message is the eventual beneficiary only if no field 57 says otherwise.
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Sender&apos;s Reference
&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;center&quot;&gt;
20
&lt;/td&gt;
&lt;td&gt;
ORDERREF1234
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
This field is mandatory and of format 16x. It is a reference assigned by the Sender to unambiguously identify the message. 
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Customer Specified Reference
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
21
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
R
&lt;/td&gt;
&lt;td&gt;
GBSUPPLIERS5668
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
The field is optional and of format 16x. It is a reference to the entire message assigned by either the instructing party, when present or by the ordering customer, when the instructing party is not present.
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Message Index/Total
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
28
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
D
&lt;/td&gt;
&lt;td&gt;
1/1
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
It is mandatory and of format : 5n/5n for (Message Index)/(Total)  If you send 5 messages for the same order, this field will take the value 1/5 in the first message, 2/5 in the second message, and so on. 
&lt;br&gt;
1/1 means there is only one message sent for this order.
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Sender Msg. Sending Timestamp
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
(O) Block2 / ‘
Intime + Inmate
(I) System.time()
&lt;/td&gt;
&lt;td&gt;
1538070522
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
(O) = Output only : SWIFT timestamp for an Output message (HHMMYYMMDD) or local date/time for an Input Message.
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
In / Out-put flag
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Block2 / Inoutind
&lt;/td&gt;
&lt;td&gt;
I
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Single letter ‘I&apos; or ‘O&apos;
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td rowspan=&quot;3&quot;&gt;
Ordering Customer
&lt;/td&gt;
&lt;td rowspan=&quot;3&quot; class=&quot;center&quot;&gt;
50
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
F
&lt;/td&gt;
&lt;td&gt;
/DE20700800000...&lt;br&gt;
1/Essilor International&lt;br&gt;
2/147 Rue de Paris&lt;br&gt;
3/FR/Charenton  94220
&lt;/td&gt;
&lt;td&gt;
Line 1 (subfield Party Identifier)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;/34x (Account)&lt;br&gt;
Lines 2-5 : (Number/Name and Address)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;1!n/33x (Number)(Details)
&lt;/td&gt;
&lt;td rowspan=&quot;3&quot; class=&quot;lx&quot;&gt;
The field ordering customer is mandatory. In can be given either in the message details (here) or per transaction in the repeating sequence
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td class=&quot;center&quot;&gt;
G
&lt;/td&gt;
&lt;td&gt;
/31926819&lt;br&gt;
UBSCH123FNX
&lt;/td&gt;
&lt;td&gt;
Line 1 (subfield Party Identifier)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;/34x (account)&lt;br&gt;
Line 2 (subfield bank)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;BIC (8 or 11 characters)
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td class=&quot;center&quot;&gt;
H
&lt;/td&gt;
&lt;td&gt;
/31926819&lt;br&gt;
Compagnie de Saint Gobain&lt;br&gt;
118 Rue Lauriston&lt;br&gt;
75016 Paris
&lt;/td&gt;
&lt;td&gt;
Line 1 (subfield Party Identifier)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;/34x (Account)&lt;br&gt;
Lines 2-5 : (Number/Name and Address)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;4*35x (Name and Address)
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Authorization
&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;center&quot;&gt;
25
&lt;/td&gt;
&lt;td&gt;
12DF64BG345A
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Optional, 35x (authorization code)
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Requested Execution Date
&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;center&quot;&gt;
30
&lt;/td&gt;
&lt;td&gt;
181017
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
The value date, mandatory and of format 6!n (YYMMDD). It is the date on which all subsequent transactions should be initiated by the executing bank.
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td colspan=&quot;6&quot; style=&quot;background-color: #AACCFF; font-weight: bold;&quot;&gt;
Repeating Sequence 
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Transaction Reference
&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;center&quot;&gt;
21
&lt;/td&gt;
&lt;td&gt;
35863REFOFTRX1
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
This field is mandatory and of format 16x. It is a reference assigned by the Sender to unambiguously identify a unique transaction.
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
F/X Deal Reference
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
21
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
F
&lt;/td&gt;
&lt;td&gt;
FXDEALID78685
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Optional, if there is an underlying foreign exchange deal to this transaction, then this field specifies the FX deal reference
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Instruction Code
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
23
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
E
&lt;/td&gt;
&lt;td&gt;
CMZB (= Code to Zero balance the account. This transaction contains a cash Management instruction, requesting to zero balance the account of the ordering customer)
&lt;br&gt;
INTC =( Code for Intra-Company Payment.)
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
It is optional and of format :4!c[/30x] (Instruction Code)(Additional Info.) 
&lt;br&gt;
Optional instruction codes that identifies the operation types.  
&lt;br&gt;
&lt;b&gt;Caution : there can be several instruction codes (all with same code) in the SWIFT message. &lt;/b&gt;
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Charges Account
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
25
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
A
&lt;/td&gt;
&lt;td&gt;
/FR763000402837...
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
This is the ordering customer&apos;s account number to which applicable transaction charges should be separately applied by the debtor.
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Currency,&lt;br&gt;
Transaction Amount
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
32
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
B
&lt;/td&gt;
&lt;td&gt;
GBP50000
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Mandatory and of Format 3!a15d (Currency)(Amount)
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Currency,
Original Ordered Amount
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
33
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
B
&lt;/td&gt;
&lt;td&gt;
EUR200000
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
This optional field is provided in format 3!a15d. It specifies the original currency and amount as specified by the ordering customer.
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Exchange Rate
&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;center&quot;&gt;
36
&lt;/td&gt;
&lt;td&gt;
1,1382
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Mandatory since field 33B is present and &apos;amount&apos; in field 32B is not equal to zero. Provided in format 12d. The integer part of Rate must contain at least one digit. A decimal comma is mandatory and is included in the maximum length.
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Instructing Party
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
50
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
L
&lt;/td&gt;
&lt;td&gt;
Compagnie de Saint Gobain&lt;br&gt;
118 Rue Lauriston&lt;br&gt;
75016 Paris
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
This field is optional and to be provided if  the sending customer (instructing party) is different than the owner of the account (but has an authorization to make payment on account given by owner)
&lt;br&gt;
Compagnie de Saint Gobain instructs the payment but does not own the account to be debited. It is authorized by it&apos;s the owner (e.g. a subsidiary) to pay form the ordering customer account provided below.
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td rowspan=&quot;3&quot;&gt;
Ordering Customer
&lt;/td&gt;
&lt;td rowspan=&quot;3&quot; class=&quot;center&quot;&gt;
50
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
F
&lt;/td&gt;
&lt;td&gt;
/DE207008000...&lt;br&gt;
1/Essilor International&lt;br&gt;
2/147 Rue de Paris&lt;br&gt;
3/FR/Charenton 94220
&lt;/td&gt;
&lt;td&gt;
Line 1 (subfield Party Identifier)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;/34x (Account)&lt;br&gt;
Lines 2-5 : (Number/Name and Address)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;1!n/33x (Number)(Details)
&lt;/td&gt;
&lt;td rowspan=&quot;3&quot; class=&quot;lx&quot;&gt;
The field ordering customer is mandatory. In can be given either in the message details or per transaction in the repeating sequence (here)
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td class=&quot;center&quot;&gt;
G
&lt;/td&gt;
&lt;td&gt;
/31926819&lt;br&gt;
UBSCH123FNX
&lt;/td&gt;
&lt;td&gt;
Line 1 (subfield Party Identifier)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;/34x (account)&lt;br&gt;
Line 2 (subfield bank)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;BIC (8 or 11 characters)
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td class=&quot;center&quot;&gt;
H
&lt;/td&gt;
&lt;td&gt;
/31926819&lt;br&gt;
Compagnie de Saint Gobain&lt;br&gt;
118 Rue Lauriston&lt;br&gt;
75016 Paris
&lt;/td&gt;
&lt;td&gt;
Line 1 (subfield Party Identifier)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;/34x (Account)&lt;br&gt;
Lines 2-5 : (Number/Name and Address)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;4*35x (Name and Address)
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Account Servicing Institution
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
52
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
A
&lt;/td&gt;
&lt;td&gt;
//083098                   (BSB)
&lt;br&gt;
NATAAU33               (bic)
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
This is to notify the receiving bank that the institution owning the account to debit is another institution So the MT101 needs to be transferred to that other institution identified here.
&lt;br&gt;
The BSB (Bank State Branch) code and the BIC are provided.
&lt;br&gt;
Even if it is not mandatory in the SWIFT standards to use the BSB code preceded by a double slash. Many banks impose it.
&lt;br&gt;
We need to parse the BIC out of it
&lt;br&gt;
Format :&lt;br&gt;
&amp;bnsp;&amp;bnsp;&amp;bnsp;&amp;bnsp;[/1!a][/34x] (Party Identifier)&lt;br&gt;
&amp;bnsp;&amp;bnsp;&amp;bnsp;&amp;bnsp;4!a2!a2!c[3!c] (Identifier Code)
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Intermediary
Institution
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
56
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
A
&lt;/td&gt;
&lt;td&gt;PNBPUS3N              (bic)
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
This is the Correspondent of the Creditor Bank. It holds the account in currency of the creditor bank.
&lt;br&gt;
It is optional and can be provided in option A, C or D. 
&lt;br&gt;
&lt;i&gt;Formats C or D are rarely used and most of the time not supported by banks.&lt;/i&gt;
&lt;br&gt;
Option A is formatted [/1!a][/34x] (Party Identifier)
&lt;br&gt;
4!a2!a2!c[3!c] (Identifier Code / BIC)
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td rowspan=&quot;2&quot;&gt;
Account With Institution
&lt;/td&gt;
&lt;td rowspan=&quot;2&quot; class=&quot;center&quot;&gt;
57
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
A
&lt;/td&gt;
&lt;td&gt;
BARCGB22XXX         (bic)&lt;br&gt;
or e.g.&lt;br&gt;
//939400                    (BSB)&lt;br&gt;
AMPBAU2SXXX        (bic)
&lt;/td&gt;
&lt;td&gt;
We need to parse the BIC out of it&lt;br&gt;
Format :&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[/1!a][/34x] (Party Identifier )&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;4!a2!a2!c[3!c] (Identifier Code)
&lt;/td&gt;
&lt;td rowspan=&quot;2&quot; class=&quot;lx&quot;&gt;
Optional. The Account with Institution is provided because the beneficiary does not have an account with the debtor bank, but with another bank .(i.e. an MT103 will be sent further)
&lt;br&gt;
It can be provided in option A, B, C or D. 
&lt;br&gt;
Formats B, C are rarely used and most of the time not supported by banks. 
&lt;br&gt;
For instance, in case the Creditor bank is not the same as the debtor bank (most of the time), it is identified in field 57a. The BSB (Bank State Branch) code and the BIC of AMP Bank are provided.
&lt;br&gt;
We need to parse the BIC out of it or hash the address
&lt;br&gt;
(priority over header)
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td class=&quot;center&quot;&gt;
D
&lt;/td&gt;
&lt;td&gt;
Hong Kong Banking Assoc.&lt;br&gt;
Avenue du Léman&lt;br&gt;
1204 Genève - CH&lt;br&gt;
Switzerland
&lt;/td&gt;
&lt;td&gt;
If no BIC is available to identify the target institution, option D is used.
&lt;br&gt;
In principle minimum  3 lines with name and address should be provided
&lt;br&gt;
Format:&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[/1!a][/34x] (Party Identifier)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;4*35x (Name and Address)&lt;br&gt;
In this case, take country from receiver BIC
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td rowspan=&quot;3&quot;&gt;
Beneficiary
&lt;/td&gt;
&lt;td rowspan=&quot;3&quot; class=&quot;center&quot;&gt;
59
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
(no letter)
&lt;/td&gt;
&lt;td&gt;
/26351-38947&lt;br&gt;
Company One&lt;br&gt;
CITY STREET 50&lt;br&gt;
LONDON, UK
&lt;/td&gt;
&lt;td&gt;
Line 1 : &lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[/34x] (Account) IBAN format or else&lt;br&gt;
Line 2-5:&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;4*35x (Name and Address)
&lt;/td&gt;
&lt;td rowspan=&quot;3&quot; class=&quot;lx&quot;&gt;
Beneficiary customer information is Mandatory
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td class=&quot;center&quot;&gt;
A
&lt;/td&gt;
&lt;td&gt;
NBPUS3N&lt;br&gt;
or e.g.&lt;br&gt;
/12345678901&lt;br&gt;
PNBPUS3N
&lt;/td&gt;
&lt;td&gt;
Option A is formatted &lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[/1!a][/34x] (Party Identifier)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;4!a2!a2!c[3!c] (Identifier Code / BIC)
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td class=&quot;center&quot;&gt;
F
&lt;/td&gt;
&lt;td&gt;
/10078074&lt;br&gt;
1/Company One&lt;br&gt;
2/CITY STREET 50&lt;br&gt;
3/GB/LONDON
&lt;/td&gt;
&lt;td&gt;
Line 1 (subfield Party Identifier)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[/34x] (Account)&lt;br&gt;
Lines 2-5 : (Number/Name and Address)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;4*(1!n/33x) (name and address)
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Remittance Information
&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;center&quot;&gt;
70
&lt;/td&gt;
&lt;td&gt;
Payment from&lt;br&gt;
Compagnie de Saint Gobain&lt;br&gt;
/INV/7828728292	
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Remittance information is optional and provided in format 4*35x if available. Up to 4 lines of up to 35 X characters each. The name of the parent company is provided here, so that the beneficiary can see it is the parent company that is paying.
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Details of Charges
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
71
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
A
&lt;/td&gt;
&lt;td&gt;
OUR
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
It is mandatory and of format 3!a. It can take 3 values: BEN, OUR and SHA. 
&lt;br&gt;
&lt;ul&gt;
&lt;li&gt;
OUR means charges are to be borne by the ordering customer.
&lt;/li&gt;
&lt;li&gt;
SHA means charges are shared between Ordering and beneficiary customers.
&lt;/li&gt;
&lt;li&gt;
BEN means charges are to be borne by the beneficiary
&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;

&lt;/table&gt;

&lt;a name=&quot;sec213&quot;&gt;&lt;/a&gt;
&lt;h4&gt;2.1.3 Additional notes on MT101&lt;/h4&gt;

&lt;p&gt;
Some complementary notes:
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
MT 101 have a repeating sequence (several transactions in same message). In my currently company, we consider every repeating sequence B (repeating) as a different transaction. The common sequence (A) is duplicated for each.
&lt;/li&gt;
&lt;li&gt;
We still need a way identify uniquely a message. Unfortunately SWIFT doesn&apos;t have such thing as a unique transaction identified. We usually use as &quot;business_reference&quot; = [Transaction Reference / 21 / transaction_business_reference] concatenated to a UUID as suffix.
&lt;/li&gt;
&lt;li&gt;
What to do in case of 57D if we cannot find a country code?  One way is to use the SWIFT message Receiver BIC country (sometimes wrong but better than nothing, only sometimes since when 57D is used we are likely in the same country 
&lt;/li&gt;
&lt;/ul&gt;



&lt;a name=&quot;sec22&quot;&gt;&lt;/a&gt;
&lt;h3&gt;2.2 SWIFT MT103 Detailed Analysis&lt;/h3&gt;

&lt;p&gt;
The MT103 is a SWIFT message format used for making payments. MT103 SWIFT payments are known as international wire transfers, telegraphic transfers, standard EU payments (SEPA payments), LVTS in Canada, etc.
&lt;/p&gt;

&lt;p&gt;
The situation of SWIFT MT103 in a banking institution is as follows:
&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/b1e34a62-0eae-4551-9d8a-ebe8108d684f&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 750px; &quot; alt=&quot;SWIFT MT103 situation&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/b1e34a62-0eae-4551-9d8a-ebe8108d684f&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
There can be many different situations:
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
An MT103 can be sent after a request from a customer of the bank to send funds cross-border to another institution. The customer request can come from any channel including the reception of an MT101.
&lt;/li&gt;
&lt;li&gt;
The MT103 can be a routed message in case the bank is simply a routing bank in the chain or an explicit intermediary institution.
&lt;/li&gt;
&lt;li&gt;
Then MT103 can be simple announces - in the cover method - or actual funds transfers - in the serial method.
&lt;/li&gt;
&lt;/ul&gt;


&lt;a name=&quot;sec221&quot;&gt;&lt;/a&gt;
&lt;h4&gt;2.2.1 MT103 Introductory examples&lt;/h4&gt;

&lt;p&gt;
This section presents various examples of SWIFT MT101 corresponding to different situations
&lt;/p&gt;


&lt;a name=&quot;sec2211&quot;&gt;&lt;/a&gt;
&lt;h5&gt;2.2.1.1 MT103 Example 1: Simplest case&lt;/h5&gt;

&lt;p&gt;
In this example, the customer &quot;John Robert&quot; of bank XYZ in Switzerland wants to send 500k EUR to Dupont SARL, a corporation located in Paris which is a BNP Paribas customer.
&lt;/p&gt;

&lt;p&gt;
Bank XYZ and BNP Paribas have a direct banking relationship.
&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/05f42c09-f59f-4093-87d4-d8bba7e1ed83&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 740px; &quot; alt=&quot;SWIFT MT101 Example 1&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/05f42c09-f59f-4093-87d4-d8bba7e1ed83&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
A single MT103 is sufficient to implement the fund transfer.
&lt;/p&gt;


&lt;a name=&quot;sec2212&quot;&gt;&lt;/a&gt;
&lt;h5&gt;2.2.1.2 MT103 Example 2: more realistic example&lt;/h5&gt;

&lt;p&gt;
This example is a more realistic example. The previous one is from a pure SWIFT specification perspective entirely valid. But in practice, a few more fields are almost always present in a SWIFT message.
&lt;/p&gt;

&lt;p&gt;
This example is more or less the same as the previous one: the customer &quot;John Robert&quot; of bank XYZ in Switzerland wants to send 30k EUR to Dupont SARL, a corporation located in Paris which is a BNP Paribas customer.
&lt;br&gt;
Bank XYZ and BNP Paribas have a direct banking relationship.
&lt;/p&gt;

&lt;p&gt;
The first thing is that Bank XYZ obviously has several VOSTRO account by BNP Paribas, and it wants to choose which of these accounts it wants to use for the reimbursement. It wants to use account 12345678901.
&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/405bf70f-f869-448f-a667-892b602a2367&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 740px; &quot; alt=&quot;SWIFT MT101 Example 12&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/405bf70f-f869-448f-a667-892b602a2367&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
The field 53 normally indicates the Sender&apos;s correspondent (i.e. a banking institution), but it&apos;s common practice to use the variant 53B to indicate the account by the receiving institution to be used for the reimbursement.
&lt;/p&gt;

&lt;p&gt;
In addition, in this more realistic example the charges details are indicated as well as remittance information.
&lt;/p&gt;


&lt;a name=&quot;sec2213&quot;&gt;&lt;/a&gt;
&lt;h5&gt;2.2.1.3 MT103 Example3: forwarded serial message&lt;/h5&gt;

&lt;p&gt;
In the case the bank we are operating within is neither the &lt;i&gt;ordering institution&lt;/i&gt; (initial sender) neither the eventual beneficiary institution, it is just a routing bank. In this case, specific fields are used to identify the initial sending institution as well as the eventual beneficiary institution. These fields are illustrated in this example.
&lt;/p&gt;

&lt;p&gt;
In this example, customer Max Prank of bank BCVs in Switzerland wants to send 30k EUR to Alfred SARL in Samoens (France), a customer of &quot;Banque Populaire&quot; in France.
&lt;br&gt;
BCVs in Switzerland and Banque Populaire in France have no direct relationship together so the fund transfer has to go through several routing bank, one of them being bank XYZ. 
&lt;/p&gt;

&lt;p&gt;
We are here interested in the MT 103 sent by Banque XYZ, a routing bank to the next bank in the routing chain: BNP Paribas.
&lt;/p&gt;


&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/98b2922b-79aa-4587-b775-7ee972bcfc1f&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 850px; &quot; alt=&quot;SWIFT MT101 Example 3&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/98b2922b-79aa-4587-b775-7ee972bcfc1f&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
Since bank XYZ is not the initial sending institution, and the receiver of the SWIFT message, bank BNP Paribas is not the eventual beneficiary institution, these two other institutions (initial sending and eventual beneficiary) needs to be indicated in the SWIFT messages.
&lt;/p&gt;

&lt;p&gt;
Details of the SWIFT MT103: 
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
The field &lt;i&gt;Ordering institution&lt;/i&gt; - field 52A - is clearly identifying the initial sending institution, bank BCVs
&lt;/li&gt;
&lt;li&gt;
The field &lt;i&gt;Account with institution&lt;/i&gt; - field 57A - is clearly identifying the eventual beneficiary institution of the funds
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;
It is relevant to look at the two other SWIFT messages from the chain to be able to compare them:
&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/faf8fcf2-f238-44d8-b578-0099c0099910&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 850px; &quot; alt=&quot;SWIFT MT101 Example 3 - B&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/faf8fcf2-f238-44d8-b578-0099c0099910&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
Another noteworthy field is the field &lt;i&gt;Intermediary account&lt;/i&gt; - field 56A - which identified that the message has to go through BNP Paribas after Bank XYZ.
&lt;/p&gt;


&lt;a name=&quot;sec2214&quot;&gt;&lt;/a&gt;
&lt;h5&gt;2.2.1.4 MT103 Example 4: Announce message (cover method)&lt;/h5&gt;

&lt;p&gt;
We&apos;ll now go through a case where the MT103 is just an announce as part of the cover payment method. This is the case when the initial sending institution and the eventual beneficiary institution have no relationship together and decide to go through their correspondent.
&lt;/p&gt;

&lt;p&gt;
In case the MT103 is just an announce, it can be sent directly from the initial sending institution to the eventual beneficiary institution regardless of the fact that they have no banking relationship with each other. 
&lt;/p&gt;

&lt;p&gt;
In this example, the customer John Trump of bank XYZ in Switzerland wants to send 1&apos;000&apos;000 USD to Cowboy Corp. in Kensas City, a customer of &quot;Kensas Credit&quot;
&lt;br&gt;
Due to the nature of the transaction and their missing banking relationship together, they decide to go through correspondent banks :
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
An MT103 is sent directly to the beneficiary bank, regardless of the fact they have no banking relationship together
&lt;/li&gt;
&lt;li&gt;
An MT202.COV will be routed through correspondent(s) and routing banks
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;
We are here interested in the MT 103 sent by Bank XYZ, the announcement, which can be sent directly to beneficiary bank
&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/c99c7a41-eb49-4637-ba93-6e83cb15b354&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 850px; &quot; alt=&quot;SWIFT MT101 Example 4&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/c99c7a41-eb49-4637-ba93-6e83cb15b354&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
The MT103 announce clearly indicates that the fund transfer will go through correspondents with the usage of the fields &lt;i&gt;Sender&apos;s correspondent&lt;/i&gt; - field 53A - and &lt;i&gt;Receiver&apos;s Correspondent&lt;/i&gt; - field 54A.
&lt;br&gt;
Aside from this, there is no specific difference between this announce and a serial MT103 fund transfer.
&lt;/p&gt;



&lt;a name=&quot;sec222&quot;&gt;&lt;/a&gt;
&lt;h4&gt;2.2.2 MT103 Parsing and Data Mapping &lt;/h4&gt;

&lt;p&gt;
The MT103 parsing details are presented in the table below. Only most essential fields are discussed.
&lt;/p&gt;

&lt;table class=&quot;allborder&quot;&gt;

&lt;tr style=&quot;background: #CCCCCC; font-weight: bold;&quot;&gt;

&lt;td rowspan=&quot;2&quot;&gt;
Meaning
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
SWIFT
&lt;/td&gt;
&lt;td rowspan=&quot;2&quot;&gt;
Example
&lt;/td&gt;
&lt;td rowspan=&quot;2&quot; colspan=&quot;2&quot;&gt;
Comment
&lt;/td&gt;
&lt;/tr&gt;


&lt;tr style=&quot;background: #CCCCCC; font-weight: bold;&quot;&gt;
&lt;td&gt;Field&lt;/td&gt;
&lt;td&gt;Variant&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
AppID
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Block1/ApplId
&lt;/td&gt;
&lt;td&gt;
F
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
The Application Identifier identifies the application within which the message is being sent or received. The available options are: F = FIN , A = GPA, etc.
&lt;br&gt;
These values are automatically assigned by the SWIFT system and the user&apos;s CBT.
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
ServiceID
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Block1/Servid
&lt;/td&gt;
&lt;td&gt;
01
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
The Service Identifier consists of two numeric characters. It identifies the type of data that is being sent or received and, in doing so, the type of the following message
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Sender
(Sending bank / BIC)
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Block1/ 
LTaddrBlk1 (I)
&lt;br&gt;
Or
&lt;br&gt;
Block2/ 
LTaddrBlk2 (O)
&lt;/td&gt;
&lt;td&gt;
SGOBFRPP
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Sender BIC appears in header block (Block 1) in the MT103 Input and in the application block (Block 2) in the MT103 Output
&lt;br&gt;
(Input and output related to the SWIFT network, not the bank). Need to use field Block2 / Inoutind to find out
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Message Type
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Block2/
Msgtype
&lt;/td&gt;
&lt;td&gt;
103
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
SWIFT Message Type = MT 103
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Cover or Serial Transfer Type
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
&lt;/td&gt;
&lt;td&gt;
If field 56a or 57a are present : then transfer type = &quot;serial&quot; &lt;br&gt;
If field 53a (ex 53B) or 54a are present : then transfer type = &quot;announce (cover)&quot;
&lt;br&gt;
(Default : serial)
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Knowing whether the MT103 is a serial transfer or the announce preceding a cover transfer is important. For a given use case, we actually expect a banking institution always to use the very same method.
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Receiver
(Receiving Bank / BIC)
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Block2/
LTaddrBlk2(I)
&lt;br&gt;
Or
&lt;br&gt;
Block1/ 
LTaddrBlk1 (O)
&lt;/td&gt;
&lt;td&gt;
RBOSGB2L
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
The Receiver BIC appears in header block (Block1) in the MT103 Output and in the application block (Block 2) in the MT103 Input.&lt;br&gt;
(Input and output related to the SWIFT network, not the bank). Need to use field Block2 / Inoutind to find out.&lt;br&gt;
The receiver of the message is the eventual beneficiary only if no field 57 says otherwise.
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Unique End-to-end Transaction Reference
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Block3/ Tag 121
&lt;/td&gt;
&lt;td&gt;
b03c6901-bbed-4aa9-afdh-A5bc26d19257
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
This reference is provided in the user block (Block 3) and transported end-to-end. It is mandatory in MT103 but can still be missing as well as have duplicates.
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Sender&apos;s Reference
&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;center&quot;&gt;
20
&lt;/td&gt;
&lt;td&gt;
ORDERREF1234
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
This field is mandatory and of format 16x. It is a reference assigned by the Sender to unambiguously identify the message. 
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Sender Msg. Sending Timestamp
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
(O) Block2 / ‘
Intime + Indate&lt;br&gt;
(I) Sys.time()
&lt;/td&gt;
&lt;td&gt;
1538070522
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
(O) = Output only : SWIFT timestamp for an Output message (HHMMYYMMDD)
&lt;br&gt;
or local date/time for an Input Message.
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
In / Out-put flag
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Block2 / Inoutind
&lt;/td&gt;
&lt;td&gt;
I
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Single letter ‘I&apos; or ‘O&apos;
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Bank operation code
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
23
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
B
&lt;/td&gt;
&lt;td&gt;
CRED
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
It is mandatory and of format 4!c.
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Instruction code
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
23
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
E
&lt;/td&gt;
&lt;td&gt;
PHOB/+34.91.397.6789
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
It is optional and of format :4!c[/30x] (Instruction Code)(Additional Info.)  
&lt;br&gt;
Code PHOB  means Phone Benef.. The sender requests the benef. bank to contact benef. by phone when funds are received.
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Value Date / currency / interbank settled amount
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
32
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
A
&lt;/td&gt;
&lt;td&gt;
180816USD2325,
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
It is mandatory and of format 6!n3!a15d (Date)(Currency)(Amount).&lt;br&gt;
Note the trailing coma (i.e. decimal part is not mandatory if 0)
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Currency / Instructed Amount
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
33
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
B
&lt;/td&gt;
&lt;td&gt;
USD2350,
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Normally optional in the standard. It may be provided for instance because the sender has taken fees. See field 71F below.&lt;br&gt;
Format 3!a15d (Currency)(Amount)
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td rowspan=&quot;3&quot;&gt;
Ordering Customer
&lt;/td&gt;
&lt;td rowspan=&quot;3&quot; class=&quot;center&quot;&gt;
50
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
A
&lt;/td&gt;
&lt;td&gt;
/DE3750070010...&lt;br&gt;
DEUTDEFF	
&lt;/td&gt;
&lt;td&gt;
Line 1 (subfield Party Identifier)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;/34x (account)&lt;br&gt;
Line 2 (subfield bank)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;4!a2!a2!c[3!c] (Identifier Code)
&lt;/td&gt;
&lt;td rowspan=&quot;3&quot; class=&quot;lx&quot;&gt;
The field ordering customer is mandatory. In can be given either in the message details (here) or per transaction in the repeating sequence.&lt;br&gt;
The ordering customer is customer of the sender only if there is no field 52. The ordering customer remains constant in the message chain.
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td class=&quot;center&quot;&gt;
F
&lt;/td&gt;
&lt;td&gt;
/DE207008000...&lt;br&gt;
1/Essilor International&lt;br&gt;
2/147 Rue de Paris&lt;br&gt;
3/FR/Charenton-le-Pont, 94220
&lt;/td&gt;
&lt;td&gt;
Line 1 (subfield Party Identifier)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;/34x (Account)&lt;br&gt;
Lines 2-5 : (Number/Name and Address)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;1!n/33x (Number)(Details)
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td class=&quot;center&quot;&gt;
K
&lt;/td&gt;
&lt;td&gt;
/CH570483509...&lt;br&gt;
GALLMAN COMPANY GMBH&lt;br&gt;
RAEMISTRASSE, 71&lt;br&gt;
8006 ZURICH&lt;br&gt;
SWITZERLAND
&lt;/td&gt;
&lt;td&gt;
Line 1 : (subfield party identified)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;/34x (Account)&lt;br&gt;
Line 2-5 (subfield Address)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;4*35x (Name and Address)
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td rowspan=&quot;2&quot;&gt;
Ordering institution
&lt;/td&gt;
&lt;td rowspan=&quot;2&quot; class=&quot;center&quot;&gt;
52
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
A	
&lt;/td&gt;
&lt;td&gt;
BNPAFRPP&lt;br&gt;
or e.g.&lt;br&gt;
/FR123509321...&lt;br&gt;
BNPAFRPP
&lt;/td&gt;
&lt;td&gt;
Format&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[/1!a][/34x] (Party Identifier)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;4!a2!a2!c[3!c] (Identifier Code)
&lt;/td&gt;
&lt;td rowspan=&quot;2&quot; class=&quot;lx&quot;&gt;
Ordering institution is optional and can be provided in two options A (usual) and D (less common).&lt;br&gt;
The sender populates this field to indicate that the initial instruction comes from another institution (ordering institution).&lt;br&gt;
The ordering institution remains constant in the message chain.&lt;br&gt;
(priority over header)
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td class=&quot;center&quot;&gt;
D
&lt;/td&gt;
&lt;td&gt;
BANQUE DELUBAC ET CIE&lt;br&gt;
16 PL SALEON&lt;br&gt;
TERRAS&lt;br&gt;
07160 LE CHEYLARD
&lt;/td&gt;
&lt;td&gt;
Format&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[/1!a][/34x] (Party Identifier)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;4*35x (Name and Address)
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td rowspan=&quot;2&quot;&gt;
Sender&apos;s correspondent
&lt;/td&gt;
&lt;td rowspan=&quot;2&quot; class=&quot;center&quot;&gt;
53
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
A
&lt;/td&gt;
&lt;td&gt;
PNBPUS3N&lt;br&gt;
or e.g.&lt;br&gt;
/12345678901&lt;br&gt;
PNBPUS3N
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
&lt;b&gt;Cover payments only&lt;/b&gt;&lt;br&gt;
Correspondent of sender. Sender has an account in Currency with this banking institution.&lt;br&gt;
Option A is formatted &lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[/1!a][/34x] (Party Identifier)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;4!a2!a2!c[3!c] (Identifier Code / BIC)
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td class=&quot;center&quot;&gt;
B
&lt;/td&gt;
&lt;td&gt;
/12345678901
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
&lt;b&gt;Caution : Serial and cover payments.&lt;/b&gt;&lt;br&gt;
Field 53B indicates the account number of the Sender, serviced by the Receiver, which is to be used for reimbursement (debit) in the transfer. This the account of the sender by the receiver (VOSTRO)&lt;br&gt;
Option B Format is:&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[/1!a][/34x] (Party Identifier)&lt;br&gt; 
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[35x] (Location)&lt;br&gt;
The field is optional but In practice, the account number is almost always provided.
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Receiver&apos;s correspondent
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
54
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
A
&lt;/td&gt;
&lt;td&gt;
IRVTUS3N&lt;br&gt;
or e.g.&lt;br&gt;
/9876412-1234/123&lt;br&gt;
IRVTUS3N
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
&lt;b&gt;Cover payments only.&lt;/b&gt;&lt;br&gt;
Correspondent of receiver. Receiver has an account in currency with this banking institution. &lt;br&gt;
Option A is formatted &lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[/1!a][/34x] (Party Identifier)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;4!a2!a2!c[3!c] (Identifier Code / BIC)
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Intermediary Institution
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
56
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
A
&lt;/td&gt;
&lt;td&gt;
IRVTUS3N                (bic)&lt;br&gt;
or e.g.&lt;br&gt;
/939400                   (BSB or account)&lt;br&gt;
AMPBAU2SXXX        (bic)
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
&lt;b&gt;Serial payments only.&lt;/b&gt;&lt;br&gt;
This is the Correspondent of Creditor Bank. It holds the account in currency of the creditor bank. It is used instead of over 54a (Receiver&apos;s Correspondent) in case of a serial payment transfer.&lt;br&gt;
It is optional and can be provided in option A, C or D. &lt;br&gt;
&lt;i&gt;Formats C or D are rarely used and most of the time not supported by banks.&lt;/i&gt;&lt;br&gt;
Option A is formatted &lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[/1!a][/34x] (Party Identifier)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;4!a2!a2!c[3!c] (Identifier Code / BIC)
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td rowspan=&quot;2&quot;&gt;
Account With Institution
&lt;/td&gt;
&lt;td rowspan=&quot;2&quot; class=&quot;center&quot;&gt;
57
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
A
&lt;/td&gt;
&lt;td&gt;
BARCGB22XXX         (bic)&lt;br&gt;
or e.g.&lt;br&gt;
//939400                    (BSB)&lt;br&gt;
AMPBAU2SXXX        (bic)
&lt;/td&gt;
&lt;td&gt;
We need to parse the BIC out of it &lt;br&gt;
Format :&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[/1!a][/34x] (Party Identifier )&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;4!a2!a2!c[3!c] (Identifier Code)
&lt;/td&gt;
&lt;td rowspan=&quot;2&quot; class=&quot;lx&quot;&gt;
&lt;b&gt;Serial payments only.&lt;/b&gt;&lt;br&gt;
Account with institution is optional and can be provided in option A, B, C or D. &lt;br&gt;
Formats B, C  are rarely used and most of the time not supported by banks.&lt;br&gt;
Field 57 is used when the receiver of the SWIFT MT103 doesn&apos;t own the beneficiary account and needs to send the Message Further. In the final MT103 on the chain, the holder of the account will be the receiver and no field 57 will be required anymore. &lt;br&gt;
We need to parse the BIC out of it or hash the address &lt;br&gt;
(priority over header)
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td class=&quot;center&quot;&gt;
D
&lt;/td&gt;
&lt;td&gt;
Hong Kong Banking Assoc.&lt;br&gt;
Avenue du Léman&lt;br&gt;
1204 Genève - CH&lt;br&gt;
Switzerland
&lt;/td&gt;
&lt;td&gt;
If no BIC is available to identify the target institution, option D is used.&lt;br&gt;
In principle minimum  3 lines with name and address should be provided&lt;br&gt;
Format :&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[/1!a][/34x] (Party Identifier )&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;4*35x (Name and Address)&lt;br&gt;
In this case, take country from receiver BIC.
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td rowspan=&quot;3&quot;&gt;
Beneficiary
&lt;/td&gt;
&lt;td rowspan=&quot;3&quot; class=&quot;center&quot;&gt;
59
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
(no letter)
&lt;/td&gt;
&lt;td&gt;
/26351-38947&lt;br&gt;
Company One&lt;br&gt;
CITY STREET 50&lt;br&gt;
LONDON, UK
&lt;/td&gt;
&lt;td&gt;
Line 1 : &lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[/34x] (Account) (IBAN format or else)&lt;br&gt;
Line 2-5:&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;4*35x (Name and Address)
&lt;/td&gt;
&lt;td rowspan=&quot;3&quot; class=&quot;lx&quot;&gt;
Beneficiary customer information is Mandatory. &lt;br&gt;
The beneficiary remains constant in the message chain.
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td class=&quot;center&quot;&gt;
A
&lt;/td&gt;
&lt;td&gt;
PNBPUS3N&lt;br&gt;
or e.g.&lt;br&gt;
/12345678901&lt;br&gt;
PNBPUS3N
&lt;/td&gt;
&lt;td&gt;
Option A is formatted &lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[/1!a][/34x] (Party Identifier)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;4!a2!a2!c[3!c] (Identifier Code / BIC)
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td class=&quot;center&quot;&gt;
F
&lt;/td&gt;
&lt;td&gt;
/10078074&lt;br&gt;
1/Company One&lt;br&gt;
2/CITY STREET 50&lt;br&gt;
3/GB/LONDON
&lt;/td&gt;
&lt;td&gt;
Line 1 (subfield Party Identifier)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[/34x] (Account)&lt;br&gt;
Lines 2-5 : (Number/Name and Address)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;4*(1!n/33x) (name and address)
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Remittance Information
&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;center&quot;&gt;
70
&lt;/td&gt;
&lt;td&gt;
/INV/18042-090715
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Remittance information is optional and provided in format 4*35x if available. Up to 4 lines of up to 35 X characters each.&lt;br&gt;
Usually the remittance information is generated by the beneficiary and sent to the ordering customer (or debtor). The beneficiary requests the debtor to provide it the payment message, so that the beneficiary can easily reconcile the payment with an invoice for instance.
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Details of Charges
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
71
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
A
&lt;/td&gt;
&lt;td&gt;
OUR
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
It is mandatory and of format 3!a. It can take 3 values: BEN, OUR and SHA. 
&lt;br&gt;
&lt;ul&gt;
&lt;li&gt;
OUR means charges are to be borne by the ordering customer.
&lt;/li&gt;
&lt;li&gt;
SHA means charges are shared between Ordering and beneficiary customers.
&lt;/li&gt;
&lt;li&gt;
BEN means charges are to be borne by the beneficiary
&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Sender&apos;s charges
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
71
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
F
&lt;/td&gt;
&lt;td&gt;
EUR2,50
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Optional. When 71A is BEN (or SHA), 71G contains amount of the charges due, which have been deducted from the interbank settlement amount.&lt;br&gt;
Interbank settled amount = Instructed amount - Sender&apos;s charges.&lt;br&gt;
Format 3!a15d &lt;br&gt;
&lt;b&gt;Caution: there can be several different 71F in a same MT103.&lt;/b&gt;
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Receiver&apos;s charges
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
71
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
G
&lt;/td&gt;
&lt;td&gt;
EUR2,50
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Optional. When 71A is OUR (or SHA), 71G contains amount of the charges due, which have been prepaid and included in the interbank settlement amount.&lt;br&gt;
Format 3!a15d&lt;br&gt;
&lt;b&gt;Caution : there can be several different 71G in a same MT103. &lt;/b&gt;
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Sender to Receiver Information
&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;center&quot;&gt;
72
&lt;/td&gt;
&lt;td&gt;
/INS/BNPAFRPP
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
This is an optional field. It takes the Format 6*35x.&lt;br&gt;
There can be many codes indicating additional information. &lt;br&gt;
INS is a code indicating that BNPAFRPP is the instructing institution. Without field 72, the receiver may not know it since that information is not provided somewhere else in the message when sender is the next bank on the routing chain and ordering institution is another bank before the instructing one.
&lt;/td&gt;
&lt;/tr&gt;

&lt;/table&gt;


&lt;a name=&quot;sec223&quot;&gt;&lt;/a&gt;
&lt;h4&gt;2.2.3 Additional notes on MT103&lt;/h4&gt;

&lt;p&gt;
Some complementary notes:
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
The option field 53B (only variant B) is really only used to indicate which account at the correspondent (receiver) should be debited.
&lt;/li&gt;
&lt;li&gt;
Fields 51A seems to be not supported by most banks (at least all I found such as UBS, etc.)
&lt;/li&gt;
&lt;li&gt;
When no correspondent is used neither on sender side (Tag 53A) nor on receiver side (Tag 54A) and No reimbursement party (Tags 56a and 57a) is indicated in the SWIFT MT103 message. It means
&lt;ul&gt;
&lt;li&gt;there is a direct account relationship, in the currency of the transfer, between the Sender and the Receiver. Money will be taken from account and credited to the beneficiary.&lt;/li&gt;
&lt;li&gt;Beneficiary customer account (:59) is hold by the receiver.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
The fields 56a and 57a are used for serial transfers while the fields 53a (ex 53B) and 54a are used in the MT103 Announcement Message (cover method).
&lt;/li&gt;
&lt;li&gt;
What to do in case of 57D if we cannot find a country code?  We Use SWIFT message Receiver BIC country (sometimes wrong but better than nothing, only sometimes since when 57D is used we are likely in the same country)
&lt;/li&gt;
&lt;li&gt;
Routing
&lt;ul&gt;
&lt;li&gt;When there is no ordering institution (Tag 52) in the SWIFT MT103 message. That means implicitly that the ordering customer is customer of the Sender.&lt;/li&gt;
&lt;li&gt;When the ordering institution (Tag 52D) is provided in the MT103 SWIFT Message. This means the ordering customer is not customer of the Sender. &lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;Either the sending institution sends the MT103 on behalf of the ordering institution in 52D. This happens when the ordering institution is a small bank that has an agreement with a major bank (sending bank) for the processing and settlement of currency transactions. The small bank can use the correspondent network of sending institution.&lt;/li&gt;
&lt;li&gt;Or the Sender is a routing bank on the chain&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
Field 57 is used when the receiver of the SWIFT MT103 doesn&apos;t own the beneficiary account and needs to send the Message Further. 
&lt;br&gt;
In the final MT103 on the chain, the holder of the account will be the receiver and no field 57 will be required anymore.
&lt;ul&gt;
&lt;li&gt;This indicates that Sender and Beneficiary customer&apos;s Bank do not have direct account relationship in the currency of the transaction (USD). Otherwise the sender would send the message directly to the beneficiary customer&apos;s Bank.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
Sender&apos;s reference is new for every message in the routing chain, but end-to-end reference remains constant. 
&lt;/li&gt;
&lt;/ul&gt;

&lt;a name=&quot;sec23&quot;&gt;&lt;/a&gt;
&lt;h3&gt;2.3 SWIFT MT202 Detailed Analysis&lt;/h3&gt;

&lt;p&gt;
SWIFT MT202 Messages are used for interbank funds transfers. There is no customer involved when issuing an MT202. Funds are not sent on behalf of a customer but on behalf of the initial sending banking institution itself.
&lt;/p&gt;

&lt;p&gt;
The situation of SWIFT MT202 in a banking institution is as follows:
&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/d5018e99-e484-4633-b558-a738539a9dff&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 750px; &quot; alt=&quot;SWIFT MT202 situation&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/d5018e99-e484-4633-b558-a738539a9dff&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
There can be two different situations:
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
Either the bank is the initial sending institution, in which case it will be identified both as the sender of the SWIFT message and perhaps as the Ordering Institution (52a)
&lt;/li&gt;
&lt;li&gt;
Or the bank is just a routing bank in the routing chain in which case it is the sender but shall be different that the Ordering Institution (52a)
&lt;/li&gt;
&lt;/ul&gt;


&lt;a name=&quot;sec231&quot;&gt;&lt;/a&gt;
&lt;h4&gt;2.3.1 SWIFT MT202 Introductory Exampkes&lt;/h4&gt;

&lt;p&gt;
This section presents various examples of SWIFT MT202 corresponding to different situations
&lt;/p&gt;


&lt;a name=&quot;sec2311&quot;&gt;&lt;/a&gt;
&lt;h4&gt;2.3.1.1 MT202 Example 1: simplest case&lt;/h4&gt;

&lt;p&gt;
In this first example, bank XYZ wants to send 1 million euros from its general VOSTRO account 1234-5678 by BNP Paribas to another of its own account FR982381827331 also by BNP Paribas.
&lt;br&gt;
The field &quot;Receiver&apos;s Correspondent&quot; - 53B - is diverted for the usage of identifying the source account to use for debit.
&lt;/p&gt;


&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/adf80790-2744-4778-82d3-44f7dd25f774&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 550px; &quot; alt=&quot;SWIFT MT202 Example 1&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/adf80790-2744-4778-82d3-44f7dd25f774&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
Details of the SWIFT MT202:
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
The &lt;i&gt;beneficiary institution&lt;/i&gt; is a field that doesn&apos;t exist in MT103 and introduced by MT202. It does not identify the eventual institution owning the account to be credited but the Banking institution owning that account, actually the bank being the customer of the institution owning its correspondent account.
&lt;/li&gt;
&lt;/ul&gt;


&lt;a name=&quot;sec2312&quot;&gt;&lt;/a&gt;
&lt;h4&gt;2.3.1.2 MT202 Example 2: other bank case&lt;/h4&gt;

&lt;p&gt;
In this second example, bank XYZ wants to send 1 million euros from its general VOSTRO account 1234-5678 by BNP Paribas to an account belonging to another financial institution: Banque Populaire in France. This other banking institution also owns an account by BNP Paribas.
&lt;br&gt;
The account of Banque Populaire by BNP Paribas is FR98238182733.
&lt;/p&gt;

&lt;p&gt;
The field &quot;&lt;i&gt;Receiver&apos;s Correspondent&lt;/i&gt;&quot; - 53B - is diverted for the usage of identifying the source account to use for debit.
&lt;/p&gt;


&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/02aec4a2-49d6-498d-8301-3d5997e37727&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 580px; &quot; alt=&quot;SWIFT MT202 Example 2&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/02aec4a2-49d6-498d-8301-3d5997e37727&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
The details of this SWIFT MT 202 are fundamentally similar to the one from the previous example:
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The field &lt;i&gt;Beneficiary Institution&lt;/i&gt; - 58A - identifies clearly the eventual beneficiary institution owning the account by the Account with Institution - field 57A, in this case Banque Populaire.
&lt;/li&gt;
&lt;/ul&gt;


&lt;a name=&quot;sec2313&quot;&gt;&lt;/a&gt;
&lt;h4&gt;2.3.1.3 MT202 Example 3: routed message&lt;/h4&gt;

&lt;p&gt;
In this example we’ll see how a routed MT202 looks like. In this example, bank BCVs wants to send money to Banque Populaire. They are not using correspondent, the initial account debited is by BCVs and the eventual beneficiary account is by Banque Populaire.
&lt;/p&gt;

&lt;p&gt;
Since BCVs and Banque Populaire have no relationship together, the MT202 needs to be routed through banks having a banking relationship. In this example we look at the MT202 forwarded by bank XYZ, one of the bank on the routing chain.
&lt;/p&gt;


&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/9a25620b-6fc9-4493-93f2-dda68ac42ade&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 680px; &quot; alt=&quot;SWIFT MT202 Example 3&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/9a25620b-6fc9-4493-93f2-dda68ac42ade&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
Details of this SWIFT MT202 message:
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The field &lt;i&gt;account with Institution&lt;/i&gt; - 57A has the same value than the field beneficiary institution - 58A - since the funds make it to Banque Populaire.&lt;/li&gt;
&lt;/ul&gt;

&lt;a name=&quot;sec232&quot;&gt;&lt;/a&gt;
&lt;h3&gt;2.3.2 MT202 Parsing and Data Mapping &lt;/h3&gt;

&lt;p&gt;
The MT202 parsing details are presented in the table below. Only most essential fields are discussed.
&lt;/p&gt;


&lt;table class=&quot;allborder&quot;&gt;

&lt;tr style=&quot;background: #CCCCCC; font-weight: bold;&quot;&gt;

&lt;td rowspan=&quot;2&quot;&gt;
Meaning
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
SWIFT
&lt;/td&gt;
&lt;td rowspan=&quot;2&quot;&gt;
Example
&lt;/td&gt;
&lt;td rowspan=&quot;2&quot; colspan=&quot;2&quot;&gt;
Comment
&lt;/td&gt;
&lt;/tr&gt;


&lt;tr style=&quot;background: #CCCCCC; font-weight: bold;&quot;&gt;
&lt;td&gt;Field&lt;/td&gt;
&lt;td&gt;Variant&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
AppID
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Block1/ApplId
&lt;/td&gt;
&lt;td&gt;
F
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
The Application Identifier identifies the application within which the message is being sent or received. The available options are: F = FIN , A = GPA, etc.
&lt;br&gt;
These values are automatically assigned by the SWIFT system and the user&apos;s CBT.
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
ServiceID
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Block1/Servid
&lt;/td&gt;
&lt;td&gt;
01
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
The Service Identifier consists of two numeric characters. It identifies the type of data that is being sent or received and, in doing so, the type of the following message
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Sender
(Sending bank / BIC)
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Block1/ 
LTaddrBlk1 (I)
&lt;br&gt;
Or
&lt;br&gt;
Block2/ 
LTaddrBlk2 (O)
&lt;/td&gt;
&lt;td&gt;
SGOBFRPP
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Sender BIC appears in header block (Block 1) in the MT202 Input and in the application block (Block 2) in the MT202 Output
&lt;br&gt;
(Input and output related to the SWIFT network, not the bank). Need to use field Block2 / Inoutind to find out
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Message Type
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Block2/
Msgtype
&lt;/td&gt;
&lt;td&gt;
202
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
SWIFT Message Type = MT 202
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Validation Flag
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Block3/Tag119
&lt;/td&gt;
&lt;td&gt;
COV (if  MT202 is a cover payment)
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
This validation flag is provided the user block (Block 3) and transported end-to-end. It indicates that the message is a MT202 Cover.
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Receiver
(Receiving Bank / BIC)
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Block2/
LTaddrBlk2(I)
&lt;br&gt;
Or
&lt;br&gt;
Block1/ 
LTaddrBlk1 (O)
&lt;/td&gt;
&lt;td&gt;
RBOSGB2L
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
The Receiver BIC appears in header block (Block1) in the MT292 Output and in the application block (Block 2) in the MT202 Input.
&lt;br&gt;
(Input and output related to the SWIFT network, not the bank). &lt;b&gt;Need to use field Block2 / Inoutind to find out.&lt;/b&gt;
&lt;br&gt;
The receiver of the message is the eventual beneficiary only if no field 57 says otherwise.
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Unique End-to-end Transaction Reference
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Block3/ Tag 121
&lt;/td&gt;
&lt;td&gt;
b03c6901-bbed-4aa9-afdh-A5bc26d19257
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
This reference is provided in the user block (Block 3) and transported end-to-end. It is mandatory in MT103 but can still be missing as well as have duplicates.
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td colspan=&quot;6&quot; style=&quot;background-color: #AACCFF; font-weight: bold;&quot;&gt;
Sequence A - General Information                           (Matching MT 202 format)
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Sender&apos;s Reference
&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;center&quot;&gt;
20
&lt;/td&gt;
&lt;td&gt;
ORDERREF1234
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
This field is mandatory and of format 16x. It is a reference assigned by the Sender to unambiguously identify the message. 
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Related reference
&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;center&quot;&gt;
21
&lt;/td&gt;
&lt;td&gt;
123456789ABCDEF
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
This field is mandatory and of format 16x. 
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Sender Msg. Sending Timestamp
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
(O) Block2 / ‘
Intime + Indate
&lt;br&gt;
(I) Sys.time()
&lt;/td&gt;
&lt;td&gt;
1538070522
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
(O) = Output only : SWIFT timestamp for an Output message (HHMMYYMMDD)
&lt;br&gt; or local date/time for an Input Message.
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
In / Out-put flag
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Block2 / Inoutind
&lt;/td&gt;
&lt;td&gt;
I
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Single letter ‘I’ or ‘O’
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Value Date / currency / interbank settled amount
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
32
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
A
&lt;/td&gt;
&lt;td&gt;
180816USD2325,
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
It is mandatory and of format 6!n3!a15d (Date)(Currency)(Amount). &lt;br&gt;
Note the trailing coma (i.e. decimal part is not mandatory if 0)
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td rowspan=&quot;2&quot;&gt;
Ordering institution
&lt;/td&gt;
&lt;td rowspan=&quot;2&quot; class=&quot;center&quot;&gt;
52
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
A
&lt;/td&gt;
&lt;td&gt;
BNPAFRPP&lt;br&gt;
or e.g.&lt;br&gt;
/FR123509321...&lt;br&gt;
BNPAFRPP
&lt;/td&gt;
&lt;td&gt;
Format&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[/1!a][/34x] (Party Identifier)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;4!a2!a2!c[3!c] (Identifier Code)&lt;br&gt;
&lt;/td&gt;
&lt;td rowspan=&quot;2&quot; class=&quot;lx&quot;&gt;
Ordering institution is optional and can be provided in two options A (usual) and D (less common). &lt;br&gt;
The sender populate this field to indicate that the initial instruction comes from another institution (ordering institution). &lt;br&gt;
The ordering institution remains constant in the message chain. &lt;br&gt;
(priority over header)
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td class=&quot;center&quot;&gt;
D
&lt;/td&gt;
&lt;td&gt;
BANQUE DELUBAC ET CIE&lt;br&gt;
16 PL SALEON&lt;br&gt;
TERRAS &lt;br&gt;
07160 LE CHEYLARD
&lt;/td&gt;
&lt;td&gt;
Format&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[/1!a][/34x] (Party Identifier)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;4*35x (Name and Address)
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td rowspan=&quot;2&quot;&gt;
Sender&apos;s correspondent
&lt;/td&gt;
&lt;td rowspan=&quot;2&quot; class=&quot;center&quot;&gt;
53
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
A
&lt;/td&gt;
&lt;td&gt;
PNBPUS3N&lt;br&gt;
or e.g.&lt;br&gt;
/12345678901&lt;br&gt;
PNBPUS3N
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
&lt;b&gt;Cover payments only&lt;/b&gt;&lt;br&gt;
Correspondent of sender. Sender has an account in Currency with this banking institution. &lt;br&gt;
Option A is formatted &lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[/1!a][/34x] (Party Identifier)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;4!a2!a2!c[3!c] (Identifier Code / BIC)
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td class=&quot;center&quot;&gt;
B
&lt;/td&gt;
&lt;td&gt;
/12345678901
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
&lt;b&gt;Caution : Serial and cover payments.&lt;/b&gt;&lt;br&gt;
Field 53B indicates the account number of the Sender, serviced by the Receiver, which is to be used for reimbursement (debit) in the transfer. This the account of the sender by the receiver (VOSTRO)&lt;br&gt;
Option B Format is:&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[/1!a][/34x] (Party Identifier) &lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[35x] (Location)&lt;br&gt;
&lt;i&gt;The field is optional but In practice, the account number is almost always provided.&lt;/i&gt;&lt;br&gt;
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Receiver’s correspondent
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
54
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
A
&lt;/td&gt;
&lt;td&gt;
IRVTUS3N&lt;br&gt;
or e.g.&lt;br&gt;
/9876412-1234/123&lt;br&gt;
IRVTUS3N
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
&lt;b&gt;Cover payments only.&lt;/b&gt;&lt;br&gt;
Correspondent of receiver. Receiver has an account in currency with this banking institution. &lt;br&gt;
Option A is formatted &lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[/1!a][/34x] (Party Identifier)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;4!a2!a2!c[3!c] (Identifier Code / BIC)
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Intermediary Institution
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
56
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
A
&lt;/td&gt;
&lt;td&gt;
IRVTUS3N                (bic)&lt;br&gt;
or e.g.&lt;br&gt;
/939400                   (BSB or account)&lt;br&gt;
AMPBAU2SXXX        (bic)	
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
&lt;b&gt;Serial payments only.&lt;/b&gt;&lt;br&gt;
This is the Correspondent of Creditor Bank. It holds the account in currency of the creditor bank. It is used instead of over 54a (Receiver&apos;s Correspondent) in case of a serial payment transfer.&lt;br&gt;
It is optional and can be provided in option A, C or D. &lt;br&gt;
&lt;i&gt;Formats C or D are rarely used and most of the time not supported by banks.&lt;/i&gt;&lt;br&gt;
Option A is formatted &lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[/1!a][/34x] (Party Identifier)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;4!a2!a2!c[3!c] (Identifier Code / BIC)
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td rowspan=&quot;2&quot;&gt;
Account With Institution
&lt;/td&gt;
&lt;td rowspan=&quot;2&quot; class=&quot;center&quot;&gt;
57
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
A
&lt;/td&gt;
&lt;td&gt;
BARCGB22XXX         (bic)&lt;br&gt;
or e.g.&lt;br&gt;
//939400                    (BSB)&lt;br&gt;
AMPBAU2SXXX        (bic)
&lt;/td&gt;
&lt;td&gt;
We need to parse the BIC out of it&lt;br&gt;
Format :&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[/1!a][/34x] (Party Identifier )&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;4!a2!a2!c[3!c] (Identifier Code)	
&lt;/td&gt;
&lt;td rowspan=&quot;2&quot; class=&quot;lx&quot;&gt;
&lt;b&gt;Serial payments only.&lt;/b&gt;&lt;br&gt;
Account with institution is optional and can be provided in option A, B, C or D. &lt;br&gt;
&lt;i&gt;Formats B, C are rarely used and most of the time not supported by banks.&lt;/i&gt;&lt;br&gt;
Option A is formatted &lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[/1!a][/34x] (Party Identifier)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;4!a2!a2!c[3!c] (Identifier Code / BIC)&lt;br&gt;
Field 57 is used when the receiver of the SWIFT MT103 doesn’t own the beneficiary account and needs to send the Message Further. In the final MT103 on the chain, the holder of the account will be the receiver and no field 57 will be required anymore.&lt;br&gt;
We need to parse the BIC out of it or hash the address&lt;br&gt;
(priority over header)
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td class=&quot;center&quot;&gt;
D
&lt;/td&gt;
&lt;td&gt;
Hong Kong Banking Assoc.&lt;br&gt;
Avenue du Léman&lt;br&gt;
1204 Genève - CH&lt;br&gt;
Switzerland
&lt;/td&gt;
&lt;td&gt;
If no BIC is available to identify the target institution, option D is used.&lt;br&gt;
In principle minimum  3 lines with name and address should be provided&lt;br&gt;
Format :&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[/1!a][/34x] (Party Identifier )&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;4*35x (Name and Address)
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td rowspan=&quot;2&quot;&gt;
Beneficiary Institution
&lt;/td&gt;
&lt;td rowspan=&quot;2&quot; class=&quot;center&quot;&gt;
58
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
A
&lt;/td&gt;
&lt;td&gt;
BNPAFRPP&lt;br&gt;
or e.g.&lt;br&gt;
/FR123509321...&lt;br&gt;
BNPAFRPP
&lt;/td&gt;
&lt;td&gt;
Format&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[/1!a][/34x] (Party Identifier)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;4!a2!a2!c[3!c] (Identifier Code)	
&lt;/td&gt;
&lt;td rowspan=&quot;2&quot; class=&quot;lx&quot;&gt;
Beneficiary Institution is a mandatory field.&lt;br&gt;
In the Case of MT 202 and MT 202.COV, beneficiary institution is the most reliable and straightforward way to identify the eventual beneficiary institution of the founfs.
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td class=&quot;center&quot;&gt;
D
&lt;/td&gt;
&lt;td&gt;
BANQUE DELUBAC ET CIE&lt;br&gt;
16 PL SALEON&lt;br&gt;
TERRAS&lt;br&gt;
07160 LE CHEYLARD
&lt;/td&gt;
&lt;td&gt;
Format&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[/1!a][/34x] (Party Identifier)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;4*35x (Name and Address)
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Sender to Receiver Information
&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;center&quot;&gt;
72
&lt;/td&gt;
&lt;td&gt;
/INS/BNPAFRPP
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
This is an optional field. It takes the Format 6*35x.&lt;br&gt;
There can be many codes indicating additional information.&lt;br&gt;
INS is a code indicating that BNPAFRPP is the instructing institution. Without field 72, the receiver may not know it since that information is not provided somewhere else in the message when sender is the next bank on the routing chain and ordering institution is another bank before the instructing one.
&lt;/td&gt;
&lt;/tr&gt;

&lt;/table&gt;


&lt;a name=&quot;sec233&quot;&gt;&lt;/a&gt;
&lt;h4&gt;2.3.3 Additional notes on MT202&lt;/h4&gt;

&lt;p&gt;
Some complementary notes:
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
When no correspondent is used neither on sender side (Tag 53A) nor on receiver side (Tag 54A) and No reimbursement party (Tags 56a and 57a) is indicated in the SWIFT MT103 message. It means
&lt;ul&gt;
&lt;li&gt;There’s a direct account relationship, in the currency of the transfer, between the Sender and the Receiver. Money will be taken from account and credited to the beneficiary.&lt;/li&gt;
&lt;li&gt;Beneficiary customer account (:59:/00012367493) is hold by the receiver.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
What to do in case of 57D if we cannot find a country code?  We Use SWIFT message Receiver BIC country (sometimes wrong but better than nothing, only sometimes since when 57D is used we are likely in the same country 
&lt;/li&gt;
&lt;li&gt;
Routing
&lt;ul&gt;
&lt;li&gt;When there is no ordering institution (Tag 52) in the SWIFT MT202 message. That means implicitly that the ordering customer is customer of the Sender.&lt;/li&gt;
&lt;li&gt;When the ordering institution (Tag 52D) is provided in the MT202 SWIFT Message. This means the ordering customer is not customer of the Sender. 
&lt;ul&gt;
&lt;li&gt;Either the sending institution sends the MT202 on behalf of the ordering institution in 52D. This happens when the ordering institution is a small bank that has an agreement with a major bank (sending bank) for the processing and settlement of currency transactions. The small bank can use the correspondent network of sending institution.&lt;/li&gt;
&lt;li&gt;Or the Sender is a routing bank on the chain&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;li&gt;
Field 57 is used when the receiver of the SWIFT MT103 doesn’t own the beneficiary account and needs to send the Message Further. 
&lt;/li&gt;
&lt;li&gt;
In the final MT103 on the chain, the holder of the account will be the receiver and no field 57 will be required anymore.
&lt;ul&gt;
&lt;li&gt;This indicates that Sender and Beneficiary customer&apos;s Bank do not have direct account relationship in the currency of the transaction (USD). Otherwise the sender would send the message directly to the beneficiary customer&apos;s Bank.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
The field 58a identifies in a unique way the beneficiary institution. To be perfectly honest, it does not have the same meaning as the 57a in 103 for instance, it rather has the same beaning as 59 to identify the beneficiary, when the beneficiary is an institution and not a customer. We shall use the 58 for 202 and 202.cov to identify the eventual beneficiary institution.
&lt;/li&gt;
&lt;/ul&gt;




&lt;a name=&quot;sec24&quot;&gt;&lt;/a&gt;
&lt;h3&gt;2.4 SWIFT MT202 COV Detailed Analysis&lt;/h3&gt;

&lt;p&gt;
MT202 COV is a SWIFT message format for financial institution (FI) funds transfer between financial institutions. MT202&apos;s are used primarily for two purposes, bank-to-bank payments (i.e. interest payments and settlement of FX trades) and Cover Payments.
&lt;br&gt;
MT202 COV was implemented in 2009 to create traceability of the origination of funds (institution and account) through to the destination of funds (institution and account.) This was in response to anti-money laundering and associated banking requirements.
&lt;/p&gt;

&lt;p&gt;
Prior to MT202 COV, The message format, MT202, did not include origination/destination financial institution information. Particularly for Cover Payments, where a combination of MT103 and MT202 are used to direct funds transfers to a beneficiary account, the intermediate banks in the MT202 had no ability to understand and perform risk analysis/AML/compliance checks on the funds transfer based on the original and destination of the funds. Thus, intermediate banks could be unwittingly involved in illegal transactions under new regulations.
&lt;/p&gt;

&lt;p&gt;
The situation of SWIFT MT202 COV in a banking institution is as follows:
&lt;/p&gt;


&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/2bd7f8a6-2534-472b-ad7c-b4534354aceb&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 750px; &quot; alt=&quot;SWIFT MT202 COV situation&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/2bd7f8a6-2534-472b-ad7c-b4534354aceb&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
There can be two different situations:
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
Either the bank is the initial sending institution, in which case it will be identified both as the sender of the SWIFT message and perhaps as the &lt;i&gt;Ordering Institution&lt;/i&gt; (52a)
&lt;/li&gt;
&lt;li&gt;
Or the bank is just a routing bank in the routing chain in which case it is the sender but shall be different that the &lt;i&gt;Ordering Institution&lt;/i&gt; (52a)
&lt;/li&gt;
&lt;/ul&gt;



&lt;a name=&quot;sec241&quot;&gt;&lt;/a&gt;
&lt;h4&gt;2.4.1 MT202 COV Introductory examples&lt;/h4&gt;

&lt;p&gt;
This section presents various examples of SWIFT MT202 COV corresponding to different situations
&lt;/p&gt;

&lt;a name=&quot;sec2411&quot;&gt;&lt;/a&gt;
&lt;h5&gt;2.4.1.1 MT202 COV Example: Cover payment&lt;/h5&gt;

&lt;p&gt;
We’ll now go through a case where the MT202 COV followed as the MT103 sent as an announce as part of the cover payment method as introduced in section [6.2.2.4 Example 4: Announce message (cover method)]. This is the case when the initial sending institution and the eventual beneficiary institution have no relationship together and decide to go through their correspondent.
&lt;br&gt;
The MT 202 COV in this case is the message actually carrying the funds.
&lt;/p&gt;

&lt;p&gt;
In this example, the customer John Trump of bank XYZ in Switzerland wants to send 1’000’000 USD to Cowboy Corp. in Kensas City, a customer of “Kensas Credit”
&lt;br&gt;
Due to the nature of the transaction and their missing banking relationship together, they decide to go through correspondent banks :
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
An MT103 is sent directly to the beneficiary bank, regardless of the fact they have no banking relationship together
&lt;/li&gt;
&lt;li&gt;
An MT202.COV will be routed through correspondent(s) and routing banks
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;
We are here first having a look at the initial MT202 COV sent by bank XYZ, the sending institution:
&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/d5be5c72-30f1-425e-810f-dafac5c4d10b&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 850px; &quot; alt=&quot;SWIFT MT202 COV Example 1&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/d5be5c72-30f1-425e-810f-dafac5c4d10b&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
Details of the SWIFT MT 202 COV message:
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
The field account with institution- 57a - ends up by Wells Fargo. The MT 202 chain doesn’t carry the funds any further.
&lt;/li&gt;
&lt;li&gt;
But the account by Wells Fargo is the correspondent account of Kensas Credit by Well Fargo, the field Beneficiary Institution - 58a - identified the institution owning that account by Wells Fargo, hence Kensas Credit.
&lt;/li&gt;
&lt;li&gt;
The field 59 identifies the beneficiary customer for which the funds are transferred, Cowbow corp, a customer of Kensas Credit.
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;
We shall have a look at all the MT202 COV of the chain to see how they differ from each other’s:
&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/1c731b22-d64d-410e-9fc9-a685e880fe5e&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 850px; &quot; alt=&quot;SWIFT MT202 COV Example 2&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/1c731b22-d64d-410e-9fc9-a685e880fe5e&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;a name=&quot;sec242&quot;&gt;&lt;/a&gt;
&lt;h3&gt;2.4.2 MT202 COV Parsing and Data Mapping &lt;/h3&gt;

&lt;p&gt;
The MT202 COV parsing details are presented in the table below. Only most essential fields are discussed.
&lt;/p&gt;


&lt;table class=&quot;allborder&quot;&gt;


&lt;tr style=&quot;background: #CCCCCC; font-weight: bold;&quot;&gt;

&lt;td rowspan=&quot;2&quot;&gt;
Meaning
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
SWIFT
&lt;/td&gt;
&lt;td rowspan=&quot;2&quot;&gt;
Example
&lt;/td&gt;
&lt;td rowspan=&quot;2&quot; colspan=&quot;2&quot;&gt;
Comment
&lt;/td&gt;
&lt;/tr&gt;


&lt;tr style=&quot;background: #CCCCCC; font-weight: bold;&quot;&gt;
&lt;td&gt;Field&lt;/td&gt;
&lt;td&gt;Variant&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
AppID
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Block1/ApplId
&lt;/td&gt;
&lt;td&gt;
F
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
The Application Identifier identifies the application within which the message is being sent or received. The available options are: F = FIN , A = GPA, etc.
&lt;br&gt;
These values are automatically assigned by the SWIFT system and the user&apos;s CBT.
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
ServiceID
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Block1/Servid
&lt;/td&gt;
&lt;td&gt;
01
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
The Service Identifier consists of two numeric characters. It identifies the type of data that is being sent or received and, in doing so, the type of the following message
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Sender
(Sending bank / BIC)
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Block1/ 
LTaddrBlk1 (I)
&lt;br&gt;
Or
&lt;br&gt;
Block2/ 
LTaddrBlk2 (O)
&lt;/td&gt;
&lt;td&gt;
SGOBFRPP
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Sender BIC appears in header block (Block 1) in the MT202 Input and in the application block (Block 2) in the MT202 Output
&lt;br&gt;
(Input and output related to the SWIFT network, not the bank). Need to use field Block2 / Inoutind to find out
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Message Type
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Block2/
Msgtype
&lt;/td&gt;
&lt;td&gt;
202
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
SWIFT Message Type = MT 202
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Validation Flag
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Block3/Tag119
&lt;/td&gt;
&lt;td&gt;
COV (if  MT202 is a cover payment)
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
This validation flag is provided the user block (Block 3) and transported end-to-end. It indicates that the message is a MT202 Cover.
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Receiver
(Receiving Bank / BIC)
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Block2/
LTaddrBlk2(I)
&lt;br&gt;
Or
&lt;br&gt;
Block1/ 
LTaddrBlk1 (O)
&lt;/td&gt;
&lt;td&gt;
RBOSGB2L
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
The Receiver BIC appears in header block (Block1) in the MT292 Output and in the application block (Block 2) in the MT202 Input.
&lt;br&gt;
(Input and output related to the SWIFT network, not the bank). &lt;b&gt;Need to use field Block2 / Inoutind to find out.&lt;/b&gt;
&lt;br&gt;
The receiver of the message is the eventual beneficiary only if no field 57 says otherwise.
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Unique End-to-end Transaction Reference
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Block3/ Tag 121
&lt;/td&gt;
&lt;td&gt;
b03c6901-bbed-4aa9-afdh-A5bc26d19257
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
This reference is provided in the user block (Block 3) and transported end-to-end. It is mandatory in MT103 but can still be missing as well as have duplicates.
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td colspan=&quot;6&quot; style=&quot;background-color: #AACCFF; font-weight: bold;&quot;&gt;
Sequence A - General Information                           (Matching MT 202 format)
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Sender&apos;s Reference
&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;center&quot;&gt;
20
&lt;/td&gt;
&lt;td&gt;
ORDERREF1234
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
This field is mandatory and of format 16x. It is a reference assigned by the Sender to unambiguously identify the message. 
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Related reference
&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;center&quot;&gt;
21
&lt;/td&gt;
&lt;td&gt;
123456789ABCDEF
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
This field is mandatory and of format 16x. 
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Sender Msg. Sending Timestamp
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
(O) Block2 / ‘
Intime + Indate
&lt;br&gt;
(I) Sys.time()
&lt;/td&gt;
&lt;td&gt;
1538070522
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
(O) = Output only : SWIFT timestamp for an Output message (HHMMYYMMDD)
&lt;br&gt; or local date/time for an Input Message.
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
In / Out-put flag
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Block2 / Inoutind
&lt;/td&gt;
&lt;td&gt;
I
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Single letter ‘I’ or ‘O’
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Value Date / currency / interbank settled amount
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
32
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
A
&lt;/td&gt;
&lt;td&gt;
180816USD2325,
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
It is mandatory and of format 6!n3!a15d (Date)(Currency)(Amount). &lt;br&gt;
Note the trailing coma (i.e. decimal part is not mandatory if 0)
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td rowspan=&quot;2&quot;&gt;
Ordering institution
&lt;/td&gt;
&lt;td rowspan=&quot;2&quot; class=&quot;center&quot;&gt;
52
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
A
&lt;/td&gt;
&lt;td&gt;
BNPAFRPP&lt;br&gt;
or e.g.&lt;br&gt;
/FR1235093212...&lt;br&gt;
BNPAFRPP
&lt;/td&gt;
&lt;td&gt;
Format&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[/1!a][/34x] (Party Identifier)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;4!a2!a2!c[3!c] (Identifier Code)&lt;br&gt;
&lt;/td&gt;
&lt;td rowspan=&quot;2&quot; class=&quot;lx&quot;&gt;
Ordering institution is optional and can be provided in two options A (usual) and D (less common). &lt;br&gt;
The sender populate this field to indicate that the initial instruction comes from another institution (ordering institution). &lt;br&gt;
The ordering institution remains constant in the message chain. &lt;br&gt;
(priority over header)
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td class=&quot;center&quot;&gt;
D
&lt;/td&gt;
&lt;td&gt;
BANQUE DELUBAC ET CIE&lt;br&gt;
16 PL SALEON&lt;br&gt;
TERRAS &lt;br&gt;
07160 LE CHEYLARD
&lt;/td&gt;
&lt;td&gt;
Format&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[/1!a][/34x] (Party Identifier)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;4*35x (Name and Address)
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td rowspan=&quot;2&quot;&gt;
Sender&apos;s correspondent
&lt;/td&gt;
&lt;td rowspan=&quot;2&quot; class=&quot;center&quot;&gt;
53
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
A
&lt;/td&gt;
&lt;td&gt;
PNBPUS3N&lt;br&gt;
or e.g.&lt;br&gt;
/12345678901&lt;br&gt;
PNBPUS3N
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
&lt;b&gt;Cover payments only&lt;/b&gt;&lt;br&gt;
Correspondent of sender. Sender has an account in Currency with this banking institution. &lt;br&gt;
Option A is formatted &lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[/1!a][/34x] (Party Identifier)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;4!a2!a2!c[3!c] (Identifier Code / BIC)
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td class=&quot;center&quot;&gt;
B
&lt;/td&gt;
&lt;td&gt;
/12345678901
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
&lt;b&gt;Caution : Serial and cover payments.&lt;/b&gt;&lt;br&gt;
Field 53B indicates the account number of the Sender, serviced by the Receiver, which is to be used for reimbursement (debit) in the transfer. This the account of the sender by the receiver (VOSTRO)&lt;br&gt;
Option B Format is:&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[/1!a][/34x] (Party Identifier) &lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[35x] (Location)&lt;br&gt;
&lt;i&gt;The field is optional but In practice, the account number is almost always provided.&lt;/i&gt;&lt;br&gt;
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Receiver’s correspondent
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
54
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
A
&lt;/td&gt;
&lt;td&gt;
IRVTUS3N&lt;br&gt;
or e.g.&lt;br&gt;
/9876412-1234/123&lt;br&gt;
IRVTUS3N
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
&lt;b&gt;Cover payments only.&lt;/b&gt;&lt;br&gt;
Correspondent of receiver. Receiver has an account in currency with this banking institution. &lt;br&gt;
Option A is formatted &lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[/1!a][/34x] (Party Identifier)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;4!a2!a2!c[3!c] (Identifier Code / BIC)
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Intermediary Institution
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
56
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
A
&lt;/td&gt;
&lt;td&gt;
IRVTUS3N                (bic)&lt;br&gt;
or e.g.&lt;br&gt;
/939400                   (BSB or account)&lt;br&gt;
AMPBAU2SXXX        (bic)	
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
&lt;b&gt;Serial payments only.&lt;/b&gt;&lt;br&gt;
This is the Correspondent of Creditor Bank. It holds the account in currency of the creditor bank. It is used instead of over 54a (Receiver&apos;s Correspondent) in case of a serial payment transfer.&lt;br&gt;
It is optional and can be provided in option A, C or D. &lt;br&gt;
&lt;i&gt;Formats C or D are rarely used and most of the time not supported by banks.&lt;/i&gt;&lt;br&gt;
Option A is formatted &lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[/1!a][/34x] (Party Identifier)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;4!a2!a2!c[3!c] (Identifier Code / BIC)
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td rowspan=&quot;2&quot;&gt;
Account With Institution
&lt;/td&gt;
&lt;td rowspan=&quot;2&quot; class=&quot;center&quot;&gt;
57
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
A
&lt;/td&gt;
&lt;td&gt;
BARCGB22XXX         (bic)&lt;br&gt;
or e.g.&lt;br&gt;
//939400                    (BSB)&lt;br&gt;
AMPBAU2SXXX        (bic)
&lt;/td&gt;
&lt;td&gt;
We need to parse the BIC out of it&lt;br&gt;
Format :&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[/1!a][/34x] (Party Identifier )&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;4!a2!a2!c[3!c] (Identifier Code)	
&lt;/td&gt;
&lt;td rowspan=&quot;2&quot; class=&quot;lx&quot;&gt;
&lt;b&gt;Serial payments only.&lt;/b&gt;&lt;br&gt;
Account with institution is optional and can be provided in option A, B, C or D. &lt;br&gt;
&lt;i&gt;Formats B, C are rarely used and most of the time not supported by banks.&lt;/i&gt;&lt;br&gt;
Option A is formatted &lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[/1!a][/34x] (Party Identifier)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;4!a2!a2!c[3!c] (Identifier Code / BIC)&lt;br&gt;
Field 57 is used when the receiver of the SWIFT MT103 doesn’t own the beneficiary account and needs to send the Message Further. In the final MT103 on the chain, the holder of the account will be the receiver and no field 57 will be required anymore.&lt;br&gt;
We need to parse the BIC out of it or hash the address&lt;br&gt;
(priority over header)
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td class=&quot;center&quot;&gt;
D
&lt;/td&gt;
&lt;td&gt;
Hong Kong Banking Assoc.&lt;br&gt;
Avenue du Léman&lt;br&gt;
1204 Genève - CH&lt;br&gt;
Switzerland
&lt;/td&gt;
&lt;td&gt;
If no BIC is available to identify the target institution, option D is used.&lt;br&gt;
In principle minimum  3 lines with name and address should be provided&lt;br&gt;
Format :&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[/1!a][/34x] (Party Identifier )&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;4*35x (Name and Address)
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td rowspan=&quot;2&quot;&gt;
Beneficiary Institution
&lt;/td&gt;
&lt;td rowspan=&quot;2&quot; class=&quot;center&quot;&gt;
58
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
A
&lt;/td&gt;
&lt;td&gt;
BNPAFRPP&lt;br&gt;
or e.g.&lt;br&gt;
/FR123509321...&lt;br&gt;
BNPAFRPP
&lt;/td&gt;
&lt;td&gt;
Format&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[/1!a][/34x] (Party Identifier)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;4!a2!a2!c[3!c] (Identifier Code)	
&lt;/td&gt;
&lt;td rowspan=&quot;2&quot; class=&quot;lx&quot;&gt;
Beneficiary Institution is a mandatory field.&lt;br&gt;
In the Case of MT 202 and MT 202.COV, beneficiary institution is the most reliable and straightforward way to identify the eventual beneficiary institution of the founfs.
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td class=&quot;center&quot;&gt;
D
&lt;/td&gt;
&lt;td&gt;
BANQUE DELUBAC ET CIE&lt;br&gt;
16 PL SALEON&lt;br&gt;
TERRAS&lt;br&gt;
07160 LE CHEYLARD
&lt;/td&gt;
&lt;td&gt;
Format&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[/1!a][/34x] (Party Identifier)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;4*35x (Name and Address)
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Sender to Receiver Information
&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;center&quot;&gt;
72
&lt;/td&gt;
&lt;td&gt;
/INS/BNPAFRPP
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
This is an optional field. It takes the Format 6*35x.&lt;br&gt;
There can be many codes indicating additional information.&lt;br&gt;
INS is a code indicating that BNPAFRPP is the instructing institution. Without field 72, the receiver may not know it since that information is not provided somewhere else in the message when sender is the next bank on the routing chain and ordering institution is another bank before the instructing one.
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td colspan=&quot;6&quot; style=&quot;background-color: #AACCFF; font-weight: bold;&quot;&gt;
Sequence B - Underlying Customer Credit Transfer Detail
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Currency / Instructed Amount
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
33
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
B
&lt;/td&gt;
&lt;td&gt;
USD2350,
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Normally optional in the standard. It may be provided for instance because the sender has taken fees. See field 71F below.&lt;br&gt;
Format 3!a15d (Currency)(Amount)
&lt;/td&gt;
&lt;/tr&gt;


&lt;tr&gt;
&lt;td rowspan=&quot;3&quot;&gt;
Ordering Customer
&lt;/td&gt;
&lt;td rowspan=&quot;3&quot; class=&quot;center&quot;&gt;
50
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
A
&lt;/td&gt;
&lt;td&gt;
/DE3750070010...&lt;br&gt;
DEUTDEFF	
&lt;/td&gt;
&lt;td&gt;
Line 1 (subfield Party Identifier)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;/34x (account)&lt;br&gt;
Line 2 (subfield bank)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;4!a2!a2!c[3!c] (Identifier Code)
&lt;/td&gt;
&lt;td rowspan=&quot;3&quot; class=&quot;lx&quot;&gt;
The field ordering customer is mandatory. In can be given either in the message details (here) or per transaction in the repeating sequence.&lt;br&gt;
The ordering customer is customer of the sender only if there is no field 52. The ordering customer remains constant in the message chain.
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td class=&quot;center&quot;&gt;
F
&lt;/td&gt;
&lt;td&gt;
/DE207008000...&lt;br&gt;
1/Essilor International&lt;br&gt;
2/147 Rue de Paris&lt;br&gt;
3/FR/Charenton-le-Pont, 94220
&lt;/td&gt;
&lt;td&gt;
Line 1 (subfield Party Identifier)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;/34x (Account)&lt;br&gt;
Lines 2-5 : (Number/Name and Address)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;1!n/33x (Number)(Details)
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td class=&quot;center&quot;&gt;
K
&lt;/td&gt;
&lt;td&gt;
/CH5704835098...&lt;br&gt;
GALLMAN COMPANY GMBH&lt;br&gt;
RAEMISTRASSE, 71&lt;br&gt;
8006 ZURICH&lt;br&gt;
SWITZERLAND
&lt;/td&gt;
&lt;td&gt;
Line 1 : (subfield party identified)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;/34x (Account)&lt;br&gt;
Line 2-5 (subfield Address)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;4*35x (Name and Address)
&lt;/td&gt;
&lt;/tr&gt;


&lt;tr&gt;
&lt;td rowspan=&quot;3&quot;&gt;
Beneficiary
&lt;/td&gt;
&lt;td rowspan=&quot;3&quot; class=&quot;center&quot;&gt;
59
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
(no letter)
&lt;/td&gt;
&lt;td&gt;
/26351-38947&lt;br&gt;
Company One&lt;br&gt;
CITY STREET 50&lt;br&gt;
LONDON, UK
&lt;/td&gt;
&lt;td&gt;
Line 1 : &lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[/34x] (Account) (IBAN format or else)&lt;br&gt;
Line 2-5:&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;4*35x (Name and Address)
&lt;/td&gt;
&lt;td rowspan=&quot;3&quot; class=&quot;lx&quot;&gt;
Beneficiary customer information is Mandatory. &lt;br&gt;
The beneficiary remains constant in the message chain.
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td class=&quot;center&quot;&gt;
A
&lt;/td&gt;
&lt;td&gt;
PNBPUS3N&lt;br&gt;
or e.g.&lt;br&gt;
/12345678901&lt;br&gt;
PNBPUS3N
&lt;/td&gt;
&lt;td&gt;
Option A is formatted &lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[/1!a][/34x] (Party Identifier)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;4!a2!a2!c[3!c] (Identifier Code / BIC)
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td class=&quot;center&quot;&gt;
F
&lt;/td&gt;
&lt;td&gt;
/10078074&lt;br&gt;
1/Company One&lt;br&gt;
2/CITY STREET 50&lt;br&gt;
3/GB/LONDON
&lt;/td&gt;
&lt;td&gt;
Line 1 (subfield Party Identifier)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[/34x] (Account)&lt;br&gt;
Lines 2-5 : (Number/Name and Address)&lt;br&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;4*(1!n/33x) (name and address)
&lt;/td&gt;
&lt;/tr&gt;


&lt;tr&gt;
&lt;td&gt;
Remittance Information
&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;center&quot;&gt;
70
&lt;/td&gt;
&lt;td&gt;
/INV/18042-090715
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Remittance information is optional and provided in format 4*35x if available. Up to 4 lines of up to 35 X characters each.&lt;br&gt;
Usually the remittance information is generated by the beneficiary and sent to the ordering customer (or debtor). The beneficiary requests the debtor to provide it the payment message, so that the beneficiary can easily reconcile the payment with an invoice for instance.
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Details of Charges
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
71
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
A
&lt;/td&gt;
&lt;td&gt;
OUR
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
It is mandatory and of format 3!a. It can take 3 values: BEN, OUR and SHA. 
&lt;br&gt;
&lt;ul&gt;
&lt;li&gt;
OUR means charges are to be borne by the ordering customer.
&lt;/li&gt;
&lt;li&gt;
SHA means charges are shared between Ordering and beneficiary customers.
&lt;/li&gt;
&lt;li&gt;
BEN means charges are to be borne by the beneficiary
&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Sender&apos;s charges
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
71
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
F
&lt;/td&gt;
&lt;td&gt;
EUR2,50
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Optional. When 71A is BEN (or SHA), 71G contains amount of the charges due, which have been deducted from the interbank settlement amount.&lt;br&gt;
Interbank settled amount = Instructed amount - Sender&apos;s charges.&lt;br&gt;
Format 3!a15d &lt;br&gt;
&lt;b&gt;Caution: there can be several different 71F in a same MT202 COV.&lt;/b&gt;
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Receiver&apos;s charges
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
71
&lt;/td&gt;
&lt;td class=&quot;center&quot;&gt;
G
&lt;/td&gt;
&lt;td&gt;
EUR2,50
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
Optional. When 71A is OUR (or SHA), 71G contains amount of the charges due, which have been prepaid and included in the interbank settlement amount.&lt;br&gt;
Format 3!a15d&lt;br&gt;
&lt;b&gt;Caution : there can be several different 71G in a same MT202 COV. &lt;/b&gt;
&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td&gt;
Sender to Receiver Information
&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;center&quot;&gt;
72
&lt;/td&gt;
&lt;td&gt;
/INS/BNPAFRPP
&lt;/td&gt;
&lt;td colspan=&quot;2&quot;&gt;
This is an optional field. It takes the Format 6*35x.&lt;br&gt;
There can be many codes indicating additional information. &lt;br&gt;
INS is a code indicating that BNPAFRPP is the instructing institution. Without field 72, the receiver may not know it since that information is not provided somewhere else in the message when sender is the next bank on the routing chain and ordering institution is another bank before the instructing one.
&lt;/td&gt;
&lt;/tr&gt;


&lt;/table&gt;



&lt;a name=&quot;sec243&quot;&gt;&lt;/a&gt;
&lt;h4&gt;2.4.3 Additional notes on MT202 COV&lt;/h4&gt;

&lt;p&gt;
Some complementary notes:
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
The option field 53B (only variant B) is really only used to indicate which account at the correspondent (receiver) should be debited.
&lt;/li&gt;
&lt;li&gt;
Fields 51A seems to be not supported by most banks (at least all I found such as UBS, etc.)
&lt;/li&gt;
&lt;li&gt;
When no correspondent is used neither on sender side (Tag 53A) nor on receiver side (Tag 54A) and No reimbursement party (Tags 56a and 57a) is indicated in the SWIFT MT202 message. It means
&lt;ul&gt;
&lt;li&gt;there is a direct account relationship, in the currency of the transfer, between the Sender and the Receiver. Money will be taken from account and credited to the beneficiary.&lt;/li&gt;
&lt;li&gt;Beneficiary customer account is hold by the receiver.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
What to do in case of 57D if we cannot find a country code?  We Use SWIFT message Receiver BIC country (sometimes wrong but better than nothing, only sometimes since when 57D is used we are likely in the same country 
&lt;/li&gt;
&lt;li&gt;
Routing
&lt;ul&gt;
&lt;li&gt;When there is no ordering institution (Tag 52) in the SWIFT MT202 message. That means implicitly that the ordering customer is customer of the Sender.&lt;/li&gt;
&lt;li&gt;
When the ordering institution (Tag 52D) is provided in the MT202 SWIFT Message. This means the ordering customer is not customer of the Sender. 
&lt;ul&gt;
&lt;li&gt;Either the sending institution sends the MT103 on behalf of the ordering institution in 52D. This happens when the ordering institution is a small bank that has an agreement with a major bank (sending bank) for the processing and settlement of currency transactions. The small bank can use the correspondent network of sending institution.&lt;/li&gt;
&lt;li&gt;Or the Sender is a routing bank on the chain&lt;/li&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
Field 57 is used when the receiver of the SWIFT MT202 doesn’t own the beneficiary account and needs to send the Message Further. 
&lt;br&gt;
In the final MT103 on the chain, the holder of the account will be the receiver and no field 57 will be required anymore.
&lt;ul&gt;
&lt;li&gt;This indicates that Sender and Beneficiary customer&apos;s Bank do not have direct account relationship in the currency of the transaction (USD). Otherwise the sender would send the message directly to the beneficiary customer&apos;s Bank.
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
Sender’s reference is new for every message in the routing chain, but end-to-end reference remains constant.
&lt;/li&gt;
&lt;li&gt;
The field 58a identifies in a unique way the beneficiary institution. To be perfectly honest, it does not have the same meaning as the 57a in 103 for instance, it rather has the same meaning as 59 to identify the beneficiary, when the beneficiary is an institution and not a customer.
&lt;br&gt;
We shall use the 58 for 202 and 202.cov to identify the eventual beneficiary institution.
&lt;/li&gt;
&lt;/ul&gt;


&lt;a name=&quot;sec3&quot;&gt;&lt;/a&gt;
&lt;h2&gt;3. Conclusion&lt;/h2&gt;

&lt;p&gt;
The above is a collection of the most essential information we gathered at NetGuardians when implementing SWIFT parsing to monitor payments, specifically cross border payments. There are more Message Types relevant when it comes to monitoring payments than those mentioned in this article (for instance MT 205, MT 102, MT 203, etc.) but there usage is rarer.
&lt;br&gt;
In addition, the listing of fields provided in this article is far from complete and other fields of the SWIFT messages, especially from the various headers, may be interesting for your own business. I let the reader refer to the SWIFT MT specifications.
&lt;br&gt;
Last but not least, with the coming mandatory transition to XML format (SWIFT MX), I may well need to write a new version of this article pretty soon :-)
&lt;/p&gt;

&lt;p&gt;
For the sake of exhaustivity, I wanted to complete this article by giving a very simplified view of how SWIFT kicks-in in a Banking Information System:
&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/f035bd9d-e1de-49f9-8d79-0cd3825b869c&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 750px; &quot; alt=&quot;SWIFT Architecture in Bank&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/f035bd9d-e1de-49f9-8d79-0cd3825b869c&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
Most importantly, the SWIFT interface is connected to the payment HUB of the banking institution. But interestingly, it is also used as an input channel for customers, since the later may send &lt;i&gt;Transfer Requests&lt;/i&gt; such as MT101 to their banking institution using SWIFT.
&lt;/p&gt;

</content>
    </entry>
    <entry>
        <id>https://www.niceideas.ch/roller2/badtrash/entry/interview-about-netguardians-and-fighting</id>
        <title type="html">Interview about NetGuardians and fighting fraud in the digital era</title>
        <author><name>Jerome Kehrli</name></author>
        <link rel="alternate" type="text/html" href="https://www.niceideas.ch/roller2/badtrash/entry/interview-about-netguardians-and-fighting"/>
        <published>2019-02-04T06:10:18-05:00</published>
        <updated>2019-02-05T04:38:50-05:00</updated> 
        <category term="Banking" label="Banking" />
        <category term="banking" scheme="http://roller.apache.org/ns/tags/" />
        <category term="banking-fraud" scheme="http://roller.apache.org/ns/tags/" />
        <category term="digital" scheme="http://roller.apache.org/ns/tags/" />
        <category term="digital-banking" scheme="http://roller.apache.org/ns/tags/" />
        <category term="digital-transformation" scheme="http://roller.apache.org/ns/tags/" />
        <content type="html">&lt;!-- Interview about NetGuardians and fighting fraud in the digital era. --&gt;


&lt;p&gt;
&lt;b&gt;&lt;i&gt;The below is an extract from an interview I ran in February 2019 during the &lt;a href=&quot;https://forward-sme.epfl.ch/&quot;&gt;EPFL Forward event&lt;/a&gt;.&lt;/i&gt;&lt;/b&gt;
&lt;/p&gt;

&lt;p&gt;
NetGuardians is a Swiss Software Publisher based in Yverdon-les-bains that edits a Big Data Analytics Solution deployed Financial Institution for one key use case: fighting financial crime and preventing banking Fraud.
&lt;br&gt;
Banking fraud is meant in the broad sense here: both internally and externally. 
&lt;br&gt;
Internal fraud is when employees misappropriate funds under management and external fraud is when cyber-criminals compromise ebanking applications, mobile devices used for payment or credit cards.
&lt;/p&gt;

&lt;p&gt;
In the digital age, the means of fraudsters and cyber-criminals have drastically increased.
&lt;/p&gt;

&lt;p&gt;
Cyber-criminals have become industrialized, professionalized and organized. The same technology they use against banks is also what gives us the means to protect banks
&lt;/p&gt;

&lt;p&gt;
At NetGuardians we deploy an Artificial Intelligence that monitors on a large scale, in depth and in real time all activities of users, employees of the bank, but also those of its customers, to detect anomalies.
&lt;br&gt;
We prevent bank fraud and fight financial crime by detecting and blocking all suspicious activity in real time.
&lt;/p&gt;


&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/e870fa77-83dd-40fb-a0f8-ee508d2b653a&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 600px; &quot; alt=&quot;Digital Banking&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/e870fa77-83dd-40fb-a0f8-ee508d2b653a&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
&lt;b&gt;&lt;i&gt;Jérôme Kehrli, how did you manage to convince a sector that is, in essence, very traditional, to trust you with your digital tools to fight against fraud? 
&lt;br&gt;
Two different worlds, two languages, two visions?
&lt;/i&gt;&lt;/b&gt;
&lt;/p&gt;
 
&lt;p&gt;
The situation of the banks is a bit peculiar, the digitization and with it the evolution of the means and the behaviours of the customers in the digital age, was at the same time both a traumatic and a formidable solution.
&lt;/p&gt;

&lt;p&gt;
The digital revolution was a traumatic because the banks, which by their very nature are very conservative, especially in Switzerland with our very strong private banking culture, were not prepared for the need to profoundly transform the customer experience of the banking world: to meet the customer where he is, on his channels, with mobile banking, this culture of all and everything immediately, with instant payments, the opening of the information system, with the explosion of the External Asset Managers model and external service providers with the PSD2 European standard, etc.
&lt;/p&gt;

&lt;p&gt;
The digital revolution has imposed these changes, sometimes brutally, in banks and it is the source of a tremendous increase of the attack surface of banks.
&lt;/p&gt;

&lt;p&gt;
But this same technology that spawned the digital revolution has proved to be the solution too.
&lt;br&gt;
Technology has made it possible to build digital banking applications that provide all of the bank&apos;s services on a mobile device.
&lt;br&gt;
Technology has made it possible to implement innovative solutions that secure the information system and protect client funds.
&lt;/p&gt;

&lt;p&gt;
And in this perspective, Artificial Intelligence is really a sort of panacea: robot advisory, chatbots, personalization of financial advice and especially, especially the fight against financial crime: banking fraud and money laundering
&lt;/p&gt;

&lt;p&gt;
In the end, if five years ago our solutions seemed somewhat avant-garde, not to say futuristic and sometimes aroused a bit of skepticism, today the banks are aware of the digital urgency and it is the bankers themselves who eagerly seek our solutions.
&lt;/p&gt;

&lt;p&gt;
&lt;b&gt;&lt;i&gt;
You support the digital shift of the banking sector.
&lt;br&gt;
Do banks sometimes have to change their way of operating, their habits, to be able to use your technologies?
&lt;br&gt;
(Do you have to prepare them to work with you?)
&lt;/i&gt;&lt;/b&gt;
&lt;/p&gt;

&lt;p&gt;
So of course the digital revolution profoundly transforms not only the business model but also the corporate culture, its tools, and so on.
&lt;/p&gt;

&lt;p&gt;
At NetGuardians we have a very concrete example.
&lt;/p&gt;

&lt;p&gt;
Before the use of Artificial Intelligence, banks protected themselves with rules engines. Hundreds of rules were deployed on the information system to enforce security policies or detect the most obvious violations.
&lt;br&gt;
The advantage with rules was that a violation was very easy to understand. A violation of a compliance rule reported in a clear and accurate audit report was easy to understand and so was the response.
&lt;br&gt;
The disadvantage, however, was that the rules were a poor protection against financial crime and that&apos;s why fraud has exploded over the decade.
&lt;/p&gt;

&lt;p&gt;
Today with artificial intelligence, the level of protection is excellent and without comparison with the era of the rules.
&lt;br&gt;
But the disadvantage of artificial intelligence is that accurately understanding a decision of the machine is much more difficult.
&lt;/p&gt;

&lt;p&gt;
At NetGuardians, we develop with our algorithms a Forensic analysis application that allows bankers to understand the operation of the machine by presenting the context of the decision.
&lt;br&gt;
This forensic analysis application, which presents the results of our algorithms, is essential and almost as important as our algorithms themselves.
&lt;/p&gt;

&lt;p&gt;
This is a powerful application but requires a grip.
&lt;/p&gt;

&lt;p&gt;
Tom Cruise in Minority Report who handles a data discovery application playing an orchestra conductor, it&apos;s easy in Hollywood, but it&apos;s not in reality.
&lt;br&gt;
In reality, we provide initial training to our users and then regular updates.
&lt;/p&gt;

&lt;p&gt;
In the end, a data analysis and forensic application is not Microsoft Word. Our success is to make such an application accessible to everyone, but not without a little help.
&lt;br&gt;
In conclusion i would say that the culture transformation end the evolution of the tools do require some training and special care.
&lt;/p&gt;

&lt;p&gt;
&lt;b&gt;&lt;i&gt;
In general, what should a company prepare for, before making a digital shift?
&lt;/i&gt;&lt;/b&gt;
&lt;/p&gt;

&lt;p&gt;
In the digital age, many companies must transform their business model or disappear. Some services become obsolete, some new necessities appear.
&lt;br&gt;
We can mention Uber of course but also NetFlix, Booking, eBookers, etc.
&lt;/p&gt;

&lt;p&gt;
For the majority of the industrial base, the digitalization of products and services is an absolute necessity, a question of survival.
&lt;/p&gt;

&lt;p&gt;
Successful process and business model transformation often requires a transformation of the very culture of the company, down toits identity:
&lt;br&gt;
Among other things one could mention the following requirements:
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;scaling agility from product development to the whole company level&lt;/li&gt;
&lt;li&gt;involving digital natives to identify and design digital services&lt;/li&gt;
&lt;li&gt;realizing the urgency or if necessary create a sense of urgency&lt;/li&gt;
&lt;li&gt;understanding the scale of the challenge and the necessary transformation. Some say &lt;i&gt;&quot;if it does not hurt, it is not digital transformation&quot;&lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;
In summary I would say that a company is &quot;mature&quot; for digitalization if it is inspired by the digitalization of our daily life to adapt its products and services AND if it has the ability to execute its ideas.
&lt;br&gt;
Ideas without the ability to execute leads to mess, the ability to execute without the ideas leads to the status quo.
&lt;/p&gt;

&lt;p&gt;
From there I would say that a company must prepare itself on these two dimensions, bring itself the conditions and resources required to identify and to design its digital products and those required to realize them.
&lt;/p&gt;

</content>
    </entry>
    <entry>
        <id>https://www.niceideas.ch/roller2/badtrash/entry/artificial-intelligence-for-banking-fraud</id>
        <title type="html">Artificial intelligence for banking fraud prevention in the digital era</title>
        <author><name>Jerome Kehrli</name></author>
        <link rel="alternate" type="text/html" href="https://www.niceideas.ch/roller2/badtrash/entry/artificial-intelligence-for-banking-fraud"/>
        <published>2018-07-04T15:34:04-04:00</published>
        <updated>2018-07-04T15:34:04-04:00</updated> 
        <category term="Banking" label="Banking" />
        <category term="ai" scheme="http://roller.apache.org/ns/tags/" />
        <category term="artificial-intelligence" scheme="http://roller.apache.org/ns/tags/" />
        <category term="bank" scheme="http://roller.apache.org/ns/tags/" />
        <category term="banking" scheme="http://roller.apache.org/ns/tags/" />
        <category term="banking-fraud" scheme="http://roller.apache.org/ns/tags/" />
        <category term="digital-banking" scheme="http://roller.apache.org/ns/tags/" />
        <summary type="html">
&lt;p&gt;
The digitalization with its changes of means and behaviours and the induced society and industrial evolution is putting increasingly more pressure on banks. 
&lt;br&gt;
Just as if regulatory pressure and financial crisis weren&apos;t enough, banking institutions have realized that they need to transform the way they run their business to attract new customers and retain their existing ones.
&lt;br&gt;
I detailed already this very topic in a former article on this blog: &lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/entry/the-digitalization-challenge-and-opportunities&quot;&gt;The Digitalization - Challenge and opportunities for financial institutions&lt;/a&gt;.
&lt;/p&gt;

&lt;p&gt;
In this regards, &lt;b&gt;Artificial Intelligence&lt;/b&gt; provides tremendous opportunities and very interesting initiatives start to emerge in the big banking institutions.
&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/10fc4c4f-ca5d-44a0-9711-8c90c91a1ba4&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 600px; &quot; alt=&quot;Artificial Intelligence in the Financial Industry&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/10fc4c4f-ca5d-44a0-9711-8c90c91a1ba4&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
In this article I intend to present these three ways along with a few examples and detail what we do at NetGuardians in this regards.
&lt;/p&gt;</summary>
        <content type="html">&lt;!-- Artificial intelligence for banking fraud prevention in the digital era --&gt;

&lt;p&gt;
The digitalization with its changes of means and behaviours and the induced society and industrial evolution is putting increasingly more pressure on banks. 
&lt;br&gt;
Just as if regulatory pressure and financial crisis weren&apos;t enough, banking institutions have realized that they need to transform the way they run their business to attract new customers and retain their existing ones.
&lt;br&gt;
I detailed already this very topic in a former article on this blog: &lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/entry/the-digitalization-challenge-and-opportunities&quot;&gt;The Digitalization - Challenge and opportunities for financial institutions&lt;/a&gt;.
&lt;/p&gt;

&lt;p&gt;
In this regards, &lt;b&gt;Artificial Intelligence&lt;/b&gt; provides tremendous opportunities and very interesting initiatives start to emerge in the big banking institutions.
&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/10fc4c4f-ca5d-44a0-9711-8c90c91a1ba4&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 600px; &quot; alt=&quot;Artificial Intelligence in the Financial Industry&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/10fc4c4f-ca5d-44a0-9711-8c90c91a1ba4&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
In this article I intend to present these three ways along with a few examples and detail what we do at NetGuardians in this regards.
&lt;/p&gt;

&lt;h2&gt;Digital urgency&lt;/h2&gt;

&lt;p&gt;
Since 10 years, since the first Iphone, the banking business is under intensive transformation, like the whole society. The iphone, then all the next generations of smartphones, has allowed the always and everywhere interconnection of everyone, 4 billion people today, more tomorrow. But even more than this interconnection, the real revolution was the user experience offered by these new devices, providing access to vital services at one finger touch away.
&lt;br&gt;
The current generations, millennials, and the rising Z generation, these young people born with a smartphone, do not share the values ​​than their ancestors. These new generations are characterized by their need of absolute, of immediacy, everything and immediately, of individualization, &lt;i&gt;all about me, myself and I&lt;/i&gt;, and of universal service, &lt;i&gt;where I want, when I want and especially how I want&lt;/i&gt;.
&lt;/p&gt;

&lt;p&gt;
As a result, banks, if they want to retain their customers, or seduce these young active people who are coming on the market, must adapt, transform, and digitalize their businesses. This topic is far from new, and the amazing slap given to the banks by the emergence of the fintechs and their cannibalization of the banking business was way enough to create the sense of urgency required to trigger the transformation of banks.
&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/6171b9a1-5ed9-4617-b960-ad0340ce0bb1&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 900px; &quot; alt=&quot;Digital Transformation&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/6171b9a1-5ed9-4617-b960-ad0340ce0bb1&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;


&lt;p&gt;
Today all banks are adapting, developing more personalized and massively online services, meeting the new active force on its privileged channels, mobile first, but also social networks, youtube, etc
&lt;br&gt;
One might want to read my previous article on this very topic: &lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/entry/the-digitalization-challenge-and-opportunities&quot;&gt;The Digitalization - Challenge and opportunities for financial institutions&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
In this race for digital, made vital by the crumbling margins, new technologies are both the source of the challenges and their solution. In this perspective, Artificial Intelligence and advanced algorithms are the next step, the way to scale and have the potential to make banks more innovative and smarter.
To meet the challenges of digital and the demands of this population with new behaviors and uses, but also to take advantage of opportunities related to digitalization, AI proves to be a panacea.
&lt;/p&gt;

&lt;p&gt;
At every level, from financial research to fraud prevention, AI can do better, faster, farther, stronger.
&lt;br&gt;
Today an lot of highly innovative initiatives, taking advantage of the latest advances in artificial intelligence, emerge in the big banks, the most able to consent to the investments needed for the transformation.
&lt;/p&gt;

&lt;p&gt;
These initiatives are mainly around 3 axes:
&lt;/p&gt;

&lt;h2&gt;1. The customer experience&lt;/h2&gt;

&lt;p&gt;
The physical presence vanishes, the contact with a human also and is replaced advantageously, at least for these digital generations, by a computer system: chatbot, personal banking assistant, voice assistant, etc.
&lt;/p&gt;

&lt;p&gt;
Bank of America, for instance, has deployed a virtual assistant, Erica, that interacts with her customers by voice chat or chat and is responsible for answering customers&apos; questions, but who is also able to provide financial advices, recommendations of investment, or to carry out the simplest banking operations such as payments, fund transfers, etc.
These new banking channels are available constantly, everywhere and in various forms, &quot;&lt;i&gt;When I want, where I want and especially as I want.&lt;/i&gt;&quot;
&lt;/p&gt;

&lt;h2&gt;2. Advanced analytics, operational efficiency and service customization&lt;/h2&gt;

&lt;p&gt;
New technologies and machine learning techniques are able to substitute to humans on many analytical tasks in an advantageous way, be it financial research, investment optimization or customer profiling for the personalization of advisory.
&lt;/p&gt;

&lt;p&gt;
UBS, for instance, has developed virtual research agents able to performing investment research tasks, from analyzing market data to company valuation at a level comparable to human analysts but much faster.
&lt;br&gt;
RBS has implemented a robot for the loan evaluation process able to approve a credit in 45 minutes, instead of several days as previously required.
&lt;/p&gt;

&lt;h2&gt;3. Prevention of bank ingfraud and anti-money-laundering&lt;/h2&gt;

&lt;p&gt;
The new channels to which banks must subscribe, the new usages of customers and the acceleration of business cause an increase of the attack surface of banks. These uses especially, and the behaviors of these digital generations, &lt;i&gt;share everything with everyone&lt;/i&gt;, &lt;i&gt;all about myself&lt;/i&gt;, my life online, social networks where everything is shared, facilitate all forms of attacks, from social engineering to theft of eBanking session.
&lt;/p&gt;

&lt;p&gt;
Finally, the new technologies, on one side, since they offer new means to cyber-criminals, and the economic context on the other side, which makes the criminal enterprise attractive to a number of engineers and other qualified computer scientists, cause an explosion of fraud cases, increasingly external.
&lt;/p&gt;

&lt;h2&gt;AI ​​against banking fraud, a bit of history&lt;/h2&gt;

&lt;p&gt;
In the early 2000s, the detection of banking fraud relies mostly on internal control and auditing. The effectiveness of these approaches is pretty low because of their inherent limitations. Working by sampling, internal control and audit leave a lot of frauds pass through the cracks. Some additional securities are implemented within the bank&apos;s operational information system, but here too their efficiency is quite relative.
&lt;br&gt;
At that time, the subprime crisis and the southern european countries sovereign debt crisis have not yet occurred, the margins are wide, people trust the banks and overall, they feel safe. The fight against fraud is not perceived as a priority.
&lt;/p&gt;

&lt;p&gt;
In the second half of the 2000s, the maturity of cyber-criminals, their organization and the complexity of their attacks explode, multiplying the losses associated with fraud.
&lt;br&gt;
Banks react by massively deploying specific analytical systems aimed at detecting fraud. At that time, these systems are rule engines seeking behavioral patterns or pre-established and well-determined conditions or patterns in audit trails of the information system.
&lt;/p&gt;

&lt;p&gt;
Today, the complexity of attacks and the means of cyber-criminals are such that these rule engines are defeated. We can mention the computer crash of the central bank of Bangladesh, where cyber-criminals, safe and untraceable, managed to steal $81 million or the Retefe worm, which despite the means deployed still manages to divert about fifty ebanking sessions every day, today, in Switzerland.
&lt;br&gt;
The rule engines are outdated for various reasons, including changes in usage, their multiplication and the complexity of bank customer behavior. How can the same set of rules effectively protect customers with different uses and behaviors, for example a simple saver on one side and an institutional account used to pay the suppliers of a company on another side?
&lt;/p&gt;

&lt;p&gt;
Today, banks no longer have any choice and deploy large-scale AI techniques to protect their Assets Under Management and their customers.
&lt;/p&gt;

&lt;h2&gt;Return of Experience, our approach at NetGuardians&lt;/h2&gt;

&lt;p&gt;
In the first half of the current decade, we started at NetGuardians to develop our first AI approaches, leveraging the analytics capabilities of our Big Data platform. These approaches consist in analyzing in real time all the bank transactions, with a depth of analysis of several years, to let the machine learn the transactional behavior of both the bank&apos;s customers (external fraud) and its employees (internal fraud). With this in-depth understanding of the habits, behaviors and practices of these two populations, the machine can qualify each and every transaction as legitimate or potentially fraudulent, and, if necessary, block it before the funds have left the bank.
&lt;/p&gt;

&lt;p&gt;
We then introduced other machine learning algorithms to dynamically build customers peer-groups with similar behavior, allowing us to compare an individual transaction not only with the profile of a specific customer but also with its peer group, and reducing thus the irrelevant alerts, these false-positives which must nonetheless be analyzed.
Later, we focused on broadening the vision of AI by trying to make it understand all patterns of interaction between humans, employees or customers, and the information system of the bank, by analyzing not only transactions but also all other types of interaction.
&lt;/p&gt;

&lt;p&gt;
Today we are able to effectively block each suspicious transaction or activity, while drastically reducing the number of cases to be analyzed, these infamous false positives, and also the time required for the investigation of a case by the teams of the bank.
&lt;/p&gt;

All of this is explained in details in yet another article on this blog: &lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/entry/artificial-intelligence-for-fraud-prevention&quot;&gt;Artificial Intelligence for Banking Fraud Prevention&lt;/a&gt;

&lt;h2&gt;Customer experience, the machine in contact with customers&lt;/h2&gt;

&lt;p&gt;
The next step consists in putting the IA directly in touch with the bank&apos;s customers. When a suspicious transaction is detected, instead of mandating a bank anti-fraud employee to analyze the situation, which investigation usually ends up with a call to the customer for re-confirmation, the future is to let the machine contact the customer itself, by means of an application installed on the mobile of the customer, or by means of a voice chatbot able to contact him and speak to him to obtain directly the confirmation required for the validation of the transaction.
&lt;/p&gt;

&lt;p&gt;
The benefits are numerous. For the customers of the banks it is a question of bringing this &quot;callback&quot; as close as possible to the input of the transaction, from a few hours today to a few seconds in the future. For the banks it is a question of reducing the costs of intervention while eliminating the frauds by systematically delegating the re-confirmation of the suspicious transactions to the customer.
&lt;/p&gt;

&lt;p&gt;
In the end, the bank protects its reputation, its Asset Under Management, the data of its customers, but also meets them - meet the challenges of the digital - while reducing its operational costs - benefit from its opportunities.
&lt;/p&gt;
</content>
    </entry>
    <entry>
        <id>https://www.niceideas.ch/roller2/badtrash/entry/artificial-intelligence-for-fraud-prevention</id>
        <title type="html">Artificial Intelligence for Banking Fraud Prevention</title>
        <author><name>Jerome Kehrli</name></author>
        <link rel="alternate" type="text/html" href="https://www.niceideas.ch/roller2/badtrash/entry/artificial-intelligence-for-fraud-prevention"/>
        <published>2018-04-30T08:57:44-04:00</published>
        <updated>2018-07-04T15:30:11-04:00</updated> 
        <category term="Banking" label="Banking" />
        <category term="ai" scheme="http://roller.apache.org/ns/tags/" />
        <category term="artificial-intelligence" scheme="http://roller.apache.org/ns/tags/" />
        <category term="bank" scheme="http://roller.apache.org/ns/tags/" />
        <category term="banking" scheme="http://roller.apache.org/ns/tags/" />
        <category term="big-data" scheme="http://roller.apache.org/ns/tags/" />
        <category term="finance" scheme="http://roller.apache.org/ns/tags/" />
        <category term="fraud-prevention" scheme="http://roller.apache.org/ns/tags/" />
        <category term="netguardians" scheme="http://roller.apache.org/ns/tags/" />
        <summary type="html">&lt;p&gt;
In this article, I intend to present my company&apos;s - NetGuardians - approach when it comes to deploying Artificial Intelligence techniques towards better fraud detection and prevention.
&lt;br&gt;
This article is inspired from various presentations I gave on the topic in various occasions that synthesize our experience in regards to how these technologies were initially triggering a lot of skepticism and condescension and how it turns our that they are now really mandatory to efficiently prevent fraud in financial institutions, due to the rise of fraud costs, the maturity of cybercriminals and the complexity of attacks.
&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/123503c0-bec6-43d3-95e5-5ba6eea322f6&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 250px;&quot; alt=&quot;Artificial Intelligence for Fraud Prevention&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/123503c0-bec6-43d3-95e5-5ba6eea322f6&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;


&lt;p&gt;
Here financial fraud is considered at the broad scale, both internal fraud, when employees divert funds from their employer and external fraud in all its forms, from sophisticated network penetration schemes to credit card theft. 
&lt;br&gt;
I don&apos;t have the pretension to present an absolute or global overview. Instead, I would want to present things from the perspective of NetGuardians, from our own experience in regards to the problems encountered by our customers and the &lt;b&gt;how Artificial Intelligence helped us solve these problems&lt;/b&gt;.
&lt;/p&gt;</summary>
        <content type="html">&lt;!-- AI for Fraud Prevention --&gt;

&lt;p&gt;
In this article, I intend to present my company&apos;s - NetGuardians - approach when it comes to deploying Artificial Intelligence techniques towards better fraud detection and prevention.
&lt;br&gt;
This article is inspired from various presentations I gave on the topic in various occasions that synthesize our experience in regards to how these technologies were initially triggering a lot of skepticism and condescension and how it turns our that they are now really mandatory to efficiently prevent fraud in financial institutions, due to the rise of fraud costs, the maturity of cybercriminals and the complexity of attacks.
&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/123503c0-bec6-43d3-95e5-5ba6eea322f6&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 250px;&quot; alt=&quot;Artificial Intelligence for Fraud Prevention&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/123503c0-bec6-43d3-95e5-5ba6eea322f6&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;


&lt;p&gt;
Here financial fraud is considered at the broad scale, both internal fraud, when employees divert funds from their employer and external fraud in all its forms, from sophisticated network penetration schemes to credit card theft. 
&lt;br&gt;
I don&apos;t have the pretension to present an absolute or global overview. Instead, I would want to present things from the perspective of NetGuardians, from our own experience in regards to the problems encountered by our customers and the &lt;b&gt;how Artificial Intelligence helped us solve these problems&lt;/b&gt;.
&lt;/p&gt;

&lt;p&gt;
This article is available as a slideshare presentation here 
&lt;a href=&quot;https://www.slideshare.net/JrmeKehrli/artificial-intelligence-for-banking-fraud-prevention-95475760&quot;&gt;https://www.slideshare.net/JrmeKehrli/artificial-intelligence-for-banking-fraud-prevention-95475760&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
A video of the speech is available on youtube:
&lt;/p&gt;

    &lt;!-- 1. The &lt;iframe&gt; (and video player) will replace this &lt;div&gt; tag. --&gt;
    &lt;div id=&quot;player_aiii&quot; style=&quot;max-width: 100%;&quot;&gt;&lt;/div&gt;

    &lt;script&gt;

        player = new YT.Player(&apos;player_aiii&apos;, {
          height: &apos;360&apos;,
          width: &apos;640&apos;,
          videoId: &apos;QZbgBvZgFkA&apos;
        });

    &lt;/script&gt;


&lt;h2&gt;1. Early times, the 2000s&lt;/h2&gt;

&lt;p&gt;
Before 2000, banking institutions are only poorly equipped when it comes to fight financial fraud.
&lt;/p&gt;

&lt;p&gt;
For most of it, detecting fraud cases relies on manual verification and tests performed by 
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Internal Control&lt;/li&gt;
&lt;li&gt;Internal Audit or&lt;/li&gt;
&lt;li&gt;External Audits&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;
And unfortunately, this implies a lot of issues:
&lt;/p&gt; 

&lt;ul&gt;
&lt;li&gt;
By working with samples only, Internal control and Audit let a lot of fraud cases pass through the cracks and are found only very late or even never.
&lt;/li&gt;
&lt;li&gt;
Analysis are cumbersome and most often finding fraud cases is not the first and foremost objective of the auditors.
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;
Now of course, the most essential security rules and checks are implemented within the Operational Information System or in the form of procedures to be respected and audited.
&lt;br&gt;
Also, some banking institutions already have an Analytics System - or Business Intelligence - at the time and some ad&apos;hoc reports are implemented on top of it that target fraud detection.
&lt;/p&gt;

&lt;p&gt;
In these early times, neither the subprime crisis nor the south European countries debt crisis  happened. Margins are important, people trust banks and all in all bankers are happy people.
&lt;br&gt;
Fraud cases, mostly internal, exist of course but financial institutions feel rather safe,
&lt;/p&gt;

&lt;h2&gt;2. The late 2000s - fraud costs rise&lt;/h2&gt;

&lt;p&gt;
In the second half of the 2000&apos;s, however, the costs linked to fraud, increasingly external, the complexity of attacks and the maturity of attackers rise.
&lt;br&gt;
Banking institutions react by deploying quite massively and for the first time specific analytics systems aimed at detecting banking fraud, both external and internal.
&lt;/p&gt;

&lt;p&gt;
At this time, these systems are rules-engines that work by checking or searching pre-defined and well defined conditions within the data extracted from the information system.
&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/3094a30f-a2f6-4171-acc9-3b658993edf6&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 250px;&quot; alt=&quot;Rules Engines&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/3094a30f-a2f6-4171-acc9-3b658993edf6&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
In a way these systems can be considered as simple extensions of the security checks and rules implemented directly within the operational information system. These solutions come most of the time from the AML - Anti Money Laundering - World, their editors having understood that banking fraud was a an interesting opportunity to extend their sales.
&lt;/p&gt;

&lt;p&gt;
A very simple rule example would be as follows:
&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/f8d2142b-5976-4a17-a905-c1d5b89089b7&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 450px;&quot; alt=&quot;Rule Example&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/f8d2142b-5976-4a17-a905-c1d5b89089b7&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
At this time, a first set of papers have already been published on the success, still somewhat  relative in this early days, of some Machine Learning approaches  implemented towards  banking fraud detection.
&lt;br&gt;
But Machine Learning and Artificial Intelligence are considered with a lot of condescension and skepticism.
&lt;br&gt;
Bankers and their engineers are not willing to consider an approach whose interpretation of results is deemed fuzzy. 
&lt;/p&gt;

&lt;p&gt;
NetGuardians has been founded at these times and the NetGuardians platform could be seen then as a gigantic rule engine.
&lt;/p&gt;

&lt;h2&gt;3. The reality of fraud changes dramatically&lt;/h2&gt;

&lt;p&gt;
Unfortunately, the reality of fraud and financial cybercrime evolved fast and dramatically. 
&lt;/p&gt;
Let me give you two examples
&lt;/p&gt;

&lt;h3&gt;3.1 The Bangladesh Bank heist&lt;/h3&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/efa6f623-52fb-4999-bea1-263235c588ac&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 500px;&quot; alt=&quot;The Bangladesh Bank heist - initial&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/efa6f623-52fb-4999-bea1-263235c588ac&quot; /&gt;
&lt;/a&gt;&lt;br&gt;
&lt;div class=&quot;centered&quot;&gt;
(Source : &lt;a href=&quot;https://www.bankinfosecurity.com/bangladeshi-bank-hackers-steal-100m-a-8958&quot;&gt;https://www.bankinfosecurity.com/bangladeshi-bank-hackers-steal-100m-a-8958&lt;/a&gt;)
&lt;/div&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
In February 2016, a group that we deem around 20 persons, composed by financial experts, software engineers and hackers have attacked the information system of the Bangladesh Central Bank.
&lt;br&gt;
They manage to compromise the bank internal gateway to the SWIFT Network. The SWIFT network is the international banking messaging network used by banks to communicate and transfer money through electronic wire. The pirates used the SWIFT network to withdraw money from the Bangladesh Central bank VOSTRO account by the US Federal Reserve.
&lt;br&gt;
They manage to transfer 81 millions USD to the Philippines and used the Philippino casinos to launder the stolen funds.
&lt;/p&gt;

&lt;p&gt;
As a sidenote, the fact that they have stolen &quot;only&quot; 81 million USD is an amazing luck for the bank, or rather an amazing bad luck for the cybercriminals. 
&lt;br&gt;
An Anti-Money laundering system - &lt;i&gt;rule-based&lt;/i&gt; - deployed in the US federal Reserve for Anti-Money Laundering blocked the 6th transaction because the beneficiary name contained the word &quot;Jupiter&quot;. Jupiter was on a sanction screening list in the US because a cargo ship navigating under Iranian flag was named &quot;Jupiter&quot; something. The 6th transaction being blocked, all the further ones, a little less than thirty, have been blocked as well.
&lt;br&gt;
But 5 transactions pass through before the 6th has been blocked by the Fed and went further through the correspondent banking network.
&lt;br&gt;
Another transaction has been blocked by the Deutsche Bank, a routing bank, because of a typo: &quot;Shilka Fandation&quot; instead of &quot;Shilka Fundation&quot;.
&lt;br&gt;
So only 4 transactions our of 35 successfully arrived to the Philippines and as such the total loss have been reduced from 951 million USD initially intended to &quot;only&quot; 81 millions USD.
&lt;/p&gt;

&lt;!--
&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/98aff47d-08ee-4694-8d02-a8bdd21b0387&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 350px;&quot; alt=&quot;The Bangladesh Bank heist - optimistic responsibles&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/98aff47d-08ee-4694-8d02-a8bdd21b0387&quot; /&gt;
&lt;/a&gt;&lt;br&gt;
&lt;div class=&quot;centered&quot;&gt;
(Source : &lt;a href=&quot;http://www.dhakatribune.com/business/banks/2017/03/28/muhith-stolen-heist-money-must-recovered/&quot;&gt;http://www.dhakatribune.com/business/banks/2017/03/28/muhith-stolen-heist-money-must-recovered/&lt;/a&gt;)
&lt;/div&gt;
&lt;/div&gt;
&lt;br&gt;
--&gt;

&lt;p&gt;
As a fun note, a few week after the heist, all the responsibles of the financial institutions involved, the US Fed Reserve, the Bangladesh Central Bank, even the finance minister of the Philippines were all convinced that the money - or at least a significant part of it - would be recovered and that the cybercriminals would be caught. 
&lt;/p&gt;


&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/fd3ece3c-1f56-4f0a-8e77-39984a17b3ff&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 500px;&quot; alt=&quot;The Bangladesh Bank heist - 2 years after&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/fd3ece3c-1f56-4f0a-8e77-39984a17b3ff&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
Two years after, today, we know that we will never recover these funds.
&lt;br&gt;
The attacker are safe, untraceable and will never be found. We believe that this is a group of about 20 persons who worked on the heist preparation for about 18 months. 81 million USD is a pretty number.
&lt;/p&gt;

&lt;p&gt;
Now you think ... But this is Bengladesh ... right ?
&lt;br&gt;
Here we are in Europe ... Even better, here we are in Switzerland ... right ?
And in Switzerland we don&apos;t really feel concerned by the numerous security holes in the Bangladesh Central Bank Information System.
So let me give you another example...


&lt;h3&gt;3.2 The retefe Worm&lt;/h3&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/4d566e47-ae5f-4cab-b540-801a0d685742&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 600px;&quot; alt=&quot;The Retefe Saga&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/4d566e47-ae5f-4cab-b540-801a0d685742&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
Quoting &lt;a href=&quot;https://www.govcert.admin.ch/blog/33/the-retefe-saga&quot;&gt;https://www.govcert.admin.ch/blog/33/the-retefe-saga&lt;/a&gt;:
&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;div class=&quot;centered&quot;&gt;
&lt;p&gt;
&quot;This threat actor has already been around for more than four years...
&lt;br&gt;
Their goal remains the same: committing e-banking fraud in Switzerland and Austria. 
&lt;/p&gt;
&lt;p&gt;
In August 2017, Retefe still redirects between 10 and 90 e-banking sessions every day.&quot;
&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;

&lt;p&gt;
The Retefe worm is a worm developed by a team of cybercriminals targeting specifically the ebanking platforms of small and mid size Austrian And Swiss Banking Institutions.
&lt;br&gt;
The worm is used by the thieves to take control of the victim&apos;s ebanking sessions and to submit fraudulent transactions to the system.
&lt;/p&gt;

&lt;p&gt;
This worm is 4 years old.
&lt;br&gt;
For 4 years, fraudsters keep on updating it, modifying it and extending it to counter the anti-viruses software and the specific protections put in place by the banks.
&lt;br&gt;
This worm is 4 years old and nevertheless, as pointed out by the Computer Security Section of the Federal Finance Separtment, it is still making today between 10 and 90 victims in Switzerland and Austria.
&lt;/p&gt;

&lt;p&gt;
Today, in the swiss banks ...
&lt;/p&gt;

&lt;p&gt;
My conclusion from these examples is as follows:
&lt;br&gt;
Today, fraudsters and cybercriminals are professionals. The time when fraud was mostly coming from little hackers working in their garage or back-office employees disappointed by their bonus, is over. Today, attackers are professionals who have industrialized their methods.
&lt;/p&gt;

&lt;h2&gt;4. Facts and Projections&lt;/h2&gt;

&lt;p&gt;
Some facts and projections to understand what reality banking institutions are facing nowadays...

&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/0c3a4d41-4d11-4c18-b031-0f3f9d5580d8&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 700px;&quot; alt=&quot;Facts and projections&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/0c3a4d41-4d11-4c18-b031-0f3f9d5580d8&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
In frebruary 2016, a group of cybercriminals managed to steal 81 million USD from the VOSTRO account of the Bangladesh Central Bank by the US federal Reserve
&lt;br&gt;
This is one of the biggest bank heist in history and the most impressive cybercrime ever
&lt;/p&gt;

&lt;p&gt;
In a report called &quot;&lt;i&gt;Report to the nations&lt;/i&gt;&quot;, the international association of Fraud Examiners estimated that in 2017, the total cost of fraud has been 3000 billions USD.
&lt;br&gt;
In banking fraud, a big part of this amount is related to internal fraud, when bank employees divert funds from their employer.
&lt;br&gt;
In Switzerland, of course, thanks to the maturity of the banking business as well as the security checks and practices put in place in banking institutions, internal fraud is marginal, compared to external fraud. But external fraud is a cruel reality, think of the Retefe Worm.
&lt;/p&gt;

&lt;p&gt;
Finally, Cyber Security ventures estimates that by 2021 the total cost of cybercrime will reach 6000 billion USD.
&lt;/p&gt;

&lt;p&gt;
The reality to which banks are confronted nowadays is this one.
&lt;/p&gt;

&lt;h2&gt;5. Historical systems are beaten&lt;/h2&gt;

&lt;p&gt;
The principal implication of this reality, the problem which banking institutions are confronted to nowadays is that historical systems deployed to counter fraud - rules engines - are beaten.
&lt;/p&gt;

&lt;p&gt;
Let&apos;s assume that a banking institution wants to define a set of rules aimed at detecting when an attacker diverts a customer account to issue fraudulent transactions.
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
Imagine the situation of a first customer, someone such as myself, using his ebanking account to pay his loan at the end of the month, his mortgage, his taxes, telephone bills, etc.
&lt;br&gt;
In my case, a big transaction withdrawing 20 k CHF from my account for a beneficiary located in Nigeria should raise an alert. It&apos;s clearly an anomaly, being completely outside of my usual habits and behaviour.
&lt;/li&gt;
&lt;li&gt;
Imagine now the situation of a another customer, a responsible of acquisitions for a big corporation, a frequent traveler, spending most of his time abroad and using the corporate account to pay big amounts to providers all over the world.
&lt;br&gt;
In the case of this second customer, it is on the contrary a small payment benefiting to a counterparty in Switzerland that would be the anomaly and should raise an alert.
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;
If one wants to detect anomalies for these two different situations, one would end up implementing a completely different set of rules for the two distinct customers.
&lt;br&gt;
And this is impossible.
&lt;/p&gt;

&lt;p&gt;
Every bank customer, and even user up to a certain level, is different.
&lt;br&gt;
Representing everyone&apos;s own and private situations with rules would require to implement and manage hundreds of thousands of rules on the system, which, obviously, is impossible.
&lt;/br&gt;
Only the most common set of rules can be implemented, which means that:
&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;A lot of frauds pass through the cracks.&lt;/li&gt;
&lt;li&gt;In addition, in order to catch the biggest frauds, the limits enforced by the rules have to be very low, which has the consequence of flagging a lot of cases to be analyzed - the so called false-positives - requiring an army of analysts to be reviewed and discarded.
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;
The direct consequences for our customers are as follows:
&lt;p&gt;

&lt;ul&gt;
&lt;li&gt;
Financial impacts: frauds must be reimbursed. And in addition these analysts spending their days discarding &lt;i&gt;false positives&lt;/i&gt; must be paid.
&lt;/li&gt;
&lt;li&gt;
Reputation impacts: a fraud case being communicated in the newspapers is a nightmare for banking institutions. Even without a large scale communication, customers impacted by fraud will loose faith in their bank. 
&lt;br&gt;
Then I do not need to explain the consequences that the thousands of papers published on the Bangladesh Bank heist had on the Bangladesh central bank.
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/eef79897-85b6-453d-825f-e6a3b40983aa&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 600px;&quot; alt=&quot;Consequence : rules engines are beaten&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/eef79897-85b6-453d-825f-e6a3b40983aa&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
Rule-based systems are beaten today.
&lt;br&gt;
Something else is required to protect efficiently Banking institutions from banking fraud.
&lt;/p&gt;


&lt;h2&gt;6. Artificial Intelligence comes in help&lt;/h2&gt;

&lt;p&gt;
Artificial Intelligence provides the solution to this problem.
&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/39bccb86-968e-4c78-af5e-d1016ede0ef1&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 300px;&quot; alt=&quot;AI helps&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/39bccb86-968e-4c78-af5e-d1016ede0ef1&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;


&lt;p&gt;
In 2016, we started at NetGuardians to integrate the first advanced algorithms, so called Machine Learning algorithms, in our systems.
&lt;/p&gt;

&lt;p&gt;
We let an Artificial Intelligence analyze continuously the history of billions of transactions in the system and learn about individuals habits and behaviours. 
&lt;br&gt;
With big data technologies, AI can analyze a very extended depth of history and build dynamic profiles for each and every individual capturing his transactional behaviour.
&lt;br&gt;
Individuals can be both Customer and Users (Internal Employees):
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Profiling customers is required for both Internal and External Fraud.&lt;/li&gt;
&lt;li&gt;Profiling users is required for Internal Fraud. &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;
Big Data technologies are key to maintain these profiles up-to-date in real time by tracking each and every interaction between the user and the bank systems.
&lt;br&gt;
In addition to a financial transaction direct characteristics such as the beneficiary, the target bank country, the amount of the transaction, its currency, etc., the machine can correlate a lot of indirect characteristics, such as where in the world was located the ATM where the user withdrawn money from, where was he connected to his ebanking session, etc.
&lt;/p&gt;

&lt;p&gt;
For each and every individual a dynamic and up to date profile captures his behaviour and his habits.
&lt;br&gt;
Then, each and every financial transaction, regardless of its type, it being a security trade order, an ATM withdrawal or an ebanking payment, is compared against the user profile and a risk score is computed.
&lt;br&gt;
Based on this risk score, the machine eventually decides whether the transaction is genuine or not and whether it requires further investigation by a human analyst within the bank.
&lt;/p&gt;

&lt;p&gt;
The gains for our customers of this new approach, based on customer profiling done by AI, is striking.
&lt;br&gt;
It has been a game changing shift of paradigm.
&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/11b20bad-1ee4-4606-b564-66dc59e27852&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 600px;&quot; alt=&quot;Consequences and benefits of AI&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/11b20bad-1ee4-4606-b564-66dc59e27852&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
In the banking institutions where we can deploy this new generation approach, we almost eliminate the amount of fraud cases passing through the cracks.
&lt;br&gt;
And that, by still reducing to 1/3 of what it was before the number of cases flagged by the system to be reviewed by an analyst or fraud investigator (most of them being the so-called false positives).
&lt;br&gt;
Not only the amount of cases, but the amount of time required to investigate a case could be reduced by 80% by having the machine presenting the profile of the customer and how the individual transaction deviates from it with relevant and meaningful visualization techniques.
&lt;br&gt;
Finally, the number of re-confirmation asked to customers could be reduce to 1/4.
&lt;/p&gt;

&lt;p&gt;
Reducing the time required to investigate a case in addition to the amount of cases to be investigated has a direct financial impact: analysts spend less time investigating such cases and can focus on task with more added value. Drastically reducing fraud cases passing through also has obvious financial impacts.
&lt;br&gt;
Now all of this, especially reducing the number of times a re-confirmation is asked to customers has positive impacts on reputation
&lt;/p&gt;

&lt;p&gt;
Now working on a per-customer basis is sometimes still sub-optimal. Sometimes a genuine transaction is always very unusual on a per-customer basis and it is required to broaden the view of the Artificial Intelligence.
&lt;br&gt;
Let me give you an example.
&lt;br&gt;
Let&apos;s imagine that tomorrow I buy a new Audi. That would be a transaction of 60 kCHF leaving my account for a beneficiary - Amag Audi Switzerland - that I never used before. Such a transaction, new beneficiary and huge amount is completely outside of my profile.
&lt;br&gt;
Based on this, the AI will decide to block the transaction, requiring a further validation from my end which will annoy me.
&lt;br&gt;
So how can we avoid that ?
&lt;br&gt;
If we look more carefully and globally at the transactions of this kind, big amounts benefiting to Amag Audi Swritzerland, among the customers with same profiles as myself, are quite usual.
&lt;/p&gt;

&lt;p&gt;
The machine needs a broader view to understand that this transaction is not unusual.
&lt;/p&gt;

&lt;h2&gt;7. The Machine can do better&lt;/h2&gt;

&lt;p&gt;
The machine can look at the big picture and analyze transactions at a broader scale.
&lt;br&gt;
Recall the Audi example. When such a transaction is very unusual for a specific customer, looking at other customers with similar conditions, habits and behaviour is required. 
&lt;/p&gt;

&lt;p&gt;
And here again AI comes in help.
&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/123503c0-bec6-43d3-95e5-5ba6eea322f6&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 250px;&quot; alt=&quot;Artificial Intelligence for Fraud Prevention&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/123503c0-bec6-43d3-95e5-5ba6eea322f6&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
AI can analyze behaviours and habits of customers and group together the people with same patterns. People that are the same age, same wealth level, same origins, live in the same region, etc. will have a strong tendency to behave the same: for instance drive the same kind of car, such as an Audi, live in a appartments of the same size, pay the same amount of telephone bills at the end of the month, etc.
&lt;br&gt;
The machine can analyze customer activities and transactions on a very large scale and &lt;i&gt;cluster&lt;/i&gt; together customers with same behaviour.
&lt;br&gt;
Then, these groups can be profiled just as individuals.
&lt;br&gt;
And finally, a transaction can be scored against the &lt;b&gt;customer group profile&lt;/b&gt; in addition to the &lt;b&gt;customer profile&lt;/b&gt;.
&lt;/p&gt;

&lt;p&gt;
Recalling the Audi example. When scoring this specific payment against the individual profile, the transaction will be flagged as suspicious. 
&lt;br&gt;
Scoring it against the group profile will clearly indicate that it&apos;s a genuine transaction. People buy new cars every day, especially in Switzerland
&lt;/p&gt;

&lt;p&gt;
With this new approach, looking at the broader scale and comparing customers with each others instead of only scoring transactions in the individual context of a customer, we could improve our fraud detection system further.
&lt;/p&gt;

&lt;p&gt;
The number of cases to be analyzed (false positives) could be reduced further.
&lt;br&gt;
In addition, the groups and their profiles happen to be an invaluable source of information for other use cases and concerns within the bank such as marketing, trend analysis, etc.
&lt;br&gt;
Of course reducing the number of cases to be handled by the investigation team has a direct impact on operational efficiency and induces further financial gains
&lt;/p&gt;

&lt;p&gt;
Now all of this, transaction scoring and customer clustering works amazingly, but it works after the facts. The transaction has been input in the system and if we are not fast enough, depending on how we integrate within the bank information system, we can be too late, doing only fraud detection and not fraud prevention. 
&lt;br&gt;
Our idea from here was:
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
What if we could analyze the User or customer activities even before the transaction is input one the system and detect fraud before it happens ?
&lt;/li&gt;
&lt;li&gt;
What if we could interpret weak signals coming from the analysis of how the Customer interacts with the banking information system to qualify him as legitimate or potentially fraudulent ?
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;
All of this require completely different analysis techniques.
&lt;/p&gt;


&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/10b2587b-3006-451a-9237-fb614aafdc96&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 600px;&quot; alt=&quot;Consequences and benefits of AI - further improvements&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/10b2587b-3006-451a-9237-fb614aafdc96&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;


&lt;h2&gt;8. Even further&lt;/h2&gt;

&lt;p&gt;
Let me give you a simple example of what I mean by analyzing a customer&apos;s interaction with the banking Information system.
&lt;br&gt;
The interactions of a customer with the ebanking application is the simplest example I can come up with.
&lt;/p&gt;


&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/dec86cd1-4705-4b1c-bc41-0b86f1658adf&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 600px;&quot; alt=&quot;Different ebanking session&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/dec86cd1-4705-4b1c-bc41-0b86f1658adf&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
Imagine the situation of a genuine user of the ebanking platform whose behaviour when inputting is payments is always the same:
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;He logs in the ebanking platform.&lt;/li&gt;
&lt;li&gt;He looks at his account balance.&lt;/li&gt;
&lt;li&gt;He performed all his payment, from input to validation, many of them.&lt;/li&gt;
&lt;li&gt;He checks his pending orders, making sure he missed none of them.&lt;/li&gt;
&lt;li&gt;He logs out the platform.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;
Now if a worm hijacks the ebanking session, the worm will do none of that:
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The worm will likely go directly from login to payment input, validation, then logout.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;
Here I am only showing transitions but one can also consider User think time, keyboard stroke speed, etc.
&lt;/p&gt;

&lt;p&gt;
AI can analyze all this behaviour and activity trails a user or customer leaves on the banking information system and build a probabilistic model capturing this behaviour as a succession of interactions.
&lt;br&gt;
Then, when an individual action is performed, the machine can compute the likelihood of that action to be performed by a legitimate user or an attacker based on the &lt;i&gt;path-to-action&lt;/i&gt;.
&lt;br&gt;
And here as well, AI can build profiles of these activities and their likelihood both at individual level and group level through clustering techniques.
&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/fa9fc0a1-f96e-4b7a-b105-62417ccb10b6&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 250px;&quot; alt=&quot;Artificial Intelligence for interactions monitoring&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/fa9fc0a1-f96e-4b7a-b105-62417ccb10b6&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
With this kind of analysis, by looking at all the interactions of the users or customers with the banking information systems, AI can look at all individual events and qualify these interactions as legitimate or suspicious regardless of the financial transactions being input or not on the system.
&lt;/p&gt;

&lt;p&gt;
AI can detect a fraud, or the intention to commit a fraud, even before a transaction is input on the system, by analyzing the user or customer activity, in the form of its interactions with the Banking Information System, before inputing the transaction.
&lt;br&gt;
In addition, by analyzing the behaviour of the customer as a whole, AI can qualify his interaction session (ebanking, mobile banking, PSD2, etc.) as legitimate or suspicious and kill the session in case of a doubt, thus protecting the information he sees and protecting his privacy in addition to his assets.
&lt;br&gt;
Finally, all this understanding of the user or customer habits and behaviour can be used to design even more advanced transaction scoring models.
&lt;/p&gt;

&lt;p&gt;
This ability to detect fraud cases before they happen lead to further improvement of the operational efficiency and operational security of the banking institution.
&lt;br&gt;
Protecting the customers privacy in addition to their assets is important to protect the reputation of a financial institution. This is especially important for private banking institutions.
&lt;/p&gt;

&lt;p&gt;
With «&lt;i&gt;AI vs AI&lt;/i&gt;», I wanted to illustrate the current research topics we are working on today at NetGuardians to improve our algorithms further.
&lt;br&gt;
In a few words, we see today that cybercriminals are increasingly using advanced algorithms on their end to study the banks attack surface and discover means to attack the banks and their customers.
&lt;br&gt;
We are in a &lt;i&gt;&quot;cat and mouse&quot;&lt;/i&gt; game where attackers attempt to counter the security systems put in place by banking institutions, which in their turn deploy new forms of algorithms and intelligence to protect them further.
&lt;br&gt;
I can only be looking forward to telling you more on this matter in a near future...
&lt;/p&gt;


&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/34b2d625-d85d-4dc7-82f5-d9174ca254ee&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 600px;&quot; alt=&quot;Consequences and benefits of AI - final improvements&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/34b2d625-d85d-4dc7-82f5-d9174ca254ee&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;


&lt;h2&gt;9. Conclusion&lt;/h2&gt;

&lt;p&gt;
Our own experience and conclusion with AI technologies and it&apos;s concrete application on our use cases is striking.
&lt;/p&gt;

&lt;p&gt;
Introducing advanced algorithms, machine learning and advanced analytics techniques in our use cases has been key to help us improve the way we secure financial institutions and their customers.
&lt;br&gt;
We could:
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
Reduce the fraud cases passing through and almost eliminate them.
&lt;/li&gt;
&lt;li&gt;
Reduce the number of cases to be analyzed and make the detection system a lot more relevant.
&lt;/li&gt;
&lt;li&gt;
Drastically reduce the amount of time required to investigate a case.
&lt;/li&gt;
&lt;/ul&gt;


&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/40057d11-9308-464e-b008-b3e3b9f332c5&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 800px;&quot; alt=&quot;Conclusion - Reminder on benefits&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/40057d11-9308-464e-b008-b3e3b9f332c5&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
Today, at our customers, Artificial Intelligence monitors every single interaction between individuals, both customers or employees, and the information system, to qualify their actions as legitimate or fraudulent, in addition to analyzing with highly sophisticated models financial transactions input in the system.
&lt;br&gt;
Today our reality is as follows: &lt;b&gt;Artificial intelligence monitors human behavior on a large scale to secure banks and their customers.&lt;/b&gt;
&lt;/p&gt;

&lt;p&gt;
But Science Fiction advances much faster than reality. Regarding artificial intelligence, the collective imagination, fed by Musk and Hollywood, is way ahead of reality.
&lt;br&gt;
In the public collective imagination, artificial intelligence today generates quite a lot of fantasies.
&lt;/p&gt;

&lt;p&gt;
So let&apos;s agree on something if you do not mind.
&lt;br&gt;
If one calls &lt;b&gt;weak artificial intelligence&lt;/b&gt;, a computer solution able to solve a problem in a strict context, to optimize a solution or a mathematical function, or to look for an answer to a question in a strict context, one calls a &lt;b&gt;strong artificial intelligence&lt;/b&gt; an intelligence able to argue, contextualize or to show sensitivity or initiative.
&lt;br&gt;
If progress in weak artificial intelligence is today very fast and very impressive, we do not have the slightest little trace of a proof that would allow us to believe one day in the emergence of a strong artificial intelligence.
Strong artificial intelligence is science fiction.
&lt;/p&gt;

&lt;p&gt;
The problem is that approach names like &lt;i&gt;Neural Network&lt;/i&gt; are generating a lot of fantasy in the public imagination who takes this name literally.
&lt;br&gt;
With neural networks, the public imagines a digital brain, whereas the reality is that of &lt;i&gt;&quot;matrices of convolutions&quot;&lt;/i&gt;, intensive iterative calculations carried out on gigantic numerical matrices. On the other hand, powerful technologies with less evocative names, &lt;i&gt;genetic algorithms&lt;/i&gt;, &lt;i&gt;random forests&lt;/i&gt; or &lt;i&gt;boosted gradient&lt;/i&gt; raise less fantasies.
&lt;/p&gt;

&lt;h2&gt;10. Artificial Intelligence vs. Augmented Intelligence&lt;/h2&gt;

&lt;p&gt;
Today, these Artificial Intelligence techniques give the most impressive results when they support the human and not when they supplant it.
&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/554bf15d-f4d0-4014-a9e2-71af725d6a92&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 600px;&quot; alt=&quot;Artificial Intelligence vs. Augmented Intelligence&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/554bf15d-f4d0-4014-a9e2-71af725d6a92&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
Chess is one of the first areas in which computers started to beat humans.
&lt;br&gt;
The examples of algorithms that manage to defeat the great masters of chess in a regular if not systematic are legion.
&lt;br&gt;
But these are the so-called &lt;i&gt;&quot;centaurs&quot;&lt;/i&gt;, most of the time amateur players, but helped by Artificial Intelligence, half-human, half-machines, who now win all the &quot;freestyle&quot; games.
&lt;/p&gt;

&lt;p&gt;
I would like to mention a second example with an experience that has been performed last year.
&lt;br&gt;
Melanoma specialists have been asked to identify cancerous lesions based on photos of skin lesions.
&lt;br&gt;
These experts had a precision, a success rate of the order of 95%.
&lt;br&gt;
An AI based on a &lt;i&gt;Neural Network&lt;/i&gt; deployed towards the same objective reached a pretty impressive 93% accuracy, yet failing to beat the experts.
&lt;br&gt;
But a set of interns, really rather students that actual doctors, accompanied and helped by an artificial intelligence have reached 97% accuracy, beating both Artificial Intelligence alone and experts
&lt;/p&gt;

&lt;p&gt;
Today, the most impressive results of these technologies come from what is called &lt;b&gt;Augmented Intelligence&lt;/b&gt;, when Artificial Intelligence intervenes in support of the human decision process and not to replace it.
&lt;br&gt;
And &lt;i&gt;Augmented intelligence&lt;/i&gt; is exactly what we do at NetGuardians by providing bankers with the means to prevent fraud cases much more effectively.
&lt;/p&gt;


&lt;h2&gt;11. AI Pillars at NetGuardians&lt;/h2&gt;

&lt;p&gt;
The &lt;b&gt;key pillars&lt;/b&gt; which enable us to deploy Artificial Intelligence technologies are as folows:
&lt;p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/be5c5e61-8817-412a-8a97-faa964751874&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 600px;&quot; alt=&quot;Ai Pillars at NetGuardians&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/be5c5e61-8817-412a-8a97-faa964751874&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
All of this is pretty straightforward to understand.
&lt;br&gt;
I would just insist on two key notions:
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
The ability to run these analyzes in real time. Be able to analyze the activity of bank customers and users in real time is at the root of the difference between preventing fraud and detecting fraud. It must be possible to work with very low processing times to characterize a transaction before it is placed on the market.
&lt;/li&gt;
&lt;li&gt;
The user experience. The deployed algorithms can be as intelligent as one can imagine, if one is not able to provide investigators and analysts with clear, concise and precise information, allowing them to understand the context of the transaction and the reasons for the system to block it, all this does not work. Users reject the solution. Providing analysts with extremely intuitive and visual means to understand machine decisions is essential.
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;
(This article is available as a slideshare presentation here 
&lt;a href=&quot;https://www.slideshare.net/JrmeKehrli/artificial-intelligence-for-banking-fraud-prevention-95475760&quot;&gt;https://www.slideshare.net/JrmeKehrli/artificial-intelligence-for-banking-fraud-prevention-95475760&lt;/a&gt;)
&lt;/p&gt;
</content>
    </entry>
    <entry>
        <id>https://www.niceideas.ch/roller2/badtrash/entry/deciphering-the-bengladesh-bank-heist</id>
        <title type="html">Deciphering the Bangladesh bank heist</title>
        <author><name>Jerome Kehrli</name></author>
        <link rel="alternate" type="text/html" href="https://www.niceideas.ch/roller2/badtrash/entry/deciphering-the-bengladesh-bank-heist"/>
        <published>2017-11-15T17:03:49-05:00</published>
        <updated>2020-09-03T10:15:31-04:00</updated> 
        <category term="Banking" label="Banking" />
        <category term="bangladesh-bank-heist" scheme="http://roller.apache.org/ns/tags/" />
        <category term="bank" scheme="http://roller.apache.org/ns/tags/" />
        <category term="banking" scheme="http://roller.apache.org/ns/tags/" />
        <category term="cybercrime" scheme="http://roller.apache.org/ns/tags/" />
        <category term="swift" scheme="http://roller.apache.org/ns/tags/" />
        <category term="swift-attack" scheme="http://roller.apache.org/ns/tags/" />
        <summary type="html">&lt;!-- Deciphering the Bengladesh bank heist --&gt;

&lt;p&gt;
&lt;b&gt;The Bangladesh bank heist - or SWIFT attack - is one of the biggest bank robberies ever, and the most impressive cyber-crime in history&lt;/b&gt;.
&lt;/p&gt;
&lt;p&gt;
This is the story of a group of less than 20 cyber-criminals, composed by high profile hackers, engineers, financial experts and banking experts who gathered together to hack the worldwide financial system, by attacking an account of the central bank of Bangladesh, a lower middle income nation and one of the world&apos;s most densely populated countries, and steal around 81 million US dollars, successfully, after attempting to steal almost a billion US dollars.
&lt;/p&gt;
&lt;p&gt;
In early February 2016, authorities of Bangladesh Bank were informed that about 81 million USD was illegally taken out of its account with the Federal Reserve Bank of New York using an inter-bank messaging system known as SWIFT.
The money was moved via SWIFT transfer requests, ending up in bank accounts in the Philippines and laundered in the Philippines&apos; casinos during the chinese New-Year holidays.
&lt;/p&gt;
&lt;p&gt;
Fortunately, the major part of the billion US dollars they intended to steal could be saved, but 81 million US dollars were successfully stolen and are gone for good.
&lt;/p&gt;
&lt;p&gt;
The thieves have stolen this money without any gun, without breaking physically in the bank, without any form of physical violence. (There are victims though, there are always victims in such case, but they haven&apos;t suffered any form of physical violence)
&lt;br&gt;
These 81 million US dollars disappeared and haven&apos;t been recovered yet. The thieves are unknown, untroubled and safe.
&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/ac851db2-485d-496e-ab31-d040612d9a2f&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 600px;&quot; alt=&quot;Bengladesh bank hacker&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/ac851db2-485d-496e-ab31-d040612d9a2f&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
The Bangladesh bank heist consisted in hacking the Bangladesh central bank information system to issue fraudulent SWIFT orders to withdraw money from the banking institution. SWIFT is a trusted and closed network that bank use to communicate between themselves around the world. SWIFT is owned by the major banking institutions.
&lt;/p&gt;
&lt;p&gt;
In terms of technological and technical mastery, business understanding, financial systems knowledge and timing, this heist was a perfect crime. The execution was brilliant, way beyond any Hollywood scenario. And the bank was actually pretty lucky that that the hackers didn&apos;t successfully loot the billion US dollars as they planned, but instead only 81 million.
&lt;br&gt;
As such, from a purely engineering perspective, studying this case is very exiting. First, I cannot help but admire the skills of the team of thieves team as well as the shape of the attack, and second, it&apos;s my job in my current company to design controls and systems preventing such attack from happening against our customers in the future.
&lt;/p&gt;
&lt;p&gt;
In this article, I intend to present, explain and decipher as many of the aspects of the Bangladesh bank heist and I know.
&lt;/p&gt;

</summary>
        <content type="html">&lt;!-- Deciphering the Bengladesh bank heist --&gt;

&lt;p&gt;
&lt;b&gt;The Bangladesh bank heist - or SWIFT attack - is one of the biggest bank robberies ever, and the most impressive cyber-crime in history&lt;/b&gt;.
&lt;/p&gt;
&lt;p&gt;
This is the story of a group of less than 20 cyber-criminals, composed by high profile hackers, engineers, financial experts and banking experts who gathered together to hack the worldwide financial system, by attacking an account of the central bank of Bangladesh, a lower middle income nation and one of the world&apos;s most densely populated countries, and steal around 81 million US dollars, successfully, after attempting to steal almost a billion US dollars.
&lt;/p&gt;
&lt;p&gt;
In early February 2016, authorities of Bangladesh Bank were informed that about 81 million USD was illegally taken out of its account with the Federal Reserve Bank of New York using an inter-bank messaging system known as SWIFT.
The money was moved via SWIFT transfer requests, ending up in bank accounts in the Philippines and laundered in the Philippines&apos; casinos during the chinese New-Year holidays.
&lt;/p&gt;
&lt;p&gt;
Fortunately, the major part of the billion US dollars they intended to steal could be saved, but 81 million US dollars were successfully stolen and are gone for good.
&lt;/p&gt;
&lt;p&gt;
The thieves have stolen this money without any gun, without breaking physically in the bank, without any form of physical violence. (There are victims though, there are always victims in such case, but they haven&apos;t suffered any form of physical violence)
&lt;br&gt;
These 81 million US dollars disappeared and haven&apos;t been recovered yet. The thieves are unknown, untroubled and safe.
&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/ac851db2-485d-496e-ab31-d040612d9a2f&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 600px;&quot; alt=&quot;Bengladesh bank hacker&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/ac851db2-485d-496e-ab31-d040612d9a2f&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
The Bangladesh bank heist consisted in hacking the Bangladesh central bank information system to issue fraudulent SWIFT orders to withdraw money from the banking institution. SWIFT is a trusted and closed network that bank use to communicate between themselves around the world. SWIFT is owned by the major banking institutions.
&lt;/p&gt;
&lt;p&gt;
In terms of technological and technical mastery, business understanding, financial systems knowledge and timing, this heist was a perfect crime. The execution was brilliant, way beyond any Hollywood scenario. And the bank was actually pretty lucky that that the hackers didn&apos;t successfully loot the billion US dollars as they planned, but instead only 81 million.
&lt;br&gt;
As such, from a purely engineering perspective, studying this case is very exiting. First, I cannot help but admire the skills of the team of thieves team as well as the shape of the attack, and second, it&apos;s my job in my current company to design controls and systems preventing such attack from happening against our customers in the future.
&lt;/p&gt;
&lt;p&gt;
In this article, I intend to present, explain and decipher as many of the aspects of the Bangladesh bank heist and I know.
&lt;/p&gt;

&lt;p&gt;
(This article is available as a slideshare presentation here 
&lt;a href=&quot;https://www.slideshare.net/JrmeKehrli/deciphering-the-bengladesh-bank-heist&quot;&gt;https://www.slideshare.net/JrmeKehrli/deciphering-the-bengladesh-bank-heist&lt;/a&gt;)
&lt;/p&gt;




&lt;p&gt;
&lt;b&gt;Summary&lt;/b&gt;
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;#sec1&quot;&gt;1. Introduction&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;#sec2&quot;&gt;2. The SWIFT network - Key Concepts&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;#sec21&quot;&gt;2.1 Correspondant Banking&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;#sec21&quot;&gt;2.2 Transfering Money&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;#sec23&quot;&gt;2.3 Application Architecture (Bengladesh case)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;#sec24&quot;&gt;2.4 Introducing key SWIFT messages&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;#sec3&quot;&gt;3. The attack&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;#sec31&quot;&gt;3.1 Behaviour of the malware&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;#sec32&quot;&gt;3.2 Complete overview of the attack&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;#sec33&quot;&gt;3.3 Timeline of the attack&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;#sec34&quot;&gt;3.4 Laundering of the money&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;#sec4&quot;&gt;4. Aftermath&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;#sec5&quot;&gt;5. Conclusion&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br&gt;



&lt;a name=&quot;sec1&quot;&gt;&lt;/a&gt;
&lt;h2&gt;1. Introduction&lt;/h2&gt;

&lt;p&gt;
The Bangladesh Bank hack is one of the biggest bank heists in global financial history. There have been larger scams and scandals, but cyber heists from a single bank, this takes the cake.
&lt;/p&gt;
&lt;p&gt;
The heist of over 80 million US dollars sent shock-waves through the global financial system and security experts scrambled to find out how it had happened. Political and administrative authorities played the blame game, as was expected of them. Resignations were offered and statements were issued. It was a complete chaos.
&lt;/p&gt;
The hackers managed to break into the bank&apos;s security system and transferred more than 80 million USD from the New York Federal Reserve account to multiple bank accounts located in Sri Lanka and Philippines. 
&lt;br&gt;
A significant number of transfer requests, 30 out of 35, were blocked by the Federal Reserve, saving the bank a loss of an additional 850 million US dollars
&lt;br&gt;
But the five requests that managed to pass through, amounting to more than a 80 million US  dollars, were devastating enough in their consequences.
&lt;/p&gt;
&lt;p&gt;
Perhaps the most troubling aspect of the whole episode was that the hackers managed to hack into the SWIFT software. SWIFT, lies at the heart of the global financial system and is a network which connects majority of the world&apos;s financial institutions and enables them to send and receive financial information about financial transactions.
&lt;/p&gt;
&lt;p&gt;
However, It was the bank&apos;s own systems and controls that were compromised, not the SWIFT network connection software. The SWIFT software behaved as it was intended to, but was not operated by the intended person or process. This was really a bank problem, not a SWIFT problem.
&lt;/p&gt; 
&lt;p&gt;
In the next chapter, I will present the key concepts required to understand the attack before presenting the shape and timeline of the attack.
&lt;/p&gt;



&lt;a name=&quot;sec2&quot;&gt;&lt;/a&gt;
&lt;h2&gt;2. The SWIFT network - Key Concepts&lt;/h2&gt;

&lt;p&gt;
Some key concepts about correspondent banking and the principles of the SWIFT network are required to grasp a basic understanding of the Bangladesh SWIFT attack. These are presented in this chapter.
&lt;/p&gt;
&lt;p&gt;
SWIFT - Society for Worldwide Inter-bank Financial Telecommunication - is a belgian company, located in Belgium, and is a trusted and closed network used for communication between banks around the world. It is overseen by a committee composed of the US Federal Reserve, the Bank of England, the European Central Bank, the Bank of Japan and other major banks.
&lt;br&gt;
SWIFT is used by around 11 thousands institutions in more than 200 countries and supports around 25 million communications a day, most of them being money transfer transactions, the rest are various other types of messages.
&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/a887fd53-655c-48a9-9397-6899371af97d&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 150px;&quot; alt=&quot;SWIFT logo&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/a887fd53-655c-48a9-9397-6899371af97d&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
The majority of international inter-bank messages use the SWIFT network.
&lt;br&gt;
SWIFT does not facilitate funds transfer: rather, it sends payment orders, which must be settled by correspondent accounts that the institutions have with each other. For two financial institutions to exchange banking transactions, they must have a banking relationship beforehand.
&lt;/p&gt;

&lt;p&gt;
A cool introduction to SWIFT is available on the Fin website : &lt;a href=&quot;https://fin.plaid.com/articles/what-is-swift&quot;&gt;https://fin.plaid.com/articles/what-is-swift&lt;/a&gt;.
&lt;/p&gt;


&lt;a name=&quot;sec21&quot;&gt;&lt;/a&gt;
&lt;h3&gt;2.1 Correspondent Banking&lt;/h3&gt;

&lt;p&gt;
&lt;b&gt;Correspondent Bank&lt;/b&gt;
&lt;/p&gt;
&lt;p&gt;
A correspondent bank is a financial institution that provides services on behalf of another financial institution. 
&lt;br&gt;
It can facilitate wire transfers, conduct business transactions, accept deposits and gather documents on behalf of another financial institution. 
&lt;br&gt;
Correspondent banks are most likely to be used by domestic banks to service transactions that either originate or are completed in foreign countries, acting as a domestic bank&apos;s agent abroad.
&lt;/p&gt;
&lt;p&gt;
Generally speaking, the reasons domestic banks employ correspondent banks include:
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;limited access to foreign financial markets and the inability to service client accounts without opening branches abroad,&lt;/li&gt;
&lt;li&gt;act as intermediaries between banks in different countries or as an agent to process local transactions for customers abroad,&lt;/li&gt;
&lt;li&gt;accept deposits, process documentation and &lt;b&gt;serve as transfer agents for funds&lt;/b&gt;. &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;
The ability to execute these services relieves domestic banks of the need to establish a physical presence in foreign countries.
&lt;/p&gt;

&lt;p&gt;
&lt;b&gt;NOSTRO / VOSTRO Account&lt;/b&gt;
&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/45ed631c-105f-4292-b5bc-bb9b839affd4&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 750px;&quot; alt=&quot;NOSTRO VOSTRO accounts&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/45ed631c-105f-4292-b5bc-bb9b839affd4&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
The accounts held between correspondent banks and the banks to which they are providing services are referred to as &lt;i&gt;NOSTRO&lt;/i&gt; and &lt;i&gt;VOSTRO&lt;/i&gt; accounts (latin words for &lt;i&gt;ours&lt;/i&gt; and &lt;i&gt;yours&lt;/i&gt;).
&lt;br&gt;
An account held by one bank for another is referred to by the holding bank as a &lt;b&gt;VOSTRON&lt;/b&gt; account. 
&lt;br&gt;
The same account is referred as a &lt;b&gt;NOSTRO&lt;/b&gt; account by the owning bank (the customer). Generally speaking, both banks in a correspondent relationship hold accounts for one another for the purpose of tracking debits and credits between the parties.
&lt;/p&gt;
&lt;P&gt;
NOSTRO and VOSTRO accounts are really to the same thing but from different perspectives. For example, Bank X has an account with Bank Y in Bank Y&apos;s home currency. To Bank X, that is a NOSTRO, meaning &quot;our account on your books,&quot; while to Bank Y, it is a VOSTRO, meaning &quot;your account on our books.&quot; These accounts are used to facilitate international transactions 
&lt;/p&gt;

&lt;p&gt;
&lt;b&gt;Transferring Money Using a Correspondent Bank&lt;/b&gt;
&lt;/p&gt;
&lt;p&gt;
International wire transfers often occur between banks that do not have an established financial relationship. When agreements are not in place between the bank sending a wire and the one receiving it, a correspondent bank must act as an intermediary. For example, a bank in Geneva that has received instructions to wire funds to a bank in Japan cannot wire funds directly without a working relationship with the receiving bank.
&lt;/p&gt;
&lt;p&gt;
Most if not all international wire transfers are executed through SWIFT. Knowing there is not a working relationship with the destination bank, the originating bank can search the SWIFT network for a correspondent bank that has arrangements with both banks.
&lt;/p&gt;
&lt;p&gt;
Interestingly, when a bank wants to send some funds to another bank on the other side of the world, it happens often that the sending bank has no banking relationships with any bank having itself a relationship with the target bank. In this case, the order needs to be transferred through several, sometimes many, distinct banking institutions through the SWIFT network. 
&lt;br&gt;
These intermediate banks are called &lt;b&gt;routing banks&lt;/b&gt;.
&lt;/p&gt;


&lt;a name=&quot;sec22&quot;&gt;&lt;/a&gt;
&lt;h3&gt;2.2 Transferring Money&lt;/h3&gt;

&lt;p&gt;
In the scope of funds transfers, correspondent banking relationships often happen between commercial banks and central banks. This is especially useful when a bank has to process massive funds transfers in different currencies.
&lt;/p&gt;
&lt;p&gt;
Imagine that a non-US commercial banking institution has to transfer a massive amount of US Dollars for one of its big customers to some other account in another financial institution abroad. It would be very inconvenient in this case to have to build up enough reserves of US dollars for this kind of transfers. 
&lt;br&gt;
Instead of building such reserves, big commercial banks worldwide have the tendency to open a correspondent banking relationships with the US federal Reserve in New York - called the Fed - and use their VOSTRO accounts at the Fed to process such big transfers. 
&lt;br&gt;
Such VOSTRO accounts have typically no limits and do not necessarily need to be credited beforehand. The settlement can happen afterwards, on a regular basis.
&lt;/p&gt;

&lt;p&gt;
Let&apos;s illustrate this situation with 2 imaginary customers and the Bangladesh central bank:
&lt;p /&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/22d1bc9c-05a4-4482-acf8-574726869c54&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 610px;&quot; alt=&quot;Correspondant bank money transfer&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/22d1bc9c-05a4-4482-acf8-574726869c54&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
In case the money transfer requested by a customer in a foreign currency (here USD for the Bangladesh bank) exceeds some limits or even the reserves of the Bangladesh bank in USDs, the bank decides to go through the VOSTRO account by the correspondent central bank related to the foreign currency (Here the US Fed for USD) and instruct it to proceed with the transfer.
&lt;br&gt;
Again, that VOSTRO account doesn&apos;t even necessarily need to be credited beforehand, the settlement can happen way later or even never.
&lt;/p&gt;


&lt;a name=&quot;sec23&quot;&gt;&lt;/a&gt;
&lt;h3&gt;2.3 Application Architecture (Bangladesh case)&lt;/h3&gt;

&lt;p&gt;
SWIFT provides a centralized store-and-forward mechanism, with some transaction management. For bank A to send a message to bank B with a copy or authorization with institution C, it formats the message according to standard and securely sends it to SWIFT. SWIFT guarantees its secure and reliable delivery to B after the appropriate action by C. SWIFT guarantees are based primarily on high redundancy of hardware, software, and people.
&lt;/p&gt;

&lt;p&gt;
&lt;b&gt;Principles&lt;/b&gt;
&lt;/p&gt;
&lt;p&gt;
SWIFT moved to its current IP network infrastructure, known as SWIFTNet, from 2001 to 2005, providing a total replacement of the previous X.25 infrastructure. During 2007 and 2008, the entire SWIFT Network migrated its infrastructure to a new protocol called SWIFTNet Phase 2.
&lt;br&gt;
&lt;b&gt;Today the SWIFT network can be seen as a highly secured private network over Internet&lt;/b&gt;.
&lt;/p&gt;
&lt;p&gt;
In order to have access to this network, a financial institution needs to obtain a SWIFT gateway running the SWIFT NetLink software. This is most of the time proprietary hardware running with Linux and requiring a physical security dongle storing cryptographic keys to access the network.
&lt;/p&gt;
&lt;p&gt;
SWIFT also provides a whole lot of other software such as SWIFT Alliance Access that can be used by a financial institution to access the SWIFT network (always through the gateway) in a more convenient way and with higher level or simpler APIs.
&lt;/p&gt;

&lt;p&gt;
&lt;b&gt;SWIFT Network Security&lt;/b&gt;
&lt;/p&gt;
&lt;p&gt;
SWIFT&apos;s security stems from two major sources. First, it&apos;s a private network, and most banks set up their accounts such that only certain transactions between particular parties are permitted. The network privacy means that it should be hard for someone outside a bank to attack the network, but if a hacker breaks into a bank-as was the case here-then that protection evaporates. 
&lt;br&gt;
The Bangladesh central bank has all the necessary SWIFT software and authorized access to the SWIFT network. Any hacker running code within the Bangladesh bank also has access to the software and network.
&lt;/p&gt;

&lt;p&gt;
&lt;b&gt;The Bangladesh bank architecture&lt;/b&gt;
&lt;/p&gt;
&lt;p&gt;
The Bangladesh central bank, at the time of the heist, was handling SWIFT connectivity from the &lt;b&gt;Banking Information System&lt;/b&gt; to the &lt;b&gt;SWIFT network&lt;/b&gt; using the specific &lt;b&gt;SWIFT Alliance Access&lt;/b&gt; software running on a bridge server.
&lt;br&gt;
Alliance Access, integrated the way it was at the Bangladesh banks, was setup to &lt;b&gt;read/write SWIFT messages from/to files on the filesystem&lt;/b&gt; and record transaction information in an Oracle database. In addition, confirmation and reconciliation messages were handled through a manual process after being sent to &lt;b&gt;a printer&lt;/b&gt;. 
&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/28997370-2fe2-4d74-be10-37be9e8bf8a4&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 610px;&quot; alt=&quot;SWIFT Application Architecture&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/28997370-2fe2-4d74-be10-37be9e8bf8a4&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
Again, the order reconciliation process in the Bangladesh central bank was a largely manual process.
&lt;br&gt;
In addition, passing through the filesystem to integrate the Banking Information System and the SWIFT network is a huge security weakness. We&apos;ll discuss this later.
&lt;/p&gt;


&lt;a name=&quot;sec24&quot;&gt;&lt;/a&gt;
&lt;h3&gt;2.4 Introducing key SWIFT messages&lt;/h3&gt;

&lt;p&gt;
As we will see in the next chapter, the hackers created a malware that generated and manipulated key SWIFT messages to withdraw the money from the Bangladesh Central Bank&apos;s VOSTRO account at the Fed.
&lt;/p&gt;
&lt;p&gt;
SWIFT messages consist of five blocks of the data including three headers, message content, and a trailer. Message types are crucial to identifying content.
&lt;br&gt;
All SWIFT messages include the literal &quot;MT&quot; (Message Type). This is followed by a three-digit number that denotes the message category, group and type
&lt;/p&gt;
&lt;p&gt;
The key SWIFT messages in question here were of the following types:
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;b&gt;MT103&lt;/b&gt; is used for cash transfer specifically for cross border/international wire transfer.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;MT202&lt;/b&gt; is the general Financial Institution transfer order, used to order the movement of funds to the beneficiary institution.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;MT950&lt;/b&gt; is the Final Statement report on all settlement operations with specified account within a current business day. Can be seen as the confirmation for an MT 202.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;
The workflow between these messages can be seen as follows:
&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/d1c08dbe-c7e9-453e-8fcb-4c49bd74f832&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 850px;&quot; alt=&quot;SWIFT Messages&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/d1c08dbe-c7e9-453e-8fcb-4c49bd74f832&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
A lot of stuff goes through SWIFT, here we focus on a really small subset of the supported message tapes, those related to transferring money. 
&lt;br&gt;
First, the MT103 is an information message, basically announcing that a target counterparty account will receive money from an internal (or correspondent) account to be debited. 
&lt;br&gt;
Then the MT202 is the inter-bank transfer order, it applies globally to transfer money from a banking institution to another banking institution, covering all individual account level transfer announces relating to the same target institution. There is a relationship between MT103 and MT202, they cross-reference each others (field 21 in MT103 reference MT202 and field 20 in MT202 references all related MT103)
&lt;br&gt;
Finally the MT950 is the extract that confirms all executed order. It is the bible and references all positions confirmed and executed by the correspondent bank. It is often an end of day extract used by banking institutions for reconciliations.
&lt;/p&gt;

&lt;p&gt;
Again, when it comes to SWIFT messages processing from and to the Banking information System in the Bangladesh case, the important aspects here are:
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;SWIFT messages originating from the Banking Information System simply needed to be put on the filesystem somewhere to be &lt;i&gt;&quot;slurped&quot;&lt;/i&gt; by the SWIFT Alliance Access software integrated the way is was integrated at Bangladesh Central Bank. In terms of security of the process, this is more that questionable.&lt;/li&gt;
&lt;li&gt;Confirmation messages back from the SWIFT network were stored and printed. Reconciliation is a manual process from these printed messages. This is quite unusual (we&apos;ll get back to that)&lt;/li&gt;
&lt;/ul&gt;


&lt;a name=&quot;sec3&quot;&gt;&lt;/a&gt;
&lt;h2&gt;3. The Attack&lt;/h2&gt;

&lt;p&gt;
&lt;b&gt;Summary of the attack&lt;/b&gt;
&lt;/p&gt;

&lt;p&gt;
Capitalizing on weaknesses in the security of the Bangladesh Central Bank, hackers attempted to steal around a billion US dollars from the Bangladesh central bank&apos;s VOSTRO account with the US Federal Reserve Bank between February 4 and 5 when Bangladesh Bank&apos;s offices were closed. 
&lt;/p&gt;
&lt;p&gt;
The perpetrators managed to compromise Bangladesh Bank&apos;s computer network, observed how transfers were done, and gained access to the bank&apos;s credentials for payment transfers. 
&lt;br&gt;
They used these credentials to authorize about three dozen requests to the Federal Reserve Bank of New York to transfer funds from the Bangladesh Bank VOSTRO to accounts in Sri Lanka and the Philippines.
&lt;/p&gt;
&lt;p&gt;
Thirty transactions worth 851 million USD were flagged by the banking system for staff review, but five requests were granted; 20 million USD to Sri Lanka (later recovered), and 81 million USD lost to the Philippines, entering the Southeast Asian country&apos;s banking system on February 5, 2016. 
&lt;br&gt;
This money was laundered through casinos and a little later transferred to Hong Kong.
&lt;/p&gt;
&lt;p&gt;
The attack is impressive and stands out on various levels, in terms of technical means, maturity and complexity for several reasons:
&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;b&gt;Technical Mastery&lt;/b&gt;: the usage of a custom worm (filename evtdiag.exe) to hack the SWIFT Bridge by the bank and likely other malwares to capture the administration credentials&lt;/li&gt;
&lt;li&gt;&lt;b&gt;In-depth understanding of the worldwide financial market&lt;/b&gt;: both the attack shape and the money laundering scheme prove in-depth understanding of financial markets&lt;/li&gt;
&lt;li&gt;&lt;b&gt;SWIFT knowledge&lt;/b&gt;: in-depth Knowledge of the SWIFT messaging details is not that much spread among software engineers&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;
Let&apos;s see how this is proven by analyzing the details of the attack.
&lt;/p&gt;


&lt;a name=&quot;sec31&quot;&gt;&lt;/a&gt;
&lt;h3&gt;3.1 Behaviour of the malware&lt;/h3&gt;

&lt;p&gt;
The hackers used a custom version of malware to hack software called SWIFT Alliance Access to both make the transactions and hide the evidence. The hackers used a version of the malware that removed integrity checks within the Alliance software and then monitored the transaction files sent through the system, searching the payment orders and confirmations for specific terms. These terms and the responses to them were specified by a &lt;i&gt;Command and Control&lt;/i&gt; server in Egypt.
&lt;/p&gt;
&lt;p&gt;
When a message with one of the search terms was found, the malware would do different things depending on the kind of message. Payment orders were modified to increase the amounts being moved, updating the Alliance database with new values. Confirmation messages from the SWIFT network were also modified. Confirmations are printed and stored in the database. Before being printed, the malware would alter the confirmations to show the original, correct transaction value; it also deleted confirmations from the Alliance database entirely.
&lt;/p&gt;
&lt;p&gt;
It&apos;s still not clear how the initial transactions were entered into the system to trigger the malware in the first place.
&lt;/p&gt;
&lt;p&gt;
Again, the SWIFT network key components haven&apos;t been compromised, the malware was targeting the Bangladesh Central Bank&apos;s own bride to the SWIFT infrastructure running the SWIFT Alliance Access Software:
&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/4a70014d-d9be-418d-a500-be0b0a7246b9&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 610px;&quot; alt=&quot;Worm infection on the Bank bridge to SWIFT&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/4a70014d-d9be-418d-a500-be0b0a7246b9&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
If an organization can&apos;t keep its endpoint secure, it leaves itself very vulnerable to being electronically robbed. That was the case here. 
&lt;br&gt;
The bank lacked any firewalls and was using second-hand $10 switches on its network. These switches did not allow for the regular LAN to be segmented or otherwise isolated from the SWIFT systems. The lack of network security infrastructure has hindered the investigation. 
&lt;br&gt;
It&apos;s still not known how the hackers penetrated the network, but it looks like the bank didn&apos;t make it difficult for them to do so.
&lt;/p&gt;
&lt;p&gt;
How the attackers obtained administration credentials is still unclear. They might have obtained these credentials by using another malware or by exploiting a remotely available vulnerability (not impossible considering the weak security practices in place in the Bangladesh Central Bank) or it might also have been an insider job.
&lt;br&gt;
So far there are only speculations in this regards.
&lt;/p&gt;

&lt;p&gt;
&lt;b&gt;Forging fraudulent SWIFT messages&lt;/b&gt;
&lt;/p&gt;

&lt;p&gt;
Simplifying a bit the reality, we can picture the malware as forging fraudulent SWIFT messages as follows:
&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/63d62d1c-e899-4b82-a2ce-3aaa9e39afbc&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 850px;&quot; alt=&quot;Worm forging SWIFT messages&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/63d62d1c-e899-4b82-a2ce-3aaa9e39afbc&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
The view above is a simplification of the reality. Actually, the worm was brilliantly implemented since forging from scratch consistent SWIFT announces (MT103) and Money Transfer Orders (MT202) messages would have been more difficult. 
&lt;br&gt;
Instead, the worm was tampering with genuine messages issued by the Banking Information System and changing the amounts and recipient. This is a lot easier than blank forging.
&lt;br&gt;
It is still unclear for now if the initial untampered messages were simply authentic and relevant messages, perhaps duplicated by the worm, or forged through other malwares on different systems. I couldn&apos;t find clear information in this regards in all that has been published (if a reader has additional information in this regards, I would be happy to learn about it).
&lt;/p&gt;
&lt;p&gt;
Just as a sidenote, whenever an institution such as the Bengladesh central bank sends a SWIFT funds transfer order, it&apos;s always in behalf of one of its customer. The SWIFT message(s) indicates the customer for which the bank requests a funds transfer.
&lt;br&gt;
Now of course the target correspondent bank cannot know if such customer exist, it doesn&apos;t have access to the list of customers of the sending bank. The SWIFT messages tampered by the worm could have been related to any random customer of the Bengladesh bank, this doesn&apos;t matter. 
&lt;br&gt;
The only important aspect was that the beneficiary account and banking institution were the ones intended by the attackers.
&lt;/p&gt;

&lt;p&gt;
&lt;b&gt;Intercepting SWIFT confirmations&lt;/b&gt;
&lt;/p&gt;

&lt;p&gt;
Here as well, by simplifying a little the reality, we can picture the malware as intercepting SWIFT confirmations as follows:
&lt;/p&gt;


&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/27dfdbe0-56d6-4f47-a1ba-74085f6c23f6&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 850px;&quot; alt=&quot;Worm forging SWIFT messages&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/27dfdbe0-56d6-4f47-a1ba-74085f6c23f6&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
The malware was also developed in such a way that it was intercepting confirmation messages (MT950) back from the Fed (from the SWIFT network in fact). Confirmation of genuine orders were supposed to be allowed to pass through untampered while confirmation of fraudulent messages were supposed to be intercepted and hidden.
&lt;br&gt;
But the worm was buggy and while tampering with confirmations sent to the printer, it corrupted them somehow which caused the printer to crash. We&apos;ll get back to that later.
&lt;/p&gt;
&lt;p&gt;
Interestingly, going as far as trying to tamper with confirmations was pure genius (even though it didn&apos;t work as expected). Had it worked, the bank might well have noticed the attack weeks after the facts since on both sides of the world (the Fed view and the Bengladesh Central bank view), positions would have been very different but yet consistent, the Fed knowing about the orders, taking them as genuine and the Bangladesh bank would have known nothing about them.
&lt;br&gt;
Also, one should note that transfer orders (MT202) are executed immediately. So trying to tamper with confirmations was not intended to give more chance to the transfer to succeed, it was really intended as a way to hide the theft until hopefully after the money is laundered.
&lt;/p&gt;


&lt;p&gt;
&lt;b&gt;The Malware&lt;/b&gt;
&lt;/p&gt;

&lt;p&gt;
The malware, codenamed Dridex (Addendum 2020-Sep-03 - see note at the end of the article), filenamed &lt;code&gt;evtdiag.exe&lt;/code&gt;, was designed to hide the hacker&apos;s tracks by changing information on a SWIFT database within Alliance Access and contained the IP address of a server in Egypt the attackers used to monitor the use of the SWIFT system by Bangladesh Bank staff.
&lt;br&gt;
It was likely part of a broader attack toolkit that was installed after the attackers obtained administrator credentials.
&lt;/p&gt;
&lt;p&gt;
The malware was compiled close to the date of the heist, contained detailed information about the bank&apos;s operations and was uploaded from Bangladesh.
&lt;br&gt;
While that malware was specifically written to attack the Bangladesh Bank, the general tools, techniques and procedures used in the attack may allow the gang to strike again and as a matter of fact there have been attempts discussed by Reuters.
&lt;/p&gt;
&lt;p&gt;
The malware was designed to make a slight change to the code of the Access Alliance software installed at the Bangladesh Central Bank, giving attackers the ability to modify a database that logged the bank&apos;s activity over the SWIFT network.
&lt;br&gt;
Once it had established a foothold, the malware could delete records of outgoing transfer requests altogether from the database and also intercept incoming messages confirming transfers ordered by the hackers.
&lt;br&gt;
It was also able to manipulate account balances on logs to prevent the heist from being discovered until after the funds had been laundered. Additionnaly, it manipulated the stream of confirmations sent to a printer that produced hard copies of transfer requests so that the bank would not identify the attack through those printouts. 
&lt;br&gt;
This part went wrong and led the printer to crash.
&lt;/p&gt;

&lt;p&gt;
More information on the malware is available &lt;a href=&quot;https://d3pakblog.wordpress.com/2017/01/31/bangladesh-bank-heist-2016/&quot;&gt;in this article&lt;/a&gt; and &lt;a href=&quot;https://asamborski.github.io/cs558_s17_blog/2017/03/23/bangladesh.html&quot;&gt;this one&lt;/a&gt;.
&lt;/p&gt;


&lt;a name=&quot;sec32&quot;&gt;&lt;/a&gt;
&lt;h3&gt;3.2 Complete overview of the attack&lt;/h3&gt;

&lt;p&gt;
On February 4, likely after months of preparation, organizationally and technically, gaining access to the systems, developing the custom worm, obtaining credentials, infecting the systems, etc. unknown hackers sent more than three dozens of fraudulent money transfer requests to the Federal Reserve Bank of New York asking the bank to transfer millions of the Bangladesh Bank&apos;s VOSTRO account to bank accounts in the Philippines, Sri-Lanka and other parts of Asia.
&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/56d7365b-e516-4b9e-953a-4a42e96088bd&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 850px;&quot; alt=&quot;Overview of the attack&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/56d7365b-e516-4b9e-953a-4a42e96088bd&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
The hackers managed to get 81 million USD sent to Rizal Commercial Banking Corporation (RCBC) in the Philippines via four different transfer requests and an additional 20 million USD sent to Pan Asia Banking in a single request. 
&lt;/p&gt;
&lt;p&gt;
Fortunately 850 million USD in other transactions managed to be saved initially (thx to the Fed). 
&lt;/p&gt;
&lt;p&gt;
The 81 million USD was deposited into three accounts at a Rizal branch in Manila on Feb. 4. These accounts had all been opened a year earlier in May 2015, but had been inactive with just 500 USD sitting in them until the stolen funds arrived in February this year.
&lt;/p&gt;
&lt;p&gt;
Another 20 million USD intended to be sent to Pan Asia Banking have been blocked later in the correspondent bank funds transfer routing process (thx to Deutsche Bank).
&lt;/p&gt;
&lt;p&gt;
But the 81 million USD that went to Rizal Bank in the Philippines was gone. It had already been credited to multiple accounts, reportedly belonging to casinos in the Philippines, and all but 68 thousands USD of it was withdrawn on February 5 and 9 before further withdrawals were halted. 
&lt;br&gt;
The stolen funds from Bangladesh Bank were transferred to money transfer company Philrem Services Corporation. Philrem converted into pesos some of the 81 million USD and delivered the money in cash tranches to a registered casino junket operator named Weikang Xu, Eastern Hawaii Leisure Company, and Bloomberry Hotels Incorporated (Solaire Resort &amp; Casino). 
&lt;/p&gt;
&lt;p&gt;
The hackers might have stolen much more but most transfers have fortunately been stopped by the Fed and one transfer has been stopped by Deutsche Bank.
&lt;/p&gt;

&lt;p&gt;
&lt;b&gt;Deutsche Bank saved 20 million USD&lt;/b&gt;
&lt;/p&gt;

&lt;p&gt;
Four requests to transfer a total of about 81 million USD to the Philippines went through, but the fifth one to transfer 20 million USD to a Sri Lankan non-profit organization was held up because the hackers misspelled the name of a non-existent NGO, Shalika Foundation, by writing &quot;fandation&quot; instead of &quot;foundation&quot;. 
&lt;/p&gt;
&lt;p&gt;
This prompted the Deutsche Bank, a routing bank, to seek clarification from the Bangladesh central bank, thereby stopping the transaction.
&lt;/p&gt;

&lt;p&gt;
&lt;b&gt;The Fed saved 850 million USD&lt;/b&gt;
&lt;/p&gt;

&lt;p&gt;
The Federal Reserve Bank did not execute 30 of the 35 transfers, worth around 851 million USD, officially due to &quot;lack of details.&quot; These thirty transactions were flagged by the banking system for staff review.
&lt;/p&gt;
&lt;p&gt;
The Fed was still tricked into paying out 101 million USD. But the losses could have been much higher had the name &lt;b&gt;Jupiter&lt;/b&gt; not formed part of the address of a Philippines bank where the hackers sought to send hundreds of millions of dollars more. 
&lt;br&gt;
By chance, &lt;i&gt;Jupiter&lt;/i&gt; was also the name of an oil tanker and a shipping company under United States&apos; sanctions against Iran. That sanctions listing triggered concerns at the New York Fed and spurred it to scrutinize the fake payment orders more closely.
&lt;/p&gt;
&lt;p&gt;
It was a &quot;total fluke&quot; that the New York Fed did not pay out the 951 million USD requested by the hackers. There is no suggestion the oil tanker or shipping company was involved in the heist.
&lt;br&gt;
The Reuters examination has also found that the payment orders sent by the hackers were exceptional in several ways. They were incorrectly formatted at first; they were mainly to individuals; and they were very different from the usual run of payment requests from Bangladesh Bank. 
&lt;br&gt;
Yet it was the word Jupiter that set the loudest alarm bells ringing at the New York Fed.
&lt;/p&gt;


&lt;p&gt;
&lt;b&gt;The printer error&lt;/b&gt;
&lt;/p&gt;

&lt;p&gt;
A printer &quot;error&quot; helped Bangladesh Bank discover the heist. The bank&apos;s SWIFT bridge (running Alliance Access) was configured to automatically print out confirmations back from correspondent banks. 
&lt;br&gt;
The printer works 24 hours so that when workers arrive each morning, they check the tray for transfers that got confirmed overnight. 
&lt;br&gt;
But on the morning of Friday February 5, the director of the bank found the printer tray empty. When bank workers tried to print the reports manually, they couldn&apos;t. The software on the terminal that connects to the SWIFT network indicated that a critical system file was missing or had been altered.
&lt;br&gt;
The problem is deemed to be an unwanted bug with the worm, a failure in the attack if one likes, since the worm was programmed to remove confirmation of fraudulent payments from the confirmation stream being sent to the printer.
&lt;br&gt;
Fortunately, in this case, the Fed clarification requests and the Deutsche Bank request would have anyway alerted the bank, so even if the worm had functioned correctly, the bank would have been made aware of the attack.
&lt;/p&gt;
&lt;p&gt;
When they finally got the software working the next day and were able to restart the printer, dozens of suspicious transactions spit out. The Fed bank in New York had apparently sent queries to Bangladesh Bank questioning dozens of the transfer orders, but no one in Bangladesh had responded. 
&lt;br&gt;
Panic ensued as workers in Bangladesh scrambled to determine if any of the money transfers had gone through - their own records system showed that nothing had been debited to their account yet - and halt any orders that were still pending. 
&lt;br&gt;
They contacted SWIFT and New York Fed, but the attackers had timed their heist well; because it was the weekend in New York, no one there responded. It wasn&apos;t until Monday that bank workers in Bangladesh finally learned that four of the transactions had gone through amounting to 101 million USD.
&lt;/p&gt;

&lt;p&gt;
This article on the Fin website is magnificent and gives a lot of additional and cool information on the attack: &lt;a href=&quot;https://fin.plaid.com/articles/anatomy-of-a-bank-heist&quot;&gt;https://fin.plaid.com/articles/anatomy-of-a-bank-heist&lt;/a&gt;.
&lt;/p&gt;


&lt;a name=&quot;sec33&quot;&gt;&lt;/a&gt;
&lt;h3&gt;3.3 Timeline of the attack&lt;/h3&gt;

&lt;p&gt;
In every movie about bank robberies, timing is presented as critical. Here as well timing has been an essential concern and brilliantly mastered by the attackers.
&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;a href=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/f241e7dc-6d4c-4f7e-932a-e8c90bb3d6a4&quot;&gt;
&lt;img class=&quot;centered&quot; style=&quot;width: 850px;&quot; alt=&quot;Timeline of the attack&quot; src=&quot;https://www.niceideas.ch/roller2/badtrash/mediaresource/f241e7dc-6d4c-4f7e-932a-e8c90bb3d6a4&quot; /&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;

&lt;p&gt;
In details:
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;b&gt;May 15, 2015:&lt;/b&gt; three dollar bank accounts in the Jupiter, Makati branch of the Rizal Commercial Banking Corporation (RCBC) were opened under the names of Enrico Teodoro Vasquez, Alfred Santos Vergara, Michael Francisco Cruz and Jessie Christopher Lagrosas, with an initial deposit of 500 USD each. These accounts, which were later found to be fake, remained idle until February 4, 2016.
&lt;/li&gt;
&lt;li&gt;
&lt;b&gt;January 2016:&lt;/b&gt; The hackers installed the malware on the bank&apos;s system some time in January, not long before they initiated the bogus money transfers on February 4. This was brilliant as well since installing it too soon might have made it detected before the heist and installing it too late might not have enabled them to assess its behaviour.
&lt;/li&gt;
&lt;li&gt;
&lt;b&gt;February 4, 2016: &lt;/b&gt; Under control of the hackers, the malware broke into Bangladesh Bank&apos;s VOSTRO account with the Federal Reserve Bank of New York, ordering 35 transfers worth 951 million USD, bulk of which to be transferred to RCBC Jupiter branch.
&lt;br&gt;
The Fed managed to detect and block 30 fraudulent transactions but 5 transfers worth 101 million USD haven&apos;t been blocked.
&lt;/li&gt;
&lt;li&gt;
&lt;b&gt;February 5, 2016: &lt;/b&gt; The fed tried to contact the Bangladesh Bank to get an explanation about these transfers, including the 5 non blocked.
&lt;br&gt;
&lt;b&gt;But Feb 5 was a banking holiday in the Bengladesh&lt;/b&gt; and nobody could answer.
&lt;/li&gt;
&lt;li&gt;
&lt;b&gt;February 5 to February 8, 2016: &lt;/b&gt; The 5 transfer are executed by the correspondent banks and the routing banks. 
&lt;br&gt;
One transaction of 20 million USD has been salvaged. This was after an instruction to a fake Sri Lankan foundation was put on hold by Deutsche Bank, one of the routing bank, because of a typographical mistake. 
&lt;br&gt;
But the remaining 81 million USD stolen funds found their way to 4 fake bank accounts in RCBC.
&lt;/li&gt;
&lt;li&gt;
&lt;b&gt;February 8, 2016:&lt;/b&gt; Bangladesh Bank sent a &quot;stop payment&quot; order to RCBC. The request means the central bank was asking to refund the stolen funds or freeze the funds if these were not transferred yet.
&lt;br&gt;
&lt;b&gt;February 8 is a Chinese New Year non-working holiday for the Philippines.&lt;/b&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;b&gt;February 9:&lt;/b&gt; RCBC received a SWIFT code from Bangladesh Bank requesting for a refund or putting it on hold if the funds had been transferred or freeze them for proper investigation.
&lt;br&gt;
Despite the &quot;stop payment&quot; order, RCBC Jupiter branch still allowed withdrawals from the accounts.
&lt;br&gt;
Money was then consolidated and deposited in a dollar account of William So Go of DBA Centurytex Trading, which was opened on the same day.
&lt;br&gt;
In the following days the money was laundered in the Casinos.
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;
The timing was perfect. A unique Week-End preceded by a business holiday in Bengladesh and followed by a the Chinese New Year holiday in the Philippines, an ideal situation. 
&lt;nr&gt;
The Fed couldn&apos;t get the required clarification from Bangladesh Bank on the next day and as such didn&apos;t attempt to recover the 5 orders that passed immediately.
&lt;br&gt;
On Monday, the stop orders sent by the Bangladesh bank couldn&apos;t be processed by the RCBC to freeze the funds since it was a banking holiday in Philippines.
&lt;br&gt;
In addition, the chinese new-year and the volume of exchanges in casinos at such occasion made the laundering of the money straightforward, not to mention the Philippines weak AML laws and practices.
&lt;/p&gt;

&lt;a name=&quot;sec34&quot;&gt;&lt;/a&gt;
&lt;h3&gt;3.4 Laundering of the money&lt;/h3&gt;

&lt;p&gt;
Getting the money out is also difficult. Here the laundering scheme was both easy and magnificent. Money has been laundered through the Philippines. 
&lt;/p&gt;
&lt;p&gt;
The 81 million USD that was successfully stolen was sent to the Philippines to accounts at the Rizal Commercial Banking Corp (RCBC) held by two Chinese nationals who organize gambling junkets in Macau and the Philippines. The money was moved to several Philippine casinos and then subsequently to international bank accounts. 
&lt;br&gt;
Laundering money in a Casino is fairly straightforward. One just need to touch the money as chips at any counter, loose one at any random game and then pretend one&apos;s lost enough and put it back in another account. Boom, laundered. The banking institution behind the account one withdrawn money from assumes it&apos;s been lost gambling while the other banking institution behind the account the money is put back one assumes it&apos;s been won in the Casino. 
&lt;/p&gt;
&lt;p&gt;
Philippine casinos are exempted of anti-money laundering law that requires them to report suspicious transactions, making them an attractive target for this kind of crime.
&lt;br&gt;
Plus can you imagine the amount of money transferred, spent, won and lost in Philippine&apos;s Casinos during Chinese New-Year ? 
&lt;br&gt;
The volumes and the kind of operations makes everything absolutely untraceable.
&lt;/p&gt;
&lt;p&gt;
Bamm ! Done. Money Laundered. 
&lt;/p&gt;


&lt;a name=&quot;sec4&quot;&gt;&lt;/a&gt;
&lt;h2&gt;4. Aftermath&lt;/h2&gt;

&lt;p&gt;
&lt;b&gt;What Does the Heist Mean?&lt;/b&gt;
&lt;/p&gt;

&lt;p&gt;
Even if the hackers didn&apos;t compromise the SWIFT network itself, such that all of SWIFT banks were vulnerable, it&apos;s still bad news for the global banking process. By targeting the methods that financial institutions use to conduct transactions over the SWIFT network, the hackers undermine a system that until now had been viewed as stalwart.
&lt;/p&gt;

&lt;p&gt;
&lt;b&gt;Who&apos;s to Blame?&lt;/b&gt;
&lt;/p&gt;
&lt;p&gt;
Honestly only the attackers are really to blame.
&lt;br&gt;
But still, without such amazing security weaknesses in the Bengladesh Central Bank and with better control and stricter procedures in place at the Fed, the attack would not have been possible.
&lt;br&gt;
Of course, the Bangladesh Bank blames the Fed for allowing the money transfers to go through instead of waiting for confirmation from Bangladesh. The Fed counters that it contacted the bank to question and verify dozens of suspicious transfers and never got a response. Authorities at the Fed said that workers followed the correct procedures in approving the five money transfers that went through and blocking 30 others. Bangladesh Bank says the Fed bank should have blocked all money transfers until it got a response on the ones it deemed suspicious. And so on ...
&lt;/p&gt;

&lt;p&gt;
&lt;b&gt;The Bengladesh Bank&lt;/b&gt;
&lt;/p&gt;
&lt;p&gt;
Aside from the loss of money, the Central Bank&apos;s governor, Atiur Rahman has resigned due to the incident. The bank promised to improve their cyber-security and ensure this kind of bank heist is prevented in the future.
&lt;/p&gt;

&lt;p&gt;
&lt;b&gt;The Fed&lt;/b&gt;
&lt;/p&gt;
&lt;p&gt;
The immediate result of the breach for the New York Fed is a claim from the Bangladesh Bank for payment of lost funds and a potential lawsuit.
&lt;/p&gt;
&lt;p&gt;
The Fed focused security resources on other priorities, such as preventing money-laundering and enforcing U.S. economic sanctions, officials with knowledge of the bank&apos;s security operations told Reuters. Fed officials took some comfort in the fact that SWIFT&apos;s security software had never been cracked.
&lt;/p&gt;
&lt;p&gt;
The Bengladesh heist forced the Fed to invest massively in Fraud prevention solutions and better transaction monitoring systems.
&lt;/p&gt;

&lt;p&gt;
&lt;b&gt;Philrem services&lt;/b&gt;
&lt;/p&gt;

&lt;p&gt;
The Philippine central bank has revoked the license of a remittance company that anti-money laundering investigators said was used to transfer some of the 81 million USD hackers looted from the Bangladesh central bank.
&lt;br&gt;
The Anti-Money Laundering Council (AMLC) issued a complaint against Philrem Service Corporation on April 28, accusing it of creating a fog around transactions and washing the stolen funds via a web of transfers and currency conversions through Philippine bank accounts, before moving the cash through casinos in Manila and junket operators.
&lt;/p&gt;

&lt;p&gt;
&lt;b&gt;The Philippines&lt;/b&gt;
&lt;/p&gt;

&lt;p&gt;
The Philippines&apos; involvement in the 100 million USD Bangladesh Bank heist, which has risked its return to the FATF gray list, showed the urgency of putting more teeth into the Anti-Money Laundering Act (AMLA).
&lt;/p&gt;
&lt;p&gt;
The law, which was first introduced in 2001, left casinos out of the list of entities required to report suspicious transactions to the AMLC. There were efforts in the Senate to include this provision in the amended AMLA in 2013, but
this was blocked by some lawmakers and casinos lobbies.
&lt;/p&gt;



&lt;a name=&quot;sec5&quot;&gt;&lt;/a&gt;
&lt;h2&gt;5. Conclusion&lt;/h2&gt;


&lt;p&gt;
If the hackers had indeed managed to get away with the terrifyingly large amount of 1 billion USD, this would have easily been the biggest bank heist in history, not to mention cyber heist.
&lt;/p&gt;
&lt;p&gt;
Interestingly, these kinds of attacks will be increasingly common and if banks aren&apos;t updating their security processes and maintaining their network infrastructures, and the success rates of these attacks will only go up. Worse still, if hackers have access to banks and can manipulate funds, any businesses that partner with those banks is also at risk.
&lt;/p&gt;
&lt;p&gt;
Imagine the following, if the worm had functionned correctly and not blocked the printer, if the Deutsche bank didn&apos;t find the typo, if the Fed didn&apos;t become suspicious because of the Jupiter keyword, the attack might have been a complete success. Not only the attackers would have successfully withdrawn almost one billion US dollars from the Bangladesh bank VOSTRO account at the Fed, but the attack might have been noted only weeks or months after the facts.
&lt;/p&gt;
&lt;p&gt;
Finally, imagine that the same attack succeeds against a american or an european bank. In the US and in Europe, the SWIFT interfaces are integrated in an STP (Straight Through Processing) way. There is no such thing as manual reconciliation from some papers printed on a printer. The handling of confirmations and position reconciliation is mostly completely automated. 
&lt;br&gt;
As such, the same attack succeeding in Europe for instance might take months to be discovered and uncovered, only a the moment the big position reconciliations between NOSTRO and VOSTRO accounts in correspondent banks are triggered.
&lt;/p&gt;
&lt;p&gt;
And this is where it gets really funny. Everybody always had the illusion that SWIFT was so secure, so sure. It gave banking institutions worldwide the illusion that everything related to SWIFT is just as secure. But if the network itself is pretty secure indeed, the specific bridges and interfaces linking the Banking Information Systems to SWIFT can be very weak, as shown by the Bangladesh Heist.
&lt;br&gt;
Today european and US banking institutions and central banks are very worried and investigating transaction monitoring and security solutions to prevent such misadventure to happen to them.
&lt;br&gt;
Again the same attack in Europe would be a much bigger disaster.
&lt;/p&gt;

&lt;p&gt;
Now another funny story to conclude this article: imagine a similar hack between two banks in Europe and imagine that one of them suspects something ... They would use SWIFT again to reconcile their views of the truth (MT109 and MT999).
&lt;br&gt;
These messages can be hacked just as well, in which case the theft may remain uncovered for months.
&lt;br&gt;
This is really hilarious.
&lt;/p&gt;

&lt;p&gt;
(This article is available as a slideshare presentation here 
&lt;a href=&quot;https://www.slideshare.net/JrmeKehrli/deciphering-the-bengladesh-bank-heist&quot;&gt;https://www.slideshare.net/JrmeKehrli/deciphering-the-bengladesh-bank-heist&lt;/a&gt;)
&lt;/p&gt;

&lt;div class=&quot;centering&quot;&gt;
&lt;div class=&quot;centered&quot; style=&quot;border: 1px solid #AAAAAA; width: 700px; text-align: left;&quot; &gt;
&lt;p&gt;
&lt;b&gt;Edit Sep 3rd, 2020&lt;/b&gt;
&lt;/p&gt;
&lt;p&gt;
At the time of writing of this article, it was a common belief in the group of people I was discussing this with that the main worm used for the heist (EvtDiag filename) was a custom version of the Dridex worm.
&lt;br&gt;
It has been brought to my attention that nothing confirm this hypothesis, on the contrary multiple experts and studies show EvtDiag had nothing to do with Dridex.
&lt;br&gt;
So even though some other sources are clearly pointing Dridex as (one of) the the worm(s) used in the attack (e.g. &lt;a href=&quot;http://www.straitstimes.com/business/dridex-malware-linked-to-bangladesh-heist&quot;&gt;http://www.straitstimes.com/business/dridex-malware-linked-to-bangladesh-heist&lt;/a&gt;), this should be taken cautiously.
&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;

</content>
    </entry>
</feed>

