Sanctions Evasion

⚠️ Early-Stage Draft

This matrix represents an early-stage, exploratory outline of possible tactics and adversarial objectives for sanctions evasion.
It is not yet supported by techniques or indicators, and active development is not currently in progress.
Feedback and expressions of interest from the community are welcome to help guide future prioritization.

Sanctions evasion is the deliberate circumvention of national or international economic and trade restrictions targeting specific individuals, entities, or states. Evasion efforts span across corporate structuring, trade manipulation, falsified documentation, and strategic use of weak regulatory environments.

In the AMLTRIX adversarial framework, these behaviors are framed as tactical objectives pursued by sanctioned actors and their enablers. Each tactic corresponds to a distinct mode of evasion, providing the foundation for eventual mapping to detection techniques and red flags.

Draft Sanctions Evasion Tactics

Tactic Description
Obfuscation of Identity and Ownership Creating layers of front companies, nominee directors, and trusts to obscure who truly controls sanctioned assets or entities. This defeats basic due diligence and frustrates beneficial ownership tracing.
Manipulation of Trade Transactions Tampering with invoices, cargo descriptions, or shipping routes to hide the origin, value, or nature of goods. Adversaries may transship through neutral countries or falsify end-use declarations.
Exploitation of Financial Systems Leveraging complex financial networks, correspondent banking, MSBs, or digital assets to move money while bypassing sanctions filters and transaction monitoring systems.
Deceptive Information and Documentation Submitting falsified documents (e.g., KYC, maritime tracking, permits) to obscure the nature of entities or transactions and mislead regulatory checks.
Exploitation of Jurisdictional Vulnerabilities Conducting operations in regions with lax or inconsistent sanctions enforcement, such as offshore centers, free trade zones, or non-cooperative states.
Continuous Adaptation and Operational Security Frequently evolving evasion methods—such as switching communication protocols, rotating front companies, and tracking regulatory shifts—to stay ahead of enforcement efforts.