The author

Ben Archer

Lead Consultant

View profile
News & Views / Smarter fraud and AML convergence: Escaping the silos
06 March 2026

Smarter fraud and AML convergence: Escaping the silos

Fraud and AML capability has advanced, yet in many institutions the functions still operate on separate data, systems and incentives, creating exposure where the initial compromise, movement of funds and subsequent laundering activity are never connected.

Synthetic identities move from onboarding into funded products, and account takeover can quickly develop into mule activity. Yet the initial compromise, movement of funds and regulatory reporting obligation often remain split across different systems and teams.

What’s required is a single view of customer and network risk across fraud, AML and credit.

Key takeaways from this article

  • Fraud, AML and credit risk continue to operate on separate data, systems and incentives. Organised mule networks do not.
  • Synthetic identities, ATO events and destination accounts frequently move between fraud alerts, disconnected KYC checks and AML monitoring without full linkage.
  • Convergence is architectural: a single, continuous customer view supported by shared graph analytics and bidirectional data flow.
  • Linking compromise events with subsequent layering activity enables network-level visibility of organised crime.
  • In 2026, regulators will expect unified streaming data, coordinated model orchestration and demonstrable feedback loops across domains.

 

Why separate fraud and AML functions create data silos that weaken detection

Fraud teams typically focus on the point of immediate financial loss, often missing the low-velocity transactions of the destination accounts. Conversely, AML teams might spot the subsequent layering of funds but lack the real-time fraud alerts needed to connect the money to a specific crime, allowing organised mule networks to operate undetected.

For instance, fraud systems may successfully flag a synthetic identity for credit or application risk. However, if that intelligence is stuck in a silo, AML teams might still approve the same profile through disconnected KYC checks. This allows criminals to establish seemingly legitimate accounts for long-term money laundering.

When fraud systems treat an account takeover primarily as an isolated cybersecurity or localised loss event without passing the context downstream, AML systems are left blind. They may view the subsequent rapid fund transfers simply as legitimate customer activity, missing the critical link that the compromised account is actively being used to wash stolen funds.

↪️ Further reading: Credit fraud trends shaping 2026 lending strategies

Jaywing blog

What effective fraud–AML convergence looks like

Instead of maintaining separate data lakes for AML, often batch-focused, and Fraud, operating in real time, genuine convergence relies on a single, continuous view of the customer.

Both systems feed into and draw from the same graph database. That graph links:

  • Initial KYC/KYB onboarding data
  • Real-time biometric intelligence
  • Device intelligence
  • Transactional intelligence

This enables institutions to map the full network of relationships rather than assess activity in isolation.

The flow of data is not one-way. Intelligence moves in both directions.

  • Confirmed money laundering typologies uncovered during deep AML investigations are fed back to tune front-end fraud prevention controls.
  • Mule networks identified within AML analytics inform onboarding and account controls.
  • Real-time behavioural and transactional signals captured by fraud systems are made available to AML analytics.

This allows layering activity to be connected to a specific compromise event and viewed within the wider network context.

Fraud and AML therefore operate against the same underlying customer and network view rather than through separate monitoring.

The signals that become more powerful when fraud and AML models are linked

Fraud teams rely heavily on non-financial data to detect anomalies. This includes IP addresses, device fingerprinting, location data and behavioural biometrics such as typing cadence.

When linked to AML systems, this non-financial data becomes a powerful predictor of activity associated with money laundering.

Administrative account preparation

Fraud models actively track administrative actions such as password resets, sudden address updates and the rapid addition of new payees.

These signals can reveal when a dormant account is being prepared or taken over specifically for money laundering before any significant funds actually move. If that intelligence is available to AML monitoring, investigators gain context at an earlier stage of the lifecycle.

Linking compromise to layering

The greater analytical advantage comes from linking the initial point of compromise or victim identified by Fraud with the destination accounts and subsequent layering processes tracked by AML.

Bringing these elements together within a unified graph enables institutions to map entire organised crime syndicates and mule networks in one view.

Graph databases are not used enough in this context. When deployed properly, they materially strengthen the ability to identify and disrupt organised financial crime.

Jaywing blog

Where governance and ownership break down

When fraud, AML, credit risk and financial-crime controls interact, ownership frequently breaks down. And the consequences are rarely immediate.

Take the case of a synthetic identity or first-party fraudster defaulting on a credit product. In many institutions, that event is categorised by Credit Risk as a simple “bad debt” rather than financial crime. As a result, the intelligence does not travel. Fraud and AML teams lose visibility, and organised networks are able to continue exploiting the institution under the guise of poor credit performance.

Part of the difficulty lies in how performance is measured. Fraud teams are typically assessed on direct loss reduction and low customer friction. AML is measured on regulatory compliance and investigative thoroughness. Credit risk records impairment. Each function delivers against its own mandate, yet the underlying activity cuts across all three.

Receiving accounts used by money mules expose this most clearly. Inbound funds do not generate a direct financial loss for the receiving institution, so fraud metrics remain unaffected. Fraud teams may therefore disown the risk. AML owns the regulatory exposure associated with illicit fund movement, but often lacks the real-time operational mandate or automated tools required to block the funds.

The result? Fragmentation. Mule management sits in an ownership grey area, precisely because no single function sees it as fully theirs.

↪️ Further reading: Managing model risk using next-gen model-governance infrastructures

What a unified fraud–AML architecture needs by 2026

Governance alignment alone does not resolve the structural issues described above. The architecture itself has to change.

1. A unified streaming data layer

The reliance on real-time data for Fraud and delayed, batch-processing for AML is obsolete.

A compliant architecture requires a unified, streaming data layer where fraud’s rapid behavioural and transactional responses instantly enrich AML’s deep historical and network data. Without this integration, the connection between the initial compromise and subsequent layering activity is delayed.

2. Sequenced model orchestration

Rather than running isolated rules, the architecture must seamlessly sequence specialised machine learning models.

This means executing fast fraud-prevention models at the front end alongside deep, graph-based AML network analytics. When these models operate separately, visibility of the wider network is limited.

3. Consolidated investigative environment

Operational effectiveness depends on consolidating fraud alerts, identity risk and AML monitoring within a single investigative environment.

Segregated case management restricts context. A unified view allows investigators to assess compromise, movement of funds and network exposure together rather than in parallel processes.

4. Automated feedback loops

The monitoring architecture must include an automated feedback loop that allows investigative outcomes to be used near-instantly in both front-end fraud controls and back-end AML models.

This supports a continuously improving compliance posture and provides regulators with evidence that controls are active rather than static.

Building a single view of financial crime risk

A compliant architecture requires a unified, streaming data layer where fraud’s rapid behavioural and transactional responses instantly enrich AML’s deep historical and network data.

Rather than running isolated rules, specialised machine learning models must execute fast fraud-prevention controls alongside deep, graph-based AML network analytics. These models need to operate within the same decisioning structure.

Operational effectiveness depends on consolidating fraud alerts, identity risk and AML monitoring in a single investigative environment. Segregated queues limit context.

The monitoring architecture must also include an automated feedback loop that allows outcomes to be near-instantly used in both front-end fraud controls and back-end AML models, demonstrating a continuously improving compliance.

Where does your intelligence stop?

Synthetic identities recorded as bad debt. Mule receiving accounts outside fraud loss metrics. Batch AML operating separately from real-time fraud monitoring.

If those scenarios are familiar, the issue may sit in how data, models and ownership are structured.

We work with financial institutions to review fraud–AML data flows, model sequencing and governance accountability, and to design architectures where compromise, movement of funds and regulatory exposure are analysed together.

If you are reassessing your fraud–AML operating model, we can help.