arrow left facebook twitter linkedin medium menu play circle

Don’t Be Taken to the Cleaners – Money Laundering Techniques

By Julian Wong September 22, 2016

Photo of Julian Wong

about Julian Wong
Julian is the VP of Customer Success at DataVisor. A proven leader in the realm of trust and safety, Julian developed scalable systems and teams for mitigating fraud and abuse at Indiegogo, Etsy and Upwork. Julian also led Google’s engineering team responsible for building algorithms to prevent fraud on its ad platform.

Money laundering is big business. Criminals use money laundering techniques to cover up funds acquired through illegal activity and make it appear as if they were generated through legitimate and legal means. The fraudster aims to conceal that the funds exist, how he or she acquired them and where they are stored. Whether it’s Walter White using A1A Carwash as a front for his drug business or the Zeta cartel running a horse-racing farm, the ways to launder money are limited only by the fraud organization’s imagination.

horse races as money laundering techniques

Image Credit

People launder money using money laundering techniques for two principal reasons. First, the money can lead a traceable pathway to their fraudulent activity. Second, the cash itself is susceptible to take-over from law enforcement authorities and therefore needs to be protected. To a smaller degree, tax evasion is another reason. No good criminal wants their briefcase full of cash taken away. Regardless of the reason why, the operational steps of money-laundering techniques involve three stages:

  1. Movement – Move the funds away from explicit connection to the illegal activity
  2. Disguise – Obscure the money audit trail and sever the link to the original crime
  3. Return – Reunite the money with the owner from what appears to be legitimate sources 

Often times these stages are also referred to as placement (movement), layering (disguise) and integration (return).

laundring-2 - money laundering techniques


Movement of funds away from its source is the first step in the process. This step is the initial entry of the money or proceeds of a crime into the financial ecosystem. The cash is moved into circulation through banks, casinos, shops and other cash heavy businesses (e.g. restaurants, night clubs). Movement can be carried out through many processes such as:

  • Purchasing assets – The purchase of assets with cash where the primary purpose is to transfer the illegal profits from bulk cash to an equally valuable but less conspicuous form
  • Blending funds – Using a justifiable cash focused business to mix “dirty” funds with the legitimate income
  • Exchanging currency – Buying foreign money with illegal funds through foreign currency exchanges
  • Gambling – Buying casino chips, cashing out the chips and taking check payment or claiming the proceeds as gambling winnings

It is at the movement stage that federal legislation has been put in place (e.g. Bank Secrecy Act, OFAC regulations) to prevent launderers from using money laundering techniques like depositing or converting large sums of cash at financial institutions or taking cash out of the country. This stage is also where money launderers are the most exposed since introducing large amounts of cash and a high volume of small transactions (in order to stay under $10K limits) into the financial system raises red flags.

poker chips for money laundering techniques
Image Credit


After introducing the money into the financial system, the fraudster carries out a series of money laundering techniques, one transaction after another, all designed to hide what they are doing. During this step, the laundering organization adds layers such as moving funds electronically across international borders, reselling assets, investing in overseas stock markets and diverting funds to offshore accounts, shell companies and paying front men. The disguise stage of the process represents the most challenging area of detection. Due to the many layers, it’s hard to trace the funds, especially if the money is moved multiple times from one institution to another. Finding all of the individuals involved, and how they are linked and connected, requires lengthy forensic investigations and advanced correlation algorithms.

Fraudsters know what they are doing. Investing in inconspicuous institutions and spreading activity across many institutions are effective ways to remain under law enforcement’s watch. Many successful money laundering techniques have gone through institutions that most people would never consider as fronts for illegal operations. Who would suspect a family-friendly water park, a resort management company and a charity foundation for cancer? One of the reasons why organized crime syndicates such as drug cartels have continued to flourish is because of their infiltration into hundreds of institutions. They coordinate with so many types of organizations across many countries that eliminating one institution will not hinder their practices.

taxes for money laundering techniques
Image Credit


The final example of money laundering techniques is the integration of the money back into the economy in such a way as to make it look like a legitimate business transaction with an audit trail. Reuniting the funds with the owner can happen a number of ways including;

  • Buying property – Use shell companies to buy property where the revenue from the sale would be considered legitimate
  • Providing loans – Criminals lend themselves their own laundered proceeds in an apparently legitimate transaction
  • Faking invoices – Overstate their income, which comes from over-invoicing to allow inflow of illegally obtained money


Image Credit

Financial crimes unit and anti-money laundering (AML) investigators know that inherent in money-laundering techniques is the requisite that the owner and origin of the funds be hidden. They recognize this and understand at the same time that the owner needs some way to maintain control of the funds. An indirect connection will always exist throughout the process. Looking for these connections between transactions and institutions can turn out to be key in uncovering and busting a money-laundering scheme.

We’re going to continue to dig deeper into the issue of AML here on the blog, but if you’re in the New York area and would like to learn more about Anti-Money Laundering and Compliance, please register for our Trust and Safety Meetup here

Popular Posts

Intelligent solutions. Informed decisions. Unrivaled results.

DataVisor Digital Fraud Trends Report: Q1 2020

Learn More

Download the new “State of Sophistication in Fraud” report from DataVisor to ensure your business is equipped to…

Download the new “State of Sophistication in Fraud” report from DataVisor to ensure your business is equipped to prevent high sophistication threat attacks.

A Guide to Centralizing Data Intelligence

Learn More

Discover AI-powered fraud strategies for preventing financial and reputational damage in this powerful e-book.

Online marketplaces withstand a complicated array of fraud attacks—spam, scam, and all points in between. Only the most comprehensive, proactive AI-powered solutions can fully protect against reputational and financial damage. This e-book details the entire lifecycle of a fraud attack, and lays out…

A Practical Guide to Eliminating False Positives in Fraud Management

Learn More

This e-book explores the next generation of fraud prevention technology, which applies unsupervised machine learning to reduce false positives and risk.

This e-book explores the next generation of fraud prevention technology, which applies unsupervised machine learning to reduce false positives and risk.

Protect your business, your customers, and your data.

Request Demo