Criminals fraudulently access government relief or recovery programs by submitting falsified applications, forging eligibility data, or using shell entities. Once obtained, the funds may be commingled and layered into accounts to appear lawful, thereby obscuring their criminal origins. These government programs can be particularly attractive due to the high volume of disbursements and potential oversight gaps, with offenders often exploiting decentralized application processes or limited resource allocation to compliance checks. Criminals frequently rely on mechanisms such as stolen or synthetic identities, collusion with insiders, or fabricated supporting documentation to justify eligibility. They may then rapidly distribute the relief proceeds to unrelated accounts or commingle them with legitimate funds to thwart detection.
Government Relief Program Fraud
Tactics
The primary objective is to generate new illicit proceeds by fraudulently obtaining government relief disbursements under false pretenses, such as using forged eligibility data or stolen identities. Criminals focus on directly acquiring these funds as their initial illicit capital.
Risks
Criminals exploit identity-based vulnerabilities by forging personal or corporate data, using stolen or synthetic identities, or shell entities to fraudulently secure government relief funds. This technique relies on misrepresenting the applicant's true identity or eligibility, which is the primary vulnerability being targeted.
Collusion with complicit insiders or public officials within government agencies represents a distinct governance weakness exploited by offenders. Criminals take advantage of these insiders to override or bypass standard checks, drastically reducing the effectiveness of routine application and eligibility verifications.
Indicators
Multiple or repetitive relief program applications submitted under varying identities or corporate structures.
Transactions where funds obtained from relief programs are quickly layered through several accounts in high-risk or low-transparency jurisdictions.
Evidence of collusion between applicants and individuals in positions managing government grants, such as shared contact details or overlapping directorships.
Large inflows of government-funded relief or grant money that are inconsistent with the customer’s stated revenue or normal operational scale.
Multiple applications for relief funds across various shell or newly formed entities all traced back to the same ultimate beneficial owner.
Relief funds are rapidly transferred to unrelated accounts or offshore jurisdictions shortly after receipt, with no logical economic explanation.
Contradictory or incomplete details in supporting documents, such as tax records or payroll data, submitted to justify the relief program eligibility.
Recipients use a significant portion of government aid to pay down personal debts or distribute funds to individuals with no apparent business connection.
Frequent revisions or resubmissions of grant applications that do not align with known business operations, suggesting misrepresentation of corporate activities.
Direct collusion signals, such as reference letters or expeditious approvals from government insiders with no formal role in standard application reviews.
Customer resists or delays providing official grant approval documents or other verification proof for the government-funded support they claim to have received.
Business registration information shows recent or suspiciously timed changes in ownership or scope of operations right before applying for a relief program.
Significant mismatches between the stated purpose of the state subsidies and the actual end-use of those funds based on outgoing transaction patterns.
Submission of falsified or manipulated documentation in applications for government relief funds.
Discrepancies between the business operations and financial performance disclosed in relief applications and independently verifiable data.
Use of shell companies or newly established entities with minimal operating history to apply for government relief programs.
Misrepresentation of business operations, including inflated revenue claims or fictitious activity, to qualify for public funding programs.
Multiple unemployment insurance disbursements from different states or jurisdictions into the same personal account, with no evidence of corresponding employment history in those areas.
Agricultural subsidy claims referencing farmland or livestock that cannot be verified by official land or agricultural registries, indicating potentially inflated or fictitious production.
Data Sources
PEP lists typically include:
- Official roles or political functions, affiliations, and known associates.
- Personal identification details (e.g., name variations, dates of birth).
This data helps detect potential conflicts of interest or corrupt collusion if relief program disbursements or approvals involve individuals in positions of power, supporting investigations into government relief fraud schemes.
Official financial filings, tax returns, and business statements are essential documents. Cross-referencing these records against relief program submissions can uncover discrepancies in reported revenue or operational scale, helping to expose misrepresentations used to qualify for government funds.
Logs capture all financial inflows and outflows, including timestamps, amounts, sender and recipient account details, and channels used. By analyzing transaction patterns, investigators can identify rapid transfers, layered movements, or other anomalies indicating potential misuse of government relief funds.
Checks the authenticity and integrity of submitted documents, such as identification, business licenses, or financial statements. By identifying forgeries or alterations, it helps detect falsified eligibility data used to secure government relief funds.
Contains verified customer identities, ownership details, historical account information, and risk assessments. These records confirm eligibility representations in relief applications, highlight deviations from stated customer profiles, and identify potential synthetic or stolen identities used to fraudulently obtain government funds.
Logs or metadata of communications, such as emails, phone calls, and messaging app exchanges, can reveal insider collusion, corrupt instructions, or expedited approvals from government officials manipulating the relief program process.
Provides official incorporation data, ownership structures, and historical changes in directorships or shareholding. This information reveals shell companies or newly formed entities with suspicious timing, facilitating the detection of fraudulent relief applications linked to the same ultimate beneficial owner.
Mitigations
For high-value or suspicious government assistance beneficiaries, require verified documentation, such as official payroll records, proof of farmland ownership, or state-issued unemployment confirmations. Cross-check these details with government databases or independent registries. Conduct in-depth reviews for any contradictory or incomplete information, ensuring the authenticity of claims tied to relief eligibility is rigorously substantiated.
Obtain and verify official authorization documents or grant notices during account setup or when receiving program funds. Confirm that the declared business or individual actually qualifies for the relief program by cross-referencing corporate registration data, unemployment or subsidy approval records, and any additional required certifications. This ensures that criminals cannot easily deposit proceeds from falsified relief applications without detection.
Implement targeted detection rules specifically for large or unexpected deposits labeled as government relief funds. Investigate rapid layering or commingling of these proceeds across multiple personal or third-party accounts, especially when there is no credible business justification or prior transactional history. Escalate cases of immediate outbound transfers to unrelated parties or offshore destinations, ensuring a focused response to the high-risk movement of fraudulently obtained relief disbursements.
Deliver specialized training that highlights the typical indicators of government relief program fraud, such as contradictory tax or payroll documents, repetitive relief applications under multiple shell entities, or unusual volumes of grant-related deposits. Instruct personnel across frontline and compliance teams on proper escalation protocols when suspect documentation or rapid fund dispersals signal fraudulent eligibility claims.
Designate incoming government relief funds that exceed typical industry benchmarks or are inconsistent with the customer’s known operational scale as high-risk. Implement tiered monitoring triggers for customers submitting multiple relief applications under different entities or those receiving relief from multiple jurisdictions. By dynamically adjusting risk levels, financial institutions can concentrate compliance resources on potential high-volume or repeated fraud schemes.
Compare relief-related claims, such as farmland acreage, payroll records, or business operations, against publicly available government registries, official agricultural data, or credible news sources. Verify legitimate ownership or employment status and detect duplicated or fictitious claims, such as farmland listed in multiple subsidy applications or exaggerated payroll numbers not reflected in independent data sets.
Instruments
- Criminals fraudulently enroll in relief programs and direct disbursements into bank accounts established under stolen or synthetic identities, or controlled by shell entities.
- Once funds are deposited, offenders rapidly initiate transfers across multiple accounts, mixing legitimate and illicit balances to obscure the original source.
- Opening these accounts in different jurisdictions further complicates AML monitoring by reducing transparency and bypassing standard KYC checks.
- After receiving illicit relief payments into bank or prepaid accounts, criminals withdraw the funds in physical currency.
- Cash withdrawals interrupt the electronic audit trail, allowing them to redeposit or spend the proceeds elsewhere without a clear record of origin.
- Physical currency can then be used to purchase assets or cross borders unnoticed, hindering financial institutions' ability to trace the initial fraud.
- Government relief funds, such as unemployment benefits, are often loaded onto prepaid or stored-value cards, which typically require minimal documentation.
- Fraudsters submit counterfeit applications under stolen or synthetic identities to acquire multiple cards, then quickly withdraw or spend the funds in small increments.
- This fragmentation of illicit proceeds across numerous cards makes it difficult for authorities to trace and detect the overall fraudulent scheme.
Service & Products
- Allows fraudsters to pose as legitimate businesses to secure and receive government relief funds under falsified eligibility claims.
- Proceeds can be mixed with legitimate transactions, masking the illicit inflow and complicating AML monitoring.
- Offenders segment or bundle government relief payouts into smaller remittance transfers, reducing visibility under certain thresholds.
- Cross-border remittances exploit varying degrees of regulatory oversight to mask the ultimate destination of fraudulent proceeds.
- Used to receive illicit disbursements directly, particularly in unemployment insurance fraud.
- Criminals can quickly transfer or withdraw funds from personal checking accounts, hampering traceability during layering.
- Facilitates swift movement of government relief proceeds across multiple accounts or jurisdictions.
- Large wire transfers from shell or nominee entities help layer illicit funds and obscure their original source.
- Corrupt or complicit professionals may prepare fabricated payroll records and false financials supporting fraudulent relief applications.
- Manipulated books and audits conceal the source of illicit funds, enabling their integration into seemingly legitimate operations.
- Criminals establish shell or nominee-controlled companies through these services to submit falsified applications for government relief funds.
- Nominee directors and obscured ownership hamper detection efforts, facilitating subsequent layering or commingling of disbursed funds.
Actors
TCSPs facilitate the creation and administration of legal structures exploited for relief fraud. They:
- Form shell or nominee-based entities used to submit fraudulent applications and receive disbursements.
- Obscure beneficial ownership, complicating KYC and transaction monitoring efforts by financial institutions.
Complicit accounting, auditing, or bookkeeping professionals assist fraudsters by:
- Fabricating payroll records, revenue statements, or other financial documents for relief applications.
- Manipulating business ledgers to obscure the origin of funds, making it difficult for financial institutions to detect illicit flows.
Illicit operators submit falsified or manipulated government relief applications to obtain undeserved funds. They frequently:
- Use stolen or synthetic identities and fabricated corporate or personal data to meet eligibility requirements.
- Collude with complicit insiders or facilitators to bypass standard oversight procedures.
- Rapidly move or layer the proceeds across multiple accounts, impeding financial institutions' ability to trace and identify the illicit origin.
Document forgers create or alter official records to support fraudulent eligibility claims for relief programs. They:
- Produce falsified identification documents, tax records, or corporate filings.
- Enable criminals to bypass standard verification processes, hindering accurate customer due diligence at financial institutions.
These entities, with minimal or no genuine business activity, are used to:
- Fraudulently apply for government relief funds under falsified corporate details.
- Commingle or layer the proceeds with purported legitimate transactions, complicating financial institution due diligence.
Nominees hold ownership or account titles on behalf of the actual perpetrators of government relief fraud. They:
- Conceal the true controllers and beneficiaries of illicit relief disbursements.
- Hinder financial institutions' ability to identify ultimate beneficial owners and manage AML risks.
Mules receive illicit relief proceeds in personal or nominee accounts on behalf of others. They:
- Transfer, withdraw, or distribute funds at the direction of the primary fraud perpetrators.
- Add extra layers between the source of funds and potential investigators, complicating financial institution monitoring.
Corrupt or complicit individuals within government agencies manipulate application processes for relief programs. They:
- Approve fraudulent claims or alter records to ensure ineligible beneficiaries receive disbursements.
- Exploit insider knowledge or authority to override or circumvent necessary due diligence checks, hindering financial institutions' detection efforts.
References
APG (Asia/Pacific Group on Money Laundering). (2021, July). APG Yearly Typologies Report 2021. Asia/Pacific Group on Money Laundering. https://apgml.org/documents/default.aspx
Europol. (2023). The other side of the coin: An analysis of financial and economic crime. Publications Office of the European Union. https://www.europol.europa.eu/publications-events/publications/other-side-of-coin-analysis-of-financial-and-economic-crime
Alma K., Krishnan S., Mangels C., Wang M.L. (2020, May). COVID-19-related money laundering and terrorist financing risks and policy responses. FATF. https://www.fatf-gafi.org/en/publications/Fatfgeneral/Covid-19-ml-tf.html
FinCEN (Financial Crimes Enforcement Network). (2020, October 13). Advisory on unemployment insurance fraud during the Coronavirus Disease 2019 (COVID-19) pandemic (FIN-2020-A007). FinCEN. https://www.fincen.gov/coronavirus
FinCEN (Financial Crimes Enforcement Network). (2020, July 7). Advisory on imposter scams and money mule schemes related to Coronavirus Disease 2019 (COVID-19) (FIN-2020-A003). FinCEN. https://www.fincen.gov/sites/default/files/advisory/2020-07-07/Advisory_%20Imposter_and_Money_Mule_COVID_19_508_FINAL.pdf
FinCEN (Financial Crimes Enforcement Network). (2021). Advisory on COVID-19 health insurance- and health care-related fraud (FIN-2021-A001). FinCEN. https://www.fincen.gov/coronavirus
Department of the Treasury. (2022, February). National Money Laundering Risk Assessment. Department of the Treasury.https://home.treasury.gov/system/files/136/2022-National-Terrorist-Financing-Risk-Assessment.pdf
Department of the Treasury. (2024, February). 2024 National Money Laundering Risk Assessment. Department of the Treasury.https://home.treasury.gov/system/files/136/2024-National-Money-Laundering-Risk-Assessment.pdf
Clarke, C. P. (2015). Terrorism Inc, The Financing of Terrorism, Insurgency, and Irregular Warfare. ABC-CLIO, LLC. http://www.abc-clio.com
Financial Crimes Enforcement Network (FinCEN). (2020). Advisory on Unemployment Insurance Fraud During the Coronavirus Disease 2019 (COVID-19) Pandemic (FIN-2020-A007). FinCEN. https://www.fincen.gov/coronavirus
De Sanctis, F. M. (2017). International Money Laundering Through Real Estate and Agribusiness: A Criminal Justice Perspective from the “Panama Papers”. Springer International Publishing AG. https://doi.org/10.1007/978-3-319-52069-8