Money Laundering in the Digital Age
As technology advances, criminals will always find new ways of concealing the source(s) of illicit funds, making new anti-money laundering systems an imperative. As we discuss in our latest research, this 'cyber laundering' currently takes several forms, including:
Cryptocurrencies
Cryptocurrencies and digital currencies are important instruments in cyber laundering. Mixing services, sometimes known as tumblers, are used by criminals to combine their illicit and legitimate money. Because of this, it is difficult for the authorities to determine the original source of the funds.
Compared to conventional non-cash payment options, cryptocurrency transactions offer a higher level of privacy. Virtual money can be exchanged online by users, and transactions are typically characterised by the absence of in-person customer interactions. This allows for anonymous funding, which can be either cash funding or third-party funding through virtual exchangers that fail to sufficiently identify the funding source. For global corporations, having a global presence increases the dangers associated with AML/CTF since it complicates surveillance and enforcement.
Law enforcement may target certain exchangers in order to obtain client information that the exchanger may gather, but they are not permitted to launch an inquiry or take assets against a single central location or business (administrator).
Consequently, using virtual currency for transactions offers a degree of anonymity not achievable with conventional credit and debit cards, or outdated Internet payment methods.
Online Gaming and Gambling
Platforms for online gaming have grown in popularity as a means of money laundering. The regular international transfer of virtual assets, in-game money, and objects creates a complex network of transactions that is challenging for investigators to comprehend. Money can be laundered through online auctions and sales, gambling websites, and even virtual gaming sites. Ill-gotten money is converted into the currency that is used on these sites, then transferred back into real, usable, and untraceable clean money.
Proxy Servers and Anonymising Software
A technique known as ‘proxy piercing’ allows hosts to ascertain whether or not a user is making a proxy purchase. A transaction in which a customer uses a proxy server to mask their IP address is referred to as a proxy purchase. By using proxy piercing, one may determine whether a customer attempting a transaction is using a proxy. Next, it will ‘pierce’ the proxy server and identify the original IP of the transaction, according on the degree of the piercing programme. Proxy piercing goes one step further and can also pinpoint that user's exact location.
Proxy servers are frequently used by scammers to conceal their real identities when they make chargebacks or fraudulent transactions. They do this action to evade discovery that the address on their payment method does not correspond to the geolocation of their IP address. By breaking through that barrier, proxy piercing determines whether a buyer is making use of a proxy.
Romance Fraud
Suspects devote a great deal of time to socially manipulating their victims because they are aware that the more trust the victim gives them, the more likely it is that they will be able to take large sums of money from them at the same time. Instead of asking the victims for money right away, con artists spend time establishing a rapport with them online. When they request substantial quantities of money, their justifications for needing financial support are more credible. This is referred to as the ‘grooming period’.
The quantity of money transferred tends to increase with the length of time between the initial point of contact and the first financial transfer date. Data suggests that a significant percentage of victims are widowed, lonely, or recently lost a loved one, experienced a breakup, and/or are suffering from depression.
Job Scamming
Some financial institutions provide a video identification service to customers who want to create bank accounts in order to verify their identity without requiring them to visit a branch office or post office to have their credentials confirmed.
With this service, users typically use a smartphone app to identify themselves in a video conference with a financial institution or a subcontractor. Customers must answer a few questions and show a valid identity card or passport to the camera in order to verify their identity. Online con artists have mastered the art of taking advantage of this digital account opening option. They entice customers to divulge personal information and participate in a video identification procedure. The criminals utilise the accounts created in the identities of their victims for illicit activities like money laundering and accepting payments from fake businesses.
Dark Web and Encryption
The dark web is an encrypted part of the internet that hosts online content not indexed by conventional search engines. Also known as the ‘darknet’, its first structure was conceived by the US Naval Research Laboratory in the mid-90’s as an anonymised and ciphered network for the ease of communication between US spies.
The dark web provides a hidden environment for criminals to conduct various illegal activities, including money laundering. Drugs, prescription drugs, porn, malware, guns, stolen computers and smartphones, counterfeit passports and national identity cards, credit card theft, bank account information theft, and hacking services that enable the erasure of negative information from credit reports or the acquisition of thousands of likes and followers for social media accounts are just a few examples of the many illicit goods and services that can be found — while increasingly advanced encryption technologies make it difficult for law enforcement agencies to intercept and decipher communication between criminal actors.
Source: Global AML Systems Market 2024-2028
Download the Whitepaper: Top 3 Uses of AI in AML
See the Infographic: Following the Money: What Are Everyday Businesses Spending on AML in 2024?
Latest research, whitepapers & press releases
-
ReportSeptember 2025Telecoms & Connectivity
Mobile Messaging Fraud Prevention Market: 2025-2030
Our Mobile Messaging Fraud Prevention research suite provides a detailed and insightful analysis of a market set for significant disruption over the next five years. It enables stakeholders from mobile operators, enterprises, and mobile messaging fraud prevention vendors to understand how the market for mobile messaging fraud will evolve, as well as the impact of AI, RCS, and the evolving competitive environment.
VIEW -
ReportSeptember 2025Sustainability & Smart Cities
Smart Grid Market: 2025-2030
Our cutting-edge Smart Grid research suite provides a comprehensive view of a market at the forefront of the global energy transition. It examines the major disruptions transforming the sector, from the integration of distributed energy resources and the rise of virtual power plants to the growing role of AI-driven intelligence and the mounting need for robust cyber security and compliance.
VIEW -
ReportSeptember 2025Fintech & Payments
eCommerce Payments Market: 2025-2030
Juniper Research’s eCommerce Payments research suite provides a comprehensive and insightful analysis of this market; enabling stakeholders, from eCommerce payment platform providers to merchants and payment service providers, to understand future growth, key trends, and the competitive environment.
VIEW -
ReportSeptember 2025Telecoms & Connectivity
A2P & Business Messaging Market: 2025-2030
Our extensive A2P & Business Messaging research suite comprises detailed analysis of a market undergoing rapid evolution. It provides guidance to mobile operators on how to navigate this shift and grow revenue from business messaging in the future.
VIEW -
ReportAugust 2025Fintech & Payments
Fraud Detection & Prevention in Banking Market: 2025-2030
Our Fraud Detection and Prevention in Banking research suite provides a comprehensive and in-depth analysis of the types of fraud, and methods that can be used to overcome them. This enables stakeholders such as banks, financial institutions, and fintechs to understand future growth, key trends and the competitive environment.
VIEW -
ReportAugust 2025Sustainability & Smart Cities
Smart Buildings Market: 2025-2030
Our Smart Buildings research suite provides in-depth analysis and evaluation of how hardware and software service providers are reimagining smart building solutions as living ecosystems, using Internet of Things (IoT) and AI.
VIEW
-
WhitepaperSeptember 2025Telecoms & Connectivity
RCS Fraud: Emerging Threats in Next-gen Messaging
Our complimentary whitepaper, RCS Fraud: Emerging Threats in Next-gen Messaging, examines the future of the messaging fraud prevention market, with a particular focus on the latest trends within RCS Business Messaging (RBM). Additionally, it includes a forecast summary of the total cost of fraud over RBM to subscribers in 2030.
VIEW -
WhitepaperSeptember 2025
Decentralising the Smart Grid: Opportunities & Challenges
Our complimentary whitepaper, Decentralising the Smart Grid: Opportunities & Challenges, explores how distributed energy resources, renewable integration, and virtual power plants are reshaping grid management.
VIEW -
WhitepaperSeptember 2025Fintech & Payments
Going Glocal ~ Why Local Payment Methods Are Driving eCommerce
Our complimentary whitepaper, Going Glocal ~ Why Local Payment Methods Are Driving eCommerce, assesses how local payment methods are driving the increasing accessibility to eCommerce, and challenges to eCommerce growth.
VIEW -
WhitepaperSeptember 2025Telecoms & Connectivity
Operator Success Strategies in A2P Messaging for 2026
Our complimentary whitepaper, Operator Success Strategies in A2P Messaging for 2026, examines the outlook of the A2P messaging market over the next five years.
VIEW -
WhitepaperAugust 2025Fintech & Payments
Synthetic Identity Fraud: The Lurking Threat to Modern Banking
Our complimentary whitepaper, Synthetic Identity Fraud: The Lurking Threat to Modern Banking, examines the current fraud landscape; explaining the role of key actors in the fraud prevention landscape, and recent developments within the fraud prevention industry.
VIEW -
WhitepaperAugust 2025Sustainability & Smart Cities
Foundations of Smart Buildings: AI, IoT & Energy Efficiency
Our complimentary whitepaper, Foundations of Smart Buildings: AI, IoT & Energy Efficiency, evaluates the main technical components of smart building architecture; being the key objectives and challenges for their acquirement and deployment in the market, as it currently stands.
VIEW
-
Telecoms & Connectivity
ReveNet: Operators Must Act to Restore Trust & Transparency to $55bn A2P SMS Ecosystem
September 2025 -
Telecoms & Connectivity
RCS Business Messaging Fraud to Cost Mobile Subscribers $4.3 Billion Globally Over the Next 5 Years
September 2025 -
Sustainability & Smart Cities
Smart Grids to Support 43% of Global Electricity Supply by 2030, Driven by Virtual Power Plants
September 2025 -
Telecoms & Connectivity
Calling All Telecoms & Connectivity Innovators: 2026 Future Digital Awards Now Open for Entries
September 2025 -
Fintech & Payments
eCommerce Market to Surpass $13 Trillion by 2030 Globally, with Stripe, Visa, and PayPal Leading the Charge
September 2025 -
Telecoms & Connectivity
Conversational Use Cases Fuel Global Messaging Boom: Nearly 3 Trillion Business Messages by 2030
September 2025