Sanctions Screening Software Isn’t Foolproof

Article Summary
Sanctions screening software automates the process of checking individuals, entities, and transactions against sanctions lists to ensure compliance with AML regulations.
It can produce false positives, miss evolving sanctions, and rely on incomplete or outdated data, leading to compliance gaps.
False positives occur when the software flags individuals or entities incorrectly, often due to name similarities or incomplete data.
By combining automated tools with manual reviews, updating sanctions lists regularly, and leveraging advanced technologies like AI and machine learning.
Human oversight is critical for reviewing flagged results, resolving false positives, and ensuring compliance with complex regulations.
Sole reliance can lead to missed sanctions, regulatory penalties, and reputational damage if compliance gaps are not addressed.
Last week the Treasury Department’s Office of Foreign Assets Control (OFAC) announced that it had reached an agreement with Apple, Inc., to resolve apparent violations of the Foreign Narcotics Kingpin Sanctions Regulations (“FNKSR”). Apple allegedly violated the FNKSR by hosting, selling, and facilitating the transfer of software applications developed by SIS, d.o.o. (“SIS”), a Slovenian software company. While the $470,000 settlement is the equivalent of a rounding error for the trillion-dollar company, the interesting part of the settlement agreement was the level of detail regarding Apple’s sanctions screening missteps and their resulting commitments to improve. The settlement highlights the importance of detailed screening procedures for the use of sanctions screening software and adequate employee training to resolve potential red flags.
Apple entered into an app development agreement with SIS in 2008. On February 24, 2015, OFAC added SIS and its director/majority owner, Savo Stjepanovic, to its List of Specially Designated Nationals and Blocked Persons (the SDN List) for their role in an international steroid trafficking ring led by a Mihael Karner. As part of the announcement, OFAC provided SIS’s address, registration number, tax ID number, Mr. Stjepanovic’s date of birth and passport number as well as a diagram titled “KARNER Steroid Trafficking Network” linking SIS and Mr. Stjepanovic. Apple used its sanctions screening tool to screen app developer account holder names, but the tool failed to identify SIS as a blocked entity. According to Apple, the tool failed to match the upper case “SIS DOO” in Apple’s system with the SDN List’s lower-case version of “SIS d.o.o.” even though the system did match an address for SIS. Note that the term “d.o.o.” is a standard corporate suffix in Slovenia to identify limited liability corporations.
In addition to missing SIS, ties to Mr. Stjepanovic went undetected by Apple’s screening software tool. Mr. Stjepanovic was listed as an “account administrator” in SIS’s App Store developer account and not as a “developer.” According to Apple, the company’s compliance procedures in place at the time did not screen all individual users identified in an App Store account but limited its search to those identified as “developers.” As a result, Apple continued to host SIS’s apps in the App store, allowed downloads and sales, received payments from App Store users downloading the app, permitted SIS to transfer and sell its apps to two other developers, and remitted funds on a monthly basis. It was not until February 2017 that Apple identified SIS as a potential hit following enhancements to its sanctions screening tool. In that two-year period, Apple had made 47 payments associated with the blocked apps and collected a little over $1.1 million from App Store customers who had downloaded SIS apps.
As part of the enforcement announcement, OFAC highlighted various measures that Apple has undertaken to minimize risks in the future, including:
- An increased role for the Global Export and Sanctions Compliance Senior Manager in the escalation and review process;
- Reconfiguration of its primary sanctions screening tool to fully capture spelling and capitalization variations and to account for country-specific business suffixes;
- Annual review of the tool’s logic and configuration;
- Expanded sanctions screening to include app developers as well as their designated payment beneficiaries and associated banks;
- Updated employee instructions to review potential SDN matches flagged by the primary sanctions tools; and
- Mandatory training for all employees on export and sanctions regulations.
Apple isn’t the only company to have software screening issues come to light before OFAC. Earlier this fall, General Electric Company (“GE”), on behalf of three current and former GE subsidiaries [Getsco Technical Services, Inc.; Bentley Nevada; and GE Betz (collectively, the “GE Companies”)], agreed to settle potential civil liability for alleged violations of the Cuban Assets Control Regulations for accepting payment from the Cobalt Refinery Company (“Cobalt”) for invoices issued to GE’s Canadian customer. Although Cobalt had appeared on the SDN List since June 1995, the company’s status as an SDN went undetected by sanctions screening software used by the GE Companies because the software had been screening for an acronym used by Cobalt (“Corefco”), rather than its full legal entity name as listed on the checks received by the GE Companies and listed on the SDN List.
Similarly, in 2018, JP Morgan Chase Bank also received a Finding of Violation from OFAC for violations of the FNKSR and the Syrian Sanctions Regulations when it processed transactions and maintained accounts for six customers identified on the SDN List. The software screening system they had in place from 2007 to 2013 failed to identify customer names with hyphens, initials, or additional middle or last names as potential matches to similar or identical names on the SDN List. Additionally, employees failed to further investigate the potential red flags despite similarities in names, addresses, and dates of birth.
Each of these cases provides a snapshot as to how minor breakdowns in the sanctions screening software and/or accompanying employee procedures can result in potential violations going undetected. As described in its Framework for OFAC Compliance Commitments published on May 2, 2019, root causes of screening software deficiencies arise when organizations fail to update their screening software to incorporate updates to the SDN List or the Sectoral Sanctions Identifications List, fail to include pertinent identifiers like SWIFT Business Identifier Codes for financial institutions, or did not account for alternative spellings of prohibited parties or countries (i.e., Habana instead of Havana). When selecting a screening software solution, it’s important to ensure that the solution is capable of recognizing each data element and is able to conduct fuzzy logic searches to identify potential matches.
However, even with these features added, a screening software tool will only be as effective as the accompanying procedures used to implement the software. Companies should screen customers, intermediaries, or other parties involved in the transaction, including those mentioned in commercial and financial documents in order to identify sanctioned destinations, parties, or dealings. Further, procedures should detail a process for employees to escalate a hit for further review to resolve potential matches. This requires training employees on the importance of sanctions screening as well as the company’s specific policies and procedures to vet information and react to potential red flags.
In short, while most screening software tools are comprehensive, the human element is key. Operators have to be adept at operating the screens, analyzing the results, and following up with additional scrutiny when warranted. Otherwise, the right tool may produce the wrong outcome.
Key Points
What is sanctions screening software?
- Definition: Sanctions screening software is a specialized tool that automates the process of screening individuals, entities, and transactions against sanctions lists. It helps organizations comply with Anti-Money Laundering (AML) regulations and avoid engaging with sanctioned parties.
- Purpose: The software reduces manual effort, streamlines compliance processes, and ensures adherence to global sanctions programs administered by bodies like OFAC.
Why isn’t sanctions screening software foolproof?
- False Positives: The software often flags individuals or entities incorrectly due to name similarities, incomplete data, or overly broad matching criteria.
- Evolving Sanctions Lists: Sanctions lists are frequently updated, and software may not always reflect the latest changes in real time.
- Data Gaps: Incomplete or outdated data in the system can lead to missed sanctions or incorrect results.
- Complex Scenarios: The software may struggle with nuanced cases, such as identifying sanctioned entities operating under aliases or through intermediaries.
What are false positives in sanctions screening?
- Definition: False positives occur when the software flags individuals, entities, or transactions as potential matches to sanctions lists, even though they are not actually sanctioned.
- Causes:
- Name similarities (e.g., common names or transliterations).
- Incomplete or inaccurate data in the screening system.
- Overly broad matching algorithms.
- Impact: False positives can slow down operations, increase compliance costs, and frustrate customers or business partners.
How can organizations address the limitations of sanctions screening software?
- Combine Automation with Manual Reviews: Use human oversight to review flagged results and resolve false positives.
- Regularly Update Sanctions Lists: Ensure the software is updated with the latest sanctions data to avoid compliance gaps.
- Leverage Advanced Technologies: Incorporate AI, machine learning, and natural language processing (NLP) to improve accuracy and reduce false positives.
- Conduct Regular Audits: Periodically review the effectiveness of the software and refine its settings to align with organizational needs.
What role does human oversight play in sanctions screening?
- Critical Review: Human oversight is essential for analyzing flagged results, resolving false positives, and identifying nuanced risks that automated systems may miss.
- Regulatory Compliance: Trained personnel ensure that the organization adheres to complex and evolving regulations.
- Risk Mitigation: Human intervention helps prevent errors that could lead to regulatory penalties or reputational damage.
What are the risks of relying solely on sanctions screening software?
- Missed Sanctions: Incomplete or outdated data can result in missed matches, exposing the organization to regulatory penalties.
- Regulatory Penalties: Failure to comply with sanctions regulations can lead to fines, legal action, and reputational harm.
- Reputational Damage: Engaging with sanctioned entities, even unintentionally, can harm an organization’s reputation and erode stakeholder trust.
- Operational Inefficiencies: Over-reliance on software without human oversight can lead to delays and inefficiencies caused by unresolved false positives.



