Compliance Hub

How to Build an Effective AML Compliance Program

Site Logo
Tookitaki
07 Oct 2020
8 min
read

Introduction to AML Compliance

What is AML Compliance?

Anti-money laundering compliance or AML compliance refers to the policies, procedures, and technologies used by financial institutions to detect and prevent money laundering activities. Money laundering is the process of making illegally-gained proceeds appear legal. Effective AML compliance programs aim to prevent illicit funds from entering the legitimate financial system and ensure that institutions adhere to regulatory requirements.

Importance of AML Compliance in Financial Institutions

AML compliance is crucial for financial institutions to protect against financial crimes, including money laundering, terrorist financing, and fraud. It helps maintain the integrity of the financial system, protects the institution’s reputation, and avoids hefty fines and legal consequences. Effective AML compliance ensures that financial institutions operate within the law and contribute to global efforts to combat financial crime.

{{cta-first}}

Key Components of an AML Compliance Program

Developing Policies and Procedures

Effective AML compliance begins with the development of comprehensive policies and procedures tailored to the institution's specific needs and risks. These policies should outline the steps for detecting, monitoring, and reporting suspicious activities. They must comply with relevant laws and regulations, such as the Bank Secrecy Act (BSA) and the AMLA of the Philippines. Clear documentation ensures all employees understand their responsibilities and the actions required to maintain compliance.

Implementing Customer Due Diligence (CDD)

Customer Due Diligence (CDD) is a critical component of any AML program. It involves verifying the identities of customers and assessing their risk levels. This process includes gathering information about the customer's background, the nature of their business, and the source of their funds. Enhanced Due Diligence (EDD) is applied to high-risk customers, requiring more detailed investigation and ongoing monitoring to detect suspicious activities.

Transaction Monitoring and Screening

Transaction monitoring involves the continuous review of customer transactions to identify patterns that may indicate money laundering or other illicit activities. Automated systems using advanced algorithms and machine learning can analyze large volumes of data in real time, flagging suspicious transactions for further investigation. Screening processes compare transactions against watchlists, such as those provided by the Office of Foreign Assets Control (OFAC), to ensure compliance with international sanctions.

Example: HSBC's Compliance Challenges

HSBC faced significant penalties due to inadequate AML compliance measures, highlighting the importance of robust transaction monitoring and screening processes. The bank's failure to detect and report suspicious activities resulted in a $1.9 billion fine and damaged its reputation.

Key Takeaway

To build an effective AML compliance program, financial institutions must develop detailed policies and procedures, implement thorough customer due diligence, and utilize advanced transaction monitoring and screening systems.

The Role of AML Compliance Software

The increasing complexity and volume of financial transactions necessitate the use of advanced AML compliance software. Automation and machine learning (ML) are transforming how financial institutions detect and prevent money laundering. Automated systems can process vast amounts of data in real time, identifying suspicious patterns and flagging them for further investigation. Machine learning algorithms improve over time, learning from past data to enhance their accuracy and reduce false positives.

For instance, by implementing AI-driven solutions, institutions can streamline their compliance processes, ensuring more accurate and efficient monitoring. This not only enhances the effectiveness of AML programs but also reduces operational costs and human error.

Benefits of Real-time Monitoring Systems

Real-time monitoring systems are essential for effective AML compliance. These systems continuously analyze transactions, providing immediate alerts for suspicious activities. This proactive approach allows financial institutions to quickly investigate and address potential threats, minimizing the risk of financial crime.

Real-time systems offer several benefits:

  1. Immediate Detection: Suspicious transactions are identified and flagged as they occur, allowing for swift action.
  2. Improved Accuracy: Advanced algorithms can differentiate between legitimate and suspicious activities more effectively.
  3. Scalability: These systems can handle large volumes of transactions, making them suitable for institutions of all sizes.

Example: JPMorgan Chase's Technological Advancements

JPMorgan Chase has successfully integrated advanced technology into its AML compliance program. By leveraging machine learning and real-time monitoring, the bank has significantly reduced compliance issues and improved its ability to detect and report suspicious transactions.

Key Takeaway

The integration of automation and machine learning in AML compliance enhances the efficiency and effectiveness of monitoring systems. Real-time monitoring allows for immediate detection and response to suspicious activities, which is crucial for maintaining robust AML defences.

Establishing an AML Compliance Team

Responsibilities of an AML Compliance Officer

An effective AML compliance program requires a dedicated and knowledgeable team. Central to this team is the AML Compliance Officer, responsible for ensuring the institution adheres to all relevant regulations and policies designed to prevent money laundering. The AML Compliance Officer's duties include:

  1. Developing Policies and Procedures: Creating and updating AML policies that align with legal requirements and industry best practices.
  2. Conducting Risk Assessments: Evaluating potential risks associated with customers, transactions, and geographic locations.
  3. Monitoring Transactions: Overseeing transaction monitoring systems to detect suspicious activities.
  4. Reporting Suspicious Activities: Ensuring timely reporting of suspicious transactions to the relevant authorities.
  5. Training and Education: Providing ongoing training to employees about AML regulations and procedures.

Training and Education for Staff

A well-trained staff is crucial for effective AML compliance. Continuous education ensures that all employees understand the importance of AML measures and know how to identify and report suspicious activities. Training programs should cover:

  1. Regulatory Requirements: Updates on laws and regulations related to AML.
  2. Detection Techniques: Methods for identifying suspicious transactions and behaviors.
  3. Use of Technology: Training on the use of automated systems and tools for monitoring and reporting.

Institutions should also promote a culture of compliance where employees at all levels understand their role in preventing financial crimes. Regular workshops, seminars, and e-learning modules can keep staff updated on the latest trends and best practices in AML compliance.

Example: Importance of Training

The case of Westpac, which faced a $1.3 billion fine for AML compliance failures, underscores the importance of thorough training and education. The bank's lapses included inadequate monitoring and failure to report millions of suspicious transactions, highlighting the critical need for comprehensive employee training.

Key Takeaway

A dedicated AML compliance team, led by a knowledgeable AML Compliance Officer and supported by well-trained staff, is essential for maintaining robust AML defenses. Continuous education and training ensure that all employees are equipped to identify and mitigate potential risks.

Risk-Based Approach to AML Compliance

Conducting Risk Assessments

A risk-based approach is fundamental to an effective AML compliance program. This method involves identifying and evaluating the risks associated with customers, transactions, products, services, and geographic locations. By understanding these risks, financial institutions can allocate resources more effectively and implement appropriate controls to mitigate potential threats.

Steps in Conducting Risk Assessments:

  1. Customer Risk: Evaluate the risk levels of customers based on their background, transaction behaviour, and geographic location. High-risk customers, such as politically exposed persons (PEPs) and those from high-risk jurisdictions, require enhanced due diligence and continuous monitoring.
  2. Transaction Risk: Assess the risk associated with different types of transactions. Large, frequent, or complex transactions, especially those involving high-risk countries, should be scrutinized more closely.
  3. Product and Service Risk: Analyse the risk levels of various financial products and services. Some products, such as private banking and correspondent banking, may pose higher risks due to their nature and usage.
  4. Geographic Risk: Identify the risk associated with certain geographic locations. Countries with weak AML regulations, high levels of corruption, or significant criminal activity are considered high-risk and require enhanced scrutiny.

Tailoring AML Strategies Based on Risk Levels

Once risks are assessed, institutions should tailor their AML strategies accordingly. This involves implementing enhanced due diligence measures for high-risk customers and transactions, such as:

  • In-depth Customer Verification: For high-risk customers, gather more detailed information and perform ongoing verification to ensure the accuracy of customer data.
  • Enhanced Transaction Monitoring: Apply stricter monitoring rules and thresholds for high-risk transactions to detect unusual patterns promptly.
  • Regular Audits and Reviews: Conduct frequent audits of high-risk areas to ensure compliance with AML policies and procedures.

Example: Tailored AML Strategies in Action

An example of effective risk-based AML compliance is seen in the practices of major global banks. These institutions use sophisticated risk assessment models to identify high-risk customers and transactions, implementing stricter controls and continuous monitoring to mitigate potential threats.

Key Takeaway

A risk-based approach allows financial institutions to focus their resources on the areas that pose the highest risks. By conducting thorough risk assessments and tailoring AML strategies accordingly, institutions can enhance their ability to detect and prevent money laundering activities.

Regulatory Requirements and Global Standards

AML compliance programs in the Philippines, Malaysia, India, Singapore, and Saudi Arabia must adhere to specific national and international AML compliance regulations to combat money laundering and other financial crimes. Here are key regulations and standards relevant to these regions:

  1. Philippines:
    • Anti-Money Laundering Act (AMLA): This law mandates financial institutions to implement AML programs, report suspicious transactions, and conduct customer due diligence. The AMLC (Anti-Money Laundering Council) enforces this law.
    • BSP Circulars: The Bangko Sentral ng Pilipinas issues circulars providing detailed AML guidelines for financial institutions.

  2. Malaysia:
    • Anti-Money Laundering, Anti-Terrorism Financing and Proceeds of Unlawful Activities Act 2001 (AMLA): This act requires financial institutions to establish AML policies, perform customer due diligence, and report suspicious activities to the Bank Negara Malaysia (BNM).

  3. India:
    • Prevention of Money Laundering Act (PMLA): Enforced by the Financial Intelligence Unit-India (FIU-IND), this act requires financial institutions to follow AML guidelines, conduct customer due diligence, and report suspicious transactions.
    • Reserve Bank of India (RBI) Guidelines: The RBI issues circulars and guidelines for implementing AML measures in the financial sector.

  4. Singapore:
    • Corruption, Drug Trafficking and Other Serious Crimes (Confiscation of Benefits) Act (CDSA): This law mandates AML compliance and reporting of suspicious transactions.
    • Monetary Authority of Singapore (MAS) Guidelines: MAS provides comprehensive AML/CFT guidelines for financial institutions.

  5. Saudi Arabia:
    • Anti-Money Laundering Law: Enforced by the Saudi Arabian Monetary Authority (SAMA), this law requires financial institutions to implement AML programs, conduct due diligence, and report suspicious activities.
    • Saudi Central Bank Regulations: SAMA issues guidelines and circulars to ensure compliance with AML laws.

Importance of Staying Updated with Regulatory Changes

Financial institutions in these regions must stay updated with regulatory changes to ensure compliance and avoid penalties. Regulatory bodies frequently update AML requirements to address emerging threats and vulnerabilities. Keeping abreast of these changes involves:

  1. Continuous Monitoring: Regularly reviewing updates from regulatory bodies like AMLC in the Philippines, BNM in Malaysia, FIU-IND in India, MAS in Singapore, and SAMA in Saudi Arabia.
  2. Training and Development: Ensuring that compliance officers and staff receive regular training on new regulations and best practices.
  3. Policy Updates: Revising internal policies and procedures to reflect new regulatory requirements and standards.

Financial Action Task Force (FATF)

FATF is an intergovernmental body that sets international standards for AML and counter-terrorist financing (CTF). Its 40 Recommendations provide a comprehensive framework for AML/CTF policies, including customer due diligence, record-keeping, and reporting of suspicious transactions.

Example: Regulatory Compliance in Practice

In Singapore, the Monetary Authority of Singapore (MAS) emphasizes the importance of robust AML measures. Institutions failing to comply with MAS regulations face significant penalties, as seen in past enforcement actions against banks for lapses in AML controls. Similarly, in India, the Enforcement Directorate (ED) has taken strict action against entities violating PMLA requirements, underscoring the need for strict compliance.

Key Takeaway

Adhering to AML regulations and staying updated with global standards is crucial for maintaining effective AML compliance programs in the Philippines, Malaysia, India, Singapore, and Saudi Arabia. Financial institutions must implement robust policies, continuous monitoring, and regular training to ensure compliance and mitigate the risk of financial crimes.

Challenges in AML Compliance

Common Obstacles and How to Overcome Them

Implementing effective AML compliance programs comes with several challenges that financial institutions in the Philippines, Malaysia, India, Singapore, and Saudi Arabia need to navigate. Understanding these obstacles and how to address them is crucial for maintaining robust AML defences.

1. Regulatory Complexity

Navigating the complex web of local and international regulations is a significant challenge. Each country has its own set of AML laws and guidelines, which can be difficult to interpret and implement consistently across different jurisdictions.

Solution: Financial institutions should invest in compliance expertise, including hiring AML specialists and legal advisors who are well-versed in local and international regulations. Regular training and updates on regulatory changes are essential to ensure that the institution remains compliant.

2. Technological Integration

Integrating advanced technologies like AI and machine learning into existing AML systems can be challenging. Legacy systems may not support new technologies, leading to inefficiencies and increased risk of non-compliance.

Solution: Investing in modern, scalable AML solutions that can integrate seamlessly with existing systems is crucial. Financial institutions should work with technology providers that offer robust support and customization options to meet their specific needs.

3. Data Management and Quality

Effective AML compliance relies on high-quality data. Inaccurate or incomplete data can lead to false positives or missed suspicious activities, undermining the effectiveness of the AML program.

Solution: Implementing strong data governance policies and regular data audits can help ensure data accuracy and completeness. Institutions should also leverage data analytics tools to enhance data quality and reliability.

4. Resource Constraints

Many financial institutions, especially smaller ones, face resource constraints that make it difficult to implement comprehensive AML programs. Limited budgets and manpower can hinder the ability to conduct thorough risk assessments and continuous monitoring.

Solution: Prioritizing resources based on risk assessments can help institutions focus on the most critical areas. Additionally, outsourcing certain AML functions or using third-party AML service providers can alleviate resource constraints.

5. Keeping Up with Emerging Threats

The methods used by criminals to launder money are constantly evolving, making it challenging for financial institutions to stay ahead of emerging threats. New technologies and global events can create new vulnerabilities.

Solution: Continuous training and education for compliance teams are essential to keep up with emerging threats. Participating in industry forums, collaborating with other institutions, and staying informed about global trends can help institutions anticipate and address new risks.

{{cta-guide}}

Continuous Improvement and Auditing

Importance of Regular Audits

Regular audits are a cornerstone of an effective AML compliance program. They help ensure that policies and procedures are being followed correctly and that the institution remains compliant with current regulations. Audits identify gaps and weaknesses in the AML system, allowing for timely corrections and improvements. For financial institutions in the Philippines, Malaysia, India, Singapore, and Saudi Arabia, regular audits are crucial due to the dynamic nature of AML regulations and the evolving methods of money laundering.

Key Aspects of an Effective AML Audit:

  1. Scope and Objectives: Clearly define the scope and objectives of the audit. This includes reviewing all aspects of the AML compliance program, such as risk assessments, customer due diligence, transaction monitoring, and reporting mechanisms.
  2. Frequency: Conduct audits regularly. Depending on the size and risk profile of the institution, audits could be quarterly, bi-annual, or annual. Regular audits help in early detection of issues and ensure continuous compliance.
  3. Internal vs. External Audits: Both internal and external audits have their place in a comprehensive AML compliance strategy. Internal audits are ongoing reviews conducted by the institution’s compliance team, while external audits provide an independent assessment of the AML program's effectiveness.

Updating AML Programs to Meet Emerging Threats

Financial crime methodologies are continually evolving, requiring AML programs to be adaptive. Updating AML programs involves incorporating new technologies, adjusting policies based on emerging threats, and ensuring staff are trained on the latest compliance requirements and typologies.

Steps for Continuous Improvement:

  1. Incorporate Feedback: Use findings from audits and reviews to make necessary adjustments. This might involve updating policies, enhancing transaction monitoring systems, or improving customer due diligence processes.
  2. Technology Integration: Leverage advancements in technology, such as artificial intelligence and machine learning, to enhance detection and monitoring capabilities. Technologies like blockchain analysis tools can also help track illicit activities in cryptocurrencies.
  3. Training and Development: Regularly update training programs to reflect new regulations, emerging threats, and best practices. Ensure all staff, especially those in high-risk areas, are adequately trained and aware of their responsibilities.

Summary of Best Practices

Building and maintaining an effective AML compliance program is a multifaceted task that requires a comprehensive approach. Key best practices include developing detailed policies and procedures, implementing thorough customer due diligence, leveraging advanced technologies for real-time monitoring, and conducting regular audits. By adopting a risk-based approach, financial institutions can allocate resources effectively and tailor their AML strategies to address the highest risks.

Financial institutions in various countries face unique regulatory environments and challenges in combating money laundering. Staying compliant requires continuous adaptation to evolving threats and regulatory changes. Institutions must invest in modern technologies, such as machine learning and AI, to enhance their detection capabilities and improve efficiency. Regular training and education for staff are crucial to ensure that everyone understands their role in maintaining compliance.

To strengthen your AML compliance program, consider leveraging Tookitaki’s FinCense platform. These solutions offer comprehensive tools for fraud prevention and AML compliance, helping financial institutions stay ahead of financial crimes.

Talk to an Expert

Ready to Streamline Your Anti-Financial Crime Compliance?

Our Thought Leadership Guides

Blogs
20 May 2026
5 min
read

KYC Requirements in Singapore: MAS CDD Rules for Banks and Payment Companies

Singapore's KYC framework is more specific — and more enforced — than most compliance teams from outside the region expect. The Monetary Authority of Singapore does not publish voluntary guidelines on customer due diligence. It issues Notices: binding legal instruments with criminal penalties for non-compliance. For banks, MAS Notice 626 sets the requirements. For payment service providers licensed under the Payment Services Act, MAS Notice PSN01 and PSN02 apply.

This guide covers what MAS requires for customer identification and verification, the three tiers of CDD Singapore institutions must apply, beneficial ownership obligations, enhanced due diligence triggers, and the recurring gaps MAS examiners find in KYC programmes.

Talk to an Expert

The Regulatory Foundation: MAS Notice 626 and PSN01/PSN02

MAS Notice 626 applies to banks and merchant banks. It sets out prescriptive requirements for:

  • Customer due diligence (CDD) — when to perform it, what it must cover, and how to document it
  • Enhanced due diligence (EDD) — specific triggers and minimum requirements
  • Simplified due diligence (SDD) — the limited circumstances where reduced CDD applies
  • Ongoing monitoring of business relationships
  • Record keeping
  • Suspicious transaction reporting

MAS Notice PSN01 (for standard payment licensees) and MAS Notice PSN02 (for major payment institutions) under the Payment Services Act 2019 set equivalent obligations for payment companies, e-wallets, and remittance operators. The CDD framework in PSN01/PSN02 mirrors the structure of Notice 626 but calibrated to payment service business models — including specific requirements for transaction monitoring on payment flows, cross-border transfers, and digital token services.

Both Notices are regularly updated. Institutions should refer to the current MAS website versions rather than archived copies — amendments following Singapore's 2024 National Risk Assessment update guidance on beneficial ownership verification and higher-risk customer categories.

When CDD Must Be Performed

MAS Notice 626 specifies four triggers requiring CDD to be completed before proceeding:

  1. Establishing a business relationship — KYC must be completed before onboarding any customer into an ongoing relationship
  2. Occasional transactions of SGD 5,000 or more — one-off transactions at or above this threshold require CDD even without an ongoing relationship
  3. Wire transfers of any amount — all wire transfers require CDD, with no minimum threshold
  4. Suspicion of money laundering or terrorism financing — CDD is required regardless of transaction value or customer type when suspicion arises

The inability to complete CDD to the required standard is grounds for declining to onboard a customer or for terminating an existing business relationship. MAS examiners check that institutions apply this requirement in practice, not just in policy.

Three Tiers of CDD in Singapore

Singapore's CDD framework has three levels, applied based on the customer's assessed risk:

Simplified Due Diligence (SDD)

SDD may be applied — with documented justification — for a limited category of lower-risk customers:

  • Singapore government entities and statutory boards
  • Companies listed on the Singapore Exchange (SGX) or other approved exchanges
  • Regulated financial institutions supervised by MAS or equivalent foreign supervisors
  • Certain low-risk products (e.g., basic savings accounts with strict usage limits)

SDD does not mean no due diligence. It means reduced documentation requirements — but institutions must document why SDD applies and maintain that justification in the customer file. MAS does not permit SDD to be applied as a default for corporate customers without case-by-case assessment.

Standard CDD

Standard CDD is the baseline requirement for all other customers. It requires:

  • Customer identification: Full legal name, identification document type and number, date of birth (individuals), place of incorporation (entities)
  • Verification: Identity documents verified against reliable, independent sources — passports, NRIC, ACRA business registration, corporate documentation
  • Beneficial owner identification: For legal entities, identify and verify the natural persons who ultimately own or control the entity (see below for the 25% threshold)
  • Purpose and intended nature of the business relationship documented
  • Ongoing monitoring of the relationship for consistency with the customer's profile

Enhanced Due Diligence (EDD)

EDD applies to higher-risk customers and situations. MAS Notice 626 specifies mandatory EDD triggers:

  • Politically Exposed Persons (PEPs): Foreign PEPs require EDD as a minimum. Domestic PEPs are subject to risk-based assessment. PEP status extends to family members and close associates. Senior management approval is required before establishing or continuing a relationship with a PEP. EDD for PEPs must include source of wealth and source of funds verification — not just identification.
  • Correspondent banking relationships: Respondent institution KYC, assessment of AML/CFT controls, and senior management approval before establishing the relationship
  • High-risk jurisdictions: Customers or transaction counterparties connected to FATF grey-listed or black-listed countries require EDD and additional scrutiny
  • Complex or unusual transactions: Transactions with no apparent economic or legal purpose, or that are inconsistent with the customer's known profile, require EDD investigation before proceeding
  • Cross-border private banking: Non-face-to-face account opening for high-net-worth clients from outside Singapore requires additional verification steps

EDD is not satisfied by collecting more documents. MAS examiners look for evidence that the additional information gathered was actually used in the risk assessment — source of wealth narratives that are vague or unsubstantiated are treated as inadequate EDD, not as EDD completed.

ChatGPT Image May 20, 2026, 11_33_41 AM

Beneficial Owner Verification

Identifying and verifying beneficial owners is one of the most examined areas of Singapore's KYC framework. MAS Notice 626 requires institutions to identify the natural persons who ultimately own or control a legal entity customer.

The threshold is 25% shareholding or voting rights — any natural person who holds, directly or indirectly, 25% or more of a company's shares or voting rights must be identified and verified. Where no natural person holds 25% or more, the institution must identify the natural persons who exercise control through other means — typically senior management.

For layered corporate structures — where ownership runs through multiple holding companies across different jurisdictions — institutions must look through the structure to identify the ultimate beneficial owner. MAS examiners consistently flag beneficial ownership documentation failures as a top finding in corporate customer reviews. Accepting a company registration document without looking through the ownership chain does not satisfy this requirement.

Trusts and other non-corporate legal arrangements require identification of settlors, trustees, and beneficiaries with 25% or greater beneficial interest.

Digital Onboarding and MyInfo

Singapore's national digital identity infrastructure supports MAS-compliant digital onboarding. MyInfo, operated by the Government Technology Agency (GovTech), provides verified personal data — NRIC details, address, employment, and other government-held data — that institutions can retrieve with customer consent.

MAS has confirmed that MyInfo retrieval is acceptable for identity verification purposes, reducing the documentation burden for individual customers. Institutions using MyInfo for onboarding must document the verification method and maintain records of the MyInfo retrieval.

For corporate customers, ACRA's Bizfile registry provides business registration and officer information that can be used for entity verification. Beneficial ownership still requires independent verification — Bizfile shows registered shareholders but does not always reflect ultimate beneficial ownership through nominee structures.

Ongoing Monitoring and Periodic Review

KYC is not a one-time onboarding requirement. MAS Notice 626 requires ongoing monitoring of established business relationships to ensure that transactions remain consistent with the institution's knowledge of the customer.

This has two components:

Transaction monitoring — detecting transactions inconsistent with the customer's business profile, source of funds, or expected transaction patterns. For the transaction monitoring requirements that feed into this ongoing CDD obligation, see our MAS Notice 626 guide.

Periodic CDD review — customer records must be reviewed and updated at intervals appropriate to the customer's risk rating. High-risk customers require more frequent review. The review must check whether the customer's profile has changed, whether beneficial ownership has changed, and whether the risk rating remains appropriate.

The trigger for an out-of-cycle CDD review includes: material changes in transaction patterns, adverse media, connection to a person or entity of concern, and changes in beneficial ownership.

Record-Keeping Requirements

MAS Notice 626 requires institutions to retain CDD records for five years from the end of the business relationship, or five years from the date of the transaction for one-off customers. Records must be maintained in a form that allows reconstruction of individual transactions and can be produced promptly in response to an MAS request or court order.

The five-year clock runs from the end of the relationship — not from when the records were created. For long-term customers, this means maintaining KYC documentation, transaction records, SAR-related records, and correspondence for the full relationship period plus five years.

Suspicious Transaction Reporting

Singapore uses Suspicious Transaction Reports (STRs) filed with the Suspicious Transaction Reporting Office (STRO), administered by the Singapore Police Force. There is no minimum transaction threshold — any transaction, regardless of amount, that raises suspicion must be reported.

STRs must be filed as soon as practicable after suspicion is formed. The Act does not set a specific deadline in days, but MAS examiners and STRO guidance indicate that delays of more than a few business days without documented justification will attract scrutiny.

The tipping-off prohibition under the Corruption, Drug Trafficking and Other Serious Crimes (CDSA) Act makes it a criminal offence to disclose to a customer that an STR has been filed or is under consideration.

For cash transactions of SGD 20,000 or more, institutions must file a Cash Transaction Report (CTR) regardless of suspicion. CTRs are filed with STRO within 15 business days.

Common KYC Failures in MAS Examinations

MAS's examination findings and industry guidance consistently flag the same recurring gaps:

Beneficial ownership not traced to ultimate natural persons. Institutions stop at the first layer of corporate ownership without looking through nominee shareholders or holding company structures to identify the actual controlling individuals.

EDD documentation without substantive assessment. Files contain EDD documents — source of wealth declarations, bank statements, company accounts — but no evidence that the documents were reviewed, assessed, or used to update the risk rating.

PEP definitions applied too narrowly. Institutions identify foreign government ministers as PEPs but miss domestic senior officials, senior executives of state-owned enterprises, and immediate family members of identified PEPs.

Static customer profiles. CDD completed at onboarding is never updated. Customers whose transaction patterns have changed significantly since onboarding retain their original risk rating without periodic review.

MyInfo used as a complete KYC solution. MyInfo satisfies identity verification for individuals but does not substitute for source of funds verification, purpose of relationship documentation, or beneficial ownership checks on corporate structures.

STR delays. Suspicion forms during transaction review but is not escalated or filed for days or weeks. Case management systems without deadline tracking are the most common operational cause.

For Singapore institutions evaluating whether their current KYC and monitoring systems can meet these requirements, see our Transaction Monitoring Software Buyer's Guide for a full framework covering the capabilities MAS-regulated institutions need.

KYC Requirements in Singapore: MAS CDD Rules for Banks and Payment Companies
Blogs
20 May 2026
5 min
read

Transaction Monitoring in New Zealand: FMA, RBNZ and DIA Requirements

New Zealand sits under less external scrutiny than Singapore or Australia, but its domestic enforcement record tells a different story. Three supervisors — the Reserve Bank of New Zealand, the Financial Markets Authority, and the Department of Internal Affairs — run active examination programmes. A mandatory Section 59 audit every two years creates a hard compliance deadline. And the AML/CFT Act's risk-based approach means institutions cannot rely on vendor defaults or generic rule sets to satisfy supervisors.

For banks, payment service providers, and fintechs operating in New Zealand, transaction monitoring is the operational centre of AML/CFT compliance. This guide covers what the Act requires, how the supervisory structure affects monitoring obligations, and where institutions most commonly fail examination.

The AML/CFT Act 2009: New Zealand's Core Framework

New Zealand's AML/CFT framework is governed by the Anti-Money Laundering and Countering Financing of Terrorism Act 2009. Phase 1 entities — banks, non-bank deposit takers, and most financial institutions — came into scope in June 2013. Phase 2 extended obligations to lawyers, accountants, real estate agents, and other designated businesses in stages from 2018 to 2019.

The Act operates on a risk-based model. There is no prescriptive list of transaction monitoring rules an institution must run. Instead, institutions must:

  • Conduct a written risk assessment that identifies their specific ML/FT risks based on customer type, product set, and delivery channels
  • Implement a compliance programme derived from that assessment, including monitoring and detection controls designed to address identified risks
  • Review and update the risk assessment whenever material changes occur — new products, new customer segments, new channels

This principle-based approach gives institutions flexibility but removes the ability to claim compliance by pointing to a vendor's default configuration. If your monitoring is not designed around your assessed risks, supervisors will find the gap.

Three Supervisors: FMA, RBNZ and DIA

New Zealand's supervisory structure is unusual among APAC jurisdictions. While Australia has AUSTRAC and Singapore has MAS, New Zealand has three supervisors, each with jurisdiction over distinct entity types:

ChatGPT Image May 20, 2026, 10_42_52 AM

Each supervisor publishes its own guidance and runs its own examination priorities. The practical implication: guidance from AUSTRAC or MAS does not map directly onto New Zealand's framework. Institutions need to engage with their specific supervisor's published materials and annual risk focus areas.

For most banks and payment companies, RBNZ is the relevant supervisor. For digital asset businesses and VASPs, DIA is the supervisor following the 2021 amendments.

ChatGPT Image May 20, 2026, 11_05_14 AM

Who Must Comply

The Act applies to "reporting entities" — a defined category covering most financial businesses operating in New Zealand:

  • Banks (including branches of foreign banks)
  • Non-bank deposit takers: credit unions, building societies, finance companies
  • Money remittance operators and foreign exchange dealers
  • Life insurance companies
  • Securities dealers, brokers, and investment managers
  • Trustee companies
  • Virtual asset service providers (VASPs) — brought in scope June 2021

The VASP inclusion is significant. The AML/CFT (Amendment) Act 2021 extended reporting entity obligations to crypto exchanges, digital asset custodians, and related businesses. DIA supervises most VASPs, with specific guidance on digital asset typologies.

Transaction Monitoring Obligations

The AML/CFT Act does not use "transaction monitoring" as a defined technical term the way MAS Notice 626 does. What it requires is that institutions implement systems and controls within their compliance programme to detect unusual and suspicious activity.

In practice, a compliant transaction monitoring function requires:

Documented risk-based detection scenarios. Monitoring rules or behavioural detection scenarios must be designed to detect the specific ML/FT risks identified in your risk assessment. A retail bank serving Pacific Island remittance customers needs different scenarios than a corporate securities dealer. Supervisors check the alignment between the risk assessment and the monitoring controls — generic vendor defaults that have not been configured to your institution's risk profile will not satisfy this requirement.

Alert investigation records. Every alert generated must be investigated, and the investigation and disposition decision must be documented. An alert closed as a false positive requires documentation of why. An alert that escalates to a SAR requires the full investigation trail. Alert backlogs — alerts generated but not reviewed — are among the most common examination findings.

Annual programme review with board sign-off. The Act requires the compliance programme, including monitoring controls, to be reviewed annually. The compliance officer must report to senior management and the board. Evidence of this reporting chain is a standard examination request.

Calibration and effectiveness review. Supervisors look for evidence that monitoring scenarios are reviewed for effectiveness — whether they are generating useful alerts or producing excessive false positives without adjustment. A monitoring programme that has not been reviewed or calibrated since deployment will attract scrutiny.

Reporting Requirements: PTRs and SARs

Transaction monitoring outputs feed two mandatory reporting obligations:

Prescribed Transaction Reports (PTRs) are threshold-based and mandatory — they do not require suspicion. PTRs must be filed with the New Zealand Police Financial Intelligence Unit (FIU) via the goAML platform for:

  • Cash transactions of NZD 10,000 or more
  • International wire transfers of NZD 1,000 or more (in or out)

The filing deadline is within 10 working days of the transaction. PTR monitoring requires specific detection for transactions at and around these thresholds, including structuring patterns where customers conduct multiple sub-threshold transactions to avoid PTR obligations.

Suspicious Activity Reports (SARs) — New Zealand uses "SAR" rather than "STR" (Suspicious Transaction Report). SARs must be filed as soon as practicable, and no later than three working days after forming a suspicion. The threshold for suspicion is lower than many teams assume: reasonable grounds to suspect money laundering or financing of terrorism are sufficient — certainty is not required.

SARs are filed with the NZ Police FIU via goAML. The tipping-off prohibition under the Act makes it a criminal offence to disclose to a customer that a SAR has been filed or is under consideration.

The Section 59 Audit Requirement

The most operationally distinctive element of New Zealand's framework is the Section 59 audit. Every reporting entity must arrange for an independent audit of its AML/CFT programme at intervals of no more than two years.

The auditor must assess whether:

  • The risk assessment accurately reflects the entity's current ML/FT risk profile
  • The compliance programme is adequate to manage those risks
  • Transaction monitoring controls are functioning as designed and generating appropriate outputs
  • PTR and SAR reporting is accurate, complete, and timely
  • Staff training is adequate

The two-year cycle creates a hard deadline. Institutions with monitoring gaps, stale risk assessments, or unresolved findings from the previous audit cycle will face those issues again. The audit is also a forcing function for calibration: institutions that have not reviewed their detection scenarios or addressed alert backlogs before the audit will have those gaps documented in the audit report — which supervisors can and do request.

How NZ Compares to Australia and Singapore

For compliance teams managing obligations across multiple APAC jurisdictions, the structural differences matter:

ChatGPT Image May 20, 2026, 10_44_15 AM

The wire transfer threshold is the most operationally significant difference. New Zealand's NZD 1,000 threshold for international wires generates substantially more PTR volume than Australian or Singapore equivalents. Institutions managing cross-border payment flows into or out of New Zealand need PTR-specific monitoring that can handle this volume.

Common Transaction Monitoring Gaps in NZ Examinations

Supervisors across all three agencies have documented recurring compliance failures. The most common transaction monitoring gaps are:

Risk assessment not driving monitoring design. The risk assessment identifies high-risk customer segments or products, but the monitoring system runs generic rules that do not target those specific risks. Supervisors treat this as a material failure — the Act requires the programme to be derived from the risk assessment, not run alongside it.

PTR monitoring gaps. Institutions with strong SAR-based monitoring often have inadequate controls for PTR-triggering transactions. Structuring below the NZD 10,000 cash threshold requires specific detection scenarios that standard bank rule sets do not include.

Alert backlogs. Alerts generated but not reviewed within a reasonable timeframe are a consistent finding. Unlike some jurisdictions with prescribed investigation timelines, the Act does not specify deadlines — but supervisors expect evidence of timely review, and large backlogs indicate the monitoring system is generating more output than the team can process.

Stale risk assessments. The Act requires risk assessments to be updated when material changes occur. Institutions that have launched new products, added new customer segments, or changed delivery channels without updating their risk assessment are out of compliance with this requirement.

VASP-specific coverage gaps. For DIA-supervised VASPs, standard bank-oriented monitoring rule sets do not address digital asset typologies: wallet clustering, rapid conversion between asset types, cross-chain transfers, and structuring patterns in low-value token transactions. VASPs need detection scenarios specific to their product and customer risk profile.

What a Compliant NZ Transaction Monitoring Programme Requires

For institutions operating under the AML/CFT Act, a compliant monitoring programme requires:

  • A current, documented risk assessment aligned to your actual customer base and product set
  • Monitoring scenarios designed to detect the specific risks in that assessment, not vendor defaults
  • Alert investigation workflows with documented disposition for every alert
  • PTR-specific detection for cash and wire transactions at and around the NZD 10,000 and NZD 1,000 thresholds
  • SAR workflow with a three-working-day filing deadline built into case management
  • Annual programme review with board sign-off documentation
  • Section 59 audit preparation: calibration review, rule effectiveness documentation, and remediation of any open findings before the audit cycle closes

For institutions evaluating whether their current monitoring system can support these requirements across New Zealand and other APAC markets, see our Transaction Monitoring Software Buyer's Guide.

Transaction Monitoring in New Zealand: FMA, RBNZ and DIA Requirements
Blogs
18 May 2026
7 min
read

The Gambling Empire: Inside Thailand’s Billion-Baht Online Betting and Money Laundering Network

In April 2026, a Thai court sentenced the son of a former senator to more than 130 years in prison in connection with a major online gambling and money laundering operation that authorities say moved billions of baht through an extensive criminal network.

At the centre of the case was not merely illegal gambling activity, but a sophisticated financial ecosystem allegedly built to process, distribute, and disguise illicit proceeds at scale.

Authorities said the operation involved online betting platforms, nominee accounts, layered fund transfers, and interconnected financial flows designed to move gambling proceeds through the financial system while obscuring the origin of funds.

For banks, fintechs, payment providers, and compliance teams, this is far more than a gambling enforcement story.

It is another example of how organised financial crime increasingly operates through structured digital ecosystems that combine:

  • illicit platforms,
  • mule-account networks,
  • layered payments,
  • and coordinated laundering infrastructure.

And increasingly, these operations are beginning to resemble legitimate digital businesses in both scale and operational sophistication.

Talk to an Expert

Inside Thailand’s Alleged Online Gambling Network

According to Thai authorities, the investigation centred around an online gambling syndicate accused of operating illegal betting platforms and laundering significant volumes of illicit proceeds through interconnected financial channels.

Reports linked to the case suggest the network allegedly relied on:

  • multiple bank accounts,
  • nominee structures,
  • rapid movement of funds,
  • and layered transaction activity designed to complicate tracing efforts.

That structure matters.

Modern online gambling networks no longer function as isolated betting operations.

Instead, many operate as financially engineered ecosystems where:

  • payment collection,
  • account rotation,
  • fund layering,
  • customer acquisition,
  • and laundering mechanisms
    are all tightly coordinated.

The gambling platform itself often becomes only the front-facing layer of a much larger financial infrastructure.

Why Online Gambling Remains a Major AML Risk

Online gambling presents a unique challenge for financial institutions because the underlying financial activity can initially appear commercially legitimate.

High transaction volumes, rapid fund movement, and frequent customer transfers are often normal within betting environments.

That creates operational complexity for AML and fraud teams attempting to distinguish:

  • legitimate gaming behaviour,
  • from structured laundering activity.

Criminal networks exploit this ambiguity.

Funds can be:

  • deposited,
  • redistributed across multiple accounts,
  • cycled through betting activity,
  • withdrawn,
  • and transferred again across payment rails
    within relatively short periods of time.

This creates an ideal environment for:

  • layering,
  • transaction fragmentation,
  • and obscuring beneficial ownership.

And increasingly, digital payment ecosystems allow this movement to happen at scale.

The Role of Mule Accounts and Nominee Structures

No large-scale online gambling operation can effectively move illicit proceeds without access to account infrastructure.

The Thailand case highlights the critical role of:

  • mule accounts,
  • nominee account holders,
  • and intermediary payment channels.

Authorities allege the network used multiple accounts to receive and redistribute gambling proceeds, helping distance the organisers from the underlying transactions.

These accounts may belong to:

  • recruited individuals,
  • account renters,
  • synthetic identities,
  • or nominees acting on behalf of criminal operators.

Their role is operationally simple but strategically important:
receive funds, move them rapidly, and reduce visibility into the true controllers behind the network.

For financial institutions, this creates a major detection challenge because individual transactions may appear ordinary when viewed in isolation.

But collectively, the patterns may indicate coordinated laundering behaviour.

The Industrialisation of Gambling-Linked Financial Crime

One of the most important lessons from this case is that organised online gambling is becoming increasingly industrialised.

This is no longer simply a matter of illegal betting websites collecting wagers.

Modern gambling-linked financial crime networks increasingly resemble structured digital enterprises with:

  • payment workflows,
  • operational hierarchies,
  • customer acquisition systems,
  • layered account ecosystems,
  • and dedicated laundering mechanisms.

That evolution changes the scale of risk.

Instead of isolated illicit transactions, financial institutions are now confronting criminal systems capable of processing large volumes of funds through interconnected digital channels.

And because many of these flows occur through legitimate banking infrastructure, detection becomes significantly more difficult.

ChatGPT Image May 18, 2026, 11_00_38 AM

Why Traditional Detection Models Struggle

One of the biggest operational problems in gambling-linked laundering is that many suspicious activities closely resemble normal transactional behaviour.

For example:

  • rapid deposits and withdrawals,
  • frequent transfers between accounts,
  • high transaction velocity,
  • and fragmented payments
    may all occur legitimately within digital gaming environments.

This creates substantial noise for compliance teams.

Traditional rules-based monitoring systems often struggle because:

  • thresholds may not be breached,
  • transaction values may appear routine,
  • and individual accounts may initially show limited risk indicators.

The suspicious behaviour often becomes visible only when viewed collectively across:

  • multiple accounts,
  • devices,
  • counterparties,
  • transaction patterns,
  • and behavioural relationships.

Increasingly, organised financial crime detection is becoming less about isolated alerts and more about understanding networks.

The Convergence of Gambling, Fraud, and Money Laundering

The Thailand case also reinforces a broader regional trend:
the convergence of multiple financial crime categories within the same ecosystem.

Online gambling networks today may overlap with:

  • mule-account recruitment,
  • cyber-enabled scams,
  • organised fraud,
  • illicit payment processing,
  • and cross-border laundering activity.

This convergence matters because criminal organisations rarely specialise narrowly anymore.

The same infrastructure used to process gambling proceeds may also support:

  • scam-related fund movement,
  • account abuse,
  • identity fraud,
  • or broader organised criminal activity.

For financial institutions, separating these risks into isolated categories can create dangerous blind spots.

The financial flows are increasingly interconnected.

Detection strategies must evolve accordingly.

What Financial Institutions Should Monitor

Cases like this highlight several important behavioural and transactional indicators institutions should monitor more closely.

Rapid pass-through activity

Accounts receiving and quickly redistributing funds across multiple beneficiaries.

Clusters of interconnected accounts

Multiple accounts sharing behavioural similarities, counterparties, devices, or transaction structures.

High-volume low-value transfers

Repeated fragmented payments designed to avoid scrutiny while moving significant aggregate value.

Frequent account rotation

Beneficiary accounts changing rapidly within short timeframes.

Unusual payment velocity

Transaction behaviour inconsistent with expected customer profiles.

Links between gambling-related transactions and broader suspicious activity

Connections between betting-related flows and potential scam, fraud, or mule-account indicators.

Individually, these signals may appear weak.

Together, they can reveal coordinated laundering ecosystems.

Why Financial Institutions Need More Connected Intelligence

The Thailand gambling case highlights why static AML controls are increasingly insufficient against organised digital financial crime.

Modern criminal ecosystems evolve quickly:

  • payment channels change,
  • laundering routes shift,
  • mule structures rotate,
  • and digital platforms adapt constantly.

This creates operational pressure on institutions still relying heavily on:

  • isolated transaction monitoring,
  • static rules,
  • manual investigations,
  • and fragmented fraud-AML workflows.

What institutions increasingly need is:

  • behavioural intelligence,
  • network visibility,
  • typology-driven monitoring,
  • and the ability to connect signals across fraud and AML environments simultaneously.

That is especially important in gambling-linked laundering because the suspicious behaviour often emerges gradually through relationships and coordinated movement rather than single anomalous transactions.

How Technology Can Help Detect Organised Gambling Networks

Advanced AML and fraud platforms are becoming increasingly important in identifying complex laundering ecosystems linked to online gambling.

Modern detection approaches combine:

  • behavioural analytics,
  • network intelligence,
  • entity resolution,
  • and typology-driven detection models
    to uncover hidden relationships within financial activity.

Platforms such as Tookitaki’s FinCense help institutions move beyond isolated transaction monitoring by combining:

  • AML and fraud convergence,
  • behavioural monitoring,
  • collaborative intelligence through the AFC Ecosystem,
  • and network-based detection approaches.

In scenarios involving gambling-linked laundering, this allows institutions to identify:

  • mule-account behaviour,
  • suspicious account clusters,
  • layered payment structures,
  • and coordinated fund movement patterns
    earlier and with greater operational context.

That visibility becomes critical when criminal ecosystems are specifically designed to appear operationally normal on the surface.

How Tookitaki Helps Institutions Detect Gambling-Linked Laundering Networks

Cases like the Thailand gambling investigation demonstrate why financial institutions increasingly need a more connected and intelligence-driven approach to financial crime detection.

Traditional monitoring systems are often designed to review transactions in isolation. But organised gambling-linked laundering networks operate across:

  • multiple accounts,
  • payment rails,
  • beneficiary relationships,
  • mule structures,
  • and layered transaction ecosystems simultaneously.

This makes fragmented detection increasingly ineffective.

Tookitaki’s FinCense platform helps financial institutions strengthen detection capabilities by combining:

  • AML and fraud convergence,
  • behavioural intelligence,
  • network-based risk detection,
  • and collaborative typology insights through the AFC Ecosystem.

In gambling-linked laundering scenarios, this allows institutions to identify:

  • suspicious account clusters,
  • rapid pass-through activity,
  • mule-account behaviour,
  • layered payment movement,
  • and hidden relationships across customers and counterparties
    more effectively and earlier in the risk lifecycle.

The AFC Ecosystem further strengthens this approach by enabling institutions to leverage continuously evolving typologies and real-world financial crime intelligence contributed by compliance and AML experts globally.

As organised financial crime becomes more interconnected and operationally sophisticated, institutions increasingly need detection systems capable of understanding not just transactions, but the broader ecosystems operating behind them.

The Bigger Picture: Online Gambling as Financial Infrastructure Abuse

The Thailand case reflects a broader regional and global shift in how organised crime uses digital infrastructure.

Online gambling platforms are increasingly functioning not merely as illicit entertainment channels, but as financial movement ecosystems capable of:

  • processing large transaction volumes,
  • redistributing illicit funds,
  • and integrating criminal proceeds into the legitimate economy.

That distinction matters.

Because the challenge for financial institutions is no longer simply identifying illegal gambling transactions.

It is understanding how legitimate financial systems can be systematically exploited to support broader criminal operations.

And increasingly, those operations are designed to blend into normal digital financial activity.

Final Thoughts

The massive online gambling and money laundering case uncovered in Thailand offers another clear reminder that organised financial crime is becoming more digital, more structured, and more operationally sophisticated.

What appears outwardly as illegal betting activity may actually involve:

  • coordinated laundering infrastructure,
  • mule-account ecosystems,
  • layered financial movement,
  • nominee structures,
  • and highly organised criminal coordination operating behind the scenes.

For financial institutions, this creates a difficult but increasingly important challenge.

The future of financial crime prevention will depend less on identifying isolated suspicious transactions and more on understanding hidden financial relationships, behavioural coordination, and evolving laundering typologies across interconnected payment ecosystems.

Because increasingly, organised financial crime does not look chaotic.

It looks operationally efficient.

The Gambling Empire: Inside Thailand’s Billion-Baht Online Betting and Money Laundering Network