A specialized subtechnique of Virtual Company in which criminals pose as telemarketing or customer support centers with little or no genuine client work. By funneling illicit proceeds through normal banking channels and labeling them as call-center earnings, criminals exploit remote operations and minimal physical presence to shield beneficial ownership and the true nature of the funds. In many cases, perpetrators rely on fictitious corporate structures, including sham invoices or contracts, to disguise the source and destination of their funds. Furthermore, documented examples show how overseas call-center operators defraud unsuspecting victims—often targeting older adults—through phone or robocall scams, then coerce or trick them into sending bulk cash or making wire transfers, which are subsequently laundered under the guise of legitimate service fees. These operations typically make it difficult for financial institutions to verify genuine business activity, especially when corporate registration and beneficial ownership details are obscured. The subtechnique’s reliance on intangible operations across multiple jurisdictions further complicates enforcement and increases the risk of successful layering and integration of illicit proceeds.
Fictitious Call Center
Virtual Call Center
Telecalling Laundering
Call Center-Based Fund Mobilization
Tactics
Illicit revenue is mixed with fictitious service fees from supposed call center operations, presenting it as ordinary business income.
Risks
This technique relies on remote, largely intangible call-center operations that severely limit in-person verification and oversight. Criminals exploit the online or phone-based channel to conceal beneficial ownership and the legitimacy of funds, labeling illicit proceeds as telemarketing or support fees with minimal physical presence. This is the primary vulnerability exploited by the fictitious call-center approach.
The fictitious call-center scheme deliberately spans multiple jurisdictions, exploiting varied or weak AML regulatory environments to obscure beneficial ownership and evade detection. This cross-border complexity facilitates more effective layering and integration of illicit proceeds.
Indicators
Frequent inbound wire transfers labeled as call-center or telemarketing income from parties with no documented business relationship or supporting contractual records.
Monthly deposit volumes significantly exceeding the plausible operating costs for a legitimate call center, marked by minimal recorded expenses or payroll.
Reported number of staff and call-center resources (e.g., phone lines, office space) is disproportionately low compared to the volume of declared service revenues.
Registration in a jurisdiction lacking a robust telemarketing sector, yet the entity claims extensive international call-center operations.
Common beneficial owners appear across multiple call-center entities described as independent businesses, without a clear economic rationale for shared control.
High volume of inbound transfers from personal accounts, often belonging to older or vulnerable individuals, referencing call-center or telemarketing fees without evidence of legitimate service provided.
Data Sources
- Consolidates information on specific countries and regions, focusing on AML/CFT regulations, telemarketing industry norms, and relevant risk indicators.
- Identifies discrepancies when entities claim extensive call-center operations in jurisdictions lacking a robust telemarketing sector or licensing frameworks.
- Covers contracts, invoices, payment terms, parties to the agreement, and documented amounts.
- Allows verification of claimed telemarketing or call-center services and detection of sham invoices lacking credible details.
- Supports reconciliation between declared service fees and legitimate invoices or supporting documentation.
- Provide detailed records of inbound and outbound wire transfers, deposit amounts, references, timestamps, and counterparties.
- Enable detection of suspicious patterns, such as large deposits labeled as telemarketing income with no legitimate business rationale.
- Help identify multiple small or medium-value inbound transfers from unrelated parties without supporting contracts or legitimate business relationships.
- Maintains comprehensive employment data, including the number of staff, roles, payroll information, and dates of employment.
- Validates whether a call center’s reported workforce aligns with the revenue they claim, revealing potential exaggerations or fictitious staff listings.
- Detailed records of a business’s real-world operations, revenues, expenses, and relevant operational metrics.
- Facilitates comparison of declared call center capacity (staffing, facilities, overhead) to reported income, highlighting potential inconsistencies indicative of fictitious operations.
- Contains alerts, reports, and patterns associated with known scams, including telemarketing and phone-based fraud.
- Facilitates the identification of vulnerable individuals, such as older adults, who may have been coerced into sending funds under false pretenses.
- Contains identity documents, beneficial ownership information, transaction profiles, and risk assessments for customers and entities.
- Helps confirm whether purported call-center owners or operators are accurately represented and meet due diligence requirements, uncovering overlooked associations or control persons.
- Capture phone call and messaging metadata (e.g., duration, frequency, participants, timestamps) to verify genuine call center operations.
- Reveal inconsistencies if declared large-scale telemarketing revenue does not match actual call volume or communication patterns.
- Aggregates official company registration data, shareholder information, and ultimate beneficial ownership (UBO) details.
- Enables cross-checking of overlapping beneficial owners across entities that claim to be independent call centers, exposing hidden ownership structures.
Mitigations
Incorporate known hotbeds of telemarketing and call-center fraud into the institution’s country risk framework, applying additional checks on cross-border transactions. Heighten due diligence for call-center operations based in regions with weak regulatory oversight or repeated law enforcement actions against scam call centers.
For higher-risk call center customers lacking verifiable physical presence or producing suspiciously high revenues, require itemized call logs, payroll records, and proven contracts with actual clients. When older or vulnerable individuals are frequent payors, investigate whether invoices or service arrangements are credible and not indicative of fraud or sham agreements.
During the onboarding of call-center entities, require official proof of their operational setup (e.g., virtual or physical office leases, verified phone lines, staff rosters) and validate beneficial ownership. Cross-check any declared telemarketing or customer-support contracts with external data sources to confirm that purported earnings align with legitimate call-center services rather than fictitious billing.
Implement targeted monitoring rules to flag wire transfers from personal accounts, often belonging to older adults, that reference telemarketing or service fees. Cross-check declared call-center income against typical operational costs, such as staff wages and telecom expenses. Escalate anomalies that indicate significantly higher than plausible profits for further review.
Train frontline and compliance personnel to identify red flags in call-center-related accounts, such as disproportionately large inbound transfers from unrelated customers, minimal documented overhead, or reliance on vague, repetitive invoicing. Emphasize the detection of scams targeting elderly payors under fictitious telemarketing pretexts.
Distribute targeted advisories to older or more vulnerable customers about common call-center and telemarketing fraud schemes. Encourage them to verify service providers before making payments or sharing sensitive data. Provide channels for reporting suspected scam calls or suspicious payment requests.
Classify remote call center businesses, especially those registering in high-risk or non-traditional telemarketing jurisdictions, as elevated risk. Assign additional due diligence and monitoring parameters to promptly detect anomalies, such as large transactions from unconnected personal accounts labeled as 'call-center fees.'
Leverage external data sources, news articles, and social media to confirm whether a declared call center is legitimately operating, has actual staff, and is not flagged for scam or robocall activity. Investigate negative consumer reports, especially those involving the elderly, that suggest coercive or deceptive practices.
Restrict high-value transactions or suspend specific services when a call center entity fails to substantiate legitimate commercial activities or shows a pattern of receiving money from vulnerable individuals. Impose lower daily transfer limits or require secondary approvals for wire transfers until operational legitimacy is confirmed.
Continuously review and update call center customers' risk profiles, ensuring that transaction flows remain consistent with claimed call center activities. Verify legitimate overhead expenses, such as telecommunications and staffing costs, and escalate any unexplained spikes in purported service fees during routine account reviews.
Instruments
- Criminals operating fictitious call centers establish business bank accounts in the name of the sham entity to receive funds from defrauded victims.
- They label these deposits as legitimate service fees for telemarketing or support, blending illicit proceeds with purported business income.
- The routine appearance of client payments through bank accounts conceals suspicious origins, complicating scrutiny by financial institutions.
- Perpetrators create false invoices for non-existent telemarketing or call-center services, presenting them as legitimate sales.
- These sham invoices form a paper trail justifying incoming payments, masking their true source.
- By recording purported receivables, criminals integrate fraud proceeds into the entity’s books, making illicit funds appear as standard business income.
- Operators of fraudulent call centers may receive bulk cash from scam victims, disguised as payments for telemarketing services.
- They deposit or transport these physical funds as routine income, reducing paper trails and obscuring the actual sources.
- The anonymity of cash and its ease of deposit under presumed service fees further complicate detection by authorities.
Service & Products
- Generate or manage invoices for non-existent call-center work, presenting a paper trail to justify fraudulent revenue streams.
- Facilitate documentation that falsely supports the legitimacy of incoming funds, obscuring their illicit origin.
- Offer remote business addresses and communication solutions, allowing perpetrators to present a credible facade despite minimal physical infrastructure.
- Obscure the real location of the operation, hindering regulatory and law enforcement scrutiny.
- Accept bulk cash deposits from scams, recorded as direct customer payments for telemarketing services.
- Hide the actual source of large physical deposits, making it appear as ordinary revenue from fictitious call-center activities.
- Permit deposit of fraudulent call-center proceeds, labeled as legitimate service fees or customer payments.
- Facilitate layering by mixing illicit funds with normal business transactions, making detection more challenging.
- Receive payments from defrauded victims under the guise of telemarketing charges or call-center support fees.
- Rapidly transfer funds across multiple jurisdictions, enabling layering and integration with minimal oversight.
- Enable formation and administration of fictional corporate structures for purported call-center operations, concealing the true owners and activity.
- Provide nominee arrangements and corporate oversight that help legitimize sham contracts and invoices used to disguise illicit revenue.
Actors
They knowingly conceal their identity behind the fictitious call-center setup by:
- Remaining out of sight while directing or profiting from the scheme’s operations.
- Exploiting multiple jurisdictions and maintaining minimal physical presence to prevent financial institutions from identifying who truly controls or benefits from the illicit flows.
- Leveraging sham contracts and invoices that complicate ownership tracing, thereby easing the layering of illicit proceeds.
These corporate entities with minimal or no real operations knowingly facilitate:
- Masking the true activities of the call-center scheme by presenting sham invoices or contracts to justify incoming funds.
- Obscuring beneficial ownership and the genuine flow of illicit proceeds, thereby preventing effective scrutiny by financial institutions.
- Enabling layering and integration by processing bogus telemarketing revenues that appear legitimate on paper.
References
Financial Crimes Enforcement Network (FinCEN). (2022). Advisory on Elder Financial Exploitation (EFE FIN-2022-A002). FinCEN. https://www.fincen.gov/sites/default/files/advisory/2022-06-15/FinCEN%20Advisory%20Elder%20Financial%20Exploitation%20FINAL%20508.pdf
Department of the Treasury. (2024, February). 2024 National Money Laundering Risk Assessment. Department of the Treasury.https://home.treasury.gov/system/files/136/2024-National-Money-Laundering-Risk-Assessment.pdf