
Crime networks across the board consistently rely on the same playbook.
Once you know what they do, the key is to look for indicators then watch and trace the flow of money across these channels.
The playbook:
- Crypto
Decentralized digital assets enable cross-border transfers outside regulated banking systems. “Mixers” and “tumblers” further obscure transaction trails by pooling and redistributing funds, so you can’t tie them to the source.
- Fake Storefronts
Seemingly legitimate businesses are used to move, disguise, and integrate illicit funds.
They can play a lot of “games”:
- justify transactions
- convert cash into digital assets
- bridge informal and formal financial systems.
- Barter
Some criminals bypass financial systems entirely by avoiding the banks altogether. Direct exchange = no record.
- Hide & Seek
Opaque funding structures—often routed through layered nonprofits, PACs, or intermediaries—are used to support candidates, political operatives, and influence campaigns while obscuring the original source of funds.
- Redirection
Illicit actors exploit trust-based systems by redirecting funds raised for legitimate purposes..
- The Job, the Grant, the Book Deal
Financial influence is often exerted through indirect forms of compensation such as consulting contracts, employment opportunities, book deals, or speaking engagements. These payments can serve as reputationally acceptable vehicles for influencing decision-makers, experts, or public figures. Such transfers may appear legitimate, complicating efforts to distinguish influence from standard professional activity.
Upping The Ante
These mechanisms are not isolated—they are modular and often used in combination.
Also, as enforcement tightens in one area, networks adapt by shifting to others.
Lessons for Us
- Sometimes, the public officials most attacked in the media are likely the ones being targeted by bought-off influencers. This is especially true if corruption is widespread.
- Once you expose the money flow, you instantly shut down the credibility of terrorist propaganda.
- The boring hard work is where the value lies. Disrupting illicit networks requires financial surveillance, documentation and reporting.
Written with the help of AI.
You must be logged in to post a comment.