You heard the headline. TD Bank agreed to pay roughly $3.09 billion to settle charges that its anti-money-laundering program had serious gaps. That payment, plus a multi-year monitorship and limits on growth, shows regulators will not accept weak programs anymore.
Regulators in the United States have pushed penalties higher. Recent reports show billions in enforcement activity, with large settlements drawing new attention to suspicious activity reporting and KYC checks. At the same time, crypto and fintech firms have faced over one billion dollars in AML fines as agencies focus on on-chain flows and weak verification. These trends mean that a small control weakness can become a major business problem fast.
• Data lives in separate places, so teams cannot join pieces and spot real threats.
• Fixed rules generate too many false alerts and drain investigation teams.
• SARs are often filed late or without full context, which invites regulator scrutiny.
Old systems rely mostly on hard rules and manual review. Add a modern layer that scores transactions based on behavior and extra context, and investigators get clearer, faster hints. Machines can do repetitive checks while people handle the tricky, judgment-heavy work. Start with a side-by-side test where the new scoring runs in shadow mode and you compare outcomes over a few months.
Think of what that side-by-side test shows. You can see which alerts the old system missed, and which alerts the new layer flagged that were harmless. With that evidence, you can tune cut-offs and reduce the daily noise that wears investigators down. That lower noise means faster case resolution and better quality in filings. It also gives you numbers to show examiners that changes are working, not just hopeful claims.
• Put identity, payment, and sanctions data into one live feed so you can spot risk before money moves.
• Use a hybrid model: hard rules for clear blocks and a risk score for cases that need review.
• Auto-populate SAR drafts with evidence so filings are quicker and more useful.

Treat KYC as something you update over time, not just at onboarding. For higher-risk clients, run periodic checks and trigger extra verification when transaction patterns look different. For businesses, automate checks against public ownership registries so beneficial owners are not a mystery. For customers tied to crypto, add on-chain history and wallet-origin checks before allowing big moves. These changes cut down unknowns for investigators and make reports clearer and faster.
Map your controls to well-known standards and keep tidy proof of what you checked and why. Run independent model reviews on a regular schedule and keep a simple remediation timeline you can show to regulators. When examiners ask for evidence, hand them clear folders that explain actions, dates, and owners. That clarity shortens reviews and reduces the chance of bigger penalties.
A few practical moves help a lot. Make an owner for each control and record when checks happen, who reviewed the results, and what follow-up was done. Keep a short executive summary for each remediation project so your board can see progress without wading into technical details. These small steps improve trust and reduce back-and-forth with examiners.
Think in layers: intake, enrichment, scoring, investigation workspace, audit trail. Use small, tested models for scoring and a separate tool to build prompt chains that create clear investigation summaries and SAR drafts. Prompt Sapper and similar tools show how teams can compose repeatable AI chains that add consistent context to alerts. Start small and widen the scope after proof.
To picture an alert life-cycle, imagine a high-value wire. The intake layer tags the sender, receiver, and any linked accounts. Enrichment adds sanctions, PEP checks, and recent transaction patterns. Scoring applies a numeric risk value and assigns to an investigator. The investigator sees an auto-crafted summary that points to what to check first. Everything is logged so a reviewer can trace each decision.
Lay out the one-time cost to fix KYC gaps and the ongoing cost to keep monitorship paperwork tidy against the possible impact of a major fine. Boards understand clear math. Show them a scenario with numbers and include the expected time to close high-risk gaps. Numbers help get budgets approved faster.
Include clear metrics for the board. Show expected reductions in false positives, the drop in investigator hours, and the likely improvement in SAR timeliness. Put these figures in a single slide so the board can see the business case at a glance. Concrete numbers beat vague promises and make it easier to get buy-in for the work that truly matters.
• Run a 90-day shadow pilot where your current system stays live and the new scoring runs alongside.
• Measure alert volumes, investigator minutes per alert, and the completeness of SARs.
• If the new layer reduces work and raises report quality, scale up; if not, fix the data inputs and try again.
Author note
This piece comes from someone who has spent years dealing with regulators and advising teams on program fixes. The aim here is simple: point out the problems that lead to big penalties and offer small, testable steps that reduce the odds of a costly enforcement outcome.
If you want an expert review that shows where your biggest gaps live and how to start closing them, head to the iRM Contact Us page. A brief conversation can alter how your board perceives AML risk and make your next regulatory meeting much less daunting.