Secure verifications for every industry
We provide templated identity verification workflows for common industries and can further design tailored workflows for your specific business.

Financial crime compliance professionals encounter two acronyms constantly: AML and CFT, terms that appear together so frequently that many treat them as interchangeable, assuming they describe the same set of regulatory requirements. This assumption is understandable but incorrect.
While AML and CFT share common tools and often fall under the same regulatory framework, they address fundamentally different criminal threats and require distinct compliance considerations.
Understanding the difference between anti-money laundering and combating the financing of terrorism isn't merely academic. The distinction affects how institutions design their compliance programs, train their staff, and allocate their monitoring resources. An institution that treats AML and CFT as identical risks building a program optimized for one threat while remaining vulnerable to the other.
This guide explains what AML and CFT actually mean, how they differ in practice, where they overlap, and why your compliance program needs to address both effectively.
Before examining the differences, let's establish clear definitions.
Anti-money laundering (AML) refers to the laws, regulations, and procedures designed to prevent criminals from disguising illegally obtained funds as legitimate income. Money laundering is the process by which "dirty money" from criminal activity is cleaned through the financial system, making it appear to come from legal sources.
The money laundering process typically follows three stages. Placement involves introducing illegal funds into the financial system, often through cash deposits, currency exchanges, or purchases. Layering creates complex transaction patterns designed to obscure the money's origin, such as wire transfers between accounts, shell company transactions, or investment purchases. Integration returns the now-disguised funds to the criminal in a form that appears legitimate, such as business revenue, investment returns, or real estate proceeds.
AML programs exist to detect and disrupt this process at any stage. The goal is to make the financial system hostile to criminals attempting to legitimize their proceeds.
Combating the financing of terrorism (CFT), sometimes called counter-terrorist financing or CTF, refers to efforts to prevent terrorist organizations and individuals from accessing financial resources. Unlike money laundering, which cleans dirty money, terrorist financing may involve funds from entirely legitimate sources being directed toward illegitimate purposes.
CFT focuses on disrupting the financial networks that enable terrorism. This includes identifying individuals and organizations associated with terrorist groups, blocking their access to financial services, and detecting transactions that may fund terrorist activities.
The fundamental distinction between AML and CFT lies in the direction and purpose of the funds.
AML addresses funds flowing from illegal activity into the legitimate economy. The source of the money is criminal (drug trafficking, fraud, corruption, etc.), and the goal is to make it appear legitimate. Money laundering is essentially a cover-up operation.
CFT addresses funds flowing from any source toward terrorist activity. The source may be legitimate (charitable donations, business proceeds, personal savings), but the destination is illegal. Terrorist financing is essentially a funding operation.
This directional difference has significant practical implications. A money launderer needs to move large amounts of dirty money and typically leaves detectable patterns: unusual cash deposits, complex layering transactions, lifestyle inconsistent with legitimate income. A terrorist financier may move small amounts of clean money and leave minimal footprint: modest transfers, plausible cover stories, amounts that don't trigger traditional monitoring thresholds.
Despite their differences, AML and CFT share a common regulatory framework in most jurisdictions. In the United States, both fall under the Bank Secrecy Act (BSA) as amended by the USA PATRIOT Act.
The BSA, enacted in 1970, established the basic framework for financial crime compliance. It requires financial institutions to maintain records, file reports on certain transactions, and develop internal compliance programs. Originally focused on money laundering, the BSA's scope expanded significantly after September 11, 2001.
The USA PATRIOT Act of 2001 dramatically expanded BSA requirements to address terrorist financing. Key provisions relevant to CFT include the Customer Identification Program (CIP) requirement, enhanced due diligence for correspondent accounts, and prohibitions on relationships with shell banks. The Act also strengthened information sharing between financial institutions and law enforcement.
The Financial Crimes Enforcement Network (FinCEN) administers BSA compliance and serves as the U.S. financial intelligence unit. FinCEN issues regulations, provides guidance, and collects reports from financial institutions. Its mandate explicitly covers both money laundering and terrorist financing.
Internationally, the Financial Action Task Force (FATF) sets standards for both AML and CFT. FATF's 40 Recommendations address money laundering, while its Special Recommendations on Terrorist Financing address CFT. Most countries have adopted frameworks that address both threats, though specific requirements vary by jurisdiction.
While AML and CFT share regulatory infrastructure, effective compliance programs must address the distinct characteristics of each threat.
Customer Due Diligence (CDD) procedures apply to both AML and CFT, but the risk factors differ.
AML-focused due diligence emphasizes understanding the customer's source of wealth and expected transaction patterns. Key questions include: Where did this customer's money come from? Is their stated business consistent with their transaction history? Does their lifestyle match their apparent income?
CFT-focused due diligence emphasizes identifying connections to terrorist organizations or high-risk jurisdictions. Key questions include: Does this customer appear on any sanctions or terrorist watchlists? Do they have connections to designated individuals or organizations? Are they operating in regions with known terrorist activity?
Both sets of questions matter, but they focus attention on different risk indicators.
Transaction monitoring systems must be calibrated to detect both money laundering and terrorist financing patterns, which differ significantly.
Money laundering patterns typically involve larger amounts, complex transaction structures designed to obscure origins, and behaviors inconsistent with the customer's stated profile. Red flags include structuring transactions to avoid reporting thresholds, rapid movement of funds through multiple accounts, and unexplained wealth.
Terrorist financing patterns may involve smaller amounts, simpler transaction structures, and behaviors that appear unremarkable in isolation. Red flags include transactions to or from high-risk regions, donations to organizations with unclear purposes, and patterns consistent with known terrorist financing typologies (such as "lone wolf" funding or cell-based financing).
An institution focused exclusively on detecting large, complex transactions may miss the smaller, simpler transactions characteristic of terrorist financing.
Sanctions screening is critical for CFT compliance in ways that differ from traditional AML concerns.
The Office of Foreign Assets Control (OFAC) maintains the Specially Designated Nationals (SDN) list, which includes individuals and entities associated with terrorism, narcotics trafficking, weapons proliferation, and other threats. While sanctions screening supports both AML and CFT, the terrorism-related designations are particularly central to CFT compliance.
Effective CFT screening requires matching customer and transaction data against current sanctions lists, screening not just at onboarding but on an ongoing basis as lists are updated, and investigating potential matches thoroughly before making blocking decisions. False positives are common given the volume of names screened, but false negatives carry severe regulatory and reputational consequences.
See how Zyphe's automated screening solutions reduce false positives while ensuring CFT compliance →
Suspicious Activity Reports (SARs) serve both AML and CFT purposes, but the analysis supporting each differs.
When filing a SAR for potential money laundering, the narrative typically focuses on: the suspicious transaction patterns, how they deviate from expected behavior, and why the activity suggests an attempt to disguise illicit proceeds.
When filing a SAR for potential terrorist financing, the narrative typically focuses on: connections to designated persons or organizations, transactions involving high-risk jurisdictions, and patterns consistent with known terrorist financing methods.
FinCEN uses different analytical frameworks for AML and CFT intelligence, so the information emphasized in SARs should reflect the specific concern.
Some compliance professionals argue that the AML/CFT distinction is theoretical, that a well-designed program catches both. This view underestimates how the differences between money laundering and terrorist financing affect practical compliance decisions.
Compliance programs operate with limited resources. Understanding the AML/CFT distinction helps allocate those resources appropriately. An institution whose customer base presents primarily money laundering risk (such as a private bank serving high-net-worth clients) should weight its resources differently than an institution whose customer base presents primarily CFT risk (such as a money services business serving remittance corridors to high-risk regions).
Effective risk assessment requires distinguishing between AML and CFT risk factors. A customer may present high AML risk (complex business structure, unexplained wealth) but low CFT risk (no connections to high-risk jurisdictions or designated persons). Another customer may present low AML risk (modest transactions, clear income source) but elevated CFT risk (frequent transfers to regions with terrorist activity).
Treating all financial crime risk as undifferentiated "AML risk" obscures these distinctions and leads to misallocated scrutiny.
Staff training should address both AML and CFT, but the red flags differ. Front-line staff who understand only money laundering indicators may miss terrorist financing warning signs. Training programs should cover the distinct typologies, indicators, and reporting considerations for each threat.
Regulators increasingly expect institutions to demonstrate specific attention to CFT. Examination procedures address terrorist financing separately from money laundering. An institution that can articulate its AML program but stumbles when asked specifically about CFT may face criticism even if its overall program is sound.
Despite their differences, AML and CFT share substantial common ground.
Both AML and CFT rely on the same foundational compliance infrastructure. Customer identification and verification (CIP) applies to both. Customer due diligence (CDD) and enhanced due diligence (EDD) serve both purposes. Transaction monitoring systems can be configured for both threats. SAR filing procedures are identical regardless of the underlying concern.
Both AML and CFT are grounded in the principle that financial institutions should know their customers, understand their expected activity, and identify deviations from that baseline. Both require a risk-based approach that allocates scrutiny according to assessed risk. Both depend on effective information sharing between institutions and law enforcement.
Money laundering and terrorist financing sometimes converge. Terrorist organizations may engage in money laundering to disguise the criminal origins of funds raised through drug trafficking, kidnapping, or other crimes. Criminal organizations may provide material support to terrorist groups. These convergence points mean that AML and CFT programs often detect the same underlying activity from different angles.
The most effective approach integrates AML and CFT into a unified program while maintaining appropriate distinction between the threats.
Written policies should address both AML and CFT explicitly. This means acknowledging the distinct nature of each threat, documenting how the program addresses each, and ensuring that policy language doesn't inadvertently suggest they're identical.
Risk assessments should evaluate AML and CFT risk separately, even if presented in a unified document. This includes identifying customer types that present elevated risk for each threat, geographic risk factors relevant to each, and product and service features that affect each risk type.
Operational procedures can often serve both purposes but should be designed with both threats in mind. Customer due diligence questionnaires should gather information relevant to both AML and CFT risk assessment. Transaction monitoring scenarios should include both money laundering and terrorist financing typologies. Investigation procedures should guide staff to consider both possibilities when reviewing alerts.
Training programs should distinguish between AML and CFT while emphasizing their integration. Staff should understand why the threats differ, what red flags are associated with each, and how the institution's program addresses both.
Independent testing should evaluate the institution's effectiveness against both AML and CFT risks. This includes testing whether sanctions screening is current and effective, whether transaction monitoring scenarios include terrorist financing typologies, and whether staff can articulate the institution's CFT-specific procedures.
Modern compliance technology can significantly enhance both AML and CFT effectiveness.
Automated sanctions screening checks customers and transactions against OFAC and other lists in real-time. Advanced systems reduce false positives through fuzzy matching algorithms while ensuring true matches aren't missed. This is essential for CFT compliance given the volume of screening required.
Sophisticated transaction monitoring platforms can run multiple scenario types simultaneously, covering both money laundering and terrorist financing patterns. Machine learning can identify subtle patterns that rules-based systems miss, though human review remains essential for final determination.
Advanced analytics can map relationships between customers, accounts, and transactions to identify networks that may indicate criminal or terrorist organization. This capability is particularly valuable for CFT, where identifying organizational connections is critical.
Decentralized identity solutions strengthen both AML and CFT by providing more robust customer verification. When customers can present cryptographically verified credentials, institutions gain higher confidence in identity while reducing friction in the onboarding process.
Discover how Zyphe's decentralized verification strengthens your AML/CFT program →
AML and CFT requirements vary by jurisdiction, but international coordination is extensive.
The Financial Action Task Force conducts mutual evaluations of member countries' AML/CFT regimes. Countries that fail to meet FATF standards may be placed on "gray" or "black" lists, triggering enhanced due diligence requirements from institutions in other countries.
U.S. AML/CFT requirements have significant extraterritorial reach. Non-U.S. institutions that access the U.S. financial system or handle U.S. dollar transactions must comply with relevant BSA requirements. Sanctions violations can result in severe penalties even for institutions headquartered outside the United States.
International bodies continue working to harmonize AML/CFT standards. The European Union's Anti-Money Laundering Directives, for example, incorporate FATF recommendations while adding EU-specific requirements. Institutions operating across jurisdictions must navigate these varying requirements while maintaining consistent core controls.
Failure to address both AML and CFT carries serious consequences.
Regulators have imposed billions of dollars in penalties for AML/CFT failures. These penalties reflect not just technical violations but also the underlying harm when financial institutions enable money laundering or terrorist financing. Enforcement actions often cite specific failures to address CFT as distinct from general AML deficiencies.
Beyond regulatory penalties, institutions suffer reputational damage when linked to financial crime. The association with terrorist financing is particularly damaging, as it suggests the institution enabled violence against innocent people.
In extreme cases, individuals within institutions may face criminal liability for willful violations of AML/CFT requirements. This personal exposure adds urgency to ensuring programs are genuinely effective, not merely formally compliant.
AML (Anti-Money Laundering) focuses on preventing criminals from disguising illegally obtained funds as legitimate income. The money flows from illegal sources into the legitimate economy. CFT (Combating the Financing of Terrorism) focuses on preventing funds from reaching terrorist organizations or individuals. The money may come from legitimate sources but flows toward illegal purposes. AML cleans dirty money; CFT blocks funding for violence.
AML/CFT refers to the regulatory framework and program requirements designed to prevent money laundering and terrorist financing. KYC (Know Your Customer) is an operational process within that framework. KYC procedures collect and verify customer information that enables AML/CFT compliance. Think of AML/CFT as the "what" (prevent financial crime) and KYC as part of the "how" (by knowing who you're dealing with). KYC feeds information into AML/CFT programs, which use that information for risk assessment, transaction monitoring, and suspicious activity detection.
Money laundering typically follows three stages. Placement introduces illegal funds into the financial system through cash deposits, currency exchanges, or purchases. Layering creates complex transaction patterns to obscure the money's origin, such as wire transfers between accounts, shell company transactions, or investment purchases. Integration returns the now-disguised funds to the criminal in a form that appears legitimate, such as business revenue, investment returns, or real estate proceeds. AML programs aim to detect and disrupt this process at any stage.
An AML/CFT program is the set of policies, procedures, controls, and systems a financial institution implements to prevent money laundering and terrorist financing. In the United States, this program operates under the Bank Secrecy Act and includes customer identification procedures (CIP), customer due diligence (CDD), transaction monitoring, suspicious activity reporting (SARs), sanctions screening, and employee training. The program must be risk-based, meaning it allocates resources according to assessed risk, with higher-risk customers and activities receiving more scrutiny.
AML and CFT share common infrastructure while addressing distinct threats. Both rely on knowing your customer, understanding expected activity, and monitoring for deviations. Both use the same reporting mechanisms (SARs) and fall under the same regulatory framework (BSA in the United States, FATF recommendations internationally). Effective compliance programs integrate AML and CFT into a unified framework while maintaining appropriate distinctions. Transaction monitoring systems run scenarios for both threats. Training addresses both sets of red flags. Risk assessments evaluate both AML and CFT risk factors.
AML and CFT are related but distinct. Money laundering cleans dirty money; terrorist financing directs funds (clean or dirty) toward violence. Both fall under the same regulatory framework, but effective compliance requires understanding and addressing each threat specifically.
Your compliance program should integrate AML and CFT into a unified framework while maintaining appropriate distinctions. This means separate risk assessment, tailored monitoring scenarios, specific training content, and clear policy language that acknowledges both threats.
The institutions that succeed in this area treat AML/CFT not as a bureaucratic obligation but as a genuine effort to prevent their services from enabling crime and violence. That perspective drives the attention to detail, the investment in technology, and the cultural commitment that effective compliance requires.
Ready to strengthen your AML/CFT program?Book a demo with Zyphe to see how our verification and screening solutions address both money laundering and terrorist financing risks.
We provide templated identity verification workflows for common industries and can further design tailored workflows for your specific business.