Concealment & Evasion

Masking or erasing traces of the fraud—altering logs, wiping malware footprints, rotating IP addresses—to delay investigative response. Criminals are reducing evidence trails to extend the window of opportunity.

Examples:

  • Using transaction structuring or "smurfing" to stay below reporting thresholds.

  • Employing anonymized digital currency platforms for transactions.

  • Frequently changing IP addresses or device fingerprints.

[
Matrix
Fraud
]
[
Name
Concealment & Evasion
]
[
Version
1.0
]
[
Created
2025-04-07
]
[
Modified
2025-04-08
]