Bribery

Criminals offer or promise an undue advantage (financial or otherwise) to decision makers or gatekeepers in exchange for relaxing, ignoring, or misrepresenting AML checks. These bribes—often in the form of kickbacks or other covert payments—target regulators, government officials, bank staff, or any individuals entrusted with monitoring and reporting suspicious transactions. By manipulating or coercing these insiders, criminals suppress red flags, deter deeper investigations, and protect ongoing illicit operations. In some cases, the bribed parties actively exert undue influence or interfere with established procedures, ultimately impeding enforcement and masking the flow of illicit funds.

[
Code
T0006
]
[
Name
Bribery
]
[
Version
1.0
]
[
Parent Technique
]
[
Risk
Internal Risk
]
[
Created
2025-01-23
]
[
Modified
2025-04-02
]

Corruption

Official Bribery

Grease Payments

Kickback

Tactics

Criminals bribe insiders to circumvent KYC and compliance checks, allowing them to open or maintain financial accounts with reduced scrutiny and gain entry into legitimate financial channels.

Risks

RS0005
|
Internal Risk
|

Criminals bribe or coerce insiders—whether bank employees, compliance officers, or regulators—to override AML controls, ignore red flags, or halt investigations from within. This technique exploits failures in institutional governance and oversight, allowing illicit transactions to slip through undetected.

Indicators

IND00322
|

Large cash deposits or transfers that occur during or just before periods of government procurement or contract awards, inconsistent with the customer’s normal business operations.

IND00323
|

Transactions labeled as 'consultancy fees', 'facilitation payments', or other ambiguous service fees that significantly exceed normal market rates for such services.

IND01180
|

Newly established legal entities that exhibit frequent or rapid changes in management or beneficial owners without a clear operational rationale.

IND01181
|

Rapid transaction spikes and unusual inflows of funds timed with major corporate or governmental decision-making events.

IND01182
|

Significant, unexplained improvements in personal lifestyle or spending paired with unwillingness to delegate or take mandatory leave, thereby avoiding oversight.

IND01183
|

A single employee consistently overrides or 'clears' high-risk transactions.

IND01184
|

In procurement or trade finance, repeated patterns of inflated invoices and partial refunds.

IND01185
|

Anonymous or internal complaints suggesting an official or employee is accepting bribes.

IND01186
|

Repeated unauthorized modifications to AML or compliance controls—such as lowering risk scores or removing transaction alerts—by a single individual without proper authorization or justification.

IND01187
|

Unusually large or unexplained credits into an employee’s personal account from high-risk or politically exposed entities, lacking any plausible business rationale.

Data Sources

  • Contains details on individuals in prominent public or political positions, including official roles and affiliations.
  • Helps identify potential bribery targets or participants by flagging transactions and relationships involving PEPs, who are at heightened risk of corruption.
  • Documents contract terms, invoices, payment references, and amounts.
  • Enables the discovery of inflated or dubious consultancy and facilitation fee invoices used to mask bribe payments.
  • Captures comprehensive transaction details, including timestamps, amounts, counterparties, and payment references, enabling the detection of suspicious or unexplained payments.
  • Supports investigations into bribery by correlating abnormal transfers with key decision-making periods or official involvement.
  • Contains official disclosures of assets, liabilities, and financial interests by public officials or high-profile individuals.
  • Helps detect unexplained wealth or discrepancies indicative of bribe receipts or hidden income sources.
  • Tracks user activities, including overrides and clearance of high-risk transactions.
  • Identifies unauthorized modifications to AML controls, indicative of bribed insiders covering illicit transactions.
  • Maintains employee identities, roles, compensation, and leave patterns.
  • Facilitates the detection of unusual increases in personal wealth, refusal to delegate tasks, and other potential red flags of bribery or corruption.
  • Contains verified personal and business details, ownership information, and risk metrics.
  • Aids in identifying suspicious accounts or relationships potentially used to funnel bribe payments or hide beneficiary details.
  • Retains whistleblower reports, employee complaints, and other relevant communications.
  • Uncovers potential tips or direct allegations of bribery, supporting investigative follow-up.
  • Provides official records of business registrations, ownership structures, directors, and shareholders.
  • Allows detection of frequent or unexplained management changes that may conceal bribery-related entities.

Mitigations

Implement a zero-tolerance policy on bribery, supported by clear gift and hospitality registers, along with thorough approval workflows for third-party payments. These controls reduce opportunities for staff to accept or conceal bribes, ensuring full transparency and accountability for relevant transactions.

Establish strict user-access controls to ensure that if bribery or collusion is suspected, the institution can immediately revoke or suspend system privileges for specific individuals. This measure prevents compromised insiders from continuing to manipulate AML checks or conceal illicit transactions once suspicions arise.

Require dual authorizations and segregated duties for high-risk transactions to ensure that no single employee can bypass or override AML controls. This structure directly mitigates bribery by limiting the potential impact of any single compromised or coerced insider.

Deliver regular, scenario-based training on bribery threats, emphasizing legal consequences and whistleblower protections. Staff learn how to identify, resist, and report bribery attempts promptly, ensuring they understand both the red flags and the correct escalation channels.

Conduct comprehensive background checks, including criminal records and financial history, on employees holding or seeking sensitive AML roles. Periodic re-screenings help identify staff susceptible to bribery, reducing the likelihood of internal collusion or compromised AML processes.

Perform routine, unannounced audits focusing on transaction overrides, staff approvals, and AML record integrity to detect patterns consistent with insider bribery. Independent reviews highlight suspicious activities and deter collusion by ensuring staff decisions face objective scrutiny.

Establish secure and confidential hotlines or online portals for employees to report suspected bribery, unethical conduct, or attempts to circumvent AML controls. Providing anonymity and whistleblower protections encourages timely disclosures and deters staff from colluding with criminals.

Instruments

  • Criminals deposit bribe payments into a bribe-taker’s personal or business account under innocuous labels (e.g., 'consulting fees' or 'family support').
  • Once inside a bank account, these funds blend with legitimate income, making explicit links to corrupt activity less evident.
  • Using ordinary banking channels helps disguise illicit inflows among routine financial transactions, impairing AML detection.
IN0051
|
|
  • Bribes are often handed over in cash, evading electronic monitoring systems.
  • Physical currency lacks an inherent transactional record, reducing suspicious activity flags compared to digital transfers.
  • Criminals may also structure repeated smaller cash payments to avoid threshold-based reporting.
IN0053
|
|
  • Criminals transfer high-value items (e.g., luxury watches, vehicles) to officials or gatekeepers as covert bribes, bypassing typical financial transaction records.
  • Recipients can then resell or otherwise monetize these goods privately, minimizing transparent payment trails and making it harder to detect the illegal inducement.

Service & Products

  • Criminals draft fictitious or inflated consultancy agreements to funnel bribes.
  • Payments made under purported 'consultancy fees' appear legitimate, thereby evading scrutiny and hiding the corrupt nature of the transaction.
  • Criminals can route covert bribe payments under ambiguous labels (e.g., 'facilitation fees' or inflated consultancy charges), causing them to appear as ordinary transactions.
  • By blending these payments among legitimate flows, bribes are less likely to trigger immediate AML alerts.
  • Bribed insiders may receive illicit funds directly into their personal checking accounts, often masking them as personal or family-related deposits.
  • Such deposits can blend in with routine personal transactions, obscuring the bribery from standard AML checks.
  • Bribers use large or repeated cash transactions to deliver funds surreptitiously, avoiding electronic trails.
  • Physical currency lacks the inherent monitoring of digital transfers, making it easier to conceal kickbacks and reduce visibility to compliance systems.

Actors

Public officials can be bribed to:

  • Delay or block investigations and enforcement actions, limiting sanctions or penalties.
  • Steer regulatory or policy decisions in ways that benefit criminal enterprises.

These corrupt interventions undermine oversight, creating an environment where illicit proceeds remain undetected by financial institutions.

References

  1. Goredema, C., Madzima, J., Zitha, F., Mangori, S., Kaande, P., Manyonge, J., Manase, A., Phineas R, M. (2009). Corruption and AML systems: An assessment of the links between corruption and the implementation of anti-money laundering strategies and measures in the ESAAMLG region. Eastern and Southern Africa Anti-Money Laundering Group. https://www.esaamlg.org/reports/Corruption_and_AML_Systems..pdf

  2. OECD. (2013). Bribery and Corruption Awareness Handbook for Tax Examiners and Tax Auditors. OECD Publishing. http://dx.doi.org/10.1787/9789264205376-en