A straw man refers to an individual or entity that is used as a front to conceal the true beneficial owner, controller, or originator of financial activity.
In AML/CFT contexts, a straw man is typically someone who lends their identity, bank account, corporate position, or transactional capacity to another party, knowingly or unknowingly, to enable the movement, placement, or control of illicit funds while distancing the real actor from detection and liability.
Straw men are commonly associated with money laundering, fraud, sanctions evasion, corruption, tax evasion, and terrorist financing.
Their use undermines customer due diligence, beneficial ownership transparency, and transaction monitoring frameworks by introducing deliberate misrepresentation into the financial system.
The concept of a straw man is rooted in misdirection.
Rather than engaging directly with financial institutions or regulated entities, criminals interpose a third party to act “on their behalf.”
This third party appears to be the legitimate customer or decision-maker, while the real actor remains hidden.
Straw men may be family members, employees, associates, students, low-income individuals, or shell directors who are selected because they attract minimal scrutiny.
In some cases, the straw man is complicit and compensated.
In others, the individual is coerced, deceived, or unaware of the full extent of the activity being conducted in their name.
From an AML/CFT perspective, straw man arrangements are particularly dangerous because they distort the foundational assumption of compliance systems, that the person presenting themselves as the customer is the true owner or controller of the activity.
When that assumption fails, standard KYC, risk scoring, and behavioural monitoring become less effective unless institutions apply enhanced scrutiny and contextual analysis.
Straw man usage directly intersects with several core AML/CFT control pillars, particularly beneficial ownership identification, customer due diligence, and suspicious transaction reporting.
Regulators and standard-setters explicitly recognise straw men as a mechanism for obscuring control and accountability.
Key AML/CFT implications include:
The use of straw men is a recurring typology in guidance issued by bodies such as the Financial Action Task Force, which emphasises the need for institutions to identify natural persons who ultimately own or control assets, even when formal ownership appears legitimate.
Straw man structures tend to share several identifiable characteristics:
These characteristics are often subtle and require contextual evaluation rather than reliance on single indicators.
In individual cases, a person allows their personal bank account, wallet, or identity to be used by another party.
Common scenarios include:
Such arrangements are frequently observed in mule networks, cyber-enabled fraud, and organised crime operations.
In corporate contexts, straw men may be appointed as:
Corporate straw men are particularly prevalent in complex ownership chains, offshore structures, and trade-based money laundering schemes.
Identifying straw man activity requires institutions to look beyond formal documentation and assess substance over form.
Common red flags include:
Individually, these indicators may not be conclusive. In combination, they can point strongly toward straw man usage.
Criminals employ a range of techniques to operationalise straw man arrangements:
These methods are designed to defeat both human review and automated monitoring.
An organised fraud ring recruits multiple low-income individuals to open accounts.
The individuals retain nominal ownership, but all transaction instructions come from the organisers.
Funds from phishing scams are deposited, transferred, and withdrawn rapidly, with the straw men retaining a small fee.
A politically exposed individual uses a trusted associate as the registered owner of a consultancy firm.
Bribe payments are routed to the firm as “professional fees,” while the associate has no real involvement in the business operations.
A sanctioned individual uses a non-designated family member as the registered owner of accounts and assets.
The straw man conducts transactions that ultimately benefit the sanctioned party, masking control and economic interest.
A straw director signs import-export contracts and banking documents, while pricing decisions, counterparties, and fund flows are controlled by an undisclosed third party coordinating trade mis-invoicing.
Failure to detect straw man arrangements can have serious consequences:
Institutions that rely excessively on formal documentation without contextual analysis are particularly vulnerable.
Straw men are difficult to identify because they are designed to appear legitimate.
Key challenges include:
Addressing these challenges requires moving beyond checklist-based compliance toward intelligence-led assessment.
Regulators increasingly expect institutions to identify the natural persons who ultimately own or control assets, even when intermediaries or nominees are involved. Governance expectations typically include:
Supervisory actions often focus on whether institutions assessed substance over form when straw men were present.
Straw men strike at the core of AML/CFT effectiveness by severing the link between identity and control.
Addressing this risk enables institutions to:
As financial crime becomes more sophisticated and intermediated, the identification of straw men remains a critical competency for modern AML/CFT operations.
Move at crypto speed without losing sight of your regulatory obligations.
With IDYC360, you can scale securely, onboard instantly, and monitor risk in real time—without the friction.