False Positive Handling
A false positive (FP) occurs when a legitimate transaction receives a HIGH or CRITICAL risk score, resulting in an unnecessary block, step-up challenge, or alert. Managing false positives is a core fraud operations task: too many FPs increase customer friction, generate unnecessary case workload, and can damage customer trust.
FraudShield AI provides four mechanisms for managing false positives: alert disposition feedback, suppression rules, customer and entity whitelisting, and challenge-based step-up authentication.
Alert disposition workflow
Every alert generated by FraudShield AI enters the Case Manager queue. Analysts review the alert and mark a disposition. Dispositions feed back into the model's training dataset and influence future RI scoring for the same account.
| Disposition | Meaning | Model feedback effect |
|---|---|---|
| Confirmed Fraud | Transaction is verified as fraudulent. Fraud loss recorded. | Positive label added to the training dataset. Supports the model's fraud signal on this account and typology. |
| Suspicious — No Action | Transaction is suspicious but not confirmed fraud. No action taken (insufficient evidence). | Soft label. Included in model monitoring but excluded from retraining unless promoted by the data science team. |
| False Positive | Transaction is confirmed legitimate. Customer friction caused unnecessarily. | Negative label. Suppression rule candidate generated for analyst review. Contributes to FPR metric in tuning reports. |
| Duplicate Alert | A second alert was raised for the same transaction or related case already under review. | Excluded from training. Deduplication rule generated. |
Suppression rules
Suppression rules prevent alerts from being created for transaction patterns that analysts have repeatedly confirmed as legitimate. They don't change the risk score — the score is still calculated — but they suppress the alert at the Decisioning Engine stage before it reaches Case Manager.
Suppression rule parameters
| Parameter | Description | Example |
|---|---|---|
bta_id |
Restricts the rule to a specific BTA. Use * for all. |
ACH_CREDIT_BATCH |
score_max |
Maximum risk score to suppress. Alerts above this score are never suppressed. | 650 |
ri_driver |
Suppresses only alerts where a specific RI is the top contributor. | RI_VELOCITY_TRANSFER_1H |
account_segment |
Restricts the rule to a customer segment. | HNW, BUSINESS, ALL |
expires |
ISO 8601 date when the rule expires automatically. Always set an expiry. | 2026-06-30 |
review_owner |
Analyst or team responsible for reviewing this rule at expiry. | fraud-ops-team@bank.com |
expires date no more than 180 days in the future. Rules are reviewed and renewed by the owner before expiry.
Customer and entity whitelisting
Whitelisting reduces the risk score for a specific account, customer, or trusted payee. Unlike suppression rules, whitelisting affects the score itself by applying a score reduction factor before the decision is made. Use whitelisting for established high-value business customers or internally verified payees.
Whitelist types
| Type | Applied to | Score reduction | Use case |
|---|---|---|---|
| Account whitelist | Originator account ID | Configurable (default: −150 points) | Long-standing high-value business customer with zero fraud history. |
| Payee whitelist | Beneficiary account number | Configurable (default: −100 points) | Internally verified payee (e.g., company's own payroll account, tax authority). |
| Trusted device whitelist | Device fingerprint ID | Configurable (default: −80 points) | Company-issued device enrolled through the trust registry after IT verification. |
Challenge / step-up authentication
For transactions scoring in the HIGH range (default 550–749), FraudShield AI returns a STEP-UP decision instead of an outright BLOCK. The originating channel uses this signal to present an additional authentication challenge before allowing the transaction to proceed.
Step-up decision flow
Transaction scored → Decision: STEP-UP
│
▼
Channel presents challenge to customer
├─ SMS OTP (for mobile app or web)
├─ Push notification (for enrolled mobile app)
├─ Voice callback (for high-value wire transfers)
└─ In-branch identity verification (CRITICAL score override)
│
┌────┴────────────────────────────┐
│ Customer passes challenge │ Customer fails / times out
│ │
▼ ▼
Channel re-submits transaction Transaction blocked
with challenge_result: PASSED Alert raised in Case Manager
│
▼
FraudShield re-scores with
challenge_passed=true flag
(reduces score by configured amount)
│
┌────┴───────────────┐
│ Revised score LOW │ Revised score still HIGH/CRITICAL
│ │
▼ ▼
APPROVE BLOCK + case alert
challenge_passed=true is set in threshold-config.yaml under step_up_score_reduction. The default is −200 points. Don't set this so high that a step-up pass always results in APPROVE regardless of score.
Analyst feedback loop
Analyst dispositions in Case Manager are the primary feedback signal for ongoing model improvement. The feedback loop runs as follows:
- Analyst marks an alert as False Positive in Case Manager.
- FraudShield AI logs the disposition with the transaction's full RI profile.
- The Tuning Insight Report (generated weekly) groups FP dispositions by their dominant RI driver.
- The fraud operations team reviews the report and identifies RI miscalibrations driving FP clusters.
- Tuning changes are made to the RI score scale or threshold (see Threshold Tuning).
- Confirmed fraud dispositions are added to the model retraining dataset (see Model Retraining Cycle).