Money laundering is the process of making illegally obtained funds appear legitimate. The 3 stages of money laundering (placement, layering, and integration) describe how criminal proceeds move from an obvious illegal origin to money that looks, on the surface, like lawful income.
Understanding these stages is not academic. For compliance teams, knowing where in this cycle money enters a financial institution determines which controls work, which fail, and where the greatest risk sits.
What Is Money Laundering?
Money laundering exists because illegally obtained money is dangerous to spend. Funds linked directly to criminal activity can be traced, seized, and used as evidence. The goal of money laundering is to break that link, making the money appear to have come from legitimate sources so it can be spent, invested, or reinvested freely.
Definition and scale
The United Nations Office on Drugs and Crime (UNODC) estimates that money laundered globally amounts to 2 to 5% of global GDP, equivalent to between $800 billion and $2 trillion annually.
The actual figure is impossible to calculate precisely, because the clandestine nature of money laundering means most of it goes undetected. What is measurable is the cost: in regulatory fines, in criminal proceeds that re-enter the economy as distorting investments, and in financial institutions that unknowingly become part of the crime.
Why understanding the stages matters
The three stages of money laundering are not equally easy to detect. Placement is the most visible and most dangerous stage for the criminal. Integration is nearly impossible to distinguish from legitimate wealth once complete.
AML compliance programs are designed to interrupt the cycle at each stage, but detection at placement is by far the best outcome. By the time money reaches integration, the trail has been deliberately obscured through dozens of transactions, jurisdictions, and intermediaries. For a broader view of how money laundering operates, see types of money laundering.
Stage 1: Placement — Introducing Dirty Money into the Financial System
Placement is the first and most vulnerable stage for the criminal. This is where illegally obtained cash physically enters the formal financial system. It is the moment of greatest exposure because the money is still directly connected to its criminal source.
What is placement?
Placement involves taking cash from criminal activity (drug trafficking, bribery, theft, tax fraud) and converting or depositing it in a way that gets it into the banking system without triggering detection.
The challenge for criminals is volume. Large amounts of physical cash are conspicuous, impractical to store, and directly traceable. Placement solves this problem by breaking up the cash and introducing it through channels that look routine.
Common placement methods
Smurfing and structuring: Breaking large cash sums into smaller deposits, each individually below the reporting threshold, and spreading them across multiple accounts, branches, or individuals. In India, cash transactions above ₹10 lakh trigger Cash Transaction Reports (CTRs) to FIU-IND. Structuring deposits to stay just below this threshold is a common and well-documented tactic.
Cash-intensive businesses: Mixing illegal cash with legitimate takings from restaurants, car washes, salons, and other businesses with high cash flow and variable costs. The criminal owns or controls the business, inflates reported cash receipts, and deposits the combined amount as ordinary revenue.
False invoicing: Fabricating or inflating invoices to justify incoming cash as payment for goods or services that were never actually provided.
Currency exchange and monetary instruments: Converting cash into foreign currencies, demand drafts, or money orders at exchange bureaus, reducing the physical cash footprint.
Casino laundering: Purchasing casino chips with cash, playing minimally, then cashing out to receive a casino cheque that appears to be gambling winnings.
India-specific placement: Hawala and benami transactions
Hawala: An informal value transfer network that operates entirely outside the banking system. Money is transferred through a network of brokers (hawaldars) across borders using a parallel bookkeeping system, leaving no traceable financial record. Hawala is one of the most difficult placement methods for conventional AML systems to detect, precisely because the money never formally enters the banking channel.
Benami transactions: Placing assets or funds in the name of another person (a benami holder) to conceal beneficial ownership. The Benami Transactions (Prohibition) Amendment Act, 2016, specifically targets this practice, but enforcement remains challenging.
UPI structuring: Splitting payments across multiple UPI IDs or digital wallets to stay below transaction monitoring thresholds. As digital payment infrastructure has expanded, so has its use as a low-oversight placement channel. FIU-IND has flagged this as an emerging vector.
Jan Dhan account abuse: Dormant government-scheme accounts activated suddenly with large cash deposits, a pattern flagged consistently in financial intelligence reports.
How AML systems detect placement
Effective detection at the placement stage depends on two things working together: strong identity verification at onboarding, and transaction monitoring that flags structuring patterns.
AI-powered identity verification prevents fraudsters from opening accounts with forged or synthetic documents. Transaction monitoring systems flag sudden activity in dormant accounts, multiple rapid deposits from the same customer across branches, and deposit patterns that correlate with known structuring behavior.
Detection here is the best possible outcome. Money stopped at placement never gets the opportunity to be layered or integrated.
Stage 2: Layering — Obscuring the Trail
Once funds are in the financial system, criminals move to layering: a series of transactions designed to make the money’s origin untraceable. The goal is complexity, creating a paper trail so convoluted that investigators cannot follow it back to the source.
What is layering?
Layering involves moving money through multiple accounts, institutions, and jurisdictions, changing its form along the way. A single layering operation might move funds through six banks across four countries, convert them between currencies twice, pass them through two shell companies, and emerge as an apparent loan repayment.
The UNODC notes that some money laundering cases do not follow a clean three-stage sequence, and stages can overlap or repeat. Layering is where this complexity most often occurs.
Common layering methods
Wire transfers: Moving funds through a chain of accounts across multiple banks in different jurisdictions, exploiting differing AML standards and correspondent banking relationships.
Shell companies: Routing money through a chain of companies in secrecy jurisdictions (the British Virgin Islands, Cayman Islands, or Panama) where beneficial ownership information is restricted or opaque.
Stock market cycling: Purchasing securities and rapidly selling them to create an apparent investment gain, converting criminal proceeds into what looks like trading income.
Real estate transactions: Buying and selling property rapidly, with manipulated valuations, to justify large cash flows as real estate returns.
Trade-based money laundering (TBML): Over- or under-invoicing goods in international trade to move value across borders concealed within legitimate commercial transactions.
Crypto money laundering: The modern layering toolkit
Cryptocurrency has become one of the primary layering instruments because it is fast, borderless, and pseudonymous. Common techniques include:
Chain-hopping: Converting one cryptocurrency to another across multiple blockchains to break the transaction trail. Each conversion makes tracing significantly harder.
Mixing and tumbling services: Blending transactions from multiple wallets across exchanges so that the source of any individual output cannot be determined.
Privacy coins: Monero and Zcash have built-in transaction obfuscation that makes tracing close to impossible using conventional blockchain analytics.
Peer-to-peer OTC trading: Buying and selling crypto directly between parties, bypassing exchange KYC requirements entirely.
Blockchain analytics tools have become increasingly sophisticated, but crypto layering remains a significant challenge for AML teams. For a deeper look at how crypto money laundering works, see money laundering in cryptocurrency.
India layering: Shell companies and round-tripping
Shell companies: Indian companies registered with nominee directors, used to route funds between accounts while obscuring beneficial ownership. The Ministry of Corporate Affairs has struck off hundreds of thousands of shell companies in recent enforcement drives, but the tactic persists.
Round-tripping: Money exits India through informal channels or offshore accounts, gets “cleaned” through foreign entities, and returns as apparently legitimate foreign direct investment (FDI). The beneficial owner of the outgoing funds and the incoming investment is the same person.
Unregistered crypto platforms: Peer-to-peer crypto exchanges operating without KYC create rapid layering channels outside the formal banking system.
Real estate layering: Black money converted into property, then resold at market rates, a historically common layering route in Indian urban real estate markets.
Red flags for detecting layering
The challenge with layering detection is that each individual transaction may appear routine. The pattern is what signals risk. Key red flags include:
- Round-dollar transactions in rapid succession between entities with no apparent business relationship
- Wire transfers to or from jurisdictions with high-secrecy, weak AML standards, or active FATF greylisting
- Sudden changes in customer transaction patterns inconsistent with their verified profile
- Corporate entities with no discernible business purpose receiving or sending large transfers
Enhanced due diligence procedures for high-risk customers help surface these patterns. The combination of AI-driven transaction monitoring and ongoing customer risk scoring is more effective than rule-based systems alone at catching layering across a diverse customer base.
Stage 3: Integration — Bringing Clean Money Back into the Economy
Integration is the final stage, and the hardest to detect. By this point, the criminal has obscured the money’s origin through multiple transactions across multiple jurisdictions. The laundered funds re-enter the legitimate economy as apparently lawful income.
What is integration?
At integration, the criminal can spend, invest, or reinvest money without the obvious risk of connecting it to the original crime. The funds look like returns on investment, business income, or loan repayments. Without a documented chain of evidence from the placement stage forward, prosecutors have little to work with.
Common integration methods
Legitimate business acquisition: Purchasing restaurants, construction firms, car dealerships, or other businesses that generate real revenue. Criminal proceeds are co-mingled with legitimate cash flow and become indistinguishable.
Real estate investment: Property is purchased with laundered funds and sold at market price. The sale proceeds appear fully legitimate.
Luxury asset purchases: Artwork, jewelry, yachts, and collectibles hold or increase value with minimal documentation. They can be resold for what appear to be genuine investment returns.
Loan-back schemes: The criminal deposits laundered funds with an offshore entity, then takes a “loan” from that entity and repays it with clean money, effectively legitimizing the original offshore deposit.
The Vancouver Model: A textbook case study
The Vancouver Model, named after British Columbia, Canada, is one of the most studied examples of integrated money laundering across all three stages simultaneously.
Underground brokers accepted drug money as cash and converted it into casino chips (placement). The chips were converted into casino cheques after minimal play (layering). The cheques were then used to purchase real estate (integration).
The operation worked for years because each stage was designed to look like ordinary commerce. It illustrates how sophisticated criminal networks engineer systems specifically to exploit gaps between financial sectors.
India integration: Real estate and agricultural land
Property under-declaration: Black money integrated through real estate purchases where the transaction value registered with the government reflects only the “white” portion. The remaining payment, made in cash, is integrated without entering any formal record.
Agricultural land: Historically exempt from certain disclosure requirements, agricultural property has been a common integration vehicle in rural areas, particularly in states with active informal economies.
Demonetization 2016: The government’s withdrawal of high-denomination banknotes was designed, in part, to surface integrated black money. The exercise revealed the scale of cash held outside the formal economy and accelerated the shift to digital payments, which created new monitoring challenges alongside new oversight opportunities.
Beyond the Three Stages: Modern Evolutions
The three-stage framework has been the standard model since the 1980s. Criminal methods have evolved considerably since then.
The pre-washing stage
Some AML practitioners identify an informal pre-washing phase that occurs before formal placement: converting cash into non-cash instruments (prepaid cards, e-vouchers, gift cards, mobile wallet top-ups) before attempting to enter the banking system.
Pre-washing reduces the physical cash burden and creates an additional layer of distance from the original crime. It is increasingly relevant as digital payment options have proliferated in markets like India, where low-value digital transactions face less scrutiny than equivalent banking activity.
Money laundering in the digital age
Digital channels have created new low-oversight windows at every stage:
UPI and digital wallets in India: High-volume, low-value digital payments create structuring opportunities that are difficult to monitor comprehensively, particularly across multiple registered users.
BNPL schemes: Buy Now Pay Later products create small-value credit channels that can be used for layering, with goods purchased and then resold for cash.
NFT wash trading: Buying and selling digital art between accounts under the same control, at escalating prices, to transfer value while creating an apparent audit trail of legitimate sales activity.
For a comprehensive view of how compliance teams identify and respond to these evolving methods, see AML typologies.
How Financial Institutions Detect Money Laundering at Each Stage
Understanding the three stages is only useful if it translates into practical detection.
KYC as the first line of defense
Strong identity verification at onboarding is the most cost-effective AML control available. Catching a fraudster before they open an account costs infinitely less than investigating a layering scheme across 40 transactions three years later.
AI-powered KYC systems verify identity documents, check against sanctions and PEP lists, detect synthetic identities, and run liveness checks, all before a customer ever makes a transaction. This is where placement is stopped: at the door.
Transaction monitoring for layering detection
Rule-based systems flag individual transactions that exceed defined thresholds. AI-driven systems analyze behavioral patterns across the customer base, detecting layering activity that no fixed rule would catch, because it is designed to stay just within normal parameters.
Real-time monitoring catches placement and layering before integration. Batch-mode monitoring creates lag that sophisticated criminal networks are specifically designed to exploit.
SAR/STR filing at all stages
Suspicious Transaction Reports (STRs) to FIU-IND are the mechanism by which regulated entities share intelligence with law enforcement. Filing an STR does not require certainty that a crime has occurred. It requires a reasonable basis for suspicion.
The quality of the STR matters. A vague report that notes “unusual activity” provides minimal investigative value. A specific, well-documented STR that traces a pattern of transactions with supporting evidence is actionable intelligence.
The combination of robust KYC at the entry point, AI-driven transaction monitoring across the relationship, and timely STR filing when suspicion arises represents the full-cycle AML response to the three stages. For information on how penalties apply when this system fails, see penalties for money laundering.
HyperVerge’s AI-powered KYC verification stops fraudulent identities at the placement stage, before dirty money enters your system. From document verification and liveness detection to sanctions screening and fraud analytics, HyperVerge helps financial institutions build the identity layer that AML compliance depends on. Explore HyperVerge AML solutions.



