Read More about fast-id page

Shufti globally launches webinr-icon - a new kind of identity solution!

Shufti globally launches - a new kind of identity solution!

Read more

Shell Companies and Money Laundering: How to Combat Them?

Shell companies

Shell companies are notorious for all the right reasons. These entities often called ghost companies are frequently used by fraudsters to launder black money. Shell companies are business entities without any actual premises, employees, or operational assets. They are created by registered agents to conceal ownership information from other businesses. This gives them the anonymity to hide ill-gained funds, avoid tax payments, and bypass AML regulations.

When it comes to developing B2B relationships, businesses should keep a vigilant eye on their partner entities. Verifying important details like corporate documents and addresses can save honest entities from associating unwanted ties with fraudulent companies. Business Verification, referred to as Know Your Business (KYB), and Anti Money Laundering practices help address this problem by taking down shell companies registered only on papers.

This blog describes how shell companies are used in money laundering, what role global authorities have played in preventing them, and how it can help enterprises in the long run.

Shell Companies

Global Efforts – Crackdown of Shell Companies

Global regulators and financial authorities have played an active role in the fight against fraudulent companies hiding their identity. In order to combat financial crime through shell companies, some efforts made by law enforcement departments are listed below:

Corporate Transparency Act (CTA) – USA

According to guidelines stated in the Corporate Transparency Act, businesses operating in the United States have to provide FinCEN – Financial Crimes Enforcement Network – with the information regarding the beneficial ownership of their company. This law was introduced in 2019 to prohibit all anonymous shell companies run by criminals for money laundering and illegal proceeds. The Transparency Act defines beneficial owners as someone:

  • Having a 25% or more share in the company’s revenue
  • Is responsible for controlling the business entity
  • Who Receives benefits from the business’ assets

Person with Significant Control (PSC) – UK

Authorities under the UK government define beneficial owners as PSC – a Person with Significant Control. As per the laws, a person is not allowed to run a business if they fail to record details about a company’s PSC during incorporation. Below are identifiers that help identify PSCs, according to the UK:

  • An individual with more than 25% of the company shares
  • A significant authority (more than 25% voting rights) in the company
  • An administrator having the right to appoint and remove executive officials

With the PSC reform in place, companies in the UK need to disclose “beneficial ownership” information which will help identify shell companies helping money mules launder dirty money. The PSC registry, having all the essential company information, stops fraudsters from obscuring their identity behind these illegitimate entities.

Combat Shell Companies with…

Business Verification

Business verification often termed as Know Your Business (KYB) is a corporate due diligence process which a business performs to verify other partner entities. It enables enterprises to devise policies and procedures to detect suspicious activities and prevent money laundering. With KYB checks, corporations can make sure they are conducting business with real and legitimate entities, and not another shell company. 

KYB verification for corporate entities also helps them comply with the CTA, and Anti Money Laundering directives by the EU. By cross-checking against business filings, networks, and financial statements of a company, an automated business verification allows an enterprise to stay AML compliant. 

Infographics

Risk-based AML Program

Business entities are required to comply with recommendations of the FATF and other global regulations to prevent money laundering. An AML compliance program based on proper risk assessment for customers and partner entities can address the regulatory requirements. These programs help identify the risk associated with shell companies that are frequently involved in financial crime.  

What Should the Program Include?

When it comes to onboarding business associates, a company’s AML program should focus on Ultimate Beneficial Ownership (UBO), nature and amount of transactions and business activities. The compliance officer should connect data points to verify the stakeholders and transactional flow of the company.  

Red Flags

Below are some red flags which a risk-based AML program should consider when verifying corporate entities:

  • Is there any difficulty in obtaining ownership information about the company?
  • Do the company’s transactions align with its business profile?
  • Any payments listed without a proper purpose or date
  • Transactions involving large sums of money with other shell companies
  • The company performs frequent transfers to multiple beneficiaries 

Watch list Screening

Beneficiaries of shell companies are often placed on adverse media lists due to the amount of risk they pose to a business. This can cause a customer’s risk profile to change allowing firms to conduct additional screening of these users. Politically Exposed Persons (PEPs) list includes individuals with a higher AML risk. Ongoing monitoring of PEP status can help enterprises to identify and take down potential financial crime.  

Ongoing Transaction Monitoring

The red flags defined in the AML program can help corporations identify companies offering illicit services. Shell companies often involve unusual transaction patterns which could be detected through a transaction monitoring solution. Ongoing AML monitoring of corporate entities also helps identify high-risk companies which could possibly be involved in money laundering and other cybercrime.    

Address Verification

Verifying a corporation’s address can help businesses find out if it’s a shell company or not. Since these entities only exist on paper and do not have any physical premises or personnel, they are easy to spot. An address verification solution powered by artificial intelligence can quickly check for possible hidden information including addresses and corporation dates to identify ghost entities operating for illicit purposes. 

To Sum It Up …

Although shell companies are not always created with an ill intention, their ability to hide ownership identity makes them suspicious. Fraudsters exploit this aspect to their benefit for cleaning money acquired from illegitimate gains. While regulators across the globe continue to implement Anti Money Laundering laws, corporate entities are faced with compliance obligations. A robust mechanism for AML compliance to verify and monitor business associates can help enterprises achieve the all-important trust in a B2B relationship. 

Related Posts

Blog

Supplementing blockchain with KYC offers endless possibilities

While you may be tempted to think that decentralized and anonymous blockchains are safe because t...

Supplementing blockchain with KYC offers endless possibilities Explore More

Blog

Top 6 trends in Anti-Money Laundering for 2020

To enhance the scope of AML compliance, new regulations were brought into force throughout last y...

Top 6 trends in Anti-Money Laundering for 2020 Explore More

Blog

Age Verification Service – How Businesses can Identify Underage Visitors in Real Time?

When it comes online retail, one has to know that in such an age of fast-moving technology and in...

Age Verification Service – How Businesses can Identify Underage Visitors in Real Time? Explore More

Blog

Healthcare is Under Attack: Strengthening Security with Biometric Verification

Healthcare scams cost our economy tens of billions of dollars every year and the lowest value of ...

Healthcare is Under Attack: Strengthening Security with Biometric Verification Explore More

Blog

Two-Factor Authentication – A Firewall Against Social Engineering Attacks

Businesses and financial institutions around the globe often report concerns of financial crimes ...

Two-Factor Authentication – A Firewall Against Social Engineering Attacks Explore More

Blog

Online Video KYC: Eliminate the Risks of Identity Theft

The growing danger of cybercrime and data breaches has heightened the demand for effective verifi...

Online Video KYC: Eliminate the Risks of Identity Theft Explore More

Blog

FinCEN Files – Banks abandoning front-line defenses against money laundering

Banks and financial institutions are under the continuous scrutiny of regulatory authorities, yet...

FinCEN Files – Banks abandoning front-line defenses against money laundering Explore More

Blog

Combatting Identity Theft with KYC Verification – A Risk-Based Approach in Online Shopping

The proliferation of online stores has radically transformed how people shop and greatly affected...

Combatting Identity Theft with KYC Verification – A Risk-Based Approach in Online Shopping Explore More

Blog

How ID Verification can Help you Boost your Revenue in 2019?

For years now banks have been using laid back and inconvenient methods for ID verification of cus...

How ID Verification can Help you Boost your Revenue in 2019? Explore More

Blog

Transaction Screening: The Benefits and Challenges

Financial crimes are rising, wreaking havoc on organisations and individuals. The fraud rate has ...

Transaction Screening: The Benefits and Challenges Explore More

Blog

Know Your Investor (KYI) – Identifying and Eliminating Russian Sanctions Evaders

For quite some time, wealthy Russian businessmen and oligarchs have been investing their money in...

Know Your Investor (KYI) – Identifying and Eliminating Russian Sanctions Evaders Explore More

Blog

eKYC: Transforming ID Verification for Enhanced Security and A Seamless Customer Experience

Governments have mandated various businesses, including financial institutions, to thoroughly und...

eKYC: Transforming ID Verification for Enhanced Security and A Seamless Customer Experience Explore More

Blog

Securing Transactions and Operations with Biometric Consent Verification in Digital Banking

In the modern digital world, secure business operations are crucial.  The focus on maintaining se...

Securing Transactions and Operations with Biometric Consent Verification in Digital Banking Explore More

Blog

Address Verification: The Cornerstone of Elevating Customer Experience

Today’s highly emerging technology is changing the way consumers shop online products. Given the ...

Address Verification: The Cornerstone of Elevating Customer Experience Explore More

Blog

10 Reasons Why Businesses Should Choose Shufti

Started in 2017, Shufti Ltd. has attained a lot of success. Within three years, we have onboa...

10 Reasons Why Businesses Should Choose Shufti Explore More

Blog

Money Laundering in the Real Estate Sector – How Shufti’s AML Services Help

Purchasing luxurious mansions is always an attractive way for money launderers to legitimize thei...

Money Laundering in the Real Estate Sector – How Shufti’s AML Services Help Explore More

Blog

Top 5 Ways to Improve Transaction Monitoring in Fintech

Fintech is a fast-growing sector that combines finance and technology to assist businesses and cu...

Top 5 Ways to Improve Transaction Monitoring in Fintech Explore More

Blog

Anti-Smurfing Solutions | Safeguard Your Business Against Money Laundering Risks

Businesses are under constant threat of financial damage. This is primarily because cybercriminal...

Anti-Smurfing Solutions | Safeguard Your Business Against Money Laundering Risks Explore More

Blog

An Insight into AML Compliance in the Financial Sector [2022 Update]

The increasing global attention towards anti-money laundering (AML) and countering the financing ...

An Insight into AML Compliance in the Financial Sector [2022 Update] Explore More

Blog, Fraud Prevention

What is Loan Fraud and How to Detect it?

Loan fraud simply means when someone uses your identity to illegally obtain a loan. The crime has...

What is Loan Fraud and How to Detect it? Explore More

Blog

The EU’s New AML Proposal, What’s in Store?

To strengthen the EU’s Anti-Money Laundering and Countering the Financing of Terrorism (AML/CFT) ...

The EU’s New AML Proposal, What’s in Store? Explore More

Biometric Technology, Blog

Biometric Authentication: Applications and Constraints

Biometric authentication is considered as an advanced way of ensuring Know Your Customer (KYC). T...

Biometric Authentication: Applications and Constraints Explore More

Blog, Online Marketplace

e-KYC Services for Libraries

Have you ever had those series of events that leave you shaking your head? That makes you believe...

e-KYC Services for Libraries Explore More

Blog

A Quantitative Insight into the Global Gaming and Gambling Industry

The gaming and gambling industry has demonstrated exponential growth in the past decades and is e...

A Quantitative Insight into the Global Gaming and Gambling Industry Explore More

Blog

The Expected No-Deal Brexit and AML/CFT Laws in the UK

The current prime minister of the UK Mr. Boris Johnson made a statement that the UK should be rea...

The Expected No-Deal Brexit and AML/CFT Laws in the UK Explore More

Blog

Politically Exposed Person – An unsaid threat to Businesses

A politically exposed person or PEP is the one who has been assigned to perform prominent public ...

Politically Exposed Person – An unsaid threat to Businesses Explore More

Blog

Paradigm Shift amid Corona – Online sales to take outstanding growth

Coronavirus outbreak is proving to be catastrophic for the world with global cases reaching 2,495...

Paradigm Shift amid Corona – Online sales to take outstanding growth Explore More

Blog

Implementing Robust Anti-Money Laundering Checks for the Insurance Sector

Insurance companies play a decisive role in the considerable growth of an economy. It turns accum...

Implementing Robust Anti-Money Laundering Checks for the Insurance Sector Explore More

Blog, Identity & KYC

How Real ID Act enables Digital KYC Services for US Customers?

Digital KYC Services for US based customers are in debt of Real ID Act as it streamlined the proc...

How Real ID Act enables Digital KYC Services for US Customers? Explore More

Blog, Online Marketplace

Ride Sharing Services and ease provided by KYC Services

Ride Sharing services might be the hottest form of transportation especially in developed countri...

Ride Sharing Services and ease provided by KYC Services Explore More

Blog

10 Ways to Eliminate Business Fraud with Robotic Process Automation (RPA)

One of the prime concerns of businesses today is detecting and mitigating the risk of fraud. This...

10 Ways to Eliminate Business Fraud with Robotic Process Automation (RPA) Explore More

Blog, Financial Crime / AML

Impact of Canada’s Evolving AML Regimes on Your Business

Canada’s AML regulations changed a lot in 2019. More rigid AML regulations are imposed on all typ...

Impact of Canada’s Evolving AML Regimes on Your Business Explore More

Blog

Intelligent Character Recognition: How it Drives the Industry with a Breeze

Data is the nucleus of any business and how efficiently it is processed is the key to digital tra...

Intelligent Character Recognition: How it Drives the Industry with a Breeze Explore More

Blog

Leveling Up Identity Verification To Meet This Moment

Companies around the world contend with two digital identity challenges that seem mutually exclus...

Leveling Up Identity Verification To Meet This Moment Explore More

Blog

Biometric Authentication: The Importance, Use Cases & Myths

Today’s business owners rank security among the highest priorities. As hackers continue to ...

Biometric Authentication: The Importance, Use Cases & Myths Explore More

Biometric Technology, Blog

Biometric Authentication: Applications and Constraints

Biometric authentication is considered as an advanced way of ensuring Know Your Customer (KYC). T...

Biometric Authentication: Applications and Constraints Explore More

Blog

KYC Identity Verification – Building Customer Trust in Ride-Hailing Services

The transportation industry is in the phase of significant disruption, redefining its services an...

KYC Identity Verification – Building Customer Trust in Ride-Hailing Services Explore More

Blog

A Comprehensive Guide to AML Compliance [2020]

Anti-money laundering (AML) laws are the primary target of regulatory authorities. These regimes ...

A Comprehensive Guide to AML Compliance [2020] Explore More

Blog, Fraud Prevention

Credit Card Frauds- How Can You Prevent It?

Ever since credit cards were introduced, credit card fraud has been elevating. One needs to stay ...

Credit Card Frauds- How Can You Prevent It? Explore More

Blog

5 Key Questions About KYC Compliance to Look Out for in 2021

With the COVID-19 pandemic bringing challenges every day for businesses, the rate of identity fra...

5 Key Questions About KYC Compliance to Look Out for in 2021 Explore More

Blog

Six Ways to Protect Your Business from Christmas Scams

Christmas is around the corner and all of you must be very excited to decorate christmas trees, e...

Six Ways to Protect Your Business from Christmas Scams Explore More

Blog

Harnessing the power of AML Screenings to Uncover Politically Exposed Persons [PEPs]

Since the last decade, governments and financial institutions have been trying to limit corruptio...

Harnessing the power of AML Screenings to Uncover Politically Exposed Persons [PEPs] Explore More

Blog

Five Things you Need to Know About Shufti’s Digital Identity Verification

The growing digital fraud, stringent KYC and AML regulations put in place, and the increasing bur...

Five Things you Need to Know About Shufti’s Digital Identity Verification Explore More

Blog

Shufti’s Growth Skyrockets Above 100% in the Fiscal Year 2020

In 2020, Shufti witnessed a remarkable growth of over 100%. Together with this, it can comfor...

Shufti’s Growth Skyrockets Above 100% in the Fiscal Year 2020 Explore More

Blog

Top 4 Reasons that will Increase Money Laundering Risks in 2022

Unlike other frauds, like like tax evasion, drug trafficking, extortion, and misappropriation of ...

Top 4 Reasons that will Increase Money Laundering Risks in 2022 Explore More

Blog

Electronic Identity Verification | Forecasts and Predictions

Identities change as the world goes more digital. As more activities, like banking, socialising, ...

Electronic Identity Verification | Forecasts and Predictions Explore More

Blog

Blockchain and cryptocurrency security Guide

Online bitcoin business might have experienced a slump in recent months but still, it remains to ...

Blockchain and cryptocurrency security Guide Explore More

Blog

Fight Fraud Proactively and Reduce Fake Customer Accounts With Shufti’s AI-powered ID Document Forgery Detection

Bank statements, land documents, and social security checks are frequently forged. Document forge...

Fight Fraud Proactively and Reduce Fake Customer Accounts With Shufti’s AI-powered ID Document Forgery Detection Explore More

Blog

A Brief Overview of KYC Requirements for Foreign Exchanges in EMEA

The forex industry is recognizable for being a dynamic and profitable platform due to its high li...

A Brief Overview of KYC Requirements for Foreign Exchanges in EMEA Explore More

Blog

May 2023 Recap: Major Security Breaches and Penalties

May 2023 witnessed several security breaches wreaking havoc on the digital landscape. High-profil...

May 2023 Recap: Major Security Breaches and Penalties Explore More

Blog

Identity verification for fair and free US elections amid COVID-19

US Elections 2020 is the talk of the town these days. But with COVID-19 pandemic going on how wil...

Identity verification for fair and free US elections amid COVID-19 Explore More

Blog

Top Applications of Facial Recognition Technology in the Digital Age

Facial recognition technology is biometric security in which an individual’s physical trait...

Top Applications of Facial Recognition Technology in the Digital Age Explore More

Blog

How Can Businesses Detect Arbitrage Sports Betting?

Various gamblers have investigated and exploited potential weaknesses in betting markets for mill...

How Can Businesses Detect Arbitrage Sports Betting? Explore More

Blog

Strategic KYC/AML Checks for the Financial Industry – Staying a Step Ahead of Fraudsters

In recent times, the financial industry has witnessed significant technological changes which hav...

Strategic KYC/AML Checks for the Financial Industry – Staying a Step Ahead of Fraudsters Explore More

Blog

Combatting Fraud in the Automotive Industry

Fraud is a growing concern for many industries and the automotive industry is no exception. In 20...

Combatting Fraud in the Automotive Industry Explore More

Blog

SEPA Instant Credit Transfer Schemes – Disrupting the Financial Sector in 2023

There is no denying the fact that the financial industry has vital importance in the contemporary...

SEPA Instant Credit Transfer Schemes – Disrupting the Financial Sector in 2023 Explore More

Blog

Digital Currency – Replacing Fiat Money in the Modern World

Technological advancements are leading to better transaction systems in different states. Cryptoc...

Digital Currency – Replacing Fiat Money in the Modern World Explore More

Blog

More Than 500 Customers Onboarded in 3 Years – Shufti Spills the Beans

Shufti Ltd. began operations in 2017 and within three years, the company has onboarded more t...

More Than 500 Customers Onboarded in 3 Years – Shufti Spills the Beans Explore More

Blog

AUSTRAC’s ML/TF Risk Assessment Report on Foreign Bank Branches [Part 3]

This blog makes the third chapter of our four-part series on AUSTRAC’s report on the Banking Sect...

AUSTRAC’s ML/TF Risk Assessment Report on Foreign Bank Branches [Part 3] Explore More

Blog, Fraud Prevention

Looking for Online Fraud Prevention: Here Is What You Can Do

In an increasingly digital world, it is extremely important for online businesses to identify fra...

Looking for Online Fraud Prevention: Here Is What You Can Do Explore More

Blog

Supplementing blockchain with KYC offers endless possibilities

While you may be tempted to think that decentralized and anonymous blockchains are safe because t...

Supplementing blockchain with KYC offers endless possibilities Explore More

Blog

How Optical Character Recognition is Changing the Financial Industry

Banking and other financial services are the world’s most closely watched and strictly gove...

How Optical Character Recognition is Changing the Financial Industry Explore More

Anti Money Laundering, Blog, Business Technology, Financial Crime / AML, Fraud Prevention, Identity & KYC

Initial CCPA Compliance Costs Could Hit $55 Billion: Report

According to an economic impact assessment prepared for the state attorney general’s office by an...

Initial CCPA Compliance Costs Could Hit $55 Billion: Report Explore More

Blog

Safeguarding the Art Market with Shufti’s AML Screening Solution

Non-fungible tokens (NFTs), blockchain-powered title deeds tied to a virtual or physical asset, h...

Safeguarding the Art Market with Shufti’s AML Screening Solution Explore More

Blog

Overcoming the Challenges of Proliferation Financing with AML Screening Solutions

On September 23rd, the 2021 UK NRA (National Risk Assessment) was published as part of the govern...

Overcoming the Challenges of Proliferation Financing with AML Screening Solutions Explore More

Blog

The Evolution of AML Compliance from Checkbox to Risk-based Approach

Financial institutions are exposed to several money laundering threats, as criminals today are we...

The Evolution of AML Compliance from Checkbox to Risk-based Approach Explore More

Blog, Financial Crime / AML

AMLD5 Amendments in Prepaid Cards Transaction Threshold

In July 2018, the European Commission came into effect the 5th Anti-Money Laundering Directive (A...

AMLD5 Amendments in Prepaid Cards Transaction Threshold Explore More

Blog

Online Identity Verification – The Hallmark of Surviving the Digital Upheaval

Embracing the digital world seems like entering uncharted waters where the challenges are novel, ...

Online Identity Verification – The Hallmark of Surviving the Digital Upheaval Explore More

Blog

Age Gating VS Age Verification | Enhancing Security for Minors

Age gating was once employed to stop minors from accessing age-restricted content. However, the a...

Age Gating VS Age Verification | Enhancing Security for Minors Explore More

Blog

5 Key Questions about Facial Recognition Answered by Experts

Technology has definitely made life convenient but comes with a gazillion concerns from anyone wh...

5 Key Questions about Facial Recognition Answered by Experts Explore More

Blog

Solving the Cheating Problem in Online Gaming with Robust ID Verification Solution

The digital gaming and esports industry has grown at an immense pace in recent years, topping 1 b...

Solving the Cheating Problem in Online Gaming with Robust ID Verification Solution Explore More

Blog

ICOs blocking investors from USA and China – Why and How?

Initial Coin Offerings, more commonly known as ICOs, are all the rage in modern day financial wor...

ICOs blocking investors from USA and China – Why and How? Explore More

Take the next steps to better security.

Contact us

Get in touch with our experts. We'll help you find the perfect solution for your compliance and security needs.

Contact us

Request demo

Get free access to our platform and try our products today.

Get started