AML & Compliance

Transaction Monitoring Alert Tuning: Reducing False Positives

Transaction monitoring is the operational core of any AML programme. It is also where compliance programmes most commonly fail — not through absent controls, but through poorly calibrated ones. Industry benchmarks consistently show that 90–98% of transaction monitoring alerts are false positives: genuine customer activity that triggers an alert but, after investigation, has no connection to money laundering. This ratio is not merely inefficient; it is a genuine compliance risk. When investigators are overwhelmed with false positives, the true positives that matter get lost in the noise. Alert tuning — the systematic process of calibrating monitoring scenarios and thresholds to reduce false positive rates without increasing false negatives — is one of the most technically demanding and commercially important activities in a compliance programme.

The False Positive Problem

High false positive rates are a structural feature of rules-based transaction monitoring systems. When a firm sets a threshold — say, any single cash transaction over £5,000, or any outward international transfer over £10,000 — it will generate alerts for every customer who meets that criterion, regardless of whether their activity is suspicious in context. A payroll processing company making weekly BACS payments to hundreds of employees will generate alerts. A law firm making disbursements on property transactions will generate alerts. A legitimate import/export business making regular overseas supplier payments will generate alerts. None of these are suspicious; all create investigator workload.

The consequences of sustained high false positive rates include: investigator fatigue and reduced alert quality review; delayed investigation of genuinely suspicious activity because investigator queues are full; compliance resource consumed by low-value work that could be better deployed; and, paradoxically, increased risk of a genuine SAR being missed because it is buried under hundreds of false positives.

Scenario Design and Coverage

Effective alert tuning starts with scenario design — ensuring that the monitoring rules deployed are appropriate for the risks the firm faces, properly scoped to detect the specific patterns associated with money laundering and terrorist financing, and calibrated at thresholds that make sense given the customer population.

Each monitoring scenario should have a documented rationale linking it to a specific typology or risk identified in the firm's financial crime risk assessment. Common scenario categories include: velocity monitoring (unusual number of transactions in a period), value monitoring (transactions above/below thresholds), geographic risk (transactions to/from high-risk jurisdictions), structuring detection (transactions just below reporting thresholds), behavioural deviation (activity inconsistent with established customer profile), and specific typology detection (layering patterns, round-trip transfers, multiple payee transactions).

Scenarios without a documented rationale are a regulatory red flag — they suggest the firm has deployed off-the-shelf rules without understanding what they are looking for or whether they are appropriate for its business.

Threshold Testing Methodology

Threshold optimisation is the primary lever for reducing false positive rates in rules-based systems. For each scenario, the question is: at what threshold does the alert most efficiently separate suspicious from non-suspicious activity?

The methodology involves testing alert volume and alert quality at multiple threshold levels using historical transaction data. For a given scenario and threshold, you can calculate: the number of alerts generated; the percentage of alerts that result in a SAR (the conversion rate); the estimated false positive rate; and whether any known typologies in your historical data would have been detected. By plotting these metrics across a range of thresholds, you can identify the point where incremental threshold reduction starts generating large numbers of additional alerts with minimal increase in SAR conversion — the "diminishing returns" point that suggests the threshold is too low.

Threshold testing must be conducted on a representative sample of historical data (typically 12–24 months) and must be documented with the methodology, data, results, and conclusions. The FCA and other regulators have been clear that "we deployed vendor-default thresholds" is not an adequate justification for a monitoring configuration — firms are expected to tune thresholds to their specific customer population.

Back-Testing

Back-testing takes the threshold analysis a step further: rather than testing hypothetical thresholds, it validates the current configuration against known outcomes. The process involves: identifying all SARs filed in a historical period; tracing the transactions that triggered those SARs back through the transaction monitoring system; and checking whether the current monitoring configuration would have generated an alert for those transactions. Where the back-test reveals that the current configuration would have missed the transactions that led to known suspicious activity, the configuration needs adjustment.

Back-testing should also be applied after any configuration change to confirm that the change has had the intended effect and has not introduced new blind spots. It should be documented as part of the model risk governance process.

Look-Back Reviews

When a firm identifies a systemic weakness in its historical transaction monitoring — either through its own review or as a result of regulatory examination — a look-back review may be required. A look-back involves re-running current or revised monitoring scenarios over historical transaction data to identify activity that should have been flagged but was not, and assessing whether any of that activity should have resulted in a SAR.

Look-back reviews are resource-intensive and carry regulatory risk: if they identify previously unreported suspicious activity, the firm will typically need to file retrospective SARs and may face regulatory scrutiny of the systemic failure that caused the missed detection. However, proactively identifying and remediating monitoring weaknesses is significantly preferable to having them identified by a regulator.

Model Risk Governance

Transaction monitoring systems are models in the regulatory sense — they use inputs to generate outputs (alerts) on which compliance decisions are made. As models, they are subject to model risk governance requirements, which include: model documentation (the logical basis for each scenario and threshold); model validation (independent testing that the model performs as intended); model change management (a formal process for approving changes to scenarios or thresholds); and ongoing performance monitoring (regular review of alert volumes, conversion rates, and scenario coverage).

  • All scenarios and thresholds should be documented in a model inventory with version control
  • Changes to monitoring configuration require formal change approval with documented rationale, back-testing results, and second-line sign-off
  • Model performance metrics should be reported to the MLRO and Audit/Risk Committee at least quarterly
  • Independent validation of the monitoring system should be conducted at least annually, either by internal audit or external experts
  • The firm should be able to demonstrate that its monitoring coverage maps to its risk assessment — scenarios must cover the typologies identified as relevant to the business

Alert tuning is not a one-time project — it is an ongoing operational discipline. Transaction volumes change, customer populations shift, and typologies evolve. Effective transaction monitoring requires continuous attention, regular re-calibration, and governance processes that ensure changes are made deliberately, documented thoroughly, and validated before deployment.

Need specialist payment infrastructure?

CCYFX provides compliant IBANs, FX, and payment solutions. Speak to our team today.

Apply Now

Related Articles

SARs: Best Practice Guide RegTech for AML: AI and ML Risk-Based Approach to AML

Open an Account

Compliant payments for specialist industries.

Apply Now