How Money Laundering Works: From Definition to Practice

Money laundering is a complex process in which criminals seek to conceal the origin of illegal income by making it appear legitimate. According to the authoritative Basel Committee on Banking Supervision, this phenomenon involves using the financial system to transfer funds between accounts to mask the true source of the funds and hide ownership relationships.

The mechanism of money laundering affects both financial institutions and individual citizens. Participants include those who provide accounts for funds, facilitate asset conversion, perform bank transfers, help move capital abroad, or otherwise disguise the origin of criminal proceeds.

What is money laundering and its social and legal significance

At first glance, money laundering is simply hiding the sources of income. However, in practice, this process serves two key purposes for organized crime. First, it allows criminals to “legally enjoy” proceeds from crime by hiding traces of their activities. Second, money laundering enables criminal groups to penetrate legitimate businesses, disguising themselves as honest entrepreneurs and expanding their illegal activities.

The targets of money laundering are so-called “dirty money”—profits from drug trafficking, smuggling, arms trade, fraud, theft, corruption, tax evasion, and many other crimes. Today, these capital flows reach hundreds of billions of dollars annually, making the fight against this phenomenon a priority for international financial regulators.

Three stages of a criminal scheme: how “dirty” money becomes “clean”

The full cycle of money laundering, in theory, includes three sequential stages, each aimed at masking the source of funds.

First stage: placement — the start of the chain

The placement stage, also known as “investment,” is the starting point of the entire operation. Criminals take cash obtained from illegal activities and introduce it into the financial system. For example, street drug sales generate large amounts of small bills that are difficult to transport and easily detected during checks.

The solution is simple: criminals deposit these sums into bank accounts or convert them into high-value securities. Large deposits raise suspicion, so often the scheme involves breaking up large sums into many small deposits. Once cash is transformed into bank accounts or securities, the first stage is complete. Advances in financial technology have expanded the methods: from traditional cash operations to electronic transfers and digital wallets.

Second stage: layering — complicating the trail

Layering, or “mixing,” is a critical link in the chain. Its goal is to completely sever the connection between the funds and their criminal origin. At this stage, criminals perform numerous financial transactions: transfers between accounts, buying and selling securities, investing in various assets.

They utilize the entire spectrum of modern financial systems: banks, insurance companies, brokerage firms, gold markets, car dealerships, and even retail chains. Each transaction further complicates the movement of capital. Often, anonymous accounts, fictitious trades, and bearer securities are used, making it impossible to trace ownership.

Offshore financial centers and so-called “tax havens”—jurisdictions with excessive confidentiality measures—play a significant role. When criminal money enters such regions, tracing its source becomes nearly impossible. Transnational money laundering creates such a complex chain of transactions that it resembles a labyrinth, where even experienced financial analysts can get lost.

Third stage: integration — returning to the legal economy

The final stage, integration, completes the cycle of criminal activity. At this stage, capital that has successfully passed the layering stage and lost its criminal origin signs re-enters the normal economic circulation. Criminals deposit these funds into accounts of institutions or individuals with no apparent connection to the criminal organization.

If layering was successful, the “laundered” money is indistinguishable from regular income. Criminals gain full freedom to use these funds, investing in real estate, business, securities, or simply withdrawing to personal accounts. At this stage, capital circulates again within the financial system, appearing entirely legitimate.

Modernization of methods: how digital tools complicate tracking

In the 21st century, the arsenal of money laundering methods constantly evolves. While criminals once limited themselves to cash and simple bank transfers, now they actively use online banking, online gambling, cryptocurrencies, and complex international trading schemes. Each new financial instrument is quickly adapted for illicit purposes.

International trade development has created additional opportunities: through over- and under-invoicing of imported and exported goods, criminals can transfer large sums across borders, appearing as normal commercial transactions. Creating fictitious companies abroad and using them for “foreign investments” has become one of the most common methods.

Thirty-one ways to hide the sources of illegal income

Practices show that criminals employ a variety of money laundering methods, each targeting specific vulnerabilities of the financial system or regulatory frameworks.

Traditional cash methods:

Smuggling cash remains relevant, especially in countries with undeveloped reporting systems. Breaking large sums into small deposits, known as “smurfing,” allows avoiding automatic alerts from financial authorities when exceeding set limits.

Use of cash-intensive industries:

Casinos, entertainment venues, bars, jewelry stores—all operating mainly with cash—become ideal cover. Criminals declare illegal proceeds as legitimate operational income through fictitious transactions. Indirect chip exchanges at casinos enable claiming winnings and avoiding direct tracking via banknote serial numbers.

Asset purchases:

Directly buying expensive property—homes, cars, antiques, art, luxury secondhand goods—and reselling them allows capital transformation. Each resale creates the appearance of legitimate commercial activity.

Financial markets and insurance:

High transaction volumes on securities markets, diverse financial instruments, and the global nature of capital markets provide perfect cover. Criminals buy stocks, bonds, futures, often using bearer securities that are hard to trace. In insurance, schemes include purchasing policies for large sums and then claiming payouts in a seemingly legitimate manner.

Offshore and cross-border operations:

Using offshore financial centers and “tax havens” helps conceal the true beneficiary of assets. Creating anonymous companies in certain jurisdictions means the actual owner remains unknown. Cross-border transfers are often disguised as payments for education, insurance premiums, or commissions—operations difficult to verify.

Trade schemes:

Over-invoicing imports allows transferring money abroad as premiums and discounts from foreign suppliers. Under-invoicing exports enables kickbacks from foreign partners. Fake trade documents and falsified trade flows further obscure traces.

Fictitious operations:

Opening fake companies for virtual transactions helps convert criminal proceeds into the appearance of legitimate operational income. Fake performance indicators look convincing on paper.

Corruption and personal business:

Corrupt officials often use schemes of “earning and laundering money simultaneously”: opening entertainment venues, restaurants, enterprises through relatives. The apparent independence of these businesses from the official makes detection difficult. Another method involves officials creating private companies nominally owned by third parties but actually controlled by the official.

Cross-border multi-level transfers:

Exploiting loopholes in document retention periods, direct cross-border cash shipments (usually $100 bills) under diplomatic cover or by persons with customs immunity.

Stub accounts:

Opening accounts in the names of proxies unknown to the proxy itself protects the criminal from the risk of the proxy reporting the loss of a savings book and making unauthorized withdrawals.

Currency operations:

Depositing money in small amounts and then withdrawing foreign currency in another country—known as “ants carrying bricks”—often combined with using proxy accounts.

Cross-border cashless transactions:

Falsifying transaction amounts, transferring money to foreign brokers, then distributing through foreign accounts. Distance trading with inflated prices allows large sums to be transferred as payment for goods.

Underground currency exchange:

Found in dubious jewelry stores, which, besides illegal currency exchange, can exchange cash for bearer foreign checks, allowing clients to deposit funds into foreign accounts.

Cross-border corporate fund transfers:

Common in finance, banking, and insurance sectors. Large cash smuggling across borders is used.

Real estate speculation:

Proxies buy property from developers at 50-70% below market price with cash, then quickly resell (especially pre-sale homes) with a profit of 50-100%. Each transaction appears as a legitimate commercial deal.

Fake loans:

Often used in bribery schemes. The recipient holds a promissory note or check with deferred payment, which can be explained as a loan. When discovered, the promissory note is simply transferred to a third party or deposited in a bank for repayment.

Counterfeit coins and bills:

Repeated use of fake money for small consumer purchases, vending machine exchanges, or currency exchange machines helps “launder” counterfeit into real money.

Gift certificates from department stores:

Gift certificates are highly liquid but hard to cash out directly. They can be resold to social organizations, used as bonuses during holidays, and thus “laundered” into the hands of unsuspecting third parties, while original owners get cash.

Cryptocurrency and digital assets:

In recent years, cryptocurrencies have become tools for money laundering due to pseudo-anonymity, high transaction speed, and lack of centralized control. Criminals convert cash into crypto, perform a series of transactions, then revert to fiat, breaking the link to the source.

Evolution of methods and challenges for international regulation

History shows that criminals adapt to each new regulation measure. The famous 2001 case, when Hong Kong’s Independent Commission Against Corruption uncovered the largest money laundering group at that time with operations totaling HKD 50 billion, demonstrated how criminals bribe high-ranking officials to weaken oversight.

In that case, criminals opened accounts at a branch in Tsim Sha Tsui, bribed the manager, and transferred funds not as money transfers but as multiple transfers to various accounts, then redirected the funds abroad.

Today, money laundering is not just a criminal scheme but a complex process requiring coordination across countries, use of advanced financial tools, and often corruption of officials. International regulators continually improve methods for detecting suspicious operations, but criminals develop new ways just as quickly.

The main strategy involves improving reporting systems, strengthening international cooperation among financial intelligence units, implementing stricter beneficiary identification rules, and blocking access to offshore havens. However, each new ban spawns new circumvention methods: criminals always find weak links in the financial oversight chain.

View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
Add a comment
Add a comment
No comments
  • Pin