In the complicated world of moving money around, there's a tricky situation called "Reverse Money Laundering" that's causing some confusion. Unlike regular money laundering, which tries to make illegally gained money look legal, reverse money laundering takes legal, "clean" money and intentionally mixes it up with illegal activities, making it "dirty." This article will explore and explain the tricky paths, impacts, and ways to deal with reverse money laundering, while also highlighting how it's different from the regular money laundering we're more familiar with.
What is Reverse Money Laundering?
Reverse Money Laundering (RML) is a complex financial phenomenon that challenges the traditional concept of money laundering. It involves intentionally mixing clean, legitimate money with illegal activities, making it appear illicit or ‘dirty’. This practice is commonly used to fund nefarious activities like terrorism or organized crime while avoiding immediate detection from financial watchdogs. By intertwining legal funds with illegal enterprises, the traceability and origin of the money become obscured.
Process of Reverse Money Laundering
Delving into the intricate processes of reverse money laundering, it becomes evident that the mechanisms employed are meticulously crafted to evade detection while ensuring the smooth flow of funds towards illicit activities. The process typically encompasses:
- Integration of Legitimate Funds: Initially, legally obtained money is injected into the financial system, often through seemingly innocuous investments or business ventures.
- Entwining with Illicit Networks: Subsequently, these funds are deliberately entangled with illegal financial networks, often through a series of complex transactions designed to obfuscate their origin and trajectory.
- Utilization for Unlawful Purposes: Eventually, the now ‘dirty’ money is utilized to finance unlawful activities, such as terrorism, drug trafficking, or other organized crimes, effectively masking the original, legitimate source of the funds.
Money Laundering Vs Reverse Money Laundering
While both money laundering and reverse money laundering involve the manipulation of financial assets to serve ulterior motives, they stand in stark contrast regarding their initial fund status and end goals.
- Traditional Money Laundering: This entails the process of purifying funds that were originally acquired from illicit sources, such as drug trafficking or corruption, and seamlessly integrating them into the lawful financial system through a series of intricate transactions designed to conceal their true origins.
- Reverse Money Laundering: Conversely, RML takes legitimately earned money and intentionally taints it by entwining it with illegal financial networks, thereby making it ‘dirty’ and facilitating its use for unlawful activities without immediate detection.
Understanding these distinctions is pivotal in crafting targeted strategies to combat each phenomenon effectively, given their divergent operational mechanisms and objectives.
Reverse Money Laundering and Terror Financing
The sinister alliance between reverse money laundering and terrorist financing unveils a dark underbelly of global financial systems, where legitimate funds are manipulated to fuel acts of terror and violence.
- Financing through Legitimate Means: Terrorist organizations often exploit RML to channel legitimately earned money towards their activities, thereby circumventing traditional financial scrutiny and sanctions.
- Obfuscating Financial Trails: By intertwining legitimate funds with illicit networks, RML effectively masks the financial trails leading to terrorist organizations, complicating efforts to trace and thwart their funding sources.
- Undermining Global Security: The utilization of clean money to finance terror poses a significant threat to global security, as it enables terrorist entities to sustain and expand their operations under the radar of financial watchdogs.
Robust KYC to Combat Reverse Money Laundering
Implementing stringent Know Your Customer (KYC) protocols emerges as a formidable shield against the threats posed by reverse money laundering.
- Verifying Customer Identity: Ensuring that financial institutions thoroughly verify the identity of their customers helps in establishing a transparent financial trail and mitigating the risks of RML.
- Monitoring Financial Transactions: Continuous monitoring of financial transactions enables the early detection of suspicious activities, potentially indicative of RML, thereby facilitating timely intervention.
- Reporting Suspicious Activities: Establishing a robust framework for reporting suspicious transactions to relevant authorities enhances collective efforts to combat RML and safeguard financial integrity.
Steps to Prevent Reverse Money Laundering
Mitigating the risks and impacts of reverse money laundering necessitates a multi-faceted approach that encompasses regulatory compliance, technological adoption, and global cooperation.
- Implementing AML Protocols: Adhering to Anti-Money Laundering (AML) regulations and guidelines is paramount in identifying and mitigating the risks associated with RML.
- Leveraging Technology: Utilizing advanced technologies, such as artificial intelligence and machine learning, to monitor, detect, and report suspicious financial activities can significantly enhance RML prevention efforts.
- Enhancing Global Cooperation: Fostering international collaboration and information sharing among financial institutions, regulatory bodies, and law enforcement agencies can fortify global defences against RML.
- Educating Stakeholders: Implementing comprehensive training programs for financial professionals and stakeholders to recognize and respond to potential RML activities is crucial in bolstering preventative measures.
Conclusion
Reverse Money Laundering, with its intricate processes and nefarious implications, poses a formidable challenge to the integrity of global financial systems and security. By meticulously tainting clean money and channelling it towards illicit activities, RML not only undermines financial transparency but also facilitates the financing of activities that pose significant threats to global stability and security.
Navigating through the complex web of RML necessitates a robust understanding of its mechanisms, distinctions from traditional money laundering, and its potential to fuel terror financing. Implementing stringent KYC protocols and leveraging technological advancements stand as pivotal in combating this financial anomaly. Furthermore, fostering a collaborative international approach towards preventing RML, coupled with comprehensive stakeholder education, emerges as imperative in safeguarding financial systems against the insidious impacts of clean money turned dirty.
In a world where financial transactions are increasingly becoming complex and obscured, collective, informed, and technologically empowered actions against phenomena like reverse money laundering become not just relevant, but absolutely vital. Through strategic, collaborative, and informed efforts, the global community can fortify its defences against the shadows cast by reverse money laundering, safeguarding financial integrity and global security against the threats posed by illicit financial activities.
Experience the most intelligent AML and fraud prevention platform
Experience the most intelligent AML and fraud prevention platform
Experience the most intelligent AML and fraud prevention platform
Top AML Scenarios in ASEAN

The Role of AML Software in Compliance

The Role of AML Software in Compliance

Talk to an Expert
Ready to Streamline Your Anti-Financial Crime Compliance?
Our Thought Leadership Guides
Customer Due Diligence (CDD) and Enhanced Due Diligence (EDD): A Practical Guide
Most CDD failures that auditors find are not in the trigger decision. Compliance teams generally know when to apply enhanced due diligence. The problem is what happens next: the review gets done, the account stays open, and three years later an examiner opens the file and finds a risk assessment with no source-of-wealth narrative, a senior management approval that amounts to a single line in an email chain, and no evidence that monitoring was ever adjusted upward.
A poorly documented EDD review is treated by supervisors the same as no EDD at all. That is the uncomfortable reality driving examination findings across MAS, BNM, BSP, and AUSTRAC-regulated institutions right now.
This guide is not a glossary. It is a working reference for compliance professionals at banks, fintechs, and payment institutions across APAC who need to understand what CDD and EDD require, how the three tiers operate under each major regulator, and what examiners actually look at when they review a customer file.

What Is Customer Due Diligence (CDD)?
Under the FATF Recommendations, customer due diligence is the process of identifying and verifying a customer's identity, understanding the purpose and nature of the business relationship, and conducting ongoing monitoring of that relationship and the transactions flowing through it.
CDD is the core of the KYC process. It sits at the foundation of every AML/CFT programme and applies from the moment a customer relationship is established.
FATF Recommendations 10 through 12 set out four core CDD elements:
- Customer identification and verification — collect identifying information and verify it against reliable, independent source documents
- Beneficial ownership identification and verification — identify the natural persons who ultimately own or control a legal entity, and verify their identities
- Understanding the purpose and intended nature of the business relationship — establish why the customer wants an account, what they intend to do with it, and what transaction volumes to expect
- Ongoing monitoring — continuously review the customer relationship, monitor transactions against the customer's profile, and keep CDD records current
The fourth element is where most programmes are weakest. Institutions invest heavily in onboarding controls and then treat the relationship as static. Customers' risk profiles change. Beneficial ownership structures change. Transaction behaviour changes. A customer who was low-risk at onboarding may not remain low-risk at year three — and the programme has to be capable of detecting and responding to that shift.
Three Tiers of CDD: Simplified, Standard, and Enhanced
Simplified Due Diligence (SDD)
Simplified CDD applies where the risk of money laundering or terrorism financing is demonstrably low. FATF allows reduced identification requirements and less frequent monitoring — but it does not eliminate CDD obligations entirely.
Across APAC, SDD is generally permissible for:
- Government entities and state-owned enterprises
- Companies listed on recognised stock exchanges in low-risk jurisdictions
- Certain low-value financial products, such as basic deposit accounts below a specified threshold
The key word is demonstrably. SDD is a documented, risk-based decision. Using it as a default to reduce onboarding friction — without a written risk rationale — is a compliance failure, not an efficiency gain. Examiners will ask for the rationale and they will expect to find it in the file.
Standard CDD
Standard CDD is the default tier. It applies to all customers who do not qualify for SDD and do not trigger EDD.
For individual customers, standard CDD requires:
- Government-issued photo identification
- Proof of address — or an equivalent verification method where physical documents are not available (see the guide to eKYC as a CDD method under BNM's guidelines
- A record of the purpose and expected nature of the account
For legal entity customers, standard CDD requires:
- Certificate of incorporation
- Memorandum and articles of association
- Register of directors
- Beneficial ownership identification — who owns 25% or more of the entity, or who exercises effective control
- Business description and expected transaction patterns
The purpose-of-account requirement is often under-documented. "General business transactions" is not sufficient. The record should capture the customer's stated business activity, the expected transaction types, the anticipated value range, and the source of the initial deposit for corporate accounts.
Enhanced Due Diligence (EDD)
EDD is not optional when it is triggered. It applies to customers with higher-risk characteristics and requires:
- Source of funds verification — where did the money come from for this specific transaction or deposit?
- Source of wealth verification — how did the customer accumulate their overall wealth?
- Senior management or board approval before establishing or continuing the relationship
- Enhanced ongoing monitoring — higher alert sensitivity and more frequent periodic reviews
FATF Recommendation 12 specifies EDD for politically exposed persons. Individual APAC regulators have extended these requirements to cover additional high-risk categories (see the comparative table below).
EDD is a process of investigation, not a checklist. Collecting a salary slip and noting "source of funds: employment income" does not constitute adequate source-of-wealth documentation for a PEP with an account balance of SGD 4 million. The quality of the investigation is what an examiner assesses.

EDD Triggers — When Standard CDD Is Not Enough
The following characteristics trigger EDD requirements across APAC jurisdictions:
PEP status. Any customer identified as a politically exposed person — or a known close relative or close associate of a PEP — triggers mandatory EDD. See our PEP screening guide for the full classification framework, including how "close associate" is defined across different regimes.
High-risk jurisdiction. Customers resident in, or transacting with, jurisdictions on the FATF grey or black lists trigger EDD. The FATF list currently includes Iran, North Korea, and Myanmar. APAC regulators may apply additional country designations based on their own risk assessments.
Complex ownership structure. Beneficial ownership held through multiple layers of legal entities, trusts, or nominee arrangements — particularly in offshore jurisdictions — triggers EDD. The structural complexity itself is a risk indicator, not just the underlying beneficial owner's profile.
High-value transaction inconsistent with profile. A transaction materially inconsistent with the customer's stated purpose, income level, or established transaction history triggers a review. Whether that review rises to EDD depends on what the initial investigation reveals.
Monitoring alerts that cannot be resolved at standard investigation. An alert that the transaction monitoring team cannot close through normal investigation escalates to EDD review. The two processes are connected: transaction monitoring is the mechanism by which ongoing CDD obligations are operationalised. When a customer's transaction behaviour diverges from their risk profile, the CDD record must be updated.
Correspondent banking. Under FATF Recommendation 13, correspondent banking relationships always require EDD. Before establishing a correspondent relationship, the respondent institution's AML/CFT programme must be assessed, the nature of the relationship must be documented, and senior management approval must be obtained.
APAC Regulatory Requirements — Comparative Overview
The following table summarises how the major APAC regulators implement the FATF CDD framework. The instruments and specific requirements differ, but the underlying obligations are consistent.

MAS Notice 626 is the most prescriptive of these instruments on the question of PEP approval — it requires that a senior officer approves the establishment or continuation of a PEP relationship, not just that the relationship is flagged. BSP's Circular 706 requires approval at board or senior management level for all high-risk customers, which is broader than the PEP-specific requirement in some other jurisdictions.
Beneficial Ownership — The Hardest Part of CDD in Practice
FATF Recommendation 10 requires identifying the ultimate beneficial owner (UBO) — the natural person or persons who ultimately own or control a legal entity. The standard FATF threshold is 25% ownership or effective control.
APAC regulators apply variations: BNM and MAS both use 25%. BSP applies 20% for certain entity types. Effective control — the ability to direct the decisions of a legal entity regardless of ownership percentage — applies across all jurisdictions regardless of the threshold.
UBO verification is the most common CDD gap in APAC examination findings. The reasons are practical: complex layered ownership structures, nominee shareholding arrangements, and trusts without publicly accessible beneficiary registers make verification genuinely difficult.
The practical approach is to collect the full ownership chain — every layer, every entity, until you reach the natural person at the top. If a structure is genuinely opaque after reasonable investigation, that opacity is itself a risk indicator requiring EDD, not a reason to proceed with the account on the basis of what the customer has disclosed. An examiner will ask whether the institution made reasonable efforts to verify, and what happened when verification was incomplete.
Ongoing CDD — What "Continuous" Means in Practice
FATF's requirement for ongoing monitoring is not satisfied by periodic review alone. It has two components: scheduled reviews and event-based triggers.
Periodic reviews vary by risk tier. Most APAC regulators expect high-risk customers to be reviewed at least annually. Standard-risk customers are typically reviewed every two to three years, though the specific interval should be documented in the institution's risk appetite and CDD policy.
Event-based triggers require a review regardless of the scheduled cycle. These include:
- A transaction monitoring alert linked to the customer
- Adverse media coverage naming the customer
- A change in the customer's beneficial ownership
- A material change in transaction patterns
- A change in the customer's business activity or geographic footprint
Re-KYC is required when a periodic review or event trigger shows that existing CDD documentation is insufficient, outdated, or no longer accurate. The institution must re-verify the customer's identity and update the CDD record.
Every review must be documented. An examiner looking at a three-year-old account should be able to open the file, find the review dates, see what was assessed at each review, and understand what was found. A review that happened but was not recorded is indistinguishable from a review that did not happen.
What Examiners Actually Check
Documentation requirements differ by customer type, but the principle is the same across all of them: the file must tell a coherent story about who the customer is, what they do, and why the institution assessed them at the risk tier they sit in.
Individual customer files should contain:
- The original ID document reference or eKYC session record, including the verification method and date
- Address verification
- A purpose-of-account statement, not a generic field entry
- Any review dates and what the review assessed
Corporate customer files should contain:
- A complete corporate structure chart reaching the UBO
- UBO identification with the verification source documented
- Business purpose documentation that goes beyond the registered company description
- Expected transaction volume and product usage at account opening
EDD customer files should contain:
- Source of funds evidence — bank statement, salary slip, property sale contract, or equivalent
- Source of wealth narrative — not just an assertion that wealth came from "business activities," but a documented account of how
- The senior management or board approval record, with the date and the approver named
- Confirmation that enhanced monitoring has been configured and is active
The audit trail requirement covers every step: each CDD review, each document update, each approval decision. Everything should be timestamped and linked to the customer record. When examiners trace an alert back to the customer file, they expect to find a complete picture of the relationship, not a collection of disconnected documents.
How Technology Supports CDD
A modern CDD and KYC platform automates document collection, verification — including remote eKYC — UBO mapping, risk scoring, and the ongoing monitoring review cycle. The automation does not reduce the compliance obligation; it reduces the operational cost of meeting it and produces the audit trail that manual processes frequently fail to generate.
The critical integration point is between CDD and transaction monitoring. When a customer's monitoring profile changes — new alert patterns, unusual activity, a shift in counterparty geography — that signal should trigger a CDD review. In institutions where these systems operate independently, the connection rarely happens in a timely or documented way. For a full framework covering how to evaluate software that handles both CDD and transaction monitoring together, see our Transaction Monitoring Software Buyer's Guide.
Book a demo to see how FinCense manages CDD, customer risk scoring, and ongoing monitoring in a single integrated platform — with a full audit trail that meets examiner expectations across MAS, BNM, BSP, and AUSTRAC-regulated environments.

Transaction Monitoring in the Philippines: BSP and AMLC Requirements Explained
The Philippines was grey-listed by FATF in June 2021. The formal findings cited several strategic deficiencies — inadequate suspicious transaction report filings, weak transaction monitoring calibration, and gaps in oversight of virtual asset service providers. These were not abstract policy failures. They reflected real examination findings inside real financial institutions.
The Philippines exited the grey list in January 2023 after demonstrating legislative reform and measurable supervisory improvement. That exit was a significant regulatory milestone. It was not the end of BSP's focus on transaction monitoring quality.
If anything, the post-exit period has intensified examination scrutiny. BSP examiners now have two years of data on which institutions improved their AML programmes during the grey-list period and which made the minimum adjustments to satisfy the timeline. Compliance teams treating January 2023 as the end of a compliance improvement cycle are misreading where BSP examination focus is heading in 2026.

The Philippines AML Framework: The Foundation for Transaction Monitoring
Transaction monitoring obligations for Philippine financial institutions rest on a layered statutory and regulatory framework.
The primary legislation is Republic Act 9160, the Anti-Money Laundering Act of 2001, as amended by RA 9194, RA 10167, RA 10365, and RA 11521 in 2021. RA 11521 was the most significant package of amendments — it expanded the list of covered persons, strengthened freeze and forfeiture powers, and addressed VASP oversight, which had been a specific FATF deficiency finding.
The Anti-Money Laundering Council (AMLC) is the Philippines' Financial Intelligence Unit. It is a collegial body comprising the BSP Governor, the SEC Chairperson, and the Insurance Commissioner. AMLC issues implementing rules and regulations under AMLA, maintains the Philippines' FIU reporting systems, and receives CTR and STR filings from covered institutions.
BSP functions as the prudential supervisor for banks, quasi-banks, e-money issuers, remittance companies, and virtual asset service providers. In the AML context, BSP issues its own circulars that operationalise AMLA requirements for supervised institutions. BSP Circular 706 is the foundational AML circular, establishing the programme requirements — customer due diligence, transaction monitoring, record-keeping, reporting — that all BSP-supervised institutions must implement. Subsequent circulars have amended and extended these requirements.
For a detailed explanation of how transaction monitoring works as a function within a broader AML programme, the compliance hub guide covers the mechanics. What this article addresses is the specific Philippine regulatory framework that governs how that function must be structured.
BSP Circular 706: What the Monitoring Requirement Actually Requires
BSP Circular 706 does not prescribe a specific system architecture or vendor. It requires covered institutions to implement a risk-based transaction monitoring system commensurate with the nature, size, and complexity of their business.
The system must be capable of detecting:
- Unusual transactions that deviate from the customer's established pattern
- Suspicious patterns across multiple transactions over time
- Transactions inconsistent with the customer's stated business purpose or risk profile
- Structuring activity — transactions split or sequenced to avoid reporting thresholds
Alert investigation is where many institutions' programmes fall short. Under Circular 706, every alert generated by the monitoring system must be assessed by the designated AML compliance officer or a delegated AML officer. The assessment must be documented. Either the alert is closed with a written rationale explaining why it does not require escalation, or it is escalated to an STR review. An alert queue with no documented dispositions is an examination finding regardless of the sophistication of the detection logic that generated those alerts.
Calibration requirements are explicit: monitoring thresholds and detection scenarios must be reviewed when the institution's customer profile changes materially, when new products are launched, and at minimum on an annual basis. Institutions that deployed a monitoring system with vendor-default thresholds and have not since documented a calibration review — with written evidence, specific dates, and sign-off from a named responsible officer — cannot demonstrate compliance with this requirement.
Record retention applies to all investigation records. BSP examiners will sample alert dispositions. They expect to see both the trigger logic that generated the alert and the investigation rationale that determined its outcome. A system that generates alerts but cannot produce the decision trail does not meet the documentation standard.
AMLC Reporting: Thresholds, Timelines, and the Tipping-Off Prohibition
Two primary reporting obligations flow from an effective transaction monitoring programme.
Covered Transaction Reports (CTRs) apply to cash transactions or cash equivalents within a single banking day amounting to PHP 500,000 or more. The filing deadline is 5 working days from the date of the transaction. CTRs are volume-driven — a compliant programme needs a workflow that captures these transactions automatically and routes them to the filing process within the deadline.
Suspicious Transaction Reports (STRs) have no minimum threshold. The reporting obligation is triggered by suspicion, not by transaction size. A PHP 5,000 transaction can require an STR if the compliance officer determines that it is suspicious. The filing deadline is 5 working days from the date of determination — meaning the date on which the compliance officer concluded that the transaction or attempted transaction is suspicious. This distinction is important. The clock does not start when the underlying transaction occurred. It starts when the determination is made. Institutions with investigation workflows that allow alerts to sit unworked for days before a determination is reached are systematically at risk of missing this deadline.
The tipping-off prohibition under AMLA is absolute. An institution is strictly prohibited from informing, or taking any action that would inform, the subject of a transaction that an STR has been or is being prepared. Violation is a criminal offence. This prohibition must be embedded in investigation procedures — particularly for institutions where front-line relationship managers are involved in the investigation process and may have direct contact with the customer.
All CDD records, transaction records, and monitoring documentation must be retained for a minimum of 5 years.

VASP-Specific Transaction Monitoring: BSP Circular 1108
BSP Circular 1108, issued in 2021, established the regulatory framework for Virtual Asset Service Providers — crypto exchanges, custodian wallet providers, and peer-to-peer virtual asset trading platforms. VASPs are classified as covered persons under AMLA and must register with both BSP and AMLC.
The transaction monitoring requirements for VASPs are structurally the same as for other BSP-supervised institutions: automated monitoring system, calibrated thresholds, documented alert investigations, CTR and STR filing. There is no lighter-touch version of these requirements because the institution is dealing in virtual assets rather than fiat currency.
VASP-specific compliance under AMLC also incorporates the FATF Travel Rule — Recommendation 16. BSP has signalled alignment with this requirement, meaning VASPs must collect and transmit originator and beneficiary information for virtual asset transfers above the USD 1,000 equivalent threshold. This is not a future aspiration — it is part of the BSP-supervised VASP compliance framework now.
The monitoring challenge for VASPs is that generic bank TM scenario libraries do not cover the typologies that matter in the virtual asset context. Peer-to-peer volume clustering, rapid stablecoin conversion, mixing and tumbling patterns, and cross-chain transfers all require scenario coverage that a standard bank monitoring ruleset does not include. A VASP that has deployed a bank-oriented monitoring system without building crypto-specific detection logic has a coverage gap that a BSP examination of its VASP activities will find.
For Philippine institutions managing sanctions screening obligations under BSP and AMLC alongside their transaction monitoring programme, the VASP context adds a further dimension — virtual asset transfers require real-time sanctions screening at the point of instruction, not batch processing.
Risk-Based Monitoring in Practice: What BSP Expects
BSP's supervision approach is explicitly risk-based. The monitoring programme must reflect the institution's own customer risk assessment. An institution with a predominantly retail customer base has different monitoring requirements than one serving high-net-worth individuals, corporate treasuries, or remittance corridors into high-risk jurisdictions.
High-risk customer categories in the Philippines context include:
- Politically exposed persons (PEPs) and their relatives and close associates — the Philippines context includes domestic PEPs at national and local government level
- Customers from FATF-listed high-risk and other monitored jurisdictions
- Customers with beneficial ownership structures involving foreign holding entities
- Remittance customers sending to AMLC-designated high-risk corridors, including specific Middle East and US remittance routes
Philippine-specific typologies that monitoring scenarios must cover include e-wallet mule account networks — GCash and Maya are both BSP-supervised e-money platforms with significant retail penetration, and BSP has specifically flagged mule account exploitation as a monitored typology. Authorised push payment scam layering through bank accounts is a growing pattern. Cross-border structuring via remittance corridors to the US and Middle East is a documented Philippines financial crime pattern.
BSP examination practice has consistently identified one category of finding above others: institutions that use vendor-default monitoring thresholds without any documented evidence that those thresholds were reviewed against the institution's specific customer risk profile. A threshold set to vendor defaults is not a risk-based threshold. It is a vendor threshold that may or may not be appropriate for a given institution's risk profile — and the institution cannot demonstrate which without a documented calibration exercise.
Common Transaction Monitoring Examination Findings
Based on BSP examination findings and regulatory guidance since the grey-list period, the following deficiency patterns appear repeatedly.
STR filing delays. The 5-working-day deadline runs from determination. Institutions with investigation backlogs — where alerts sit in a queue without active review — push the determination date later, which compresses the filing window. When the investigation eventually concludes, the STR filing is already late. This is a workflow problem, not a detection problem.
Alert backlog. BSP examiners will note alert queues older than 15 working days. This signals either inadequate compliance staffing relative to alert volume, or threshold miscalibration generating more alerts than the team can process. Examiners will record both problems. Hiring more staff to work an oversized alert queue from miscalibrated thresholds is an expensive partial fix; recalibrating thresholds to produce a manageable, risk-relevant alert population addresses the root cause.
E-money product gaps. Institutions that monitor deposit accounts but have not extended monitoring to their e-money wallet products have a coverage gap that BSP has specifically flagged. If the institution's covered products include e-wallet services, those products must be within the monitoring scope.
STR quality. Since the grey-list period, BSP and AMLC have focused on the quality of STR content, not just filing volume. An STR that is filed within the deadline but contains insufficient information for AMLC to take investigative action is still a finding. The report must contain enough context — transaction history, customer background, the specific facts that triggered suspicion — for AMLC to act on it.
Beneficial ownership monitoring gaps. Corporate accounts where the ultimate beneficial owner changes without triggering a monitoring review represent a structural gap. If a corporate customer's UBO changes, the customer risk profile may have changed materially. A monitoring programme that does not incorporate this trigger into its review logic will miss the shift.
A Practical Checklist for a BSP-Compliant Transaction Monitoring Programme
For compliance officers conducting a gap assessment of their current programme, the following items constitute the minimum floor of BSP compliance:
Automated monitoring system in place — not a manual review process. The system name and version should be documented and available for examiner reference.
Thresholds calibrated to the institution's customer risk assessment, not vendor defaults. Written evidence of calibration reviews, with dates and sign-off from a named responsible officer.
Coverage across all product lines: deposit accounts, remittance products, e-money wallets, and VASP services where applicable. A monitoring programme that covers some products but not others leaves documented gaps for examiners to find.
CTR and STR workflows with investigation trails and filing deadline tracking. The 5-working-day CTR and STR filing deadlines must be tracked systematically, not managed informally.
Annual typology review: do the scenarios in the monitoring system cover current Philippine financial crime patterns? APP scams, e-wallet fraud networks, and crypto layering typologies have become examination-relevant — they should be reflected in active detection scenarios.
When evaluating transaction monitoring software against these requirements, the buyer's guide provides a structured framework covering system functionality, calibration capability, case management, and audit trail requirements.
How FinCense Addresses the BSP and AMLC Framework
FinCense is pre-configured with BSP-aligned typologies, including e-wallet fraud patterns and Philippines remittance corridor scenarios. These are not generic rules relabelled for the Philippine market — they reflect the specific financial crime patterns that BSP and AMLC examination programmes have flagged as priorities.
The CTR and STR filing workflow is built into FinCense case management. The 5-working-day filing deadline is tracked automatically from the determination date, with escalation triggers when deadlines are at risk. Compliance officers do not manage this deadline manually.
VASP scenario coverage is included within the same platform — crypto-specific detection does not require a separate system layered alongside a bank monitoring deployment. The Travel Rule data collection workflow is integrated.
In production deployments across Southeast Asian financial institutions, FinCense has reduced false positive rates by up to 50% compared to legacy rule-based systems. For compliance teams managing alert backlogs that strain staffing capacity, this is not a secondary benefit — it is the operational change that makes risk-based investigation feasible.
Book a demo to see FinCense running against Philippines-specific BSP and AMLC scenarios, including e-wallet typologies, remittance corridor detection, and the CTR/STR workflow with filing deadline tracking.

AML Compliance for Remittance and Money Transfer Companies: An APAC Guide
It is a Thursday afternoon. Your firm is processing remittances on the Singapore–Philippines corridor — six thousand transactions before the weekend. You are licensed under MAS as a Major Payment Institution and registered as a Remittance and Transfer Company with the BSP in Manila. MAS published updated PSN02 guidance last month. This morning, the BSP examination schedule landed in your inbox. Two regulators. Two compliance programmes. One compliance team of four people. That is the daily operating reality for most APAC-licensed remittance operators, and it is the starting point for every AML programme design conversation.
This guide covers what money transfer AML compliance APAC-wide actually requires — by jurisdiction, by obligation, and by what good operational execution looks like.

Why Remittance Companies Carry Higher AML Risk
FATF has consistently identified remittance and money transfer as a high-risk sector. Not because remittance operators are bad actors, but because of the transaction patterns that characterise the business.
Remittance is cash-intensive in many corridors. Some jurisdictions allow senders to pay in cash at agent locations with limited identification requirements. High-volume, low-value transactions create conditions where structuring — the practice of breaking amounts to stay below reporting thresholds — is easier to conceal than in lower-volume banking environments. A customer sending MYR 500 twice a week looks almost identical to a customer structuring around MYR 25,000 CTR thresholds.
FATF Recommendation 16 — the Travel Rule — applies specifically to wire transfers. Remittance companies are wire transfer originators. They must collect, transmit, and retain originator and beneficiary information with every qualifying transfer. This is not the same obligation as KYC. It is a data transmission requirement that sits on top of the CDD framework.
The cross-border nature of remittance creates bilateral exposure. A transfer from Singapore to Manila passes through both MAS and BSP oversight. A compliance failure — a missed STR, an inadequate CDD record, a Travel Rule data gap — does not stay in one jurisdiction. Both regulators can examine the same transaction.
The APAC corridors under heaviest examination scrutiny are among the highest-volume remittance corridors in the world: Singapore–Philippines, Malaysia–Bangladesh, Australia–India, and Philippines–Middle East. High volume does not reduce examiner focus. It increases it.
APAC Regulatory Obligations by Jurisdiction
Singapore (MAS)
Cross-border money transfer above SGD 3 million per month requires a Major Payment Institution licence under the Payment Services Act. The MAS PSA AML obligations for payment institutions are set out in PSN02, which covers CDD, ongoing monitoring, and STR and CTR filing requirements.
The FATF Travel Rule applies at SGD 1,500. For every transfer at or above that threshold, the MPS must transmit originator name, account number, and address or national identity number — plus beneficiary name and account number — to the receiving institution with the payment. The obligation to transmit sits with the sender regardless of whether the beneficiary institution can receive the data in structured form.
STR filing must occur within five business days of the determination that the transaction is suspicious. MAS examiners in 2024 specifically cited STR quality — not volume — as an examination focus area. An STR that describes the suspicious transaction in one sentence without analysis of the pattern does not meet the standard.
Australia (AUSTRAC)
All remittance dealers must register with AUSTRAC before commencing operations. Unregistered remittance dealing is a criminal offence under the AML/CTF Act 2006. This is not a technicality — AUSTRAC has prosecuted unlicensed remittance dealing, and its enforcement record includes actions against informal value transfer networks operating in parallel to registered dealers.
Registered remittance dealers carry the same AML/CTF programme obligations as banks under Chapter 16 of the AML/CTF Rules, without the same IT infrastructure to support them. Threshold Transaction Reports apply to cash transactions above AUD 10,000. Suspicious Matter Reports must be filed for qualifying transactions without a fixed deadline, but AUSTRAC expects prompt filing — delays beyond a few days are examined.
Malaysia (BNM)
Remittance operators require a Money Services Business licence under the MSB Act 2011. The AMLATFPUAA framework applies — the same statutory framework as banks — imposing CDD, ongoing monitoring, and STR and CTR obligations.
CTR threshold is MYR 25,000 for cash transactions. STR filing is required within three business days of the determination. BNM's most recent national risk assessment specifically identifies hawala-style informal remittance networks operating alongside licensed MSBs as a risk vector. That finding has translated directly into elevated examination scrutiny for licensed operators, who face more frequent and detailed examinations as regulators attempt to map the boundary between formal and informal channels.
Philippines (BSP)
Remittance operators require a Remittance and Transfer Company licence from the BSP. The AML programme obligations are set by AMLA and BSP Circular 950 — the same framework that governs banks, applied in full to RTCs.
CTR threshold is PHP 500,000. STR filing is required within five business days. The Philippines exited the FATF grey list in January 2023, but exit has not reduced examination pressure — BSP has increased examination frequency for RTCs since 2023, consistent with post-grey-list monitoring by both the BSP and AMLC.
New Zealand (DIA)
Remittance operators are Phase 2 reporting entities under the AML/CFT Act 2009, supervised by the Department of Internal Affairs. The same CDD, ongoing monitoring, and SAR and PTR obligations that apply to banks apply in full to remittance operators. The DIA's supervisory approach includes sector-wide audits and thematic reviews — it does not reserve examination resources only for larger entities.
The FATF Travel Rule in Practice for APAC Remittance Operators
FATF Recommendation 16 requires the originating institution to transmit originator and beneficiary information with every wire transfer above the applicable threshold. Across APAC, the operative thresholds are SGD 1,500 under MAS, AUD 1,000 under AUSTRAC, and USD 1,000 equivalent as the FATF baseline for jurisdictions without a lower domestic threshold.
The data that must travel with the payment: originator name, account number, address or national identity number; beneficiary name and beneficiary account number. These fields must populate the payment message — they cannot be retained on file at the sending institution and supplied only on request.
The operational problem is well-documented. Many beneficiary institutions in the corridors where APAC remittance volumes are highest — particularly in developing-market corridors — do not have systems capable of receiving structured Travel Rule data. The sending institution's obligation does not dissolve because the receiving institution lacks the infrastructure. Compliance requires transmitting the data within whatever message structure the payment uses: MT103 field population for SWIFT transactions, or the equivalent structured fields in ISO 20022 message formats.
Travel Rule technology solutions — TRISA, VerifyVASP, and Sygna Bridge are the most widely deployed in APAC for virtual asset transfers — are increasingly being applied to fiat remittance payment flows as well. For most APAC remittance operators on real-time domestic rails, the Travel Rule data obligation sits inside the payment message design, not in a separate data transmission layer.

Transaction Monitoring Requirements Specific to Remittance
High-volume, low-value transaction environments cannot be monitored with the dollar-threshold rules designed for retail banking. A rule that fires above USD 5,000 will miss the dominant remittance pattern entirely — hundreds of transactions at USD 200 to USD 500 per customer per month — and generate alert noise on the routine flows that constitute most of the business.
For an overview of how automated transaction monitoring works, the underlying detection logic matters more than the threshold level. Remittance monitoring is a typology problem, not a threshold problem.
Velocity monitoring is the primary detection method for mule accounts in remittance networks. The pattern is not a single large transfer — it is twenty transactions in forty-eight hours across multiple corridors from the same account or beneficial owner. A system calibrated only to flag high-value single transactions will not detect this.
Corridor-specific scenario calibration is not optional. The Singapore–Philippines corridor has different fraud typologies from the Malaysia–Bangladesh corridor. Monitoring scenarios applied generically across all corridors without tuning for the specific patterns in each one will produce both false positives on legitimate traffic and false negatives on actual suspicious activity.
Round-number structuring is the simplest pattern and the one most often missed by single-threshold rules. Transactions consistently placed just below the CTR threshold — MYR 24,500, AUD 9,800, PHP 499,000 — are a textbook structuring indicator. A rule with a single threshold at the CTR level will not catch this. The detection logic must look at the cluster of transactions below the threshold, not just the individual transaction value.
Beneficiary account reuse is a mule indicator: multiple unrelated customers sending to the same unfamiliar beneficiary account. This pattern requires a system capable of cross-customer analysis, not just single-customer transaction review. Rules-based systems that process each customer's alerts in isolation cannot detect it.
For remittance operators evaluating their technology choices, the same detection architecture issues apply as those covered in TM for payment companies and e-wallets — the product and customer profiles are different, but the architectural requirements for cross-customer scenario coverage are the same.
What Good Looks Like for a Multi-Jurisdiction Remittance Operator
A compliance officer managing two or three APAC licences simultaneously with a small team is not running a bank compliance programme at reduced scale. The operational structure is different.
A single TM platform across all jurisdictions is operationally necessary, not aspirational. Compliance officers in multi-jurisdiction firms who reconcile alerts from separate system instances — one per market — spend time on logistics that should go into analysis. The same transaction, flagged differently in two systems because the rule calibrations differ, creates reconciliation work that multiplies with volume.
Pre-settlement processing on real-time rails is required where payment is irrevocable on settlement. On PayNow, DuitNow, NPP, and InstaPay, a payment that clears cannot be recalled. Batch monitoring that runs after settlement has already processed the payment before the alert fires. The monitoring must run against the payment instruction before settlement, not the settled record.
Travel Rule data workflow integrated into the payment process eliminates the manual population of originator and beneficiary data as a separate step. When Travel Rule data handling is separated from payment processing and managed by different team members, the data quality degrades and the audit trail becomes inconsistent.
STR and CTR filing workflows built per jurisdiction address the material operational differences between regulatory regimes: different templates, different filing portals, different time windows, different field requirements. A case management system that requires the analyst to manually navigate those differences for each jurisdiction adds material risk. The workflows should enforce the right template for the jurisdiction of the filing, triggered by the currency of the transaction.
Selecting the right platform requires working through a structured evaluation. The Transaction Monitoring Software Buyer's Guide covers the criteria relevant to multi-jurisdiction operators, including how to assess vendor coverage across APAC regulatory regimes.
FinCense for APAC Remittance Operators
FinCense is deployed at remittance and payment operators across APAC — not only at banks. The platform is configured for the transaction patterns, corridor structures, and regulatory filing requirements that remittance operators encounter, not adapted from a banking deployment.
The scenario library includes more than fifty financial crime typologies covering the patterns most prevalent in remittance: mule account networks identified by cross-customer beneficiary account reuse, APP scam indicators in outbound payment flows, velocity structuring across corridors, and cross-border layering patterns. These are pre-built scenarios, not configurations that require the compliance team to write detection logic from scratch.
Pre-settlement processing is available across PayNow, DuitNow, NPP, InstaPay, and FAST — covering the real-time rails in Singapore, Malaysia, Australia, and the Philippines where irrevocable payment risk requires monitoring before settlement, not after.
Multi-jurisdiction STR and CTR filing workflows are built into the case management interface. Filing to AUSTRAC, BNM, AMLC, or MAS FIU from a single case triggers the correct jurisdiction-specific template, with the applicable time window displayed for the analyst at the case level.
In production deployments, FinCense has reduced false positive rates by up to 50% compared to legacy rules-based systems. For a remittance operator managing three hundred thousand transactions per month with a compliance team of four, a 50% reduction in false positive volume is not a performance metric — it is the difference between a workable alert queue and one that structurally cannot be cleared before the next batch arrives.
Book a demo to see FinCense configured for APAC remittance compliance — with corridor-specific scenarios already calibrated and multi-jurisdiction filing workflows built in.
For the full vendor evaluation framework, see the Transaction Monitoring Software Buyer's Guide.

Customer Due Diligence (CDD) and Enhanced Due Diligence (EDD): A Practical Guide
Most CDD failures that auditors find are not in the trigger decision. Compliance teams generally know when to apply enhanced due diligence. The problem is what happens next: the review gets done, the account stays open, and three years later an examiner opens the file and finds a risk assessment with no source-of-wealth narrative, a senior management approval that amounts to a single line in an email chain, and no evidence that monitoring was ever adjusted upward.
A poorly documented EDD review is treated by supervisors the same as no EDD at all. That is the uncomfortable reality driving examination findings across MAS, BNM, BSP, and AUSTRAC-regulated institutions right now.
This guide is not a glossary. It is a working reference for compliance professionals at banks, fintechs, and payment institutions across APAC who need to understand what CDD and EDD require, how the three tiers operate under each major regulator, and what examiners actually look at when they review a customer file.

What Is Customer Due Diligence (CDD)?
Under the FATF Recommendations, customer due diligence is the process of identifying and verifying a customer's identity, understanding the purpose and nature of the business relationship, and conducting ongoing monitoring of that relationship and the transactions flowing through it.
CDD is the core of the KYC process. It sits at the foundation of every AML/CFT programme and applies from the moment a customer relationship is established.
FATF Recommendations 10 through 12 set out four core CDD elements:
- Customer identification and verification — collect identifying information and verify it against reliable, independent source documents
- Beneficial ownership identification and verification — identify the natural persons who ultimately own or control a legal entity, and verify their identities
- Understanding the purpose and intended nature of the business relationship — establish why the customer wants an account, what they intend to do with it, and what transaction volumes to expect
- Ongoing monitoring — continuously review the customer relationship, monitor transactions against the customer's profile, and keep CDD records current
The fourth element is where most programmes are weakest. Institutions invest heavily in onboarding controls and then treat the relationship as static. Customers' risk profiles change. Beneficial ownership structures change. Transaction behaviour changes. A customer who was low-risk at onboarding may not remain low-risk at year three — and the programme has to be capable of detecting and responding to that shift.
Three Tiers of CDD: Simplified, Standard, and Enhanced
Simplified Due Diligence (SDD)
Simplified CDD applies where the risk of money laundering or terrorism financing is demonstrably low. FATF allows reduced identification requirements and less frequent monitoring — but it does not eliminate CDD obligations entirely.
Across APAC, SDD is generally permissible for:
- Government entities and state-owned enterprises
- Companies listed on recognised stock exchanges in low-risk jurisdictions
- Certain low-value financial products, such as basic deposit accounts below a specified threshold
The key word is demonstrably. SDD is a documented, risk-based decision. Using it as a default to reduce onboarding friction — without a written risk rationale — is a compliance failure, not an efficiency gain. Examiners will ask for the rationale and they will expect to find it in the file.
Standard CDD
Standard CDD is the default tier. It applies to all customers who do not qualify for SDD and do not trigger EDD.
For individual customers, standard CDD requires:
- Government-issued photo identification
- Proof of address — or an equivalent verification method where physical documents are not available (see the guide to eKYC as a CDD method under BNM's guidelines
- A record of the purpose and expected nature of the account
For legal entity customers, standard CDD requires:
- Certificate of incorporation
- Memorandum and articles of association
- Register of directors
- Beneficial ownership identification — who owns 25% or more of the entity, or who exercises effective control
- Business description and expected transaction patterns
The purpose-of-account requirement is often under-documented. "General business transactions" is not sufficient. The record should capture the customer's stated business activity, the expected transaction types, the anticipated value range, and the source of the initial deposit for corporate accounts.
Enhanced Due Diligence (EDD)
EDD is not optional when it is triggered. It applies to customers with higher-risk characteristics and requires:
- Source of funds verification — where did the money come from for this specific transaction or deposit?
- Source of wealth verification — how did the customer accumulate their overall wealth?
- Senior management or board approval before establishing or continuing the relationship
- Enhanced ongoing monitoring — higher alert sensitivity and more frequent periodic reviews
FATF Recommendation 12 specifies EDD for politically exposed persons. Individual APAC regulators have extended these requirements to cover additional high-risk categories (see the comparative table below).
EDD is a process of investigation, not a checklist. Collecting a salary slip and noting "source of funds: employment income" does not constitute adequate source-of-wealth documentation for a PEP with an account balance of SGD 4 million. The quality of the investigation is what an examiner assesses.

EDD Triggers — When Standard CDD Is Not Enough
The following characteristics trigger EDD requirements across APAC jurisdictions:
PEP status. Any customer identified as a politically exposed person — or a known close relative or close associate of a PEP — triggers mandatory EDD. See our PEP screening guide for the full classification framework, including how "close associate" is defined across different regimes.
High-risk jurisdiction. Customers resident in, or transacting with, jurisdictions on the FATF grey or black lists trigger EDD. The FATF list currently includes Iran, North Korea, and Myanmar. APAC regulators may apply additional country designations based on their own risk assessments.
Complex ownership structure. Beneficial ownership held through multiple layers of legal entities, trusts, or nominee arrangements — particularly in offshore jurisdictions — triggers EDD. The structural complexity itself is a risk indicator, not just the underlying beneficial owner's profile.
High-value transaction inconsistent with profile. A transaction materially inconsistent with the customer's stated purpose, income level, or established transaction history triggers a review. Whether that review rises to EDD depends on what the initial investigation reveals.
Monitoring alerts that cannot be resolved at standard investigation. An alert that the transaction monitoring team cannot close through normal investigation escalates to EDD review. The two processes are connected: transaction monitoring is the mechanism by which ongoing CDD obligations are operationalised. When a customer's transaction behaviour diverges from their risk profile, the CDD record must be updated.
Correspondent banking. Under FATF Recommendation 13, correspondent banking relationships always require EDD. Before establishing a correspondent relationship, the respondent institution's AML/CFT programme must be assessed, the nature of the relationship must be documented, and senior management approval must be obtained.
APAC Regulatory Requirements — Comparative Overview
The following table summarises how the major APAC regulators implement the FATF CDD framework. The instruments and specific requirements differ, but the underlying obligations are consistent.

MAS Notice 626 is the most prescriptive of these instruments on the question of PEP approval — it requires that a senior officer approves the establishment or continuation of a PEP relationship, not just that the relationship is flagged. BSP's Circular 706 requires approval at board or senior management level for all high-risk customers, which is broader than the PEP-specific requirement in some other jurisdictions.
Beneficial Ownership — The Hardest Part of CDD in Practice
FATF Recommendation 10 requires identifying the ultimate beneficial owner (UBO) — the natural person or persons who ultimately own or control a legal entity. The standard FATF threshold is 25% ownership or effective control.
APAC regulators apply variations: BNM and MAS both use 25%. BSP applies 20% for certain entity types. Effective control — the ability to direct the decisions of a legal entity regardless of ownership percentage — applies across all jurisdictions regardless of the threshold.
UBO verification is the most common CDD gap in APAC examination findings. The reasons are practical: complex layered ownership structures, nominee shareholding arrangements, and trusts without publicly accessible beneficiary registers make verification genuinely difficult.
The practical approach is to collect the full ownership chain — every layer, every entity, until you reach the natural person at the top. If a structure is genuinely opaque after reasonable investigation, that opacity is itself a risk indicator requiring EDD, not a reason to proceed with the account on the basis of what the customer has disclosed. An examiner will ask whether the institution made reasonable efforts to verify, and what happened when verification was incomplete.
Ongoing CDD — What "Continuous" Means in Practice
FATF's requirement for ongoing monitoring is not satisfied by periodic review alone. It has two components: scheduled reviews and event-based triggers.
Periodic reviews vary by risk tier. Most APAC regulators expect high-risk customers to be reviewed at least annually. Standard-risk customers are typically reviewed every two to three years, though the specific interval should be documented in the institution's risk appetite and CDD policy.
Event-based triggers require a review regardless of the scheduled cycle. These include:
- A transaction monitoring alert linked to the customer
- Adverse media coverage naming the customer
- A change in the customer's beneficial ownership
- A material change in transaction patterns
- A change in the customer's business activity or geographic footprint
Re-KYC is required when a periodic review or event trigger shows that existing CDD documentation is insufficient, outdated, or no longer accurate. The institution must re-verify the customer's identity and update the CDD record.
Every review must be documented. An examiner looking at a three-year-old account should be able to open the file, find the review dates, see what was assessed at each review, and understand what was found. A review that happened but was not recorded is indistinguishable from a review that did not happen.
What Examiners Actually Check
Documentation requirements differ by customer type, but the principle is the same across all of them: the file must tell a coherent story about who the customer is, what they do, and why the institution assessed them at the risk tier they sit in.
Individual customer files should contain:
- The original ID document reference or eKYC session record, including the verification method and date
- Address verification
- A purpose-of-account statement, not a generic field entry
- Any review dates and what the review assessed
Corporate customer files should contain:
- A complete corporate structure chart reaching the UBO
- UBO identification with the verification source documented
- Business purpose documentation that goes beyond the registered company description
- Expected transaction volume and product usage at account opening
EDD customer files should contain:
- Source of funds evidence — bank statement, salary slip, property sale contract, or equivalent
- Source of wealth narrative — not just an assertion that wealth came from "business activities," but a documented account of how
- The senior management or board approval record, with the date and the approver named
- Confirmation that enhanced monitoring has been configured and is active
The audit trail requirement covers every step: each CDD review, each document update, each approval decision. Everything should be timestamped and linked to the customer record. When examiners trace an alert back to the customer file, they expect to find a complete picture of the relationship, not a collection of disconnected documents.
How Technology Supports CDD
A modern CDD and KYC platform automates document collection, verification — including remote eKYC — UBO mapping, risk scoring, and the ongoing monitoring review cycle. The automation does not reduce the compliance obligation; it reduces the operational cost of meeting it and produces the audit trail that manual processes frequently fail to generate.
The critical integration point is between CDD and transaction monitoring. When a customer's monitoring profile changes — new alert patterns, unusual activity, a shift in counterparty geography — that signal should trigger a CDD review. In institutions where these systems operate independently, the connection rarely happens in a timely or documented way. For a full framework covering how to evaluate software that handles both CDD and transaction monitoring together, see our Transaction Monitoring Software Buyer's Guide.
Book a demo to see how FinCense manages CDD, customer risk scoring, and ongoing monitoring in a single integrated platform — with a full audit trail that meets examiner expectations across MAS, BNM, BSP, and AUSTRAC-regulated environments.

Transaction Monitoring in the Philippines: BSP and AMLC Requirements Explained
The Philippines was grey-listed by FATF in June 2021. The formal findings cited several strategic deficiencies — inadequate suspicious transaction report filings, weak transaction monitoring calibration, and gaps in oversight of virtual asset service providers. These were not abstract policy failures. They reflected real examination findings inside real financial institutions.
The Philippines exited the grey list in January 2023 after demonstrating legislative reform and measurable supervisory improvement. That exit was a significant regulatory milestone. It was not the end of BSP's focus on transaction monitoring quality.
If anything, the post-exit period has intensified examination scrutiny. BSP examiners now have two years of data on which institutions improved their AML programmes during the grey-list period and which made the minimum adjustments to satisfy the timeline. Compliance teams treating January 2023 as the end of a compliance improvement cycle are misreading where BSP examination focus is heading in 2026.

The Philippines AML Framework: The Foundation for Transaction Monitoring
Transaction monitoring obligations for Philippine financial institutions rest on a layered statutory and regulatory framework.
The primary legislation is Republic Act 9160, the Anti-Money Laundering Act of 2001, as amended by RA 9194, RA 10167, RA 10365, and RA 11521 in 2021. RA 11521 was the most significant package of amendments — it expanded the list of covered persons, strengthened freeze and forfeiture powers, and addressed VASP oversight, which had been a specific FATF deficiency finding.
The Anti-Money Laundering Council (AMLC) is the Philippines' Financial Intelligence Unit. It is a collegial body comprising the BSP Governor, the SEC Chairperson, and the Insurance Commissioner. AMLC issues implementing rules and regulations under AMLA, maintains the Philippines' FIU reporting systems, and receives CTR and STR filings from covered institutions.
BSP functions as the prudential supervisor for banks, quasi-banks, e-money issuers, remittance companies, and virtual asset service providers. In the AML context, BSP issues its own circulars that operationalise AMLA requirements for supervised institutions. BSP Circular 706 is the foundational AML circular, establishing the programme requirements — customer due diligence, transaction monitoring, record-keeping, reporting — that all BSP-supervised institutions must implement. Subsequent circulars have amended and extended these requirements.
For a detailed explanation of how transaction monitoring works as a function within a broader AML programme, the compliance hub guide covers the mechanics. What this article addresses is the specific Philippine regulatory framework that governs how that function must be structured.
BSP Circular 706: What the Monitoring Requirement Actually Requires
BSP Circular 706 does not prescribe a specific system architecture or vendor. It requires covered institutions to implement a risk-based transaction monitoring system commensurate with the nature, size, and complexity of their business.
The system must be capable of detecting:
- Unusual transactions that deviate from the customer's established pattern
- Suspicious patterns across multiple transactions over time
- Transactions inconsistent with the customer's stated business purpose or risk profile
- Structuring activity — transactions split or sequenced to avoid reporting thresholds
Alert investigation is where many institutions' programmes fall short. Under Circular 706, every alert generated by the monitoring system must be assessed by the designated AML compliance officer or a delegated AML officer. The assessment must be documented. Either the alert is closed with a written rationale explaining why it does not require escalation, or it is escalated to an STR review. An alert queue with no documented dispositions is an examination finding regardless of the sophistication of the detection logic that generated those alerts.
Calibration requirements are explicit: monitoring thresholds and detection scenarios must be reviewed when the institution's customer profile changes materially, when new products are launched, and at minimum on an annual basis. Institutions that deployed a monitoring system with vendor-default thresholds and have not since documented a calibration review — with written evidence, specific dates, and sign-off from a named responsible officer — cannot demonstrate compliance with this requirement.
Record retention applies to all investigation records. BSP examiners will sample alert dispositions. They expect to see both the trigger logic that generated the alert and the investigation rationale that determined its outcome. A system that generates alerts but cannot produce the decision trail does not meet the documentation standard.
AMLC Reporting: Thresholds, Timelines, and the Tipping-Off Prohibition
Two primary reporting obligations flow from an effective transaction monitoring programme.
Covered Transaction Reports (CTRs) apply to cash transactions or cash equivalents within a single banking day amounting to PHP 500,000 or more. The filing deadline is 5 working days from the date of the transaction. CTRs are volume-driven — a compliant programme needs a workflow that captures these transactions automatically and routes them to the filing process within the deadline.
Suspicious Transaction Reports (STRs) have no minimum threshold. The reporting obligation is triggered by suspicion, not by transaction size. A PHP 5,000 transaction can require an STR if the compliance officer determines that it is suspicious. The filing deadline is 5 working days from the date of determination — meaning the date on which the compliance officer concluded that the transaction or attempted transaction is suspicious. This distinction is important. The clock does not start when the underlying transaction occurred. It starts when the determination is made. Institutions with investigation workflows that allow alerts to sit unworked for days before a determination is reached are systematically at risk of missing this deadline.
The tipping-off prohibition under AMLA is absolute. An institution is strictly prohibited from informing, or taking any action that would inform, the subject of a transaction that an STR has been or is being prepared. Violation is a criminal offence. This prohibition must be embedded in investigation procedures — particularly for institutions where front-line relationship managers are involved in the investigation process and may have direct contact with the customer.
All CDD records, transaction records, and monitoring documentation must be retained for a minimum of 5 years.

VASP-Specific Transaction Monitoring: BSP Circular 1108
BSP Circular 1108, issued in 2021, established the regulatory framework for Virtual Asset Service Providers — crypto exchanges, custodian wallet providers, and peer-to-peer virtual asset trading platforms. VASPs are classified as covered persons under AMLA and must register with both BSP and AMLC.
The transaction monitoring requirements for VASPs are structurally the same as for other BSP-supervised institutions: automated monitoring system, calibrated thresholds, documented alert investigations, CTR and STR filing. There is no lighter-touch version of these requirements because the institution is dealing in virtual assets rather than fiat currency.
VASP-specific compliance under AMLC also incorporates the FATF Travel Rule — Recommendation 16. BSP has signalled alignment with this requirement, meaning VASPs must collect and transmit originator and beneficiary information for virtual asset transfers above the USD 1,000 equivalent threshold. This is not a future aspiration — it is part of the BSP-supervised VASP compliance framework now.
The monitoring challenge for VASPs is that generic bank TM scenario libraries do not cover the typologies that matter in the virtual asset context. Peer-to-peer volume clustering, rapid stablecoin conversion, mixing and tumbling patterns, and cross-chain transfers all require scenario coverage that a standard bank monitoring ruleset does not include. A VASP that has deployed a bank-oriented monitoring system without building crypto-specific detection logic has a coverage gap that a BSP examination of its VASP activities will find.
For Philippine institutions managing sanctions screening obligations under BSP and AMLC alongside their transaction monitoring programme, the VASP context adds a further dimension — virtual asset transfers require real-time sanctions screening at the point of instruction, not batch processing.
Risk-Based Monitoring in Practice: What BSP Expects
BSP's supervision approach is explicitly risk-based. The monitoring programme must reflect the institution's own customer risk assessment. An institution with a predominantly retail customer base has different monitoring requirements than one serving high-net-worth individuals, corporate treasuries, or remittance corridors into high-risk jurisdictions.
High-risk customer categories in the Philippines context include:
- Politically exposed persons (PEPs) and their relatives and close associates — the Philippines context includes domestic PEPs at national and local government level
- Customers from FATF-listed high-risk and other monitored jurisdictions
- Customers with beneficial ownership structures involving foreign holding entities
- Remittance customers sending to AMLC-designated high-risk corridors, including specific Middle East and US remittance routes
Philippine-specific typologies that monitoring scenarios must cover include e-wallet mule account networks — GCash and Maya are both BSP-supervised e-money platforms with significant retail penetration, and BSP has specifically flagged mule account exploitation as a monitored typology. Authorised push payment scam layering through bank accounts is a growing pattern. Cross-border structuring via remittance corridors to the US and Middle East is a documented Philippines financial crime pattern.
BSP examination practice has consistently identified one category of finding above others: institutions that use vendor-default monitoring thresholds without any documented evidence that those thresholds were reviewed against the institution's specific customer risk profile. A threshold set to vendor defaults is not a risk-based threshold. It is a vendor threshold that may or may not be appropriate for a given institution's risk profile — and the institution cannot demonstrate which without a documented calibration exercise.
Common Transaction Monitoring Examination Findings
Based on BSP examination findings and regulatory guidance since the grey-list period, the following deficiency patterns appear repeatedly.
STR filing delays. The 5-working-day deadline runs from determination. Institutions with investigation backlogs — where alerts sit in a queue without active review — push the determination date later, which compresses the filing window. When the investigation eventually concludes, the STR filing is already late. This is a workflow problem, not a detection problem.
Alert backlog. BSP examiners will note alert queues older than 15 working days. This signals either inadequate compliance staffing relative to alert volume, or threshold miscalibration generating more alerts than the team can process. Examiners will record both problems. Hiring more staff to work an oversized alert queue from miscalibrated thresholds is an expensive partial fix; recalibrating thresholds to produce a manageable, risk-relevant alert population addresses the root cause.
E-money product gaps. Institutions that monitor deposit accounts but have not extended monitoring to their e-money wallet products have a coverage gap that BSP has specifically flagged. If the institution's covered products include e-wallet services, those products must be within the monitoring scope.
STR quality. Since the grey-list period, BSP and AMLC have focused on the quality of STR content, not just filing volume. An STR that is filed within the deadline but contains insufficient information for AMLC to take investigative action is still a finding. The report must contain enough context — transaction history, customer background, the specific facts that triggered suspicion — for AMLC to act on it.
Beneficial ownership monitoring gaps. Corporate accounts where the ultimate beneficial owner changes without triggering a monitoring review represent a structural gap. If a corporate customer's UBO changes, the customer risk profile may have changed materially. A monitoring programme that does not incorporate this trigger into its review logic will miss the shift.
A Practical Checklist for a BSP-Compliant Transaction Monitoring Programme
For compliance officers conducting a gap assessment of their current programme, the following items constitute the minimum floor of BSP compliance:
Automated monitoring system in place — not a manual review process. The system name and version should be documented and available for examiner reference.
Thresholds calibrated to the institution's customer risk assessment, not vendor defaults. Written evidence of calibration reviews, with dates and sign-off from a named responsible officer.
Coverage across all product lines: deposit accounts, remittance products, e-money wallets, and VASP services where applicable. A monitoring programme that covers some products but not others leaves documented gaps for examiners to find.
CTR and STR workflows with investigation trails and filing deadline tracking. The 5-working-day CTR and STR filing deadlines must be tracked systematically, not managed informally.
Annual typology review: do the scenarios in the monitoring system cover current Philippine financial crime patterns? APP scams, e-wallet fraud networks, and crypto layering typologies have become examination-relevant — they should be reflected in active detection scenarios.
When evaluating transaction monitoring software against these requirements, the buyer's guide provides a structured framework covering system functionality, calibration capability, case management, and audit trail requirements.
How FinCense Addresses the BSP and AMLC Framework
FinCense is pre-configured with BSP-aligned typologies, including e-wallet fraud patterns and Philippines remittance corridor scenarios. These are not generic rules relabelled for the Philippine market — they reflect the specific financial crime patterns that BSP and AMLC examination programmes have flagged as priorities.
The CTR and STR filing workflow is built into FinCense case management. The 5-working-day filing deadline is tracked automatically from the determination date, with escalation triggers when deadlines are at risk. Compliance officers do not manage this deadline manually.
VASP scenario coverage is included within the same platform — crypto-specific detection does not require a separate system layered alongside a bank monitoring deployment. The Travel Rule data collection workflow is integrated.
In production deployments across Southeast Asian financial institutions, FinCense has reduced false positive rates by up to 50% compared to legacy rule-based systems. For compliance teams managing alert backlogs that strain staffing capacity, this is not a secondary benefit — it is the operational change that makes risk-based investigation feasible.
Book a demo to see FinCense running against Philippines-specific BSP and AMLC scenarios, including e-wallet typologies, remittance corridor detection, and the CTR/STR workflow with filing deadline tracking.

AML Compliance for Remittance and Money Transfer Companies: An APAC Guide
It is a Thursday afternoon. Your firm is processing remittances on the Singapore–Philippines corridor — six thousand transactions before the weekend. You are licensed under MAS as a Major Payment Institution and registered as a Remittance and Transfer Company with the BSP in Manila. MAS published updated PSN02 guidance last month. This morning, the BSP examination schedule landed in your inbox. Two regulators. Two compliance programmes. One compliance team of four people. That is the daily operating reality for most APAC-licensed remittance operators, and it is the starting point for every AML programme design conversation.
This guide covers what money transfer AML compliance APAC-wide actually requires — by jurisdiction, by obligation, and by what good operational execution looks like.

Why Remittance Companies Carry Higher AML Risk
FATF has consistently identified remittance and money transfer as a high-risk sector. Not because remittance operators are bad actors, but because of the transaction patterns that characterise the business.
Remittance is cash-intensive in many corridors. Some jurisdictions allow senders to pay in cash at agent locations with limited identification requirements. High-volume, low-value transactions create conditions where structuring — the practice of breaking amounts to stay below reporting thresholds — is easier to conceal than in lower-volume banking environments. A customer sending MYR 500 twice a week looks almost identical to a customer structuring around MYR 25,000 CTR thresholds.
FATF Recommendation 16 — the Travel Rule — applies specifically to wire transfers. Remittance companies are wire transfer originators. They must collect, transmit, and retain originator and beneficiary information with every qualifying transfer. This is not the same obligation as KYC. It is a data transmission requirement that sits on top of the CDD framework.
The cross-border nature of remittance creates bilateral exposure. A transfer from Singapore to Manila passes through both MAS and BSP oversight. A compliance failure — a missed STR, an inadequate CDD record, a Travel Rule data gap — does not stay in one jurisdiction. Both regulators can examine the same transaction.
The APAC corridors under heaviest examination scrutiny are among the highest-volume remittance corridors in the world: Singapore–Philippines, Malaysia–Bangladesh, Australia–India, and Philippines–Middle East. High volume does not reduce examiner focus. It increases it.
APAC Regulatory Obligations by Jurisdiction
Singapore (MAS)
Cross-border money transfer above SGD 3 million per month requires a Major Payment Institution licence under the Payment Services Act. The MAS PSA AML obligations for payment institutions are set out in PSN02, which covers CDD, ongoing monitoring, and STR and CTR filing requirements.
The FATF Travel Rule applies at SGD 1,500. For every transfer at or above that threshold, the MPS must transmit originator name, account number, and address or national identity number — plus beneficiary name and account number — to the receiving institution with the payment. The obligation to transmit sits with the sender regardless of whether the beneficiary institution can receive the data in structured form.
STR filing must occur within five business days of the determination that the transaction is suspicious. MAS examiners in 2024 specifically cited STR quality — not volume — as an examination focus area. An STR that describes the suspicious transaction in one sentence without analysis of the pattern does not meet the standard.
Australia (AUSTRAC)
All remittance dealers must register with AUSTRAC before commencing operations. Unregistered remittance dealing is a criminal offence under the AML/CTF Act 2006. This is not a technicality — AUSTRAC has prosecuted unlicensed remittance dealing, and its enforcement record includes actions against informal value transfer networks operating in parallel to registered dealers.
Registered remittance dealers carry the same AML/CTF programme obligations as banks under Chapter 16 of the AML/CTF Rules, without the same IT infrastructure to support them. Threshold Transaction Reports apply to cash transactions above AUD 10,000. Suspicious Matter Reports must be filed for qualifying transactions without a fixed deadline, but AUSTRAC expects prompt filing — delays beyond a few days are examined.
Malaysia (BNM)
Remittance operators require a Money Services Business licence under the MSB Act 2011. The AMLATFPUAA framework applies — the same statutory framework as banks — imposing CDD, ongoing monitoring, and STR and CTR obligations.
CTR threshold is MYR 25,000 for cash transactions. STR filing is required within three business days of the determination. BNM's most recent national risk assessment specifically identifies hawala-style informal remittance networks operating alongside licensed MSBs as a risk vector. That finding has translated directly into elevated examination scrutiny for licensed operators, who face more frequent and detailed examinations as regulators attempt to map the boundary between formal and informal channels.
Philippines (BSP)
Remittance operators require a Remittance and Transfer Company licence from the BSP. The AML programme obligations are set by AMLA and BSP Circular 950 — the same framework that governs banks, applied in full to RTCs.
CTR threshold is PHP 500,000. STR filing is required within five business days. The Philippines exited the FATF grey list in January 2023, but exit has not reduced examination pressure — BSP has increased examination frequency for RTCs since 2023, consistent with post-grey-list monitoring by both the BSP and AMLC.
New Zealand (DIA)
Remittance operators are Phase 2 reporting entities under the AML/CFT Act 2009, supervised by the Department of Internal Affairs. The same CDD, ongoing monitoring, and SAR and PTR obligations that apply to banks apply in full to remittance operators. The DIA's supervisory approach includes sector-wide audits and thematic reviews — it does not reserve examination resources only for larger entities.
The FATF Travel Rule in Practice for APAC Remittance Operators
FATF Recommendation 16 requires the originating institution to transmit originator and beneficiary information with every wire transfer above the applicable threshold. Across APAC, the operative thresholds are SGD 1,500 under MAS, AUD 1,000 under AUSTRAC, and USD 1,000 equivalent as the FATF baseline for jurisdictions without a lower domestic threshold.
The data that must travel with the payment: originator name, account number, address or national identity number; beneficiary name and beneficiary account number. These fields must populate the payment message — they cannot be retained on file at the sending institution and supplied only on request.
The operational problem is well-documented. Many beneficiary institutions in the corridors where APAC remittance volumes are highest — particularly in developing-market corridors — do not have systems capable of receiving structured Travel Rule data. The sending institution's obligation does not dissolve because the receiving institution lacks the infrastructure. Compliance requires transmitting the data within whatever message structure the payment uses: MT103 field population for SWIFT transactions, or the equivalent structured fields in ISO 20022 message formats.
Travel Rule technology solutions — TRISA, VerifyVASP, and Sygna Bridge are the most widely deployed in APAC for virtual asset transfers — are increasingly being applied to fiat remittance payment flows as well. For most APAC remittance operators on real-time domestic rails, the Travel Rule data obligation sits inside the payment message design, not in a separate data transmission layer.

Transaction Monitoring Requirements Specific to Remittance
High-volume, low-value transaction environments cannot be monitored with the dollar-threshold rules designed for retail banking. A rule that fires above USD 5,000 will miss the dominant remittance pattern entirely — hundreds of transactions at USD 200 to USD 500 per customer per month — and generate alert noise on the routine flows that constitute most of the business.
For an overview of how automated transaction monitoring works, the underlying detection logic matters more than the threshold level. Remittance monitoring is a typology problem, not a threshold problem.
Velocity monitoring is the primary detection method for mule accounts in remittance networks. The pattern is not a single large transfer — it is twenty transactions in forty-eight hours across multiple corridors from the same account or beneficial owner. A system calibrated only to flag high-value single transactions will not detect this.
Corridor-specific scenario calibration is not optional. The Singapore–Philippines corridor has different fraud typologies from the Malaysia–Bangladesh corridor. Monitoring scenarios applied generically across all corridors without tuning for the specific patterns in each one will produce both false positives on legitimate traffic and false negatives on actual suspicious activity.
Round-number structuring is the simplest pattern and the one most often missed by single-threshold rules. Transactions consistently placed just below the CTR threshold — MYR 24,500, AUD 9,800, PHP 499,000 — are a textbook structuring indicator. A rule with a single threshold at the CTR level will not catch this. The detection logic must look at the cluster of transactions below the threshold, not just the individual transaction value.
Beneficiary account reuse is a mule indicator: multiple unrelated customers sending to the same unfamiliar beneficiary account. This pattern requires a system capable of cross-customer analysis, not just single-customer transaction review. Rules-based systems that process each customer's alerts in isolation cannot detect it.
For remittance operators evaluating their technology choices, the same detection architecture issues apply as those covered in TM for payment companies and e-wallets — the product and customer profiles are different, but the architectural requirements for cross-customer scenario coverage are the same.
What Good Looks Like for a Multi-Jurisdiction Remittance Operator
A compliance officer managing two or three APAC licences simultaneously with a small team is not running a bank compliance programme at reduced scale. The operational structure is different.
A single TM platform across all jurisdictions is operationally necessary, not aspirational. Compliance officers in multi-jurisdiction firms who reconcile alerts from separate system instances — one per market — spend time on logistics that should go into analysis. The same transaction, flagged differently in two systems because the rule calibrations differ, creates reconciliation work that multiplies with volume.
Pre-settlement processing on real-time rails is required where payment is irrevocable on settlement. On PayNow, DuitNow, NPP, and InstaPay, a payment that clears cannot be recalled. Batch monitoring that runs after settlement has already processed the payment before the alert fires. The monitoring must run against the payment instruction before settlement, not the settled record.
Travel Rule data workflow integrated into the payment process eliminates the manual population of originator and beneficiary data as a separate step. When Travel Rule data handling is separated from payment processing and managed by different team members, the data quality degrades and the audit trail becomes inconsistent.
STR and CTR filing workflows built per jurisdiction address the material operational differences between regulatory regimes: different templates, different filing portals, different time windows, different field requirements. A case management system that requires the analyst to manually navigate those differences for each jurisdiction adds material risk. The workflows should enforce the right template for the jurisdiction of the filing, triggered by the currency of the transaction.
Selecting the right platform requires working through a structured evaluation. The Transaction Monitoring Software Buyer's Guide covers the criteria relevant to multi-jurisdiction operators, including how to assess vendor coverage across APAC regulatory regimes.
FinCense for APAC Remittance Operators
FinCense is deployed at remittance and payment operators across APAC — not only at banks. The platform is configured for the transaction patterns, corridor structures, and regulatory filing requirements that remittance operators encounter, not adapted from a banking deployment.
The scenario library includes more than fifty financial crime typologies covering the patterns most prevalent in remittance: mule account networks identified by cross-customer beneficiary account reuse, APP scam indicators in outbound payment flows, velocity structuring across corridors, and cross-border layering patterns. These are pre-built scenarios, not configurations that require the compliance team to write detection logic from scratch.
Pre-settlement processing is available across PayNow, DuitNow, NPP, InstaPay, and FAST — covering the real-time rails in Singapore, Malaysia, Australia, and the Philippines where irrevocable payment risk requires monitoring before settlement, not after.
Multi-jurisdiction STR and CTR filing workflows are built into the case management interface. Filing to AUSTRAC, BNM, AMLC, or MAS FIU from a single case triggers the correct jurisdiction-specific template, with the applicable time window displayed for the analyst at the case level.
In production deployments, FinCense has reduced false positive rates by up to 50% compared to legacy rules-based systems. For a remittance operator managing three hundred thousand transactions per month with a compliance team of four, a 50% reduction in false positive volume is not a performance metric — it is the difference between a workable alert queue and one that structurally cannot be cleared before the next batch arrives.
Book a demo to see FinCense configured for APAC remittance compliance — with corridor-specific scenarios already calibrated and multi-jurisdiction filing workflows built in.
For the full vendor evaluation framework, see the Transaction Monitoring Software Buyer's Guide.


