Investment Companies

Criminals create or acquire investment entities or private funds to blend illicit proceeds with legitimate capital under the guise of ordinary portfolio management, using shell structures or nominee owners to conceal beneficial ownership and circumvent AML measures. Many private funds are not subject to the same AML/CFT scrutiny as publicly offered or retail funds, creating regulatory gaps that can be exploited to hide or layer proceeds. By routing capital through multiple jurisdictions and employing complex vehicles such as special purpose entities, criminals obscure the funds’ origin and ownership, sometimes artificially inflating share prices to generate capital gains. Organized crime groups have also placed large sums from fraud or Ponzi schemes into hedge funds or private equity, commingling illicit and lawful assets. Repeated cross-border layering complicates investigations, and criminals ultimately claim redemptions or documented gains as seemingly legitimate returns. In some instances, they exploit varying oversight of private equity arrangements to minimize AML checks and disclosure requirements. Additionally, private investment companies in secrecy havens can frustrate efforts to identify beneficial owners, further enabling the concealment of illicit capital.

[
Code
T0061.003
]
[
Name
Investment Companies
]
[
Version
1.0
]
[
Tactics
]
[
Risk
Customer Risk, Product Risk, Jurisdictional Risk
]
[
Created
2025-02-26
]
[
Modified
2025-04-02
]

Investment Company Creation for Money Transfer Bridging

Tactics

ML.TA0007
|
|

Repeated cross-border transactions and complex portfolio movements within these investment companies explicitly serve to distance illicit proceeds from their origin, complicating any audit trail.

Risks

RS0001
|
Customer Risk
|

Criminals use shell structures, nominee owners, or front individuals to conceal the actual beneficial ownership of investment entities. This complicates KYC processes and heightens customer-related vulnerabilities, allowing them to mask the true controllers of illicit funds and evade thorough AML scrutiny.

RS0002
|
Product Risk
|

This technique primarily exploits vulnerabilities in private investment companies and private funds, which are not subject to the same AML scrutiny as publicly offered or retail funds. Criminals leverage this limited oversight to blend illicit proceeds with legitimate capital, layer funds through complex transactions, and obscure beneficial ownership. Ultimately, they present redeemed capital or gains as legitimate returns, circumventing detection and AML controls.

RS0004
|
Jurisdictional Risk
|

These investment structures are often established or operated within jurisdictions that favor secrecy and have weaker AML enforcement or limited transparency. This enables criminals to hide beneficial ownership and the illicit origin of funds. Cross-border layering and offshore secrecy further hinder effective investigations.

Indicators

IND00533
|

Investment company is registered in a jurisdiction different from where it primarily operates or holds assets.

IND00688
|

Investment company makes large investments in assets with high liquidity, such as stocks or bonds, which can be quickly converted to cash.

IND00696
|

Significant discrepancies between the investment company's financial statements and its actual financial activities.

IND00764
|

Investment company engages in frequent buying and selling of assets with little or no economic rationale.

IND00862
|

Presence of politically exposed persons (PEPs) as beneficial owners or significant shareholders of the investment company.

IND00907
|

Investment company has a limited or no online presence, making it difficult to verify its legitimacy or track record.

IND02857
|

Evidence of share price manipulation or orchestrated pump-and-dump schemes involving the investment company's controlled securities.

IND02885
|

Frequent large redemption requests or distributions from the private fund that are not aligned with typical investment timelines or market conditions.

IND02888
|

Frequent changes in the company's official address or contact details with no legitimate justification.

IND02889
|

Complex ownership structures with multiple layers of ownership or control, making it difficult to identify the ultimate beneficial owner.

IND02890
|

Unusual or disproportionately large transactions not consistent with the stated business purpose or profile of the investment company.

IND02891
|

Significant investments in illiquid or opaque assets that are difficult to value or trace, such as certain real estate or private equity investments.

IND02892
|

Sudden or unexplained increase in the volume or value of transactions handled by the investment company.

IND02893
|

Use of nominee directors or shareholders who have no active role in the management or operations of the company.

IND02894
|

Investment company frequently changing its board of directors or key management personnel without a clear business rationale.

IND02895
|

Transactions involving the investment company that lack a clear economic or business rationale, such as round-tripping or circular transactions.

IND02896
|

Investment company holding accounts in multiple jurisdictions without a clear business need, potentially to obscure the flow of funds.

IND02897
|

Frequent changes in the registered beneficial owners or shareholders of the investment company.

IND02898
|

Large and frequent transfers of funds between the investment company and entities in jurisdictions known for high levels of secrecy or lack of AML regulations.

Data Sources

  • Databases identifying individuals in high-profile political or public positions.
  • Critical for enhanced due diligence on investment company owners or significant shareholders who may pose elevated corruption and money laundering risks.
  • Country-level AML/CFT risk ratings, regulatory requirements, and enforcement practices.
  • Highlights suspicious use of offshore or high-secrecy jurisdictions where private investment companies can obscure illicit proceeds or evade oversight.
  • Official filings such as tax returns, balance sheets, and profit-and-loss statements.
  • Comparative analysis can reveal discrepancies between an investment company’s reported activities and its actual financial operations, signaling possible laundering or false reporting.
  • Publicly available information from websites, social media, corporate registries, and news outlets.
  • Helps verify the investment company’s stated operations and legitimacy, flagging minimal online footprints or contradictory public information indicative of shell or front entities.
  • Detailed bookkeeping of all deposits, withdrawals, wire transfers, and investment movements, including timestamps, amounts, and counterparties.
  • Enables detection of layering schemes, unusual fund flows, and cyclical transactions that deviate from legitimate investment patterns.
  • Information on account holders, balances, transaction histories, and account structures across multiple financial institutions.
  • Supports identification of multiple, often cross-border, accounts used to transfer or layer proceeds through investment companies.
  • Real-time and historical data on stocks, bonds, and other securities, including pricing, trading volumes, and issuer details.
  • Helps identify patterns of high-volume liquidation, short-term trading, or suspiciously large holdings that may be used to layer or obscure illicit funds within investment portfolios.
  • Verified identity information, ownership details, and business profiles for individuals and entities associated with the investment company.
  • Summaries of transaction activities, declared source of funds, and risk assessments.

These details reveal undisclosed or nominee owners, questionable ownership transfers, and inconsistencies in financial or background information—key indicators of potential laundering activities within private investment structures.

  • Databases of real property and other valuable assets, including purchase details, beneficial owners, and transactional histories.
  • Helps uncover investment strategies involving opaque assets that can serve as conduits for laundering funds through private equity or holding companies.
  • Logs of trades executed on regulated exchanges, including timestamps, volumes, and counterparties.
  • Enables detection of market manipulation, pump-and-dump activity, or high-velocity trades aligned with layering or artificially created investment gains.
  • Information on international wires, intermediary banks, and beneficiary locations.
  • Allows tracing of funds routed through multiple jurisdictions, highlighting layering patterns or transfers to secrecy havens often used by illicit private funds.
  • Official registration records, shareholder information, and beneficial owner disclosures.
  • Facilitates detection of shell companies, nominee directors, and frequent changes in ownership structures, which are central tactics in concealing the ultimate beneficiaries of illicit capital.

Mitigations

Identify secrecy havens or jurisdictions with lax oversight where private investment companies frequently register. Apply enhanced controls or additional due diligence for cross-border transactions involving these high-risk locations, such as requiring more detailed disclosures of fund ownership structures. This measure addresses criminals exploiting lower AML standards across multiple jurisdictions to obscure illicit wealth in private funds.

Require detailed verification of private investment companies' ownership structures, including any nominee or shell entities, and validate licensing or registration with regional regulators. Confirm the legitimacy and source of all investor funds and determine whether share valuations or capital contributions align with audited financial statements. These deeper checks specifically target the risk of criminals using private funds to layer or obscure illicit proceeds and evade standard AML scrutiny.

Implement tailored monitoring scenarios for investment companies that flag rapid cross-border inflows, unusually large capital subscriptions from high-risk jurisdictions, and frequent subscription-redemption cycles inconsistent with normal portfolio management. Closely track any sudden, unexplained changes in share prices or asset valuations that might indicate manipulated returns. This measure counters the layering and artificial capital gains techniques common among illicit private investment vehicles.

Assign higher risk scores to investment companies or private funds exhibiting complex cross-border flows, multiple nominee owners, or minimal regulatory filings. Intensify transaction alert thresholds and perform more frequent reviews for these high-risk segments, emphasizing unusual investment patterns or sudden asset movements. This tailored approach ensures institutions proactively identify and mitigate private funds that may be used to blend illicit and legitimate capital.

Leverage official company registries, regulatory filings, media reports, and other open-source data to confirm the background of private fund operators, identify past regulatory sanctions, and uncover undisclosed nominee or shell affiliates. Verify investor claims and check for negative media or court records indicating fraud or asset parking. This measure targets the technique's reliance on secrecy and limited transparency to hide the illicit origins of capital.

Limit or deny certain high-risk transactions, such as large remote subscriptions or rapid redemption requests, when due diligence reveals insufficient transparency regarding beneficial owners or unexplained funding sources. Freeze or restrict account activities if the investment entity displays red flags consistent with cross-border layering or inflated share valuations. This prevents criminals from exploiting easier channels to launder illicit capital through lightly regulated private funds.

Continuously review and update the beneficial ownership records of the investment company, investigating abrupt or frequent changes in listed owners, managers, or control structures. Track cross-border movements of funds tied to the investment vehicle, and promptly reassess risk when the company alters investment strategies or shifts to new jurisdictions. This directly addresses criminals who repeatedly restructure private funds to conceal proceeds from fraud, Ponzi schemes, or organized crime.

Instruments

  • Criminals establish bank accounts in the name of an investment company, depositing illicit funds disguised as legitimate capital under ordinary portfolio management.
  • By routing funds through multiple jurisdictions and claiming rebalancing or cross-border investment flows, they obscure the original illicit source.
  • Commingling dirty money with legitimate investor contributions causes transactions to appear ordinary, impeding AML scrutiny.
IN0019
|
|
  • Using the investment entity, criminals buy, sell, or trade securities, sometimes manipulating share prices to generate fictitious gains.
  • Leveraging regulated markets lends a façade of legitimacy to illicit proceeds, which are claimed as investment returns.
  • Complex trading strategies and shell structures obscure beneficial ownership, hindering investigators from tracing capital origins.
  • Criminals acquire or establish investment companies, holding equity interests through nominees or shell structures.
  • Multiple layers of ownership conceal the ultimate beneficial owners, making it difficult to trace the real controllers.
  • Dividends or liquidation proceeds are presented as legitimate returns on equity, masking the illicit origin of the underlying funds.
  • Criminals funnel illicit proceeds into private funds or hedge funds operated by the investment company.
  • Weaker AML/CFT requirements around certain private funds enable looser scrutiny, allowing criminals to blend illicit capital with legitimate investments.
  • Fund redemptions later appear as standard investment returns, effectively integrating dirty money into the financial system.

Service & Products

  • Facilitate large injections of criminal proceeds as so-called business investments, masking them through formal corporate structures.
  • Criminals can justify illicit funds as legitimate returns or exit proceeds when divesting from portfolio companies.
  • Offer professional portfolio management, potentially masking the origin of illicit funds by integrating them with ordinary client portfolios.
  • Enable cross-border transfers and repeated layering through multiple asset classes, complicating AML investigations and obscuring ultimate beneficiaries.
  • Facilitate the creation or management of investment vehicles that blend illicit proceeds with legitimate capital.
  • Allow criminals to claim investment yields on illicit funds, presenting them as ordinary portfolio returns, thereby integrating dirty money into the financial system.
  • Permit the setup or use of hedge funds, private equity, or other lightly regulated vehicles where illicit proceeds can be commingled with legitimate capital.
  • Exploit complex structures and cross-jurisdictional operations to circumvent AML scrutiny, hiding the true beneficial owners.
  • Provide accounts in jurisdictions with relaxed or opaque AML regulations, allowing criminals to circumvent standard compliance.
  • Support complex cross-border layering, making it exceedingly difficult for authorities to trace the original source of funds.
  • Pool money from numerous investors, complicating the tracing of individual contributions and masking illicit inflows within larger funds.
  • Exploit schemes subject to weaker AML/CFT oversight, allowing criminals to blend dirty money with legitimate assets.
  • Enable the establishment of investment companies in secrecy-favorable jurisdictions with minimal AML scrutiny.
  • Provide nominee or shell-company arrangements to conceal the true beneficial owners and block investigative efforts.
  • Provide formation and management of corporate entities or trusts, enabling criminals to establish layered ownership structures that obscure beneficial ownership.
  • Assist in creating shell or nominee arrangements, reducing transparency and making it more difficult for authorities to trace illicit funds.

Actors

PEPs may appear as beneficial owners or major stakeholders in privately held investment companies, raising the risk that:

  • Illicit funds from corruption or bribery are blended with legitimate investments.
  • Authorities face heightened challenges tracing or questioning unusually large inflows connected to political offices.

Financial institutions must exercise enhanced scrutiny when PEPs are involved, as the origin of assets and influence can further obscure potential misconduct.

These groups channel proceeds from fraud, Ponzi schemes, or other predicate offenses into private investment companies, hedge funds, or private equity structures. By commingling illicit and legitimate assets, they:

  • Conceal the true source of funds behind formal investment operations.
  • Exploit cross-border transactions and repeated layering, hindering financial institutions' ability to trace underlying criminal proceeds.
  • Ultimately withdraw or redeem funds as ostensible profits or capital gains, further obscuring their origin.

These firms, along with hedge funds (ID: 318), receive large capital contributions from criminals seeking to:

  • Integrate illicit proceeds into formal investment channels under the guise of legitimate portfolio activity.
  • Commingle unlawful funds with legitimate assets, making it difficult for financial institutions to differentiate clean from dirty money.
  • Exploit relatively light regulatory oversight of non-public investment funds, circumventing stricter AML scrutiny required for retail or public offerings.

Criminals may later claim proceeds as returns on investments, further obscuring their illicit origin.

Criminals establish or acquire shell companies, often in offshore jurisdictions, to operate as investment vehicles. By maintaining minimal business activity and leveraging secrecy laws, these entities:

  • Serve as holding structures for illicit funds disguised as investment capital.
  • Obscure ownership records and shield the true controllers’ identities from financial institutions.
  • Enable layering across multiple jurisdictions, reducing transparency and complicating AML investigations.
AT0068
|
|

Nominees formally hold shares or manage investment entities on behalf of hidden principals. By acting as the registered owner instead of the true controller, they:

  • Mask the criminal’s identity and beneficial ownership in fund formation or acquisition.
  • Obscure the source and control of invested capital, complicating customer due diligence.
  • Present additional barriers for financial institutions and investigators seeking to identify ultimate beneficiaries and trace illicit funds.

References

  1. Hanichak, E., Kumar, L., Kalman, G. (2021). Private Investments, Public Harm: How the opacity of the massive U.S. private investment industry fuels corruption and threatens national security. FACT Coalition, Global Financial Integrity, Transparency International U.S. Office, Washington, D.C. https://us.transparency.org/resource/private-investments-public-harm-report/

  2. AUSTRAC (Australian Transaction Reports and Analysis Centre) . (2013). Typologies and case studies report 2013. AUSTRAC. https://www.austrac.gov.au/business/how-comply-guidance-and-resources/guidance-resources/typologies-and-case-studies-report-2013

  3. Ferragut, S. (2012, November). Organized crime, illicit drugs and money laundering: The United States and Mexico. Chatham House. https://www.chathamhouse.org/sites/default/files/public/Research/International%20Security/1112pp_ferragut.pdf

  4. AUSTRAC (Australian Transaction Reports and Analysis Centre). (2024). Money laundering in Australia National Risk Assessment. Commonwealth of Australia. https://www.austrac.gov.au/sites/default/files/2024-07/2024%20AUSTRAC%20Money%20Laundering%20NRA.pdf

  5. de Koster, P. (2010). The threats that terrorist and subversive organisations pose, particularly by penetration, to the stability and integrity of financial institutions and markets. Journal of Money Laundering Control vol. 13(2), Emerald Group Publishing Limited. https://ideas.repec.org/a/eme/jmlcpp/13685201011034078.html

  6. JMLSG (The Joint Money Laundering Steering Group). Consultation on 13. Private Equity. JMLSG (UK). https://www.jmlsg.org.uk/consultations/

  7. Byrne, J. J., Pasley, B., Anderson, K., Stoeckert, B., Osborne, P., Wild, P., Keller, B., Dang, H., Sheen, S., Small, R., Saur, N., Clark, D., Chrisos, V., Rentschler, A., Lormel, D., Bou Diab, A., Nguyen, A., Vitale, B., Miller, B. K., Bagnall, C., Randle, C., Dekkers, D., Hitzeroth, D., Davidek, D., Beemer, E., Wathen, E., Bagliebter, G., Smith, I., Castro, I. S., Sonnenschein, J., Brierley, J., Vilker, J., Conaty, J., Egberink, J., Simmons, K., Leong, K. C., Kohr, L., Dastrup, L., Silvers, M., Dilly, M., Lake, N., Warrack, P., Byrne, R., McCrossan, S., McCullough, S., Gurdak, S., Cannon, S., Ong, S. W. Y., Turculet, T., Edano, V., Chapman, W. A., Balyasna-Hooghiemstra, Y., Miller, Z., Storelli, G. (2018). Study guide CAMS certification exam (6th ed.). Association of Certified Anti-Money Laundering Specialists (ACAMS).