Posted by: Cheyenne Vyska on behalf of Brian Monroe - 10/06/2025
ACFCS Contributor Report: Modern Money Laundering: Evolving Beyond the Classic Three Stages
The skinny:
Since the mid-1980s, around the time the crime of money laundering was itself codified under U.S. law, academics, investigators and later bank review teams had to wrestle with what exactly that looked like. The result: the classic placement, layering and integration model.
While the three-stage model remains a foundational teaching tool, modern money laundering methods often blur or bypass these stages entirely due to technological advancements and globalized financial systems.
More precisely, cleansing illicit value is less a sequence where one section must build upon the other, but more a selection of blocks that can take many forms – arranged and re-arranged to create the most complexity, opacity and anonymity.
What are the names inscribed on this illicit Lego set? Get ready to see financial crime fighting through a whole new lens of: Acquisition & Access, Initial Integration (Front-loading), Dispersal & Conversion, Preservation and Masking and Recycling & Legitimation.
By Kenneth J. Hines, MS, EA, CFE
Partner, Integritas³ | Former IRS Criminal Investigation Executive | Part-time accounting teacher, University of Washington Bothell
October 06, 2025
With edits and minor content contributions by ACFCS Chief Correspondent, Brian Monroe
Introduction
The origins of modern money laundering trace back to the early 20th century, with organized crime figures seeking ways to disguise the illicit origins of their profits.
One of the most infamous early practitioners was Al Capone, whose Chicago-based criminal empire in the 1920s generated vast sums from bootlegging, gambling, and racketeering.
To conceal these proceeds, Capone and his associates purchased cash-intensive businesses—such as laundromats—through which they could blend illegal earnings with legitimate income, giving rise to the term “money laundering.”
Although Capone was ultimately convicted of tax evasion rather than money laundering, his methods highlighted the need for strategies to obscure the trail of illicit funds, laying the conceptual groundwork for what would later become recognized as the three classic stages of money laundering: placement, layering and integration.
Following in the next generation of organized crime leadership, Meyer Lansky, often referred to as the “Mob’s Accountant,” refined and expanded money laundering techniques into a sophisticated global operation.
Lansky recognized that foreign banks—especially in jurisdictions with strict secrecy laws—offered powerful tools for hiding and moving criminal proceeds.
He pioneered the use of offshore accounts in Switzerland and the Caribbean, shell corporations, and complex financial transactions to layer illicit funds and make them appear legitimate.
Lansky’s innovations moved money laundering from small-scale concealment into an international system of financial obfuscation, influencing both criminal enterprises and, eventually, the anti-money laundering (AML) laws designed to stop them.
Money laundering did not exist as a standalone federal crime in the United States until the Money Laundering Control Act of 1986, which made it illegal to knowingly engage in financial transactions involving the proceeds of certain unlawful activities.
Before this legislation, law enforcement typically prosecuted money laundering-related conduct under tax evasion, fraud, or conspiracy statutes.
The 1986 Act, codified primarily under 18 U.S.C. §§ 1956 and 1957, not only criminalized the act of money laundering itself but also gave federal authorities greater investigative and forfeiture powers.
Around the same time, law enforcement training and investigative frameworks began using a three-stage model of money laundering crafted by academics to describe the process of disguising illicit funds:
-
- Placement – Introducing illicit funds into the financial system, often through cash deposits, purchases of monetary instruments, or the use of legitimate cash-intensive businesses.
- Layering – Moving and obscuring the trail of funds through multiple transactions, transfers between accounts, conversion to different forms, or international movement to jurisdictions with bank secrecy laws.
- Integration – Reintroducing the laundered funds into the legitimate economy through investments, property purchases, or other transactions that make the money appear legally earned.
While the three-stage model remains a foundational teaching tool, modern money laundering methods often blur or bypass these stages entirely due to technological advancements and globalized financial systems.
More precisely, cleansing illicit value is less a sequence where one section must build upon the other, but more a selection of blocks that can take many forms – arranged and re-arranged to create the most complexity, opacity and anonymity.
However, in practice, it no longer reflects the sophistication, speed, and technological wizardry at play – in the real and virtual worlds – when it comes to modern multi-channel, multi-sector and multi-jurisdictional money laundering operations.
The financial system today is global, digital, and interconnected, enabling criminals to move illicit value in ways that circumvent the linear structure of the old model.
Modern money laundering is fluid, multi-directional, and often indistinguishable from everyday transactions and legitimate commerce until deep forensic analysis is applied.
Limitations of the Classic Model
The classic placement–layering–integration model assumes:
- A primarily cash-based criminal economy.
- Sequential steps that occur in a linear order.
- Reliance on the formal banking system as the primary money laundering channel.
These assumptions no longer hold. Modern schemes often:
- Begin without cash (e.g., cryptocurrency, illicit online earnings, trading goods and services).
- Use multiple jurisdictions to exploit regulatory mismatches.
- Integrate illicit funds at the earliest possible stage through legitimate-looking transactions.
- Utilize both regulated and unregulated sectors to blur detection thresholds.
In other words, the classic model is insufficient as a sole analytical lens for law enforcement, regulators, and AML investigators.
The Modern Elements of Money Laundering
To better align with current typologies, major money laundering investigations, and emerging threats, I propose these elements are an overlapping framework that enhances the classic money laundering frame of the three stages.
Unlike the old model, these elements are more fluid and are non-linear and can occur simultaneously.
Acquisition & Access
In the context of fraud and money laundering, Acquisition & Access refers to the initial start point where criminals first obtain illicit assets or sensitive information and then secure the ability to use or control them.
Acquisition involves obtaining control of proceeds from criminal activity, such as embezzled funds, stolen credit card data, or money generated from predicate offenses like drug trafficking, corruption, or cybercrime.
Access refers to the ability to deploy or manipulate these assets, often through methods like using stolen banking credentials, leveraging shell company accounts, or transferring funds through cryptocurrency wallets.
This concept is valuable in understanding criminal typologies because the individuals who acquire illicit assets are not always the same as those who have the access to move or conceal them.
Recognizing these distinctions helps investigators trace the flow of illicit value through both the fraud scheme and the money laundering process.
It also broadens the traditional placement-layering-integration model by identifying an earlier operational stage that focuses on how criminals gain both possession and functional control over illicit funds or assets.
Criminals acquire control over illicit value through:
- Fraud, corruption, cybercrime, trafficking, sanctions evasion, tax evasion, or ransomware
- Assets may originate as digital currency, prepaid instruments, high-value goods, or even accounting entries in manipulated ledgers.
Initial Integration (Front-loading)
In fraud and money laundering, Initial Integration (front-loading) refers to a tactic where illicit funds are introduced into the legitimate economy immediately after acquisition, often disguised as legitimate revenue or capital from the outset.
Instead of the classic three-stage approach where funds move from placement to layering to integration, front-loading skips much of the layering process by embedding illicit proceeds directly into legitimate-appearing transactions at the start.
For example, a criminal might funnel fraud proceeds into a business and record them as sales revenue, inject them as startup capital in a front company, or use them to pre-pay contracts or leases.
This creates the illusion that the funds have a lawful origin from the very moment they enter the system, making tracing more difficult and reducing the need for complex money laundering steps later.
Illicit proceeds are blended with legitimate activity at the outset to establish a façade of legitimacy.
- Shell companies, nominee directors, and complicit professionals (lawyers, accountants, trust managers) act as immediate entry points.
- Transactions are structured to appear as normal business income or asset purchases.
Example: A real estate developer inflates invoices for subcontractor services, funding the overpayment with illicit proceeds disguised as capital contributions.
Dispersal & Conversion
In fraud and money laundering, Dispersal and Conversion describe distinct but often sequential tactics used to move and transform illicit funds, so they are harder to trace and easier to use.
Dispersal refers to breaking up large amounts of illicit funds into smaller transactions, accounts, or assets to reduce detection risk and complicate tracing.
This can involve sending funds to multiple bank accounts, distributing them among co-conspirators or “money mules,” wiring smaller amounts to different jurisdictions, or using layered transfers through intermediaries.
The objective is to fragment the money trail so that investigators face multiple, disconnected paths rather than a single obvious flow of funds.
Conversion is the act of changing illicit funds into a different form or asset class to disguise their origin and facilitate further money laundering.
Examples include converting cash into cryptocurrency, purchasing high-value goods (art, gold, vehicles), exchanging currency into different denominations, or moving from digital assets back to fiat currency.
Conversion often follows dispersal, as fragmented funds are then transformed into assets that are easier to integrate into legitimate transactions or store long term without attracting attention.
Value is moved rapidly to obscure its origin, often before law enforcement or compliance systems detect it.
- Cross-border transfers via multiple correspondent banks.
- Cryptocurrency swaps, including use of privacy coins and mixers.
- Trade-Based Money Laundering (TBML) using over/under-invoicing, phantom shipments, and falsified customs documentation.
Example: Funds from corruption are wired to a shell in Hong Kong, used to “purchase” goods from a shell in Dubai, then resold on paper to another entity in Switzerland—no goods ever move
Recycling & Legitimation
In the fraud and money laundering context, Recycling and Legitimation can be understood as interconnected stages focused on reusing illicit value and transforming it into funds that appear clean.
Recycling is the repeated movement or reinvestment of illicit funds through multiple transactions, accounts, or jurisdictions to further distance them from their criminal origin.
This may involve converting funds into different forms (cash, securities, cryptocurrency), reintroducing them into new schemes, or routing them through additional shell companies and intermediaries.
The goal is to obscure the audit trail, making the funds’ origin increasingly difficult to trace while keeping them in circulation for ongoing criminal or money laundering activity.
Legitimation is the process of giving illicit assets the appearance of lawful origin so they can be used openly without raising suspicion.
This can include channeling funds into legitimate businesses, purchasing high-value assets, or investing in financial instruments that generate credible-looking returns.
By embedding the proceeds within the legitimate economy, criminals create a plausible story for the source of wealth, making detection and confiscation more difficult. Together, recycling and legitimation extend beyond the basic layering stage, representing a strategic blend of concealment and normalization.
The disguised proceeds are reinjected into the economy, sometimes multiple times, in a cycle of re-legitimization.
- Investments in securities, real estate, luxury goods, or high-value art.
- Formation of legitimate businesses that generate actual revenue streams.
- Strategic philanthropy or political donations to gain social capital.
Example: Proceeds from drug trafficking are used to buy high-end condos in multiple cities, later sold for clean profits.
Preservation and Masking
In money laundering, Preservation and Masking represents the long-term phase in which illicit wealth—once initially concealed—is maintained, protected, and continually disguised to prevent detection, seizure, or forfeiture.
Preservation focuses on safeguarding the value of illicit assets over time, often through offshore trusts, layered corporate entities, or conversion into stable and appreciating forms such as real estate, fine art, precious metals, or diversified investment portfolios held across multiple jurisdictions.
Masking involves hiding the true ownership and illicit origins of these assets indefinitely through complex legal structures, nominee shareholders, ongoing layering of transactions, and the creation of plausible legitimate explanations for the wealth.
This stage often relies on professional intermediaries such as lawyers, accountants, or trust managers to act as fronts, making the illicit funds appear legitimate.
Because preservation and masking can span years or even decades, illicit wealth becomes deeply embedded in the legitimate economy, rendering it extremely difficult for forensic accountants and investigators to trace, disrupt, or recover.
In short: it’s playing the long game – hoping and even counting on that physical and digital records tying assets back to flesh and blood humans get lost, shredded or simply disappear.
Maintaining and protecting assets the modern money launder could use:
- Offshore Trusts & Foundations – Using jurisdictions with strong secrecy laws to shield assets from scrutiny.
- Layered Corporate Structures – Multiple shell companies across different countries to obscure asset ownership.
- Conversion to Stable Assets – Purchasing real estate, fine art, precious metals, luxury goods, or other appreciating assets.
- Diversification Across Jurisdictions – Spreading assets globally to reduce vulnerability to a single government’s seizure powers. Some countries are also corrupt and don’t have strong rule of AML or corporate transparency laws, and as a bonus don’t have information sharing agreements or legal treaties with countries like the U.S.
- Private Banking & Wealth Management – Using discreet, relationship-based banking services for asset custody.
- Long-term Investments – Holding securities, private equity stakes, or venture capital positions for years to legitimize funds.
- Family Offices – Establishing private wealth management entities that handle both illicit and legitimate holdings.
Masking the ownership and origins of the illicit proceeds the money launder could use:
- Nominee Shareholders & Directors – Appointing third parties to legally represent ownership.
- Bearer Shares – Using unregistered share certificates where possession equals ownership (still available in some jurisdictions).
- Continuous Layering – Periodically moving assets through new accounts or entities to disrupt audit trails.
- Trade-Based Transactions – Falsifying invoices, shipping records, or valuations to disguise transfers of value.
- False Documentation – Creating fraudulent contracts, loan agreements, or inheritance claims to explain asset origins.
- Professional Intermediaries – Leveraging lawyers, accountants, and trust company operators as “fronts” for asset control.
- Charitable or Political Contributions – Using philanthropy or campaign donations to embed illicit funds into legitimate social channels.
- Mixing with Legitimate Revenue – Commingling illegal proceeds with legal business income so they are indistinguishable.
Example: A trust in the British Virgin Islands holds shares in a Panamanian corporation, which owns a London property purchased with illicit funds—beneficial ownership is shielded behind layers of nominees.
Some Notable Cases
Real-world examples show why the classic three-stage model is too limited and why a refreshed, retooled and modernized framework is essential.
Each case highlights how one or more elements manifest in practice:
New FinCEN Advisory: A Fresh Example of Modern Laundering Elements
The new FinCEN Advisory FIN-2025-A003 is a must read for everyone who has a stake in fighting financial crime – whether they are in the public or private sectors.
The advisory details how Chinese Money Laundering Networks (CMLNs) appear to bypass the classic “three stages” and instead function more as a global settlement system. The latest FinCEN Advisory (FIN-2025-A003) highlights Chinese Money Laundering Networks (CMLNs) as professionalized, decentralized systems that launder Mexican cartel drug proceeds.
These networks demonstrate nearly all the modern elements simultaneously, underscoring the limitations of the classic model.
- Acquisition & Access: Cartel-generated USD becomes the raw illicit value. Rather than smuggling cash back to Mexico, CMLNs acquire it in the U.S. at a discount.
- Initial Integration (Front-loading): CMLNs immediately match cartel dollars with Chinese nationals seeking to circumvent PRC capital controls. This arbitrage turns illicit drug money into legitimate-seeming RMB at the outset.
- Dispersal & Conversion: Value is moved through mirror transactions (USD→MXN→RMB) without physical cross-border transfer. Additional conversion occurs via luxury goods, “daigou” networks, real estate escrow, or even cryptocurrency.
- Recycling & Legitimation: Cartel proceeds become indistinguishable from Chinese clients’ legitimate overseas investments, re-entering global markets under a veneer of lawful commerce.
- Preservation & Masking: Layered corporate entities, third-party “money mule” accounts, and real estate holdings safeguard value and obscure ultimate beneficial ownership.
This typology illustrates how capital-control arbitrage and professional networks drive laundering today—not sequential layering. Mirror swaps, underground banking, and trade-based laundering act less like stages and more like interchangeable elements of a global settlement system.
The Singapore $3 Billion Laundering Case (2023–2024)
In one of Singapore’s largest financial crime cases, authorities uncovered a transnational laundering network tied to online gambling, scams, and unlicensed money lending, resulting in asset seizures that ballooned from SGD 1 billion to more than SGD 3 billion.
This case demonstrates Acquisition & Access through illicit online enterprises, followed by Initial Integration as funds were funneled directly into Singapore’s real estate and banking systems under the guise of legitimate investments.
The network then used Dispersal & Conversion to fragment wealth across luxury cars, bank accounts, and international holdings, and relied on Preservation & Masking by embedding illicit funds into long-term property investments that appeared legitimate.
TD Bank’s Record AML Settlement (2024)
When TD Bank agreed to pay nearly $3.1 billion in penalties, it exposed how weak compliance systems can become enablers of large-scale laundering.
Criminal actors exploited the bank to gain Acquisition & Access to the U.S. financial system, with illicit proceeds moving through accounts disguised as ordinary customer activity.
These funds were subject to Recycling & Legitimation, as repeated transactions normalized their appearance, while Preservation & Masking was achieved through long-term placement in the bank’s legitimate operations.
The case highlights how systemic compliance failures allow illicit funds to become deeply entrenched within mainstream institutions.
Binance and Crypto-Related Laundering (2023)
The $4.3 billion settlement with Binance marked a turning point for cryptocurrency regulation, showing how digital platforms can serve as gateways for laundering.
Here, sanctioned actors and high-risk clients achieved Acquisition & Access by exploiting Binance’s weak controls to store and move illicit crypto assets.
Dispersal & Conversion occurred using mixers, privacy coins, and cross-chain swaps to obscure value, while Recycling & Legitimation was achieved when illicit crypto was converted into fiat, investments, or consumer purchases.
The case underscored that even unregulated digital platforms play a critical role in embedding illicit wealth into the global economy.
Operation Destabilise – UK-Led International Enforcement (2021–2024)
This UK-led crackdown dismantled a laundering network linked to drug cartels, Russian sanctions evasion, and organized crime groups, resulting in 84 arrests and the seizure of £20 million in assets.
The scheme illustrates Acquisition & Access through drug trafficking and corruption proceeds, combined with Dispersal & Conversion via cross-border transfers orchestrated with encrypted communications.
To maintain control over illicit wealth, criminals relied on Preservation & Masking, using offshore proxies and layered transactions to protect hundreds of millions in criminal proceeds from discovery.
Guo Wengui’s $1 Billion Fraud and Laundering Scheme (2024)
Chinese billionaire Guo Wengui was convicted in 2024 of defrauding investors through false investment opportunities, raising nearly $1 billion in illicit funds.
His scheme demonstrates Acquisition & Access through investor fraud, Initial Integration by channeling proceeds into shell companies as fabricated capital contributions, and Preservation & Masking through offshore accounts and complex webs of ownership that obscured the true movement and control of funds.
The case also highlights the role of high-profile individuals in exploiting their influence to shield financial crimes.
Sinaloa Cartel Laundering via Chinese Networks (2023)
A DEA investigation in 2023 revealed how Chinese underground networks laundered over $50 million for the Sinaloa Cartel.
Drug trafficking proceeds provided the Acquisition & Access, while Dispersal & Conversion was achieved through structured bank deposits, shell company accounts, and the use of Chinese facilitators to fragment money trails.
The scheme then relied on Recycling & Legitimation, reinvesting cartel proceeds through trade-based money laundering and property acquisitions to blend illicit wealth into legitimate channels.
This case highlights the growing collaboration between Latin American cartels and Chinese financial intermediaries.
Mozambique’s Hidden Debt Scandal – Manuel Chang Conviction 2024)
The conviction of former Mozambique finance minister Manuel Chang in the United States exposed a $2 billion fraud involving undisclosed loans with international banks, including Credit Suisse.
The scandal reflects Acquisition & Access through corrupt loan deals, Dispersal & Conversion by moving funds across shell entities and global banks, and Preservation & Masking through falsified contracts and offshore accounts that concealed the scheme for years.
This case illustrates how political corruption, combined with global banking structures, can destabilize an entire national economy.
Bernie Madoff Ponzi Scheme (2008 conviction)
Bernie Madoff orchestrated the largest Ponzi scheme in history, defrauding investors of an estimated $65 billion before his arrest in 2008.
As a respected Wall Street figure and former NASDAQ chairman, he gained Acquisition & Access to vast sums of capital by leveraging his reputation and exclusive investment advisory business to attract wealthy individuals, charities, and institutions.
Instead of generating genuine returns, he engaged in Initial Integration (front-loading) by recording incoming investor funds as legitimate account balances from the outset, creating the illusion of successful trading activity.
To sustain the fraud, Madoff relied heavily on Preservation & Masking, fabricating trade confirmations, falsifying statements, and using trusted professionals and a façade of stability to shield the scheme for decades.
The collapse came during the 2008 financial crisis when redemption demands exceeded inflows, exposing how deeply his deception was embedded in the financial system.
Taken together, these cases show that modern money laundering rarely follows a neat linear progression.
Instead, illicit funds may be integrated immediately, dispersed digitally across borders, recycled through legitimate institutions, and masked for decades in real assets or offshore structures.
For investigators, forensic accountants, and compliance professionals, recognizing these overlapping elements is essential to understanding how today’s laundering operations both exploit and embed themselves within the global financial system.
Why the Modern Model Matters
For forensic accountants, compliance officers, and law enforcement, understanding this updated framework is critical:
- Pattern Recognition: Identifies money laundering that doesn’t fit the old three-step model.
- Adaptability: Anticipates schemes in emerging markets and technologies (crypto, trade finance, fintech).
- Targeting Facilitators: Focuses investigative resources on professional money launderers and gatekeepers.
Conclusion
The fight against money laundering is a coordinated effort involving multiple agencies and international bodies, each with distinct roles but shared objectives.
IRS–Criminal Investigation (IRS-CI) focuses on tracing illicit funds through complex financial transactions, leveraging its expertise in following the money to build criminal cases involving tax crimes, fraud, and money laundering under 18 U.S.C. §§ 1956 and 1957.
IRS-CI agents receive specialized training in forensic accounting, asset tracing, and digital currency investigations, enabling them to dismantle money laundering networks and seize illicit assets.
The Financial Crimes Enforcement Network (FinCEN) serves as the U.S. financial intelligence unit, collecting and analyzing data from financial institutions through Bank Secrecy Act (BSA) reporting, such as Suspicious Activity Reports (SARs) and Currency Transaction Reports (CTRs).
FinCEN issues advisories, typologies, and red-flag indicators that compliance officers and investigators can use to detect emerging threats.
On a global level, the Financial Action Task Force (FATF) sets international AML and counter-terrorist financing (CTF) standards, conducts mutual evaluations of member countries, and publishes guidance on high-risk jurisdictions and evolving money laundering methods.
For investigators and compliance professionals, staying informed on these agencies’ priorities, typology updates, and enforcement trends is essential.
Regular training should cover the identification of unusual transaction patterns, understanding cross-border reporting requirements, the use of beneficial ownership data, and awareness of new money laundering channels, such as trade-based money laundering, virtual assets, and professional enablers.
By aligning investigative and compliance practices with the evolving guidance from IRS-CI, FinCEN, and FATF, professionals can strengthen detection, prevention, and enforcement efforts in the fight against illicit finance.
About the author
Kenneth J. Hines, MSA, EA, CFE is a Partner at Integritas³, a global consulting firm specializing in tax, compliance, forensic accounting, and litigation support.
He spent more than two decades with IRS-Criminal Investigation, leading high-profile tax fraud, corruption, and money laundering cases. Mr. Hines is also an Executive-in-Residence and part-time accounting teacher at the University of Washington – Bothell’s School of Business.