
The Wolfsberg Group's second Statement on Effective Monitoring for Suspicious Activity (SARs/STRs)
27/08/2025
The Wolfsberg Group's second Statement on Effective Monitoring for Suspicious Activity, published in August 2025,
- Marks a significant evolution in how financial institutions are encouraged to approach anti-money laundering (AML) and suspicious activity monitoring (SAM).
- marks a significant shift towards a more sophisticated, technology-driven approach in combating financial crime.
- Encourages risk-based monitoring, enhancing analytical capabilities, embracing technological innovations like machine learning, and focusing on the effectiveness of monitoring programs, financial institutions can significantly improve their ability to detect and prevent illicit activities.
- Encourages the integration of ML and AI into monitoring systems, not only enhancing the detection capabilities but also ensuring that the fight against financial crime remains agile and effective in the face of evolving threats.
Here's a breakdown of the key insights and innovations from the statement:
Core Framework: Three Pillars of Responsible Innovation
The Wolfsberg Group introduces a new framework built on three foundational pillars:
- Transition and Validation
- Encourages financial institutions to move away from legacy systems and adopt modern, AI-driven platforms.
- Validating new systems should focus on net effectiveness, not just equivalence with older systems.
- Balancing Model Risk with Financial Crime Risk
- Institutions must weigh the risks of using complex models (e.g., AI/ML) against the potential benefits in detecting financial crime.
- Prioritising crystallised risk (real, observable threats) over theoretical risks is key.
- Explainability and Transparency
- Models must be interpretable to regulators and internal stakeholders.
- Transparency in how decisions are made is essential for trust and compliance.
Technology-Driven Monitoring: Moving Beyond Transactions
The Wolfsberg Group advocates for a broader concept called Monitoring for Suspicious Activity (MSA), which goes beyond traditional transaction monitoring:
- Customer behaviour and attributes are now central to risk detection.
- AI and ML tools can analyse patterns across customer profiles, transactions, and external data sources.
- Examples include:
- Graph network analysis to uncover hidden relationships.
- Entity resolution to unify data across accounts.
- Cluster analysis to detect behavioural anomalies.
Sandbox Testing Over Parallel Processing
Instead of running old and new systems side-by-side, Wolfsberg recommends sandbox testing:
- Allows banks to test new systems in a controlled environment.
- Reduces cost and complexity while encouraging innovation.
Measuring Effectiveness
The Wolfsberg Group emphasises quality over quantity in SAR/STR reporting:
- Effectiveness should be measured by how well systems detect actionable intelligence, not just the volume of reports.
- Feedback loops from regulators and investigations should inform model improvements.
AI and Machine Learning Integration
The statement strongly supports the use of AI/ML in SAM:
- Improved detection of complex patterns.
- Reduced false positives, saving time and resources.
- Dynamic customer segmentation for more precise monitoring.
- Continuous learning from past investigations to adapt to emerging threats.
Global Collaboration
The framework is informed by:
- Experiences of Wolfsberg member banks.
- Technical workshops with FIUs, policymakers, and regulators worldwide.
References
The Wolfsberg Group publishes its second Statement on Effective ...https://dev.wolfsberg-group.org/news/the-wolfsberg-group-publishes-its-second-statement-on-effective-monitoring-for-suspicious-activity
5 Takeaways from Wolfsberg Group on Monitoring for Suspicious ... - Hawk https://hawk.ai/news-press/5-takeaways-wolfsberg-group-guidance-monitoring-suspicious-activity
Effective STR/SAR Reporting by Wolfsberg Group | AML-CFT https://aml-cft.net/effective-suspicious-activity-reporting-by-wolfsburg-group/
The Team
Meet the team of industry experts behind Comsure
Find out moreLatest News
Keep up to date with the very latest news from Comsure
Find out moreGallery
View our latest imagery from our news and work
Find out moreContact
Think we can help you and your business? Chat to us today
Get In TouchNews Disclaimer
As well as owning and publishing Comsure's copyrighted works, Comsure wishes to use the copyright-protected works of others. To do so, Comsure is applying for exemptions in the UK copyright law. There are certain very specific situations where Comsure is permitted to do so without seeking permission from the owner. These exemptions are in the copyright sections of the Copyright, Designs and Patents Act 1988 (as amended)[www.gov.UK/government/publications/copyright-acts-and-related-laws]. Many situations allow for Comsure to apply for exemptions. These include 1] Non-commercial research and private study, 2] Criticism, review and reporting of current events, 3] the copying of works in any medium as long as the use is to illustrate a point. 4] no posting is for commercial purposes [payment]. (for a full list of exemptions, please read here www.gov.uk/guidance/exceptions-to-copyright]. Concerning the exceptions, Comsure will acknowledge the work of the source author by providing a link to the source material. Comsure claims no ownership of non-Comsure content. The non-Comsure articles posted on the Comsure website are deemed important, relevant, and newsworthy to a Comsure audience (e.g. regulated financial services and professional firms [DNFSBs]). Comsure does not wish to take any credit for the publication, and the publication can be read in full in its original form if you click the articles link that always accompanies the news item. Also, Comsure does not seek any payment for highlighting these important articles. If you want any article removed, Comsure will automatically do so on a reasonable request if you email info@comsuregroup.com.