Secure verifications for every industry
We provide templated identity verification workflows for common industries and can further design tailored workflows for your specific business.

AML enforcement penalties in EMEA surged 767% year-on-year in 2025, according to Fenergo’s March 2026 Global Financial Penalties report. TD Bank paid $3.09 billion in 2024 after regulators found its customer due diligence had “fundamental, widespread flaws.” Starling Bank was fined £28.96 million the same year for screening controls the FCA described as “shockingly lax.”
Adverse media screening is the AML control that sits between routine ID verification and enforcement exposure. It searches publicly available sources for negative information about customers: criminal proceedings, regulatory sanctions, financial crime coverage, and reputational red flags that structured databases do not capture. The gap between programs that catch genuine risk and those that generate the “alert fatigue” compliance practitioners describe is almost entirely a product of how the screening architecture was built, not how many sources it covers. Understanding what is AML and why it matters gives you the regulatory foundation; this guide provides the architectural argument.
This guide covers what adverse media screening is, which sources it covers, how the process works, where false positives come from, and how to build a screening program that satisfies FATF, the FCA, and FinCEN. The central argument: adverse media screening fails not from missing sources but from architectural choices that determine your false-positive rate. The False Positive Problem section and the architecture section that follows are where this guide delivers on that argument.
Adverse media screening (also called negative news screening) is the process of searching publicly available sources for negative information about individuals or entities as part of AML Customer Due Diligence (CDD) and Enhanced Due Diligence (EDD). It captures risk that structured watchlists cannot: a subject who is not yet sanctioned but is actively reported in financial crime coverage, court filings, or regulatory bulletins.
FATF Recommendation 10 requires firms to apply CDD measures on an ongoing basis, and FATF’s Risk-Based Approach Guidance for the Banking Sector (2014) explicitly recommends that “verifiable adverse media searches” form part of enhanced due diligence measures. The EU’s 4th Anti-Money Laundering Directive (Directive 2015/849, Article 18) requires enhanced due diligence for higher-risk business relationships, covering “any other case identified by the obliged entity as presenting a higher risk.” Adverse media findings trigger this provision directly. The EU’s 6th Anti-Money Laundering Directive (Directive 2018/1673) further expanded the list of predicate offenses that firms must screen against, extending the criminal conduct categories that adverse media programs are expected to detect.
The FCA Financial Crime Guide (FCTR 16.3) expects firms to include adverse media screening in ongoing customer monitoring alongside sanctions and PEP checks. The Wolfsberg Group’s Negative News Screening Guidance (2022, updated with FAQs in 2024) is the most detailed industry-standard framework for how negative news screening should be structured and what qualifies as a credible source.
Any firm subject to AML regulations needs to screen for adverse media as part of its risk-based CDD program. This covers banks and credit institutions, payment institutions and e-money issuers, crypto-asset service providers (CASPs) under MiCA, investment firms, insurance companies, and other obliged entities under the EU AML framework. In the US, the FinCEN CDD Rule (31 CFR 1010.230) does not create a categorical adverse media screening requirement for all customers, but requires firms to determine “on a risk basis” whether negative news searches are needed to adequately understand a customer relationship. Both KYC (individual customers) and KYB (business entities) programs require adverse media coverage, with KYC vs KYB: how due diligence differs detailing how the screening scope changes for each.
Sanctions lists and PEP databases capture known risk. Adverse media captures emerging risk. A customer may not appear on any official list until months or years after their first negative media coverage begins.
In practice, compliance teams that rely solely on structured watchlists miss the window between first public reporting and formal sanction or indictment. During that gap, the customer’s transactions remain unmonitored and the firm accumulates exposure. Regulators increasingly treat that gap as a systemic CDD failure, not a detection limitation.
Enforcement history reinforces this. OKX pled guilty in 2025 and paid over $504 million after the DOJ found it had onboarded millions of customers without adequate KYC and screening, allowing criminal networks to operate through the platform. The core failure was not list-matching but the absence of risk-intelligent screening that would have flagged known patterns before they became criminal liability.
Fenergo’s March 2026 Global Financial Penalties report documents the EMEA enforcement surge. Adverse media screening failures rarely stand alone in enforcement actions, but they consistently appear as one layer in the systemic CDD deficiencies that regulators cite. The AMLA (EU Anti-Money Laundering Authority), now operational since July 2025, published a public hearing scheduled for March 24, 2026, signaling increased supervisory pressure across the EU.
Adverse media screening is only as good as its source coverage, and source quality directly determines your false-positive rate. The Wolfsberg Group’s 2022 Negative News Screening Guidance identifies source credibility as one of the two primary quality determinants of any negative news screening program, alongside the persistence of reporting. Every low-credibility or poorly curated source added to a screening program increases alert volume without improving detection quality, making source selection one of the three architectural decisions that separate programs that work from those that generate alert fatigue (addressed in depth in the False Positive Problem section below).
This is the primary source layer: national newspapers, wire services (Reuters, AP, Bloomberg), regional and local news, and industry publications. Regional coverage matters because financial crime often surfaces in local media weeks or months before international outlets pick it up. Effective programs cover non-English sources, particularly for customers from high-risk jurisdictions on the FATF grey list updated February 2026.
Court filings, judgments, indictments, and civil litigation records provide the evidentiary layer. These sources carry higher credibility than news coverage because they represent documented legal proceedings. Providers such as LexisNexis aggregate legal records across multiple jurisdictions, including archived records that news searches may miss.
Regulatory enforcement actions published by the FCA, FinCEN, SEC, and comparable agencies produce authoritative adverse information. These documents name individuals and firms, specify the conduct, and cite applicable law, making them high-confidence sources with low false positive risk.
While technically a separate screening function, adverse media programs should be cross-referenced against OFAC’s SDN list, the UN Consolidated List, the EU Consolidated Financial Sanctions List, and the HMT UK sanctions list. A subject appearing in adverse media who is also approaching a sanctions threshold requires different risk treatment. For coverage of the intersection between adverse media and PEP risk, the PEP screening guide covers how both controls complement each other.
Social media signals, forum posts, and open-source intelligence serve as early warning indicators, particularly for crypto-native clients and DeFi-adjacent businesses. These sources carry lower credibility ratings under the Wolfsberg framework and should be treated as signal-raising rather than decision-making inputs.
Manual adverse media screening involves a compliance analyst running name searches across news databases, legal record systems, and open-source tools. The analyst reviews results, classifies hits as relevant or false positives, escalates relevant findings, and documents the decision trail. Manual screening is reliable for small customer populations or high-value complex cases where analyst judgment adds genuine value. It does not scale to thousands of customers or ongoing monitoring requirements.
Automated adverse media screening uses natural language processing (NLP), entity resolution, and risk-scoring algorithms to replace manual search execution. The system ingests customer identifiers, runs continuous searches across configured source lists, normalizes results, and generates scored alerts for analyst review. The analyst’s role shifts from searching to triaging: reviewing scored alerts, making disposition decisions, and feeding outcomes back into the model to improve accuracy.
Modern platforms use transformer-based NLP models that evaluate context, not just keywords. A search for “John Smith fraud” will not generate an alert for “John Smith receives award for fraud prevention training” because the system evaluates the full sentence context rather than the individual keyword match.
Step 1: Customer identifiers (name, date of birth, country, registration number) are ingested from the KYC record. Step 2: The system searches configured source lists, applying name-matching algorithms including fuzzy matching, phonetic matching (Soundex, Metaphone), and transliteration for non-Latin scripts. Step 3: Results are normalized, deduplicated, and scored by risk category (financial crime, sanctions, regulatory action, reputational).
Step 4: Alerts above the configured confidence threshold are queued for analyst review. Step 5: Analyst disposition (false positive, relevant for monitoring, relevant for EDD, relevant for SAR) is recorded and used to retrain the model.
Integrating this pipeline with identity verification and screening integrations at onboarding ensures the adverse media record is part of the customer’s KYC file from day one, creating a documented audit trail from the first interaction.
This is where adverse media programs succeed or fail operationally. Compliance practitioners consistently identify false positive overload as the defining challenge of adverse media screening. The emotional language they use reflects genuine operational pain: “drowning in false positives,” “alert fatigue,” “the trap,” and “broken workflows” appear repeatedly in compliance professional discussions on LinkedIn and Reddit forums tracked in this research.
False positives arise from three primary root causes: name ambiguity, poor entity resolution, and low-quality source inclusion. Name ambiguity is the most common trigger. “Mohammed Al-Rashid” or “Wei Chen” can match hundreds of different people across global news databases, generating irrelevant alerts for each one.
Poor entity resolution compounds this problem. Screening systems that match on name alone, without cross-referencing date of birth, address, or registration number, generate vast quantities of irrelevant results. Low-quality source inclusion is the third factor: programs that include non-credible or poorly curated sources amplify noise without improving detection.
The consequences are concrete. Each false positive requires analyst time to review, document, and dispose of properly. At scale, this burden consumes compliance capacity that should be focused on genuine risks. The FinCEN 2021 Joint SAR FAQs explicitly note that “a financial institution is not required to file a suspicious activity report based solely on negative news,” a position that reflects the reality that over-alert programs generate defensive SAR filing and obscure genuine signals in regulatory reporting.
Six techniques to reduce false positives:
Improved entity resolution: Require multiple identifying attributes (name plus date of birth plus country plus registration number) to constitute a match rather than name alone. This single change eliminates the majority of common-name false positives without reducing detection quality for genuine risks.
Confidence scoring and tiered triage: Assign a probability score to each alert based on match quality, source credibility, and recency. Route low-confidence alerts to a second-tier queue rather than treating all alerts equally. This prevents alert fatigue without creating detection gaps.
Context-aware NLP: Deploy models that evaluate the full sentence and article context, not just keyword presence. The subject-verb-object relationship determines whether a “fraud” mention refers to the customer or to a topic they are tangentially connected to.
Feedback loops and active learning: Every analyst disposition trains the model. False positives that are consistently dismissed for a specific reason (for example, common name in a specific country with no other matching attributes) can be auto-suppressed after a configurable number of consistent dismissals, reducing recurring noise systematically.
Source calibration and deduplication: Audit your source list periodically. Remove sources with high false positive rates and low credibility ratings. The EBA Guidelines on ML/TF Risk Factors require that firms assess the “completeness, accuracy and coverage” of the data they rely on, which includes adverse media source quality.
Date proximity weighting: Give higher scores to recent negative coverage and lower scores to decade-old coverage unless it involves ongoing proceedings. A 2010 regulatory action with no subsequent activity is materially different from active 2025 litigation.
Three KPIs to measure whether these techniques are working:
Alerts per 1,000 customers screened establishes your volume baseline and measures the change after each configuration adjustment. This metric isolates the impact of entity resolution improvements and source calibration changes over time, providing documented evidence of systematic program improvement for regulatory review.
Analyst minutes per alert disposition tracks the efficiency of your triage workflow from alert generation to documented decision. Tiered triage and context-aware NLP reduce this by routing lower-confidence alerts away from senior analyst queues, freeing capacity for genuine risk investigation that protects your firm.
False positive rate as a percentage of total alerts, tracked by source list and customer segment, identifies exactly where calibration improvements are needed. Per the EBA Guidelines on ML/TF Risk Factors, firms should regularly review the effectiveness of their screening data; this metric constitutes the documented evidence of that review for regulators.
These three screening functions are complementary, not interchangeable. Compliance officers who treat them as the same process create gaps in their AML program.
Sanctions screening matches customer identifiers against official government sanctions lists: OFAC’s SDN List, the UN Consolidated List, the EU Consolidated Financial Sanctions List, and the HMT UK sanctions list. The output is binary: on the list or not. A match triggers a legal blocking obligation and regulatory reporting. Sanctions screening catches designated individuals and entities; it does not capture risk that has not yet been officially designated.
PEP screening identifies politically exposed persons and their associates: heads of state, senior government officials, legislators, senior military officers, and their immediate family members. The regulatory basis is FATF Recommendation 12, which requires enhanced ongoing monitoring for PEP relationships. PEP screening uses structured databases updated by data providers; it does not reflect real-time news about a PEP’s conduct or emerging allegations against their associates.
Adverse media screening fills the gap between list-based controls. It catches the senior official whose name is appearing in financial crime coverage before their PEP status is updated, the executive under investigation whose company has not yet received a regulatory action, and the entity connected to criminal networks through media reporting without a formal designation. The Wolfsberg Group (2022) defines negative news as “information available in the public domain which financial institutions would consider relevant to the management of financial crime risk.” The definition is deliberately broad, designed to capture what structured databases miss.
All three controls should run in parallel against a single customer record. Many compliance programs deploy integrated platforms where Zyphe AML screening software handles all three streams, reducing duplication and ensuring consistent documentation across the customer lifecycle.
Phase 1: Risk profiling and scope definition
Define which customer segments require adverse media screening, at what frequency, and at what depth. High-risk segments (PEPs, customers in FATF grey-list jurisdictions, businesses in cash-intensive sectors) require comprehensive screening at onboarding and continuous real-time monitoring. Standard retail customers require screening at onboarding and periodic re-screening based on your risk policy. Document the rationale for every tier decision because regulators will examine why you assigned specific customers to specific tiers during audits.
Phase 2: Source selection and calibration
Select adverse media sources with documented credibility ratings. Prioritize Tier 1 sources (regulatory enforcement bulletins, official legal databases) and Tier 2 sources (major wire services, credible national newspapers). Apply the Wolfsberg source quality framework: completeness, accuracy, coverage, and persistence of reporting. Enable coverage in the primary languages of your highest-risk customer jurisdictions and remove low-credibility sources that generate noise without improving detection.
Phase 3: Alert threshold and triage workflow
Set confidence score thresholds based on your customer volume and analyst capacity, knowing that a threshold too low floods the queue while a threshold too high creates detection gaps. Build a tiered triage workflow: auto-resolve very low-confidence alerts with documentation, queue medium-confidence alerts for analyst review, auto-escalate high-confidence alerts to senior review, and route confirmed findings into a case management system with assigned investigator, documented evidence, and resolution deadline for auditable investigation workflows. For firms exploring outsourced program options, compliance-as-a-service explained covers how managed compliance programs handle these workflows at scale.
Phase 4: Documentation and audit trail
Every alert disposition must be documented: what was found, why it was classified as a false positive or a genuine finding, what action was taken, and who made the decision. Regulators do not just check that you screened a customer. The FCA PS24/17 guidance from late 2024 explicitly requires firms to demonstrate they understand the “calibration and effectiveness” of their screening systems, which means documented decision trails are non-negotiable. When evaluating vendors, evaluating Sumsub alternatives provides a framework for comparing provider capabilities against these documentation requirements.
The three false positive root causes identified above (name ambiguity, poor entity resolution, and low-quality source inclusion) are not just configuration problems. They are architectural ones. Centralized screening platforms match against self-reported customer identifiers that may be incomplete, inconsistent, or unverified at the time of onboarding submission, which means the entity resolution quality ceiling is limited by onboarding form accuracy from the start.
Zyphe’s decentralized architecture addresses entity resolution at the source. Adverse media screening operates against cryptographically verified identity records rather than self-reported data. This is designed to reduce name-ambiguity false positives because the entity being screened is resolved against a confirmed identity, not a stated one. The underlying cryptographic approach, explained in zero-knowledge proofs in KYC, enables verification-grade identity attestations without requiring centralized PII accumulation.
Three operational contrasts with centralized screening architectures are relevant for compliance architects. First, entity resolution quality: centralized platforms match against onboarding forms; a verified-identity model matches against confirmed credentials, improving match precision for customers whose self-reported names differ from their documented legal names. Second, PII footprint: centralized platforms accumulate PII vaults that grow with each customer and represent breach liability under GDPR; Zyphe’s architecture is designed to minimize PII retention to what applicable law requires, which means maintaining compliance records (screening decisions, risk assessments, and audit trails for the 5-year retention periods mandated by the EU AML Regulation and the US BSA), not accumulating raw PII beyond those requirements. Third, ongoing screening stability: because identity is cryptographically verified at onboarding, the attributes used for continuous adverse media monitoring do not degrade with inconsistent address updates or name variations that self-reported forms capture unreliably.
For a broader view of how decentralized architectures differ from traditional KYC approaches, blockchain approaches to identity verification covers the architectural comparison in detail.
Book a call with Zyphe to assess how your current screening architecture maps against these design principles.
Regulators, including the FCA under PS24/17, require evidence that your screening program is calibrated and effective, not just operational. Maintain alert disposition logs showing what was found, how it was classified (false positive vs. genuine risk), who made the decision, and what action followed. Document your source list with credibility ratings and maintain a record of your confidence score thresholds, including when and why they were adjusted. This audit trail constitutes the calibration review evidence that the EBA Guidelines on ML/TF Risk Factors require firms to maintain.
No single statute mandates “adverse media screening” by name, but regulators worldwide require it as part of risk-based AML programs. FATF Recommendation 10 requires ongoing CDD monitoring and enhanced measures for higher-risk customers. The FCA FCTR 16.3 explicitly lists adverse media screening alongside sanctions and PEP checks as part of ongoing monitoring. FinCEN’s 2020 CDD FAQs clarify that adverse media screening must be applied on a risk basis under the CDD Rule (31 CFR 1010.230) even where it is not categorically required for all customers.
There is no single defensible threshold because regulatory guidance, including FinCEN’s 2020 CDD FAQs, requires a risk-based approach rather than a categorical one. A defensible threshold is one documented in your screening policy, calibrated against your customer risk profile, reviewed periodically, and traceable through a false positive rate log by source and customer segment. Regulators do not expect zero false positives; they expect documented evidence that you are actively managing the tradeoff between detection sensitivity and analyst capacity.
Sanctions screening matches customer identifiers against official government lists (OFAC SDN, UN Consolidated, EU, HMT) and triggers legal blocking obligations when a match is found. Adverse media screening searches unstructured open sources for negative coverage about risk, misconduct, or financial crime involvement, even when no formal sanction exists. Sanctions screening is binary and legally prescribed; adverse media screening is risk-scored and informs enhanced due diligence decisions. Both are required components of a complete AML screening program, designed to catch different stages of risk evolution.
The most effective approaches combine improved entity resolution (requiring multiple identifying attributes beyond name alone), context-aware NLP that evaluates article content rather than keyword presence, confidence scoring with tiered triage workflows, and analyst feedback loops that train the model on dismissed false positives. Source calibration (removing low-credibility sources) and date proximity weighting also reduce noise systematically. Each of these techniques addresses a different root cause of false positive generation and produces compounding improvements when implemented together.
Screening frequency should be risk-based per FATF’s ongoing monitoring requirement. High-risk customers (PEPs, customers in FATF grey-list jurisdictions, complex corporate structures) should be screened at onboarding and monitored continuously in real time. Standard-risk customers should be re-screened periodically, typically annually, and whenever a material change in the relationship is identified. The FCA PS24/17 guidance from late 2024 reinforces that ongoing monitoring, not one-time onboarding checks, is the regulatory expectation across all customer risk tiers.
Three metrics provide a clear picture: alerts per 1,000 customers screened (volume baseline and the impact of configuration changes), false positive rate as a percentage of total alerts by source list and customer segment (calibration quality and where improvements are needed), and analyst minutes per alert disposition (triage workflow efficiency). Per the EBA Guidelines on ML/TF Risk Factors, firms should regularly review the effectiveness of their screening data; these three metrics constitute the documented evidence of that review. Track them quarterly and record the results in your program review file for regulatory examination.
Adverse media screening is not optional for any firm subject to AML regulation, and it is not a one-time onboarding check. The regulatory expectation, from FATF Recommendation 10 to FCA FCTR 16.3 to the Wolfsberg Group’s 2022 Negative News Screening Guidance, is ongoing monitoring that includes adverse media alongside sanctions and PEP screening as standard practice.
The difference between a screening program that protects your firm and one that creates alert fatigue and burns compliance team capacity is architecture and configuration. Getting entity resolution, source calibration, NLP context evaluation, and feedback loops right is what separates a program that surfaces genuine risk from one that trains your team to dismiss alerts without reading them.
Book a call with Zyphe to map your adverse media screening architecture and identify where your current program has gaps.
We provide templated identity verification workflows for common industries and can further design tailored workflows for your specific business.