Berlin Tech Meetup: The Future of Relational Foundation Models, Systems, and Real-World Applications

Register now:
Learn14 min read

What Tools Can Detect Money Laundering Patterns in Transaction Data?

Money laundering is a graph problem. Layering, structuring, shell company networks, trade-based laundering: every technique depends on connections between accounts and entities. Here are the five categories of detection tools, what each one actually catches, and where graph ML closes the gap.

TL;DR

  • 1Five tool categories detect money laundering: rule-based systems (NICE Actimize, SAS AML), statistical anomaly detection, graph analytics (Quantexa, TigerGraph), ML on flat tables (Feedzai, DataVisor), and graph ML / relational foundation models (KumoRFM).
  • 2Every major laundering technique is a graph pattern. Layering moves funds through chains of accounts. Structuring splits deposits across linked accounts. Shell companies route money through webs of corporate entities. The signal is in the connections, not in any single transaction row.
  • 3Rule-based systems produce high false positive rates because they evaluate transactions in isolation. Graph-based ML significantly reduces false positives by reading the network context around each transaction.
  • 4On the SAP SALT enterprise benchmark, KumoRFM achieves 91% accuracy vs 75% for PhD data scientists with XGBoost and 63% for LLM+AutoML. The gap is driven by relational patterns that flat feature tables structurally cannot capture.
  • 5KumoRFM reads the full transaction-account-entity-beneficiary graph natively, tracing laundering patterns 6-7 hops deep without manual graph construction or feature engineering.

If you work in financial crime compliance, you already know the problem: your rule-based AML system generates thousands of alerts per day, 95% of them are false positives, and your investigators spend most of their time clearing noise instead of catching actual laundering. The tools exist to do better. But the landscape is confusing, and most vendor comparisons skip the technical details that actually matter.

Here is the practical breakdown. Five categories of tools detect money laundering patterns in transaction data. Each one has a specific strength and a specific blind spot. Understanding the categories matters more than memorizing vendor names, because the category determines what types of laundering the tool can structurally detect.

The five categories of AML detection tools

Not all AML tools work the same way. The detection approach determines which laundering patterns the tool can catch and which ones it will miss entirely.

1. Rule-based transaction monitoring systems

These are the incumbent tools at most banks: NICE Actimize, SAS AML, Oracle Financial Crime, Norkom. They work by matching transactions against predefined scenarios: amounts above thresholds, transfers to high-risk jurisdictions, velocity spikes, known typology patterns. They are effective for regulatory compliance (CTR filing, OFAC screening) and for catching known laundering patterns.

  • Best for: Regulatory compliance (CTR filing, OFAC screening) and catching known, well-documented laundering typologies.
  • Watch out for: 95%+ false positive rates. Cannot detect novel patterns. Evaluates transactions in isolation with no network context.

2. Statistical anomaly detection

These tools build baseline behavioral profiles for accounts and flag deviations: unusual transaction volumes, unexpected counterparties, sudden changes in transaction patterns. They catch behavioral shifts that rules miss, like an account that gradually increases its transaction volume over months before a large outflow.

  • Best for: Detecting gradual behavioral changes and unusual counterparty patterns that rules with fixed thresholds miss.
  • Watch out for: Evaluates accounts individually. Cannot see coordinated behavioral shifts across 30 accounts controlled by the same laundering network.

3. Graph analytics platforms

Quantexa, TigerGraph, Neo4j, and similar tools build entity resolution graphs that connect accounts, individuals, businesses, and addresses. They visualize networks and compute graph metrics (centrality, community detection, path analysis). Investigators use them to explore connections manually. The strength is visibility: analysts can see that Account A connects to Shell Company B through Entity C.

  • Best for: Investigation workflow, entity resolution, and building visual evidence for SARs and case management.
  • Watch out for: Requires manual investigation. The platform shows you the graph; a human still has to decide what is suspicious. At scale, this creates a bottleneck.

4. ML on flat tables

Feedzai, DataVisor, Hawk.ai, and similar vendors apply supervised ML (typically gradient boosted trees or deep learning) to transaction features: amount, time, counterparty risk score, velocity aggregates. They outperform rules on known fraud patterns and generalize better to variations.

  • Best for: Real-time transaction scoring at payment processors. Generalizes better than rules to pattern variations.
  • Watch out for: Flat table input (one row per transaction). Layering chains, shell company webs, and coordinated structuring rings are invisible because the model cannot see connections between accounts.

5. Graph ML and relational foundation models

This category reads the full transaction-account-entity graph natively. Instead of flattening relationships into per-row features, graph ML models propagate signals across the network, detecting laundering patterns based on the structure of connections. KumoRFM is a relational foundation model in this category: it reads raw relational tables (accounts, transactions, entities, beneficiaries) and automatically discovers predictive patterns across all connected tables, including multi-hop laundering chains 6-7 hops deep. No graph construction, no feature engineering, no manual investigation bottleneck.

  • Best for: Layering chains, structuring rings, shell company networks, trade-based laundering, and any pattern that spans multiple entities and hops.
  • Watch out for: Does not replace rule-based systems for regulatory compliance. Regulators still require deterministic rules for CTR filing and OFAC screening. Graph ML augments, not replaces.

Why money laundering is a graph problem

This is the key insight that separates effective AML tools from expensive noise generators. Every major money laundering technique is a pattern in the connections between entities, not a property of any individual transaction.

money_laundering_patterns_graph_structure

laundering_techniquehow_it_worksgraph_patternvisible_in_flat_table
LayeringMoves funds through chains of intermediary accounts to obscure originSequential chain: A -> B -> C -> D -> E with rapid pass-through timingNo - each leg looks like a normal transfer
Structuring / SmurfingSplits large amounts into smaller deposits across multiple accounts to avoid reporting thresholdsFan-out from source to multiple deposit accounts, all below $10KPartially - individual deposits flagged but network coordination invisible
Shell company networksRoutes funds through webs of corporate entities with obscured ownershipComplex web of entity-to-entity transfers with shared directors/addressesNo - each company-to-company transfer looks legitimate
Trade-based launderingOver/under-invoicing goods between colluding businesses to move valueInvoice network between related businesses with price anomalies vs marketNo - requires cross-entity invoice comparison
Money mule recruitmentRecruits individuals to receive and forward illicit fundsHub-and-spoke: central account distributes to multiple mules who forward to collection pointPartially - velocity flags on mule accounts but network structure invisible
Round-trippingSends funds through a circuit of accounts back to originator to create appearance of legitimate incomeCircular flow: A -> B -> C -> D -> A with timing delays at each hopNo - circular path only visible in graph

Every major laundering technique produces a pattern in the graph of connections between entities. Flat-table tools see individual transactions. Graph-based tools see the structure.

Tool comparison: what each vendor actually does

Here is a direct comparison of major AML detection tools across the dimensions that matter for laundering pattern detection.

aml_tool_comparison

toolcategorydetection_approachnetwork_analysisfalse_positive_reductionbest_for
NICE ActimizeRule-basedScenario matching against predefined typologiesLimited - some link analysis add-onsLow - 95%+ false positive rate typicalRegulatory compliance, known typologies
SAS AMLRule-based + analyticsRules plus statistical models on transaction featuresBasic network visualizationModerate - statistical models improve over rules aloneLarge banks with existing SAS infrastructure
QuantexaGraph analyticsEntity resolution + network visualization for investigatorsStrong - builds entity graphs, computes network metricsModerate - better context for analysts reduces manual false positivesInvestigation workflow, entity resolution
FeedzaiML on flat tablesSupervised ML on transaction features, real-time scoringLimited - some graph features can be manually addedGood for known patterns - ML generalizes better than rulesReal-time transaction scoring at payment processors
DataVisorML on flat tablesUnsupervised + supervised ML on transaction and account featuresLimited - detects account clusters but not deep network patternsGood for account-level fraud, limited on network launderingAccount-level fraud detection, new account screening
Hawk.aiML on flat tablesML-augmented transaction monitoring, reduces alert noiseBasic - focuses on transaction-level scoringGood - ML layer on top of rules reduces false positives by 30-50%Mid-market banks looking to reduce alert volumes
KumoRFMGraph ML / relational foundation modelReads raw relational tables, discovers patterns across full entity graphNative - reads transaction-account-entity-beneficiary graph 6-7 hops deepStrong - graph context eliminates alerts that lack network evidenceLayering, structuring rings, shell company networks, trade-based laundering

Comparison across 7 major AML tools. Rule-based systems handle compliance. Flat-table ML improves on rules. Graph ML catches the network-based laundering patterns that other categories miss.

How layering actually works, and why most tools miss it

Layering is the most common sophisticated laundering technique. A criminal moves illicit funds through a series of intermediary accounts, each transfer creating more distance from the original source. By the time the money reaches its destination, it has passed through 4-7 different accounts, possibly across multiple jurisdictions and currencies.

Each individual transfer in a layering chain looks normal. The amounts are not unusual. The counterparties are not on any watchlist. The timing is not suspicious in isolation. A rule-based system sees each leg independently and has no reason to flag it. A flat-table ML model scores each transaction on its own features and reaches the same conclusion: not suspicious.

A graph ML model sees the full chain. It reads that Account A received a large inflow from a high-risk jurisdiction, then sent funds to Account B within 2 hours, B forwarded to C within 4 hours, C split to D and E, and D sent to a cryptocurrency exchange. Each individual transaction was unremarkable. The chain pattern, with rapid pass-through timing and increasing account distance from the source, is the signal. Only a model that reads the graph can see it.

Structuring and smurfing: the coordination problem

Structuring (also called smurfing) involves splitting a large sum into smaller deposits, each below the $10,000 Currency Transaction Report threshold. A single deposit of $9,500 at one bank branch is not suspicious. But 30 deposits of $9,500 across 15 accounts at 8 bank branches within a week, all connected through shared addresses or phone numbers, is textbook structuring.

Rule-based systems catch the obvious cases: the same person making multiple just-below-threshold deposits at the same branch on the same day. They miss the coordinated cases where different people (sometimes recruited mules) make deposits at different branches using different accounts that share non-obvious connections.

The graph reveals what the rules cannot: these 15 accounts share 3 phone numbers, 2 mailing addresses, and were all opened within the same 60-day window. The deposits follow a pattern: each mule deposits at 2-3 branches in a rotation. The graph ML model sees this cluster and the coordinated deposit pattern. The rule-based system sees 30 individual deposits that each look fine on their own.

Shell company networks: where graph ML has the biggest edge

Shell company laundering is the hardest technique for non-graph tools to detect. Money moves through a web of corporate entities with layered ownership, nominee directors, and registered addresses in multiple jurisdictions. Each entity-to-entity transfer is documented as a legitimate business transaction: consulting fees, licensing payments, intercompany loans.

Graph ML traces the ownership connections (shared directors, shared addresses, shared formation agents), the transaction flows between entities, and the timing patterns that indicate coordinated movement rather than legitimate business activity. It can identify that 12 companies in 4 countries share 2 directors and a formation agent, and that funds flow through them in a pattern consistent with layering rather than genuine commercial activity.

Traditional AML detection

  • Rule-based alerts: flag transactions above thresholds, to high-risk jurisdictions, matching known typologies
  • 95%+ false positive rate - investigators drown in noise
  • Each transaction evaluated in isolation - no network context
  • ML on flat tables improves accuracy but still blind to multi-hop patterns
  • Graph analytics require manual investigation - analysts explore networks one at a time
  • Layering, structuring rings, shell company webs go undetected until reported externally

Graph ML AML detection (KumoRFM)

  • Reads full transaction-account-entity-beneficiary graph natively
  • Traces laundering patterns 6-7 hops deep automatically
  • Evaluates each transaction in context of its network neighborhood
  • Catches layering chains, structuring rings, shell company webs, round-tripping
  • No graph construction, no feature engineering, no manual investigation bottleneck
  • Significantly reduces false positives by distinguishing legitimate high-activity accounts from laundering structures

PQL Query

PREDICT is_suspicious
FOR EACH transactions.transaction_id
WHERE transactions.amount > 1000

One PQL query replaces the full AML detection pipeline: rule configuration, feature engineering, graph construction, and model training. KumoRFM reads raw accounts, transactions, entities, and beneficiary tables directly and discovers laundering patterns across the full entity network.

Output

transaction_idsuspicious_prob_kumosuspicious_prob_rulesnetwork_evidence
TXN-442010.920.10Part of 5-hop layering chain from high-risk jurisdiction
TXN-442020.870.65Structuring ring: 12 accounts, 3 shared phone numbers, coordinated deposits
TXN-442030.780.05Shell company web: 4 entities share 2 directors, round-trip flow detected
TXN-442040.030.72Rules flag high amount but graph shows legitimate supplier payment pattern

Building a layered AML detection architecture

No single tool handles all AML requirements. Regulators expect rule-based monitoring for specific scenarios. Investigators need graph visualization for case management. And the laundering patterns that actually cause financial losses require graph ML to detect. Here is how the layers fit together:

  1. Layer 1: Regulatory compliance rules. Keep NICE Actimize, SAS AML, or your existing rule-based system for CTR filing, OFAC screening, and mandated scenario-based monitoring. These are non-negotiable regulatory requirements.
  2. Layer 2: ML-based alert prioritization. Add an ML scoring layer (Feedzai, Hawk.ai, or similar) to prioritize rule-generated alerts and reduce the 95% false positive burden on investigators. This typically cuts alert volumes by 30-50%.
  3. Layer 3: Graph ML for network-based detection. Deploy KumoRFM or equivalent graph ML to detect laundering patterns that rules and flat-table ML structurally cannot see: layering chains, structuring rings, shell company networks, trade-based laundering. This is where the highest-value catches happen because these patterns represent the most sophisticated and highest-volume laundering operations.
  4. Layer 4: Investigation and case management. Use graph analytics (Quantexa, TigerGraph) for investigator workflow: visualizing entity networks, documenting connections, building cases for SARs filing. Graph ML provides the initial detection; graph analytics supports the human investigation.

The benchmark evidence

AML detection tasks share the same data structure as other enterprise prediction problems: multiple related tables (accounts, transactions, entities, jurisdictions) where the predictive signal lives in the relationships between tables. The benchmarks that test multi-table prediction directly measure AML-relevant capability.

sap_salt_benchmark_aml_relevant

approachaccuracywhat_it_means_for_aml
LLM + AutoML63%Language model generates features from table descriptions, AutoML selects model. Misses relational patterns entirely.
PhD Data Scientist + XGBoost75%Expert manually engineers cross-table features for weeks. Captures some relational signal but limited to 1-2 hops.
KumoRFM (zero-shot)91%Reads relational tables directly. Discovers multi-hop patterns automatically. No feature engineering required.

SAP SALT benchmark: KumoRFM outperforms expert-tuned XGBoost by 16 percentage points on multi-table prediction tasks. The 91% vs 75% gap comes from relational patterns that flat feature tables structurally cannot contain.

relbench_benchmark_aml

approachAUROCfeature_engineering_time
LightGBM + manual features62.4412.3 hours per task
KumoRFM zero-shot76.71~1 second
KumoRFM fine-tuned81.14Minutes

RelBench benchmark across 7 databases and 30 tasks: KumoRFM zero-shot outperforms manually engineered LightGBM by 14+ AUROC points. Fine-tuning pushes the gap to nearly 19 points.

Frequently asked questions

What tools can detect money laundering patterns in transaction data?

Five categories of tools detect money laundering: (1) Rule-based systems like NICE Actimize and SAS AML that flag transactions matching predefined scenarios, (2) Statistical anomaly detection that identifies deviations from baseline behavior, (3) Graph analytics platforms like Quantexa and TigerGraph that map entity networks, (4) ML on flat tables from vendors like Feedzai and DataVisor that score individual transactions with supervised models, and (5) Graph ML and relational foundation models like KumoRFM that read the full transaction-account-entity-beneficiary graph natively and trace laundering patterns 6-7 hops deep. The most effective approach combines multiple categories, with graph ML providing the strongest detection of layering, structuring, and shell company networks.

Why is money laundering a graph problem?

Every major money laundering technique depends on relationships between entities, not properties of individual transactions. Layering moves funds through chains of accounts to obscure origin. Structuring splits deposits across multiple accounts to stay below reporting thresholds. Shell company networks route money through webs of corporate entities. Trade-based laundering uses invoice manipulation between connected businesses. In every case, the laundering signal is in the connections between accounts, entities, and transactions. A flat table with one row per transaction cannot represent these connection patterns. A graph can.

How does graph ML detect layering in money laundering?

Layering involves moving illicit funds through multiple accounts or entities to create distance from the original source. A graph ML model reads the full chain: Account A sends to B, B splits to C and D, C sends to E through a shell company, E converts to a different currency. The model traces these paths 6-7 hops deep and identifies patterns consistent with layering, such as rapid pass-through transactions, fan-out/fan-in structures, and circular flows. Rule-based systems can only flag individual legs of the chain. Graph ML sees the entire structure at once.

What is the difference between NICE Actimize and graph-based AML tools?

NICE Actimize is a rule-based transaction monitoring system. It flags transactions that match predefined scenarios: amounts above thresholds, transfers to high-risk jurisdictions, velocity spikes. It is effective for known laundering patterns but generates high false positive rates (often 95%+) and cannot detect novel patterns. Graph-based AML tools like Quantexa or KumoRFM model the network of relationships between accounts, entities, and transactions. They detect laundering patterns based on network structure, not just transaction attributes. This catches layering chains, shell company networks, and structuring rings that rule-based systems miss.

How does KumoRFM detect money laundering?

KumoRFM is a relational foundation model that reads raw relational tables directly: accounts, transactions, entities, beneficiaries, jurisdictions. You write a PQL query like PREDICT is_suspicious FOR EACH transactions.transaction_id, and the model automatically discovers predictive patterns across all connected tables. This includes both single-transaction signals (amount, timing, jurisdiction) and multi-hop network signals (layering chains, structuring patterns across accounts, shell company ownership webs). On the SAP SALT enterprise benchmark, KumoRFM achieves 91% accuracy vs 75% for PhD data scientists with XGBoost, with the gap driven by relational patterns that flat feature tables cannot represent.

Can ML replace rule-based AML systems?

Not entirely, and regulators do not expect it to. Rule-based systems are still required for regulatory compliance because they produce deterministic, auditable outputs for specific scenarios mandated by regulators (CTR filing for transactions over $10,000, OFAC screening, etc.). ML augments rule-based systems by catching the laundering patterns that rules miss, especially novel techniques and network-based patterns. The practical architecture is layered: rules for regulatory compliance and known scenarios, ML for pattern detection and risk scoring, graph ML for network-based laundering patterns. KumoRFM fits into layer three, providing graph-based detection that reads the transaction network natively.

Why do rule-based AML systems have such high false positive rates?

Rule-based AML systems are known for high false positive rates because they flag transactions based on simple thresholds and scenarios without understanding context. A $9,500 deposit triggers a structuring alert whether the depositor is a known money launderer or a small business owner making a routine deposit. The rules cannot consider the broader network context: is this account connected to suspicious entities? Does the transaction fit a laundering chain? Is the pattern consistent with legitimate business activity? Graph-based ML can cut false positive rates dramatically because it evaluates each transaction in the context of its network neighborhood, distinguishing legitimate high-activity accounts from actual laundering structures.

What money laundering patterns are hardest to detect?

Trade-based money laundering (TBML) and professional money laundering networks are the hardest to detect. TBML uses over- or under-invoicing of goods between colluding businesses to move value across borders. It looks like legitimate trade on a per-transaction basis. Detection requires analyzing invoice patterns across networks of related businesses, comparing declared values against market prices, and tracing the flow of goods and payments through multiple jurisdictions. Professional laundering networks use layered combinations of techniques: structuring through multiple accounts, layering through shell companies, and integration through real estate or business investments. These multi-technique, multi-hop patterns are nearly impossible for rule-based systems and require graph-based analysis to detect.

See it in action

KumoRFM delivers predictions on relational data in seconds. No feature engineering, no ML pipelines. Try it free.