Professional Documents
Culture Documents
Money Laundering
Methods and Financial
Crime Prevention
Cryptocurrency Money Laundering using
Virtual Currency Exchanges
There are numerous cryptocurrency The use of cash is widely recommended
exchanges that are regulated, that comply by criminals discussing in online forums as
with applicable laws and regulations, and that a simple means of avoiding tracing or
cooperate with law enforcement authorities. detection. Money launderers can simply
The majority of them also requires customer engage in crypto-to-cash transactions
identification and conducts customer due either with their associates or with third
diligence. However, there are still a few parties they encounter.
cryptocurrency exchanges that aligned their
services towards the needs of criminal clients Another simple way to stay anonymous is
by enabling purchasing and selling virtual the use of prepaid credit and debit cards
currencies without requiring a proper form of which can be bought in supermarkets,
identification or verifying the provided stores or online. There are exchanges
identities. where customers can buy cryptocurrencies
with a prepaid credit and debit cards
But criminals can certainly use legitimate instantly without the need to supply any
exchanges and apply various techniques proper form of identification.
there to circumvent verification processes and Another avenue through which criminals
take advantage of the payment methods can undertake Bitcoin money laundering is
offered by exchanges. Fake identity unregulated cryptocurrency exchanges.
documents are available online and via Exchanges that are not compliant with
Darknet markets enabling criminals to stay AML practices and which fail to perform
anonymous. Some exchanges have already strict and thorough identity checks allow for
upgraded their customer due diligence cryptocurrencies to be traded over and
requirements and are now putting in Skype over again across various markets,
verification calls or require customers to deposited onto unregulated exchanges,
produce self-generated images holding their and traded for different altcoins.
ID and papers with a random text written on it.
However, criminals already found new ways The repeated exchanges of one type of
to bypass the current verification processes. cryptocurrency for another can slowly
clean the funds, which criminals can
Virtual currencies exchanges offer different eventually withdraw to an external wallet.
payment methods to buy or sell virtual
currencies, predominately bank transfers and
credit or debit card payments. Some also
offer the use of Money Service Businesses
such as Western Union and MoneyGram,
PayPal, bank cheques and even cash
including cash deposits and cash in mail.
Money laundering vulnerabilities associated
with the use of cash are commonly known.
But there is more. The users of the exchange could not fund an account by directly
transferring money from their bank accounts to a bank account of the exchange itself, but
rather had to wire funds to bank accounts of one of the exchange’s shells or affiliate entities.
It was also possible to send or receive fiat currencies and virtual currencies from other
users, but users could not withdraw funds from their accounts directly. Instead they were
required to make deposits or withdrawals through the use of third-party exchanges, thus
enabling the exchange of question to avoid collecting any information about its users
through banking transactions or other activity that would leave a financial paper trail.
According to the authorities, users even openly and explicitly discussed criminal activity on
the exchanges user chat and the exchange’s customer service representatives offered
advice on how to process and access money obtained from illegal drug sales on darknet
markets like Silk Road, Hansa Market, and AlphaBay.
Finally it is also important to bear in mind that virtual currency exchanges do not only serve
the purpose of converting virtual into fiat currency and vice versa, but they can also be used
for the conversion of a virtual currency into another, including the more recent and with
enhanced anonymity virtual currencies.
New cryptocurrencies such as monero, zcash, dash or pivx allow anonymous transactions.
Especially monero and zcash provide private transactions keeping amounts, balances,
source and destination addresses anonymous and thus making it hardly possible to trace
back transactions or identify their real owner. Other’s such as dash and pivx simply mix
transactions involving multiple sources into a single transaction.
1. The first step is opening verified 3. The third step is opening bank accounts
accounts at crypto exchanges. In order to with money mules. The money mules
convert cryptocurrency that is deriving from open several bank accounts in a third
illegal activities, such as ransomware and country with false foreign identification
fraud, into fiat currency, the money documents. All the documentation
launderer opens numerous accounts using associated with the opening of these bank
money mules as frontman with false accounts is then delivered to the money
documents to surpass identification and launderer.
verification.
4. The last step is transferring the
2. The second step is transferring the dirty cryptocurrency from the exchanges to the
cryptocurrency from crypto addresses or local bank accounts opened by money
wallets to the exchanges. The money mules. At this stage since the criminal
launderers then use tumblers or mixers for money was already separated from its
transferring the cryptocurrency to the original source. Then money launderer
verified account opened at an exchange can use the money for whatever purpose.
with false identification documents. Usually these bank accounts are used for
short periods of time and their balance
typically does not exceed EUR 30,000.
As of September 2019, there were 5,457 Bitcoin ATMs worldwide. Continually connected to
the internet, Bitcoin ATMs allow anyone with a credit or debit card to purchase Bitcoin.
Additionally, they may possess bi-directional functionality allowing users to trade Bitcoins for
cash using a scannable wallet address.
Bitcoin ATMs can also accept cash deposits, providing a QR code that can be scanned at a
traditional exchange and used to withdraw Bitcoin or other cryptocurrencies.
Regulations used by financial institutions to obtain a record of customers and transactions
for these machines vary by country and are often poorly enforced. Criminals can exploit
loopholes and weaknesses in cryptocurrency ATM management to get around Bitcoin
money laundering risks.
Money launderers are increasingly making use of Bitcoin ATMs to launder illegally obtained
money. Whereas previously banking transfers or remittance services such as Western
Union or MoneyGram where used, criminals now instruct their money mules to withdraw
money from compromised bank accounts and to use it to buy Bitcoins via a Bitcoin ATM. To
avoid any identification procedures the criminal depositors would apply smurfing techniques
to split the funds to batches of under EUR 1.000.
After picking up considerable amounts of criminal cash from drug traffickers in Europe this
money laundering organization continued to use its smurfing techniques to split and deposit
funds into a large number of bank accounts under their control. After several transfers to
other bank accounts, the funds were ultimately used for the purchase of Bitcoins from
private vendors located in different European countries, via the use of the LocalBitcoins
platform.
In order to then move the value of the obtained Bitcoins to Colombia the money laundering
organization uses two simple options:
Option 2: On the same day, the LocalBitcoin wallet, in which the purchased Bitcoins
and the necessary information to access and use the wallet where stored, was delivered
to the cocaine trafficking criminal organization in Colombia. They can then use the value
stored in that wallet in Colombia or anywhere in the world.
Firstly, you might want to look for First of all, watch out for large number
discrepancies between the submitted of bank accounts or wallets held by the
customer identification and the IP same administrator or by the same
address. For example, if a user exchange. This can, of course,
provides documentation on an sometimes even happen in different
account, indicating an address in the countries and is an indicia for flow-
UK, and then all IP addresses through accounts, potentially indicating
associated with the customer’s layering activity. Just to double-check
activity are noted as being from this one, look if a business rationale for
Japan, you can count this as a red such a structure is available and makes
flags. sense.
Secondly, check if your cryptocurrency
Secondly, suspicious IP addresses in customer or if a cryptocurrency
conjunction with suspicious exchange are located in one country,
usernames, including nicknames or but holding there accounts and wallets
ICQ numbers, are another red flag in other countries, where they do not
that would help in the detection of appears to have a reason for being at.
potentially criminal money flows. In addition, look for unexplained
business rationales that could be
Thirdly, you also want to look at suspicious.
logins or login attempted from non- Thirdly, be wary of back and forth
trusted IP address or from a user’s IP movement of cryptocurrency funds
that was previously identified as between bank accounts held by
associated with suspicious activity. different customers or virtual currency
exchange companies located in
different countries. This may also be
indicative of layering activity in case it
does not fit the business model.
Last but not least, check if the volume
and frequency of cash transactions,
which might sometimes be structured
below reporting thresholds, conducted
by the owner of a cryptocurrency wallet
make economic sense.
Anonymity
For example, if the owner of a key gives the private key to another person, the new person
could spend the money, but so could the first person if they kept a copy of the keys. The
owner of a key can be identified only by the corresponding public key. For this reason,
Bitcoin is frequently called pseudonymous because identities are masked by the keys, but
this is somewhat misleading. The owner of a key could be well known if they publish their
public key to allow others to send them money, and even if not, they could actually be
identified.
For example, if someone were to use a single public-private key pair for all of their
transactions, which is known as key reuse, it would be relatively easy for an observer to
discover their identity. This is due to the fact that the first transaction that is made on the
blockchain is tied to the person’s real-world identity, which means that the second
transaction is as well, because the blocks always link to the predecessor. This would be an
operational failure for anonymity. Even without any key reuse between transactions, it is
possible to find users who control multiple accounts because the outputs are used together
for a single purchase.
In addition, there are many other threats to cryptocurrency anonymity that can potentially
identify users, including temporal data, off-network information, IP address data, and other
side channels. There has been much work on deanonymization using a variety of methods,
and even transactions that are not yet able to be deanonymized are plausibly susceptible,
given future capabilities.
Users can mitigate some of these technical threats to anonymity by using techniques that
are built into some newer cryptocurrency applications or by taking steps to use
cryptocurrencies more anonymously, such as using a coin mixer to hide ownership or
obfuscating IP addresses. However, defending against all threats requires significant
technical knowledge and following best practices very consistently.
Secondly, there is the issue of Usability. Like many emerging technologies, cryptocurrencies
are difficult for newcomers to use. Once a new user has broken through the initial
knowledge challenges, the user will most likely find himself using wallets for managing the
cryptocurrency. However, such easy-to-use online wallets that manage funds for the user
are problematic for surreptitious use, because the service can both see details of what is
being done and freeze funds. You can imagine these wallets as being similar to banks in
that they are subject to anti–money laundering regulations.
Security
Let us talk about Security for a moment. Closely related to usability is security. Security is a
critical need for any user of a monetary system, and cryptocurrencies have many potential
weaknesses that traditional currencies do not share. For example, many formerly centrally
run cryptocurrency exchanges, which allowed users to easily create online wallets, have
been compromised. These compromises - both insider-driven and external - led to well-
publicized losses of user funds. This type of loss is far from unknown in traditional banking,
but the procedures for handling it make these losses unlikely to affect depositors.
The alternative to such centrally run systems are user-controlled wallets. The use of such
wallets requires the user to secure the system. Hardware wallets, which allow users to store
currencies in a dedicated device, are susceptible to a variety of attacks that range from
highly technical thefts to simple theft. The use of software wallets on the other hand require
the user to secure the system being used to store them. A compromise of the computer
system could easily lead to a complete loss of funds. Even in 2011, so rather early in the
history of cryptocurrencies, some computer viruses were found that stole Bitcoin. Most
users are not capable of fully securing a computer or smartphone holding cryptocurrency,
and in other domains, even well-protected, fully offline systems have been hacked by
sophisticated adversaries.
It is unclear how difficult it will be to use these currencies securely in the future. I personally
expect that concerns about security will decrease over time if no such breaches occur.
Nonetheless, criminal organization still might not trust these systems, especially because
they are largely designed and maintained by people working in Western countries, and
many of the world’s largest criminal organizations, including large-scale money launderers
and terrorist groups, they are not.
Acceptance
In addition, one must keep in mind the acceptance of cryptocurrencies. The limited reach of
cryptocurrencies at present is a significant challenge, especially in the regions where
criminal organizations operate, which applies to terrorist organizations and large-scale
money launderers in particular. For example, despite the large network of Bitcoin-accepting
vendors and services, there are few Bitcoin ATMs in the Middle East and outside of Israel.
The future trajectory of these currency technologies is uncertain, but if and when consumer
use increases across the world, it will make use by criminals such as terrorists, for example.
much more plausible. Generally, however, the conditions needed to allow, for example,
terrorist groups, to establish themselves and flourish, such as failed states and lack of
government oversight, might make the technological infrastructure needed for
cryptocurrencies infeasible.
It is unclear how difficult it will be to use these currencies securely in the future. I personally
expect that concerns about security will decrease over time if no such breaches occur.
Nonetheless, criminal organization still might not trust these systems, especially because
they are largely designed and maintained by people working in Western countries, and
many of the world’s largest criminal organizations, including large-scale money launderers
and terrorist groups, they are not.
Acceptance
These problems are less severe for short-term uses, which cover many potentials uses by
criminals. The stability of a cryptocurrency system depends on typical market risks and the
continuing involvement of developers, interest of miners, and the ecosystem of applications
that support the currency. For this reason, it is unclear how many of the newer
cryptocurrencies will last. These factors matter primarily in the medium-to-long term, not in
the short term, when money would be transferred in and out of such a currency quickly.
Last but not least, there is the issue of volume. Transaction volume is actually a quite critical
limitation of cryptocurrency use for many criminal organizations, especially medium-to-large
scale money launderers and some of the bigger terrorist organizations. Many
cryptocurrencies have a too low market volume in comparison to what many criminals would
require. Low market volume makes the prices more sensitive to transactions and makes the
transfer of large amounts of money expensive. Essentially, this is due to the most basic
equation of supply and demand. This is particularly a critical concern for smaller and newer
cryptocurrencies, in addition to concerns about the security and reliability of any new
system.
The other critical problem with low volume is the traceability of transactions. This problem
manifests in two ways.
First of all, large transactions have impacts on price and an increased demand is visible,
making the transaction less anonymous.
Secondly, a public ledger, even one with robust technical anonymity, cannot mask the
fact that large volumes or high-value single transactions appear. Because transactions
are posted publicly for all to see, including law enforcement, changes in average volume
are easy to detect. Thus, a sudden spike in volume is enough to attract attention.