signzy

API Marketplace

downArrow
Logo
Responsive
3 Stages of Money Laundering: Placement, Layering & Integration Explained [2026]

3 Stages of Money Laundering: Placement, Layering & Integration Explained [2026]

10 Minutes
Key Highlights
  • Money laundering remains one of the largest undetected financial crimes globally: With $800 billion to $2 trillion laundered annually and a 90% non-detection rate, financial institutions face a growing enforcement environment, H1 2025 alone saw $1.23 billion in global AML fines, a 417% increase from the prior year.
  • Each of the three stages, placement, layering, and integration, presents distinct methods, red flags, and detection opportunities: From smurfing and crypto placement to shell company layering and luxury asset integration, compliance teams that understand stage-specific typologies can build far more targeted and effective AML programs.
  • Platforms like Signzy enable real-time detection across all three stages, combining transaction monitoring, AML screening against 1,000+ global watchlists, money mule detection, and continuous risk scoring to help banks, fintechs, and regulated businesses identify suspicious activity at every point in the laundering chain.

Every year, an estimated $800 billion to $2 trillion in illicit funds flows through the global financial system, a figure equivalent to 2-5% of global GDP. Yet according to the UNODC and FATF, roughly 90% of money laundering goes undetected, and only 0.1% of laundered funds are ever recovered.

For compliance officers, risk teams, and financial institutions, understanding how money laundering actually works, not just in theory, but in the real-world schemes that enforcement agencies uncover every year, is the foundation of building detection systems that work.

Money laundering is not a single event. It is a process, and that process almost always follows three distinct stages: placement, layering, and integration. Each stage has its own methods, its own vulnerabilities, and its own detection opportunities. Criminals who skip a stage or execute one poorly are far more likely to get caught. And for compliance teams, understanding where each stage is most vulnerable is the key to disrupting the entire chain.

This guide breaks down each stage with real enforcement cases from 2024-2025, current statistics, detection frameworks, and the regulatory context that makes this knowledge essential for every regulated institution.

What Is Money Laundering and Why Does It Follow Three Stages?

Money laundering is the process of making illegally obtained money appear legitimate. The term itself dates back to the 1920s, when organized crime figures in the United States reportedly used cash-intensive laundromats to blend illicit proceeds with legal revenue, though the modern three-stage framework was formalized in the 1980s as law enforcement studied the sophisticated methods used by drug cartels to move billions across borders.

The reason money laundering follows a staged process is straightforward: large amounts of unexplained cash attract attention. A drug trafficker cannot deposit $5 million in cash into a bank account and then use it to buy a house without triggering multiple regulatory alarms. Instead, the money must be gradually distanced from its criminal source through a series of deliberate steps designed to break the paper trail.

The Financial Action Task Force (FATF), the global standard-setter for AML policy, recognizes this three-stage model as the foundational framework for understanding and combating money laundering. While real-world schemes do not always follow the stages in neat sequence, and some sophisticated operations blend or skip stages entirely, the placement-layering-integration model remains the most widely used analytical framework for AML compliance programs worldwide.

StageObjectiveTypical Methods
PlacementIntroduce illicit funds into the financial systemSmurfing, cash-intensive businesses, crypto purchases, trade invoicing
LayeringObscure the connection between funds and their criminal sourceShell companies, crypto mixing, offshore transfers, investment cycling
IntegrationReintroduce "clean" funds into the legitimate economyReal estate, luxury assets, business investments, loan-backs

Stage 1, Placement: How Illicit Funds Enter the Financial System

Placement is the first and often the riskiest stage of money laundering. This is the point where criminals must physically introduce illegally obtained funds, typically cash, into the legitimate financial system. It is the riskiest stage because large amounts of unexplained cash are the most visible indicator of potential money laundering, and financial institutions are specifically trained and required to flag them.

The goal of placement is simple: convert physical cash or other direct proceeds of crime into a form that can be moved through the financial system, bank deposits, monetary instruments, digital assets, or trade goods, without triggering the regulatory alarms designed to catch exactly this activity.

What Are the Most Common Placement Methods?

MethodHow It WorksExampleDetection Indicators
Smurfing / StructuringBreaking large cash amounts into smaller deposits below reporting thresholds (e.g., $10,000 in the U.S.) across multiple accounts or branchesA network of individuals each deposits $9,500 across different bank branches on the same dayMultiple sub-threshold deposits across related accounts; same-day deposits at multiple branches
Cash-Intensive Business BlendingMixing illicit cash with legitimate revenue from businesses that naturally handle large volumes of cash (restaurants, car washes, parking garages, vending machines)A restaurant reporting $50,000/week in cash revenue despite only seating 30 customersRevenue inconsistent with business capacity; abnormal cash-to-card payment ratios
Cryptocurrency PurchasesConverting cash into cryptocurrency through peer-to-peer exchanges, Bitcoin ATMs, or unregulated platformsPurchasing Bitcoin via P2P platforms using cash, then transferring to a private walletLarge crypto purchases from unverified sources; use of non-KYC exchanges or Bitcoin ATMs
False InvoicingCreating fictitious invoices for goods or services never delivered, allowing cash payments to appear as legitimate business transactionsA shell company issues a $200,000 invoice for "consulting services" that were never renderedInvoices with no corresponding delivery records; payments to newly created entities
Foreign Currency ExchangeExchanging illicit cash into foreign currencies or purchasing monetary instruments (traveler's checks, money orders)Converting $500,000 in cash into euros through multiple exchange houses over several weeksFrequent large currency exchanges; purchases of multiple monetary instruments
GamblingUsing casinos or online gambling platforms to convert cash into chips, play minimally, then cash out as "winnings"Buying $100,000 in casino chips with cash, placing a few small bets, then cashing out the remainderLarge chip purchases with minimal play; frequent buy-in/cash-out cycles

For a deeper analysis of structuring specifically, see Signzy's guide on structuring in money laundering and smurfing in money laundering.

Real-World Placement Cases (2024-2025)

The $263 Million Bitcoin Social Engineering Scheme (USA, 2024-2025) In one of the largest cryptocurrency theft cases in U.S. history, hackers stole 4,100 Bitcoin ($263 million at the time) from a Washington, D.C. victim through social engineering. To place the stolen crypto into the financial system, the conspirators used bulk-cash converters to exchange cryptocurrency for cash, then used the funds to rent luxury properties at $40,000-$80,000 per month under false identities. Nine defendants have pleaded guilty, including a launderer who processed $3.5 million.

Feeding Our Future: $250 Million Federal Fraud (USA, 2025) In the Feeding Our Future scheme, defendants stole over $250 million in federal child-nutrition funds by creating fictitious meal distribution sites. The placement stage involved distributing funds through dozens of shell entities to avoid detection thresholds. Leaders Mukhtar Mohamed Shariff and Abdiaziz Shafii Farah received sentences of 17.5 and 28 years, respectively.

$38 Million Catalytic Converter Trafficking Ring (USA, 2025) Tou Sue Vang operated an unlicensed catalytic converter trafficking operation from homes and storage units across California, processing $38 million in stolen converters. The placement occurred through informal cash transactions outside the regulated banking system, making the funds difficult to trace until law enforcement dismantled the network. Vang was sentenced to 12 years.

How Do Financial Institutions Detect Placement?

Placement is where AML programs have the greatest opportunity to intercept laundering, because it is the stage most likely to involve cash and threshold-triggering transactions.

Key detection mechanisms include:

  • Currency Transaction Reports (CTRs): Required for cash transactions above $10,000 in the U.S. (and equivalent thresholds in other jurisdictions)
  • Suspicious Activity Reports (SARs): Filed when transaction patterns suggest structuring or other placement methods, though only 1% of SARs lead to investigation
  • Transaction monitoring systems: Automated rules that flag sub-threshold deposits, rapid succession transactions, and cash volumes inconsistent with account profiles
  • KYC verification: Identifying the source of funds during customer onboarding to catch placement at the earliest possible stage

For a detailed breakdown of how transaction monitoring rules work in practice, see Signzy's guide on AML transaction monitoring rules with examples.

Stage 2, Layering: How Criminals Obscure the Money Trail

Once illicit funds have been placed into the financial system, the next stage is layering, the process of creating a complex web of financial transactions designed to separate the money from its criminal origin. Layering is widely considered the most technically sophisticated stage of money laundering and the hardest to detect.

The goal of layering is distance. Every transaction, transfer, and conversion adds another layer between the original crime and the current location of the funds. By the time layering is complete, the money should appear to have no connection to its illegal source.

What Are the Most Common Layering Techniques?

TechniqueHow It WorksExampleDetection Indicators
Shell Company NetworksRouting funds through legally registered companies with no genuine operations, employees, or assets, often spanning multiple jurisdictionsFunds pass through five shell companies across Delaware, the Cayman Islands, and Cyprus before arriving in a UK bank accountCompanies with no employees or revenue; circular transactions between related entities; nominee directors
Cryptocurrency Mixing / Chain-HoppingUsing mixing services (tumblers) or converting between multiple cryptocurrencies to break the transaction trail on the blockchainBitcoin converted to Monero, then to Ethereum, then back to Bitcoin through a decentralized mixerUse of known mixing services; rapid cross-chain conversions; interaction with flagged wallet addresses
Real Estate CyclingPurchasing and selling properties, sometimes at inflated or deflated values, to create apparently legitimate transaction recordsBuying a property for $2 million, renovating for $200,000, then selling for $3 million to a related partyRapid property flipping; transactions between related parties; prices inconsistent with market values
Offshore Wire TransfersMoving funds rapidly through bank accounts in multiple countries, particularly jurisdictions with weak AML enforcement or strict banking secrecy laws$10 million wired from Hong Kong to Panama to Switzerland to Luxembourg within 48 hoursRapid sequential international transfers; funds flowing through high-risk jurisdictions with no business justification
Investment CyclingBuying and selling securities, insurance products, or other financial instruments to create legitimate-appearing transaction historiesPurchasing $5 million in bonds, selling them a week later, then reinvesting the proceeds in a different jurisdictionShort holding periods; transactions with no apparent economic purpose; frequent buy-sell cycles
Trade-Based LayeringOver-invoicing or under-invoicing international trade transactions to transfer value across borders without moving cash directlyExporting goods valued at $100,000 but invoicing them at $1 million, the $900,000 difference is transferred as a "payment"Invoice values inconsistent with market prices; trade between related entities; circular trading patterns

Real-World Layering Cases (2024-2025)

Samourai Wallet: $237 Million in Crypto Mixing (USA, 2025) Samourai Wallet co-founders Keonne Rodriguez and William Lonergan Hill operated one of the most prominent cryptocurrency mixing services, processing $237 million in illicit funds from drug trafficking, hacking, and fraud. The platform's "Whirlpool" feature broke the blockchain transaction trail by mixing multiple users' transactions together, making individual fund flows nearly impossible to trace. Rodriguez received 5 years and Hill received 4 years in prison.

Prince Group / Huione: $15 Billion Crypto Laundering Network (Cambodia, 2021-2025) In one of the largest money laundering operations ever uncovered, Cambodia-based conglomerate Prince Group, operating through its Huione Group subsidiary, processed an estimated $15 billion in illicit cryptocurrency, including proceeds from "pig butchering" romance scams and North Korean state-sponsored hacking operations. The layering involved moving funds through the Huione Pay payment platform and Huione Guarantee marketplace, creating multiple transaction layers across Southeast Asian financial systems. The DOJ indicted CEO Chen Zhi and initiated forfeiture of 127,271 Bitcoin.

Brad Heppner: $150 Million Looted Through Shell Companies (USA, 2025) Brad Heppner, a Dallas-based financier, allegedly looted $150 million from GWG Holdings, a publicly traded company, through a network of shell entities including Highland Consolidated. The layering involved routing investor funds through multiple corporate layers to obscure that the money was being diverted for personal use. Heppner was arrested in November 2025.

How Do Financial Institutions Detect Layering?

Layering is the hardest stage to detect because individual transactions may appear perfectly legitimate. Detection requires looking at patterns rather than individual events.

Key detection mechanisms include:

  • Behavioral analytics: Machine learning systems that identify unusual patterns, such as rapid sequential transfers, transactions with no economic purpose, or sudden changes in account behavior
  • Network analysis: Mapping relationships between entities, accounts, and individuals to identify circular flows and hidden connections between seemingly unrelated parties
  • Cross-border transaction monitoring: Flagging fund flows through high-risk jurisdictions, especially when there is no clear business rationale
  • Blockchain analytics: For cryptocurrency, tools like Chainalysis and TRM Labs trace transaction flows across blockchains, identifying interactions with known illicit wallets and mixing services

For a comparison of screening vs. monitoring approaches, see Signzy's analysis of transaction screening vs. transaction monitoring.

Stage 3, Integration: How Laundered Money Re-Enters the Legitimate Economy

Integration is the final stage of money laundering, the point where laundered funds are reintroduced into the legitimate economy in a way that makes them appear to be normal business earnings or investment returns. If placement and layering have been executed successfully, the funds at this stage are extremely difficult to distinguish from legitimate wealth.

The goal of integration is normalcy. The criminal wants to use their money openly, to buy property, invest in businesses, fund a lifestyle, without attracting suspicion. At this stage, the money has been sufficiently distanced from its criminal origin that it can withstand casual scrutiny. Only deep forensic investigation can typically trace integrated funds back to their source.

What Are the Most Common Integration Methods?

MethodHow It WorksExampleDetection Indicators
Real Estate InvestmentPurchasing residential or commercial property using laundered funds, often through corporate vehicles to obscure beneficial ownershipBuying a $10 million Manhattan apartment through a Delaware LLC with no identifiable beneficial ownerProperty purchased through opaque corporate structures; all-cash transactions; prices above market value
Luxury Asset PurchasesAcquiring high-value movable assets, art, jewelry, vehicles, yachts, that can store value and be resoldPurchasing a $500,000 watch collection and a fleet of exotic cars valued at $3.8 million using layered fundsLarge cash purchases of luxury goods; purchases inconsistent with known income; rapid acquisition patterns
Business InvestmentInvesting laundered funds into legitimate businesses as equity, loans, or operating capital, generating apparently legitimate income streamsInvesting $5 million into a restaurant chain that then generates "revenue" from the laundered capitalInvestments disproportionate to investor's known wealth; businesses with unusually rapid growth post-investment
Loan-Back SchemesThe criminal lends laundered money to themselves or a controlled entity, then "repays" the loan, creating a paper trail of legitimate-looking debt serviceA shell company lends $2 million to the criminal's real estate firm, which then makes regular "repayments"Loans between related parties with no commercial logic; loans from entities with no apparent lending business
Fake Employee PayrollsCreating fictitious employees on a company payroll, paying them with laundered funds, then collecting the paymentsA construction company lists 50 employees who do not exist, paying them monthly salaries in cash that is then collectedEmployees with no tax history; payroll inconsistent with business operations; payments to accounts controlled by a small group
Dividend and Profit DistributionPaying dividends or distributing profits from businesses funded with laundered money, creating legitimate-appearing incomeA company funded entirely with layered money declares $1 million in dividends to its criminal shareholdersDividends from companies with no real revenue; distributions from newly formed entities

Real-World Integration Cases (2024-2025)

$263 Million Bitcoin Scheme, Luxury Integration (USA, 2024-2025) The same social engineering Bitcoin theft ring that placed stolen crypto through bulk-cash converters then integrated the funds through extravagant spending: nightclub tabs of $500,000 in a single night, luxury watches costing $100,000-$500,000 each, designer handbags, exotic cars totaling a $3.8 million fleet, luxury home rentals in Los Angeles, the Hamptons, and Miami at $40,000-$80,000 per month, and private jet charters. The sheer scale and velocity of the luxury spending ultimately helped investigators trace and unravel the scheme.

Rahool Amin Makani: $14 Million Investment Fraud Integration (USA, 2025) Rahool Amin Makani defrauded investors of $14 million through fictitious businesses, then integrated the proceeds by purchasing Rolex watches, luxury automobiles, funding gambling activities, and chartering private jets. Makani was sentenced to 20 years in federal prison.

Michael Anthony Houser: $24 Million Tribal Gaming Embezzlement (USA, 2025) Houser embezzled $24 million from the Muscogee Nation's gaming operations, integrating the funds through false businesses that gave the money the appearance of legitimate commercial activity. He received an 8-year sentence and was ordered to pay over $25 million in restitution.

How Do Financial Institutions Detect Integration?

Integration is the most difficult stage to detect because the funds have already been thoroughly cleaned. Detection at this stage often requires proactive investigation rather than automated alerts.

Key detection mechanisms include:

  • Enhanced Due Diligence (EDD): Deep investigation into the source of wealth and source of funds for high-value transactions, particularly in real estate, luxury goods, and business acquisitions
  • Source of wealth verification: Requiring evidence that a customer's wealth is consistent with their known income, employment, and business activities
  • Beneficial ownership transparency: Identifying the natural persons behind corporate vehicles used to make purchases or investments, a requirement strengthened by FATF Recommendation 24 and the EU's AMLA framework
  • Ongoing monitoring: Continuously tracking customer activity for patterns inconsistent with their established profile

For a comprehensive overview of PEP and sanctions screening, a critical component of integration detection, see Signzy's guide on PEPs and sanction checks.

How Do the Three Stages Compare?

Understanding the differences between placement, layering, and integration is critical for designing stage-specific controls within an AML program.

DimensionPlacementLayeringIntegration
Primary ObjectiveGet illicit funds into the financial systemObscure the trail connecting funds to their criminal sourceReintroduce "clean" funds into the legitimate economy
Typical Transaction TypesCash deposits, crypto purchases, monetary instrumentsWire transfers, securities trades, shell company transactionsReal estate purchases, business investments, luxury goods
Geographic ScopeUsually domestic (near the crime)Often international (multiple jurisdictions)Can be domestic or international
Technology InvolvementLow to moderate (cash, crypto ATMs)High (mixing services, offshore banking, complex structures)Moderate (corporate vehicles, legal structures)
Detection DifficultyModerateHighVery high
Key Detection ToolsCTRs, SARs, cash threshold monitoringBehavioral analytics, network analysis, blockchain forensicsEDD, source of wealth verification, beneficial ownership checks
Regulatory FocusCash reporting requirements (BSA, CDD)Cross-border monitoring, sanctions screeningBeneficial ownership (CTA, FATF Rec. 24), EDD requirements
Typical Red FlagsStructuring, unexplained cash volumesCircular transactions, rapid multi-jurisdiction transfersWealth inconsistent with profile, opaque ownership structures

What Are the Emerging Money Laundering Methods in 2025?

While the three-stage model remains constant, the specific methods within each stage are evolving rapidly. Compliance teams that rely on detection rules built for traditional banking may miss entirely new typologies.

Emerging MethodStage(s) AffectedHow It WorksRisk LevelMost Affected Industries
DeFi Protocol ExploitationPlacement, LayeringUsing decentralized finance protocols (DEXs, lending platforms, bridges) to move funds without centralized KYC controlsCriticalCrypto exchanges, DeFi platforms, fintech
NFT-Based LaunderingLayering, IntegrationPurchasing NFTs at inflated prices from self-controlled wallets to create legitimate-appearing art transactionsHighArt marketplaces, crypto platforms
AI-Generated Synthetic IdentitiesPlacementCreating convincing fake business and personal identities using AI to open accounts and pass KYC checksCriticalBanks, fintechs, neobanks, payment processors
Trade-Based Money Laundering (TBML)All three stagesOver/under-invoicing goods, phantom shipments, and multiple invoicing to transfer value across bordersHighTrade finance, import/export, banking
Professional EnablersLayering, IntegrationLawyers, accountants, and real estate agents who, knowingly or negligently, facilitate the creation of shell structures and asset purchasesHighLegal services, real estate, accounting
Stablecoin FlowsPlacement, LayeringUsing USD-pegged stablecoins (USDT, USDC) for rapid cross-border value transfer without traditional banking intermediariesHighCrypto exchanges, payment processors

According to Chainalysis, cryptocurrency money laundering reached $82 billion in 2025, an eightfold increase since 2020, with Chinese laundering networks dominating cross-border crypto flows. Total illicit crypto volume hit $154 billion in 2025, nearly three times the $59 billion recorded in 2024.

The Regulatory Landscape: Key AML Frameworks Driving Enforcement in 2025

The three stages of money laundering are not just an academic framework, they directly inform the regulatory requirements that financial institutions must comply with. Understanding which regulations target which stage helps compliance teams allocate resources effectively.

FrameworkJurisdictionKey Requirements Relevant to 3 Stages2025 Developments
FATF RecommendationsGlobal (195+ jurisdictions)Risk-based CDD (placement); Cross-border monitoring (layering); UBO identification under Rec. 24 (integration)Strengthened trust/legal arrangement transparency; expanded Travel Rule to VASPs and DeFi platforms
EU AML Package / AMLAEuropean UnionUnified AML rulebook; harmonized CDD/EDD; interconnected UBO registers; crypto transfer traceabilityAMLA operational in Frankfurt for direct supervision;a 10,000 cash payment limit; anonymous crypto transactions ended
U.S. Bank Secrecy Act / FinCENUnited StatesCTR filing (placement); SAR filing (all stages); Beneficial Ownership Information reporting (integration)Corporate Transparency Act revised, domestic exemptions added; FinCEN modernizing risk-based AML programs
RBI KYC DirectionsIndiaMandatory KYC for all financial institutions; risk-based CDD; UBO identification for non-individual customersUpdated digital KYC guidelines; expanded requirements for fintech and payment aggregator onboarding

The enforcement trend is clear: H1 2025 saw $1.23 billion in global AML fines, a 417% increase from the prior year, driven primarily by cryptocurrency enforcement actions. Notable penalties included KuCoin ($297 million), OKX ($504 million), and BitMEX ($100 million), all for AML/KYC program failures.

For a complete overview of AML compliance requirements, see Signzy's AML compliance checklist.

How to Build an AML Program That Addresses All Three Stages

An effective AML program cannot focus on just one stage. Each stage requires different controls, different technologies, and different expertise. Here is how to structure a comprehensive program.

1. Placement Controls

  • Implement automated cash transaction reporting (CTRs) with real-time threshold monitoring
  • Deploy transaction monitoring rules specifically designed to detect structuring patterns
  • Strengthen KYC onboarding to verify the source of initial funds
  • Monitor high-risk channels: Bitcoin ATMs, P2P exchanges, money service businesses

2. Layering Controls

  • Use behavioral analytics and machine learning to detect unusual transaction patterns
  • Implement cross-border payment monitoring with jurisdiction risk scoring
  • Deploy network analysis tools to map relationships between entities and identify hidden connections
  • Integrate blockchain analytics for cryptocurrency transaction monitoring

3. Integration Controls

  • Require Enhanced Due Diligence (EDD) for high-value asset purchases and business investments
  • Implement source of wealth and source of funds verification for high-risk relationships
  • Maintain beneficial ownership registers and verify UBOs for all corporate customers
  • Conduct ongoing monitoring with trigger-based re-verification

4. Cross-Stage Requirements

  • Maintain a risk-based approach where the depth of controls matches the risk profile of each customer and transaction
  • File SARs promptly, FinCEN guidance recommends Day 0 detection, Day 30 initial filing, and 90-day follow-ups
  • Conduct regular training for compliance staff on emerging typologies
  • Implement continuous monitoring rather than periodic reviews, perpetual KYC (pKYC) is becoming the global standard

For a comprehensive guide to transaction monitoring implementation, see Signzy's guide to transaction monitoring.

How Signzy Helps Organizations Detect and Prevent Money Laundering Across All Three Stages

For financial institutions processing thousands of transactions daily across global markets, manual detection of money laundering across all three stages is not scalable. This is where automated, AI-powered compliance infrastructure becomes essential.

Signzy provides a comprehensive AML and compliance platform trusted by over 500 financial institutions globally. Here is how Signzy's capabilities map to each stage of the money laundering process:

Placement Detection

  • Real-time transaction monitoring continuously analyzes transactional data to identify structuring patterns, unusual cash volumes, and sub-threshold deposit sequences, flagging suspicious placement activity before funds can move further through the system
  • KYC verification validates customer identities across 10,000+ document formats in sub-3-second response times, ensuring source-of-funds verification happens at onboarding

Layering Detection

  • AML screening against 1,000+ global watchlists, including OFAC, UN, EU, FinCEN, SEBI, and RBI databases, with daily updates and fuzzy logic matching to catch name variations and aliases
  • Behavioral analytics and risk scoring use machine learning to assign dynamic risk scores based on transaction patterns, identifying layering activity that rule-based systems miss
  • Cross-border monitoring flags transactions involving high-risk jurisdictions with no clear business rationale

Integration Detection

  • MuleShield analyzes 200+ data points, including phone vintage, email breach records, employment verification, and digital footprints, to detect money mule accounts used to integrate laundered funds
  • Continuous monitoring tracks changes in customer behavior, ownership structures, and risk profiles throughout the business relationship, not just at onboarding
  • Configurable risk workflows enable proportional due diligence: standard CDD for low-risk entities and automated escalation to Enhanced Due Diligence for high-risk relationships

Cross-Stage Infrastructure

  • API-first architecture integrates with existing core banking systems, KYC databases, and third-party tools, deployable in as little as three days
  • Regulatory-ready reporting generates STR, CTR, and SAR-format reports with complete audit trails
  • 180+ country coverage with real-time access to government registries and corporate databases

To learn more about how Signzy can strengthen your AML program across all three stages of money laundering, visit the KYC/AML screening solutions or explore the transaction monitoring platform.

FAQ

What are the 3 stages of money laundering?

Drop Down
The three stages of money laundering are placement, layering, and integration. Placement introduces illicit funds into the financial system (through methods like smurfing or cash-intensive businesses). Layering creates complex transaction chains to obscure the funds' criminal origin (through shell companies, crypto mixing, or offshore transfers). Integration reintroduces the "cleaned" funds into the legitimate economy (through real estate purchases, business investments, or luxury assets).

Which stage of money laundering is the easiest to detect?

Drop Down
Placement is generally the easiest stage to detect because it often involves cash, the most visible and regulated form of financial activity. Cash transactions above $10,000 in the U.S. trigger mandatory Currency Transaction Reports (CTRs), and patterns of sub-threshold deposits (structuring) are a well-known red flag. However, the rise of cryptocurrency and P2P exchanges is making placement detection increasingly challenging.

How does cryptocurrency change the three stages of money laundering?

Drop Down
Cryptocurrency has fundamentally altered all three stages. For placement, criminals can convert cash to crypto through unregulated P2P exchanges or Bitcoin ATMs. For layering, mixing services (tumblers), chain-hopping between different cryptocurrencies, and DeFi protocols create nearly impenetrable transaction trails. For integration, crypto can be converted back to fiat through regulated exchanges or used directly to purchase assets. According to Chainalysis, crypto money laundering reached $82 billion in 2025.

What is the difference between placement and layering?

Drop Down
Placement is about getting dirty money into the financial system, the initial entry point. Layering is about obscuring the trail after the money is already in the system. A simple analogy: placement is sneaking cash through the front door of a bank; layering is moving that cash through 20 different accounts across 10 countries so no one can trace it back to the front door.

What are the most common red flags for each stage?

Drop Down
Placement red flags: Cash deposits just below reporting thresholds, multiple deposits across branches on the same day, cash volumes inconsistent with business type, use of Bitcoin ATMs or P2P crypto exchanges. Layering red flags: Rapid sequential international transfers, transactions between related shell companies, use of cryptocurrency mixing services, fund flows through high-risk jurisdictions with no business purpose. Integration red flags: Real estate purchased through opaque corporate structures, wealth inconsistent with known income sources, luxury asset purchases by newly formed entities, loan-back arrangements between related parties.

How much money is laundered globally each year?

Drop Down
The United Nations Office on Drugs and Crime (UNODC) estimates that $800 billion to $2 trillion is laundered globally each year, equivalent to 2-5% of global GDP. The United States alone accounts for an estimated $300 billion annually. Despite these staggering volumes, approximately 90% of money laundering goes undetected, and only 0.1% of laundered funds are ever recovered.

What AML regulations specifically address the three stages?

Drop Down
Multiple regulatory frameworks address different stages: the Bank Secrecy Act (BSA) and FinCEN rules target placement through CTR and SAR requirements; FATF Recommendations and the EU AML Package address layering through cross-border monitoring and sanctions screening; and the Corporate Transparency Act, FATF Recommendation 24, and AMLA target integration through beneficial ownership transparency and Enhanced Due Diligence requirements.

Can money laundering occur without all three stages?

Drop Down
Yes. In practice, money laundering schemes do not always follow all three stages in strict sequence. Some sophisticated operations may combine or skip stages. For example, a criminal who earns money through an online business may not need a distinct placement stage if the funds are already digital. Similarly, trade-based money laundering can accomplish placement, layering, and integration simultaneously through a single series of fraudulent trade transactions. The three-stage model is a framework for understanding and detecting laundering, not a rigid process that criminals always follow.

What role do banks play in detecting money laundering?

Drop Down
Banks are on the front line of money laundering detection because they serve as the primary gateway between illicit funds and the legitimate financial system. Banks are legally required to implement AML programs that include customer due diligence (CDD), transaction monitoring, suspicious activity reporting, and employee training. In 2025, financial institutions faced unprecedented enforcement pressure, global AML fines reached $1.23 billion in the first half of the year alone, with penalties targeting inadequate transaction monitoring and KYC program failures.

How long does the money laundering process typically take?

Drop Down
The timeline varies enormously depending on the sophistication of the scheme and the amounts involved. Simple laundering through cash-intensive businesses might take weeks. Complex international schemes involving shell company networks, real estate transactions, and offshore banking can take months or even years to complete all three stages. Cryptocurrency has accelerated the process significantly, crypto-based layering that might have taken weeks through traditional banking can now be accomplished in hours through mixing services and cross-chain transfers.

Spread the knowledge!

Found this useful ? Share what you learned!

XLinkedIn
Saurin Parikh

Saurin Parikh

Saurin is a Sales & Growth Leader at Signzy with deep expertise in digital onboarding, KYC/KYB, crypto compliance, and RegTech. With over a decade of professional experience across sales, strategy, and operations, he’s known for driving global expansions, building strategic partnerships, and leading cross-functional teams to scale secure, AI-powered fintech infrastructure.

Onboard User

Websites can't replace conversations. Let's talk?

We're just one call away, ready to answer all your queries and provide the perfect solution for your business needs.