A space to share my interests and concerns. All opinions are my own, and my research is provided in good faith. Please refer to the disclaimer or use the contact form for any questions or concerns. Be aware: THIS CONTENT IS FREQUENTLY MIGRATED. If you don't see what you're looking for, check the "Annual Diaries" blogs. Thanks.

Crime networks across the board consistently rely on the same playbook.

Once you know what they do, the key is to look for indicators then watch and trace the flow of money across these channels.

The playbook:

  1. Crypto

Decentralized digital assets enable cross-border transfers outside regulated banking systems. “Mixers” and “tumblers” further obscure transaction trails by pooling and redistributing funds, so you can’t tie them to the source.

  1. Fake Storefronts

Seemingly legitimate businesses are used to move, disguise, and integrate illicit funds.

They can play a lot of “games”:

  • justify transactions
  • convert cash into digital assets
  • bridge informal and formal financial systems.
  1. Barter

Some criminals bypass financial systems entirely by avoiding the banks altogether. Direct exchange = no record.

  1. Hide & Seek

Opaque funding structures—often routed through layered nonprofits, PACs, or intermediaries—are used to support candidates, political operatives, and influence campaigns while obscuring the original source of funds.

  1. Redirection

Illicit actors exploit trust-based systems by redirecting funds raised for legitimate purposes..

  1. The Job, the Grant, the Book Deal

Financial influence is often exerted through indirect forms of compensation such as consulting contracts, employment opportunities, book deals, or speaking engagements. These payments can serve as reputationally acceptable vehicles for influencing decision-makers, experts, or public figures. Such transfers may appear legitimate, complicating efforts to distinguish influence from standard professional activity.

Upping The Ante

These mechanisms are not isolated—they are modular and often used in combination.

Also, as enforcement tightens in one area, networks adapt by shifting to others.

Lessons for Us

  1. Sometimes, the public officials most attacked in the media are likely the ones being targeted by bought-off influencers. This is especially true if corruption is widespread.
  2. Once you expose the money flow, you instantly shut down the credibility of terrorist propaganda.
  3. The boring hard work is where the value lies. Disrupting illicit networks requires financial surveillance, documentation and reporting.

Written with the help of AI.