Part 5 / 6

Money Laundering & PMLA

🕑 90-120 minutes 📖 Advanced Level 📋 Module 7

Introduction

Money laundering is the process of concealing the origins of illegally obtained money. Understanding money laundering is crucial for cyber crime investigators as proceeds from cyber fraud are almost always laundered. The Prevention of Money Laundering Act, 2002 (PMLA) is India's primary legislation against this crime.

📚 Learning Objectives

By the end of this part, you will understand the three stages of money laundering, know the key provisions of PMLA 2002, understand the role of Enforcement Directorate (ED), and be aware of evidence requirements for PMLA cases.

Money Laundering Stages

Money laundering typically occurs in three stages, though these stages may overlap or occur simultaneously. Understanding these stages helps investigators identify where in the process they can intervene.

1
Placement

The physical introduction of illegal cash into the financial system. This is the most vulnerable stage for detection as large amounts of cash attract attention. Methods include: structuring deposits (smurfing), cash-intensive businesses, currency exchange, and mixing with legitimate business receipts.

2
Layering

Creating complex layers of financial transactions to disguise the audit trail and obscure the source of funds. This involves moving money through multiple accounts, jurisdictions, and financial instruments. Methods include: wire transfers, shell companies, offshore accounts, cryptocurrency, and trade-based laundering.

3
Integration

Bringing the "cleaned" money back into the legitimate economy. The funds now appear to have a legitimate source and can be used openly. Methods include: real estate purchases, luxury assets, business investments, and loan-back schemes.

Modern Laundering Techniques

💰

Cryptocurrency

Using crypto exchanges, mixers, and privacy coins to obscure fund origins.

🏠

Real Estate

Buying property through shell companies, inflating/deflating values, or using cash transactions.

🛒

Trade-Based

Over/under-invoicing goods, phantom shipments, or multiple invoicing to move value.

🎩

Casino/Gaming

Converting cash to chips, minimal gambling, then cashing out for "winnings."

Cyber Crime Connection

Proceeds from cyber fraud are immediately subjected to layering. Funds from UPI fraud, for example, are typically transferred through 5-10 accounts within hours before being converted to cash or cryptocurrency. This makes quick reporting critical.

PMLA 2002

The Prevention of Money Laundering Act, 2002 (PMLA) came into force on July 1, 2005. It has been amended multiple times, most significantly in 2019 to align with international standards and expand its scope.

Key Provisions

SectionSubjectKey Points
Section 3Offence of Money LaunderingWhoever directly or indirectly attempts to indulge in money laundering commits an offence
Section 4PunishmentRigorous imprisonment 3-7 years, may extend to 10 years for scheduled offences. Fine with no upper limit.
Section 5Attachment of PropertyED can provisionally attach property involved in money laundering
Section 8AdjudicationAdjudicating Authority confirms/vacates attachment
Section 17Search and SeizureED's power to search premises and seize records
Section 24Burden of ProofAccused must prove that proceeds are not involved in money laundering
Section 45Bail ProvisionsStringent conditions for bail - twin test applicable
Section 50Statement AdmissibilityStatements to ED are admissible as evidence

Scheduled Offences

PMLA applies only when the predicate crime (source of illegal funds) is a "scheduled offence" listed in the Act's Schedule. Key scheduled offences relevant to cyber crime include:

  • Offences under IT Act, 2000 (cyber crimes)
  • Offences under IPC/BNS (cheating, fraud, criminal breach of trust)
  • NDPS Act offences (narcotics)
  • Corruption offences (Prevention of Corruption Act)
  • SEBI Act offences (securities fraud)
  • Customs Act offences
  • Wildlife Protection Act offences
📚 Definition - Section 3

"Whosoever directly or indirectly attempts to indulge or knowingly assists or knowingly is a party or is actually involved in any process or activity connected with the proceeds of crime including its concealment, possession, acquisition or use and projecting or claiming it as untainted property shall be guilty of offence of money-laundering."

2019 Amendment Key Changes

  • ED can attach property of equivalent value if original proceeds are not available
  • Explanation to Section 3 clarifies that money laundering is a continuing offence
  • Special court can try money laundering cases even if predicate offence case is pending
  • Non-reporting entities added (lawyers, accountants, real estate agents for certain transactions)

Enforcement Directorate (ED)

The Enforcement Directorate is the primary agency responsible for investigating money laundering offences under PMLA and foreign exchange violations under FEMA.

ED's Powers under PMLA

🔍

Investigation

Power to investigate money laundering offences, summon witnesses, and examine persons.

🔒

Search & Seizure

Can search any place and seize records, money, or property (Section 17).

🗃

Attachment

Provisional attachment of property involved in money laundering (Section 5).

🙋

Arrest

Power to arrest persons involved in money laundering (Section 19).

ED Investigation Process

  1. ECIR Registration: Enforcement Case Information Report filed based on predicate offence FIR/complaint
  2. Information Gathering: Collect bank statements, property records, business documents
  3. Summons: Issue summons under Section 50 to examine persons
  4. Search & Seizure: Conduct searches at relevant premises
  5. Provisional Attachment: Attach property to prevent dissipation
  6. Investigation Report: Submit report to Adjudicating Authority
  7. Prosecution Complaint: File complaint before Special Court

Coordination with Cyber Police

StageCyber Police RoleED Role
Initial ComplaintRegister FIR for predicate cyber offenceMonitor for PMLA triggers
InvestigationInvestigate cyber crime, identify accusedTrace proceeds of crime
Fund TracingGet bank statements, identify beneficiariesConduct parallel ML investigation
Asset IdentificationIdentify properties/assets of accusedAttach properties under PMLA
ProsecutionFile chargesheet under IT Act/BNSFile prosecution complaint under PMLA
Dual Prosecution

A person can be prosecuted for both the predicate cyber crime (under IT Act/BNS) and for money laundering (under PMLA). These are separate offences and both prosecutions can proceed simultaneously.

Evidence Requirements

PMLA has unique evidentiary provisions that differ from regular criminal law. Understanding these is crucial for building prosecutable cases.

Burden of Proof - Section 24

Unlike regular criminal law where prosecution must prove guilt beyond reasonable doubt, PMLA reverses the burden for certain aspects:

  • If prosecution proves that accused is in possession of proceeds of crime, the accused must prove they are not proceeds of crime
  • Accused must prove that property attached is not involved in money laundering
  • This reverse burden applies to the nature of property, not to the commission of predicate offence

Statement Admissibility - Section 50

Statements made to ED officers during investigation are admissible as evidence, unlike statements to police officers under Section 25 of Indian Evidence Act. Key points:

  • Statements recorded under Section 50 are admissible against the maker
  • Person summoned is bound to state the truth and produce documents
  • Self-incrimination protection is limited in PMLA proceedings
  • Retracted statements still have evidentiary value

Essential Evidence for PMLA Prosecution

ElementEvidence Required
Predicate OffenceFIR, chargesheet, or court records establishing the scheduled offence
Proceeds of CrimeBank statements, fund flow analysis, property documents showing proceeds
Laundering ActivityEvidence of placement, layering, or integration activities
Knowledge/IntentCircumstances showing accused knew proceeds were from crime
Property LinkDocumentary evidence linking property to proceeds of crime

Building the Fund Trail

  1. Victim Statement: Document the loss, transaction details, and dates
  2. Bank Statements: Collect complete statements of victim and suspect accounts
  3. Transaction Analysis: Map the flow of funds through all accounts
  4. Beneficiary Identification: Identify ultimate beneficiaries of the funds
  5. Asset Discovery: Identify properties, investments, or assets purchased
  6. Valuation: Get proper valuation of attached assets

FIU-IND and Reporting

The Financial Intelligence Unit - India (FIU-IND) is the national agency responsible for receiving, processing, and disseminating financial intelligence.

Reporting Entities

  • Banks and financial institutions
  • Insurance companies
  • Stock brokers and mutual funds
  • Payment system operators
  • Virtual Digital Asset (VDA) service providers
  • Dealers in precious metals
  • Real estate agents (for certain transactions)

Types of Reports

Report TypeTriggerTimeline
Cash Transaction Report (CTR)Cash transactions above Rs. 10 lakhWithin 15 days of month end
Suspicious Transaction Report (STR)Suspicion of money launderingWithin 7 days of forming suspicion
Counterfeit Currency ReportDetection of counterfeit currencyWithin 7 days
Non-Profit Organization ReportCross-border wire transfers by NPOsMonthly
💡 Investigation Resource

Investigators can request FIU-IND for information about STRs and CTRs filed against suspects. This intelligence can reveal patterns and accounts that may not be apparent from the initial investigation.

📚 Key Takeaways
  • Money laundering occurs in three stages: Placement, Layering, and Integration
  • PMLA applies when predicate crime is a scheduled offence (includes IT Act crimes)
  • ED has extensive powers including search, seizure, and provisional attachment
  • Burden of proof reverses for proving property is not proceeds of crime
  • Statements to ED under Section 50 are admissible as evidence
  • Fund trail documentation is essential for successful prosecution
  • Cyber police and ED must coordinate for effective prosecution of financial cyber crimes