The 3 Stages of Money Laundering: Placement, Layering, and Integration

Money laundering is an illegal act in which large amounts of money are used to conduct criminal activities in drug trafficking, terrorism, or any other corruption. Although it is important to note that money laundering is one of the prominent ways of sponsoring terrorist activities, there are differences between money laundering and terrorism. Money laundering is a threat to the global financial system and a serious risk to market integrity. This article is a guide that highlights the three stages of money laundering which are placement, layering, and lastly integration.

The following topics are going to be covered in this article;

  1. Why Understanding the Stages Matters for Compliance
  2. Stage 1: Placement: How Dirty Money Enters the System
  3. Stage 2: Layering: How the Trail Is Hidden
  4. Stage 3: Integration: How Clean Money Returns
  5. Comparison Table: Stages Side by Side
  6. Beyond the 3 Stages: Modern Money Laundering Doesn't Always Follow the Playbook

1. Why Understanding the Stages Matters for Compliance

In the world of Anti-Money Laundering people often think of the "Three-Stage Model" as something for exams. That's a big mistake. For compliance officers understanding these stages is a tool. Each stage has its signs and if a program only focuses on one, it's like leaving a back door open.

Criminals don't launder money in a vacuum; they find spots in banks. By dividing activity into Placement, Layering and Integration a compliance program can move from a guessing approach to a smart defense:

* Placement: This is where we do Know Your Customer (KYC) and Customer Due Diligence (CDD). If the process of bringing in customers is not good then this is where problems can start. At this stage we need to check people and screen them when they enter. This is how we can detect issues at placement. We have to be careful because this is where the problems can enter the system.

* Layering: Once the money is in the criminal tries to hide it by making transactions and using complicated methods.This is where Transaction Monitoring comes in. If your system cannot follow a series of transfers across many places you are missing the layering phase entirely. Transaction Monitoring helps to track these transfers and is used to stop money laundering. The criminals make many transfers to hide the money and use places to make it hard to track.

* Integration: This is the part to figure out because the money seems perfectly fine. To catch this you need to keep an eye on things and check the news for anything bad, about the customer. You are not just looking for a transaction, you are looking for a customer whose life and things they own do not match what they told you about themselves. The money looks clean at this stage so you have to look at the customers lifestyle and assets to see if they suddenly changed in a way that does not fit their profile.

2. Stage 1: Placement

The moment when money is placed into a bank account is really the part of the whole money laundering process. This is when money moves from the world of crime to the open world of bank accounts. For a criminal this is a tricky situation. They have to take amounts of cash, which is hard to handle and dangerous and put it into a bank account without making the bank suspicious.

In this part of the process the money from crimes is in its form. It could be a suitcase of twenty-dollar bills from a drug deal or a bag of money from extortion. The goal is to turn this cash into money that can be used easily and is in a form. Because criminals have to deal with a bank or a financial institution at this stage it is the time when they are most likely to get caught. The money laundering cycle is about hiding the source of the money and placement is a critical part of this cycle.

The Evolution of Placement Methodologies

As the technology and Anti-Money Laundering regulations evolve, financial criminals are quick to adapt to new circumstances and develop new techniques and tactics to launder the illegally obtained money.

A. Traditional Smurfing vs. Modern "Agentic Smurfing"

The basic idea of breaking up an amount of money into smaller parts is still the same. The way people do it has changed a lot.

Traditional Smurfing: A group of people hires 20 runners to go to banks in a city. Each runner puts in $9,000.

Agentic Smurfing: This is also known as AI-Autonomous Micro-Laundering. Agentic Smurfing is when bad people use computer programs to control temporary digital wallets. These computer programs can take an amount of money, for example, $1 million, and break it into many small transactions of $100 each. Agentic Smurfing does this by sending the money through different online platforms and new kinds of banks that do not check things as closely. This creates a lot of transactions that happen all at once which is called a Micro-Transaction Storm. The old ways of watching for activity cannot detect Agentic Smurfing and the Micro-Transaction Storm that it creates.

B. The Cash-Intensive Businesses

The best way to place money is still by using Cash-Intensive Businesses (CIB). Places like laundromats and parking lots and busy restaurants are great for hiding the money. These businesses make a lot of money. There are a lot of people coming and going so it is easy to mix in the dirty money.

For example a pizza shop that really sells 50 pizzas a day can say it sells 200 pizzas. This means the shop can hide 150 pizzas that do not really exist which's like hiding $3,000 of dirty money every day.

Another way to hide money is by making employees. This is a trick where a criminal makes up fake people who work for them and pays them with dirty money. The money is then put into bank accounts that the criminal controls. To the bank it looks like the money is for paying employees, which is a normal thing to do.

Some businesses also make invoices to hide money. For instance a front business might pay much money for things it needs from another company that the same people own. This is like moving CIB money but it looks like the business is just paying for things it needs.

C. The Crypto On-Ramp and OTC Desks

The rules for banks are getting stricter and bad people are going to Over-the-Counter Desks (OTCD) now. These are places where people can buy and sell things without using the regular exchanges. Someone who wants to hide their money can take cash to a broker in a place where the rules are not very clear and get USDT or Bitcoin in a private wallet. This way, they can avoid the people who watch what is happening on exchanges like Coinbase or Binance and they can move their money into the decentralized system very quickly.

Real-World Case Study: The 2023 Canada Real Estate Crisis ($45M)

In British Columbia the police did something. They stopped a group of people who were laundering a lot of money. This money came from selling fentanyl. It was over forty-five million dollars. The way they did it was by using what are called "Underground Banks". These are like banking systems that do not follow the rules of the Bank of Canada.

Here is how it worked. People would carry bags of cash to these brokers. The brokers would then pay off debts that students and tourists from countries had on their credit cards. In return these students and tourists would use their bank accounts to pay for deposits on expensive condos in Vancouver. This plan worked for a time. The reason it worked is that real estate agents and lawyers did not do their job properly. They did not check where the money was coming from. They just accepted payments from other people without asking any questions. For example they did not ask why a student was paying five hundred thousand dollars as a payment, on a condo. The police said that the real estate agents and lawyers failed to do this for years. The group of people laundering money from the trade was able to place the money into the system without being caught.

Red Flags

Detecting activity requires a change in focus from just watching transactions to understanding customer behavior.

Velocity Anomalies: Think of an account that usually has $2,000 in monthly activity but suddenly gets $8,000 in cash deposits every Tuesday at 10:00 AM.

The Threshold Tease: A customer makes deposits between $9,500 and $9,950. They are clearly aware of the $10,000 reporting limit and try to avoid it.

Inconsistent Lifestyle: A customer claims to be a taxi driver. Makes large cash deposits that would require a much higher income, like a CEOs salary.

Geographic Clustering: customers, who are not related, use the same ATM or bank branch within a short time to make deposits that are just below the reporting threshold.

How Smart Systems Detect Placement

Modern AI systems help companies follow rules by using a way to find risks. The AI sets a normal limit for each customer. For example if someone deposits $3,000 but they usually only have $200 the system sends an alert. The system checks if many accounts with deposits have the same IP address, phone number or address. The AI uses simple language checks to look at documents, for strange patterns. This helps find employees or businesses that use fake information.

3. Stage 2: Layering

Placement is about getting the money in. Layering is about covering the money's tracks. You could say, it is like an echo that hides where the money came from. When criminals get their money into the banking system they stop worrying about getting caught and start trying to hide where the money came from.

The goal of Layering is to make it very hard for anyone to follow the money. They want to create a lot of confusion and make it seem like the money is coming from over the place. This is done by moving the money quickly through many accounts in different countries and different types of investments.

Common Layering Tactics

Offshore Transfers: People move their money to places like the Cayman Islands, Panama and the UAE. These places are called "Secrecy Havens" because it is hard to figure out who really owns the money.

Shell Companies: These are like companies that do not really do anything. They just exist on paper. They send each other fake bills for things they did not really do.

Crypto Mixing: They use services like Tornado Cash to mix their money with lots of other money. This makes it hard to follow the money trail on the blockchain.

Trade-Based Money Laundering: This is when people buy or sell things and they lie about how much the things are worth. They might say something costs more or less than it really does just so they can move money across borders.

Real-World Example: The Danske Bank Mirror (€200B)

The Estonian branch of Danske Bank is a good example of what happens when things go wrong with layering. From 2007 to 2015 a huge amount of money around €200 Billion, went through accounts that were not for people who lived in the country.

The problem was that the bank did not have enough checks in place. They thought all these big money transfers were normal business. The way it worked was that money was sent through companies in the UK that were supposed to be dormant. These companies were like middlemen for money from Russia, which was then put into the global market. The money was moving so fast. Billions of euros were going in and out of accounts, on the day that it should have been a big warning sign. The bank ignored it because the Estonian branch was making a lot of money from it.

Red Flags

The "Pass-Through" Pattern: This is when accounts get a lot of money and then the money leaves away and the account does not have much money in it after that. The account is like a pipe money goes in and then it goes out.

Round-Tripping: This is when money leaves a country. Then it comes back a little while later and it is called something like "investment" or "fees for consulting".

Jurisdictional Misalignment: For example a construction company in Turkey gets a lot of money from a company in the Virgin Islands for "software" which does not make sense.

Breaking the Chain: This is when someone does not want to say where they got their money. They say it is a secret.

How Smart Systems detect layering

Layering is very complicated. It is not easy to make rules for it. Now people use ways to look at things like Graph Theory and Link Analysis:

They make a map of all the accounts and how they are connected. They find groups of accounts that're like friends even if they have different names. They look at how money's moving and they find patterns that are like what money launderers do.

They use computers to look at lots of information and find the people who really own the companies like a person in Panama who is connected to someone in Singapore. They find the shell companies before anything bad happens.

4. Stage 3: Integration

Integration is like the win of the money laundering process. The money has already gone through the tough part of getting into the system and the confusing part of being moved around. Now it is time for the money to be changed one time. The people doing this want to make the money look like it was made from an investment or a successful business. They want it to seem like they just got lucky.

At this point the money is clean. It is no longer considered money. The people who got the money illegally can now use it to buy things, like Ferraris, houses or give money to politicians without worrying that it will be taken away. This is because they have papers that make it look like the money came from a place, which is called the Source of Wealth.

Common Integration Methods

Real Estate Investment: People buy luxury condos in London or New York. Then sell them after a year. The money they make from this sale is called "Clean Sale Proceeds."

Luxury Assets: Some people buy things like art, yachts or rare watches. These things are like " wealth" that can be sold again.

Loan-Back Schemes: A person who does something lends" their own dirty money back to their real business from a company in another country that does not really do anything. They even pay interest to themselves. They can deduct this interest from their taxes.

Real-World Example: The 1Malaysia Development Berhad (1MDB) Scandal ($4.5B)

The 1MDB scandal is an example of how people hide dirty money. More than $4.5 Billion was taken from a state fund. To make this money look clean the people involved used it to make Hollywood movies, like The Wolf of Wall Street. They bought a $250 million yacht, paintings by Van Gogh and Monet and luxury apartments in Manhattan. Because this money came from what looked like investment funds and was spent on expensive things it seemed like the spending of a very rich person not like money stolen from a country.

Red Flags

Unexplained Wealth: When someone who says they make $50,000 a year suddenly buys a $5 million house.

Rapid Property Flipping: Buying and selling real estate fast at prices that are not normal for the market.

Adverse Media: When someone's name is in a news report or a database that shows information like the Pandora Papers.

How Smart Systems Detect Integration

Integration detection is based on monitoring and external data. Smart Systems products scan media reports and lists of Politically Exposed Persons. If a customer suddenly shows up in a corruption probe in another country, their risk score goes up.

The system also uses wealth checks to compare a customer's asset growth to their declared income. This helps flag a wealth gap that could mean the customer has funds. The system looks for cases where the customer's assets grow faster than their income. This could indicate that the customer has integrated funds.

5. Comparison Table: Stages Side by Side

Stage

Goal

Common Methods

Risk Level for Criminal

Detection Opportunity

SS Product Capability

Placement

Inject cash into the system

Smurfing, Cash business, Casinos

Highest (Physical evidence)

Onboarding / KYC

Transaction Screening & Risk Scoring

Layering

Hide the audit trail

Wire chains, Shell companies, Crypto

Medium (Digital trail remains)

Transaction Monitoring

Network Analysis & Behavioral Heuristics

Integration

Return funds as "clean"

Real estate, Luxury goods, Loans

Lowest (Looks legitimate)

Perpetual KYC / Adverse Media

PEP Screening & Ongoing Monitoring

6. Beyond the 3 Stages: The Multi-Dimensional Matrix of 2026

While the 3-stage model is very important, criminals in 2026 often see it as a suggestion. To build a top-notch compliance program you need to understand the details that go beyond this sequence:

A. The Crypto Shortcut:

In cybercrime like ransomware and phishing the money starts out digital in cryptocurrency type. There's no "Placement" stage because the bad money is already in a wallet. The criminal goes to Layering using decentralized exchanges and then to Integration by buying luxury items with crypto debit cards. If your anti-money laundering program waits for a cash deposit to set off an alert you will miss catching cyber-criminals.

B. Trade-Based Laundering:

This method combines three steps in one. By over-invoicing a shipment a criminal gets the money into the trade system (Placement) , moves it across borders (Layering) and receives it as a trade payment (Integration) all in one transaction. It's a system for financial crime.

C. State-Sponsored Laundering:

When a sanctioned country launders money the funds are often already in their bank. There's no Placement stage. The goal is just to confuse and hide the money (Layering) and get access to it (Integration).

Wondering how Sanction Scanner's AI-powered FUSION platform helps your AML & Compliance program? Request a demo