Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
How Money Laundering Works: From Definition to Practice
Money laundering is a complex process in which criminals seek to conceal the origin of illegal income by making it appear legitimate. According to the authoritative Basel Committee on Banking Supervision, this phenomenon involves using the financial system to transfer funds between accounts to mask the true source of the funds and hide ownership relationships.
The mechanism of money laundering affects both financial institutions and individual citizens. Participants include those who provide accounts for funds, facilitate asset conversion, perform bank transfers, help move capital abroad, or otherwise disguise the origin of criminal proceeds.
What is money laundering and its social and legal significance
At first glance, money laundering is simply hiding the sources of income. However, in practice, this process serves two key purposes for organized crime. First, it allows criminals to “legally enjoy” proceeds from crime by hiding traces of their activities. Second, money laundering enables criminal groups to penetrate legitimate businesses, disguising themselves as honest entrepreneurs and expanding their illegal activities.
The targets of money laundering are so-called “dirty money”—profits from drug trafficking, smuggling, arms trade, fraud, theft, corruption, tax evasion, and many other crimes. Today, these capital flows reach hundreds of billions of dollars annually, making the fight against this phenomenon a priority for international financial regulators.
Three stages of a criminal scheme: how “dirty” money becomes “clean”
The full cycle of money laundering, in theory, includes three sequential stages, each aimed at masking the source of funds.
First stage: placement — the start of the chain
The placement stage, also known as “investment,” is the starting point of the entire operation. Criminals take cash obtained from illegal activities and introduce it into the financial system. For example, street drug sales generate large amounts of small bills that are difficult to transport and easily detected during checks.
The solution is simple: criminals deposit these sums into bank accounts or convert them into high-value securities. Large deposits raise suspicion, so often the scheme involves breaking up large sums into many small deposits. Once cash is transformed into bank accounts or securities, the first stage is complete. Advances in financial technology have expanded the methods: from traditional cash operations to electronic transfers and digital wallets.
Second stage: layering — complicating the trail
Layering, or “mixing,” is a critical link in the chain. Its goal is to completely sever the connection between the funds and their criminal origin. At this stage, criminals perform numerous financial transactions: transfers between accounts, buying and selling securities, investing in various assets.
They utilize the entire spectrum of modern financial systems: banks, insurance companies, brokerage firms, gold markets, car dealerships, and even retail chains. Each transaction further complicates the movement of capital. Often, anonymous accounts, fictitious trades, and bearer securities are used, making it impossible to trace ownership.
Offshore financial centers and so-called “tax havens”—jurisdictions with excessive confidentiality measures—play a significant role. When criminal money enters such regions, tracing its source becomes nearly impossible. Transnational money laundering creates such a complex chain of transactions that it resembles a labyrinth, where even experienced financial analysts can get lost.
Third stage: integration — returning to the legal economy
The final stage, integration, completes the cycle of criminal activity. At this stage, capital that has successfully passed the layering stage and lost its criminal origin signs re-enters the normal economic circulation. Criminals deposit these funds into accounts of institutions or individuals with no apparent connection to the criminal organization.
If layering was successful, the “laundered” money is indistinguishable from regular income. Criminals gain full freedom to use these funds, investing in real estate, business, securities, or simply withdrawing to personal accounts. At this stage, capital circulates again within the financial system, appearing entirely legitimate.
Modernization of methods: how digital tools complicate tracking
In the 21st century, the arsenal of money laundering methods constantly evolves. While criminals once limited themselves to cash and simple bank transfers, now they actively use online banking, online gambling, cryptocurrencies, and complex international trading schemes. Each new financial instrument is quickly adapted for illicit purposes.
International trade development has created additional opportunities: through over- and under-invoicing of imported and exported goods, criminals can transfer large sums across borders, appearing as normal commercial transactions. Creating fictitious companies abroad and using them for “foreign investments” has become one of the most common methods.
Thirty-one ways to hide the sources of illegal income
Practices show that criminals employ a variety of money laundering methods, each targeting specific vulnerabilities of the financial system or regulatory frameworks.
Traditional cash methods:
Smuggling cash remains relevant, especially in countries with undeveloped reporting systems. Breaking large sums into small deposits, known as “smurfing,” allows avoiding automatic alerts from financial authorities when exceeding set limits.
Use of cash-intensive industries:
Casinos, entertainment venues, bars, jewelry stores—all operating mainly with cash—become ideal cover. Criminals declare illegal proceeds as legitimate operational income through fictitious transactions. Indirect chip exchanges at casinos enable claiming winnings and avoiding direct tracking via banknote serial numbers.
Asset purchases:
Directly buying expensive property—homes, cars, antiques, art, luxury secondhand goods—and reselling them allows capital transformation. Each resale creates the appearance of legitimate commercial activity.
Financial markets and insurance:
High transaction volumes on securities markets, diverse financial instruments, and the global nature of capital markets provide perfect cover. Criminals buy stocks, bonds, futures, often using bearer securities that are hard to trace. In insurance, schemes include purchasing policies for large sums and then claiming payouts in a seemingly legitimate manner.
Offshore and cross-border operations:
Using offshore financial centers and “tax havens” helps conceal the true beneficiary of assets. Creating anonymous companies in certain jurisdictions means the actual owner remains unknown. Cross-border transfers are often disguised as payments for education, insurance premiums, or commissions—operations difficult to verify.
Trade schemes:
Over-invoicing imports allows transferring money abroad as premiums and discounts from foreign suppliers. Under-invoicing exports enables kickbacks from foreign partners. Fake trade documents and falsified trade flows further obscure traces.
Fictitious operations:
Opening fake companies for virtual transactions helps convert criminal proceeds into the appearance of legitimate operational income. Fake performance indicators look convincing on paper.
Corruption and personal business:
Corrupt officials often use schemes of “earning and laundering money simultaneously”: opening entertainment venues, restaurants, enterprises through relatives. The apparent independence of these businesses from the official makes detection difficult. Another method involves officials creating private companies nominally owned by third parties but actually controlled by the official.
Cross-border multi-level transfers:
Exploiting loopholes in document retention periods, direct cross-border cash shipments (usually $100 bills) under diplomatic cover or by persons with customs immunity.
Stub accounts:
Opening accounts in the names of proxies unknown to the proxy itself protects the criminal from the risk of the proxy reporting the loss of a savings book and making unauthorized withdrawals.
Currency operations:
Depositing money in small amounts and then withdrawing foreign currency in another country—known as “ants carrying bricks”—often combined with using proxy accounts.
Cross-border cashless transactions:
Falsifying transaction amounts, transferring money to foreign brokers, then distributing through foreign accounts. Distance trading with inflated prices allows large sums to be transferred as payment for goods.
Underground currency exchange:
Found in dubious jewelry stores, which, besides illegal currency exchange, can exchange cash for bearer foreign checks, allowing clients to deposit funds into foreign accounts.
Cross-border corporate fund transfers:
Common in finance, banking, and insurance sectors. Large cash smuggling across borders is used.
Real estate speculation:
Proxies buy property from developers at 50-70% below market price with cash, then quickly resell (especially pre-sale homes) with a profit of 50-100%. Each transaction appears as a legitimate commercial deal.
Fake loans:
Often used in bribery schemes. The recipient holds a promissory note or check with deferred payment, which can be explained as a loan. When discovered, the promissory note is simply transferred to a third party or deposited in a bank for repayment.
Counterfeit coins and bills:
Repeated use of fake money for small consumer purchases, vending machine exchanges, or currency exchange machines helps “launder” counterfeit into real money.
Gift certificates from department stores:
Gift certificates are highly liquid but hard to cash out directly. They can be resold to social organizations, used as bonuses during holidays, and thus “laundered” into the hands of unsuspecting third parties, while original owners get cash.
Cryptocurrency and digital assets:
In recent years, cryptocurrencies have become tools for money laundering due to pseudo-anonymity, high transaction speed, and lack of centralized control. Criminals convert cash into crypto, perform a series of transactions, then revert to fiat, breaking the link to the source.
Evolution of methods and challenges for international regulation
History shows that criminals adapt to each new regulation measure. The famous 2001 case, when Hong Kong’s Independent Commission Against Corruption uncovered the largest money laundering group at that time with operations totaling HKD 50 billion, demonstrated how criminals bribe high-ranking officials to weaken oversight.
In that case, criminals opened accounts at a branch in Tsim Sha Tsui, bribed the manager, and transferred funds not as money transfers but as multiple transfers to various accounts, then redirected the funds abroad.
Today, money laundering is not just a criminal scheme but a complex process requiring coordination across countries, use of advanced financial tools, and often corruption of officials. International regulators continually improve methods for detecting suspicious operations, but criminals develop new ways just as quickly.
The main strategy involves improving reporting systems, strengthening international cooperation among financial intelligence units, implementing stricter beneficiary identification rules, and blocking access to offshore havens. However, each new ban spawns new circumvention methods: criminals always find weak links in the financial oversight chain.