"Criminals exploit trade-based transaction manipulation to obscure or transfer illicit proceeds by misrepresenting goods, services, or prices in cross-border trade. This technique involves several common methods:
Over- or Under-Invoicing: By falsely reporting unit prices or quantities, criminals can move additional value or conceal proceeds. This involves inflating or deflating the value of goods on invoices, thereby transferring illicit funds under the guise of legitimate trade [3][2].
Multiple Re-Invoicing: This involves issuing inflated invoices with exaggerated administrative costs. These invoices are often settled with cash deposits that lack clear references to actual shipments, further obscuring the transaction trail [3].
Phantom Shipping: Criminals forge shipping or customs documentation, creating discrepancies between declared and actual cargo. This technique allows for the movement of funds without the physical movement of goods, making it difficult for authorities to track [6].
Blending Illicit Cargo with Legitimate Shipments: By mixing illegal goods with legal shipments, criminals can disguise the true nature of the cargo, complicating detection efforts.
Manipulation of Trade Finance Instruments: Instruments such as documentary credits and letters of credit are manipulated to disguise the nature or market value of shipped goods. This manipulation leverages the complexity of trade finance to hide illicit activities [5].
Criminals often exploit multiple jurisdictions with inconsistent AML oversight, adding layers of complexity and regulatory blind spots. This fragmentation of transactions, combined with repeated amendments to shipping routes and quantities, effectively scatters illicit capital behind seemingly routine commercial operations.
In many cases, importers and exporters collude to reuse or alter invoices, justifying repeated payments or billing for ""intangible"" goods, such as digital products or consulting services, whose fair market value is difficult to determine [4]. By exploiting paperwork-dependent trade finance instruments and self-reported transaction data, they leverage jurisdictional disparities and inadequate oversight to obscure the true value or even the existence of shipped goods [1].
The use of multiple financial institutions and added layers of invoicing further complicates traceability. This creates repeated or cyclical transactions, burying illicit proceeds in normal trade flows and masking their true origin [4]. Through these methods, criminals effectively integrate illicit funds into the legitimate economy, making detection and prevention challenging for AML/CFT efforts."