Physical presence refers to the verifiable, real-world existence of a natural person or legal entity at a specific geographic location.
In AML/CFT frameworks, it is used to distinguish legitimate, identifiable customers from shell entities, fictitious identities, or remote-only structures designed to obscure beneficial ownership or operational activity.
Regulators often expect reporting entities to confirm physical presence during customer onboarding, ongoing due diligence, and enhanced due diligence for higher-risk customers.
The concept is also applied to financial institutions themselves.
A bank or intermediary lacking meaningful physical presence in any jurisdiction is considered a higher-risk entity, often associated with shell banking or opaque cross-border arrangements.
Verifying physical presence is a foundational element of customer due diligence.
It allows institutions to validate that an individual or entity genuinely operates from a declared address or place of business.
This validation reduces risks related to synthetic identities, fraudulent setups, transient entities, and criminal organisations using addresses as mere mail drops.
For legal entities, physical presence includes observable business activity, staff, operational infrastructure, and governance functions.
For individuals, it includes confirmation of residential or employment addresses and verification through independent, reliable sources.
Criminal networks often exploit the absence of physical presence to facilitate layering, anonymity, tax evasion, and movement of illicit funds through shell companies or virtual structures.
Weak verification increases exposure to correspondent banking risks, beneficial ownership gaps, and high-risk cross-border flows.
In AML/CFT regimes, physical presence is linked to several regulatory requirements:
Supervisors often flag entities without reasonable physical presence as higher risk because they are conducive to misuse for shell operations, money laundering, and terrorist financing.
Institutions typically validate physical presence using:
A business is expected to demonstrate:
Physical presence verification becomes critical when customers:
Inadequate physical presence can indicate higher exposure to financial crime. Red flags include:
Criminals may exploit remote-only structures to obscure the origin of funds, facilitate layering, or avoid regulatory oversight.
Absence of physical presence is often exploited through:
A company provides a prestigious city-center address but has no staff or operations.
During EDD, the entity cannot demonstrate actual physical presence, raising suspicion of shell activities.
A business claims to operate manufacturing facilities abroad, but verification checks reveal only a mailbox and no physical site.
Transaction patterns suggest high-value cross-border flows inconsistent with the declared footprint.
A fintech onboarding customers in a regulated jurisdiction lacks local staff, offices, or supervisory visibility.
The regulator classifies it as high risk due to operational opacity.
An individual’s declared residence is found to be vacant or non-existent, yet the account shows frequent high-value transfers.
Failure to verify physical presence exposes institutions to significant risks:
Institutions that rely on intermediaries or agents without physical presence face additional correspondent banking risks.
Key challenges include:
Institutions must strengthen verification frameworks, use intelligence-led tools, and establish escalation pathways for cases where physical presence cannot be reasonably confirmed.
Regulators worldwide expect institutions to maintain documented procedures for validating physical presence, particularly for high-risk customers.
Key expectations include:
Global standards such as FATF Recommendation 10 (Customer Due Diligence) and Recommendation 13 (Correspondent Banking) emphasise the importance of operational presence and transparency.
Robust verification of physical presence strengthens AML/CFT outcomes by enabling institutions to:
Physical presence remains a foundational control in mitigating identity-driven and structural financial crime risks.
Move at crypto speed without losing sight of your regulatory obligations.
With IDYC360, you can scale securely, onboard instantly, and monitor risk in real time—without the friction.