Cryptocurrency continues its meteoric rise, and it appears that few things can slow it down. However, some aspects of cryptocurrency have regulatory bodies concerned. In particular, crypto’s utility in the world of money laundering. What can businesses do to detect and prevent it?
Crypto’s money laundering problem
A projection published by Nasdaq shows that the current bitcoin adoption rate has been outpacing the internet’s user growth rate. As a result, Bitcoin, the world’s most valuable cryptocurrency, is forecast to hit the billion-user mark nearly two times faster than the internet did. On the other hand, criminals laundered an estimated $2.8 billion through crypto exchanges in 2019, and the illegal activity continues to this day.
On July 13, British police announced they had confiscated around $250 million worth of cryptocurrency involved in an ongoing money-laundering operation. This made it one of the largest ever crypto seizures. It followed a $160 million crypto confiscation made just three weeks prior.
But why is cryptocurrency attractive to criminals?
Due to its digital and often decentralized nature, it has low barriers to entry, is relatively anonymous, and is convenient to trade across international borders.
There is good news. Anti-money laundering regulations (AML) are an efficient way to tackle this issue. Less than 1% of all crypto transactions today are estimated to relate to illegal activity, compared to 35% in 2012. A large part of that decrease has to do with businesses becoming compliant with AML regulations and learning how to spot money laundering red flags.
Why should crypto businesses care about AML and KYC?
The Financial Action Task Force (FATF) includes crypto businesses in its guidelines. This means that European and Non-European members alike require crypto businesses to comply with AML standards. Failure to do so could result in fines, sanctions, or jail time.
To know whether your business is affected, check if your country has transposed FATF regulations into its national laws.
What are the AML red flags to look out for?
Criminals use many strategies to launder their money with cryptocurrency. While a single red flag may not be enough to determine criminal activity, several red flags detected in combination should trigger further action.
According to the latest FATF report from 2020, here are five common red flags that crypto businesses need to look out for:
- Unusual transaction patterns
- Geographical risks
- Suspicious user profiles
- Source of funds
Unusual transaction patterns
Irregular patterns relating to the size, frequency, or type of crypto transactions may be red flags pointing to money laundering activity, including:
- Customers making several high-value transfers within a short amount of time, such as a 24-hr period
- Structuring transaction amounts to fall below reporting thresholds
- Depositing funds into accounts with previously identified stolen currency
- Transferring crypto to service providers located in areas with low regulation standards
- Frequent large-value transfers from multiple accounts into a single account
- Immediate withdrawal of deposits without any transaction history, especially when large sums are emptied from newly opened accounts.
- Converting crypto deposits into numerous currencies with a high amount of incurred fees, even exchanging at a loss
- Converting substantial sums of fiat currency into crypto without a reasonable business premise
Criminals involved in money laundering exploit countries with weak regulations involving digital assets. So be on the lookout for:
- Crypto funds are transferred to exchanges or service providers located in regions with inadequate or non-existent AML regulations
- Customers sending or receive funds from exchanges located in other countries than the one the customer lives or operates in
- Customers that establish business addresses in countries that do not have Suspicious Activity Reports up to FATF standards
Cryptocurrency uses advanced technology to ensure that users and exchanges are secure from data breaches. However, this also makes it difficult for regulators to detect fraudulent activity. Still, there are red-flag indicators that can lead investigators in the right direction:
- Customers who move funds from public blockchains to exchanges where the funds are immediately converted into privacy coins
- Unlicensed customers who act as crypto service providers
- Users who regularly conduct high-value transactions on peer-to-peer (P2P) crypto exchanges, especially unlicensed ones
- Frequent or high volume transactions on platforms that offer crypto mixing services to disguise the origin of the funds
- Customers who frequently conduct high-value transactions on platforms that fail to comply with international standards of know-your-customer (KYC) or customer due diligence (CDD) procedures
- Multiple transactions involving crypto ATMs, often located in areas with known financial crime risks
- Usage of proxies or other services intended to disguise IP addresses and domain names when registering for an exchange
Suspicious user behavior
Businesses should intercept customers with insufficient or forged identification documents at the KYC stage. In addition, there are different types of suspicious behavior that companies should mark as red flags:
- Transactions originating from untrustworthy IP addresses or domains that differ from the country the customer operates or resides in
- Multiple crypto wallets that are controlled by the same IP address
- Regular use of cryptocurrencies linked to fraudulent behavior or Ponzi schemes
- Customers who often change their contact and identification information
- Customers using multiple IP addresses to conduct transactions or access crypto platforms
- Customers who often transact with the same senders or receivers, resulting in significant gains or losses
- Senders who do not possess a working understanding of cryptocurrency (including but not limited to the elderly) yet still conduct regular or high-value transactions
- Customers making substantial cryptocurrency purchases beyond their established financial means
Source of funds
Funding sources can identify many money-laundering operations. For example, any of the following should raise a red flag:
- Funds involving accounts linked to known illegitimate operations such as fraud, ransomware, extortion, darknet markets, or illegal gambling sites
- Crypto wallets connected to several credit cards that withdraw sizeable sums of fiat currency
- Funds sourced from initial coin offerings (ICOs) that may be fraudulent, third-party mixing services, or platforms that do not comply with AML standards
- Substantial deposits that are converted directly into privacy coins or withdrawn into a different fiat currency
How can crypto businesses apply this knowledge?
What’s next once your business is familiar with the various AML red flags?
Prevention is better than cure. Suppose a crypto-related business has implemented an appropriate risk-based approach. In that case, it’s already on the path to addressing money laundering threats by using a FATF recommended methodology.
Additionally, any crypto business compliance program should include the following features:
- A robust CDD process to identify customers and assign them to their associated risk categories
- Sanctions screening to ensure conformity with updated lists regarding international sanctions and politically exposed persons (PEPs)
- Adverse media monitoring of customers who feature in negative news reports
- A powerful AI suspicious behavior detection engine to root out bad actors
- Cutting-edge biometric identification screening
- Advanced linguistic and phonetic-based KYC/AML checks
ComplyCube’s cloud SaaS platform can help Crypto businesses automate these AML and KYC workflows. It includes a flexible set of tools and APIs to address the issues listed above and offers customers a frictionless experience that builds user trust.
With the continued rise of cryptocurrency, the opportunity for criminals to misuse it will grow as well. Therefore, crypto businesses must implement a state-of-the-art KYC platform capable of handling the user verification process to shift focus back to their core business.