How to Assess False Positives in AML Transaction Monitoring
If you work in financial crime compliance, you already know the uncomfortable truth: most of the alerts that hit your queue every day are not actually suspicious. Industry estimates put the false positive rate for transaction monitoring systems somewhere between 90 and 99 percent, with the median sitting around 95. That means for every twenty alerts your team works, roughly nineteen will close as no further action.
This is not a sign that your system is broken. Conservative tuning is intentional. The cost of missing a genuine money laundering case, in fines, reputational damage, and regulatory consequences, is far higher than the cost of working through low-quality alerts. But that does not mean you have to accept the noise. A disciplined triage approach lets you clear false positives quickly, document your reasoning defensibly, and free up time for the alerts that actually matter.
What Counts as a False Positive?
A false positive is an alert that, after investigation, does not warrant escalation, enhanced due diligence, or a Suspicious Activity Report. The activity is unusual enough to trigger a rule but, when reviewed in context, has a clear and legitimate explanation. A retiree receiving an inheritance is not laundering money. A small business owner who suddenly deposits the proceeds of selling a vehicle is not structuring. A frequent traveler making purchases in three currencies in a week is not layering.
The work of triage is to separate these from the alerts that look the same on the surface but conceal something real underneath.
Why False Positives Happen
Most false positives can be traced to one of a small number of causes. Understanding which cause is driving your noise is the first step to reducing it.
Rule thresholds set too low. Velocity rules, cash deposit thresholds, and round-amount triggers fire on legitimate behavior when calibrated too aggressively. A rule that flags any cash deposit over 7,500 will catch a lot of plumbers and farmers along with the structurers.
Stale customer profiles. If your monitoring system compares activity to a profile built at onboarding three years ago, every life event, a new job, marriage, inheritance, business expansion, will look like anomalous behavior.
Missing peer group context. Generic rules treat a corner store and a regional distributor identically. Peer-group benchmarking, where activity is compared to similar customers in the same industry and geography, dramatically reduces noise.
Single-rule alerts without correlation. One unusual transaction is rarely suspicious on its own. Alerts that combine multiple weak signals tend to be higher quality than alerts that fire on a single threshold breach.
A Structured Triage Workflow
The fastest way to clear a false positive defensibly is to follow the same five-step workflow on every alert. Consistency matters as much as speed, because regulators reviewing your closure decisions years later need to see that you applied the same rigor across the queue.
Step 1: Read the alert and rule logic. Before opening the customer file, understand exactly what tripped the alert. Was it a velocity rule, a structuring rule, a sanctions name match, a high-risk geography flag? The rule logic tells you what hypothesis you are testing.
Step 2: Check the customer profile. Compare the alerting activity to what you already know about the customer. Industry, expected transaction volume, source of funds, geographic footprint, and prior alerts all give you context. A 50,000 wire from a corporate treasury account is unremarkable. The same wire from a college student is not.
Step 3: Look at the surrounding activity. One transaction in isolation tells you almost nothing. Pull at least 30 to 90 days of account activity around the alert date. Patterns become clear in context: is this a one-off or part of a pattern, are the counterparties consistent, is there a credible business narrative connecting the transactions?
Step 4: Apply the four corroboration questions. For every alert, ask: does the activity make economic sense for this customer; does the counterparty fit the customer's known network; is the timing consistent with the customer's life and business cycle; and is there any known adverse information about the customer or counterparty? If you can answer yes to the first three and no to the fourth, you almost certainly have a false positive.
Step 5: Document and close. Write a closure rationale that another investigator could read in two years and understand exactly what you did and why you concluded as you did. The shorter the rationale, the more disciplined it must be: state the alert, state the explanation, state the evidence, state the decision.
When a False Positive Is Not Actually False
The trap in any high-volume alert queue is closure pressure. When you have 80 alerts to clear by end of day, the temptation to wave through anything that looks vaguely explainable is real. The best safeguard against this is a personal rule: if you find yourself reaching for an explanation, slow down.
Genuine red flags often hide behind plausible cover stories. Coached customers give consistent narratives. Mule accounts have explanations for the funds passing through. Trade-based laundering looks like ordinary commerce until you compare invoice values to actual goods.
If something feels off but the surface explanation seems reasonable, escalate the alert to a more experienced reviewer or hold it for a second look. Documentation of a hold-and-review decision is itself defensible evidence of good triage practice.
Reducing False Positives at the Source
Triage is downstream work. The more leverage is upstream, in tuning the rules themselves. Most institutions can cut their false positive rate by a third or more through three changes: introducing peer-group benchmarking instead of fixed thresholds, layering correlated rules so that a single weak signal does not generate an alert on its own, and refreshing customer risk profiles annually rather than relying on onboarding data.
Done well, tuning is not a one-off project. It is a quarterly discipline of reviewing closure rationales, identifying the rules that produce the most no-action closures, and adjusting thresholds, peer groups, or correlation logic to suppress predictable noise.
The Bottom Line
False positives are an unavoidable feature of any conservative monitoring program, but they do not have to consume your team's capacity. A consistent triage workflow, a habit of asking the four corroboration questions, and quarterly tuning at the rule level will let you clear noise quickly while keeping your eye on the alerts that genuinely matter.
If you want a structured prompt to test an alert against a defensible set of red flags, run it through the Red Flag Check tool or use the LOD 1 alert triage workflow built into the assessment engine.
Related typology: False positive rates depend heavily on the typology being detected. For a structured reference covering each typology's detection logic, see the AML typology library.