Remittance Splitting

Criminals use licensed money remittance services—ranging from large global brands to small community shops—to place illicit funds. By breaking down amounts into smaller transfers under various sender identities, they lessen the risk of exceeding formal reporting thresholds. Because these providers often conduct only limited checks for lower-value sums, criminals find them attractive for initiating or distributing illegal proceeds. Offenders may exploit unregistered or loosely supervised remittance channels, often using false identification or employing multiple remittance businesses in different regions to obscure sender-beneficiary links. Transfers regularly converge toward a single individual or small group with no true relationship to the senders, while amounts are kept below or just around threshold limits. Funds are frequently withdrawn in cash soon after arrival, making it difficult to trace the source and frustrating enhanced due diligence or suspicious transaction monitoring efforts. This approach facilitates layering by dispersing illegal proceeds across numerous small transactions, effectively disguising their illicit origin.

[
Code
T0016.003
]
[
Name
Remittance Splitting
]
[
Version
1.0
]
[
Parent Technique
]
[
Tactics
]
[
Risk
Customer Risk, Channel Risk
]
[
Created
2025-03-12
]
[
Modified
2025-04-11
]

Money Remittance Providers

Tactics

ML.TA0006
|
|

Money remittance splitting is used to introduce illicit funds into the financial system by keeping individual transfers below reporting thresholds and dispersing them under various sender identities. This reduces the direct detection risk as the proceeds enter legitimate channels.

Risks

RS0001
|
Customer Risk
|

Offenders use multiple or false sender identities to mask the true origin or ownership of funds, exploiting weaknesses in identification and KYC procedures for low-value remittances. This tactic leverages fraudulent or inconsistent personal data to further conceal illicit proceeds.

RS0003
|
Channel Risk
|

This technique exploits the limited checks for small-value transactions in money remittance channels, allowing criminals to split illicit funds into multiple low-volume transfers that receive minimal scrutiny. By using different outlets—often with weak or threshold-based verification standards—they can deposit and withdraw illicit proceeds with a reduced risk of detection.

Indicators

IND00924
|

Repeated small-value remittance transfers from different sender identities, all below reporting thresholds, occurring in close temporal proximity.

IND00925
|

Repeated usage of multiple, potentially inconsistent personal identification documents by the same individual to send small-value transfers, bypassing enhanced due diligence procedures.

IND00927
|

High volume of transfers aligned just under a common threshold limit, all channeled toward a single beneficiary or small group of recipients.

IND00928
|

Different named senders providing identical or nearly identical contact details (phone number, address) while using separate remittance transactions.

IND00929
|

Concentrated spike in low-value remittance transfers at smaller, community-based service outlets known for limited KYC protocols.

IND00932
|

Frequent immediate cash pickups of small-value transfers by a single recipient from multiple senders, lacking any legitimate relationship or explanation.

Data Sources

  • Provides detailed records of remittance transactions, including sender/recipient details, timestamps, amounts, and transaction identifiers.
  • Enables detection of repeated small-value transfers from multiple senders, highlighting structuring below reporting thresholds.
  • Allows investigators to identify rapid withdrawals or cash pickups, supporting analysis of suspicious layering activities.
  • Validates the authenticity of official identification documents used for remittance transactions.
  • Detects forged or altered IDs, as well as the repeated use of different documents by the same sender.
  • Assists in identifying individuals who systematically evade controls by using multiple or false identities to remain under reporting thresholds.
  • Lists licensing, location, and operational details of registered remittance and money service providers.
  • Confirms whether transfers are conducted through properly licensed or potentially unregistered/loosely supervised MSBs.
  • Helps identify the use of multiple or regional remittance businesses in structuring illicit proceeds.
  • Consolidates verified customer identities, including personal details, risk profiles, and beneficial ownership data.
  • Uncovers inconsistencies in identification documents or repeated usage of different identities by the same individual.
  • Supports linking senders and beneficiaries to verify legitimate relationships and detect layering in remittance transactions.
  • Provides comprehensive views of cross-border transactions, including sending/receiving institutions, countries, currencies, and settlement details.
  • Identifies the geographic dispersion of remittances and traces funds converging on a single beneficiary.
  • Aids in uncovering layering strategies that leverage multiple regions to obscure the origin of illicit proceeds.

Mitigations

Apply heightened scrutiny to remittance customers or transactions showing structuring red flags. Verify sources of funds and cross-check sender or recipient information against external databases whenever aggregated amounts exceed normal expectations or multiple, possibly false, IDs are used. Investigate the genuine relationships among parties to uncover concealed connections and prevent criminals from sidestepping KYC requirements with small transactions.

Perform thorough identity verification for all senders, even for smaller amounts, by validating ID documents against external or official databases. Implement processes that flag the repeated use of personal details (e.g., phone numbers, addresses) under multiple names. Assess the overall transaction volume rather than viewing each remittance in isolation, thereby preventing abuse of low-value thresholds.

Implement targeted monitoring rules to detect repeated small-value transfers from multiple senders to the same beneficiary or group of beneficiaries within short timeframes. Cross-check for the use of identical contact details, unusual ID inconsistencies, or immediate cash pickups that collectively exceed typical thresholds. By focusing on structured patterns, institutions can promptly intervene when criminals split transactions below standard reporting triggers.

Instruct money remittance agents and frontline staff on the typologies of split or structured remittances, emphasizing how to spot patterns of multiple small transactions arriving at the same beneficiary or the use of recycled phone numbers and addresses across different senders. Provide clear escalation procedures to compliance teams for immediate investigation when suspicious structuring is identified.

Require immediate internal escalation and formal reporting whenever transaction monitoring or frontline staff notice indicators of structured small-value transfers designed to avoid thresholds. SARs/STRs should explicitly describe the pattern, such as multiple IDs, convergence to a single recipient, or inconsistency in sender details, and highlight the layering tactic used to conceal illicit proceeds.

Limit or suspend remittance services for individuals or entities exhibiting repeated sub-threshold transactions that suggest deliberate structuring, such as multiple or conflicting IDs, identical contact details, or immediate cash pickups. Require escalated approval or additional ID verification before processing further low-value remittances that appear designed to evade reporting thresholds.

Instruments

Criminals exploit money remittance channels to split illicit fiat funds into multiple low-value transfers under false or multiple identities. These small amounts typically fall below formal reporting thresholds, enabling the layering of dirty money with minimal scrutiny. By directing numerous small transfers toward a single beneficiary, they obscure the true origin of the funds, masking illicit revenue flows within legitimate fiat currency transactions.

IN0051
|
|

At both the placement and layering stages, criminals deposit physical currency in small increments at remittance outlets to avoid the scrutiny associated with larger cash deposits. On the receiving side, funds are promptly withdrawn in physical cash, further concealing the transaction trail. This ready convertibility into cash allows offenders to evade traditional banking oversight and frustrates subsequent tracing efforts.

Service & Products

  • Criminals split illicit funds into multiple low-value transfers under various sender identities, avoiding formal reporting thresholds.
  • Limited checks for smaller transactions allow them to deposit and withdraw proceeds with minimal scrutiny.
  • Transfers often converge on a single beneficiary lacking a legitimate connection to the senders, obscuring the money trail.
  • Funds are regularly collected in cash soon after arrival, further frustrating AML monitoring and tracing efforts.

Actors

Illicit operators initiate and manage the splitting of remittance transfers by:

  • Using multiple sender identities and fragmented amounts to stay below reporting thresholds.
  • Employing loosely supervised or unregistered channels to further conceal the source of illicit funds.

Their activities hamper financial institutions’ ability to detect suspicious patterns, as transactions appear to be legitimate low-value remittances.

AT0076
|
|

Money mules receive a series of low-value transfers under false or multiple sender identities and:

  • Collect the cash proceeds soon after the transfers arrive, leaving minimal paper trails.
  • May act knowingly or unknowingly, facilitating the final link in the laundering chain by disconnecting the funds from their criminal origin.

This role prevents financial institutions from pinpointing the true beneficiaries or correlating multiple suspicious transfers when the withdrawals appear as isolated, small remittances.

Informal value transfer system operators come into play when:

  • Criminals seek unregistered or minimally supervised remittance channels to bypass formal checks.
  • Offenders leverage personal or trust-based networks to funnel multiple fragmented transactions, obscuring true sender and beneficiary identities.

This process complicates financial institutions’ compliance controls by reducing transparency and traceability of cross-border fund movements.

Money transfer agents, including large brands and small community shops, are exploited by:

  • Processing numerous small-value transfers under multiple sender identities, reducing scrutiny.
  • Conducting only limited checks for transactions below threshold limits, enabling illicit operators to deposit and withdraw funds with minimal detection.

This exploitation undermines financial institutions’ monitoring efforts, as these remittances often remain under the radar of enhanced due diligence.

References

  1. Financial Action Task Force (FATF). (2010, June). Money laundering through money remittance and currency exchange providers. MONEYVAL and FATF/OECD. https://www.fatf-gafi.org/en/publications/Methodsandtrends/Moneylaunderingthroughmoneyremittanceandcurrencyexchangeproviders.html

  2. AUSTRAC (Australian Transaction Reports and Analysis Centre). (2022). Independent remittance dealers in Australia: Money laundering and terrorism financing risk assessment. Commonwealth of Australia. https://www.austrac.gov.au/business/how-comply-guidance-and-resources/guidance-resources/independent-remittance-dealers-australia-risk-assessment-2022