Overview#
A counter-terrorism analyst is tracking a subject who has used at least four different name spellings across various intelligence records, holds travel documents from two countries, and has employment history spanning three continents. Building an accurate, unified profile from that scattered data is not straightforward: sources contradict each other, identifiers expire, and new information arrives continuously from enrichment feeds. The analyst needs a single, reliable record they can trust when making time-sensitive decisions.
The Profile Person Management module maintains rich person profiles aligned to the POLE model (Person, Organisation, Location, Object, Event), resolving identity across 153+ data sources, detecting synthetic identities, and keeping profiles current through automated enrichment. It is designed for the full range of investigation contexts: KYC and AML in financial services, subject profiling for law enforcement, and ongoing monitoring for organised crime and counter-terrorism units.
Diagram
flowchart LR
A[Raw Identity Data] --> B[Entity Resolution]
B --> C[Person Profile Created]
C --> D[OSINT Enrichment]
C --> E[Sanctions Screening]
C --> F[PEP Detection]
C --> G[Relationship Mapping]
D --> H[Unified Golden Record]
E --> H
F --> H
G --> H
H --> I[Risk Assessment]
H --> J[Investigation Workspace]
H --> K[Ongoing Monitoring]Last Reviewed: 2026-02-05 Last Updated: 2026-04-14
Key Features#
- Comprehensive Person Profiles: Rich data models capture identity details including name variations, demographics, national identifiers, travel documents, digital identifiers, employment history, financial profile, risk indicators, and relationship networks in a unified profile structure.
- Identity Resolution and Matching: A multi-stage matching engine uses phonetic name matching, date proximity analysis, geographic correlation, and identifier overlap for candidate generation, then applies machine learning similarity scoring for accurate match classification.
- Synthetic Identity Detection: Pattern analysis across identity attributes identifies potential synthetic identities by detecting anomalies in identifier issuance dates, credit history inconsistencies, identity document timing, and behavioural indicators.
- Continuous Profile Enrichment: Automated enrichment pipelines update person profiles from sources including sanctions lists, public records, professional licence databases, and open-source intelligence, with configurable refresh frequencies based on risk level.
- Sanctions and Watchlist Screening: Real-time screening against global sanctions lists, PEP databases, criminal databases, and adverse media sources, with configurable matching thresholds and automated alert generation for status changes.
- Demographic and Behavioural Analytics: Population segmentation, behavioural pattern detection, and risk modelling enable identification of emerging threats, investigation prioritisation, and trend analysis across entity populations.
- Privacy and Compliance Controls: Full support for data subject rights including access, rectification, erasure, restriction, portability, and objection, with consent management, data minimisation, and configurable retention policies.
- Relationship Network Mapping: Family, associate, and organisational relationships are tracked with strength scoring, temporal context, and network analytics including centrality and risk propagation calculations.
- Risk Assessment: Comprehensive risk profiles incorporate sanctions status, PEP status, criminal records, adverse media, watchlist matches, and configurable risk factors with historical score tracking and trend analysis.
Use Cases#
- Customer Onboarding and KYC: Financial institutions create and enrich person profiles during customer onboarding, with automated identity verification, sanctions screening, PEP detection, and risk scoring.
- Investigation Subject Profiling: Investigators build comprehensive intelligence profiles on investigation subjects by aggregating identity data, screening results, relationship networks, and historical case involvement.
- Ongoing Customer Monitoring: Automated enrichment and screening detect changes in sanctions status, adverse media, PEP designation, and risk indicators for existing customer profiles, triggering alerts for compliance review.
- Duplicate Detection and Resolution: Entity resolution capabilities identify duplicate person profiles across data sources, enabling consolidation into accurate golden records for improved screening accuracy and investigation efficiency.
- Data Privacy Compliance: Automated workflows process data subject access requests, erasure requests, and consent management activities within regulatory timeframes, with complete audit trail documentation.
- Network Analysis: Relationship mapping reveals connections between persons, organisations, and financial accounts, supporting investigations into criminal networks, beneficial ownership, and undisclosed associations.
Integration#
The Profile Person Management module integrates with the platform's entity resolution, risk scoring, investigation management, and watchlist screening systems. Person profiles feed into due diligence workflows, investigation workspaces, and transaction monitoring systems. The module connects to enrichment data sources through automated connectors, and relationship data integrates with graph analysis tools for network visualisation and link analysis across investigations.