A Guide to Adverse Media Screening in AML: Best Practices Tools
Adverse media screening is a vital component of any robust Anti-Money Laundering (AML) program, helping financial institutions detect and prevent potential risks. As regulatory pressures increase, the need for efficient and accurate adverse media screening solutions has never been greater. In this guide, we'll explore the best practices, challenges, and innovative approaches to ensure your AML efforts remain effective and compliant.
Understanding Adverse Media Screening in AML
What is Adverse Media Screening?
Adverse media screening, also known as negative news screening, involves scanning various sources of public information to identify individuals or entities involved in illegal or unethical activities. This process is crucial for financial institutions, as it helps them assess the risk associated with customers or potential clients. By flagging any negative news related to money laundering, fraud, or other financial crimes, institutions can make informed decisions to protect their operations and comply with regulatory requirements.
{{cta-first}}
Why is Adverse Media Screening Crucial in AML?
Adverse media screening plays a critical role in Anti-Money Laundering (AML) efforts by providing early warnings about potential risks. Financial institutions are required to perform thorough due diligence to avoid doing business with individuals or entities involved in criminal activities. Effective adverse media screening not only safeguards the institution’s reputation but also helps prevent fines and penalties due to regulatory non-compliance.
What is Adverse Media Screening?
Adverse media screening, also known as negative news screening, involves scanning various sources of public information to identify individuals or entities involved in illegal or unethical activities. This process is crucial for financial institutions, as it helps them assess the risk associated with customers or potential clients. By flagging any negative news related to money laundering, fraud, or other financial crimes, institutions can make informed decisions to protect their operations and comply with regulatory requirements.
Why is Adverse Media Screening Crucial in AML?
Adverse media screening plays a critical role in Anti-Money Laundering (AML) efforts by providing early warnings about potential risks. Financial institutions are required to perform thorough due diligence to avoid doing business with individuals or entities involved in criminal activities. Effective adverse media screening not only safeguards the institution’s reputation but also helps prevent fines and penalties due to regulatory non-compliance.
Adverse Media Screening Process
The process involves continuous monitoring of various media sources for any negative news related to an organization. This may include traditional news outlets, social media, and other online platforms. Automated tools and technologies play a crucial role in efficiently scanning vast amounts of data and flagging potential risks. The following infographic details the adverse media screening process.

Challenges in Adverse Media Screening
Data Overload and Relevance
One of the biggest challenges in adverse media screening is the sheer volume of data that must be processed. Financial institutions must sift through vast amounts of information from various sources, including news articles, blogs, and social media. The challenge lies not only in managing this data but also in ensuring its relevance. Identifying pertinent information while filtering out irrelevant or outdated content is crucial to maintaining the accuracy and efficiency of the screening process.
Speed of News Spreading
Information travels at the speed of light in the digital era. Adverse events can gain traction rapidly, causing reputational damage before organizations even become aware of them. The challenge lies in the need for real-time monitoring and response mechanisms to keep pace with the rapid dissemination of negative news.
Multilingual and Multicultural Nuances
Adverse media screening often involves monitoring information in multiple languages and across diverse cultural contexts. The nuances of language and cultural differences can pose challenges in accurately interpreting the sentiment and impact of media content. Organizations need to deploy advanced natural language processing tools capable of handling diverse linguistic and cultural nuances.
Contextual Analysis
Understanding the context of media content is crucial for accurate risk assessment. Misinterpretation or lack of context can lead to false positives or overlook potential risks. Organizations face the challenge of developing and implementing sophisticated algorithms for contextual analysis to ensure that adverse media screening results are accurate and meaningful.
False Positives and Negatives
Striking the right balance between sensitivity and specificity in adverse media screening is challenging. A high sensitivity may lead to more accurate detection of risks but might result in false positives, triggering unnecessary alarms. Conversely, a low sensitivity may miss genuine risks, resulting in false negatives. Achieving an optimal balance requires continuous fine-tuning of screening parameters.
Integration with Existing AML Systems
Another significant challenge is integrating adverse media screening with existing Anti-Money Laundering (AML) systems. Many financial institutions use multiple systems for customer due diligence, transaction monitoring, and other compliance activities. Ensuring that the adverse media screening process works seamlessly with these systems is vital for creating a comprehensive risk management strategy. However, this integration can be complex and time-consuming, requiring robust technological solutions and expertise.
Regulatory Compliance
Adverse media screening is not just about detecting potential risks; it’s also about staying compliant with regulatory standards. Different jurisdictions have varying requirements for what constitutes adequate due diligence, and financial institutions must navigate these complexities to avoid penalties. Ensuring that the screening process meets all regulatory expectations while being efficient and effective is a continuous challenge that requires ongoing monitoring and adaptation.
Best Practices in Adverse Media Screening
Implementing best practices is essential for effective adverse news screening. This involves a combination of advanced technology, skilled personnel, and a robust risk management framework. Regularly updating search parameters, employing artificial intelligence for sentiment analysis, and collaborating with legal and compliance teams are among the recommended best practices.
1. Advanced Technology Integration
Employing cutting-edge technology is at the core of successful adverse media screening. This includes the use of sophisticated tools, software, and algorithms that can efficiently process large volumes of data from diverse media sources. Advanced technology not only enhances the speed of screening but also improves the accuracy of risk detection.
2. Skilled Personnel and Training
While technology is pivotal, the human element is equally important. Skilled personnel with expertise in media analysis, risk management, and industry knowledge play a crucial role in interpreting nuanced information. Continuous training programs ensure that the team stays abreast of the latest developments and can effectively navigate the evolving media landscape.
3. Robust Risk Management Framework
Establishing a robust risk management framework is fundamental. This involves creating clear policies and procedures for adverse media screening, outlining the roles and responsibilities of relevant teams, and integrating the screening process seamlessly into broader risk management strategies. A well-defined framework ensures consistency and accountability.
4. Regularly Updating Search Parameters
The landscape of media is dynamic, and what may be relevant today might not be tomorrow. Best practices dictate the regular updating of search parameters to adapt to emerging trends, industry shifts, and changes in the organization's context. This proactive approach ensures that the screening process remains effective and aligned with the evolving nature of media content.
5. Artificial Intelligence for Sentiment Analysis
Leveraging artificial intelligence (AI) for sentiment analysis is a game-changer. AI algorithms can analyze the tone, context, and sentiment of media content, providing a deeper understanding of the potential impact on the organization's reputation. This advanced analysis enhances the screening process by distinguishing between neutral and potentially harmful information.
6. Proactive Response Mechanisms
Best practices extend beyond detection to include proactive response mechanisms. Organizations should have predefined strategies for addressing identified risks, including communication plans, crisis management protocols, and steps for corrective actions. A swift and coordinated response can significantly mitigate the impact of adverse media events.
{{cta-ebook}}
Tookitaki's Approach to Adverse Media Screening
Tookitaki’s Smart Screening solution is designed to revolutionise the way financial institutions handle adverse media screening. Leveraging cutting-edge AI and machine learning, Tookitaki’s solution offers real-time screening capabilities across various watchlist categories, including adverse media. The platform is built to integrate seamlessly with existing AML systems, ensuring a smooth and efficient screening process that adapts to the specific needs of each institution. By providing accurate, timely, and relevant results, Tookitaki’s Smart Screening helps institutions maintain compliance and reduce the operational burden of managing large volumes of data.
How Tookitaki's Smart Screening Reduces False Positives
A common issue in adverse media screening is the generation of false positives, which can overwhelm compliance teams and divert attention from genuine risks. Tookitaki’s Smart Screening solution addresses this challenge with its advanced AI-driven approach. The platform uses sophisticated algorithms to enhance the accuracy of screening, significantly reducing the number of false positives. By prioritising relevant alerts and filtering out noise, Tookitaki enables financial institutions to focus their resources on investigating true risks, thereby improving overall efficiency and effectiveness in AML compliance.
The future of adverse media screening in AML is evolving rapidly, driven by advancements in technology and the increasing complexity of financial crime. As regulatory expectations grow, financial institutions must adopt more sophisticated tools and strategies to stay ahead. Tookitaki’s Smart Screening solution offers a comprehensive, AI-powered approach that not only enhances the accuracy and efficiency of adverse media screening but also ensures compliance with ever-changing regulations.
Ready to elevate your institution's AML compliance with cutting-edge adverse media screening? Explore Tookitaki’s Smart Screening solution today and discover how our technology can help you stay compliant, reduce false positives, and protect your reputation.
Experience the most intelligent AML and fraud prevention platform
Experience the most intelligent AML and fraud prevention platform
Experience the most intelligent AML and fraud prevention platform
Top AML Scenarios in ASEAN

The Role of AML Software in Compliance

The Role of AML Software in Compliance

Talk to an Expert
Ready to Streamline Your Anti-Financial Crime Compliance?
Our Thought Leadership Guides
The Accountant, the Fraud Ring, and the AUD 3 Billion Question Facing Australian Banks
In late April 2026, Australian authorities arrested a Melbourne accountant allegedly linked to a sprawling money laundering and mortgage fraud syndicate connected to illicit tobacco, drug importation networks, and scam operations targeting Australian victims. The case quickly drew attention not only because of the arrest itself, but because of what sat behind it: shell companies, AI-generated documentation, questionable mortgage applications, introducer networks, and an estimated AUD 3 billion in suspect loans under scrutiny across the banking system.
For compliance teams, this is not just another fraud story.
It is a glimpse into how organised financial crime is evolving inside legitimate financial infrastructure.
The striking part is not that fraud occurred. Banks deal with fraud every day. What makes this case different is the apparent convergence of multiple risk layers: professional facilitators, synthetic documentation, organised criminal networks, and the use of legitimate financial products to absorb and move illicit value at scale.
And increasingly, these schemes no longer look obviously criminal at first glance.

From Street Crime to Structured Financial Engineering
According to reporting linked to the investigation, authorities allege the syndicate used accountants, brokers, shell entities, and false financial documentation to obtain loans from major Australian banks. Some reports also referenced the use of AI-generated documentation to support fraudulent applications.
That detail matters.
Financial crime has historically relied on concealment. Today, many criminal operations are moving toward something more sophisticated: financial engineering.
The objective is no longer simply to hide illicit funds. It is to integrate them into legitimate financial systems through structures that appear commercially plausible.
Mortgage lending becomes an entry point.
Professional services become enablers.
Corporate structures become camouflage.
The result is a fraud ecosystem that can look remarkably normal until investigators connect the dots.
Why This Case Should Concern Compliance Teams
On the surface, this appears to be a mortgage fraud and money laundering investigation.
But underneath sits a much broader operational challenge for banks and fintechs.
The alleged scheme touches several areas simultaneously:
- Fraudulent onboarding
- Synthetic or manipulated financial documentation
- Shell company misuse
- Introducer and intermediary risk
- Proceeds laundering
- Organised criminal coordination
This is precisely where many traditional detection frameworks begin to struggle.
Because each individual activity may not independently appear suspicious enough to trigger escalation.
A shell company alone is not unusual.
An accountant referral is not inherently risky.
A mortgage application with inflated income may look like isolated fraud.
But together, these elements create a networked typology.
That network effect is what modern financial crime increasingly relies upon.
The Growing Role of Professional Facilitators
One of the most uncomfortable realities emerging globally is the role of professional facilitators in enabling financial crime.
Not necessarily career criminals.
Not necessarily front-line fraudsters.
But individuals operating within legitimate professions who allegedly help structure, legitimise, or move illicit value.
The Melbourne accountant case reflects a broader pattern regulators globally have been warning about:
- Accountants
- Lawyers
- Company formation agents
- Mortgage intermediaries
- Real estate facilitators
These actors sit close to financial systems and often possess the expertise needed to create legitimacy around suspicious activity.
For financial institutions, this creates a difficult challenge.
Professional status can unintentionally reduce scrutiny.
And that makes risk harder to identify early.
The AI Layer Changes the Game
Perhaps the most important dimension of this case is the alleged use of AI-generated documentation.
That should concern every compliance and fraud leader.
Historically, document fraud carried operational friction.
Creating convincing falsified records required time, skill, and manual effort.
AI dramatically lowers that barrier.
Income statements, payslips, identity documents, corporate records, and supporting financial evidence can now be manipulated faster, cheaper, and at greater scale than before.
More importantly, AI-generated fraud often looks cleaner than traditional forgery.
That creates two immediate risks:
1. Verification systems become easier to bypass
Static document checks or basic OCR validation may no longer be sufficient.
2. Fraud investigations become slower and more complex
Investigators now face increasingly sophisticated synthetic evidence that appears internally consistent.
The compliance industry is entering a phase where fraud is no longer just digital. It is becoming algorithmically enhanced.
Why Mortgage Fraud Is Becoming an AML Problem
Mortgage fraud has traditionally been treated primarily as a credit risk issue.
That approach is becoming outdated.
Cases like this demonstrate why mortgage fraud increasingly overlaps with AML and organised crime risk.
Authorities allege the syndicate was linked not only to loan fraud, but also to illicit tobacco networks, drug importation activity, and scam proceeds.
That changes the lens entirely.
Fraudulent loans are not merely bad lending decisions. They can become mechanisms for:
- Laundering criminal proceeds
- Converting illicit funds into property assets
- Creating financial legitimacy
- Recycling criminal capital into the economy
In other words, lending channels themselves can become laundering infrastructure.
And this is not unique to Australia.
Globally, regulators are increasingly concerned about the intersection between:
- Property markets
- Organised crime
- Shell companies
- Professional facilitators
- Financial fraud
The Hidden Weakness: Fragmented Detection
One of the reasons schemes like this persist is that institutions often detect risks in silos.
Fraud teams monitor application anomalies.
AML teams monitor transaction flows.
Credit teams monitor repayment risk.
But organised financial crime cuts across all three simultaneously.
That fragmentation creates blind spots.
For example:
A mortgage application may appear slightly suspicious.
A linked company may show unusual registration behaviour.
Certain transactions may display layering characteristics.
Individually, each signal looks weak.
Together, they form a typology.
This is where many financial institutions face operational friction today. Systems are often designed to detect isolated irregularities, not coordinated criminal ecosystems.
The Introducer Risk Problem
The investigation also places renewed focus on introducer channels and third-party referrals.
Banks rely heavily on ecosystems of brokers, accountants, and intermediaries to originate business.
Most are legitimate.
But the challenge lies in identifying the small percentage that may introduce heightened risk into the onboarding process.
The difficulty is not simply fraud detection. It is behavioural detection.
Questions institutions increasingly need to ask include:
- Are referral patterns unusually concentrated?
- Do certain intermediaries repeatedly connect to high-risk profiles?
- Are similar documentation anomalies appearing across applications?
- Are linked entities or applicants sharing hidden identifiers?
These are network questions, not transaction questions.
And network visibility is becoming critical in modern financial crime prevention.
The Organised Crime Convergence
Another important aspect of the Melbourne case is the alleged overlap between scam networks, drug importation, illicit tobacco, and financial fraud.
This reflects a broader global trend: organised crime convergence.
Criminal groups no longer specialise narrowly.
The same networks increasingly participate across:
- Cyber-enabled scams
- Drug trafficking
- Illicit tobacco
- Identity fraud
- Loan fraud
- Money laundering
What changes is not necessarily the network.
What changes is the revenue stream.
This creates a difficult environment for financial institutions because criminal typologies no longer fit neatly into separate categories.

What Financial Institutions Should Be Looking For
Cases like this highlight the need for institutions to move beyond isolated red flags and toward contextual intelligence.
Some behavioural indicators relevant to these typologies include:
- Multiple applications linked through shared intermediaries
- Rapid company formation before lending activity
- Inconsistencies between declared income and transaction behaviour
- High-value loans supported by unusually uniform documentation
- Connections between borrowers, directors, and shell entities
- Sudden movement of funds after loan disbursement
- Layered transfers inconsistent with expected customer activity
None of these alone guarantees criminal activity.
But together, they may indicate something more organised.
Why Static Controls Are No Longer Enough
One of the biggest lessons from this case is that static compliance controls are increasingly insufficient against adaptive criminal operations.
Criminal networks evolve quickly.
Rules, thresholds, and manual review processes often do not.
This is especially problematic when schemes involve:
- Multiple institutions
- Professional facilitators
- Cross-product abuse
- AI-enhanced fraud techniques
Modern detection increasingly requires:
- Behavioural analytics
- Network intelligence
- Entity resolution
- Real-time risk correlation
- Collaborative intelligence models
The future of AML and fraud prevention will depend less on detecting individual suspicious events and more on understanding relationships, coordination, and behavioural patterns.
Why Financial Institutions Need a More Connected Detection Approach
Cases like the Melbourne fraud investigation expose a growing gap in how financial institutions detect complex financial crime.
Traditional systems are often designed around isolated controls:
- onboarding checks,
- transaction monitoring,
- fraud rules,
- credit risk reviews.
But organised financial crime no longer operates in silos.
The same network may involve:
- shell companies,
- synthetic documents,
- mule accounts,
- professional facilitators,
- layered fund movement,
- and abuse across multiple financial products simultaneously.
This is where financial institutions increasingly need a more connected and intelligence-driven approach.
Tookitaki’s FinCense platform is designed to help institutions move beyond static rule-based monitoring by combining:
- behavioural intelligence,
- network-based risk detection,
- AML and fraud convergence,
- and collaborative typology-driven insights through the AFC Ecosystem.
In scenarios like the Melbourne case, this becomes particularly important because risks rarely appear through a single alert. Instead, suspicious behaviour emerges gradually through relationships, patterns, and hidden connections across customers, entities, transactions, and intermediaries.
For compliance teams, the challenge is no longer just detecting suspicious transactions in isolation.
It is identifying organised financial crime ecosystems before they scale into systemic exposure.
The Bigger Question for the Industry
The Melbourne case is ultimately about more than one accountant or one syndicate.
It raises a larger question for financial institutions:
How much organised criminal activity already exists inside legitimate financial systems without appearing obviously criminal?
That question becomes more urgent as:
- AI lowers fraud barriers
- Organised crime becomes financially sophisticated
- Criminal groups exploit professional ecosystems
- Financial products become laundering mechanisms
The industry is moving into a period where financial crime detection can no longer rely purely on surface-level anomalies.
Understanding context is becoming the real differentiator.
Conclusion: The New Face of Financial Crime
The alleged fraud ring uncovered in Australia reflects the changing architecture of modern financial crime.
This was not simply a forged application or isolated scam.
Authorities allege a coordinated ecosystem involving professionals, shell entities, fraudulent lending activity, and links to broader criminal networks.
That matters because it shows how deeply organised crime can embed itself within legitimate financial infrastructure.
For compliance teams, the challenge is no longer just identifying suspicious transactions.
It is recognising complex financial relationships before they scale into systemic exposure.
And increasingly, that requires institutions to think less like rule engines — and more like investigators connecting networks, behaviours, and intent.

AML/CFT Compliance in New Zealand: What Reporting Entities Must Know in 2026
New Zealand's anti-money laundering framework did not arrive fully formed. It was built in two deliberate phases.
Phase 1 came into effect from 2013. Banks, non-bank deposit takers, and financial institutions were brought under the Anti-Money Laundering and Countering Financing of Terrorism Act 2009 (the AML/CFT Act). Phase 2 followed between 2018 and 2019, extending obligations to lawyers, conveyancers, accountants, real estate agents, trust and company service providers, and casinos.
The result is one of the broadest reporting entity frameworks in the Asia-Pacific region. A law firm advising on a property transaction is a reporting entity. So is an accountancy practice handling company formations. So is a cryptocurrency exchange. If you are a compliance officer or senior manager at any organisation in these sectors, the AML/CFT Act applies to you — and the obligations are substantive.
Understanding what the Act requires is not optional. Three separate supervisory agencies actively examine reporting entities, and enforcement actions have been taken across all three sectors.

The AML/CFT Act 2009 — Primary Legislation and Key Amendments
The primary legislation is the Anti-Money Laundering and Countering Financing of Terrorism Act 2009. It is the single statute that governs all AML/CFT obligations for reporting entities in New Zealand.
The Act has been amended several times since its original enactment. The most significant structural change came in 2017, when amendments extended the framework to Phase 2 entities — the DNFBPs (designated non-financial businesses and professions) that came on stream from 2018 onwards. A further set of amendments was passed in 2023 via the Anti-Money Laundering and Countering Financing of Terrorism (Definitions) Amendment Act 2023, which updated the definitions framework to bring virtual asset service providers (VASPs) and digital assets into clearer alignment with FATF standards.
The Three-Supervisor Structure
New Zealand uses a split supervisory model that is uncommon in the Asia-Pacific region. Most APAC jurisdictions assign AML supervision to a single financial intelligence unit or prudential regulator. New Zealand has three:
- Financial Markets Authority (FMA): Supervises financial markets participants, licensed insurers, and certain non-bank financial institutions.
- Reserve Bank of New Zealand (RBNZ): Supervises registered banks and non-bank deposit takers.
- Department of Internal Affairs (DIA): Supervises lawyers, conveyancers, accountants, real estate agents, trust and company service providers, and casinos.
Each supervisor has its own examination approach and publication practice. A law firm subject to DIA supervision operates under the same Act as a bank supervised by the RBNZ — but the examination focus and sector context will differ. Reporting entities need to understand which supervisor they report to, because guidance, templates, and examination priorities vary.
Who Is a Reporting Entity in New Zealand
The AML/CFT Act defines "reporting entity" across three broad categories.
Financial institutions include registered banks, non-bank deposit takers, life insurers, money changers, and remittance service providers. These entities have been subject to the Act since Phase 1.
Designated non-financial businesses and professions (DNFBPs) include lawyers (when conducting relevant activities such as conveyancing, company formation, or managing client funds), conveyancers, accountants, real estate agents, trust and company service providers, and casino operators. These entities have been captured since Phase 2.
Virtual asset service providers (VASPs) — including cryptocurrency exchanges, custodian wallet providers, and other businesses facilitating digital asset transfers — were brought into the framework from June 2021 following amendments to the Act.
The breadth of this list matters. Unlike jurisdictions where AML obligations fall almost exclusively on banks and financial institutions, New Zealand compliance officers in professional services firms face the same core obligations as a registered bank. The complexity of building an AML/CFT programme may differ, but the legal requirements do not.
The Seven AML/CFT Programme Requirements
Under Section 56 of the AML/CFT Act, every reporting entity must have a written AML/CFT programme. The programme is not a theoretical document — it must reflect how the organisation actually operates, and it must be implemented in practice.
The seven required elements are:
- Risk assessment. A documented assessment of the money laundering and terrorism financing risks posed by the entity's products, services, customers, and delivery channels. This must be reviewed and updated when material changes occur.
- Compliance officer. A designated AML/CFT compliance officer must be appointed. This role can be filled internally or by an approved external provider. The compliance officer is accountable for day-to-day programme management and regulatory reporting.
- Customer due diligence (CDD) and enhanced due diligence (EDD) procedures. Written procedures covering how the entity identifies customers, verifies their identity, and applies EDD where required. See the section below for what this means in practice.
- Ongoing CDD and account monitoring. Continuous monitoring of transactions against customer risk profiles. The Act does not permit periodic-only review — monitoring must be ongoing.
- Record keeping. Records of CDD, transactions, and reports must be retained for a minimum of five years.
- Staff training. All relevant staff must receive AML/CFT training appropriate to their role. Training records must be maintained.
- AML/CFT audit. An independent audit of the AML/CFT programme must be conducted at least every two years for most entities. This is a statutory requirement under Section 59 of the Act. The auditor must be independent of the compliance function.

CDD Requirements in Practice
New Zealand's CDD framework follows a risk-based approach consistent with FATF Recommendations, but the specific requirements are set out in the AML/CFT Act and its regulations.
Standard CDD applies to all customers at onboarding and must include identity verification using reliable, independent source documents. For individuals, this means a government-issued photo ID plus address verification. For legal entities, it means a certificate of incorporation and — critically — verification of beneficial ownership. Understanding who ultimately owns or controls a company or trust is a requirement, not an option.
For more detail on what the verification process involves, the complete guide to transaction monitoring covers how identity data feeds into ongoing monitoring workflows. The KYC guide sets out the broader identity verification framework in detail.
Enhanced CDD (EDD) is triggered where the risk assessment or customer circumstances indicate higher risk. EDD triggers under the AML/CFT Act and its associated regulations include:
- Politically exposed persons (PEPs) and their associates
- Customers from jurisdictions on the FATF grey or black list
- Complex or unusual business structures where beneficial ownership is difficult to verify
- Transactions that are inconsistent with the customer's established profile
For EDD customers, the entity must also obtain and verify source of funds and, in some cases, source of wealth. This is not a box-ticking exercise — the documentation must be sufficient to explain the customer's financial activity.
Ongoing monitoring is where many reporting entities fall short. The Act requires continuous monitoring of transactions against customer risk profiles. A quarterly review schedule is not sufficient compliance. Monitoring must be calibrated to detect anomalies as they arise, which in practice means transaction monitoring systems or documented manual procedures that operate at transaction level.
Transaction Reporting Obligations
Reporting entities have two distinct filing obligations with the New Zealand Police Financial Intelligence Unit (FIU).
Suspicious Activity Reports (SARs)
A Suspicious Activity Report must be filed when a reporting entity suspects that a transaction or activity may involve money laundering, terrorism financing, or the proceeds of a predicate offence. There is no minimum threshold — the obligation is triggered by suspicion, not transaction size.
SARs must be filed "as soon as practicable." The Act does not specify a number of business days, but FIU guidance is unambiguous: file without delay. Once a SAR is being prepared or has been filed, the entity must not tip off the customer that a report is being made or that a suspicion exists. Tipping off is a criminal offence under the Act.
Prescribed Transaction Reports (PTRs)
PTRs are required for:
- Cash transactions of NZD 10,000 or above (or the foreign currency equivalent)
- Certain international wire transfers of NZD 1,000 or above
PTRs are filed with the NZ Police FIU. Unlike SARs — which are discretionary in the sense that they require a judgment call on suspicion — PTR filing is mechanical and threshold-based. Every qualifying cash transaction and wire transfer must be reported, regardless of whether the entity suspects anything unusual.
The volume of PTR filings at institutions handling significant cash flows or international payments makes automation a practical necessity rather than a preference.
The Audit Requirement — What Examiners Look For
The mandatory two-year audit under Section 59 is not a light-touch compliance check. It is a substantive review of whether the AML/CFT programme is working in practice. The supervisor — FMA, RBNZ, or DIA — may request the audit report at any time.
An AML/CFT audit must assess:
- Whether the risk assessment is current and accurately reflects the entity's actual customer and product mix
- Whether the written AML/CFT programme is being implemented as documented
- Whether CDD procedures are being followed at the individual account and transaction level — including transaction sampling
- Whether staff training records are complete and training content is appropriate
Audit findings are not optional to address. Where the auditor identifies gaps, the entity must remediate them. Supervisors will look at both the audit report and the entity's response to it.
What Regulators Actually Flag
Examination findings across New Zealand reporting entities follow recognisable patterns. The following issues appear repeatedly in supervisory communications and enforcement actions:
Outdated risk assessments. Risk assessments that were prepared at the time of onboarding to the Act and have not been updated since. If the entity's products, customer base, or delivery channels have changed and the risk assessment has not been revised to reflect this, it is not compliant.
Incomplete CDD for legacy customers. Entities that onboarded Phase 2 customers before their AML/CFT obligations commenced often have documentation gaps at account level. Remediating legacy CDD files is a known, ongoing issue across DNFBPs.
Periodic monitoring treated as ongoing monitoring. Quarterly customer reviews do not satisfy the ongoing monitoring obligation. Regulators have been explicit about this distinction.
Beneficial ownership gaps for trusts and complex structures. Verifying who ultimately controls a discretionary trust or a multi-layered corporate structure is difficult. Leaving this as "pending" or accepting incomplete documentation is one of the more frequently cited CDD failures.
PTR and SAR filing delays. Smaller DNFBPs — accountancy practices, law firms, real estate agencies — that are less familiar with the FIU reporting system often delay filings or miss them entirely. The obligation does not diminish because an entity is small or because the compliance team is not specialised.
How Technology Supports AML/CFT Compliance for NZ Reporting Entities
For financial institutions handling significant transaction volumes, manual transaction monitoring is not a workable approach. The PTR threshold at NZD 10,000 for cash transactions requires automated cash monitoring and report generation. SAR filing requires a case management workflow — alert review, investigation documentation, decision rationale, and a filing record that can be produced to a supervisor on request.
Automated transaction monitoring systems must apply New Zealand-specific typologies and thresholds, not just generic international rule sets. The NZ customer risk profile and the specific triggers in the AML/CFT Act differ from those in Australian or Singaporean frameworks. A system calibrated for another jurisdiction will not deliver accurate detection for a New Zealand entity.
For the two-year audit, AML/CFT systems need to produce exportable audit trails. Auditors will want to see alert volumes, disposition decisions, and calibration history. A system that cannot generate this output creates a significant gap at audit time.
When evaluating technology options, the Transaction Monitoring Software Buyer's Guide provides a structured framework for assessing vendor capabilities against your specific obligations and transaction profile.
Tookitaki's FinCense for New Zealand Compliance
New Zealand's AML/CFT framework places specific, auditable obligations on reporting entities across sectors that most AML platforms were not designed to support. FinCense is built to address this directly — with configurable typologies for NZ reporting obligations, PTR automation, SAR case management, and audit-ready transaction trails.
If you are building or reviewing your AML/CFT programme ahead of your next supervisor examination or two-year audit, talk to our team. We work with reporting entities across financial services and professional services sectors in New Zealand and across the APAC region.
Book a demo to see how FinCense supports New Zealand AML/CFT compliance — or speak with one of our experts about your specific programme requirements.

Reducing False Positives in Transaction Monitoring: A Practical Playbook
It is 9:30 on a Tuesday. The overnight batch run has finished. The alert queue shows 412 cases requiring review. Your team of five analysts has roughly six hours of productive investigation time between them today.
Do the arithmetic: each analyst needs to process 82 alerts to clear the queue before the next batch runs. At 20 minutes per alert — if the review is thorough — that is 27 hours of work for five people. It cannot be done properly. It will not be done properly.
And buried somewhere in those 412 alerts are the 20 or so that actually matter.
This is not a hypothetical. APAC compliance teams at banks, payment service providers, and fintechs describe exactly this operating reality. The false positive transaction monitoring problem is not a technical metric — it is a daily management failure that compounds over time. Analysts triage faster to survive the queue. The real signals get the same two-minute review as the noise. The programme that exists on paper bears no resemblance to what actually happens.
This article is not about what false positives are. If you are reading this, you know. It is about the cost of living with a high AML false positive rate — and the five practical steps that compliance teams use to bring it down.

What a High False Positive Rate Actually Costs
The standard complaint about transaction monitoring alert fatigue is that it wastes analyst time. That framing understates the problem.
Analyst capacity: the numbers are stark. At a 95% false positive rate with 400 alerts per day, 380 are dead ends. At 20 minutes per alert — which is the minimum for a documented, defensible triage — that is 127 analyst-hours per day spent reviewing noise. A compliance team needs approximately 16 full-time analysts doing nothing but alert triage to manage that volume at an adequate standard. Most APAC institutions have two to five.
Missed genuine signals: the hidden cost. The real damage is not the wasted hours — it is what happens to the 20 genuine alerts buried in 380 false ones. When analysts are clearing a 400-alert queue with limited capacity, they cannot give each case appropriate attention. The suspicious transaction that warrants a 90-minute EDD review gets the same 3 minutes as the noise around it. Alert fatigue is not just inefficiency. It is a mechanism for missing financial crime.
Regulatory exposure: backlogs are a finding. AUSTRAC's examination methodology includes review of alert disposition quality and queue backlogs. A compliance programme with a permanent backlog — where cases are not being reviewed within a defensible timeframe — is a programme finding, not merely an operational concern. MAS Notice 626 similarly expects that suspicious transaction monitoring is effective, not just that a system exists. Regulators in both jurisdictions have cited inadequate alert review as an examination failure in enforcement actions. The AML false positive rate problem is a regulatory risk, not a process inefficiency.
Staff turnover: the compounding effect. AML analysts in APAC are in short supply, and the shortage is getting worse as the regulated population expands under frameworks like Australia's Tranche 2 reforms and Singapore's digital banking licensing regime. A team that spends 90% of its time closing dead-end alerts has a retention problem. The analysts who leave are the ones with enough experience to find a role where their work matters. The ones who stay become less effective over time. Institutional knowledge walks out the door.
Why Rule-Based Systems Generate High False Positive Rates
Before addressing the fix, the cause.
Most transaction monitoring platforms in production at APAC banks and payment firms are built primarily on rules — logic statements that fire when a transaction crosses a defined threshold. The problem is not that rules are wrong. Rules are appropriate for known, well-defined typologies. The problem is structural.
Rules go stale. A rule calibrated for the institution's customer population in 2022 reflects transaction patterns from 2022. Customer behaviour changes. New products get launched. Regulatory requirements shift what customers route through which channels. A threshold that was appropriately sensitive at go-live will generate noise within 18 months if it is not recalibrated.
Rules ignore the customer. A rule firing on any international wire above $50,000 treats every customer the same. A high-net-worth client sending a monthly transfer to an offshore investment account triggers the same alert as a newly opened retail account sending the same pattern. The transaction looks identical to the rule — the context is invisible.
Rules cannot anticipate new typologies. When authorised push payment (APP) scams emerged as a dominant fraud vector across Australia and Singapore, every existing rule threshold started triggering on the pattern before teams had time to tune. The spike in false positives from a new typology can last months before calibration catches up.
Vendor defaults are not institution-specific. A transaction monitoring system configured on vendor-default thresholds is calibrated for an imagined average institution — not the specific customer base, geography, and product mix of the institution running it. AUSTRAC has explicitly noted this in published guidance. Running on defaults is not a defensible position under examination.
Five Practical Steps to Reduce False Positives
Step 1: Measure What You Actually Have
You cannot reduce something you have not measured.
Most compliance teams know their total daily alert volume. Few have a breakdown of false positive rate by alert scenario, by customer segment, and by transaction channel. That breakdown is the starting point for any calibration effort.
Pull the last 90 days of alert data. For each alert scenario, calculate the ratio of alerts closed without further action to alerts that progressed to an STR or EDD. That ratio is your scenario-level false positive rate. You will find three or four scenarios generating the majority of your noise — and those are the calibration targets.
This analysis also tells you which scenarios are genuinely earning their place in the rule library and which are generating alerts that no analyst has been able to explain in 12 months. You need that data before you touch a single threshold.
Step 2: Segment by Customer Risk Profile
The same transaction looks different depending on who is sending it.
A rule that fires on any international wire above $50,000 will generate noise for high-net-worth clients and genuine signals for retail customers. The rule is not wrong — it is not differentiated. Risk-segmenting your alert thresholds means applying different parameters to different customer risk tiers.
For a high-net-worth client with a documented wealth source, a history of international transactions, and a stated investment mandate, the threshold for that wire scenario should be materially higher than for a retail account with six months of history. A single institution-wide threshold is a blunt instrument.
This is one of the highest-impact single changes a compliance team can make without replacing its transaction monitoring platform. It requires access to customer risk classification data and the ability to apply segmented parameters — which most modern TM systems support but which most institutions have not configured.
Step 3: Retire Stale Rules
Most transaction monitoring systems accumulate rules over time. New typologies get added. Old ones are almost never removed.
A rule written in 2019 for a fraud pattern that no longer applies is generating alerts that analysts close on sight — and generating them reliably, every batch run, because the condition is always met. That rule is not protecting the institution. It is consuming analyst capacity.
Run an audit of the full rule library. For any scenario with a false positive rate above 98% and zero genuine catches in the past 12 months, retire the rule. Document the decision, the data that supports it, and the review date. AUSTRAC expects evidence that alert thresholds are actively managed — a retirement decision with supporting data is better evidence than a rule that has been silently ignored for three years.
This is standard hygiene. Most compliance teams have not done it because calibration work is not glamorous and implementation backlogs are long.
Step 4: Move from Rules-Only to Hybrid Detection
Rules are deterministic. They fire when conditions are met, regardless of context. A hybrid system combines rules for known, well-defined typologies with behaviour-based models that evaluate the transaction in context.
Machine learning models can factor in variables that rules cannot: the customer's transaction history, peer group behaviour, time-of-day patterns, the channel the transaction is moving through, and the relationship between recent account activity and the triggering transaction. A $50,000 international wire from an account that has never sent an international wire before looks different from the same wire from an account where this is the 12th such transfer this quarter.
The evidence for hybrid detection is not theoretical. Institutions that have moved from rules-only to hybrid architectures consistently report lower false positive rates and higher genuine detection rates simultaneously. Reducing false positives and improving detection quality are not in tension — they move together when the underlying detection logic is more precise.
Both AUSTRAC and MAS have signalled that rules-only monitoring is no longer sufficient for modern financial crime patterns. MAS's guidance on technology risk management and the application of technology-enabled controls is explicit on this point. AUSTRAC's 2023–24 enforcement priorities referenced the need for institutions to move beyond static threshold monitoring. For a complete picture of what modern detection architecture looks like, the complete guide to transaction monitoring covers the detection models in detail.
Step 5: Build Calibration Into Operations, Not Just Implementation
False positive rates drift upward when thresholds are not actively maintained. The calibration done at go-live will not hold for two years.
Build a quarterly calibration review into the compliance programme as a standing process. The review should cover the 10 highest-volume alert scenarios, compare the false positive rate trend over the past quarter, and document threshold adjustments with supporting rationale. The output of each review should be a calibration log entry — a record that the programme is being actively managed.
This documentation serves two purposes. First, it reduces false positive rates by catching threshold drift early. Second, it provides examination evidence. When AUSTRAC or MAS asks for evidence that alert thresholds are calibrated to the institution's risk profile, a quarterly calibration log with supporting data is a substantive answer. A vendor configuration file from 2022 is not.

What Good Looks Like
A well-calibrated AI-augmented transaction monitoring system should achieve below 85% false positive rate in production. That is not a theoretical benchmark — it is the range that production deployments demonstrate when detection architecture combines rules with behaviour-based models and thresholds are actively maintained.
Tookitaki's FinCense has reduced false positive rates by up to 50% compared to legacy rule-based systems in production deployments across APAC institutions. For a compliance team managing 400 alerts per day, a 50% reduction means approximately 200 fewer dead-end investigations daily. That capacity does not disappear — it goes to genuine risk review, EDD interviews, and STR quality.
The federated learning architecture behind FinCense addresses a detection gap that no single institution can close alone. Coordinated mule account activity typically moves between institutions — a pattern no individual bank can see in its own data. Detection models trained across a network of institutions make that cross-institution pattern visible. This is why the reduction in false positives and the improvement in genuine detection occur together: the models are trained on a broader signal set than any single institution's transaction history.
For the full vendor evaluation framework — including the specific questions to ask about false positive performance benchmarks, calibration support, and APAC regulatory alignment — see our Transaction Monitoring Software Buyer's Guide.
If your team is managing a 90%+ false positive rate and the operational picture described in this article is familiar, the starting point is a benchmarking conversation — not a full platform replacement. Book a demo to see FinCense's false positive benchmarks from comparable APAC deployments and get a calibration assessment against your current alert volumes.

The Accountant, the Fraud Ring, and the AUD 3 Billion Question Facing Australian Banks
In late April 2026, Australian authorities arrested a Melbourne accountant allegedly linked to a sprawling money laundering and mortgage fraud syndicate connected to illicit tobacco, drug importation networks, and scam operations targeting Australian victims. The case quickly drew attention not only because of the arrest itself, but because of what sat behind it: shell companies, AI-generated documentation, questionable mortgage applications, introducer networks, and an estimated AUD 3 billion in suspect loans under scrutiny across the banking system.
For compliance teams, this is not just another fraud story.
It is a glimpse into how organised financial crime is evolving inside legitimate financial infrastructure.
The striking part is not that fraud occurred. Banks deal with fraud every day. What makes this case different is the apparent convergence of multiple risk layers: professional facilitators, synthetic documentation, organised criminal networks, and the use of legitimate financial products to absorb and move illicit value at scale.
And increasingly, these schemes no longer look obviously criminal at first glance.

From Street Crime to Structured Financial Engineering
According to reporting linked to the investigation, authorities allege the syndicate used accountants, brokers, shell entities, and false financial documentation to obtain loans from major Australian banks. Some reports also referenced the use of AI-generated documentation to support fraudulent applications.
That detail matters.
Financial crime has historically relied on concealment. Today, many criminal operations are moving toward something more sophisticated: financial engineering.
The objective is no longer simply to hide illicit funds. It is to integrate them into legitimate financial systems through structures that appear commercially plausible.
Mortgage lending becomes an entry point.
Professional services become enablers.
Corporate structures become camouflage.
The result is a fraud ecosystem that can look remarkably normal until investigators connect the dots.
Why This Case Should Concern Compliance Teams
On the surface, this appears to be a mortgage fraud and money laundering investigation.
But underneath sits a much broader operational challenge for banks and fintechs.
The alleged scheme touches several areas simultaneously:
- Fraudulent onboarding
- Synthetic or manipulated financial documentation
- Shell company misuse
- Introducer and intermediary risk
- Proceeds laundering
- Organised criminal coordination
This is precisely where many traditional detection frameworks begin to struggle.
Because each individual activity may not independently appear suspicious enough to trigger escalation.
A shell company alone is not unusual.
An accountant referral is not inherently risky.
A mortgage application with inflated income may look like isolated fraud.
But together, these elements create a networked typology.
That network effect is what modern financial crime increasingly relies upon.
The Growing Role of Professional Facilitators
One of the most uncomfortable realities emerging globally is the role of professional facilitators in enabling financial crime.
Not necessarily career criminals.
Not necessarily front-line fraudsters.
But individuals operating within legitimate professions who allegedly help structure, legitimise, or move illicit value.
The Melbourne accountant case reflects a broader pattern regulators globally have been warning about:
- Accountants
- Lawyers
- Company formation agents
- Mortgage intermediaries
- Real estate facilitators
These actors sit close to financial systems and often possess the expertise needed to create legitimacy around suspicious activity.
For financial institutions, this creates a difficult challenge.
Professional status can unintentionally reduce scrutiny.
And that makes risk harder to identify early.
The AI Layer Changes the Game
Perhaps the most important dimension of this case is the alleged use of AI-generated documentation.
That should concern every compliance and fraud leader.
Historically, document fraud carried operational friction.
Creating convincing falsified records required time, skill, and manual effort.
AI dramatically lowers that barrier.
Income statements, payslips, identity documents, corporate records, and supporting financial evidence can now be manipulated faster, cheaper, and at greater scale than before.
More importantly, AI-generated fraud often looks cleaner than traditional forgery.
That creates two immediate risks:
1. Verification systems become easier to bypass
Static document checks or basic OCR validation may no longer be sufficient.
2. Fraud investigations become slower and more complex
Investigators now face increasingly sophisticated synthetic evidence that appears internally consistent.
The compliance industry is entering a phase where fraud is no longer just digital. It is becoming algorithmically enhanced.
Why Mortgage Fraud Is Becoming an AML Problem
Mortgage fraud has traditionally been treated primarily as a credit risk issue.
That approach is becoming outdated.
Cases like this demonstrate why mortgage fraud increasingly overlaps with AML and organised crime risk.
Authorities allege the syndicate was linked not only to loan fraud, but also to illicit tobacco networks, drug importation activity, and scam proceeds.
That changes the lens entirely.
Fraudulent loans are not merely bad lending decisions. They can become mechanisms for:
- Laundering criminal proceeds
- Converting illicit funds into property assets
- Creating financial legitimacy
- Recycling criminal capital into the economy
In other words, lending channels themselves can become laundering infrastructure.
And this is not unique to Australia.
Globally, regulators are increasingly concerned about the intersection between:
- Property markets
- Organised crime
- Shell companies
- Professional facilitators
- Financial fraud
The Hidden Weakness: Fragmented Detection
One of the reasons schemes like this persist is that institutions often detect risks in silos.
Fraud teams monitor application anomalies.
AML teams monitor transaction flows.
Credit teams monitor repayment risk.
But organised financial crime cuts across all three simultaneously.
That fragmentation creates blind spots.
For example:
A mortgage application may appear slightly suspicious.
A linked company may show unusual registration behaviour.
Certain transactions may display layering characteristics.
Individually, each signal looks weak.
Together, they form a typology.
This is where many financial institutions face operational friction today. Systems are often designed to detect isolated irregularities, not coordinated criminal ecosystems.
The Introducer Risk Problem
The investigation also places renewed focus on introducer channels and third-party referrals.
Banks rely heavily on ecosystems of brokers, accountants, and intermediaries to originate business.
Most are legitimate.
But the challenge lies in identifying the small percentage that may introduce heightened risk into the onboarding process.
The difficulty is not simply fraud detection. It is behavioural detection.
Questions institutions increasingly need to ask include:
- Are referral patterns unusually concentrated?
- Do certain intermediaries repeatedly connect to high-risk profiles?
- Are similar documentation anomalies appearing across applications?
- Are linked entities or applicants sharing hidden identifiers?
These are network questions, not transaction questions.
And network visibility is becoming critical in modern financial crime prevention.
The Organised Crime Convergence
Another important aspect of the Melbourne case is the alleged overlap between scam networks, drug importation, illicit tobacco, and financial fraud.
This reflects a broader global trend: organised crime convergence.
Criminal groups no longer specialise narrowly.
The same networks increasingly participate across:
- Cyber-enabled scams
- Drug trafficking
- Illicit tobacco
- Identity fraud
- Loan fraud
- Money laundering
What changes is not necessarily the network.
What changes is the revenue stream.
This creates a difficult environment for financial institutions because criminal typologies no longer fit neatly into separate categories.

What Financial Institutions Should Be Looking For
Cases like this highlight the need for institutions to move beyond isolated red flags and toward contextual intelligence.
Some behavioural indicators relevant to these typologies include:
- Multiple applications linked through shared intermediaries
- Rapid company formation before lending activity
- Inconsistencies between declared income and transaction behaviour
- High-value loans supported by unusually uniform documentation
- Connections between borrowers, directors, and shell entities
- Sudden movement of funds after loan disbursement
- Layered transfers inconsistent with expected customer activity
None of these alone guarantees criminal activity.
But together, they may indicate something more organised.
Why Static Controls Are No Longer Enough
One of the biggest lessons from this case is that static compliance controls are increasingly insufficient against adaptive criminal operations.
Criminal networks evolve quickly.
Rules, thresholds, and manual review processes often do not.
This is especially problematic when schemes involve:
- Multiple institutions
- Professional facilitators
- Cross-product abuse
- AI-enhanced fraud techniques
Modern detection increasingly requires:
- Behavioural analytics
- Network intelligence
- Entity resolution
- Real-time risk correlation
- Collaborative intelligence models
The future of AML and fraud prevention will depend less on detecting individual suspicious events and more on understanding relationships, coordination, and behavioural patterns.
Why Financial Institutions Need a More Connected Detection Approach
Cases like the Melbourne fraud investigation expose a growing gap in how financial institutions detect complex financial crime.
Traditional systems are often designed around isolated controls:
- onboarding checks,
- transaction monitoring,
- fraud rules,
- credit risk reviews.
But organised financial crime no longer operates in silos.
The same network may involve:
- shell companies,
- synthetic documents,
- mule accounts,
- professional facilitators,
- layered fund movement,
- and abuse across multiple financial products simultaneously.
This is where financial institutions increasingly need a more connected and intelligence-driven approach.
Tookitaki’s FinCense platform is designed to help institutions move beyond static rule-based monitoring by combining:
- behavioural intelligence,
- network-based risk detection,
- AML and fraud convergence,
- and collaborative typology-driven insights through the AFC Ecosystem.
In scenarios like the Melbourne case, this becomes particularly important because risks rarely appear through a single alert. Instead, suspicious behaviour emerges gradually through relationships, patterns, and hidden connections across customers, entities, transactions, and intermediaries.
For compliance teams, the challenge is no longer just detecting suspicious transactions in isolation.
It is identifying organised financial crime ecosystems before they scale into systemic exposure.
The Bigger Question for the Industry
The Melbourne case is ultimately about more than one accountant or one syndicate.
It raises a larger question for financial institutions:
How much organised criminal activity already exists inside legitimate financial systems without appearing obviously criminal?
That question becomes more urgent as:
- AI lowers fraud barriers
- Organised crime becomes financially sophisticated
- Criminal groups exploit professional ecosystems
- Financial products become laundering mechanisms
The industry is moving into a period where financial crime detection can no longer rely purely on surface-level anomalies.
Understanding context is becoming the real differentiator.
Conclusion: The New Face of Financial Crime
The alleged fraud ring uncovered in Australia reflects the changing architecture of modern financial crime.
This was not simply a forged application or isolated scam.
Authorities allege a coordinated ecosystem involving professionals, shell entities, fraudulent lending activity, and links to broader criminal networks.
That matters because it shows how deeply organised crime can embed itself within legitimate financial infrastructure.
For compliance teams, the challenge is no longer just identifying suspicious transactions.
It is recognising complex financial relationships before they scale into systemic exposure.
And increasingly, that requires institutions to think less like rule engines — and more like investigators connecting networks, behaviours, and intent.

AML/CFT Compliance in New Zealand: What Reporting Entities Must Know in 2026
New Zealand's anti-money laundering framework did not arrive fully formed. It was built in two deliberate phases.
Phase 1 came into effect from 2013. Banks, non-bank deposit takers, and financial institutions were brought under the Anti-Money Laundering and Countering Financing of Terrorism Act 2009 (the AML/CFT Act). Phase 2 followed between 2018 and 2019, extending obligations to lawyers, conveyancers, accountants, real estate agents, trust and company service providers, and casinos.
The result is one of the broadest reporting entity frameworks in the Asia-Pacific region. A law firm advising on a property transaction is a reporting entity. So is an accountancy practice handling company formations. So is a cryptocurrency exchange. If you are a compliance officer or senior manager at any organisation in these sectors, the AML/CFT Act applies to you — and the obligations are substantive.
Understanding what the Act requires is not optional. Three separate supervisory agencies actively examine reporting entities, and enforcement actions have been taken across all three sectors.

The AML/CFT Act 2009 — Primary Legislation and Key Amendments
The primary legislation is the Anti-Money Laundering and Countering Financing of Terrorism Act 2009. It is the single statute that governs all AML/CFT obligations for reporting entities in New Zealand.
The Act has been amended several times since its original enactment. The most significant structural change came in 2017, when amendments extended the framework to Phase 2 entities — the DNFBPs (designated non-financial businesses and professions) that came on stream from 2018 onwards. A further set of amendments was passed in 2023 via the Anti-Money Laundering and Countering Financing of Terrorism (Definitions) Amendment Act 2023, which updated the definitions framework to bring virtual asset service providers (VASPs) and digital assets into clearer alignment with FATF standards.
The Three-Supervisor Structure
New Zealand uses a split supervisory model that is uncommon in the Asia-Pacific region. Most APAC jurisdictions assign AML supervision to a single financial intelligence unit or prudential regulator. New Zealand has three:
- Financial Markets Authority (FMA): Supervises financial markets participants, licensed insurers, and certain non-bank financial institutions.
- Reserve Bank of New Zealand (RBNZ): Supervises registered banks and non-bank deposit takers.
- Department of Internal Affairs (DIA): Supervises lawyers, conveyancers, accountants, real estate agents, trust and company service providers, and casinos.
Each supervisor has its own examination approach and publication practice. A law firm subject to DIA supervision operates under the same Act as a bank supervised by the RBNZ — but the examination focus and sector context will differ. Reporting entities need to understand which supervisor they report to, because guidance, templates, and examination priorities vary.
Who Is a Reporting Entity in New Zealand
The AML/CFT Act defines "reporting entity" across three broad categories.
Financial institutions include registered banks, non-bank deposit takers, life insurers, money changers, and remittance service providers. These entities have been subject to the Act since Phase 1.
Designated non-financial businesses and professions (DNFBPs) include lawyers (when conducting relevant activities such as conveyancing, company formation, or managing client funds), conveyancers, accountants, real estate agents, trust and company service providers, and casino operators. These entities have been captured since Phase 2.
Virtual asset service providers (VASPs) — including cryptocurrency exchanges, custodian wallet providers, and other businesses facilitating digital asset transfers — were brought into the framework from June 2021 following amendments to the Act.
The breadth of this list matters. Unlike jurisdictions where AML obligations fall almost exclusively on banks and financial institutions, New Zealand compliance officers in professional services firms face the same core obligations as a registered bank. The complexity of building an AML/CFT programme may differ, but the legal requirements do not.
The Seven AML/CFT Programme Requirements
Under Section 56 of the AML/CFT Act, every reporting entity must have a written AML/CFT programme. The programme is not a theoretical document — it must reflect how the organisation actually operates, and it must be implemented in practice.
The seven required elements are:
- Risk assessment. A documented assessment of the money laundering and terrorism financing risks posed by the entity's products, services, customers, and delivery channels. This must be reviewed and updated when material changes occur.
- Compliance officer. A designated AML/CFT compliance officer must be appointed. This role can be filled internally or by an approved external provider. The compliance officer is accountable for day-to-day programme management and regulatory reporting.
- Customer due diligence (CDD) and enhanced due diligence (EDD) procedures. Written procedures covering how the entity identifies customers, verifies their identity, and applies EDD where required. See the section below for what this means in practice.
- Ongoing CDD and account monitoring. Continuous monitoring of transactions against customer risk profiles. The Act does not permit periodic-only review — monitoring must be ongoing.
- Record keeping. Records of CDD, transactions, and reports must be retained for a minimum of five years.
- Staff training. All relevant staff must receive AML/CFT training appropriate to their role. Training records must be maintained.
- AML/CFT audit. An independent audit of the AML/CFT programme must be conducted at least every two years for most entities. This is a statutory requirement under Section 59 of the Act. The auditor must be independent of the compliance function.

CDD Requirements in Practice
New Zealand's CDD framework follows a risk-based approach consistent with FATF Recommendations, but the specific requirements are set out in the AML/CFT Act and its regulations.
Standard CDD applies to all customers at onboarding and must include identity verification using reliable, independent source documents. For individuals, this means a government-issued photo ID plus address verification. For legal entities, it means a certificate of incorporation and — critically — verification of beneficial ownership. Understanding who ultimately owns or controls a company or trust is a requirement, not an option.
For more detail on what the verification process involves, the complete guide to transaction monitoring covers how identity data feeds into ongoing monitoring workflows. The KYC guide sets out the broader identity verification framework in detail.
Enhanced CDD (EDD) is triggered where the risk assessment or customer circumstances indicate higher risk. EDD triggers under the AML/CFT Act and its associated regulations include:
- Politically exposed persons (PEPs) and their associates
- Customers from jurisdictions on the FATF grey or black list
- Complex or unusual business structures where beneficial ownership is difficult to verify
- Transactions that are inconsistent with the customer's established profile
For EDD customers, the entity must also obtain and verify source of funds and, in some cases, source of wealth. This is not a box-ticking exercise — the documentation must be sufficient to explain the customer's financial activity.
Ongoing monitoring is where many reporting entities fall short. The Act requires continuous monitoring of transactions against customer risk profiles. A quarterly review schedule is not sufficient compliance. Monitoring must be calibrated to detect anomalies as they arise, which in practice means transaction monitoring systems or documented manual procedures that operate at transaction level.
Transaction Reporting Obligations
Reporting entities have two distinct filing obligations with the New Zealand Police Financial Intelligence Unit (FIU).
Suspicious Activity Reports (SARs)
A Suspicious Activity Report must be filed when a reporting entity suspects that a transaction or activity may involve money laundering, terrorism financing, or the proceeds of a predicate offence. There is no minimum threshold — the obligation is triggered by suspicion, not transaction size.
SARs must be filed "as soon as practicable." The Act does not specify a number of business days, but FIU guidance is unambiguous: file without delay. Once a SAR is being prepared or has been filed, the entity must not tip off the customer that a report is being made or that a suspicion exists. Tipping off is a criminal offence under the Act.
Prescribed Transaction Reports (PTRs)
PTRs are required for:
- Cash transactions of NZD 10,000 or above (or the foreign currency equivalent)
- Certain international wire transfers of NZD 1,000 or above
PTRs are filed with the NZ Police FIU. Unlike SARs — which are discretionary in the sense that they require a judgment call on suspicion — PTR filing is mechanical and threshold-based. Every qualifying cash transaction and wire transfer must be reported, regardless of whether the entity suspects anything unusual.
The volume of PTR filings at institutions handling significant cash flows or international payments makes automation a practical necessity rather than a preference.
The Audit Requirement — What Examiners Look For
The mandatory two-year audit under Section 59 is not a light-touch compliance check. It is a substantive review of whether the AML/CFT programme is working in practice. The supervisor — FMA, RBNZ, or DIA — may request the audit report at any time.
An AML/CFT audit must assess:
- Whether the risk assessment is current and accurately reflects the entity's actual customer and product mix
- Whether the written AML/CFT programme is being implemented as documented
- Whether CDD procedures are being followed at the individual account and transaction level — including transaction sampling
- Whether staff training records are complete and training content is appropriate
Audit findings are not optional to address. Where the auditor identifies gaps, the entity must remediate them. Supervisors will look at both the audit report and the entity's response to it.
What Regulators Actually Flag
Examination findings across New Zealand reporting entities follow recognisable patterns. The following issues appear repeatedly in supervisory communications and enforcement actions:
Outdated risk assessments. Risk assessments that were prepared at the time of onboarding to the Act and have not been updated since. If the entity's products, customer base, or delivery channels have changed and the risk assessment has not been revised to reflect this, it is not compliant.
Incomplete CDD for legacy customers. Entities that onboarded Phase 2 customers before their AML/CFT obligations commenced often have documentation gaps at account level. Remediating legacy CDD files is a known, ongoing issue across DNFBPs.
Periodic monitoring treated as ongoing monitoring. Quarterly customer reviews do not satisfy the ongoing monitoring obligation. Regulators have been explicit about this distinction.
Beneficial ownership gaps for trusts and complex structures. Verifying who ultimately controls a discretionary trust or a multi-layered corporate structure is difficult. Leaving this as "pending" or accepting incomplete documentation is one of the more frequently cited CDD failures.
PTR and SAR filing delays. Smaller DNFBPs — accountancy practices, law firms, real estate agencies — that are less familiar with the FIU reporting system often delay filings or miss them entirely. The obligation does not diminish because an entity is small or because the compliance team is not specialised.
How Technology Supports AML/CFT Compliance for NZ Reporting Entities
For financial institutions handling significant transaction volumes, manual transaction monitoring is not a workable approach. The PTR threshold at NZD 10,000 for cash transactions requires automated cash monitoring and report generation. SAR filing requires a case management workflow — alert review, investigation documentation, decision rationale, and a filing record that can be produced to a supervisor on request.
Automated transaction monitoring systems must apply New Zealand-specific typologies and thresholds, not just generic international rule sets. The NZ customer risk profile and the specific triggers in the AML/CFT Act differ from those in Australian or Singaporean frameworks. A system calibrated for another jurisdiction will not deliver accurate detection for a New Zealand entity.
For the two-year audit, AML/CFT systems need to produce exportable audit trails. Auditors will want to see alert volumes, disposition decisions, and calibration history. A system that cannot generate this output creates a significant gap at audit time.
When evaluating technology options, the Transaction Monitoring Software Buyer's Guide provides a structured framework for assessing vendor capabilities against your specific obligations and transaction profile.
Tookitaki's FinCense for New Zealand Compliance
New Zealand's AML/CFT framework places specific, auditable obligations on reporting entities across sectors that most AML platforms were not designed to support. FinCense is built to address this directly — with configurable typologies for NZ reporting obligations, PTR automation, SAR case management, and audit-ready transaction trails.
If you are building or reviewing your AML/CFT programme ahead of your next supervisor examination or two-year audit, talk to our team. We work with reporting entities across financial services and professional services sectors in New Zealand and across the APAC region.
Book a demo to see how FinCense supports New Zealand AML/CFT compliance — or speak with one of our experts about your specific programme requirements.

Reducing False Positives in Transaction Monitoring: A Practical Playbook
It is 9:30 on a Tuesday. The overnight batch run has finished. The alert queue shows 412 cases requiring review. Your team of five analysts has roughly six hours of productive investigation time between them today.
Do the arithmetic: each analyst needs to process 82 alerts to clear the queue before the next batch runs. At 20 minutes per alert — if the review is thorough — that is 27 hours of work for five people. It cannot be done properly. It will not be done properly.
And buried somewhere in those 412 alerts are the 20 or so that actually matter.
This is not a hypothetical. APAC compliance teams at banks, payment service providers, and fintechs describe exactly this operating reality. The false positive transaction monitoring problem is not a technical metric — it is a daily management failure that compounds over time. Analysts triage faster to survive the queue. The real signals get the same two-minute review as the noise. The programme that exists on paper bears no resemblance to what actually happens.
This article is not about what false positives are. If you are reading this, you know. It is about the cost of living with a high AML false positive rate — and the five practical steps that compliance teams use to bring it down.

What a High False Positive Rate Actually Costs
The standard complaint about transaction monitoring alert fatigue is that it wastes analyst time. That framing understates the problem.
Analyst capacity: the numbers are stark. At a 95% false positive rate with 400 alerts per day, 380 are dead ends. At 20 minutes per alert — which is the minimum for a documented, defensible triage — that is 127 analyst-hours per day spent reviewing noise. A compliance team needs approximately 16 full-time analysts doing nothing but alert triage to manage that volume at an adequate standard. Most APAC institutions have two to five.
Missed genuine signals: the hidden cost. The real damage is not the wasted hours — it is what happens to the 20 genuine alerts buried in 380 false ones. When analysts are clearing a 400-alert queue with limited capacity, they cannot give each case appropriate attention. The suspicious transaction that warrants a 90-minute EDD review gets the same 3 minutes as the noise around it. Alert fatigue is not just inefficiency. It is a mechanism for missing financial crime.
Regulatory exposure: backlogs are a finding. AUSTRAC's examination methodology includes review of alert disposition quality and queue backlogs. A compliance programme with a permanent backlog — where cases are not being reviewed within a defensible timeframe — is a programme finding, not merely an operational concern. MAS Notice 626 similarly expects that suspicious transaction monitoring is effective, not just that a system exists. Regulators in both jurisdictions have cited inadequate alert review as an examination failure in enforcement actions. The AML false positive rate problem is a regulatory risk, not a process inefficiency.
Staff turnover: the compounding effect. AML analysts in APAC are in short supply, and the shortage is getting worse as the regulated population expands under frameworks like Australia's Tranche 2 reforms and Singapore's digital banking licensing regime. A team that spends 90% of its time closing dead-end alerts has a retention problem. The analysts who leave are the ones with enough experience to find a role where their work matters. The ones who stay become less effective over time. Institutional knowledge walks out the door.
Why Rule-Based Systems Generate High False Positive Rates
Before addressing the fix, the cause.
Most transaction monitoring platforms in production at APAC banks and payment firms are built primarily on rules — logic statements that fire when a transaction crosses a defined threshold. The problem is not that rules are wrong. Rules are appropriate for known, well-defined typologies. The problem is structural.
Rules go stale. A rule calibrated for the institution's customer population in 2022 reflects transaction patterns from 2022. Customer behaviour changes. New products get launched. Regulatory requirements shift what customers route through which channels. A threshold that was appropriately sensitive at go-live will generate noise within 18 months if it is not recalibrated.
Rules ignore the customer. A rule firing on any international wire above $50,000 treats every customer the same. A high-net-worth client sending a monthly transfer to an offshore investment account triggers the same alert as a newly opened retail account sending the same pattern. The transaction looks identical to the rule — the context is invisible.
Rules cannot anticipate new typologies. When authorised push payment (APP) scams emerged as a dominant fraud vector across Australia and Singapore, every existing rule threshold started triggering on the pattern before teams had time to tune. The spike in false positives from a new typology can last months before calibration catches up.
Vendor defaults are not institution-specific. A transaction monitoring system configured on vendor-default thresholds is calibrated for an imagined average institution — not the specific customer base, geography, and product mix of the institution running it. AUSTRAC has explicitly noted this in published guidance. Running on defaults is not a defensible position under examination.
Five Practical Steps to Reduce False Positives
Step 1: Measure What You Actually Have
You cannot reduce something you have not measured.
Most compliance teams know their total daily alert volume. Few have a breakdown of false positive rate by alert scenario, by customer segment, and by transaction channel. That breakdown is the starting point for any calibration effort.
Pull the last 90 days of alert data. For each alert scenario, calculate the ratio of alerts closed without further action to alerts that progressed to an STR or EDD. That ratio is your scenario-level false positive rate. You will find three or four scenarios generating the majority of your noise — and those are the calibration targets.
This analysis also tells you which scenarios are genuinely earning their place in the rule library and which are generating alerts that no analyst has been able to explain in 12 months. You need that data before you touch a single threshold.
Step 2: Segment by Customer Risk Profile
The same transaction looks different depending on who is sending it.
A rule that fires on any international wire above $50,000 will generate noise for high-net-worth clients and genuine signals for retail customers. The rule is not wrong — it is not differentiated. Risk-segmenting your alert thresholds means applying different parameters to different customer risk tiers.
For a high-net-worth client with a documented wealth source, a history of international transactions, and a stated investment mandate, the threshold for that wire scenario should be materially higher than for a retail account with six months of history. A single institution-wide threshold is a blunt instrument.
This is one of the highest-impact single changes a compliance team can make without replacing its transaction monitoring platform. It requires access to customer risk classification data and the ability to apply segmented parameters — which most modern TM systems support but which most institutions have not configured.
Step 3: Retire Stale Rules
Most transaction monitoring systems accumulate rules over time. New typologies get added. Old ones are almost never removed.
A rule written in 2019 for a fraud pattern that no longer applies is generating alerts that analysts close on sight — and generating them reliably, every batch run, because the condition is always met. That rule is not protecting the institution. It is consuming analyst capacity.
Run an audit of the full rule library. For any scenario with a false positive rate above 98% and zero genuine catches in the past 12 months, retire the rule. Document the decision, the data that supports it, and the review date. AUSTRAC expects evidence that alert thresholds are actively managed — a retirement decision with supporting data is better evidence than a rule that has been silently ignored for three years.
This is standard hygiene. Most compliance teams have not done it because calibration work is not glamorous and implementation backlogs are long.
Step 4: Move from Rules-Only to Hybrid Detection
Rules are deterministic. They fire when conditions are met, regardless of context. A hybrid system combines rules for known, well-defined typologies with behaviour-based models that evaluate the transaction in context.
Machine learning models can factor in variables that rules cannot: the customer's transaction history, peer group behaviour, time-of-day patterns, the channel the transaction is moving through, and the relationship between recent account activity and the triggering transaction. A $50,000 international wire from an account that has never sent an international wire before looks different from the same wire from an account where this is the 12th such transfer this quarter.
The evidence for hybrid detection is not theoretical. Institutions that have moved from rules-only to hybrid architectures consistently report lower false positive rates and higher genuine detection rates simultaneously. Reducing false positives and improving detection quality are not in tension — they move together when the underlying detection logic is more precise.
Both AUSTRAC and MAS have signalled that rules-only monitoring is no longer sufficient for modern financial crime patterns. MAS's guidance on technology risk management and the application of technology-enabled controls is explicit on this point. AUSTRAC's 2023–24 enforcement priorities referenced the need for institutions to move beyond static threshold monitoring. For a complete picture of what modern detection architecture looks like, the complete guide to transaction monitoring covers the detection models in detail.
Step 5: Build Calibration Into Operations, Not Just Implementation
False positive rates drift upward when thresholds are not actively maintained. The calibration done at go-live will not hold for two years.
Build a quarterly calibration review into the compliance programme as a standing process. The review should cover the 10 highest-volume alert scenarios, compare the false positive rate trend over the past quarter, and document threshold adjustments with supporting rationale. The output of each review should be a calibration log entry — a record that the programme is being actively managed.
This documentation serves two purposes. First, it reduces false positive rates by catching threshold drift early. Second, it provides examination evidence. When AUSTRAC or MAS asks for evidence that alert thresholds are calibrated to the institution's risk profile, a quarterly calibration log with supporting data is a substantive answer. A vendor configuration file from 2022 is not.

What Good Looks Like
A well-calibrated AI-augmented transaction monitoring system should achieve below 85% false positive rate in production. That is not a theoretical benchmark — it is the range that production deployments demonstrate when detection architecture combines rules with behaviour-based models and thresholds are actively maintained.
Tookitaki's FinCense has reduced false positive rates by up to 50% compared to legacy rule-based systems in production deployments across APAC institutions. For a compliance team managing 400 alerts per day, a 50% reduction means approximately 200 fewer dead-end investigations daily. That capacity does not disappear — it goes to genuine risk review, EDD interviews, and STR quality.
The federated learning architecture behind FinCense addresses a detection gap that no single institution can close alone. Coordinated mule account activity typically moves between institutions — a pattern no individual bank can see in its own data. Detection models trained across a network of institutions make that cross-institution pattern visible. This is why the reduction in false positives and the improvement in genuine detection occur together: the models are trained on a broader signal set than any single institution's transaction history.
For the full vendor evaluation framework — including the specific questions to ask about false positive performance benchmarks, calibration support, and APAC regulatory alignment — see our Transaction Monitoring Software Buyer's Guide.
If your team is managing a 90%+ false positive rate and the operational picture described in this article is familiar, the starting point is a benchmarking conversation — not a full platform replacement. Book a demo to see FinCense's false positive benchmarks from comparable APAC deployments and get a calibration assessment against your current alert volumes.


