The 5 Stages of Money Laundering Compliance Officers Must Know
| Quick Answer | The traditional model describes three stages of money laundering: placement (introducing criminal proceeds into the financial system), layering (moving funds through complex transactions to obscure their origin), and integration (reintroducing proceeds as apparently legitimate funds). For compliance officers building AML controls, two additional stages are essential to understand: the predicate offence that generates the criminal proceeds in the first place, and the concealment mechanisms that operate throughout the process. Each stage has distinct typologies, risk indicators, and AML control requirements. |
The three-stage model of money laundering — placement, layering, integration — is one of the most widely taught frameworks in financial crime compliance. It appears in FATF guidance, regulatory training materials, and AML examination curricula worldwide. Understanding it is necessary. But for compliance officers responsible for designing and operating AML programmes, three stages are not sufficient.
The model tells you where in the laundering cycle a transaction sits. It does not tell you what the underlying criminal activity was, what concealment mechanisms are being used alongside the financial transactions, or how modern laundering schemes layer multiple techniques across multiple stages simultaneously. This guide expands the model to give compliance professionals a more complete picture of how money laundering actually works — and what that means for AML programme design.
Stage 1: The Predicate Offence
Before money can be laundered, it must first be generated through criminal activity. The predicate offence — the underlying crime that produces the proceeds — determines the nature of the laundering risk, the typologies that are likely to be used, and the customers and channels most likely to be involved.
FATF Recommendation 3 requires countries to apply money laundering offences to all serious crimes. In the UK, POCA 2002 applies to all criminal conduct without a de minimis threshold. In the EU, AMLD 6 expanded the list of predicate offences to 22 categories including cybercrime, environmental crime, and tax crimes. In the US, the BSA's SAR obligations apply to the proceeds of any criminal activity.
For compliance officers, understanding the predicate offence landscape relevant to their customer base is essential for calibrating AML controls. A bank serving the real estate sector faces a different predicate offence risk profile — primarily corruption, tax evasion, and organised crime — than a payment processor serving e-commerce merchants, where fraud and cybercrime proceeds are the dominant risk. The firm-wide risk assessment must reflect this.
| Predicate Offence Category | Typical Money Amount | Most Exposed Sectors |
|---|---|---|
| Drug trafficking | Estimated $500bn+ annually globally | Banks, cash-intensive businesses, real estate, money services |
| Fraud and cybercrime | One of the fastest-growing predicate offence categories | Payment processors, banks, e-money institutions |
| Corruption and bribery | World Bank estimates $1 trillion in bribes paid annually | Wealth managers, investment managers, banks serving PEPs |
| Tax crime | IMF estimates global tax gap of $500bn+ annually | Banks, wealth managers, law firms, accountants |
| Human trafficking | ILO estimates $150bn+ in forced labour proceeds annually | Banks, cash businesses, money services businesses |
| Sanctions evasion | Increasingly significant since Russia sanctions expansion in 2022 | Banks, payment processors, trade finance, crypto exchanges |
Stage 2: Placement
Placement is the first stage at which criminal proceeds enter the financial system. It is generally considered the most vulnerable stage for the launderer — the point at which the connection between the funds and their criminal origin is closest, and therefore the point at which AML controls have the highest chance of detecting and disrupting the laundering process.
Common placement typologies include:
- Cash structuring (smurfing) — depositing cash in amounts deliberately kept below the reporting threshold to avoid triggering a Currency Transaction Report or similar filing obligation. Multiple deposits across multiple branches or accounts in the same day are a classic indicator.
- Cash-intensive business commingling — mixing criminal cash with the legitimate revenues of a cash-intensive business — a restaurant, car wash, or retail outlet — to make illegal funds appear to be trading income.
- Currency exchange and money services — using unregistered or poorly-regulated money service businesses to convert cash into electronic funds or foreign currency.
- Real estate cash purchases — using criminal proceeds to purchase property in cash, particularly in jurisdictions with weak anti-money laundering controls in the real estate sector.
The AML controls most effective at the placement stage are customer onboarding KYC — which establishes a baseline for expected customer behaviour — and transaction monitoring rules calibrated to detect structuring patterns and unusual cash deposit volumes.
Stage 3: Layering
Layering is the most complex stage of the money laundering process. Its purpose is to create distance between the funds and their criminal origin by moving them through a series of transactions, entities, and jurisdictions that make the trail difficult or impossible to follow. Sophisticated layering schemes may involve dozens of transactions across multiple countries, multiple currencies, and multiple asset classes.
Common layering techniques include:
- International wire transfers — moving funds through a series of bank accounts in different jurisdictions, particularly those with less stringent AML regimes or strong bank secrecy laws.
- Shell company chains — routing funds through a series of shell companies with nominee directors and no genuine business activity, making beneficial ownership identification extremely difficult.
- Trade-based money laundering (TBML) — manipulating international trade transactions — over- or under-invoicing goods, multiple invoicing, falsely describing goods — to move value across borders through the trade finance system.
- Real estate cycling — purchasing and rapidly reselling properties to create an apparently legitimate transaction history.
- Crypto layering — using mixing services, privacy coins, or rapid asset exchanges across multiple platforms to obscure the blockchain transaction trail.
Transaction monitoring is the primary AML control at the layering stage. The transaction monitoring programme must be calibrated to detect the velocity, geographic, and structural patterns that characterise layering activity — not simply to flag large individual transactions.
Stage 4: Concealment
Concealment operates throughout the laundering process rather than at a single point. It refers to the mechanisms used to hide the true nature, source, ownership, or control of funds — including the use of false identities, nominee arrangements, complex corporate structures, attorney-client privilege, and professional enablers who provide the legal, financial, and corporate infrastructure that makes sophisticated layering schemes possible.
The concealment stage is where the compliance challenge of beneficial ownership identification is most acute. Shell companies, trusts, and nominee arrangements are specifically designed to place a layer between the apparent owner and the beneficial owner. AML controls must be designed to look through these structures — using KYB verification, UBO identification, and source of wealth investigation — rather than accepting the surface presentation of a clean corporate client.
Stage 5: Integration
Integration is the final stage at which successfully laundered funds re-enter the legitimate economy and are available for use by the criminal. At this point, the funds appear to have a legitimate source — they may have passed through multiple corporate structures, been invested in real estate or financial assets, or been disguised as business income.
Detecting laundering at the integration stage is the most difficult of the three classical stages. The funds look legitimate. The transactions appear normal. The customer's documentation is in order. Integration-stage detection depends on intelligence about the underlying criminal network rather than transaction pattern analysis — which is why the SAR regime and law enforcement information sharing are essential components of the overall AML framework.
How AML Controls Map to Each Stage
| Laundering Stage | Primary AML Control | What to Look For |
|---|---|---|
| Predicate offence | Firm-wide risk assessment; sector-specific typology awareness | Understanding which criminal activities are most prevalent in the firm's customer sectors |
| Placement | KYC onboarding; cash structuring detection in transaction monitoring | Unusual cash deposit patterns; structuring below reporting thresholds; unexplained rapid fund inflows |
| Layering | Transaction monitoring; international wire transfer scrutiny; correspondent banking due diligence | Rapid fund movement with no business purpose; geographic patterns inconsistent with customer profile; shell company counterparties |
| Concealment | KYB beneficial ownership identification; EDD for complex structures; source of wealth verification | Multiple layers of corporate ownership; nominee arrangements; professional enabler involvement |
| Integration | SAR intelligence; law enforcement information sharing; adverse media monitoring | Transactions that appear legitimate but are connected to known criminal networks through intelligence rather than transaction analysis |
Build AML Controls That Address Every Stage
One Constellation's compliance platform covers the full AML control stack — from KYC onboarding and beneficial ownership verification through to transaction monitoring, PEP screening, and SAR workflow — giving you defensible controls at every stage of the laundering cycle.
