Read More about fast-id page

Shufti globally launches webinr-icon - a new kind of identity solution!

Shufti globally launches - a new kind of identity solution!

Read more

Trade based money laundering – Challenges, detection and prevention

Trade Based Money Laundering and Terrorist Financing

Back in 2006, Financial Action Task Force (FATF) emphasised on new measures and strategies for banks to combat money laundering and terrorist funding in its report on trade based money laundering. As per the report, FATF highlighted the fact that with new standards applied, other money laundering techniques are becoming more effective. And there’s a high possibility that trade based money laundering will grow more attractive. Moreover, very little attention is paid to combat the abuse of the international trade system currently.

Trade based money laundering has become a growing concern since the publishing of FATF report. According to the Global Financial Integrity analysis, from 2005-2014, the illicit cash flow to and from emerging and developing countries was 12-24% of their total trade. Not to forget the potential damage through the use of these funds, is more than a trillion-dollar problem. For years, regulatory authorities and international trade sector have worked together to address the rising issue. Authorities such as FATF, have issued various guidelines to assist banks in combating money laundering.

What is trade based money laundering (TBML)?

Trade based money laundering is the most sophisticated approach to make black money white by taking advantage of complex trading systems It generally involves importing and exporting goods and exploitation of cross-border trade finance. TBML is most prominent in the context where multiple parties and jurisdictions make customer due diligence (CDD) and AML screening more difficult.

Money laundering is the third-largest global industry after oil and currency, states the International Money Laundering Information Bureau (IMLIB). With the advancement in technology, criminals are becoming more sophisticated and trade based money laundering is one of the oldest yet refined forms of money laundering.

Why is Trade based money laundering done?

Crimes and money laundering are interrelated concepts that balance each other. Money laundering is done to hide and wash away dirty money generated through crimes. Individuals want to secure their illegal earnings by keeping them at lower tax jurisdiction and washing away the dirty money. Crime is not a crime unless it is proved and that’s how money laundering is done, i.e. presenting illicit money as the hard-earned money.

Money launderers use various channels and networks to bring their dirty money at a place where it’s hard to detect the source of money and trace the transactions. Moreover, these channels are adopted to ensure personal security, lower or no tax, and political stability. The leaked Panama papers highlighted different aspects that how rich and powerful people are hiding their wealth. Secondly, how companies helped their clients to dodge sanctions, launder money and evade taxes. Most of the illicit money comes from various trade based money laundering schemes.

Some recent statistics show that the illegal cash flow from Bangladeshi nationals is growing. It is because the major portion of Bangladesh’s export earnings comes from RMG export. And in order to execute RMG export order, million-dollar Back-to-back Letter of Credit (BBLC) are issued every day against export contacts and letter of credit. That’s where trade based money laundering risks arise because it makes money laundering easier than other foreign trade operations.

Three stages of trade based money laundering

Trade based money laundering, like money laundering, usually occurs in three stages. The flow goes like

  • Placement: At the placement stage, the criminal transforms the illicit proceeds into some legally transferable assets; for instance, purchasing goods.
  • Layering: At the layering state criminal attempts to hide the relationship between their proceedings and criminal source, for example, trading goods cross-border.
  • Integration: Lastly, at the integration stage the offender re-introduces the illegally laundered money into the legitimate economy, for instance, reselling the purchased goods.
Stages of Money laundering

Non-documentary trades – The biggest challenge

Trade based money laundering is often hard to detect because of its nature. One of the biggest challenges that make it difficult for compliance officials to identity TBML is non-documentary trade. In a non-documentary transaction, banks get limited access to information depending upon the transaction structure and the institution’s policy. For instance, the bank may only have the name, address, and account number of the seller, and buyer’s name and account number.

In such scenarios, the trade occurs without any human intervention like a wire transfer. Banks cannot identify the underlying trade flows for international transactions in a non-documentary trade. Even in a wire transfer, very little information is available that does not suffice for the bank’s validation system. Banks only intervene if the transaction instructions are unclear or a sanction stops the transaction itself for further review.

Banks must understand their customers and their businesses using a comprehensive due-diligence assessment that may include the volume and the type of goods or services. Customer profiles can help banks to validate the flow of transactions and ensure their authenticity.

Trade based money laundering schemes

With the evolution of AML controls globally, criminals are exploiting new ways to hide their dirty money. Trade based money laundering is one of the ways to deceive regulatory authorities and move illicit funds cross-border without getting detected. Even in TBML, criminals adopt multiple schemes which include:

  • Over or under-invoicing: It involves misinterpreting the price of goods sending either inflated or deflated invoices to the importer. In the case of over-invoicing, the exporter receives a greater value from the importer. Whereas, in the case of under-invoicing, the greater value is transferred to the importer.
  • Multiple invoicing: It means invoicing one shipment several times. When exporter invoices multiple times for the same shipment, they receive greater values from the importer.
  • Short or over shipping: This scheme involves shipping more or fewer goods than invoiced. In case of short shipping, the exporter ships fewer goods than the previously agreed contract, therefore, receiving greater value. Alternatively in over-shipping importer receive more goods, hence more worth.
  • Obfuscation: It involves shipping something other than what is invoiced. For instance, exporter misinterprets on official invoice/documentation claiming the goods are of premium quality hence receiving greater value from the importer.
  • Phantom shipping: In this type, the exporter ships nothing at all with false invoices and receives payment from the importer.

Scope of trade finance

Banks and financial institutions are under the continuous scrutiny of regulatory authorities because of the nature of operations. Trade finance is emerging as a significant concern for anti-money laundering (AML) enforcement authorities and compliance officers. It is difficult to detect and combat abuses within trade finance processes. Within the scope of trade finance, financial institutions provide various services that are resulting in trade based money laundering risks. These services include, but not limited to:

  • Banks guarantees and document collections
  • Loan services (import/export, packing, pre-shipment loans etc.)
  • Financing under open account transactions
  • Trust receipts and letters of credit (L/C)
  • Structured trade financing
  • Warehouse financing
  • Import/export invoice discounting

In order to identify red flags and combat money laundering, officials need to take a fresh look at these channels to derive risk factors.

FATF report – Red flag indicators

The financial action task force has issued multiple guidelines for the banks and other sectors to combat money laundering. In its recent trade based money laundering paper, FATF presented the list of red-flag indicators for the bank trade finance departments. Detecting these red flags, banks can deter TBML activities.

These red-flag indicators include:

  • Significant disparities between the descriptions of the commodity on shipment bill and the invoice.
  • A notable difference between the value of goods or commodity reported on invoices and the market value of the item. For example, exporting gold
  • jewellery at $500/ounce when the market price is $950/ounce.
  • The goods being shipped are not in line with the exporter’s or importer’s regular business activities. For instance, cloth manufacturer exporting gold jewellery is suspicious.
  • Inconsistent shipment size according to the exporter’s or importer’s regular business scale and activities. For example, a small toy exporter shipping a consignment worth $50 million when the normal business turnover is $10 million only.
  • The transaction involving cash payments or receipts from third-parties that have no direct link with the transactions. Such transactions usually involve the use of shell companies.
  • The commodity is shipped through one or more jurisdictions or subsidiaries that are not connected without any valid economic reason.

It all comes down to Know your client

Analysing various trade based money laundering schemes and the red-flag indicators issued by FATF, it all comes down to one major thing, i.e. Know your customer or know your client (KYC) to combat money laundering. An effective AML compliance program makes it obligatory for banks and financial institutions to cross-link the know your client data and regular business alerts.

In trade based money laundering, the involvement of shell companies is often witnessed. For banks and financial institutions, it is important to know the business (KYB) and ultimate business owners (UBOs) to detect shell companies and any other business entities having money laundering risks associated with them.

Related Posts

Blog

Fintech 2021: KYC/AML Bringing New Innovation to the Table

2020 was all about surviving the pandemic, but it has also kickstarted a new wave of innovation. ...

Fintech 2021: KYC/AML Bringing New Innovation to the Table Explore More

Blog, Fraud Prevention

What is Loan Fraud and How to Detect it?

Loan fraud simply means when someone uses your identity to illegally obtain a loan. The crime has...

What is Loan Fraud and How to Detect it? Explore More

Blog

Uncovering 5 Holiday Season Scams and How to Avoid them this Year

‘Tis the season when the best deals of the year are attracting customers towards online shopping ...

Uncovering 5 Holiday Season Scams and How to Avoid them this Year Explore More

Blog

Enhance Time Efficiency with Shufti’s KYC Solution

The Past Quick and secure e-KYC verification might not have been of importance in the days prior ...

Enhance Time Efficiency with Shufti’s KYC Solution Explore More

Blog

The EU’s New AML Proposal, What’s in Store?

To strengthen the EU’s Anti-Money Laundering and Countering the Financing of Terrorism (AML/CFT) ...

The EU’s New AML Proposal, What’s in Store? Explore More

Blog

ETSI Identity Proofing Standard – How to Meet the New Regulations

Rapid digitization trends have led banks and financial institutions into competition for providin...

ETSI Identity Proofing Standard – How to Meet the New Regulations Explore More

Blog

Kaseya Ransomware Attack – How to Protect Your Organization from Cyber Risks

Did you know that by 2021, a ransomware attack is projected to occur every 11 seconds, costing co...

Kaseya Ransomware Attack – How to Protect Your Organization from Cyber Risks Explore More

Blog

The Complete Guide | Transaction Monitoring for Financial Institutions

With technological advancement, financial criminals have also been given a wider range of tools a...

The Complete  Guide | Transaction Monitoring for Financial Institutions Explore More

Blog, Identity & KYC

Which KYC Documents are Required for Customer Verification?

Name, Rank, Brigade, and Serial Number. That’s the only information military organizations across...

Which KYC Documents are Required for Customer Verification? Explore More

Blog

UK Watchdogs Hit Financial Institutions with Record AML Fines in 2021

A dramatic increase in Anti-Money Laundering (AML) fines was seen in 2021 as financial watchdogs ...

UK Watchdogs Hit Financial Institutions with Record AML Fines in 2021 Explore More

Blog

Know Your Driver – Urgency of Identity Verification for Mobility service Providers

Scams have been at the forefront whenever a new tool is made available. The same goes for ride-sh...

Know Your Driver – Urgency of Identity Verification for Mobility service Providers Explore More

Blog

A Detailed Insight Into Canadian Gambling Industry [2022 Update]

Even though Canada is not among the world’s gambling capitals, this business thrives there. The c...

A Detailed Insight Into Canadian Gambling Industry [2022 Update] Explore More

Blog, Business Technology

Why is Libra Cryptocurrency The Most Trending Thing Right Now?

The universe of crypto revolves around an aversion to a central financial authority. The financia...

Why is Libra Cryptocurrency The Most Trending Thing Right Now? Explore More

Blog

An Insight into Global Regulations for the Cryptocurrency Sector [2022 Update]

With emerging technologies continuing to proliferate faster and rapid digitization all around us,...

An Insight into Global Regulations for the Cryptocurrency Sector [2022 Update] Explore More

Blog, Business Technology

Identity Verification Fuels Growth of Ride Sharing Industry

The ride-sharing industry is growing at a huge pace. As per Orbi’s research, the ride-shari...

Identity Verification Fuels Growth of Ride Sharing Industry Explore More

Blog

AI-Powered OCR to replace data entry in 2020 – A detailed insight

Living in the data-driven world, there is a huge demand for storing data from printed or handwrit...

AI-Powered OCR to replace data entry in 2020 – A detailed insight Explore More

Blog, Financial Crime / AML

Global AML Regimes – Tightening Reins on Money Launderers

Money laundering is a global menace. Money laundering and terrorist financing are the major targe...

Global AML Regimes – Tightening Reins on Money Launderers Explore More

Blog

Know Your Donor (KYD) for NPOs – Red Flags that Charities Need to Consider

Like every other sector, non-profit organizations and charities are also vulnerable to financial ...

Know Your Donor (KYD) for NPOs – Red Flags that Charities Need to Consider Explore More

Blog

The Latest KYC Regulation Bill for Bitcoin ATMs and DeFi Platforms

As the digital revolution takes hold worldwide, there has been an unparalleled surge in the adopt...

The Latest KYC Regulation Bill for Bitcoin ATMs and DeFi Platforms Explore More

Blog

E-Signature | Digitise and Verify Agreements in Compliance

The use of electronic signature, or e-signature, has transformed business dealings. The days of s...

E-Signature | Digitise and Verify Agreements in Compliance Explore More

Blog

The Vicious Cycle of Money Laundering in the Gambling Industry

Money launderers opt for various channels to obscure the origins of their illegally obtained fund...

The Vicious Cycle of Money Laundering in the Gambling Industry Explore More

Blog

Understanding and Implementing Age Verification Requirements in Accordance with the FDA Deeming Rule

Youth is considered the most valuable asset for any country, and it is the government’s responsib...

Understanding and Implementing Age Verification Requirements in Accordance with the FDA Deeming Rule Explore More

Blog

FINMA Report Indicates Unchanged Cybercrime and Money Laundering Risks

Money laundering, identity theft, and various other cyberattacks risk have been elevated over the...

FINMA Report Indicates Unchanged Cybercrime and Money Laundering Risks Explore More

Blog, Business Technology

Business Verification – Foolproof Ways to Secure Happy Customers

Creating a winning customer experience can make for a significant competitive advantage for busin...

Business Verification – Foolproof Ways to Secure Happy Customers Explore More

Blog

Video KYC – Ultimate Solution for Financial Institutions

With social distancing becoming the necessity during the pandemic, more and more companies began ...

Video KYC – Ultimate Solution for Financial Institutions Explore More

Blog, Online Marketplace

KYC Services and AML Compliance Services for Forex Industry

Forex Industry stands to benefit a lot by incorporating KYC services in addition to AML Complianc...

KYC Services and AML Compliance Services for Forex Industry Explore More

Blog

A Brief Overview of the RegTech Industry [2022 Update]

The rising financial crimes have raised concerns of global regulatory watchdogs giving rise to Re...

A Brief Overview of the RegTech Industry [2022 Update] Explore More

Blog

Identification, Verification and Authentication – Cut from the same cloth

The modern era of technology has brought so many frauds to light. The digitized world has urged b...

Identification, Verification and Authentication – Cut from the same cloth Explore More

Blog, Online Marketplace

Age Verification – Must Have For Age Restricted Retailers

Mobile e-commerce makes up for nearly 29% of the entire e-commerce sales in the US. A majority of...

Age Verification –  Must Have For Age Restricted Retailers Explore More

Blog

A Comprehensive Guide to Choosing a Perfect e-KYC Solution for Businesses

Most of our processes, including financial and business dealings, have now shifted to online plat...

A Comprehensive Guide to Choosing a Perfect e-KYC Solution for Businesses Explore More

Blog

Video KYC in 2024 | A Step Towards Digital Evolution

The striking surge in theft and fraud through digitisation is a growing concern for many business...

Video KYC in 2024 | A Step Towards Digital Evolution Explore More

Blog

Bitcoin ATMs – how it works and KYC compliance

Bitcoin ATMs are everything an ATM is and isn’t. The world of finance and banking has chang...

Bitcoin ATMs – how it works and KYC compliance Explore More

Blog, Financial Crime / AML

Secure Crypto Wallets with e-KYC & AML Screening

Payment and funds’ transfer has taken a more digital turn in recent years, with the onset of Cryp...

Secure Crypto Wallets with e-KYC & AML Screening Explore More

Blog, Reg Tech

3 Reasons why RegTech is the Future of Innovation?

Regulatory Technologies, commonly referred to as RegTech, is an innovative use case of Financial ...

3 Reasons why RegTech is the Future of Innovation? Explore More

Blog

Real Estate Industry Crimes and Strict AML Regulations – How Shufti Can Help

The real estate industry has long provided a safe way for fraudsters to secretly launder or inves...

Real Estate Industry Crimes and Strict AML Regulations – How Shufti Can Help Explore More

Blog

How Optical Character Recognition Improves the Process of Identity Verification for Businesses

Evolving technologies have created a competitive market where every business strives to optimize ...

How Optical Character Recognition Improves the Process of Identity Verification for Businesses Explore More

Blog

The Truth Around DeFi Compliance – Bridging the Transparency Gap

Financial markets around the world have seen increased popularity with the advent of decentralise...

The Truth Around DeFi Compliance – Bridging the Transparency Gap Explore More

Blog

Deutsche Bank’s Epstein Fine – Lesson for Financial Institution

High-risk clients pose a serious threat to banks. Over the past few years, a significant number o...

Deutsche Bank’s Epstein Fine – Lesson for Financial Institution Explore More

Blog

Securing Mobility as a Service (MaaS) with Shufti’s Digital Identity Verification Solution

The transport industry is on the verge of significant disruption, with new emerging technologies,...

Securing Mobility as a Service (MaaS) with Shufti’s Digital Identity Verification Solution Explore More

Blog

GDPR Compliance vs BlockChain Debate – Things you must know

GDPR Compliance is here to stay and it is going to be binding on every business and online enterp...

GDPR Compliance vs BlockChain Debate – Things you must know Explore More

Blog

All You Need to Know About Facial Recognition

Rapid digitisation over the past few years has led to the adoption of facial recognition for many...

All You Need to Know About Facial Recognition Explore More

Blog

Know Your Customer – Addressing the Risks of Financial Crimes in Challenger Banks

With emerging technologies, financial services are witnessing a digital revolution that is changi...

Know Your Customer – Addressing the Risks of Financial Crimes in Challenger Banks Explore More

Blog

High-Risk Countries and The Significance of AML/CFT Regulations – How Shufti Can Help

Money laundering and terrorist financing are becoming a global concern. To overcome the risk of c...

High-Risk Countries and The Significance of AML/CFT Regulations – How Shufti Can Help Explore More

Blog

Youtube Stepping up to Protect Minors’ Data Online

The explosion of the internet and mobile devices has paved new ways for marketers and Cybercrimin...

Youtube Stepping up to Protect Minors’ Data Online Explore More

Blog

Know Your Business – What Does it Mean & How can it Protect Your Company?

Businesses that offer their services to other businesses, instead of individual consumers, have t...

Know Your Business – What Does it Mean & How can it Protect Your Company? Explore More

Blog

Video KYC Onboarding: Fintechs meeting KYC compliance with video identifications

The Financial industry is introducing a digital revolution globally. The term Fintech corresponds...

Video KYC Onboarding: Fintechs meeting KYC compliance with video identifications Explore More

Blog

Unfolding Telecom Frauds through Effective KYC Compliance

The growing adoption of smartphones has naturally spurred sharing of personal data. From providin...

Unfolding Telecom Frauds through Effective KYC Compliance Explore More

Blog

Identity Verification making online dating platforms secure

The expansion of the internet and mobile devices has led to the rapid adoption of online dating. ...

Identity Verification making online dating platforms secure Explore More

Blog

Identity Proofing – 7 Reasons Why Businesses Need it Now!

Modern-day cyberspace has effortlessly diminished the boundary between the real-life and digital ...

Identity Proofing – 7 Reasons Why Businesses Need it Now! Explore More

Blog, Financial Crime / AML

Challenges of AML Compliance under FinCEN

AML Compliance for US based Cryptocurrency companies has been tightened by Financial Crimes Enfor...

Challenges of AML Compliance under FinCEN Explore More

Blog, Business Technology, Fraud Prevention

How Identity Theft Protection Can Increase Your Profit!

Identity theft protection is something that is not only a concern for ordinary users anymore. Bus...

How Identity Theft Protection Can Increase Your Profit! Explore More

Blog

5 Key Regulatory Updates for the Banking Sector in 2021

The pandemic disrupted operations in the banking sector and the criminal activities significantly...

5 Key Regulatory Updates for the Banking Sector in 2021 Explore More

Blog, Identity & KYC

How Real ID Act enables Digital KYC Services for US Customers?

Digital KYC Services for US based customers are in debt of Real ID Act as it streamlined the proc...

How Real ID Act enables Digital KYC Services for US Customers? Explore More

Blog

The Ultimate Guide to Central Know Your Customer (CKYC)

Due to the increasing rates of financial fraud, keeping detailed data on each client is more impo...

The Ultimate Guide to Central Know Your Customer (CKYC) Explore More

Blog

KYC Regulations Across the Globe | An Updated Guide 2023

 The global financial industry finds it hard to meet compliance and secure sensitive cus...

KYC Regulations Across the Globe | An Updated Guide 2023 Explore More

Blog

Cannabis Industry – Risks, Predictions, Fraud & KYC/AML Obligations

The ever-growing industries across the world are opening gates for numerous opportunities to gree...

Cannabis Industry – Risks, Predictions, Fraud & KYC/AML Obligations Explore More

Blog

Top 10 FinTech Trends to Watch for in 2022

2021 was a game-changer for the FinTech sector as it has come up with innovative payment gateways...

Top 10 FinTech  Trends to Watch for in 2022 Explore More

Blog

ID Verification for Ultimate Subscription Fraud Prevention

Cellular phones were first introduced in the consumer market in 1973 when Motorolla first introdu...

ID Verification for Ultimate Subscription Fraud Prevention Explore More

Blog

Transaction Monitoring – Establishing A Defense Mechanism Against Financial Crime

With the rapid increase in the global volume of monetary transactions, money laundering methods a...

Transaction Monitoring – Establishing A  Defense  Mechanism Against Financial Crime Explore More

Blog

How Does Digital Identity Verification Work For Income Verification

With the help of income verification documents, organisations can restrict the onboarding of high...

How Does Digital Identity Verification Work For Income Verification Explore More

Blog

Estonia’s AML Act Amendments – Securing Virtual Currencies in 2022

Estonia’s financial institutions are developed and ensure transparency as its laws are well-defin...

Estonia’s AML Act Amendments – Securing Virtual Currencies in 2022 Explore More

Blog

The Crucial Role of Face Liveness Check in Fintech

Fintech firms lose approximately $51 million to scams annually. However, the cost of fintech frau...

The Crucial Role of Face Liveness Check in Fintech Explore More

Blog

August 2023 Recap: Major Violations and How AML Screening Can Help

With technological advancement, scammers are revising their strategies to bypass verification sol...

August 2023 Recap: Major Violations and How AML Screening Can Help Explore More

Blog

Identity Verification Forecast: How Will KYC Evolve in 2023?

As the world becomes more digital, scammers are honing their craft and employing trickier techniq...

Identity Verification Forecast: How Will KYC Evolve in 2023? Explore More

Blog

Know Your Investor | Understanding Which Investors to Onboard

Investor onboarding is regarded as one of the most critical stages of the business’s lifecy...

Know Your Investor | Understanding Which Investors to Onboard Explore More

Blog

Know Your Players: Why KYC is Necessary for Gaming and Gambling

The post-COVID-19 era has witnessed a remarkable surge in the e-sports and gaming sectors. This t...

Know Your Players: Why KYC is Necessary for Gaming and Gambling Explore More

Blog

Top Cryptocurrency Trends to Look Out for in 2022

2021 has been a remarkable year for cryptocurrency as because of COVID-19 outbreak crypto industr...

Top Cryptocurrency Trends to Look Out for in 2022 Explore More

Artificial Intelligence, Blog, Identity & KYC

How Biometric Technology is Shaping Up for 2020

The verification of individuals for security measures has become remarkably important for organiz...

How Biometric Technology is Shaping Up for 2020 Explore More

Blog

KYC/AML Compliance – Eliminating Financial Crime in Challenger Banks

Challenger banks have emerged in the financial services paradigm by bringing digital innovations ...

KYC/AML Compliance – Eliminating Financial Crime in Challenger Banks Explore More

Blog

Identification, Verification and Authentication – Cut from the same cloth

The modern era of technology has brought so many frauds to light. The digitized world has urged b...

Identification, Verification and Authentication – Cut from the same cloth Explore More

Blog

AML/KYC 2020 – how 2019 changed the landscape of global regimes?

Copy pasting your 2019 AML/KYC compliance strategy to 2020 plan will not do the job. Businesses n...

AML/KYC 2020 – how 2019 changed the landscape of global regimes? Explore More

Blog

5 types of identity theft fraud and How businesses can prevent it?

Online identity theft has the fastest growing crime rate in the world. According to a report, onl...

5 types of identity theft fraud and How businesses can prevent it? Explore More

Take the next steps to better security.

Contact us

Get in touch with our experts. We'll help you find the perfect solution for your compliance and security needs.

Contact us

Request demo

Get free access to our platform and try our products today.

Get started