Extortion involves obtaining money or other assets from individuals or entities through threats, intimidation, or coercion, creating a compelling need for subsequent laundering steps such as placement or layering. Criminals often commingle these coerced funds with legitimate proceeds or funnel them through front businesses—like hospitality venues or commercial retail operations—to mask their origin. In some regions, organized crime syndicates earn substantial revenue through recurring protection rackets; for instance, Italian mafia networks reportedly generated around €9 billion from such activities in 2009 alone. These schemes may also be adopted by paramilitary or extremist organizations, forcibly collecting regular “fees” from local businesses or diaspora communities to finance their operations, then introducing the proceeds into seemingly legitimate channels. Common indicators include recurring high-value cash deposits with no clear business rationale, suspicious payment descriptions (e.g., “forced donation”), or abrupt funds transfers into intermediary accounts immediately following collection, all signifying a potential attempt to conceal coerced payments. Because the income is linked to violence or coercion, extortion raises AML/CFT vulnerabilities and is recognized as a common predicate offense for organized crime.
Extortion
Extortion-Based Fundraising
Coercive Fundraising
Tactics
Extortion explicitly involves the forced acquisition of money or assets through threats or intimidation. It forms the initial stage of laundering when criminals move coerced proceeds into financial channels.
Risks
The primary vulnerability arises from criminals depositing extorted proceeds under false pretenses, misrepresenting the source of funds as legitimate income or personal transactions. Financial institutions may not detect that the true origin is coerced cash, as customers obscure or omit key details linking deposits to threats or intimidation.
As a secondary risk, extortion proceeds are often channeled into front businesses such as those in the hospitality, retail, or merchant sectors, which naturally handle significant cash or transaction volumes. By commingling forced payments with routine daily revenues, criminals exploit the inherent vulnerabilities of cash-intensive products and services, making extorted funds indistinguishable from legitimate income.
Indicators
Rapid fund transfers from accounts receiving ambiguous deposits to intermediary or front company accounts, particularly immediately after receipt, indicate efforts to conceal coerced funds.
Clusters of transactions from regions or customer profiles historically linked to extremist activities that employ pressure tactics are consistent with coercive fundraising schemes.
Recurring large cash deposits or electronic transfers with unclear or incomplete references, especially from parties lacking a legitimate business or personal explanation, consistent with coerced funds.
Transactions featuring coded descriptions such as 'mandatory contribution' or 'forced donation' that deviate from standard payment narratives are indicative of extortion-based fundraising.
Accounts demonstrating sudden spikes in deposits coinciding with local reports of intimidation or threats are indicative of extortion-driven contributions.
Entities with opaque or overly complex beneficial ownership structures, especially front businesses reporting inflated cash inflows beyond normal operations, are commonly used to hide extortion proceeds.
Communications referencing coercion, extortion, or direct threats in relation to collecting funds strongly signal extortion-based fundraising activities.
Abrupt spikes in reported revenues or deposit volumes at hospitality or retail businesses that lack operational justification, especially in areas known for protection rackets or intimidation campaigns.
Data Sources
Maintains granular records of account interactions, including transaction details, account setting changes, and corresponding timestamps. This helps detect:
- Unusual outgoing transfers or sudden spikes in deposit volume consistent with coerced payments.
- Pattern shifts that indicate attempts to mask extorted funds, such as rapidly moving funds into front businesses or intermediary accounts.
Aggregated records of negative news coverage and official legal documents (e.g., lawsuits, criminal charges) referencing individuals or entities. This data enables investigators to:
- Link suspicious deposit spikes to local reports of intimidation or threats, indicating possible extortion.
- Identify named persons or groups charged with or suspected of extortion, aligning deposit patterns with known criminal activity.
Consolidated intelligence on regions or jurisdictions known for organized crime or extremist activities. This data assists in:
- Flagging accounts receiving or sending funds to areas associated with extortion or forced payment schemes.
- Enhancing risk-based monitoring by prioritizing geographies linked to intimidation or coercion.
Provides a complete record of all financial transactions across accounts (e.g., deposits, withdrawals, transfers). This data enables investigators to:
- Identify recurring high-value or otherwise suspicious deposits that lack a legitimate explanation.
- Detect suspicious transaction references (e.g., 'forced donation') or narratives indicative of coerced funds.
- Recognize rapid transfers from receiving accounts to intermediaries shortly after deposit, suggesting layering of extorted proceeds.
Contains data on a company’s operational metrics, such as sales figures, expenses, or foot traffic. These records help:
- Compare reported operational performance against declared revenue spikes potentially fueled by coerced payments.
- Identify inconsistent or unsubstantiated inflows indicating extortion proceeds disguised as legitimate business income.
Contains verified personal and business information—such as identities, beneficial ownership, and risk profiles—collected during onboarding and ongoing due diligence. This data supports extortion-related AML efforts by:
- Verifying the legitimacy of sources behind large or recurring deposits that lack a clear business rationale.
- Identifying suspicious or opaque ownership arrangements indicative of front businesses used to commingle extorted proceeds.
Logs capture the metadata (and sometimes content, where legally permissible) of electronic communications, including emails, calls, and messages. By reviewing or correlating this data with suspicious transactions, investigators can:
- Identify explicit references to intimidation, threats, or forced payments.
- Uncover direct communications indicating extortion-based fundraising activities.
Centralized records of company formations, directorships, and ownership structures reveal potential shell or front companies used to launder extortion proceeds by:
- Uncovering opaque layers of beneficial ownership.
- Verifying registered business activity claims against actual financial inflows associated with coerced payments.
Mitigations
Conduct intensified checks on customers or businesses located in high-risk regions or sectors known for extortion activity. Verify the legitimacy of sudden revenue increases at retail or hospitality entities, scrutinizing ownership structures to ensure there are no undisclosed links to organized crime or paramilitary groups collecting forced payments.
Implement targeted monitoring rules to detect recurring references to "forced donations," unexplained spikes in cash deposits, or abrupt sequential fund transfers following known coercion events. Specifically, include keyword searches for extortion-related terms in payment narratives and flag repeated incoming payments from multiple parties without a legitimate business rationale.
Train frontline and compliance personnel to identify extortion-specific red flags, such as irregular references to "protection fees" and "mandatory donations," or third-party indications of intimidation. Provide concrete scenario-based exercises to enhance employees' ability to spot and escalate potential coerced payment activity.
Assign higher risk scores to customers or businesses operating in regions notorious for extortion rackets or with transaction profiles suggesting coerced payments. Mandate additional documented source-of-funds checks and closer ongoing monitoring for entities flagged under extortion risk categories.
- Promptly file SARs/STRs when identifying accounts receiving payments labeled as "forced donations" or featuring coercion terminology in transaction narratives.
- Escalate any abrupt spikes in deposits linked to publicly known extortion events or recognized criminal groups for further regulatory investigation.
Consult publicly available media reports, local jurisdiction records, and community advisories to cross-check customers reportedly implicated in intimidation or racketeering schemes. Correlate suspicious surges in deposits or revenue with documented extortion incidents to uncover coerced payment flows.
Temporarily freeze, block, or limit access to accounts exhibiting repeated extortion-linked transactions or abrupt influxes of coerced funds. This measure halts the laundering process while investigations assess whether continued account usage poses legal or reputational risks.
Instruments
- Once cash or electronic transfers are extorted, perpetrators often deposit the funds into personal or front-company bank accounts.
- They label these coerced payments as ordinary business proceeds or personal transactions, commingling them with legitimate deposits.
- Rapid intra-bank or inter-bank transfers then layer the funds, further complicating the trail and hindering detection by financial institutions.
- Some extortion rings specify privacy-centric cryptocurrencies (e.g., Monero, Zcash) to conceal forced payments.
- Built-in anonymity features—such as stealth addresses and ring signatures—obfuscate transaction details, making the flow of coerced money difficult to track.
- Criminals can then convert these anonymized funds into other digital assets or fiat, masking the extortion origin.
- In certain extortion scenarios (e.g., ransomware), criminals demand that victims pay in Bitcoin or similar public-ledger cryptocurrencies.
- They exploit the pseudonymous nature and global reach of these assets, receiving the coerced funds in digital wallets.
- Funds are then layered across multiple accounts or exchanges, making it harder to trace origins despite the public blockchain record.
- Criminals directly collect physical currency from extortion victims, typically in unrecorded handovers. This allows them to bypass transparent financial channels at the outset.
- They then deposit or integrate these cash proceeds into legitimate revenue streams, such as hospitality businesses or retail operations, to obscure their coercive origin.
- The anonymity and liquidity of cash make it challenging for financial institutions to identify the illicit nature of these transactions.
Service & Products
• Front hospitality venues can inflate bookings or service fees, mixing coerced cash with normal revenues.
• Periodic spikes in hotel income, lacking legitimate occupancy data, mask extortion-derived funds.
• Criminal organizations use front-company business accounts to deposit coerced payments, disguising them as legitimate revenue.
• Subsequent transfers or commingling with authentic sales proceeds obscure the extortion source and hinder detection.
• Forced payments may be labeled as donations or contributions to fraudulent charities, masking the extortion proceeds.
• Vague references like 'mandatory contribution' or 'forced donation' distort the true, coercive nature of the funds.
• Criminals compel overseas individuals or businesses to send forced payments, routing them through remittance channels.
• Large or frequent cross-border transfers labeled with ambiguous references can conceal extortion proceeds and finance illicit operations.
• Criminal entities use merchant accounts to record fake sales or inflate transaction volumes, commingling extorted money with legitimate customer payments.
• Payment system data can be manipulated to legitimize suspicious funds, blurring the distinction between coerced and normal income.
Actors
Terrorist organizations employ coercive methods to extract regular payments from communities or diaspora groups.
- These forced contributions finance their activities and are then routed into legitimate or front business channels.
- The use of legitimate accounts or businesses complicates detection for financial institutions, obscuring the true origin of extorted funds.
Commercial businesses are frequent extortion targets, compelled to pay under threat of harm or disruption.
- The owners or operators are unwittingly exploited when their coerced payments become illicit proceeds.
- While not active participants in laundering, their forced outflows feed the criminal revenue streams needing concealment.
Organized crime groups drive extortion by threatening businesses or individuals and collecting recurring payments.
- They coerce victims into handing over cash or bank transfers under the guise of 'protection fees.'
- After collecting these funds, they deposit or commingle them with legitimate revenues, concealing the extorted source from financial institutions.
Cash-intensive businesses, such as those in the hospitality or retail sectors, are commonly used to mask extortion proceeds.
- Criminals merge forced cash payments with legitimate daily sales.
- Large deposits, appearing as routine business income, make it harder for financial institutions to trace the funds back to extortion.
References
Financial Crimes Enforcement Network (FinCEN). (2020). FinCEN Advisory on Ransomware and the Use of the Financial System to Facilitate Ransom Payments (CYBER FIN-2020-A006). FinCEN.https://www.fincen.gov/sites/default/files/advisory/2021-11-08/FinCEN%20Ransomware%20Advisory_FINAL_508_.pdf
Abuza Z. (2004). The trial of Abu Bakar Ba'asyir: A test for Indonesia. Terrorism Monitor Volume: 2 Issue: 21. https://jamestown.org/program/the-trial-of-abu-bakar-baasyir-a-test-for-indonesia/
Kemp, W. (2017). Crooked Kaleidoscope: Organized Crime in the Balkans. Global Initiative against Transnational Organized Crime. https://globalinitiative.net/wp-content/uploads/2017/07/OC_balkans.pdf
Pietschmann, T., Walker, J. (2011). Estimating illicit financial flows resulting from drug trafficking and other transnational organized crimes. United Nations Office on Drugs and Crime. https://www.unodc.org/documents/data-and-analysis/Studies/Illicit_financial_flows_2011_web.pdf
Heinrich-Böll-Stiftung, Schönenberg, R (eds). (2013). Transnational Organized Crime: Analyses of a Global Challenge to Democracy. transcript Verlag. https://library.oapen.org/bitstream/handle/20.500.12657/30364/646500.pdf?sequence=1&isAllowed=y
Mugarura, N., Ssali, E. (2021). Intricacies of anti-money laundering and cyber-crimes regulation in a fluid global system. Journal of Money Laundering Control, Vol. 24 No. 1, pp. 10-28. https://doi.org/10.1108/JMLC-11-2019-0092
Manning, G. A. (2011). Financial investigation and forensic accounting (3rd ed.). CRC Press. http://www.crcpress.com
Clarke, C. P. (2015). Terrorism Inc, The Financing of Terrorism, Insurgency, and Irregular Warfare. ABC-CLIO, LLC. http://www.abc-clio.com