Anti-money laundering transaction monitoring is mandatory for every US bank under the Bank Secrecy Act, and the cost of getting it wrong is substantial. FinCEN has levied civil money penalties exceeding $100 million against individual institutions for deficient AML programmes, and the reputational consequences of a deferred prosecution agreement for BSA violations are worse still. Yet the dominant architecture in use at most banks — a rules engine running threshold checks against individual transactions — was never fit for purpose and is increasingly inadequate as financial crime methodologies evolve.
Why Legacy Rules Engines Fail
A typical rules-based AML system operates by comparing individual transactions against a library of scenarios: cash transactions above $10,000, structuring patterns below the CTR threshold, rapid movement of funds through correspondent accounts. Each rule generates an alert when its threshold is breached. The problem is that these rules are necessarily broad: to catch genuinely suspicious activity they must be set at sensitivity levels that capture enormous amounts of legitimate activity. False positive rates of 95% or higher are routinely reported in industry surveys, and the alert review workload those rates generate consumes the bulk of financial crimes compliance headcount without producing proportionate SAR filings.
The rules engine problem is compounded by the data it operates on. Most legacy AML systems receive a daily batch feed from the core banking platform and operate exclusively on payment transaction data. Wire transfers, ACH, and card transactions are visible; securities transactions, trade finance, and digital asset activity typically are not. Beneficial ownership data — who ultimately controls the accounts — is usually held in a separate KYC system and rarely linked at the level required for network analysis. The result is a system that can detect structuring in cash deposits but cannot identify layering across asset classes or typologies that require network-level visibility.
The supervisory standard FinCEN and the prudential regulators apply is not whether your rules engine has scenarios for every typology. It is whether your programme is effective at detecting the money laundering risk your institution actually faces. A programme that generates 97% false positives and files SARs at a rate that suggests no genuine suspicion is not effective, regardless of how many rules it contains.
The Architecture of a Modern AML Stack
A defensible modern AML architecture has four layers. The first is a unified transaction data platform that ingests all financial activity — payments, securities, trade finance, and digital assets — in near real time, with entity resolution linking accounts to beneficial owners and related parties. This layer does not exist in most banks; it requires building or buying a financial crime data platform and integrating it with every system of record. The investment is substantial but it is the foundation on which everything else depends.
The second layer is the detection engine, which should combine traditional rules for the typologies where rules work well — large cash transactions, CTR aggregation, sanctions hits — with behavioural analytics and network analysis for typologies that require contextual judgement. ML-based anomaly detection can reduce false positives by 40 to 60% compared with rules-only approaches in well-documented production deployments, while improving detection of novel typologies that rules have not been written to catch.
The third layer is the alert management and investigation platform: case management tools that present analysts with the full customer relationship context, network visualisation to surface entity relationships, and workflow automation to route cases to appropriately skilled reviewers. The fourth layer is the SAR filing and record management infrastructure, which must produce defensible SAR narratives and maintain the records required by FinCEN examination standards.
ML Models and SR 11-7 Obligations
Banks that introduce ML-based detection models into their AML programme must do so within the model risk management framework established by the Federal Reserve and OCC under SR 11-7. This creates obligations that go beyond validating the model for predictive accuracy. The model must be documented, independently validated, subject to ongoing monitoring, and the validation must address not only statistical performance but conceptual soundness and the appropriateness of the model for its intended use. Banks that deploy ML for AML without adequate model risk management frameworks discover the gap during examination — and the finding is typically more serious than the false positive problem they were trying to solve.
The Transition Risk Problem
Moving from a legacy rules engine to a modern AML stack creates transition risk that regulators are sensitive to. The standard approach is a parallel running period during which both systems operate simultaneously, with the new system generating alerts alongside the legacy system but not replacing it until the new system has been validated to capture everything the old system captured, plus more. This period typically lasts six to twelve months and requires careful documentation to demonstrate to examiners that no coverage gaps existed during the transition.
What Examiners Actually Look For
FinCEN and the prudential regulators conducting BSA/AML examinations use a risk-based approach that evaluates whether the institution has identified its money laundering risk, designed controls proportionate to that risk, and can demonstrate the effectiveness of those controls. Documentation of methodology decisions — why particular thresholds were chosen, what testing was done to validate coverage, how alert disposition decisions are quality reviewed — is as important as the technical architecture. Institutions that have modern technology but cannot explain why they believe it works face the same examination findings as those running legacy systems.
EU AI Act: What CTOs Actually Need to Do Before August 2026
DORA Is Live. Here's What 'Operational Resilience' Means for Your Codebase
FedRAMP Rev 5: What Changed and Why Most Current ATO Holders Are Already Non-Compliant
The engineering behind this article is available as a service.
We have done this work — not advised on it, not reviewed documentation about it. If the problem in this article is your problem, the first call is with a senior engineer who has solved it.