A collusive scheme in which criminals rig or distort a bidding or tender process to disguise illicit funds as lawful business expenses or payments. By artificially inflating or deflating contract prices, they funnel criminal proceeds through what appear to be normal procurement transactions (e.g. contracts, purchase orders, governmental tenders). Criminals often pay or receive kickbacks or commissions for manipulating laws and procedures governing the award process. They also coordinate with nominally competing firms—known as collusive tendering—leading to suspicious patterns, such as identical bids, unexpected bid withdrawals, and last-minute price adjustments to ensure a predetermined winner. These tactics create a veneer of legitimacy and ultimately integrate illicit capital into official financial records.
Bid Manipulation
Collusive Tendering
Rigged Bidding
Collusive Bidding
Tender Rigging
Tactics
Through manipulated or distorted bidding processes, criminals channel illicit funds as seemingly legitimate contract payouts or business revenues. This method allows them to merge tainted assets with lawful financial flows, completing the final integration stage of money laundering.
Risks
Criminals exploit vulnerabilities in official or private bidding processes that lack sufficient transparency or AML oversight. By manipulating or rigging such tender channels, they disguise illicit funds as purported legitimate business expenses or contract payments, integrating tainted proceeds into routine procurement flows.
Indicators
Contracts awarded at significantly inflated or deflated prices compared to market benchmarks, indicating manipulation in the bidding process.
A consistent pattern of bid rotation, with a small group of companies taking turns as the designated winning bidder in multiple tender processes.
Bidding entities share overlapping beneficial ownership, directorship, or key stakeholder roles, indicating collusion.
Bids repeatedly revised with abrupt pricing changes immediately before contract awards, signaling potential collusive coordination.
Payments from rigged contracts are systematically structured with round amounts or split into smaller sums to evade detection and reporting thresholds.
High similarity in the structure, formatting, or technical content of bid proposals among different companies, suggesting coordinated preparation of bids.
Frequent use of intermediary companies by bidders to conceal true ownership and facilitate illicit fund flows.
Consistent awarding of contracts to a predetermined bidder across multiple tender processes, despite the presence of other participants.
Unexpected last-minute bid withdrawals by multiple participants, clearing the path for a predetermined winner.
Unusual commission or consulting fee payments linked to awarded contracts lacking any valid service justification.
Data Sources
PEP lists typically include names, government or political roles, associated entities, and known affiliations. By comparing awarding officials or beneficial owners against these lists, organizations can detect potential conflicts of interest, corruption, or collusive practices involving public officials in manipulated tenders.
- Includes contract documents, purchase orders, and invoices with amounts, parties involved, and payment terms.
- Enables comparison of awarded contract prices against market benchmarks to detect inflated or deflated pricing.
- Helps identify patterns of bid rotation, abrupt price revisions, or favoritism indicating bid manipulation.
- Comprehensive records of financial transactions, including timestamps, amounts, and counterparties.
- Helps detect structured payments or suspicious commissions related to rigged contracts, such as round-number transactions or repeated smaller sums below reporting thresholds.
- Central storage of official tender documentation, including bid submissions and withdrawal notices.
- Version control and audit trails help detect synchronized proposals, last-minute amendments, and abrupt withdrawals, indicating possible collusive bid manipulation.
Logs capturing emails, phone calls, and other messaging platforms typically document timestamps, sender/recipient identities, and—in jurisdictions where permissible—content. Analyzing these records can reveal collusive arrangements, instructions to withdraw bids, and other conspiratorial communications consistent with bid manipulation.
- Provides official incorporation details, shareholder data, and beneficial ownership structures.
- Facilitates cross-referencing of ownership information among bidding entities to uncover overlapping controllers, indicating potential collusion or use of shell intermediaries in rigged tenders.
Mitigations
Apply deeper scrutiny to high-value or high-risk contract bids by verifying beneficial ownership, cross-checking references, and examining past contract performance. Confirm that pricing is consistent with market benchmarks to prevent artificially inflated or deflated bids.
Analyze outgoing payments or reimbursements to contractors for suspicious patterns, such as rotating or identical payees. Compare contract amounts to typical market rates to detect artificially inflated or deflated values that could indicate collusive bid manipulation.
Enforce rigorous vendor vetting and continuous monitoring of supplier relationships. Require disclosure of beneficial owners, check for prior collusion incidents, and verify financial statements to detect suspicious alliances or repeated relationships among bidders.
Implement structured procurement guidelines that require independent reviews, mandatory price comparisons, and random audits of bidding processes. Ensure there are multiple sign-off requirements so that no single individual can manipulate contract awards.
Provide targeted training to employees and procurement personnel on collusive tendering red flags, such as near-identical bid documentation, patterns of recurring winners, or unexplained last-minute withdrawals. Emphasize escalation procedures for questionable bidding activity.
Maintain comprehensive records of each bidding event, documenting proposals, final awards, and any modifications. Retain digital audit logs capturing price changes or approvals to facilitate forensic analysis for suspicious patterns, such as abrupt bid shifts.
Schedule periodic audits to compare awarded contracts with market benchmarks. Check for repeated selection of the same bidder or last-minute bid withdrawals. Validate procurement logs and decision-making rationales to uncover rigged bidding patterns.
Cross-check the beneficial ownership and directorship details of bidding entities through public registries, media, and other open sources to identify overlapping ownership or repeated use of contact information. This helps uncover nominally competing firms colluding in tender processes.
Instruments
- Manipulated contract payments flow into business bank accounts, recorded as ordinary income or supplier payments.
- Collusive entities can route bribes and kickbacks among these accounts, blending them with legitimate transactions.
- The use of standard bank accounts gives the appearance of lawful financial activity, making it more challenging for institutions to detect suspicious flows arising from rigged bids.
- Inflated or fabricated invoices reflect artificially high or low contract sums, supporting the rigged bids' disguised payments.
- Criminals book these invoices as standard receivables for goods or services, integrating illicit funds into official financial statements.
- Invoice financing (factoring) can further obscure the source by quickly monetizing the receivables, providing a convenient layering step within the laundering process.
Service & Products
- Enables submission of inflated or fabricated invoices tied to rigged contracts, presenting illicit gains as normal procurement expenses.
- Complex or layered invoicing practices can conceal kickbacks and further disguise collusive arrangements.
- Used to facilitate or advise on rigged tender processes under a veil of legitimate business consulting.
- ‘Consultancy fees’ or ‘commissions’ can mask bribes or kickbacks paid to secure predetermined contract awards.
- Receive proceeds paid under manipulated contract awards, appearing as legitimate corporate income.
- Enable concealed routing of kickbacks or bribes through routine commercial transactions, obfuscating the origin and beneficiary of illicit funds.
- Can legitimize artificially inflated or deflated contract payments through manipulated financial records.
- Obscures suspicious transactions and payments, making detection of collusion or fraudulent bids more difficult for external reviewers.
- Criminals can form multiple corporate entities that appear to be distinct bidders but are actually controlled by the same perpetrators.
- Nominee director or shareholder arrangements conceal real ownership, enabling collusive tendering across seemingly independent firms.
Actors
They legitimize manipulated contract amounts by:
- Adjusting or falsifying financial records to reflect inflated or deflated revenues and expenses.
- Concealing irregularities in invoices and payment flows that would otherwise signal bid-rigging.
This manipulation helps present suspicious transactions as ordinary business activity to financial institutions and auditors.
They participate as bidders in the collusive scheme by:
- Submitting artificially inflated or deflated bids under the pretense of legitimate competition.
- Routing potential kickbacks through corporate accounts and invoices.
Financial institutions perceive these as standard corporate transactions tied to contract awards, effectively masking the underlying collusion and money laundering activities.
They orchestrate and control collusive tendering by:
- Forming or coordinating multiple seemingly independent entities to submit rigged bids.
- Paying or receiving bribes and kickbacks disguised as legitimate procurement costs.
These actions create contract payments that appear lawful to financial institutions, making it harder to detect the true criminal source of funds.
They facilitate or enable rigged contract awards by:
- Influencing or approving the tender process in exchange for bribes or kickbacks.
- Overlooking suspicious bidding patterns or competitor withdrawals to ensure a predetermined winner.
This exploitation of public authority creates payment flows that appear legitimate to financial institutions, obscuring the illicit origin of funds.
They provide a veneer of legitimate business consulting while:
- Advising on how to manipulate the bidding process or tender documentation.
- Invoicing 'consultancy fees' that serve as kickbacks or bribes.
These fees and advisory services appear legitimate to financial institutions, helping to disguise collusion and the true origin of illicit funds.
References
Egmont Information Exchange Working Group (IEWG). (2019). FIU tools and practices for investigating laundering of the proceeds of corruption. https://egmontgroup.org/wp-content/uploads/2021/09/2019_Public_Summary_FIU_Tools_and_Practices_for_Investigating_Laundering_of_the_Proceeds_of_Corruption.pdf
GIABA (Inter-Governmental Action Group Against Money Laundering in West Africa). (2014). Money laundering related to fraud in public procurement in West Africa: A case study of Nigeria. GIABA. http://www.giaba.org
Mugarura, N. (2012). A brief overview of money laundering and corruption. British Institute of International and Comparative Law (BIICL).