Loyalty Points

Criminals exploit loyalty or reward point programs as near-cash substitutes to layer and obscure the origins of illicit funds. These programs often lack robust AML monitoring or reporting requirements, creating a significant vulnerability for financial crime. Large volumes of points are in circulation worldwide (with the United States alone exceeding USD 48 billion in unredeemed miles and bonuses), yet they remain mostly unregulated. In many cases, there is no formal limit on how many points can be loaded or stored on an account, enabling substantial value to be accumulated without triggering traditional AML controls. Some loyalty schemes are evolving into quasi-payment systems, allowing users to purchase or earn points that can be redeemed across a wide network of merchants or even exchanged in secondary markets. Depending on their design, loyalty points may function similarly to private digital currencies—particularly where peer-to-peer transfers or cross-platform pooling is permitted—increasing the complexity of tracing suspicious transactions. While FATF guidance does not explicitly regulate many so-called “closed-loop” programs, criminals can still exploit them if points are widely accepted, transferable, or convertible into fiat. By executing frequent point conversions, using multiple accounts, and performing rapid redemptions for goods or near-cash instruments, launderers can drastically reduce transparency and evade traditional AML controls.

[
Code
T0106
]
[
Name
Loyalty Points
]
[
Version
1.0
]
[
Parent Technique
]
[
Risk
Product Risk
]
[
Created
2025-03-12
]
[
Modified
2025-04-02
]

Loyalty Points Exploitation

Tactics

ML.TA0007
|
|

Criminals convert illicit proceeds into loyalty or reward points and move them across multiple accounts or platforms, making it harder to trace the funds' original source or flow. This explicitly serves as a layering strategy by exploiting minimal AML oversight in loyalty programs to obscure the money trail.

ML.TA0010
|
|

Loyalty point systems allow for large, unmonitored balances and provide near-cash redemption options, enabling the quick conversion and transfer of illicit funds with minimal scrutiny.

Risks

RS0002
|
Product Risk
|

Criminals exploit loyalty and reward point programs, which function as unregulated stored-value instruments, with minimal AML oversight, often lacking loading limits, and the ability to redeem points as near-cash substitutes. By pooling, transferring, and rapidly converting points across multiple accounts or platforms, they obscure the flow and origin of illicit funds, taking advantage of the fundamental product features of loyalty schemes.

Indicators

IND00785
|

Frequent or high-value acquisitions of loyalty points significantly exceeding the customer's historical spending patterns or financial capacity.

IND01728
|

Frequent cross-platform transfers or conversions of loyalty points across multiple jurisdictions lacking an evident commercial or personal justification.

IND01729
|

Multiple loyalty program accounts linked to the same customer or controlled parties, used to accumulate or pool large volumes of points.

IND01730
|

Rapid redemption of newly acquired loyalty points into cash-like instruments or high-value goods with minimal retention period.

IND01731
|

Abrupt shift in a customer's loyalty point usage pattern, moving from small-scale accumulation to substantial point transactions or frequent redemptions.

IND01732
|

Frequent buying or selling of loyalty points via unregulated or peer-to-peer marketplaces with minimal or no verification of counterparties.

Data Sources

Tracks historical usage patterns of loyalty programs, including normal accumulation and redemption behaviors, enabling the detection of sudden changes in point usage volume or frequency. This helps uncover abrupt increases or rapid redemptions commonly associated with the layering of illicit funds through loyalty schemes.

Transaction logs capture detailed records of loyalty point purchases, conversions, redemptions, and transfers, including timestamps, amounts, account identifiers, and cross-platform movements. These data points are critical for identifying unusual volume or frequency of loyalty point transactions, detecting cross-border or multi-jurisdiction transfers, and flagging rapid acquisition or redemption patterns indicative of layering or laundering activities.

These records provide verified customer identities, beneficial ownership information, and account relationships. For loyalty point programs, KYC data helps identify individuals or entities that control multiple loyalty accounts, enabling the detection of aggregating or pooling strategies and verifying whether account holders are high-risk or suspicious.

Mitigations

Apply additional scrutiny to loyalty program participants who exhibit high-volume or suspicious point activity. Verify the source of funds for point purchases, confirm the beneficial ownership of associated accounts, and investigate simultaneous point accumulation across multiple programs. This ensures that large or cross-border loyalty point transactions are legitimately funded.

Require robust identity checks for loyalty program membership where substantial point balances or transfers are possible. Gather verifiable personal or corporate details to ensure points cannot be purchased or moved through anonymous accounts, and regularly update customer data as point usage evolves.

Implement specialized transaction monitoring logic tailored to loyalty programs, such as flags for unusually large point accruals, repeated cross-platform conversions, or rapid redemptions into cash-like instruments. Differentiate normal customer usage patterns from potential layering or structuring attempts by isolating abrupt spikes or brief holding periods that indicate illicit layering.

Impose limits on point loading and require verification for large or frequent loyalty point transfers. Block or restrict suspicious account activity, such as multi-account pooling, excessive accumulations, or swift cross-platform conversions, to curb unregulated value transfers through loyalty programs.

Continuously reassess loyalty point usage and customer profiles, identifying abrupt spikes in accrual, rapid redemption cycles, or patterns of cross-program transfers that deviate from a customer’s historical norms. Promptly escalate anomalies for further investigation or enhanced controls.

Instruments

  • Criminals exploit loyalty or reward points as unregulated stored value, converting illicit funds into large point balances with minimal AML scrutiny.
  • Many programs lack formal loading limits, allowing fraudsters to deposit significant sums without triggering traditional financial controls.
  • Points can be transferred or pooled across multiple user accounts—a layering tactic that obscures ownership and complicates transaction tracing.
  • Many loyalty programs allow converting or redeeming points for near-cash instruments or valuable goods, enabling criminals to spend or cash out illicit funds while avoiding traditional banking oversight.
  • The lack of robust KYC or transaction monitoring in these programs reduces detection risk, making it harder for financial institutions to trace or flag suspicious activity.

Service & Products

  • Criminals can exploit online marketplaces that allow buying, selling, or transferring loyalty points, effectively converting illicit proceeds into near-cash.
  • Minimal KYC or transactional scrutiny on some platforms enables rapid transfers of large point balances across multiple accounts or listings, further obscuring the origin of funds and complicating AML efforts.
  • Loyalty points can function similarly to stored value instruments, enabling minimal AML scrutiny when loading illicit funds.
  • Large point balances accumulate without traditional transaction monitoring or thresholds, obscuring the origin and movement of funds.
  • The ability to redeem points rapidly for near-cash value or goods, combined with cross-platform transfers, facilitates layering and reduces transparency.

Actors

Online marketplaces, including those enabling the buying or selling of loyalty points or frequent-flyer miles, can be misused by:

  • Allowing criminals to convert illicit funds into points or liquidate points for near-cash value outside regulated channels.
  • Facilitating lightly monitored transactions, increasing opacity in the flow of funds.

Such marketplaces operate largely outside traditional banking oversight, further hindering financial institutions’ ability to detect and block suspicious activities.

Illicit operators exploit loyalty or reward point programs by:

  • Purchasing large volumes of points with unlawfully obtained funds, bypassing conventional banking controls.
  • Transferring or redeeming points across multiple platforms or accounts to mask the original source of value.

These actions reduce transparency for financial institutions, complicating efforts to trace suspicious transactions involving illicit proceeds.

Loyalty program operators, often unwittingly, can facilitate money laundering when:

  • Large amounts of points are acquired without adequate transaction monitoring or thresholds.
  • Rewards are redeemable for near-cash value, bypassing traditional financial controls.

These gaps make it harder for financial institutions to identify and investigate suspicious fund flows attributed to loyalty programs.

References

  1. Dostov, V., Shust, P. (2014). Money laundering and terrorism financing risks posed by customer loyalty programs. Emerald Insight. http://www.emeraldinsight.com/reprints

  2. Goldbarsht, D. (2021). Virtual currencies as a quasi-payment tool: the case of frequent-flier programs and money laundering. Emerald Publishing Limited. https://www.emerald.com/insight/content/doi/10.1108/jmlc-11-2020-0127/full/html