Step 1 of 2
Run a Free Risk Check
Tell us who you want to research. We’ll ask for your details in the next step.
A person can have multiple names, multiple entities, and multiple risk connections. Social graph mapping connects the dots that a standard name search misses entirely.
A single-name search returns a clean result; the same individual operating through 12 aliases across 8 jurisdictions and 15 shell entities remains invisible. This is how beneficial ownership networks evade detection—and why compliance failures cost firms an average of $274M per AML penalty, according to FinCEN enforcement data.
Traditional KYC checks query one name against one database at a time. They miss the fundamental architecture of modern financial crime: networked obfuscation. A sanctioned individual registers a new entity under a transliterated surname variant six weeks post-designation. A vendor shares three directors with a litigation-linked shell company. A counterparty’s UBO appears on a PEP list under a maiden name in a different jurisdiction.
These connections exist in public registries, court dockets, and corporate filings—but in fragments. No single search surfaces them. Manual cross-referencing takes 40–80 hours per entity and still leaves gaps.
Names are not unique identifiers. “Ahmed Hassan” becomes “A. H. Trading Ltd.” in one registry, “Ahmet Hasan GmbH” in another, and “AH Investments Holding” in a third. Each variant passes a standalone name check. The network remains hidden.
Common alias techniques include:
A single individual using 15+ name variants across entities in different languages can obscure $50M+ in beneficial ownership. Standard screening flags zero risk. Social graph mapping collapses the network into a single node in under 4 minutes.
Risk data lives in silos. UBO registries in the EU update quarterly; OFAC sanctions lists update daily; corporate filings in offshore jurisdictions lag by months. Litigation dockets in one country do not cross-reference directorship records in another. Adverse media mentions use informal names; official registries use legal names.
No commercial database integrates all layers. Compliance teams query each source independently, then attempt manual correlation. High-incidence names (“John Smith,” “Li Wei”) generate thousands of false positives. Low-frequency names with spelling variants generate false negatives.
The compliance officer must answer: Is this the same person? The data offers no definitive link. The investigation stalls or proceeds on incomplete intelligence.
Regulatory penalties: FATF standards and EU AML Directives require firms to identify Ultimate Beneficial Ownership and connected PEP exposure. Failures trigger enforcement. In 2023, global AML fines exceeded $5.1B, with the majority citing inadequate due diligence on complex ownership structures.
Fraud losses: Undetected alias networks enable invoice fraud, trade-based money laundering, and sanctions evasion. A vendor using a shell network to layer payments can siphon millions before detection. Average fraud loss per incident in cross-border transactions: $1.4M, per ACFE data.
Reputational damage: A counterparty later revealed as connected to sanctioned entities or under regulatory investigation exposes the firm to negative press, client attrition, and capital market penalties. Reputational recovery timelines extend 18–36 months post-incident.
Operational disruption: Remediation programs, regulatory investigations, and internal audits divert resources. M&A deals collapse when hidden liabilities surface during buy-side diligence. Legal teams face discovery requests for records that were never collected because the alias network was invisible at onboarding.
Most KYC vendors offer name-matching against sanctions lists and PEP registries. They do not map relationships between entities. They do not correlate directorship overlaps, shared addresses, or co-defendant litigation patterns. They do not disambiguate aliases or transliterations at scale.
The database returns: “No match found.” The hidden network remains hidden. The risk is onboarded. Months later, a regulatory inquiry or adverse media report surfaces the connection. By then, the exposure is material and the remediation cost is high.
See how legal and compliance intelligence depends on cross-entity relationship mapping, and why M&A due diligence requires full beneficial ownership graphs before deal closure.
The compliance officer knows the risk exists. The data to prove it is public. The tools to connect it at speed do not exist in traditional workflows. Manual research is too slow; automated screening is too shallow. The gap between data availability and decision intelligence is where risk hides—and where losses accumulate.
Social graph mapping and alias detection close this gap. They transform fragmented records into a unified risk network, surfaced in minutes, not weeks. They enable compliance teams to act on intelligence that was always present but never accessible at decision speed.
A social graph is a network structure where individuals and entities (nodes) are connected by documented relationships (edges)—ownership stakes, shared directorships, common addresses, litigation co-parties, and family ties. Unlike traditional KYC checks that evaluate a single counterparty in isolation, social graph analysis reveals the full constellation of connections that signal hidden risk.
This approach differs from single-name screening because it detects patterns invisible to linear searches: undisclosed beneficial owners operating through layered entities, sanctioned individuals using relatives as proxy directors, and litigation clusters linking seemingly unrelated counterparties.
Social graph mapping operates across four analytical layers, each designed to surface a distinct category of hidden connection:
Ultimate Beneficial Ownership structures often span multiple jurisdictions, with shell entities, trust arrangements, and nominee directors obscuring the individuals who ultimately control assets. Social graph analysis links these entities by cross-referencing corporate registries, shareholder disclosures, and directorship records across 190+ countries.
A single individual may hold indirect stakes in 12+ entities through a cascade of holding companies registered in Luxembourg, Cyprus, and the British Virgin Islands. Traditional KYC flags each entity independently; social graph mapping collapses the network into a single ownership web, revealing concentration of control and undisclosed cross-entity relationships.
Shared directors and officers across multiple entities often indicate coordinated control or influence, especially when those entities operate in unrelated industries or distant jurisdictions. A director appearing on the boards of a logistics firm in Hamburg, a trading company in Dubai, and a financial services entity in Panama warrants scrutiny—particularly if those entities share transaction counterparties or appear together in adverse media.
Diligard flags these overlaps automatically, scoring each connection by the number of shared officers, the industries involved, and the presence of additional risk indicators (sanctions exposure, PEP links, litigation history).
Entities registered at the same address—especially high-volume incorporation addresses, virtual offices, or front-company locations—signal potential coordination or nominee arrangements. A single office suite in Cyprus housing 40+ registered entities, several of which share directors and appear in the same regulatory investigation, represents a clear risk cluster.
Social graph mapping indexes these address patterns and cross-references them with sanctions lists, PEP registries, and adverse media. When multiple entities at the same address also share directorship links or litigation co-parties, the probability of intentional obfuscation rises sharply.
Individuals and entities use multiple name forms to evade detection: transliteration variants (Ahmed Hassan, Ahmet Hasan), legal vs. trade names (J. Smith & Co. vs. John Smith Trading Ltd.), and typographical permutations. A single person operating under 15+ name variants across 8 jurisdictions can fragment their risk profile into isolated records that standard name-matching algorithms treat as separate entities.
Alias detection applies probabilistic matching (phonetic similarity, context-aware disambiguation) and cross-source corroboration to collapse these variants into unified profiles. The system then links those profiles to corporate entities, litigation records, and sanctions lists, exposing the full network of activity under a single identity.
Social graph accuracy depends on the breadth and freshness of underlying data. Diligard fuses multiple high-confidence sources in real time:
Each relationship in the graph is annotated with source provenance, confidence score, and retrieval timestamp, ensuring full auditability for regulatory review or legal compliance intelligence.
An M&A due diligence team evaluates a logistics firm in Germany. The target’s declared ownership structure shows a single holding company in Luxembourg with two named directors. A social graph scan reveals:
Traditional single-name KYC on the German logistics firm would flag no issues. Social graph mapping surfaces a high-risk network connecting sanctions exposure, litigation, and undisclosed beneficial ownership—all within 4 minutes. The M&A team escalates the finding, requests additional disclosure, and ultimately renegotiates deal terms to mitigate exposure.
Social graph mapping is not limited to M&A contexts. Executive due diligence, contractor background screening, and family office risk management all benefit from relationship-layer analysis. A prospective CFO with undisclosed directorship links to sanctioned entities, or a supply chain partner sharing officers with litigation-heavy entities, represents material risk that standard background checks miss.
For personal safety verification, domestic staff screening, and private sales due diligence, social graph analysis adds a layer of security by revealing undisclosed associations with known bad actors or litigation-prone networks. In estate planning risk assessment, it uncovers hidden liabilities or adverse connections that could jeopardize asset protection strategies.
The largest operational barrier in social graph mapping is false positive noise—when “Ahmed Hassan” matches 600 individuals across 190 countries, compliance stops. Entity disambiguation separates signal from noise by validating each alias connection against corroborating data layers before flagging it as actionable risk.
The system constructs a candidate pool of potential matches by applying systematic name-variant generation rules across four dimensions:
This expansion phase deliberately over-includes variants; precision comes in the next layer.
Each candidate alias pair receives a probabilistic match score (0–100) based on three algorithms running in parallel:
Phonetic matching: Soundex and Metaphone algorithms detect pronunciation-equivalents—”John” and “Jon,” “Catherine” and “Kathryn”—common in transliteration and informal filings. Score contribution: 15–25 points.
Context-aware de-duplication: Candidates matched on name alone are cross-checked against address, date of birth, nationality, and entity registration date. A “John Smith” in London with DOB 1975-03-12 and a “J. Smith” in a UK registry with the same DOB and shared director address = 85+ score. A “John Smith” in London and “John Smith” in Lagos with no overlapping attributes = 10–20 score, filtered as noise.
Graph-based corroboration: If two candidate aliases share a second-degree connection (same director, same corporate address, or appear together in litigation dockets), the match score increases by 20–30 points. This detects intentional obfuscation—where an individual uses slight name variants across entities but maintains consistent operational relationships.
Matches are routed into three tiers based on final confidence score and data-source validation:
Tier 1 (High-Confidence, Score ≥70): Corroborated by corporate registry + sanctions list or corporate registry + litigation docket or UBO filing + adverse media. Displayed in primary risk dashboard; actionable without manual review. Example: “Ahmed Hassan” and “A. H. Trading Ltd.” share registered address, same director surname, and one adverse media article naming both in a regulatory investigation.
Tier 2 (Corroborating Signal, Score 50–69): Name match + one Tier 1 data source or name match + two Tier 2 sources. Flagged for investigator review; not blocking but requires human judgment. Example: “Aleksandr Ivanov” and “Alexander Ivanov” share city of registration and industry code, but no litigation or sanctions link.
Tier 3 (Exploratory, Score <50): Name-match only or weak contextual overlap (e.g., common surname + generic address). Logged for audit trail but not surfaced in standard risk reports. Example: “John Smith” in New York and “J. Smith” in Singapore with no shared attributes beyond name.
This tiering prevents compliance teams from drowning in false positives while preserving a full audit trail for regulatory review.
Each high-confidence alias link undergoes a final validation step before becoming part of the social graph:
The result: a 3–5% false positive rate on Tier 1 connections, with full provenance and confidence metadata attached to each edge in the graph.
For a compliance officer running KYB workflows, the system returns:
This same workflow applies to M&A due diligence, where hidden liabilities surface through undisclosed beneficial ownership, and investor due diligence, where fund managers assess counterparty networks for sanctions exposure or reputational risk.
Names with high global frequency (“Mohamed Ali,” “John Smith,” “Li Wei”) receive special handling:
This approach reduces noise while preserving recall on high-stakes targets.
Cross-language registries introduce systematic ambiguity:
Arabic names: “محمد حسن” can transliterate to “Mohamed Hassan,” “Mohammed Hasan,” “Muhammad Hasaan”—each appears in different jurisdictions. The system applies FATF transliteration standards and cross-references known alias dictionaries to cluster these variants, then validates against shared corporate registration or litigation records.
Chinese names: “李伟” becomes “Li Wei” or “Wei Li” depending on registry naming conventions. The system tracks both orders and applies probabilistic scoring when one order appears in a sanctions list and the reversed order appears in a corporate filing with a matching address.
Cyrillic and diacritic handling: “Владимир” has multiple Latin equivalents (“Vladimir,” “Wladimir,” “Volodymyr”). Phonetic matching plus UBO registry cross-checks resolve these to a single entity node when operational context aligns.
These edge cases account for 15–20% of Tier 2 matches; most are resolved via context validation and never reach manual review.
Traditional alias resolution and entity disambiguation requires 40–80 hours of manual research per medium-complexity counterparty. Diligard’s automated disambiguation delivers the initial scan in under 4 minutes, with 15–30 minutes for investigator review of Tier 2 leads.
Accuracy metrics:
This speed-accuracy balance enables real-time vendor onboarding, contractor screening, and ongoing monitoring without sacrificing regulatory defensibility.
Alias-disambiguation outputs feed directly into:
This closed-loop system ensures that disambiguation is not a one-time event but an ongoing risk-management function.
Social graph mapping transforms alias networks and entity webs into actionable risk intelligence within compliance workflows, delivering the depth of a multi-jurisdictional investigation in under 4 minutes.
Onboarding a counterparty triggers simultaneous searches across 500M+ records. The system identifies name variants, transliterations, and legal entity permutations, then queries sanctions lists, corporate registries, and adverse media databases. Each connection—shared directors, overlapping addresses, linked litigation—appears with source attribution, confidence score, and timestamp.
Operational Output: A compliance officer sees “Ahmed Hassan” linked to “A. H. Trading Ltd.” (UK), “Ahmet Hasan GmbH” (Germany), and “AH Investments Holding” (BVI) within the first 3 minutes. Cross-source corroboration (shared registered address + director name match + adverse media mention of all three entities in a regulatory investigation) flags the network at 92% confidence. Decision: escalate for enhanced due diligence.
Speed Benchmark: Manual cross-border registry searches, litigation docket pulls, and media scanning for this network: 40–60 hours. Diligard: under 4 minutes for initial scan, 15 minutes for investigator review and annotation. Legal compliance teams maintain audit-ready documentation while accelerating onboarding cycles.
Acquisition targets often involve complex ownership structures, shell entities, and undisclosed directorships that conceal litigation exposure or sanctions risk. Social graph mapping surfaces these connections before deal closure.
Case Pattern: Target company lists a single director in corporate filings. Graph analysis reveals this director also serves on boards of four other entities across three jurisdictions—two with active litigation, one with a PEP as ultimate beneficial owner, and one registered at an address flagged in adverse media for sanctions evasion. Traditional KYB checks, limited to the named entity, miss this entirely.
Risk Signal: Undisclosed beneficial ownership network + litigation exposure + PEP linkage = high-probability deal-breaking liability. M&A advisors receive annotated relationship maps with clickable source links to court dockets, registry filings, and media articles, enabling defensible walk-away decisions or price adjustments.
Fraudsters and sanctions evaders create multi-entity webs to obscure beneficial ownership and transaction flows. Temporal clustering and entity-proliferation thresholds detect these patterns.
Detection Example: Five entities formed within 60 days, each in a different jurisdiction, with name variants of the same individual (transliteration shifts, middle-name permutations, acronym usage). All share a registered address known from adverse media as a front office. One entity transacts with a sanctioned counterparty documented in OFAC notices.
Automated Alert Logic: Rapid entity creation post-sanction designation + shared address cluster + transaction link to sanctioned party = structuring/evasion flag within 4 minutes. Vendor screening teams block onboarding immediately, avoiding compliance violations and financial exposure.
Risk profiles change. Directors resign, entities are sanctioned, litigation is filed, adverse media emerges. Continuous monitoring re-scans connected entities and aliases daily, triggering alerts when material changes occur.
Monitoring Trigger: A previously cleared counterparty’s director is added to the EU sanctions list. The system detects the director’s alias network (three name variants across two languages) and flags all connected entities—including the onboarded counterparty—within 24 hours of the sanctions update.
Operational Impact: Compliance officers receive prioritized alerts with updated relationship graphs, source documents, and risk-tier recalculations. Investor due diligence and family office risk teams maintain current risk postures without manual re-screening overhead.
Social graph outputs integrate with downstream case management, escalation protocols, and regulatory reporting systems. Each detected relationship includes structured metadata: entity identifiers, relationship type (shared director, UBO link, litigation co-party), confidence score, and source provenance.
System Handoff: High-confidence connections (score ≥70) route directly to investigator queues with pre-populated case files. Medium-confidence leads (score 50–69) appear in exploratory dashboards for optional review. Low-confidence matches are logged but do not trigger alerts, reducing false-positive fatigue.
Audit Trail: Every graph node and edge includes retrieval timestamp, source URL, and analyst annotations. This documentation meets OFAC, FinCEN, and ECB defensibility standards for regulatory examinations and legal discovery. Executive screening and contractor vetting workflows leverage this same audit-grade structure.
Not all connections carry equal risk weight. Relationship scoring differentiates actionable intelligence from investigative leads.
High-Confidence (Score ≥70): Corroborated by Tier 1 data (corporate registry + sanctions list + litigation docket). Example: shared director + UBO disclosure + court filing naming both entities as co-defendants. Action: Block onboarding or escalate for enhanced due diligence.
Medium-Confidence (Score 50–69): Supported by Tier 2 data (adverse media + alias match + shared address). Example: name variant in media article + registered address overlap + industry alignment. Action: Flag for investigator review; request additional documentation from counterparty.
Exploratory (Score <50): Single-source or weak signal (common name match, distant address proximity, unrelated industry). Action: Log for reference; no immediate escalation unless corroborating data emerges.
Supply chain risk teams and personal safety verifiers adjust score thresholds based on risk appetite, balancing thoroughness with operational velocity.
Social graph mapping operates across fragmented data landscapes—national registries with inconsistent formats, sanctions lists updated at different cadences, litigation dockets in multiple languages. Diligard fuses these sources into a single, queryable graph.
Data Normalization: Entity names, directorship records, and UBO disclosures are standardized (transliteration rules, date formats, address parsing) before graph construction. Aliases are matched using probabilistic scoring, phonetic analysis, and context-aware disambiguation.
Update Cadence: Sanctions lists refresh within 24 hours of official publication. Corporate registries sync weekly to monthly (jurisdiction-dependent). Adverse media scans run daily across 50+ languages. Litigation dockets update as courts publish filings.
Result: A counterparty flagged in a Polish court filing, linked via alias to a sanctioned entity in the UAE, with a director also serving on a BVI shell—this network is visible in a single 4-minute scan. Estate planning advisors and private sales verifiers access the same cross-border depth as institutional compliance teams.
Compliance officers receive a risk-tiered graph with confidence scores on every connection—not raw data dumps. High-confidence links (sanctions exposure, shared UBO, litigation co-defendants) appear first; exploratory leads (shared address, weak name match) require analyst review before escalation.
Every edge in the social graph carries a 0–100 confidence score derived from source quality and attribute overlap. Connections scoring above 70—validated by Tier 1 sources (corporate registries, sanctions lists, court dockets)—trigger immediate workflow routing. Scores between 40–70 flag exploratory leads requiring human validation. Below 40, the system suppresses noise unless an investigator requests full visibility.
High-Confidence Triggers:
Exploratory Leads:
This tiering prevents alert fatigue. Compliance teams focus resources on actionable intelligence, not false positives.
Each connection displays source URL, retrieval timestamp, and the specific attributes that triggered the match. A shared directorship link shows the corporate registry jurisdiction, director name variants matched, and entity registration dates. A sanctions link cites the OFAC or UN list, designation date, and alias variants flagged.
Example Provenance Record:
This audit trail meets OFAC, FinCEN, and ECB documentation standards. M&A advisors and investor due diligence teams export these records directly into deal files and regulatory disclosures.
Diligard pushes risk signals into existing compliance workflows via API or flat-file export. High-confidence connections auto-escalate to senior review queues. Medium-confidence leads route to investigator work lists. Low-confidence matches remain in the archive unless an analyst manually promotes them.
Workflow Integration Points:
This integration eliminates manual data transfer. Risk intelligence moves from discovery to decision in minutes, not days.
Every scan generates a time-stamped report with full graph visualization, entity metadata, and source citations. These reports are admissible in regulatory examinations, litigation discovery, and M&A closings.
Report Components:
Regulators increasingly expect this level of documentation. FATF guidance emphasizes risk-based due diligence with clear evidence trails. Diligard’s reports satisfy these requirements without additional manual drafting.
Risk signals do not end at initial onboarding. Diligard monitors relationship graphs continuously. When a new sanctions designation appears, a litigation filing links an existing counterparty, or a corporate registry updates UBO data, the system re-scores all affected entities and alerts compliance teams.
Continuous Monitoring Triggers:
Alerts route to the same case management queues as initial scans. Contractor screening and supply chain ESG risk teams receive real-time updates without manual re-checks.
Diligard tracks key performance indicators across all scans and alerts:
These metrics enable compliance leaders to demonstrate program effectiveness to boards, regulators, and auditors. Estate planning and personal safety verification use cases benefit from the same performance transparency.
Scenario 1: Sanctions Evasion Network
A newly onboarded vendor lists a director “Ahmet Hasan” in Germany. Social graph mapping links this to “Ahmed Hassan” (sanctions list, 2022 designation) via shared Dubai address, phonetic match, and adverse media mentioning both names in a single investigative article. Confidence score: 91. Action: onboarding blocked pending enhanced due diligence.
Scenario 2: Undisclosed Litigation Cluster
An M&A target’s CEO shares directorship with three entities currently named in a multi-jurisdictional fraud case. Graph reveals shared legal counsel, overlapping transaction dates, and common registered addresses. Confidence score: 84. Action: deal team requests indemnity provisions and third-party investigation before close.
Scenario 3: PEP Family Network
A private sale counterparty uses a trust structure in Jersey. Alias mapping identifies the settlor’s surname matching a PEP on the EU list. Corporate registry links show shared family address and sequential entity formation dates. Confidence score: 78. Action: escalated to senior compliance for enhanced monitoring and transaction limits.
Scenario 4: Shell Network Proliferation
A contractor entity has five related companies formed within six months across three jurisdictions, all using slight name variations and the same director alias. No adverse media yet, but entity-proliferation pattern scores 68 (exploratory). Action: flagged for periodic review; transaction monitoring activated.
Each scenario demonstrates how Diligard converts complex alias and relationship data into clear, actionable risk signals—no guesswork, no manual cross-referencing, no regulatory blind spots.