Complicit or Controlled FIs

Criminals establish or covertly acquire money service businesses (MSBs), manipulating compliance measures to camouflage illicit transactions. They may form or use shell companies with nominee owners, or install complicit staff, ensuring suspicious activity goes unreported and blending illicit proceeds with legitimate MSB flows. In some cases, these MSBs rely on large agent networks, limiting oversight and complicating the detection of suspicious patterns. Professional money launderers or organized groups often maintain close relationships with MSBs to retain control over payment processes and evade scrutiny. This covert ownership and subversion of internal controls obstructs regulatory efforts to identify true beneficiaries, as criminals conceal ultimate ownership behind layers of compromised or criminally controlled MSB structures.

[
Code
T0082
]
[
Name
Complicit or Controlled FIs
]
[
Version
1.0
]
[
Parent Technique
]
[
Risk
Customer Risk, Internal Risk
]
[
Created
2025-02-26
]
[
Modified
2025-04-02
]

MSB

Remittance Service

Currency Exchange Office

Check Casher

Tactics

Criminals deliberately secure or retain complicit Money Service Business (MSB) channels to bypass genuine oversight, enabling illicit funds to flow under the guise of standard money services without triggering AML controls. This is the primary objective, as it grants direct access to financial systems while subverting compliance mechanisms.

Risks

RS0001
|
Customer Risk
|

Criminals conceal or falsify the beneficial ownership of the MSB using nominee structures or shell companies, obscuring their true identities. This hidden ownership presents an elevated risk profile to counterparties, as it thwarts customer due diligence and masks who ultimately controls the funds.

RS0005
|
Internal Risk
|

Criminals take over or establish MSBs and subvert their internal governance. By installing complicit or corrupt compliance staff, they ensure suspicious transactions go unreported and bypass standard AML controls. The technique’s core vulnerability lies in compromised oversight and active manipulation of internal control frameworks.

Indicators

IND00460
|

Disproportionate cash flow compared to industry norms (e.g., a small MSB handling millions in daily transactions).

IND00461
|

Large round-figure transactions processed through the MSB without clear commercial documentation or purpose.

IND00462
|

Complex, multi-layered fund flows involving multiple correspondent accounts that exceed typical MSB operational needs.

IND00463
|

Employees or managers frequently conduct transactions on behalf of multiple unrelated customers, bypassing standard KYC checks.

IND02574
|

High-volume third-party transactions that deviate significantly from the MSB’s declared customer base or business model.

IND02576
|

Frequent or rapid transfers among multiple MSB-controlled accounts with minimal holding periods and no clear business rationale.

IND02577
|

Fewer suspicious transaction reports filed than expected given the MSB’s high-risk transaction profile and clientele.

IND02578
|

MSB ownership or directorship linked to high-risk individuals, PEPs, or offshore entities.

IND02580
|

Unrecorded or suspicious affiliations between the MSB and high-risk counterparties not documented in standard due diligence files.

IND02581
|

Repeated overrides or manual suppression of internal AML alerts by senior MSB staff without documented justification.

IND02583
|

Excessive reliance on a widespread agent network having inconsistent record-keeping and incomplete KYC information.

Data Sources

  • Includes data on individuals who hold (or have held) prominent public or political positions, along with known affiliations.
  • Reveals if MSB owners, directors, or connected parties are PEPs, raising corruption and high-risk flags.
  • Assists investigators in prioritizing scrutiny of MSBs potentially controlled or influenced by high-risk or politically exposed actors.
  • Provides detailed records of financial transactions, including timestamps, amounts, parties, currencies, and transaction identifiers.
  • Enables detection of large or round-figure transactions, layering across multiple MSB-owned accounts, and unusual volumes compared to the MSB’s declared operations.
  • Supports AML teams in identifying and investigating transaction patterns that may indicate complicit or controlled MSBs masking illicit flows.
  • Captures user actions within internal systems, including timestamps, login details, and administrative overrides.
  • Identifies repeated or unjustified suppression of AML alerts, manual overrides of monitoring rules, and other complicit staff activities.
  • Enables auditors and investigators to trace potential internal collusion that allows illicit transactions to remain undetected.
  • Contains detailed staff employment data, roles, and affiliations within the financial institution.
  • Reveals potential conflicts of interest or unusual staff assignments that could facilitate illicit activities.
  • Supports internal investigations to identify complicit employees who may manipulate compliance measures or reporting processes.

Official or government-run registries of licensed MSBs include licensing status and operational details. Cross-referencing an MSB’s declared operations and ownership with these registries helps detect unlicensed or fraudulently acquired licenses, identifying potential front or controlled MSBs used for illicit transactions.

  • Contains verified customer identities, business details, beneficial ownership information, and risk profiles.
  • Highlights gaps or inconsistencies in customer onboarding and monitoring, such as employees creating accounts on behalf of multiple unrelated clients or bypassing KYC checks.
  • Assists AML teams in detecting MSB staff collusion and subversion of internal controls used to hide beneficial owners or high-risk relationships.
  • Documents cross-border payments, correspondent banking relationships, transaction volumes, and currency flows.
  • Helps detect excessive or complex layering of funds through multiple MSB or correspondent accounts beyond established business needs.
  • Supports AML investigations by highlighting international movement of funds indicative of controlled or complicit MSBs facilitating hidden beneficiaries.
  • Provides official information on company registration, shareholders, directors, and ownership structures.
  • Enables confirmation of an MSB’s declared ownership against actual beneficial owners, helping expose shell companies or undisclosed controllers.
  • Aids in verifying whether the MSB is covertly owned or directed by criminals or high-risk parties seeking to evade detection.

Mitigations

Require in-depth verification of MSB ownership and management structures, such as cross-checking with official registries, confirming licensing and regulatory statuses, and evaluating any nominee or shell arrangements. Closely scrutinize compliance managers and key staff for undisclosed affiliations or negative media, ensuring that criminals cannot conceal ultimate ownership or install complicit staff to bypass oversight.

Implement targeted monitoring scenarios for MSB accounts, focusing on large round-figure movements, negligible holding periods, and rapid fund layering across multiple agent locations. Compare actual transaction volumes against the MSB’s stated business model to detect discrepancies that may indicate covert criminal ownership or complicit staff enabling illicit transfers.

Conduct ongoing due diligence of the MSB’s agent network, verifying that each sub-agent meets KYC and record-keeping standards and is subject to routine oversight. This measure reduces the exploitation of poorly monitored agents by criminals controlling or infiltrating the MSB’s extended network, ensuring complete visibility into high-volume or unusual transaction flows.

Mandate thorough background checks, including criminal record searches, financial misconduct history, and reference verification, on MSB owners, leadership, and compliance officers before establishing or maintaining business relationships. This step detects potential criminal infiltration within the MSB’s decision-making and compliance functions, mitigating the risk of complicit staff enabling illicit transactions.

Require periodic external audits of the MSB’s AML controls and governance to verify effective suspicious activity identification and reporting. Independent reviewers should examine override logs, staff escalation processes, and agent oversight procedures to detect hidden or suppressed red flags, ensuring that criminals cannot mask illicit activities by subverting internal compliance.

Restrict or deny the MSB’s access to high-risk services, such as large-sum foreign currency exchanges or multiple consecutive cross-border transactions, if it fails to demonstrate adequate AML controls or shows indicators of complicit ownership. Limiting high-risk channels prevents the continuous flow of illicit proceeds through compromised MSBs.

Instruments

  • Complicit MSBs maintain corporate bank accounts where they deposit illicit funds disguised as legitimate transactions. By controlling internal compliance, they avoid filing necessary reports on suspicious deposits.
  • Criminals layer funds across multiple accounts and branches, making it difficult for regulators or partner financial institutions to detect unusual patterns or identify the true beneficial owners.
IN0040
|
|
  • Controlled MSBs issue multiple money orders below reporting thresholds, enabling criminals to convert large amounts of illicit cash into official-looking instruments.
  • Complicit staff deliberately overlook suspicious structuring, thereby obscuring transactional trails and bypassing typical reporting requirements.
  • Complicit MSBs specialize in currency exchange, enabling criminals to convert proceeds from one currency to another without triggering alerts.
  • By neglecting suspicious activity reporting, the MSB blends illicit sums with normal exchange transactions, complicating tracing efforts by authorities.
IN0051
|
|
  • Under criminal control, MSBs accept large volumes of physical currency, often splitting deposits to avoid regulatory scrutiny.
  • Staff intentionally ignores AML thresholds or reporting obligations, allowing criminals to integrate illicit cash directly into the MSB’s legitimate operations.
  • Criminals use complicit MSBs to load illicit funds onto prepaid cards or digital wallets, circumventing robust KYC/AML checks.
  • The prepaid balances can later be spent or withdrawn in different locations, effectively concealing the criminal origins and volumes of cash.

Service & Products

  • Criminals can insert complicit staff or owners to omit suspicious transaction reporting, blending illicit proceeds with regular remittance flows.
  • Large agent networks enable transactions to be divided among multiple outlets, obscuring patterns and hampering regulatory oversight.
  • Controlled or complicit currency exchange locations allow criminals to commingle illicit funds with genuine currency conversions, concealing the true origin of funds.
  • By shifting funds through multiple currencies, criminals create additional complexity and reduce transparency, thwarting AML monitoring efforts.

Actors

Complicit or subverted compliance employees within the MSB abet money laundering by:

  • Failing to file required suspicious transaction reports.
  • Overriding internal AML alerts or omitting negative indicators from customer documentation.

This hampers financial institutions’ ability to detect illicit flows, as key warning signs are removed at the source.

Organized crime groups covertly acquire or partner with MSBs to:

  • Embed complicit owners or staff who manipulate compliance processes.
  • Blend illicit funds with legitimate transaction flows while evading suspicious transaction reporting.

These actions hamper financial institutions’ due diligence efforts by obscuring the illicit source of funds, potentially allowing large-scale laundering operations to continue undetected.

Professional money launderers create or gain control of MSBs to:

  • Oversee funds entering and leaving the MSB under the guise of legitimate transactions.
  • Manipulate internal records or staff to bypass or minimize suspicious reporting.

This approach undermines financial institution efforts to implement AML controls, as external counterparties may receive incomplete or misleading compliance data.

Shell or front companies mask the true owners of controlled MSBs by:

  • Serving as the official registrant of the MSB license while concealing the real criminal beneficiaries.
  • Holding bank accounts or financial relationships in the entity’s name, shielding beneficial ownership details from external scrutiny.

Financial institutions struggle to identify the authentic source or ultimate controllers of funds when dealing with these opaque entities.

AT0068
|
|

Nominees appear as the owners or directors of the MSB but do not exercise genuine control. Criminals exploit nominees to:

  • Hide the real parties responsible for suspicious transactions.
  • Mislead financial institutions' attempts to verify beneficial ownership.

By relying on nominees for registrations or account openings, criminals obscure their involvement in MSB operations.

MSBs with extensive agent networks allow criminals to:

  • Disperse illicit flows through multiple service points, limiting centralized oversight.
  • Structurally avoid detection or suspicious thresholds by fragmenting large sums into smaller transfers.

Financial institutions face greater difficulty tracking and aggregating these dispersed transactions, impeding effective monitoring.

References

  1. FATF (Financial Action Task Force), Egmont Group. (2020, December). Trade-Based Money Laundering: Trends and Developments. FATF. https://www.fatf-gafi.org/en/publications/Methodsandtrends/Trade-based-money-laundering-trends-and-developments.html

  2. Kraft, O. (2018). Money service businesses in the UK: Improving the conditions for effective financial crime supervision and investigations. Royal United Services Institute for Defence and Security Studies. https://www.rusi.org/explore-our-research/publications/occasional-papers/money-service-businesses-uk-improving-conditions-effective-financial-crime-supervision-and

  3. Department of the Treasury. (2022, February). 2022 National Terrorist Financing Risk Assessment. Department of the Treasury. https://home.treasury.gov/system/files/136/2022-National-Terrorist-Financing-Risk-Assessment.pdf