What Are the Techniques of Money Laundering?

Money laundering is a way of changing "dirty" money from illegal activities like selling drugs or gang crimes into money that looks like it came from a good source.

This process usually happens in three steps. First there is placement, where cash is put into the banking system. Then there is layering, which involves complicated deals and moving money to other countries to hide where it came from. Finally there is integration, where the money that now looks clean is put back into the economy by buying houses, art or businesses.

By making it look like the money is from a source criminals can use it without anyone noticing. This is why strong Anti-Money Laundering (AML) systems are important to keep the financial system safe and transparent. Money laundering is a problem so we need to stop it by following rules and checking transactions. The goal is to make sure that money laundering does not happen and that is why AML rules are, in place.

The techniques of money laundering are many and varied. These methods range from simple to complex. Simple methods include breaking up amounts of money into smaller deposits, a process known as smurfing. However, in todays age money laundering techniques have become more sophisticated. Cryptocurrency tumblers and decentralized finance protocols are used nowadays. These methods make it hard to track the money. So understanding these techniques is key to stopping money laundering. A robust AML defense is needed. It must be able to keep up with the evolving methods.

The following topics are going to be covered in this article;

  1. Why Criminals Constantly Evolve Their Techniques
  2. Smurfing and Structuring
  3. The Strategic Use of Shell Entities and Front Businesses
  4. Trade-Based Money Laundering
  5. Real Estate Money Laundering
  6. Cryptocurrency and the DeFi Money Laundering
  7. Casino and Gambling Money Laundering
  8. Money Mules
  9. Professional Enablers
  10. The Comparison Table of Money Laundering Methods

signs that may indicate money laundering and terrorist financing activities, helping to identify and prevent these activities

1. Why Criminals Constantly Evolve Their Techniques

The landscape of this crime is changing a lot. It is becoming more complex and harder to detect. The main reason behind this change is the “Red Queen Hypothesis”. This means that criminals who want to do things with money must keep innovating and finding new ways to stay one step ahead of the regulators.

This creates a situation where only the tech-savvy groups survive. These techniques keep changing because compliance has moved from following rules to a more dynamic approach. Modern systems that monitor transactions now use patterns to find anomalies. In response bad people have started using “Financial Camouflage”.

This involves making their illegal activities look like business activities. They are not just hiding money; they are hiding what the money is for.

We are seeing a change where traditional cash movements are being combined with protocols. This creates a “grey zone” that old systems struggle to understand.

The rise of “Regulatory Arbitrage” allows these groups to use laws in different countries. A group might use a country with laws for its front operations. At the time it routes its money through countries with secretive laws. For compliance officers the job has changed from following rules to needing deep intelligence. Understanding how cash works is not enough; one must also understand evasion and legal loopholes.

2. Smurfing and Structuring

Smurfing is a financial practice that involves breaking up a large sum of money into smaller transactions in order to avoid detection by regulatory authorities. Typically, this is done by distributing cash obtained through illegal means among multiple individuals, known as "deposit experts" or "smurfs," who then make deposits into various accounts at different financial institutions.

Structuring is a financial practice that involves breaking down large transactions into smaller sums to avoid detection by regulatory authorities and Anti-Money Laundering/ Counter-Terrorism Financing (AML/CTF) reporting requirements. Money launderers often use this method of "placement" to make multiple deposits without triggering cash reporting requirements. However, this approach can backfire if a vigilant financial institution detects a pattern of deposits just below the reportable threshold, which may prompt them to report suspicious activity to local regulators.

Structuring is more than a simple tactic. It is a game of cat-and-mouse played against reporting limits. The Bank Secrecy Act (BSA) in the United States flags cash movements over $10,000. However, to people this threshold is not a deterrent; it is a guide.

If moving an amount of money at once is too obvious you break it into smaller pieces. This is the philosophy of “smurfing”. By using people or “smurfs” an organization can break up a large amount of money into smaller deposits.

Detection has moved past flagging deposits close to $10,000.

Modern systems now look for patterns like " Geographic Clustering".

  • The Velocity Metric: Systems analyze why many people with profiles are making similar deposits in the same area within a short time.

To counter reporting smurfs have shifted to “Cross-Bank Structuring”. They use different banks at the same time betting that these banks do not share transaction data.

Often, the smurfs are the link. They are frequently recruited through engineering or financial desperation. By the time suspicious activity is. Law enforcement intervenes, the main person behind the scheme is already gone.

3. The Strategic Use of Shell Entities and Front Businesses

While smurfing focuses on moving cash the next stage. Layering. Needs a complex shield. This is where the “Corporate Veil” is used. A shell company and a front business seem similar. They are different methods of hiding.

A shell company is like a ghost. It exists on paper with no physical presence, workforce or commercial output. Its main use is its anonymity. In countries known for secrecy, these entities act as “Value Reservoirs”.

A criminal doesn’t directly own a company. They own a Trust, which owns a Limited Liability Partnership (LLP) which owns the shell company. This creates a structure. The Corporate Transparency Act (CTA) tries to stop this by requiring Beneficial Ownership Information (BOI) reporting.

A front business is a real operation with customers, rent and employees. The goal is to hide the source of its revenue. High-cash businesses like laundromats or restaurants are often used.

The business provides a service but the accounts are “padded”. If a restaurant sells 100 pizzas the bookkeeper records 500. The “extra” revenue is actually cash, now disguised as legitimate sales.

Further complicating this is the “Shelf” Corporation. These are companies that were set up years ago but not used. Bad people buy these entities because they come with a pre-existing credit history. A company established in 2012 is less likely to trigger a risk alert at a bank, than one set up week. This “synthetic aging” of a business entity is a way to manipulate compliance algorithms.

4. Trade-Based Money Laundering

Trade-Based Money Laundering (TBML) is often called the " matter" of finance. It’s huge and everywhere. Hard to see. While regulators focus on wire transfers and cash deposits TBML uses the $20 trillion global trade. It shifts from moving money to moving value. Here shipping containers replace suitcases and commercial invoices become tools to hide value.

The core of TBML is lying about the price, quantity or quality of goods in trade.

  • Over-Invoicing: This is a tactic. An exporter ships grade industrial scrap worth $10,000 but issues an invoice for $1,000,000. When the importer pays this invoice $990,000 of illicit value moves across borders as a trade payment. To the bank it looks like a trade payment.
  • Under-Invoicing: High-value goods like microchips or luxury textiles are. Invoiced at 5% of their market value. The receiver sells these goods at the market price making a huge untraceable profit.

4.1. Phantom Shipments and Black Market Peso Exchange

  • Phantom Shipments: This is the daring form of TBML. Criminals create documents to justify “trade payments” for goods that don’t exist.
  • The Black Market Peso Exchange (BMPE): This is a form of TBML. It’s like a decentralized currency swap. A drug cartel with "dollars finds a “peso broker” who uses those dollars to buy legitimate goods for export. These goods are shipped, sold for currency and the “clean” proceeds are handed to the cartel. The money never crosses a border; only the value does.

4.2. Advanced Detection: Unit Price Analysis (UPA) and Big Data

Detecting TBML requires understanding commodity markets. Forensic auditors use Unit Price Analysis (UPA) to compare invoiced prices, against global mean indexes. If a company imports goods at a price 400% than the current index the transaction is flagged.

However there’s an “Information Gap.” Most trade documents are paper-based and banks rarely see the goods. This creates a vulnerability that criminals exploit. To fight TBML compliance must integrate tracking data, customs records and real-time market pricing. This turns the “noise” of trade into a clear signal of criminal intent.

5. Real Estate Money Laundering

Real estate is still the most attractive safe-haven for illegal money. Unlike bank deposits, which are closely monitored, real estate is an asset. It lets criminals move millions in a rare transaction offering both a useful property and long-term value growth.

The main weakness in estate is the lack of transparency about who really owns a property. For years wealthy individuals and criminal groups have used nominee purchasers or shell companies to buy luxury homes. In cities like London, New York and Miami billions are tied up in ghost mansions—properties owned by companies that hide the real owner.

Launderers also exploit the subjectivity of property valuation. In a Price Manipulation scheme a property worth $2 million is officially sold for $1 million. The remaining $1 million is paid under the table in cash or via offshore transfers. When the buyer sells the property a year later for its value of $2 million they have successfully realized a $1 million profit that appears entirely legitimate.

Regulators have responded with Geographic Targeting Orders, which require title insurance companies to identify the people behind any company making an all-cash purchase above a set amount. The introduction of Unexplained Wealth Orders in places like the UK has also changed the rules. If a foreign official with a salary owns a £20 million estate the government can take the property unless the owner can prove the money is legitimate.

Sanction Scanner Request Demo

6. Cryptocurrency and the DeFi Money Laundering

Modern launderers rarely use one blockchain. They use Chain-Hopping to break the trail of a transaction. For example illegal funds in Bitcoin are moved through a -chain bridge to Ethereum then swapped for a privacy-focused asset like Monero. There are certain concepts when it comes to cryptocurrency and money laundering. One of them is crosschain bridges, these are smart contracts that lock an asset on one chain and create a matching token on another. These bridges often have no oversight acting as black boxes that erase the history of the original asset.

There is also significant roles of privacy-enhancing technologies that are used by criminals as well. Mixers and tumblers are the direct way to hide transactions on the blockchain. These tools use Zero-Knowledge Proofs. A user puts crypto into a shared pool with many others. When they withdraw to a clean address the system proves they are allowed to take out funds but does not show which deposit was theirs.

In addition to cryptocurrencies, DeFi protocols let people lend, borrow and trade without an authority. Criminals use these permissionless systems for Yield Laundering. By adding money to a decentralized exchange a criminal can earn rewards as governance tokens. These rewards look like investment income but the original money is still illegal.

7. Casino and Gambling Money Laundering

The gambling industry is often used for money laundering during the placement and integration stages because it handles large amounts of untraceable cash. Casinos work like banks. Have fewer reporting rules, than big financial institutions.

The main idea behind casino laundering is to turn cash into a casino check that can be verified. People who do this use a technique called hedging to avoid being flagged for suspicious activity. Of just buying chips and then cashing out which would raise an alert they play games like Baccarat or Craps that have a high return rate.

An advanced method involves two people at a Roulette table. One person bets $25,000 on 'Red'. The other person bets $25,000 on 'Black.' Unless the ball lands on zero they keep most of their money. After a hours they cash out. To the casino they look like rollers who broke even. The check they get can be deposited in any bank as gambling winnings so they do not have to explain where the cash came from.

Vancouver model shows how organized crime groups use people called Junket Operators to move money across borders. A criminal in China pays a junket operator in currency. The operator gives the value in casino chips to an associate in a Canadian or Australian casino. The associate gambles for a time and then cashes out in Canadian or Australian dollars. This process avoids restrictions on moving money out of the country and launders the money into a stable currency.

Gambling has brought in a technique called Chip Dumping in games like online poker. A master account with money purposely loses high-stakes hands to a receiver account. The receiver then withdraws the money as poker winnings. Since these platforms often run from countries with anti-money laundering rules it is hard to trace the connection between the two accounts. This makes online gambling a popular choice for small-scale launderers and cyber-criminals.

Detailed guidance to learn AML compliance in the Banking Industry

8. Money Mules

Money mules are the step in moving illegal money linking online crime to regular banks. While they may seem like players using mules is actually a complex process that takes advantage of trust in the banking system. The way mules are recruited has changed from help wanted ads to complex psychological tricks. Organized Crime Groups use Social Engineering to target people, such as international students, retirees or those in financial trouble.

Unwitting mules are often victims recruited through romance scams or fake job offers. They believe they are doing administrative work for a global company. Since they do not know they are helping criminals it is hard to prosecute them which creates a loophole that protects those higher up in the criminal chain.

Witting mules know they are moving money. They often work as mules keeping accounts at several online banks to quickly move funds before fraud systems notice.

Criminals create identities using AI-generated deepfakes mixing stolen Social Security numbers with fake biometric data to open sleeper accounts. These accounts stay inactive for months to build a history before being used for a large burst of laundering. Mule Herders also manage pools of accounts using automated scripts to move stolen money in a zig-zag pattern across hundreds of accounts. This way if one account is caught and frozen the loss is small. The main flow of money continues.

For Financial Intelligence Units finding mules is urgent. The main warning sign is not how much money moves,. How fast it moves. Mule accounts often show a pattern: a large deposit comes in then several transfers go out quickly through services like Western Union or crypto-ATMs. New anti-money laundering systems now track how users interact with their banking apps. For example if someone who usually checks their balance twice a month suddenly sends five transfers with copied beneficiary details it triggers a strong alert for mule activity.

9. Professional Enablers

Lawyers, accountants and real estate agents act as gatekeepers for large-scale money laundering. Their skills help criminals move money into the legal economy. Without them criminal funds would stay hidden. Could not be used openly.

The potent weapon in a professional enablers arsenal is Attorney-Client Privilege. In jurisdictions this legal protection is systematically abused to create a Black Box around financial transactions. Criminals move funds into Client Trust Accounts, which are technically managed by the lawyer. Because these accounts often hold pooled funds from clients it becomes nearly impossible for a bank to see who the Ultimate Beneficial Owner of a specific transfer is. The lawyer effectively acts as a mixer providing a layer of legal immunity that traditional financial institutions cannot pierce without a specific court order.

Accountants and corporate service providers specialize in the production of Shelf Companies. These are entities that were legally registered years ago but have had no business. For a launderer an aged company is more valuable than a new one as it bypasses the new account scrutiny applied by banks. Enablers also facilitate the use of Nominee Directors—individuals who are paid a fee to sign corporate documents. This creates a distance between the criminal and the asset. The enabler manages the Power of Attorney ensuring the criminal retains control while remaining legally invisible.

Under the FATF guidelines these enablers are classified as DNFBP. While they are legally required to conduct Customer Due Diligence and file Activity Reports, the compliance rate in the legal and accounting sectors is historically lower than in banking. This is often due to a conflict of interest, where the enabler’s fee is tied to the execution of the transaction.

Because of these issues regulators are now holding enablers responsible for their actions. Laws like the Enablers Act aim to make professionals criminally liable if they should have known the money was illegal. The Panama Papers and Pandora Papers leaks showed how a single law firm could help thousands of clients with corruption, tax evasion and money laundering worldwide.

10. The Comparison Table of Money Laundering Methods

Technique

How It Works

Primary Sector

Detection Method

Red Flag Indicators

Smurfing

Breaking cash into tiny deposits

Retail Banking

Behavioral TM

5+ deposits of $9,500 in 48 hours

Shell Companies

Anonymous "paper" entities

Legal/Trusts

UBO Screening

Nominee directors, PO box address

TBML

Manipulating trade invoices

Import/Export

Customs Audit

Price of goods ±30% of market value

Real Estate

High-value property parking

Construction

GTO/KYC

All-cash LLC purchases, no residents

Crypto Mixers

Blending digital coins

Tech/Web3

Chainalysis

High volume from known "tumblers"

Money Mules

Recruitment of 3rd parties

Social Media

Outlier Detection

Sudden cross-border wire transfers

Casinos

Cashing out chips as "wins"

Gambling

Floor Monitoring

Minimal play with high cash-out

Enablers

Using "Privilege" to hide data

Legal/Accounting

Audit/Whistleblowers

Reluctance to provide UBO details

FAQ's Blog Post

Criminals use placement, layering, and integration, and we recommend knowing these basics to stay compliant.

Layering hides the source by moving money around, and we suggest real-time monitoring to detect it.

Shell companies disguise true ownership, and we advise using KYB checks to reveal real owners.

Criminals manipulate invoices and pricing, and we recommend strong trade compliance controls.

Criminals use crypto for anonymous transfers, and we suggest adopting crypto AML tools.

Smurfing splits large sums into small deposits, and we recommend transaction monitoring to catch it.

Businesses protect themselves with CDD, monitoring, and training, and we suggest making compliance a daily habit.