AML Skip to content
Get smarter signals. Make sharper moves.
Discover next-generation geolocation intelligence.
Transparent hero AML

Continuous behavioural monitoring is the
future of AML


Look beyond “who are you?” to answer
“are you still who you say you are?”


We partner with GeoComply’s Senior Fraud and Risk expert, Nick Imperillo, to explore how continuous behavioural monitoring for AML compliance enables a more effective, risk-based approach to detecting money laundering, sanctions exposure, and post-onboarding fraud.

AML is a moving target.

Rigorous financial monitoring, sanctions, and PEP screening do a great job at barring the doors. Which means criminals are now forced to get creative.

They’re finding ways around the existing defenses, often using legitimate entry points.

This includes:

  • The use of synthetic and stolen identities at onboarding
  • Buying aged accounts off of legitimate users (typically sourced from individuals motivated by short-term financial gain or economically challenging circumstances)
  • Account takeover
  • Collusion across accounts

Silo’d fraud tools often fail to flag these nuanced attacks. And even if they do catch a whiff of money laundering behaviour, the signals are too weak.

Nick Imperillo, Senior Fraud and Risk expert at GeoComply, points out the challenges: “Businesses need explainable, substantiated decisions. Regulators expect evidence that demonstrates why an account was trusted, when risk emerged, and what action was taken. Point-in-time checks fail to deliver on all fronts.”

Key takeaways you’re about to discover:

  • Traditional AML controls focus on identity at onboarding, but modern financial crime often occurs after accounts are established.
  • Behavioural AML monitoring uses location, device, and transaction patterns to establish a framework of “normal” over time, and detect emerging risk if behaviour becomes inconsistent later on in the journey.
  • Continuous, event-based verification provides stronger audit trails and supports sanctions and PEP compliance.
  • Risk-based escalation ensures legitimate users experience minimal friction while suspicious activity receives appropriate scrutiny.

Liveness checks aren’t a comprehensive defense

Today’s approach: “Throw some friction in there!”

This section explains why point-in-time identity verification fails to detect post-onboarding money laundering and account misuse.

Historically, AML programs assumed that risk could be addressed primarily at onboarding and through periodic review. This only addresses the first half of the question—“who are you?”.

And the answer costs a lot of friction.

“Liveness checks alone are flawed. They’re expensive. They’re annoying for legitimate users. And they’re easily bypassed by sophisticated criminals,” Nick says.

This single, point-in-time method of verification:

  • Doesn’t provide ongoing monitoring
    • Could be a legitimate person who later sells their account to a mule
    • Could be someone who starts off in a permitted region and later moves to a sanctioned area
  • Can’t detect ATO
    • Could be someone whose credentials were hacked or stolen long after account creation
  • Doesn’t show where the account creator is actually located
    • Could be using VPN to hide true location in a sanctioned country
    • Could seem legitimate but is actually in a PEP high-risk hotspot, such as an embassy
  • Can’t pick up on suspicious devices or manipulation
    • Could be running fraud tools in the background, such as emulators, bots, or RDPs
  • Is vulnerable to AI-generated imagery, deepfakes, and synthetic IDs

Looking for risk after the fact can be like searching for a needle in a haystack. To keep up with today’s criminals, organizations must build upon one-time checks towards behavioural AML monitoring that taps into continuous, human-centered evidence.

Behavioural changes are a key AML signal

The question isn’t just “can you be trusted?” but “can you still be trusted?”

This section explores how behavioural monitoring enables earlier detection of AML risk by identifying deviations from established user patterns over time.

Behavioural signals offer something static checks cannot: repeatable, time-stamped evidence.

Changes in location, device usage, transaction patterns, and account behaviour create objective indicators that can be tracked, reviewed, and tied directly to AML compliance frameworks, to support decisions and outcomes.

As Nick points out, “this transforms AML monitoring from reactive investigation into ongoing, evidence-based risk assessment.”

GeoComply’s approach: Continuous context

Start with “normal” to see “suspicious”

We start by establishing a baseline for trust—building up a Trusted Profile based on what “normal” looks like for each unique user across their typical locations, devices, and actions.

Nick connects this back to user signals: “the red flags for money laundering are rooted in behavioural changes—an unusual deposit, activity from a high-risk location, an unexpected account change.”

When something changes within a user’s typical pattern—account access at a new location, a login from a new device, or unusual account behaviour—organizations can trigger step-up verification or deeper investigation.

This provides real-time, behavioural AML monitoring based on signals that repeatedly confirm who someone is—or isn’t.

What is a Trusted Profile?

A Trusted Profile is unique for each user.

Put simply, “it represents what their “normal” behaviour looks like, based on established location, device, and activity patterns,” Nick explains.

It is continuously evaluated and can be escalated or re-established as risk indicators emerge.

How does GeoComply’s Trusted Profile work?

Set the baseline, monitor for anomalies

This section outlines a lifecycle-based AML framework that establishes baseline trust and responds dynamically to emerging risk.

Step 1: Robust KYC foundation

Identity is established at account creation through:

  • ID validation with liveness detection
  • Cross-reference against data sources
  • Address verification
  • Affordability checks/demographic validation
  • Geolocation and device checks

This provides an immediate picture of trust. Any flags, such as high-risk location or a device that might have been tampered with, will trigger further step-up verification or investigation.

This helps to prevent things like:

  • Underage account creation
  • Access from sanctioned region or high-risk location
  • Identity fraud

Step 2: Continuous, frictionless authentication

We trigger event-based monitoring during high-value events, such as account funding, transfer, and withdrawal, building patterns over time. This includes:

  • Seamless geolocation verification: Consistent activity at the same places (home, work, commute, travel patterns unique to the individual)
  • Seamless trusted device verification: Consistently active on the same devices, with no indicators of attempted device manipulation
  • Account activity patterns: Consistent transactional behaviour and timing
  • Transaction patterns: Funding and payout events follow the same rhythms
  • Verified network integrity: Not active on VPN or proxy, or attempting to spoof location
  • Account stability: No unexpected changes to contact info, banking details, or security settings

Step 3: User receives “Trusted Profile” status

After establishing strong behavioural patterns across location, device, and activity, users establish Trusted Profiles.

This is a threshold that organizations can set, based on their risk tolerance.

If something happens that’s inconsistent with the user’s established behaviour, such as activity at a new location or a login from a jailbroken device, you can take proportional, risk-appropriate action:

  • Block high-risk transactions
  • Trigger enhanced KYC
  • Conduct a manual review or risk assessment

Trusted Profile status also allows you to improve upon traditional MFA methods.

“One-time passwords or SMS codes create friction and are increasingly vulnerable to social engineering, SIM-swap attacks, and credential compromise,” Nick points out.

Instead, you can use behavioural and location-based verification, passively and persistently, to confirm a user is active within their trusted parameters. If not, trigger the step-up.

This behavioural-based monitoring helps to prevent:

  • ATO
  • PEP-related risk exposure
  • Identity theft

Spotting AML through behavioural monitoring

When “Trusted” becomes “suspicious”

Users who maintain a Trusted Profile enjoy a frictionless experience. In the meantime, we monitor for behavioural changes that might be indicative of money laundering.

Common behavioural AML indicators include:

  • Activity in sanctioned jurisdictions or high-risk areas (in accordance with FATF recommendations): We go beyond name-based screening to confirm a user is not operating from a restricted or high-risk area.
  • Location-based PEP risk assessment: We monitor for high-risk locations that may indicate PEP activity, such as government buildings, embassies, diplomatic quarters, official travel corridors, and movement that’s consistent with political travel.
  • Impossible travel: We flag account access patterns that are geographically impossible, such as a 2pm deposit in Madrid followed by a 2:15pm withdrawal from Dubai.
  • Inconsistent location activity: We flag when a user is active at a location that differs from their established patterns, or if they show evidence of using a VPN/proxy or location spoofing attempt.
  • Inconsistent device activity: We flag when a user is active on a new device or a device that shows evidence of containing fraudulent tools (such as emulators, RDPs, and RTAs).
  • Inconsistent behaviour: Flag failed login attempts, rapid deposits and withdrawals, or when a wager, deposit, or withdrawal falls outside of established account activity.
  • Unexpected account changes: Look closer at sudden changes to banking details, login credentials, address, or security settings.

Risk thresholds, restricted jurisdictions, and escalation rules are configurable by the organization and can be aligned with regulatory expectations. GeoComply provides intelligence signals and enforcement capabilities for continuous AML monitoring, while organizations retain control over how risk policies are defined and applied.

Case studies: Fighting AML with behavioural signals

A risk-based AML approach, in action

Detecting account resale or trafficking

A user in Madrid passed KYC without issue and has been active on their account for months. They have made a series of deposits and transactions at their home address and a local office in their community. They establish a Trusted Profile on their clean Android device.

Suddenly, their account is accessed from an iOS device at a house in Barcelona, where a large deposit is made. This same iOS device is linked to other accounts, operating out of the same house.

These flags are delivered to the organization in real-time, allowing them to take decisive action. They suspect that the once Trusted Profile has been sold to a fraud ring. They decide to monitor the transactions and investigate further.

Their investigation reveals that the “users” at this Barcelona location are engaging in similar patterns, placing coordinated transactions that point to collusion. Armed with this confidence, the organization blocks the fraudulent device, suspends the accounts, and sets up a location-based rule to monitor for future activity.

Pinpointing potential PEP-related risk for enhanced due diligence

A new account is created at a residential address in Rome. It passes KYC with no issue. Over the course of a few months, a few transactions are placed but there is not enough activity to establish a Trusted Profile.

Suddenly, this account is active at the Russian Consulate in Genoa. Though the KYC data does not match any names on the PEP or sanctions list, this high-risk location is flagged to the organization in real-time.

The organization decides to trigger step-up verification before allowing the transaction to proceed. The user abandons the transaction, pointing to suspected proxy activity indicative of potential attempted money laundering.

Combining signals for continuous proof of existence

The what, where, and how helps validate the “who?”

Nick puts it frankly—the current tools aren’t pulling their full weight: “When we rely solely on liveness checks to prove identity, we’re asking users to: ‘go find your ID, turn on your camera, hold up your ID, get your face in the frame, wait for us to decide if it’s a match.’ But the only real truth we get is: this person held up this ID on this date.”

With GeoComply, we’re asking users to simply tap “enable location”.

The truth you get: this verified person has maintained secure control of this account through continuous behavioral validation, their geographic patterns remain consistent with their KYC profile and occur exclusively in permitted jurisdictions with no sanctioned country access, every financial transaction has been verified for device integrity and location legitimacy, and the system actively monitors for PEP risk indicators including embassy proximity and diplomatic travel patterns.

All without requiring user action or creating friction.

APPENDIX

GeoComply’s
AML checklist

Every verification, risk trigger, and escalation decision generates a clear, time-stamped audit trail. Location, device, and behavioral context are captured at key financial events, supporting efficient investigation and higher-quality SAR/STR reporting when required.

Enhanced sanctions and PEP compliance risk assessment: Goes beyond name-matching to use real-time location to flag individuals who may be operating from high-risk PEP locations (proximity to embassies, diplomatic travel patterns) to trigger review
Configurable to meet regulations: Can work with regulators to determine sanctioned jurisdictions, high-risk locations, risk parameters, and other key attributes.
Transaction monitoring and regulator reporting: Enhanced location and device data at funding and payout events (deposit/transfer/withdrawal) creates location and device audit trail for AML investigation and SARs/STRs
Behavioural detection: See placement, layering, and integration attempts through pattern analysis
Enhanced Due Diligence: Automatically trigger enhanced KYC when risk flag emerges, in real-time
Sanctions Compliance: Geo-fencing prevents access from prohibited areas

About Nick Imperillo | Senior Manager, Fraud and Risk

Spearheading fraud and risk strategies at GeoComply, Nick Imperillo helps organizations protect their businesses and users through advanced account security and the identification of abnormal behavioral patterns. He has dedicated his career to the dynamic challenge of architecting and scaling risk operations in highly regulated sectors, supporting major players like DraftKings. Nick merges his foundational expertise from security studies and research with extensive practical experience in implementing resilient anti-fraud frameworks.

Frequently asked questions
about behavioral AML monitoring


 

No single control is sufficient on its own, which is why this approach is intentionally layered. Behavioural validation combines device intelligence, geolocation verification (including VPN, proxy, and GPS spoofing detection), and pattern analysis across key financial events.

Rather than relying on a single signal, the system looks for inconsistencies across multiple dimensions. When those inconsistencies emerge, trust is dynamically reassessed and appropriate escalation is triggered for review. This allows organizations to detect risk indicators that point-in-time checks are structurally unable to observe.

Behavioural monitoring is designed to support risk-appropriate responses, not rigid enforcement. Legitimate behavioural change—such as travel, relocation, or changes in routine—is expected over the lifecycle of an account.

When patterns shift, the system does not assume wrongdoing. Instead, it prompts enhanced verification or review to re-establish confidence. Trust can be restored once the change is understood and verified, ensuring compliance requirements are met without unnecessarily disrupting legitimate users.

Account takeover is inherently a post-onboarding risk, which makes it difficult to detect using one-time identity checks alone.

By monitoring behavioural and environmental consistency over time—including device usage, location patterns, and transaction behaviour—the system can identify sudden deviations that are inconsistent with the established profile. These deviations act as early indicators that account control may have changed, prompting review and escalation before financial harm or regulatory exposure increases.

For legitimate users, this approach is typically less burdensome, not more. After identity is established at onboarding, ongoing verification occurs passively at defined, high-risk events, rather than through repeated challenges such as video checks, one-time passwords, or SMS codes.

Additional friction is introduced only when risk indicators emerge, aligning user experience with actual risk. This helps reduce unnecessary disruption while maintaining strong controls where they are most needed.

Attempts to obscure or falsify location are treated as risk indicators, not simply access denials. The system is designed to detect common obfuscation techniques including VPNs, proxies, GPS spoofing, and device emulation—and factor those signals into the overall risk assessment.

When such indicators appear, trust can be revoked and appropriate controls applied, such as transaction holds or enhanced verification. This provides stronger ongoing assurance than static checks, which cannot detect location obfuscation after onboarding.

Name-based screening remains a critical component of sanctions and PEP compliance, but it has inherent limitations. Behavioural and location-based intelligence adds contextual risk signals by identifying activity occurring in sanctioned jurisdictions or locations associated with elevated PEP risk, such as diplomatic or government facilities.

These signals do not determine PEP status or sanctions violations on their own. Instead, they support enhanced due diligence by highlighting situations where additional review may be warranted. Risk parameters are configurable by organizations and can be aligned with regulatory expectations to ensure compliance is applied consistently and proportionately.

Discover how GeoComply helped a leading crypto platform achieve global growth in a complex regulatory environment.
Download Case Study