Organized groups of fraudsters and money launderers are experts at concealing the origins of illicit assets. One of their go-to tactics is using a mule account or relying on money mules to transfer dirty money while attempting to evade detection.
This article defines what a mule account is and the role money mules play in the money laundering process. It also explores how next-generation investigation technology can help analysts lead more efficient investigations of mule accounts.
What is a money mule?
Money muling, also called mule fraud, is when a person or a business moves or transfers ill-gotten funds for someone else. The owner of the funds may be trying to distance themselves from those assets because they have illegal origins: fraud, or drug or human trafficking. The account used by a money mule is called a mule account.
The ideal money mule is someone who is apparently unconnected to the criminal group trying to hide the sources of their money. Relying on a mule creates distance between criminals and their money, making it more difficult for law enforcement to trace money trails.
Criminal groups tend to target financially or emotionally vulnerable people to operate mule accounts. Traditionally the typical profile of a money mule has included students (and especially international students who can more easily slip across borders), job seekers, or even individuals on dating sites.
Some mules receive a commission for their work. Some may be manipulated into believing they are helping out a friend or romantic partner. And some are unwitting mule fraud victims, unaware they are participating in criminal activity. Aware or not, money mules can suffer serious consequences if they are caught. They can be excluded from accessing bank accounts or loans for years, and may even be sentenced to jail time.
What role does a mule account play in the money laundering process?
A mule account or money mule is generally part of the first phase of money laundering, called placement, in which illicit funds are integrated into the financial system. The account may be opened using the mule’s actual personal information, or using a synthetic identity.
Once the mule account is opened within a bank or other payment service, money is deposited in that account. The mule then receives instructions on how the funds should be moved and where they should go. Next, the mule transfers the funds to another account. They might also withdraw them as cash to be deposited elsewhere.
What are common money mule red flags?
An essential step in tackling mule fraud knowing when to investigate an account or a customer - either an individual or a business - for mule activity. Some common money mule red flags include:
Changes in transactional history, including sudden international transfers, large purchases of crypto currency, or other large non-typical transfers
Flow through of funds
Abnormalities identified via online behavior, such as hesitation inputting data, keystroke delays, etc.
Round dollar amount purchases that are frequent and/or in large amounts, which can indicate gift card purchases for money muling
Absence of typical account behavior.
Mule accounts: an evolving challenge for financial institutions
As a part of their anti-money laundering activities, banks and financial institutions must continually screen for potential mule accounts and conduct investigations on any suspicious activity. Failure to establish sufficient safeguards against mule accounts can lead to fines from regulators.
But mule accounts can often resemble legitimate accounts. Criminals also frequently change their tactics, which can make it challenging to keep risk models up to date. Younger people have traditionally been the target recruits for money muling, for example. But according to Cifas statistics (1), the number of 40-60 year olds involved in activity bearing the hallmarks of money muling has increased by a third between 2017 and 2021.
Professional criminals are also good at evading traditional rules-based systems, keeping their activity - and the activity of those working for them - under thresholds that would raise a red flag. Furthermore, with little or no apparent links between a criminal organization and their money mules, understanding the extent of mule networks can be challenging.
How graph analytics accelerate and enhance mule account investigations
Effectively investigating mule accounts is largely a question of data and context. Data and the relationships between entities show analysts who is transferring money where, who has relationships with whom, which entities share information, etc. All essential information in determining whether or not an account is engaging in mule activity. Investigating a mule account is largely about identifying the networks around that account and how they operate.
What is graph analytics?
Graph analytics works in a way that’s perfectly suited to analyze both individual data points and the relationship between them to deliver context. Graph technology is based on a data structure that consists of a set of nodes and edges (or relationships). Each node represents an entity, such as a person, a bank account, an address or any other piece of data. Each edge represents how two nodes are linked to each other.
Analyzing and understanding relationships is much easier than with tools based on traditional data models.
Investigating mule accounts with graph analytics
Financial crime detection and investigation software that is built using graph technology, such as Linkurious Enterprise, offers robust solutions for managing mule account risk and investigating suspicious activity.
Rules-based alert systems are able to catch most of the suspicious behavior associated with mule accounts. For example, such a system will generate an alert if a certain amount of money is being transferred within a certain timeframe, or if there is a mismatch between a business’s declared activity and the amounts of money flowing through their account.
However, graph analytics deliver superior performance for the detection and investigation of suspicious activity, particularly when it is associated with complex money mule schemes. Not only does graph analytics provide powerful capabilities to spot and connect multiple weak signals that can be indicative of mule accounts rings. It also enables analysts to gain deeper context and insight to quickly understand the full extent of a mule scam. This ensures they get to the bottom of the problem - which may go beyond the individual flagged account.
With graph visualization, you can quickly see where money has been transferred and in what amounts, which will be a strong indicator of which other accounts may be implicated in money laundering activity. You can also quickly identify links through personal information. A business account that has been flagged as suspicious may turn out to be registered to the same address as an individual. That person will merit additional investigation.
Graph shows these relationships in a couple of clicks, speeding up investigations and ensuring no mule activity flies under the radar.
When layered onto existing systems, graph technology is a powerful tool to help analysts quickly understand all the connections between customers, transactions, accounts, and more. The result is faster, more effective money mule investigations and less compliance risk for financial institutions.
Fighting financial crime with graph analytics
Graph analytics is a powerful tool to fight back against money laundering and other financial crime. Download our white paper to learn how graph-powered next-generation financial crime detection and investigation software can help detect more fraud and money laundering schemes and significantly speed up investigations.
A spotlight on graph technology directly in your inbox.
At Linkurious, we provide the next generation of data visualization and analytics solutions powered by graph technology. We help teams of analysts and investigators swiftly and accurately find insights otherwise hidden in complex connected data so they can make more informed decisions, faster.