Introduction
Money laundering is the process of concealing the origins of illegally obtained money. Understanding money laundering is crucial for cyber crime investigators as proceeds from cyber fraud are almost always laundered. The Prevention of Money Laundering Act, 2002 (PMLA) is India's primary legislation against this crime.
By the end of this part, you will understand the three stages of money laundering, know the key provisions of PMLA 2002, understand the role of Enforcement Directorate (ED), and be aware of evidence requirements for PMLA cases.
Money Laundering Stages
Money laundering typically occurs in three stages, though these stages may overlap or occur simultaneously. Understanding these stages helps investigators identify where in the process they can intervene.
The physical introduction of illegal cash into the financial system. This is the most vulnerable stage for detection as large amounts of cash attract attention. Methods include: structuring deposits (smurfing), cash-intensive businesses, currency exchange, and mixing with legitimate business receipts.
Creating complex layers of financial transactions to disguise the audit trail and obscure the source of funds. This involves moving money through multiple accounts, jurisdictions, and financial instruments. Methods include: wire transfers, shell companies, offshore accounts, cryptocurrency, and trade-based laundering.
Bringing the "cleaned" money back into the legitimate economy. The funds now appear to have a legitimate source and can be used openly. Methods include: real estate purchases, luxury assets, business investments, and loan-back schemes.
Modern Laundering Techniques
Cryptocurrency
Using crypto exchanges, mixers, and privacy coins to obscure fund origins.
Real Estate
Buying property through shell companies, inflating/deflating values, or using cash transactions.
Trade-Based
Over/under-invoicing goods, phantom shipments, or multiple invoicing to move value.
Casino/Gaming
Converting cash to chips, minimal gambling, then cashing out for "winnings."
Proceeds from cyber fraud are immediately subjected to layering. Funds from UPI fraud, for example, are typically transferred through 5-10 accounts within hours before being converted to cash or cryptocurrency. This makes quick reporting critical.
PMLA 2002
The Prevention of Money Laundering Act, 2002 (PMLA) came into force on July 1, 2005. It has been amended multiple times, most significantly in 2019 to align with international standards and expand its scope.
Key Provisions
| Section | Subject | Key Points |
|---|---|---|
| Section 3 | Offence of Money Laundering | Whoever directly or indirectly attempts to indulge in money laundering commits an offence |
| Section 4 | Punishment | Rigorous imprisonment 3-7 years, may extend to 10 years for scheduled offences. Fine with no upper limit. |
| Section 5 | Attachment of Property | ED can provisionally attach property involved in money laundering |
| Section 8 | Adjudication | Adjudicating Authority confirms/vacates attachment |
| Section 17 | Search and Seizure | ED's power to search premises and seize records |
| Section 24 | Burden of Proof | Accused must prove that proceeds are not involved in money laundering |
| Section 45 | Bail Provisions | Stringent conditions for bail - twin test applicable |
| Section 50 | Statement Admissibility | Statements to ED are admissible as evidence |
Scheduled Offences
PMLA applies only when the predicate crime (source of illegal funds) is a "scheduled offence" listed in the Act's Schedule. Key scheduled offences relevant to cyber crime include:
- Offences under IT Act, 2000 (cyber crimes)
- Offences under IPC/BNS (cheating, fraud, criminal breach of trust)
- NDPS Act offences (narcotics)
- Corruption offences (Prevention of Corruption Act)
- SEBI Act offences (securities fraud)
- Customs Act offences
- Wildlife Protection Act offences
"Whosoever directly or indirectly attempts to indulge or knowingly assists or knowingly is a party or is actually involved in any process or activity connected with the proceeds of crime including its concealment, possession, acquisition or use and projecting or claiming it as untainted property shall be guilty of offence of money-laundering."
2019 Amendment Key Changes
- ED can attach property of equivalent value if original proceeds are not available
- Explanation to Section 3 clarifies that money laundering is a continuing offence
- Special court can try money laundering cases even if predicate offence case is pending
- Non-reporting entities added (lawyers, accountants, real estate agents for certain transactions)
Enforcement Directorate (ED)
The Enforcement Directorate is the primary agency responsible for investigating money laundering offences under PMLA and foreign exchange violations under FEMA.
ED's Powers under PMLA
Investigation
Power to investigate money laundering offences, summon witnesses, and examine persons.
Search & Seizure
Can search any place and seize records, money, or property (Section 17).
Attachment
Provisional attachment of property involved in money laundering (Section 5).
Arrest
Power to arrest persons involved in money laundering (Section 19).
ED Investigation Process
- ECIR Registration: Enforcement Case Information Report filed based on predicate offence FIR/complaint
- Information Gathering: Collect bank statements, property records, business documents
- Summons: Issue summons under Section 50 to examine persons
- Search & Seizure: Conduct searches at relevant premises
- Provisional Attachment: Attach property to prevent dissipation
- Investigation Report: Submit report to Adjudicating Authority
- Prosecution Complaint: File complaint before Special Court
Coordination with Cyber Police
| Stage | Cyber Police Role | ED Role |
|---|---|---|
| Initial Complaint | Register FIR for predicate cyber offence | Monitor for PMLA triggers |
| Investigation | Investigate cyber crime, identify accused | Trace proceeds of crime |
| Fund Tracing | Get bank statements, identify beneficiaries | Conduct parallel ML investigation |
| Asset Identification | Identify properties/assets of accused | Attach properties under PMLA |
| Prosecution | File chargesheet under IT Act/BNS | File prosecution complaint under PMLA |
A person can be prosecuted for both the predicate cyber crime (under IT Act/BNS) and for money laundering (under PMLA). These are separate offences and both prosecutions can proceed simultaneously.
Evidence Requirements
PMLA has unique evidentiary provisions that differ from regular criminal law. Understanding these is crucial for building prosecutable cases.
Burden of Proof - Section 24
Unlike regular criminal law where prosecution must prove guilt beyond reasonable doubt, PMLA reverses the burden for certain aspects:
- If prosecution proves that accused is in possession of proceeds of crime, the accused must prove they are not proceeds of crime
- Accused must prove that property attached is not involved in money laundering
- This reverse burden applies to the nature of property, not to the commission of predicate offence
Statement Admissibility - Section 50
Statements made to ED officers during investigation are admissible as evidence, unlike statements to police officers under Section 25 of Indian Evidence Act. Key points:
- Statements recorded under Section 50 are admissible against the maker
- Person summoned is bound to state the truth and produce documents
- Self-incrimination protection is limited in PMLA proceedings
- Retracted statements still have evidentiary value
Essential Evidence for PMLA Prosecution
| Element | Evidence Required |
|---|---|
| Predicate Offence | FIR, chargesheet, or court records establishing the scheduled offence |
| Proceeds of Crime | Bank statements, fund flow analysis, property documents showing proceeds |
| Laundering Activity | Evidence of placement, layering, or integration activities |
| Knowledge/Intent | Circumstances showing accused knew proceeds were from crime |
| Property Link | Documentary evidence linking property to proceeds of crime |
Building the Fund Trail
- Victim Statement: Document the loss, transaction details, and dates
- Bank Statements: Collect complete statements of victim and suspect accounts
- Transaction Analysis: Map the flow of funds through all accounts
- Beneficiary Identification: Identify ultimate beneficiaries of the funds
- Asset Discovery: Identify properties, investments, or assets purchased
- Valuation: Get proper valuation of attached assets
FIU-IND and Reporting
The Financial Intelligence Unit - India (FIU-IND) is the national agency responsible for receiving, processing, and disseminating financial intelligence.
Reporting Entities
- Banks and financial institutions
- Insurance companies
- Stock brokers and mutual funds
- Payment system operators
- Virtual Digital Asset (VDA) service providers
- Dealers in precious metals
- Real estate agents (for certain transactions)
Types of Reports
| Report Type | Trigger | Timeline |
|---|---|---|
| Cash Transaction Report (CTR) | Cash transactions above Rs. 10 lakh | Within 15 days of month end |
| Suspicious Transaction Report (STR) | Suspicion of money laundering | Within 7 days of forming suspicion |
| Counterfeit Currency Report | Detection of counterfeit currency | Within 7 days |
| Non-Profit Organization Report | Cross-border wire transfers by NPOs | Monthly |
Investigators can request FIU-IND for information about STRs and CTRs filed against suspects. This intelligence can reveal patterns and accounts that may not be apparent from the initial investigation.
- Money laundering occurs in three stages: Placement, Layering, and Integration
- PMLA applies when predicate crime is a scheduled offence (includes IT Act crimes)
- ED has extensive powers including search, seizure, and provisional attachment
- Burden of proof reverses for proving property is not proceeds of crime
- Statements to ED under Section 50 are admissible as evidence
- Fund trail documentation is essential for successful prosecution
- Cyber police and ED must coordinate for effective prosecution of financial cyber crimes